We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fc7e13f commit 9ddf2d9Copy full SHA for 9ddf2d9
volatility3/framework/plugins/windows/etwpatch.py
@@ -12,6 +12,8 @@
12
vollog = logging.getLogger(__name__)
13
14
15
+# EtwpEventWriteFull -> https://github.com/SolitudePy/Stealthy-ETW-Patch
16
+# CAPA rule -> https://github.com/mandiant/capa-rules/blob/master/anti-analysis/anti-av/patch-event-tracing-for-windows-function.yml
17
class EtwPatch(interfaces.plugins.PluginInterface):
18
"""Identifies ETW (Event Tracing for Windows) patching techniques used by malware to evade detection.
19
@@ -80,7 +82,6 @@ def _generator(self):
80
82
kernel_module_name=self.config["kernel"],
81
83
filter_func=filter_func,
84
):
-
85
try:
86
proc_id = proc.UniqueProcessId
87
proc_name = utility.array_to_string(proc.ImageFileName)
0 commit comments