Created by Blue Cape Security, LLC for the Practical Windows Forensic (PWF) course, highlighting important Windows forensic processes and artifacts.
⚠️ Suspend the Virtual Machine before taking memory images.
Memory
vboxmanage list vms
vboxmanage debugvm <VM_UUID> dumpvmcore --filename win10-mem.raw
Disk
vboxmanage list vms
vboxmanage showvminfo <VM_UUID>
vboxmanage clonemedium disk <disk_UUID>
Memory
Collect .vmem, .vmss, and .vmsn files.
Disk
Collect .vmdk files for the snapshot.
Merge split files:
"C:\\Program Files (x86)\\VMware\\VMware Player\\vmware-vdiskmanager.exe" -r <disk>.vmdk -t 0 MyNewImage.vmdk
# Windows
Get-FileHash -Algorithm SHA1 <file>
# Mac/Linux
shasum <file>