We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 997f2a4 commit 97006bcCopy full SHA for 97006bc
volatility3/framework/plugins/windows/malware/malfind.py
@@ -173,7 +173,7 @@ def list_injection_sites(
173
174
if dirty_page is not None:
175
# Useful information to investigate the page content with volshell afterwards.
176
- vollog.warning(
+ vollog.debug(
177
f"[proc_id {proc_id}] Found suspicious DIRTY + {protection_string} page at {hex(dirty_page)}",
178
)
179
start = vad.get_start()
0 commit comments