shoooo的anti很好玩,
第一个是heapmagic(我只知道一种方法过,强制跳转)
第三个是调用API,ZwQueryInformationProcess,两种方法过
1.强制跳,2.hook sdt
00401470 /. 55 push ebp
00401471 |. 8BEC mov ebp, esp
00401473 |. 83EC 10 sub esp, 10
00401476 |. 68 40304000 push 00403040 ; /ProcNameOrOrdinal = "ZwQueryInformationProcess"
0040147B |. 68 34304000 push 00403034 ; |/pModule = "ntdll.dll"
00401480 |. FF15 04204000 call dword ptr [<&KERNEL32.GetModu>; |\GetModuleHandleA
00401486 |. 50 push eax ; |hModule
00401487 |. FF15 00204000 call dword ptr [<&KERNEL32.GetProc>; \GetProcAddress
0040148D |. 8945 F4 mov dword ptr [ebp-C], eax
00401490 |. B8 01000000 mov eax, 1
00401495 |. 8945 FC mov dword ptr [ebp-4], eax
00401498 |. 8945 F8 mov dword ptr [ebp-8], eax
0040149B |. 8D85 F8FFFFFF lea eax, dword ptr [ebp-8]
004014A1 |. 50 push eax
004014A2 |. 6A 04 push 4
004014A4 |. 8D85 FCFFFFFF lea eax, dword ptr [ebp-4]
004014AA |. 50 push eax
004014AB |. 6A 07 push 7
004014AD |. 6A FF push -1
004014AF |. FF55 F4 call dword ptr [ebp-C]
004014B2 |. 8945 F0 mov dword ptr [ebp-10], eax
004014B5 |. 8B45 FC mov eax, dword ptr [ebp-4]
004014B8 |. 85C0 test eax, eax
004014BA |. 75 18 jnz short 004014D4
004014BC |. 837D F8 04 cmp dword ptr [ebp-8], 4
004014C0 |. 75 12 jnz short 004014D4
004014C2 |. 6A 00 push 0
004014C4 |. 6A 00 push 0
004014C6 |. 68 20304000 push 00403020 ; ASCII "ok"
004014CB |. E8 14020000 call <jmp.&MFC42.#1200>
004014D0 |. 8BE5 mov esp, ebp
004014D2 |. 5D pop ebp
004014D3 |. C3 retn
004014D4 |> 6A 00 push 0
004014D6 |. 6A 00 push 0
004014D8 |. 68 24304000 push 00403024 ; ASCII "Debugger Found"
004014DD |. E8 02020000 call <jmp.&MFC42.#1200>
004014E2 |. 8BE5 mov esp, ebp
004014E4 |. 5D pop ebp
004014E5 \. C3 retn
第二个看不懂,