Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

some kernel exceptions detected as apihooks #20

Closed
GoogleCodeExporter opened this issue Aug 9, 2015 · 1 comment
Closed

some kernel exceptions detected as apihooks #20

GoogleCodeExporter opened this issue Aug 9, 2015 · 1 comment

Comments

@GoogleCodeExporter
Copy link

$ python vol.py -f ../VMwareShared/memory/rustock.vmem apihooks -K
Volatile Systems Volatility Framework 1.4_rc1
Name                             Type     Target                                
   Value
-                                inlinek  ntoskrnl.exe!ExRaiseAccessViolation   
   0x8060ab58 PUSH 0xc0000005; RET (UNKNOWN)
-                                inlinek  ntoskrnl.exe!IofCallDriver            
   0x804ee130 JMP [0x8054c280] =>> 0xb17a189d ('\\Driver\\pe386')
-                                inlinek  ntoskrnl.exe!_purecall                
   0x80534d1e PUSH 0xc0000002; RET (UNKNOWN)

Original issue reported on code.google.com by michael.hale@gmail.com on 1 Jun 2011 at 3:39

@GoogleCodeExporter
Copy link
Author

Fixed for upcoming 2.1 alpha release

Original comment by michael.hale@gmail.com on 18 Oct 2011 at 9:46

  • Changed state: Fixed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant