PE-sieve
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Loading...
Searching...
No Matches
Class Hierarchy

Go to the graphical class hierarchy

This inheritance list is sorted roughly, but not completely, alphabetically:
[detail level 123]
 Cpesieve::_ctx_detailsA custom structure keeping a fragment of a thread context
 Cpesieve::util::_mem_region_info
 C_PARAM_STRINGA wrapper for a dynamically allocated string
 Cpesieve::_process_details
 Cpesieve::_t_pattern
 C_t_stack_enum_params
 Cpesieve::util::_thread_info
 Cpesieve::util::_thread_info_ext
 Cpesieve::util::_THREAD_LAST_SYSCALL_INFORMATION
 Cpesieve::AreaInfo
 Cpesieve::AreaStatsBase class for the statistics from analyzed buffer
 Cpesieve::AreaStatsCalculatorA class responsible for filling in the statistics with the data from the particular buffer
 Cpesieve::ArtefactScanner::ArtefactsMapping
 Cpesieve::util::AutoBuffer
 Cpesieve::util::BasicBuffer
 Cctypes.c_int
 Cpesieve::CachedModule
 Cpesieve::ChunkStatsStatistics from a block of data
 Cpesieve::ErrorReport
 Cpesieve::HookTargetResolverProcesses the list of the collected patches (preprocessed by PatchAnalyzer), and for those of them that were detected as hooks, it resolves information about to which modules do they lead to
 Cpesieve::IATBlock
 Cpesieve::IATThunksSeries
 Cpesieve::IATThunksSeriesPtrCompare
 Cpesieve::ImportTableBuffer
 Cpesieve::ImpReconstructor
 Cpesieve::MemPageData
 Cpesieve::ModuleDataLoads a module from the disk, corresponding to the module in the scanned process' memory
 Cpesieve::ModuleDumpReport
 Cpesieve::ModulesCache
 Cpesieve::ModuleScanReportA base class of all the reports detailing on the output of the performed module's scan
 Cpesieve::ModulesInfoA container of all the process modules that were scanned
 Cpesieve::util::Mutex
 Cpesieve::util::MutexLocker
 CParams
 CparamsInput parameters for PE-sieve, defining the configuration
 Cpesieve::PatchList::Patch
 Cpesieve::PatchAnalyzerA postprocessor of the detected code patches. Detects if the patch is a hook, and if so, tries to indentify the address where it leads to
 Cpesieve::PatchList
 Cpesieve::PatternMatcher
 Cpesieve::PeArtefactsA report about the PE artefact detected in the workingset
 Cpesieve::PeBuffer
 Cpesieve::PeReconstructor
 Cpesieve::PeSectionBuffers the defined PE section belonging to the module loaded in the scanned process into the local memory
 Cpesieve::ProcessDumpReportThe report aggregating the results of the performed dumps
 Cpesieve::ProcessFeatureScannerA base class for all the scanners checking appropriate process' features
 Cpesieve::ProcessScannerThe root scanner, responsible for enumerating all the elements to be scanned within a given process, and performing apropriate scans on them
 Cpesieve::ProcessScanReportThe report aggregating the results of the performed scan
 CProcessSymbolsManager
 Cpesieve::util::PSS_VA_CLONE_INFORMATION
 Cpesieve::RemoteModuleDataBuffers the data from the module loaded in the scanned process into the local memory
 CreportFinal summary about the scanned process
 Cpesieve::ReportExThe final report about the actions performed on the process: scanning and dumping
 Cpesieve::ResultsDumper
 Cpesieve::RuleMatcher
 Cpesieve::RuleMatchersSet
 Cpesieve::ScannedModuleRepresents a basic info about the scanned module, such as its base offset, size, and the status
 Cpesieve::StatsSettingsBase class for settings defining what type of stats should be collected
 Cpesieve::stats::StdDeviationCalc
 Cctypes.Structure
 Cpesieve::SyscallTable
 Cpesieve::util::T_CLIENT_ID
 Cpesieve::util::t_refl_args
 Cpesieve::util::T_RTLP_PROCESS_REFLECTION_REFLECTION_INFORMATION
 Cpesieve::ThunkFoundCallbackA class containing callbacks for functions: find_iat, fill_iat