We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 997f2a4 + 97006bc commit 385192aCopy full SHA for 385192a
volatility3/framework/plugins/windows/malware/malfind.py
@@ -173,7 +173,7 @@ def list_injection_sites(
173
174
if dirty_page is not None:
175
# Useful information to investigate the page content with volshell afterwards.
176
- vollog.warning(
+ vollog.debug(
177
f"[proc_id {proc_id}] Found suspicious DIRTY + {protection_string} page at {hex(dirty_page)}",
178
)
179
start = vad.get_start()
0 commit comments