|
|
|
获取了PEPROCESS,也获取了进程名在PEPROCESS中偏移。之后怎么DbgPrint出进程名字呢?(我不是来捣乱的。)
typedef struct _EPROCESS { KPROCESS Pcb; //+0x000 Pcb : _KPROCESS DWORD ProcessLock; //+0x06c ProcessLock : _EX_PUSH_LOCK LARGE_INTEGER CreateTime; //+0x070 CreateTime : _LARGE_INTEGER LARGE_INTEGER ExitTime; //+0x078 ExitTime : _LARGE_INTEGER DWORD RundownProtect; //+0x080 RundownProtect : _EX_RUNDOWN_REF DWORD UniqueProcessId; //+0x084 UniqueProcessId : Ptr32 Void LIST_ENTRY ActiveProcessLinks; //+0x088 ActiveProcessLinks : _LIST_ENTRY DWORD QuotaUsage[3]; //+0x090 QuotaUsage : [3] Uint4B DWORD QuotaPeak[3]; //+0x09c QuotaPeak : [3] Uint4B DWORD CommitCharge; //+0x0a8 CommitCharge : Uint4B DWORD PeakVirtualSize; //+0x0ac PeakVirtualSize : Uint4B DWORD VirtualSize; //+0x0b0 VirtualSize : Uint4B LIST_ENTRY SessionProcessLinks; //+0x0b4 SessionProcessLinks : _LIST_ENTRY PVOID DebugPort; //+0x0bc DebugPort : Ptr32 Void PVOID ExceptionPort; //+0x0c0 ExceptionPort : Ptr32 Void DWORD ObjectTable; //+0x0c4 ObjectTable : Ptr32 _HANDLE_TABLE DWORD Token; //+0x0c8 Token : _EX_FAST_REF DWORD WorkingSetLock[8];//+0x0cc WorkingSetLock : _FAST_MUTEX DWORD WorkingSetPage; //+0x0ec WorkingSetPage : Uint4B DWORD AddressCreationLock[8]; //+0x0f0 AddressCreationLock : _FAST_MUTEX DWORD HyperSpaceLock; //+0x110 HyperSpaceLock : Uint4B PVOID ForkInProgress; //+0x114 ForkInProgress : Ptr32 _ETHREAD DWORD HardwareTrigger; //+0x118 HardwareTrigger : Uint4B PVOID VadRoot; //+0x11c VadRoot : Ptr32 Void PVOID VadHint; //+0x120 VadHint : Ptr32 Void PVOID CloneRoot; //+0x124 CloneRoot : Ptr32 Void DWORD NumberOfPrivatePages; //+0x128 NumberOfPrivatePages : Uint4B DWORD NumberOfLockedPages; //+0x12c NumberOfLockedPages : Uint4B PVOID Win32Process; //+0x130 Win32Process : Ptr32 Void PVOID Job; //+0x134 Job : Ptr32 _EJOB PVOID SectionObject; //+0x138 SectionObject : Ptr32 Void PVOID SectionBaseAddress; //+0x13c SectionBaseAddress : Ptr32 Void PVOID QuotaBlock; //+0x140 QuotaBlock : Ptr32 _EPROCESS_QUOTA_BLOCK PVOID WorkingSetWatch; //+0x144 WorkingSetWatch : Ptr32 _PAGEFAULT_HISTORY PVOID Win32WindowStation; //+0x148 Win32WindowStation : Ptr32 Void PVOID InheritedFromUniqueProcessId; // +0x14c InheritedFromUniqueProcessId : Ptr32 Void PVOID LdtInformation; // +0x150 LdtInformation : Ptr32 Void PVOID VadFreeHint; // +0x154 VadFreeHint : Ptr32 Void PVOID VdmObjects; // +0x158 VdmObjects : Ptr32 Void PVOID DeviceMap; // +0x15c DeviceMap : Ptr32 Void LIST_ENTRY PhysicalVadList; // +0x160 PhysicalVadList : _LIST_ENTRY QWORD PageDirectoryPte; // +0x168 PageDirectoryPte : _HARDWARE_PTE PVOID Session; //+0x170 Session : Ptr32 Void char ImageFileName[16]; //+0x174 ImageFileName : [16] UChar LIST_ENTRY JobLinks; //+0x184 JobLinks : _LIST_ENTRY PVOID LockedPagesList; //+0x18c LockedPagesList : Ptr32 Void LIST_ENTRY ThreadListHead; //+0x190 ThreadListHead : _LIST_ENTRY PVOID SecurityPort; //+0x198 SecurityPort : Ptr32 Void PVOID PaeTop; //+0x19c PaeTop : Ptr32 Void DWORD ActiveThreads; //+0x1a0 ActiveThreads : Uint4B DWORD GrantedAccess; //+0x1a4 GrantedAccess : Uint4B DWORD DefaultHardErrorProcessing; //+0x1a8 DefaultHardErrorProcessing : Uint4B DWORD LastThreadExitStatus; //+0x1ac LastThreadExitStatus : Int4B PPEB Peb; //+0x1b0 Peb : Ptr32 _PEB PVOID PrefetchTrace; //+0x1b4 PrefetchTrace : _EX_FAST_REF LARGE_INTEGER ReadOperationCount; //+0x1b8 ReadOperationCount : _LARGE_INTEGER LARGE_INTEGER WriteOperationCount; //+0x1c0 WriteOperationCount : _LARGE_INTEGER LARGE_INTEGER OtherOperationCount; //+0x1c8 OtherOperationCount : _LARGE_INTEGER LARGE_INTEGER ReadTransferCount; //+0x1d0 ReadTransferCount : _LARGE_INTEGER LARGE_INTEGER WriteTransferCount; //+0x1d8 WriteTransferCount : _LARGE_INTEGER LARGE_INTEGER OtherTransferCount; //+0x1e0 OtherTransferCount : _LARGE_INTEGER DWORD CommitChargeLimit; //+0x1e8 CommitChargeLimit : Uint4B DWORD CommitChargePeak; //+0x1ec CommitChargePeak : Uint4B PVOID AweInfo; //+0x1f0 AweInfo : Ptr32 Void DWORD SeAuditProcessCreationInfo; //+0x1f4 SeAuditProcessCreationInfo : _SE_AUDIT_PROCESS_CREATION_INFO DWORD Vm[16]; //+0x1f8 Vm : _MMSUPPORT DWORD LastFaultCount; //+0x238 LastFaultCount : Uint4B DWORD ModifiedPageCount; //+0x23c ModifiedPageCount : Uint4B DWORD NumberOfVads; //+0x240 NumberOfVads : Uint4B DWORD JobStatus; //+0x244 JobStatus : Uint4B DWORD Flags; //+0x248 Flags : Uint4B DWORD ExitStatus; //+0x24c ExitStatus : Int4B WORD NextPageColor; //+0x250 NextPageColor : Uint2B //BYTE SubSystemMinorVersion; //+0x252 SubSystemMinorVersion : UChar //BYTE SubSystemMajorVersion; //+0x253 SubSystemMajorVersion : UChar WORD SubSystemVersion; //+0x252 SubSystemVersion : Uint2B BYTE PriorityClass; //+0x254 PriorityClass : UChar BYTE WorkingSetAcquiredUnsafe; //+0x255 WorkingSetAcquiredUnsafe : UChar DWORD Cookie; //+0x258 Cookie : Uint4B } EPROCESS,*PEPROCESS; 其中 char ImageFileName[16]; //+0x174 ImageFileName : [16] UChar 最好是Copy到单独的Buf中,Buf[16]=0再输出Buf,以免输出乱码。 |
|
[原创]关于滴水的VT调试器
不需要。 |
|
[原创]关于滴水的VT调试器
我替你说出下文:“你想知道 XXX吗?那就买一台我们的300万硬件调试器吧” |
|
|
|
D N F ---- VMware Workstation双开。主机蓝屏!
排除你主机自己崩溃的因素外,如果真是DNF从虚拟机中搞鬼导致主机崩溃的,我估计可能你有装VMWareTools,并且DNF在这个地方动了手脚。 不知道你的具体OS版本,硬件,VMware版本,所以以上只是猜想。 |
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值