Closed GoogleCodeExporter closed 9 years ago
Hi James,
The malware.py file is for Volatility 2.0 only (you're using it with 2.1
alpha). The 2.1 release will ship with malfind (it will be in
volatility/plugins/malware) and this problem is resolved. One of the reasons
for bringing the malware plugins into the core is to make it easier to keep
them in sync with changes that are occurring between releases. So for the next
few weeks if you need to use malfind, please use it with 2.0 from
http://code.google.com/p/volatility/downloads/list.
Original comment by michael.hale@gmail.com
on 9 Mar 2012 at 2:18
Thank you! That got it! One PE dump obtained, urge to kill...fading...fading...
Cheers
James
Original comment by james.wo...@transmax.com.au
on 12 Mar 2012 at 11:01
Thanks for getting back to us James, do you want us to keep this bug open
still, or are you happy with the resolution?
Original comment by mike.auty@gmail.com
on 12 Mar 2012 at 11:18
Very happy with the resolution, it wasn't really a bug after all and yes, the
issue can be closed.
Original comment by james.wo...@transmax.com.au
on 13 Mar 2012 at 10:46
Original comment by michael.hale@gmail.com
on 14 Mar 2012 at 1:30
Original issue reported on code.google.com by
james.wo...@transmax.com.au
on 9 Mar 2012 at 7:14