|
lkd> u KeAttachProcess
nt!KeAttachProcess:
804f9b32 8bff mov edi,edi
804f9b34 55 push ebp
804f9b35 8bec mov ebp,esp
804f9b37 56 push esi
804f9b38 57 push edi
804f9b39 64a124010000 mov eax,dword ptr fs:[00000124h]
804f9b3f 8b7d08 mov edi,dword ptr [ebp+8]
804f9b42 8bf0 mov esi,eax
这是hook前的
lkd> u KeAttachProcess
nt!KeAttachProcess:
804f9b32 e939813005 jmp 85801c70
804f9b37 56 push esi
804f9b38 57 push edi
804f9b39 64a124010000 mov eax,dword ptr fs:[00000124h]
804f9b3f 8b7d08 mov edi,dword ptr [ebp+8]
804f9b42 8bf0 mov esi,eax
804f9b44 397e44 cmp dword ptr [esi+44h],edi
804f9b47 742f je nt!KeAttachProcess+0x46 (804f9b78)
这是运行某个游戏后的
很明显典型的jmp hook方式,,,我试过几种恢复,比方说
BYTE Top5Code[5] = {0x8b,0xff,0x55,0x8b,0xec};
........
RtlCopyMemory(KeAttachProcessAddress,Top5Code,5);
.........
这样过几秒后重启了,,,,很明显有检测,,,,求助:哪个哥哥给个好点的恢复方法 |
|