qwhai / volatility

Automatically exported from code.google.com/p/volatility
GNU General Public License v2.0
0 stars 0 forks source link

Unable to use psxview, apihooks in Volatility 2 #167

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. When plugin is used for psxview, apihooks it is giving error
2.
3.

What is the expected output? What do you see instead?
standard output is expeected however getting below error
  File "C:\Edu\MalScan\3.exe.infection\Working\plugins\malware.py", line 2044, in render_text
    for (proc, type, current_mod, mod, func, src, dst, hooker, instruction) in data:
  File "C:\Edu\MalScan\3.exe.infection\Working\plugins\malware.py", line 2026, in calculate
    mods, mod_addrs = get_sorted_mods(p.get_load_modules())
  File "../volatility\build\pyi.win32\pyinstaller\vol.pkz/volatility.obj", line 301, in __getattr__
AttributeError: Unable to resolve attribute get_load_modules on _EPROCESS

What version of the product are you using? On what operating system?
volatility 2.0 on Windows7

Please provide any additional information below.

Original issue reported on code.google.com by welcome....@gmail.com on 11 Nov 2011 at 4:12

GoogleCodeExporter commented 9 years ago
Hi, 

Could you please re-test with malware.py r127 
(http://code.google.com/p/malwarecookbook/source/browse/trunk/malware.py) and 
either your current Volatility 2.0 code or the 2.1 alpha development snapshot 
(from SVN trunk). The r127 of malware.py should work with both now. 

Thanks!

Original comment by michael.hale@gmail.com on 13 Nov 2011 at 6:47

GoogleCodeExporter commented 9 years ago
I'm going to close this because in my opinion the issue has been fixed. If you 
have trouble, feel free to re-open. 

Original comment by michael.hale@gmail.com on 17 Nov 2011 at 11:20

GoogleCodeExporter commented 9 years ago
hi, yea its working.thanks

Original comment by welcome....@gmail.com on 19 Nov 2011 at 5:57