[panda-users] Find pid by name
Giuseppe Laurenza
laurenza at diag.uniroma1.it
Fri Mar 2 13:10:44 EST 2018
Perfect,
So it will not be a limit for now
Thanks for the answer
> On Mar 2, 2018, at 13:06, Brendan Dolan-Gavitt <brendandg at nyu.edu> wrote:
>
> Correct, but all the malware recordings except a handful are 32 bit (even though they run on the x86_64 version of QEMU).
>
> On Fri, Mar 2, 2018 at 1:04 PM Giuseppe Laurenza <laurenza at diag.uniroma1.it <mailto:laurenza at diag.uniroma1.it>> wrote:
> Thanks
> I see the osi plugin, but if I understood correctly it do es not work with 64bit architecture. Is it correct?
> Regards
>
> On Fri, Mar 2, 2018 at 1:03 PM Brendan Dolan-Gavitt <brendandg at nyu.edu <mailto:brendandg at nyu.edu>> wrote:
> Yes. You can use the osi plugin for this. Just get the list of processes and the loop over it looking for the name, then look at the pid member. Have a look at the asidstory plugin for some examples.
>
> On Fri, Mar 2, 2018 at 12:45 PM Giuseppe Laurenza <laurenza at diag.uniroma1.it <mailto:laurenza at diag.uniroma1.it>> wrote:
> Hello panda-user
> Is there any way already implemented in panda to find a process pid by its name in windows guest os?
> Thanks in advance
> Regards
> _______________________________________________
> panda-users mailing list
> panda-users at mit.edu <mailto:panda-users at mit.edu>
> http://mailman.mit.edu/mailman/listinfo/panda-users <http://mailman.mit.edu/mailman/listinfo/panda-users>
> --
> Brendan Dolan-Gavitt
> Assistant Professor, Department of Computer Science and Engineering
> NYU Tandon School of Engineering
> --
> Brendan Dolan-Gavitt
> Assistant Professor, Department of Computer Science and Engineering
> NYU Tandon School of Engineering
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/panda-users/attachments/20180302/e9f619a1/attachment-0001.html
More information about the panda-users
mailing list