PE-sieve
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Loading...
Searching...
No Matches
patch_analyzer.h
Go to the documentation of this file.
1#pragma once
2
3#include "module_data.h"
4#include "patch_list.h"
5
6namespace pesieve {
7
55
56}; //namespace pesieve
57
Loads a module from the disk, corresponding to the module in the scanned process' memory.
Definition module_data.h:15
bool loadRelocatedFields(std::set< DWORD > &fields_rvas)
A postprocessor of the detected code patches. Detects if the patch is a hook, and if so,...
size_t _analyze(PatchList::Patch &patch, PBYTE patch_ptr, ULONGLONG patch_va)
size_t parseShortJmp(PatchList::Patch &patch, PBYTE patch_ptr, ULONGLONG patch_va)
size_t _analyzeRelocated(PatchList::Patch &patch, BYTE *patch_ptr)
PatchAnalyzer(ModuleData &_moduleData, DWORD _sectionRVA, PBYTE patched_code, size_t code_size)
std::set< DWORD > relocs
size_t parseJmpViaAddr(PatchList::Patch &patch, PBYTE patch_ptr, ULONGLONG patch_va)
size_t parseJmp(PatchList::Patch &patch, PBYTE patch_ptr, ULONGLONG patch_va)
ULONGLONG getJmpDestAddr(ULONGLONG currVA, int instrLen, DELTA_T lVal)
size_t parseMovJmp(PatchList::Patch &patch, PBYTE patch_ptr, bool is_long)
size_t parsePushRet(PatchList::Patch &patch, PBYTE patch_ptr)
size_t analyze(PatchList::Patch &patch)
size_t fill_iat(BYTE *vBuf, size_t vBufSize, IN const peconv::ExportsMapper *exportsMap, IN OUT IATBlock &iat, IN ThunkFoundCallback *callback)
Definition iat_finder.h:31