Closed sarulon closed 8 years ago
try update to vol 2.5, and do you have defined vm profile in your machinary config?
yes , the profile is Win7SP1x86 i have volatility version 2.4
update to latest 2.5
Please start with @doomedraven's suggestion and let us know how that works out for you.
same error but vol 2.5
@sarulon have you checked your mem.dump file? -> mine exits, but it is empty (size 0) --> i guess the vol. errror is because of the empty "dump"
?
can you execute vol.py -f memory.dmp --profile your_profile_here imageinfo
? and put output here
im not sure about the SP (but both SP0 / SP1 same output)
mli@CDC-CUCKOO-CLUSTER-MASTER-01:/sandbox/cuckoo/storage/analyses/1$ vol.py -f memory.dmp --profile Win7SP1x86 imageinfo Volatility Foundation Volatility Framework 2.5 INFO : volatility.debug : Determining profile based on KDBG search... Suggested Profile(s) : No suggestion (Instantiated with no profile) AS Layer1 : FileAddressSpace (/sandbox/cuckoo/storage/analyses/1/memory.dmp) PAE type : No PAE
mli@CDC-CUCKOO-CLUSTER-MASTER-01:/sandbox/cuckoo/storage/analyses/1$ ls -la | grep memory.dmp -rw-rw-r-- 1 mli mli 0 Aug 19 16:26 memory.dmp
*and yeah my clock is wrong^^
and output of vol.py -f memory.dmp --profile your_profile_here kdbgscan
which virtualization software do yo uuse?
it looks like it takes broken dumps
Im pretty sure its the mem.dump causing this problem ;D
mli@CDC-CUCKOO-CLUSTER-MASTER-01:/sandbox/cuckoo/storage/analyses/1$ vol.py -f memory.dmp --profile Win7SP1x86 kdbgscan Volatility Foundation Volatility Framework 2.5 mli@CDC-CUCKOO-CLUSTER-MASTER-01:/sandbox/cuckoo/storage/analyses/1$
which machinery do you use?
now im using vsphere, cause esx doesn't support mem-dumps
Can you post the cuckoo log from the analysis? The vSphere machinery module is supposed to create a snapshot of the analysis VM, download the .vmsn snapshot file to memory.dmp, then delete the snapshot.
2016-08-19 18:00:08,147 [lib.cuckoo.core.resultserver] DEBUG: File upload request for files/61d147f3d5b8c8f8_pafish.log 2016-08-19 18:00:08,148 [lib.cuckoo.core.resultserver] DEBUG: Uploaded file length: 732 2016-08-19 18:00:08,964 [lib.cuckoo.core.guest] INFO: analysis1: analysis completed successfully 2016-08-19 18:00:08,973 [lib.cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2016-08-19 18:00:09,208 [modules.machinery.vsphere] INFO: Creating snapshot cuckoo_memdump_410673 for machine CDC-CUCKOO-CLUSTER-SLAVE-WIN7-000 2016-08-19 18:00:12,301 [modules.machinery.vsphere] INFO: Downloading memory dump [CDC_ERNA_Internal_Storage] CDC-CUCKOO-CLUSTER-SLAVE-WIN7-01/CDC-CUCKOO-CLUSTER-SLAVE-WIN7-01-Snapshot14.vmsn to /sandbox/cuckoo/storage/analyses/2/memory.dmp 2016-08-19 18:00:12,344 [modules.machinery.vsphere] INFO: Removing snapshot cuckoo_memdump_410673 for machine CDC-CUCKOO-CLUSTER-SLAVE-WIN7-000 2016-08-19 18:00:14,670 [modules.machinery.vsphere] INFO: Powering off virtual machine CDC-CUCKOO-CLUSTER-SLAVE-WIN7-000 2016-08-19 18:00:16,745 [lib.cuckoo.core.scheduler] DEBUG: Released database task #2 2016-08-19 18:00:16,788 [lib.cuckoo.core.plugins] DEBUG: Executed processing module "AnalysisInfo" on analysis at "/sandbox/cuckoo/storage/analyses/2"
(need the whole *.log file?)
This log is sufficient. It seems to be doing what it's supposed to, but the .vmsn file should not be empty. Which version of ESXi are you running?
@doomedraven here the vol.py for memory.dmp
vol.py -f cuckoo/storage/analyses/15/memory.dmp --profile Win7SP0x86 imageinfo Volatility Foundation Volatility Framework 2.5 INFO : volatility.debug : Determining profile based on KDBG search... Suggested Profile(s) : No suggestion (Instantiated with no profile) AS Layer1 : FileAddressSpace (/home/alex/cuckoo/storage/analyses/15/memory.dmp) PAE type : No PAE
-rw-r--r-- 1 root root 9.6M Aug 25 10:45 cuckoo/storage/analyses/15/memory.dmp
running on esxi 6.0
@sarulon The size of the memory.dmp file is too small. Please try with the updated version of the vSphere machinery module, which should fetch the correct file.
@jgajek where can i take the updated module ?
@sarulon It's been merged in this git repo.
https://github.com/cuckoosandbox/cuckoo/blob/master/modules/machinery/vsphere.py
@jgajek its working thanks
2016-08-14 23:56:43,795 [volatility.utils] DEBUG: Voting round 2016-08-14 23:56:43,808 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.macho.MachOAddressSpace'> 2016-08-14 23:56:43,810 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.lime.LimeAddressSpace'> 2016-08-14 23:56:43,819 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hibernate.WindowsHiberFileSpace32'> 2016-08-14 23:56:43,829 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crashbmp.WindowsCrashDumpSpace64BitMap'> 2016-08-14 23:56:43,840 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace64'> 2016-08-14 23:56:43,842 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hpak.HPAKAddressSpace'> 2016-08-14 23:56:43,842 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.VirtualBoxCoreDumpElf64'> 2016-08-14 23:56:43,843 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmem.VMWareMetaAddressSpace'> 2016-08-14 23:56:43,843 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmware.VMWareAddressSpace'> 2016-08-14 23:56:43,844 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.QemuCoreDumpElf'> 2016-08-14 23:56:43,844 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace32'> 2016-08-14 23:56:43,845 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.amd64.AMD64PagedMemory'> 2016-08-14 23:56:43,846 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemoryPae'> 2016-08-14 23:56:43,846 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemory'> 2016-08-14 23:56:43,847 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.osxpmemelf.OSXPmemELF'> 2016-08-14 23:56:43,847 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.standard.FileAddressSpace'> 2016-08-14 23:56:43,850 [volatility.obj] DEBUG: Applying modification from BasicObjectClasses 2016-08-14 23:56:43,851 [volatility.obj] DEBUG: Applying modification from BigPageTableMagic 2016-08-14 23:56:43,851 [volatility.obj] DEBUG: Applying modification from ControlAreaModification 2016-08-14 23:56:43,852 [volatility.obj] DEBUG: Applying modification from ELF32Modification 2016-08-14 23:56:43,852 [volatility.obj] DEBUG: Applying modification from ELF64Modification 2016-08-14 23:56:43,853 [volatility.obj] DEBUG: Applying modification from ELFModification 2016-08-14 23:56:43,853 [volatility.obj] DEBUG: Applying modification from HPAKVTypes 2016-08-14 23:56:43,854 [volatility.obj] DEBUG: Applying modification from HandleTableEntryPreWin8 2016-08-14 23:56:43,855 [volatility.obj] DEBUG: Applying modification from IEHistoryVTypes 2016-08-14 23:56:43,855 [volatility.obj] DEBUG: Applying modification from LimeTypes 2016-08-14 23:56:43,856 [volatility.obj] DEBUG: Applying modification from MachoModification 2016-08-14 23:56:43,856 [volatility.obj] DEBUG: Applying modification from MachoTypes 2016-08-14 23:56:43,857 [volatility.obj] DEBUG: Applying modification from MbrObjectTypes 2016-08-14 23:56:43,857 [volatility.obj] DEBUG: Applying modification from PoolTagModification 2016-08-14 23:56:43,858 [volatility.obj] DEBUG: Applying modification from PoolTrackTagOverlay 2016-08-14 23:56:43,858 [volatility.obj] DEBUG: Applying modification from SSLKeyModification 2016-08-14 23:56:43,859 [volatility.obj] DEBUG: Applying modification from UnloadedDriverVTypes 2016-08-14 23:56:43,859 [volatility.obj] DEBUG: Applying modification from VMwareVTypesModification 2016-08-14 23:56:43,860 [volatility.obj] DEBUG: Applying modification from VirtualBoxModification 2016-08-14 23:56:43,861 [volatility.obj] DEBUG: Applying modification from Vista2008Tcpip 2016-08-14 23:56:43,862 [volatility.obj] DEBUG: Applying modification from Win32KGahtiVType 2016-08-14 23:56:43,862 [volatility.obj] DEBUG: Applying modification from Win32Kx86VTypes 2016-08-14 23:56:43,863 [volatility.obj] DEBUG: Applying modification from Win7SP01Syscalls 2016-08-14 23:56:43,864 [volatility.obj] DEBUG: Applying modification from Win7SP1x86GuiVTypes 2016-08-14 23:56:43,865 [volatility.obj] DEBUG: Applying modification from Win7Vista2008x86Timers 2016-08-14 23:56:43,866 [volatility.obj] DEBUG: Applying modification from WinSyscallsAttribute 2016-08-14 23:56:43,868 [volatility.obj] DEBUG: Applying modification from Win7GuiOverlay 2016-08-14 23:56:43,869 [volatility.obj] DEBUG: Applying modification from Win7Tcpip 2016-08-14 23:56:43,870 [volatility.obj] DEBUG: Applying modification from WindowsVTypes 2016-08-14 23:56:43,870 [volatility.obj] DEBUG: Applying modification from AtomTablex86Overlay 2016-08-14 23:56:43,872 [volatility.obj] DEBUG: Applying modification from HiberWin7SP01x86 2016-08-14 23:56:43,873 [volatility.obj] DEBUG: Applying modification from ObjectTypeKeyModification 2016-08-14 23:56:43,873 [volatility.obj] DEBUG: Applying modification from PoolTrackTypeOverlay 2016-08-14 23:56:43,874 [volatility.obj] DEBUG: Applying modification from ProcessAuditVTypes 2016-08-14 23:56:43,875 [volatility.obj] DEBUG: Applying modification from WindowsOverlay 2016-08-14 23:56:43,883 [volatility.obj] DEBUG: Applying modification from CallbackMods 2016-08-14 23:56:43,883 [volatility.obj] DEBUG: Applying modification from EThreadCreateTime 2016-08-14 23:56:43,885 [volatility.obj] DEBUG: Applying modification from MalwarePspCid 2016-08-14 23:56:43,887 [volatility.obj] DEBUG: Applying modification from MalwareWSPVTypes 2016-08-14 23:56:43,888 [volatility.obj] DEBUG: Applying modification from TimerVTypes 2016-08-14 23:56:43,888 [volatility.obj] DEBUG: Applying modification from UserAssistVTypes 2016-08-14 23:56:43,889 [volatility.obj] DEBUG: Applying modification from VadFlagsModification 2016-08-14 23:56:43,889 [volatility.obj] DEBUG: Applying modification from VadTagModification 2016-08-14 23:56:43,891 [volatility.obj] DEBUG: Applying modification from VistaPolicyKey 2016-08-14 23:56:43,892 [volatility.obj] DEBUG: Applying modification from VistaVad 2016-08-14 23:56:43,893 [volatility.obj] DEBUG: Applying modification from VistaWin7KPCR 2016-08-14 23:56:43,894 [volatility.obj] DEBUG: Applying modification from Win7LdrDataTableEntry 2016-08-14 23:56:43,895 [volatility.obj] DEBUG: Applying modification from Win7Pointer64 2016-08-14 23:56:43,896 [volatility.obj] DEBUG: Applying modification from Win7SP1CMHIVE 2016-08-14 23:56:43,897 [volatility.obj] DEBUG: Applying modification from Win7x86DTB 2016-08-14 23:56:43,898 [volatility.obj] DEBUG: Applying modification from Win7x86Hiber 2016-08-14 23:56:43,900 [volatility.obj] DEBUG: Applying modification from WinAllTime 2016-08-14 23:56:43,902 [volatility.obj] DEBUG: Applying modification from WinPEObjectClasses 2016-08-14 23:56:43,903 [volatility.obj] DEBUG: Applying modification from WinPEVTypes 2016-08-14 23:56:43,903 [volatility.obj] DEBUG: Applying modification from WindowsObjectClasses 2016-08-14 23:56:43,904 [volatility.obj] DEBUG: Applying modification from AudipolWin7 2016-08-14 23:56:43,905 [volatility.obj] DEBUG: Applying modification from CmdHistoryObjectClasses 2016-08-14 23:56:43,906 [volatility.obj] DEBUG: Applying modification from CmdHistoryVTypesWin7x86 2016-08-14 23:56:43,906 [volatility.obj] DEBUG: Applying modification from CrashInfoModification 2016-08-14 23:56:43,908 [volatility.obj] DEBUG: Applying modification from DumpFilesVTypesx86 2016-08-14 23:56:43,909 [volatility.obj] DEBUG: Applying modification from HeapModification 2016-08-14 23:56:43,911 [volatility.obj] DEBUG: Applying modification from KDBGObjectClass 2016-08-14 23:56:43,913 [volatility.obj] DEBUG: Applying modification from KPCRProfileModification 2016-08-14 23:56:43,917 [volatility.obj] DEBUG: Applying modification from MFTTYPES 2016-08-14 23:56:43,918 [volatility.obj] DEBUG: Applying modification from MalwareDrivers 2016-08-14 23:56:43,918 [volatility.obj] DEBUG: Applying modification from MalwareIDTGDTx86 2016-08-14 23:56:43,920 [volatility.obj] DEBUG: Applying modification from MalwareKthread 2016-08-14 23:56:43,926 [volatility.obj] DEBUG: Applying modification from NetscanObjectClasses 2016-08-14 23:56:43,926 [volatility.obj] DEBUG: Applying modification from ServiceBase 2016-08-14 23:56:43,927 [volatility.obj] DEBUG: Applying modification from ShellBagsTypesWin7 2016-08-14 23:56:43,929 [volatility.obj] DEBUG: Applying modification from ShimCacheTypesWin7x86 2016-08-14 23:56:43,929 [volatility.obj] DEBUG: Applying modification from UserAssistWin7VTypes 2016-08-14 23:56:43,930 [volatility.obj] DEBUG: Applying modification from VistaObjectClasses 2016-08-14 23:56:43,931 [volatility.obj] DEBUG: Applying modification from Win32KCoreClasses 2016-08-14 23:56:43,932 [volatility.obj] DEBUG: Applying modification from Win7KDBG 2016-08-14 23:56:43,933 [volatility.obj] DEBUG: Applying modification from Win7ObjectClasses 2016-08-14 23:56:43,934 [volatility.obj] DEBUG: Applying modification from ServiceVista 2016-08-14 23:56:43,935 [volatility.obj] DEBUG: Applying modification from ServiceVistax86 2016-08-14 23:56:43,937 [volatility.obj] DEBUG: Applying modification from Win7Win32KCoreClasses 2016-08-14 23:56:44,006 [volatility.utils] DEBUG: Succeeded instantiating <volatility.plugins.addrspaces.standard.FileAddressSpace object at 0x7f096fa7b5d0> 2016-08-14 23:56:44,007 [volatility.utils] DEBUG: Voting round 2016-08-14 23:56:44,008 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.macho.MachOAddressSpace'> 2016-08-14 23:56:44,008 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.lime.LimeAddressSpace'> 2016-08-14 23:56:44,009 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hibernate.WindowsHiberFileSpace32'> 2016-08-14 23:56:44,010 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crashbmp.WindowsCrashDumpSpace64BitMap'> 2016-08-14 23:56:44,011 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace64'> 2016-08-14 23:56:44,011 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hpak.HPAKAddressSpace'> 2016-08-14 23:56:44,012 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.VirtualBoxCoreDumpElf64'> 2016-08-14 23:56:44,013 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmem.VMWareMetaAddressSpace'> 2016-08-14 23:56:44,014 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmware.VMWareAddressSpace'> 2016-08-14 23:56:44,030 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.QemuCoreDumpElf'> 2016-08-14 23:56:44,031 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace32'> 2016-08-14 23:56:44,031 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.amd64.AMD64PagedMemory'> 2016-08-14 23:56:44,032 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemoryPae'> 2016-08-14 23:56:44,065 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemory'> 2016-08-14 23:56:44,098 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.osxpmemelf.OSXPmemELF'> 2016-08-14 23:56:44,098 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.standard.FileAddressSpace'> 2016-08-14 23:56:44,099 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.arm.ArmAddressSpace'> 2016-08-14 23:56:44,132 [volatility.utils] DEBUG: Voting round 2016-08-14 23:56:44,132 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.macho.MachOAddressSpace'> 2016-08-14 23:56:44,133 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.lime.LimeAddressSpace'> 2016-08-14 23:56:44,133 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hibernate.WindowsHiberFileSpace32'> 2016-08-14 23:56:44,134 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crashbmp.WindowsCrashDumpSpace64BitMap'> 2016-08-14 23:56:44,134 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace64'> 2016-08-14 23:56:44,135 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hpak.HPAKAddressSpace'> 2016-08-14 23:56:44,136 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.VirtualBoxCoreDumpElf64'> 2016-08-14 23:56:44,136 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmem.VMWareMetaAddressSpace'> 2016-08-14 23:56:44,137 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmware.VMWareAddressSpace'> 2016-08-14 23:56:44,137 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.QemuCoreDumpElf'> 2016-08-14 23:56:44,138 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace32'> 2016-08-14 23:56:44,138 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.amd64.AMD64PagedMemory'> 2016-08-14 23:56:44,139 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemoryPae'> 2016-08-14 23:56:44,139 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemory'> 2016-08-14 23:56:44,140 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.osxpmemelf.OSXPmemELF'> 2016-08-14 23:56:44,140 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.standard.FileAddressSpace'> 2016-08-14 23:56:44,141 [volatility.utils] DEBUG: Succeeded instantiating <volatility.plugins.addrspaces.standard.FileAddressSpace object at 0x7f096c103550> 2016-08-14 23:56:44,141 [volatility.utils] DEBUG: Voting round 2016-08-14 23:56:44,142 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.macho.MachOAddressSpace'> 2016-08-14 23:56:44,142 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.lime.LimeAddressSpace'> 2016-08-14 23:56:44,143 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hibernate.WindowsHiberFileSpace32'> 2016-08-14 23:56:44,144 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crashbmp.WindowsCrashDumpSpace64BitMap'> 2016-08-14 23:56:44,144 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace64'> 2016-08-14 23:56:44,145 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.hpak.HPAKAddressSpace'> 2016-08-14 23:56:44,146 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.VirtualBoxCoreDumpElf64'> 2016-08-14 23:56:44,146 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmem.VMWareMetaAddressSpace'> 2016-08-14 23:56:44,147 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.vmware.VMWareAddressSpace'> 2016-08-14 23:56:44,161 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.elfcoredump.QemuCoreDumpElf'> 2016-08-14 23:56:44,162 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.crash.WindowsCrashDumpSpace32'> 2016-08-14 23:56:44,162 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.amd64.AMD64PagedMemory'> 2016-08-14 23:56:44,163 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemoryPae'> 2016-08-14 23:56:44,164 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.intel.IA32PagedMemory'> 2016-08-14 23:56:44,164 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.osxpmemelf.OSXPmemELF'> 2016-08-14 23:56:44,165 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.standard.FileAddressSpace'> 2016-08-14 23:56:44,165 [volatility.utils] DEBUG: Trying <class 'volatility.plugins.addrspaces.arm.ArmAddressSpace'> 2016-08-14 23:56:44,174 [modules.processing.memory] ERROR: Generic error executing volatility Traceback (most recent call last): File "/home/alex/cuckoo/modules/processing/memory.py", line 1028, in run results = VolatilityManager(self.memory_path).run() File "/home/alex/cuckoo/modules/processing/memory.py", line 948, in run vol = VolatilityAPI(self.memfile, self.osprofile) File "/home/alex/cuckoo/modules/processing/memory.py", line 59, in init self.init_config() File "/home/alex/cuckoo/modules/processing/memory.py", line 113, in init_config self.addr_space = utils.load_as(self.config) File "/usr/local/lib/python2.7/dist-packages/volatility-2.4-py2.7.egg/volatility/utils.py", line 65, in load_as raise error AddrSpaceError: No suitable address space mapping found Tried to open image as: MachOAddressSpace: mac: need base LimeAddressSpace: lime: need base WindowsHiberFileSpace32: No base Address Space WindowsCrashDumpSpace64BitMap: No base Address Space WindowsCrashDumpSpace64: No base Address Space HPAKAddressSpace: No base Address Space VirtualBoxCoreDumpElf64: No base Address Space VMWareMetaAddressSpace: No base Address Space VMWareAddressSpace: No base Address Space QemuCoreDumpElf: No base Address Space WindowsCrashDumpSpace32: No base Address Space AMD64PagedMemory: No base Address Space IA32PagedMemoryPae: No base Address Space IA32PagedMemory: No base Address Space OSXPmemELF: No base Address Space MachOAddressSpace: MachO Header signature invalid LimeAddressSpace: Invalid Lime header signature WindowsHiberFileSpace32: No xpress signature found WindowsCrashDumpSpace64BitMap: Header signature invalid WindowsCrashDumpSpace64: Header signature invalid HPAKAddressSpace: Invalid magic found VirtualBoxCoreDumpElf64: ELF Header signature invalid VMWareMetaAddressSpace: VMware metadata file is not available VMWareAddressSpace: Cannot find the Memory tag QemuCoreDumpElf: ELF Header signature invalid WindowsCrashDumpSpace32: Header signature invalid AMD64PagedMemory: Incompatible profile Win7SP1x86 selected IA32PagedMemoryPae: No valid DTB found IA32PagedMemory: No valid DTB found OSXPmemELF: ELF Header signature invalid FileAddressSpace: Must be first Address Space ArmAddressSpace: No valid DTB found