Volatility can analyze many different types of memory dumps, including virtual machines, raw dumps, and crash dumps.
Usage
volatility <parameter>
forensic@ubuntu:~/Desktop$ volatility -f memdump.mem imageinfo
Volatility Foundation Volatility Framework 2.6
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win7SP1x64, Win7SP0x64, Win2008R2SP0x64, Win2008R2SP1x64_23418, Win2008R2SP1x64, Win7SP1x64_23418
AS Layer1 : WindowsAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/home/forensic/Desktop/memdump.mem)
PAE type : No PAE
DTB : 0x187000L
KDBG : 0xf80002a0c0a8L
Number of Processors : 1
Image Type (Service Pack) : 1
KPCR for CPU 0 : Oxfffff80002a0dd00L
KUSER_SHARED_DATA : Oxfffff78000000000L
Image date and time : 2018-09-25 11:07:37 UTC+0000
Image local date and time : 2018-09-25 12:07:37 +0100
forensic@ubuntu:~/Desktop$Important Flags
--profile=<profile>: Set profile discovered inimageinfo
Important Modules
pslist: High-level view of running processespsscan: Scans memory for EPROCESS blockspstree: Displays parent-process relationshipsfilescan: Scans memory for FILE_OBJECT handlesdumpfiles: Extracts FILE_OBJECTS from memory