Check OS Information:
vol.py -f "/path/to/file" windows.info
List Processes:
vol.py -f "/path/to/file" windows.pslist
Scan for Hidden Processes:
vol.py -f "/path/to/file" windows.psscan
Process Tree:
vol.py -f "/path/to/file" windows.pstree
Dump Process Executable:
vol.py -f "/path/to/file" -o "/path/to/dir" windows.dumpfiles --pid <PID>
Memory Dump for a Process:
vol.py -f "/path/to/file" -o "/path/to/dir" windows.memmap --dump --pid <PID>
Dump Loaded Modules:
vol.py -f "/path/to/file" windows.moddump --dump-dir /path/to/dump
Dumps loaded modules (DLLs) from memory to the specified directory
--pid: Specifies the process ID to dump.
--dump-dir: Defines the directory where the dumped file will be saved.
List Open Handles:
vol.py -f "/path/to/file" windows.handles --pid <PID>
List Loaded Modules (DLLs):
vol.py -f "/path/to/file" windows.ldrmodules --pid <PID>
List DLLs:
vol.py -f "/path/to/file" windows.dlllist --pid <PID>
Process Command Line:
vol.py -f "/path/to/file" windows.cmdline