volatility_windows
Analyze Windows memory dumps using Volatility 3 plugins to extract forensic data like processes, network connections, registry entries, and malware indicators.
Instructions
Run a Volatility 3 Windows plugin against a memory dump. Returns plugin, success, output, and errors. Read-only analysis, Volatility 3 auto-detects OS. Requires vol3 (vol) on PATH.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| dump_path | Yes | Path to the Windows memory dump file | |
| plugin | Yes | Volatility 3 Windows plugin to run |