PE-sieve
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Loading...
Searching...
No Matches
mempage_data.cpp
Go to the documentation of this file.
1#include "mempage_data.h"
2#include "module_data.h"
4
5using namespace pesieve;
6
8{
10 SIZE_T out = VirtualQueryEx(this->processHandle, (LPCVOID) start_va, &page_info, sizeof(page_info));
11 if (out != sizeof(page_info)) {
13 return false;
14 }
15#ifdef _DEBUG
16 std::cout << "Could not query page: " << std::hex << start_va << ". Error: " << GetLastError() << std::endl;
17#endif
18 return false;
19 }
20 initial_protect = page_info.AllocationProtect;
22 protection = page_info.Protect;
23 alloc_base = (ULONGLONG) page_info.AllocationBase;
24 region_start = (ULONGLONG) page_info.BaseAddress;
25 region_end = region_start + page_info.RegionSize;
26 is_info_filled = true;
27 return true;
28}
29
31{
32 const HMODULE mod_base = (HMODULE)this->alloc_base;
33 std::string module_name = RemoteModuleData::getModuleName(processHandle, mod_base);
34 if (module_name.length() == 0) {
35#ifdef _DEBUG
36 std::cerr << "Could not retrieve module name" << std::endl;
37#endif
38 return false;
39 }
40 this->module_name = module_name;
41 return true;
42}
43
45{
46 if (!isInfoFilled() && !fillInfo()) {
47 return false;
48 }
49 std::string mapped_filename = RemoteModuleData::getMappedName(this->processHandle, (HMODULE)this->alloc_base);
50 if (mapped_filename.length() == 0) {
51#ifdef _DEBUG
52 std::cerr << "Could not retrieve name" << std::endl;
53#endif
54 return false;
55 }
56 this->mapped_name = mapped_filename;
57 return true;
58}
59
61{
62 if (!loadMappedName()) {
63#ifdef _DEBUG
64 std::cerr << "Could not retrieve name" << std::endl;
65#endif
66 return false;
67 }
68 PVOID old_val = nullptr;
73#ifdef _DEBUG
74 std::cerr << "Could not open file!" << std::endl;
75#endif
76 return false;
77 }
79 if (!mapping) {
80#ifdef _DEBUG
81 std::cerr << "Could not create mapping!" << std::endl;
82#endif
84 return false;
85 }
87 if (rawData == nullptr) {
88#ifdef _DEBUG
89 std::cerr << "Could not map view of file: " << this->mapped_name << std::endl;
90#endif
93 return false;
94 }
95
96 bool is_same = false;
97 if (this->load()) {
98 size_t r_size = GetFileSize(file, 0);
99 is_same = this->loadedData.isDataContained(rawData, r_size);
100 }
101 else {
102#ifdef _DEBUG
103 std::cerr << "[" << std::hex << start_va << "] Page not loaded!" << std::endl;
104#endif
105 }
109 return is_same;
110}
111
113{
114 _freeRemote();
115 size_t region_size = size_t(this->region_end - this->start_va);
116 if (stop_va && ( stop_va >= start_va && stop_va < this->region_end)) {
117 region_size = size_t(this->stop_va - this->start_va);
118 }
119
120 if (region_size == 0) {
121 return false;
122 }
123 if (!loadedData.allocBuffer(region_size)) {
124 return false;
125 }
126 const bool can_force_access = is_process_refl ? true : false;
127 const size_t size_read = peconv::read_remote_region(this->processHandle, (BYTE*)this->start_va, loadedData.data, loadedData.getDataSize(), can_force_access);
128 if (size_read == 0) {
129 _freeRemote();
130#ifdef _DEBUG
131 std::cerr << "Cannot read remote memory!" << std::endl;
132#endif
133 return false;
134 }
135 loadedData.trim();
136 return true;
137}
138
DWORD protection
page protection
ULONGLONG start_va
VA that was requested. May not be beginning of the region.
static std::string getModuleName(HANDLE _processHandle, HMODULE _modBaseAddr)
static std::string getMappedName(HANDLE _processHandle, LPVOID _modBaseAddr)
BOOL wow64_disable_fs_redirection(OUT PVOID *OldValue)
BOOL wow64_revert_fs_redirection(IN PVOID OldValue)
size_t fill_iat(BYTE *vBuf, size_t vBufSize, IN const peconv::ExportsMapper *exportsMap, IN OUT IATBlock &iat, IN ThunkFoundCallback *callback)
Definition iat_finder.h:31