Hi all,Just trying to figure out where I'm going wrong.I have a hiberfil.sys file from a Win7SP1x64 system.The first 6 pages are full of 0x00 which I believe means the hiberfil was wiped as part of a resume.Having read the AOMF, specifically p98, I expected Volatility to brute force the header and, voila, magic happens.However, Volatility just reports that it wasn't able to find a matching address space:$ python vol.py -f /tmp/hiberfil.sys imageinfoVolatility Foundation Volatility Framework 2.4Determining profile based on KDBG search...Suggested Profile(s) : No suggestion (Instantiated with Win7SP1x86)AS Layer1 : IA32PagedMemoryPae (Kernel AS)AS Layer2 : WindowsHiberFileSpace32 (Unnamed AS)AS Layer3 : FileAddressSpace (/tmp/hiberfil.sys)PAE type : PAEDTB : 0x185000LKDBG : 0x82d3ac28Number of Processors : 4Image Type (Service Pack) : 1KPCR for CPU 0 : 0x82d3bc00KPCR for CPU 1 : 0x807c6000KPCR for CPU 2 : 0x8d300000KPCR for CPU 3 : 0x8d336000KUSER_SHARED_DATA : 0xffdf0000Image date and time : 2014-05-09 15:26:28 UTC+0000Image local date and time : 2014-05-09 17:26:28 +0200$ python vol.py -f /tmp/hiberfil.sys --profile=Win7SP1x64 pslistVolatility Foundation Volatility Framework 2.4No suitable address space mapping foundTried to open image as:MachOAddressSpace: mac: need baseLimeAddressSpace: lime: need baseWindowsHiberFileSpace32: No base Address SpaceWindowsCrashDumpSpace64BitMap: No base Address SpaceWindowsCrashDumpSpace64: No base Address Space......If I try an imagecopy, the output file is identical to the original:$ python vol.py -f /tmp/hiberfil.sys --profile=Win7SP1x64 imagecopy -O /tmp/hiberfil.binVolatility Foundation Volatility Framework 2.4Writing data (5.00 MB chunks): |.................................................................................................................................................................................................................................................................................................................................................................................................................................................................|bridgey@aspire:~/dev/volatility$ md5sum /tmp/hiberfil.*fee8a1c6924b871477434a678adb4483 /tmp/hiberfil.binfee8a1c6924b871477434a678adb4483 /tmp/hiberfil.sysAnd finally, I couldn't find a class for 64-bit hiberfil...$ find -type f -name '*iber*' -exec grep -H ^class.WindowsHi {} \;./volatility/plugins/addrspaces/hibernate.py:class WindowsHiberFileSpace32(addrspace.BaseAddressSpace):Am I leaping to conclusions, or is a hiberfil from a 64-bit system simply not supported?Would love any comments!Thanks,Adam
_______________________________________________
Vol-users mailing list
Vol-users@volatilesystems.com
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users