Windows Executable Objects Flashcards
_FILE_OBJECT
File - An instance of an open file that represents a process or kernel module’s access into a file, including the permissions, regions of memory that store portions of the file’s contents, and the file’s name.
_EPROCESS
A container that allows threads to execute within a private virtual address space and maintains open handles to resources such as files, registry keys, etc.
_OBJECT_SYMBOLIC_LINK
SymbolicLink - Created to support aliases that can help map network share paths and removable media devices to drive letters.
_TOKEN
Token - Stores security context information (such as security identifiers [SIDs] and privileges) for processes and threads.
_ETHREAD
Thread - An object that represents mutual exclusion and is typically used for synchronization purposes or to control access to particular resources.
_KMUTANT
Mutant - An object that represents mutual exclusion and is typically used for synchronization purposes or to control access to particular resources.
tagWINDOWSTATION
WindowStation - A security boundary for processes and desktops, which also contrains a clipboard and atom tables.
tagDESKTOP
Desktop - An object that represents the displayable screen surface and contains user objects such as windows, menus, and buttons.
_DRIVER_OBJECT
Driver - Represents the image of a loaded kernel-mode driver and contains addresses of the driver’s input/output control handler functions.
_CM_KEY_BODY
Key - An instance of an open registry key that contains information about the key’s values and data.
_OBJECT_TYPE
Type - An object with metadata that describes the common properties of all other objects.