11 if (!currPatch)
return false;
15 if (!foundMod)
return false;
20 const std::string targetName = foundMod->
getModName() +
"." + expFunc->nameToString();
32 std::set<ModuleScanReport*>::iterator cItr;
33 for (cItr = code_reports.begin(); cItr != code_reports.end(); ++cItr) {
36 if (!coderep)
continue;
38 std::vector<PatchList::Patch*>::iterator patchItr;
44 if (resolveTarget(currPatch)) {
A report from the code scan, generated by CodeScanner.
ProcessScanReport & processReport
size_t resolveAllHooks(IN OUT std::set< ModuleScanReport * > &code_reports)
Resolves all the hooks collected within the given set of reports.
bool resolveTarget(IN OUT PatchList::Patch *currPatch)
Resolves the information about the target of the provided hook, and fills it back into the object.
A base class of all the reports detailing on the output of the performed module's scan.
bool setHookTargetInfo(ULONGLONG targetModuleBase, bool isSuspiocious, std::string targetModuleName)
ULONGLONG getHookTargetVA()
std::vector< Patch * > patches
peconv::ExportsMapper * exportsMap
ScannedModule * getModuleContaining(ULONGLONG field_addr, size_t field_size=0) const
Represents a basic info about the scanned module, such as its base offset, size, and the status.
std::string getModName() const
bool isSuspicious() const
ULONGLONG getStart() const