• XSS.stack #1 – первый литературный журнал от юзеров форума

Статья Обход проактивной защиты антивирусов

Хорошо, я подумаю над этим, у меня не густо аверов на виртуалках, чтобы хорошо потестить.
Если нужно проверить напиши тогда в личку, запущу на динчеке, там win 10 x64 если-что вроде.

Да я тоже начал делать, наверное тогда не буду, застрял как-раз на дизасемблере, так-то сами сисколы работают, если вручную ввести, но стремно так делать, там их много очень, для одной апи, там штук 15 для бесятки только насчитал, разных билдов.)
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Если нужно проверить напиши тогда в личку, запущу на динчеке, там win 10 x64 если-что вроде.
Слушай, а изнутри динчека можно как-то информацию вывести. Я хочу перечислить все функции из ключевых библиотек, которые похучены текущим авером на динчеке. Может в файл сдропнуть или запрос в сеть сделать. Динчек позволит эту инфу скачать потом? Как знаешь исследовали виртуалки вирустотала, типа брали там имя всю информацию и делали get запросы с данными в урлах. Потом с веб интерфейса забирали эти урлы и расшифровывали. На динчеке мы можем что-нить такое сделать.
 
Динчек позволит эту инфу скачать потом?
Это там в платном аке только, точно не помню, по моему 100 баксов чтоли стоит, но там можно включить сеть, вытянуть инфу оттуда, только если через сеть наверное можно.

Я могу только запуск без сети проверить если-что...
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Я могу только запуск без сети проверить если-что...
Ну ладно тогда, забей. Я просто хотел статистику собрать, какие аверы какие функции хучат в юзермоде.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Готов проспонсировать исследование, там да, есть какие-то платные тарифы с выводом дебаг инфы и фулл инетом.
 
На динчеке отправка может не хило сбоить из-за соединения через тор. Про виндбг или что там используется, говорить сложно, но вряд ли оно даст приемлемый результат для исследования.
 
Сейчас специально глянул, вроде можно работать с дебажной инфой, но в платном акке:

1602224557019.png


Если нужно давайте проверю, или даже так DildoFagins могу дать тебе временно акк., сам что нужно там сделаешь, на акке 70 баксов есть, давай купим "Daily 25" тариф.
Если нужно отпиши тогда...
 
Статья понравилось.Думаю многим будет интересно если напишите статью Как отключить антивирус при запуске rat-ника или стиллера? В интернете не нашел статью на эту тему.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Ну хорошо, я напишу, как допилю все до стабильного состояния. Я так понимаю, что там надо будет выводить в OutputDebugString и он должен это отловить.
 
Статья понравилось.Думаю многим будет интересно если напишите статью Как отключить антивирус при запуске rat-ника или стиллера? В интернете не нашел статью на эту тему.
А что в вашем понимании "Отключить антивирус", все сервисы защитных решений хорошо защищены, их никак не выгрузить, по крайне-мере из юзермода.

Да можно написать драйвер, который будет скрывать процессы и файлы ваших зверьков, путем удаления там из таблицы...

Но проблема загрузить этот драйвер, для этого нужна цифровая подпись, или искать уязвимости в драйверах жертвы, либо тащить за собой каждый раз уязвимый драйввер, его загружать и потом уже загружать свой руткит.)

Но палевно...

А так максимально что можно сделать, это делать свой системный вызов "низкоуровневых функций" юзермода, ну или инжекты, больше ничего тут пока незнаю...)
 
А что в вашем понимании "Отключить антивирус", все сервисы защитных решений хорошо защищены, их никак не выгрузить, по крайне-мере из юзермода.
У всех антивирусов есть функция удаления или временные отключение,можно ли его запустить скрытно?
 
У всех антивирусов есть функция удаления или временные отключение,можно ли его запустить скрытно?
Нет, даже сейчас в новой бесятке дефендер нельзя отключить.)
 
У всех антивирусов есть функция удаления или временные отключение,можно ли его запустить скрытно?
Наивно полагать, что у вас это получится. Антивирусы, наверное, специально для вас оставили эту возможность
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Если нужно отпиши тогда...
Ну в общем я погонял чуток на антивирусах тулзу, и как то я немного разочарован, я ожидал увидеть больше юзермодных хуков. Вот примеры вывода тулзы, попробуйте угадать, какой из них к какому антивирусу относится. Сами тулзы тоже прикрепил, если интересно будет, то погоняйте на своих антивирусах и закиньте результат сюда. Сейчас тулзы выводят информацию в stdout, я правильно понимаю, что чтобы протестить на динчеке надо в OutputDebugString писать?
Код:
Original NtAlpcCreatePort:
00000000`02339410 4c8bd1          mov     r10,rcx
00000000`02339413 b872000000      mov     eax,72h
00000000`02339418 0f05            syscall
 
Changed NtAlpcCreatePort:
00000000`772b9fd0 b870672300      mov     eax,236770h
00000000`772b9fd5 4863c0          movsxd  rax,eax
00000000`772b9fd8 ffe0            jmp     rax
 
 
Original NtCreatePort:
00000000`023396c0 4c8bd1          mov     r10,rcx
00000000`023396c3 b89d000000      mov     eax,9Dh
00000000`023396c8 0f05            syscall
 
Changed NtCreatePort:
00000000`772ba280 b820672300      mov     eax,236720h
00000000`772ba285 4863c0          movsxd  rax,eax
00000000`772ba288 ffe0            jmp     rax
 
 
Original NtCreateSection:
00000000`02339160 4c8bd1          mov     r10,rcx
00000000`02339163 b847000000      mov     eax,47h
00000000`02339168 0f05            syscall
 
Changed NtCreateSection:
00000000`772b9d20 b820782300      mov     eax,237820h
00000000`772b9d25 4863c0          movsxd  rax,eax
00000000`772b9d28 ffe0            jmp     rax
 
 
Original NtCreateThread:
00000000`023391a0 4c8bd1          mov     r10,rcx
00000000`023391a3 b84b000000      mov     eax,4Bh
00000000`023391a8 0f05            syscall
 
Changed NtCreateThread:
00000000`772b9d60 b8f06c2300      mov     eax,236CF0h
00000000`772b9d65 4863c0          movsxd  rax,eax
00000000`772b9d68 ffe0            jmp     rax
 
 
Original NtCreateThreadEx:
00000000`02339740 4c8bd1          mov     r10,rcx
00000000`02339743 b8a5000000      mov     eax,0A5h
00000000`02339748 0f05            syscall
 
Changed NtCreateThreadEx:
00000000`772ba300 b8506e2300      mov     eax,236E50h
00000000`772ba305 4863c0          movsxd  rax,eax
00000000`772ba308 ffe0            jmp     rax
 
 
Original NtLoadDriver:
00000000`02339ab0 4c8bd1          mov     r10,rcx
00000000`02339ab3 b8dc000000      mov     eax,0DCh
00000000`02339ab8 0f05            syscall
 
Changed NtLoadDriver:
00000000`772ba670 b8b0672300      mov     eax,2367B0h
00000000`772ba675 4863c0          movsxd  rax,eax
00000000`772ba678 ffe0            jmp     rax
 
 
Original NtMakeTemporaryObject:
00000000`02339b40 4c8bd1          mov     r10,rcx
00000000`02339b43 b8e5000000      mov     eax,0E5h
00000000`02339b48 0f05            syscall
 
Changed NtMakeTemporaryObject:
00000000`772ba700 b8e07b2300      mov     eax,237BE0h
00000000`772ba705 4863c0          movsxd  rax,eax
00000000`772ba708 ffe0            jmp     rax
 
 
Original NtMapViewOfSection:
00000000`02338f40 4c8bd1          mov     r10,rcx
00000000`02338f43 b825000000      mov     eax,25h
00000000`02338f48 0f05            syscall
 
Changed NtMapViewOfSection:
00000000`772b9b00 b870732300      mov     eax,237370h
00000000`772b9b05 4863c0          movsxd  rax,eax
00000000`772b9b08 ffe0            jmp     rax
 
 
Original NtQueueApcThread:
00000000`02339110 4c8bd1          mov     r10,rcx
00000000`02339113 b842000000      mov     eax,42h
00000000`02339118 0f05            syscall
 
Changed NtQueueApcThread:
00000000`772b9cd0 b800702300      mov     eax,237000h
00000000`772b9cd5 4863c0          movsxd  rax,eax
00000000`772b9cd8 ffe0            jmp     rax
 
 
Original NtQueueApcThreadEx:
00000000`02339fd0 4c8bd1          mov     r10,rcx
00000000`02339fd3 b82e010000      mov     eax,12Eh
00000000`02339fd8 0f05            syscall
 
Changed NtQueueApcThreadEx:
00000000`772bab90 b810712300      mov     eax,237110h
00000000`772bab95 4863c0          movsxd  rax,eax
00000000`772bab98 ffe0            jmp     rax
 
 
Original NtSetContextThread:
00000000`0233a1f0 4c8bd1          mov     r10,rcx
00000000`0233a1f3 b850010000      mov     eax,150h
00000000`0233a1f8 0f05            syscall
 
Changed NtSetContextThread:
00000000`772badb0 b840762300      mov     eax,237640h
00000000`772badb5 4863c0          movsxd  rax,eax
00000000`772badb8 ffe0            jmp     rax
 
 
Original NtSetInformationThread:
00000000`02338d90 4c8bd1          mov     r10,rcx
00000000`02338d93 b80a000000      mov     eax,0Ah
00000000`02338d98 0f05            syscall
 
Changed NtSetInformationThread:
00000000`772b9950 b820772300      mov     eax,237720h
00000000`772b9955 4863c0          movsxd  rax,eax
00000000`772b9958 ffe0            jmp     rax
 
 
Original NtSetSystemInformation:
00000000`0233a3b0 4c8bd1          mov     r10,rcx
00000000`0233a3b3 b86c010000      mov     eax,16Ch
00000000`0233a3b8 0f05            syscall
 
Changed NtSetSystemInformation:
00000000`772baf70 b8307a2300      mov     eax,237A30h
00000000`772baf75 4863c0          movsxd  rax,eax
00000000`772baf78 ffe0            jmp     rax
 
 
Original NtSetSystemTime:
00000000`0233a3d0 4c8bd1          mov     r10,rcx
00000000`0233a3d3 b86e010000      mov     eax,16Eh
00000000`0233a3d8 0f05            syscall
 
Changed NtSetSystemTime:
00000000`772baf90 b8107b2300      mov     eax,237B10h
00000000`772baf95 4863c0          movsxd  rax,eax
00000000`772baf98 ffe0            jmp     rax
 
 
Original NtUnmapViewOfSection:
00000000`02338f60 4c8bd1          mov     r10,rcx
00000000`02338f63 b827000000      mov     eax,27h
00000000`02338f68 0f05            syscall
 
Changed NtUnmapViewOfSection:
00000000`772b9b20 b8b0752300      mov     eax,2375B0h
00000000`772b9b25 4863c0          movsxd  rax,eax
00000000`772b9b28 ffe0            jmp     rax
 
 
Original NtWriteVirtualMemory:
00000000`02339060 4c8bd1          mov     r10,rcx
00000000`02339063 b837000000      mov     eax,37h
00000000`02339068 0f05            syscall
 
Changed NtWriteVirtualMemory:
00000000`772b9c20 b8e06b2300      mov     eax,236BE0h
00000000`772b9c25 4863c0          movsxd  rax,eax
00000000`772b9c28 ffe0            jmp     rax
 
 
Original ZwAlpcCreatePort:
00000000`02339410 4c8bd1          mov     r10,rcx
00000000`02339413 b872000000      mov     eax,72h
00000000`02339418 0f05            syscall
 
Changed ZwAlpcCreatePort:
00000000`772b9fd0 b870672300      mov     eax,236770h
00000000`772b9fd5 4863c0          movsxd  rax,eax
00000000`772b9fd8 ffe0            jmp     rax
 
 
Original ZwCreatePort:
00000000`023396c0 4c8bd1          mov     r10,rcx
00000000`023396c3 b89d000000      mov     eax,9Dh
00000000`023396c8 0f05            syscall
 
Changed ZwCreatePort:
00000000`772ba280 b820672300      mov     eax,236720h
00000000`772ba285 4863c0          movsxd  rax,eax
00000000`772ba288 ffe0            jmp     rax
 
 
Original ZwCreateSection:
00000000`02339160 4c8bd1          mov     r10,rcx
00000000`02339163 b847000000      mov     eax,47h
00000000`02339168 0f05            syscall
 
Changed ZwCreateSection:
00000000`772b9d20 b820782300      mov     eax,237820h
00000000`772b9d25 4863c0          movsxd  rax,eax
00000000`772b9d28 ffe0            jmp     rax
 
 
Original ZwCreateThread:
00000000`023391a0 4c8bd1          mov     r10,rcx
00000000`023391a3 b84b000000      mov     eax,4Bh
00000000`023391a8 0f05            syscall
 
Changed ZwCreateThread:
00000000`772b9d60 b8f06c2300      mov     eax,236CF0h
00000000`772b9d65 4863c0          movsxd  rax,eax
00000000`772b9d68 ffe0            jmp     rax
 
 
Original ZwCreateThreadEx:
00000000`02339740 4c8bd1          mov     r10,rcx
00000000`02339743 b8a5000000      mov     eax,0A5h
00000000`02339748 0f05            syscall
 
Changed ZwCreateThreadEx:
00000000`772ba300 b8506e2300      mov     eax,236E50h
00000000`772ba305 4863c0          movsxd  rax,eax
00000000`772ba308 ffe0            jmp     rax
 
 
Original ZwLoadDriver:
00000000`02339ab0 4c8bd1          mov     r10,rcx
00000000`02339ab3 b8dc000000      mov     eax,0DCh
00000000`02339ab8 0f05            syscall
 
Changed ZwLoadDriver:
00000000`772ba670 b8b0672300      mov     eax,2367B0h
00000000`772ba675 4863c0          movsxd  rax,eax
00000000`772ba678 ffe0            jmp     rax
 
 
Original ZwMakeTemporaryObject:
00000000`02339b40 4c8bd1          mov     r10,rcx
00000000`02339b43 b8e5000000      mov     eax,0E5h
00000000`02339b48 0f05            syscall
 
Changed ZwMakeTemporaryObject:
00000000`772ba700 b8e07b2300      mov     eax,237BE0h
00000000`772ba705 4863c0          movsxd  rax,eax
00000000`772ba708 ffe0            jmp     rax
 
 
Original ZwMapViewOfSection:
00000000`02338f40 4c8bd1          mov     r10,rcx
00000000`02338f43 b825000000      mov     eax,25h
00000000`02338f48 0f05            syscall
 
Changed ZwMapViewOfSection:
00000000`772b9b00 b870732300      mov     eax,237370h
00000000`772b9b05 4863c0          movsxd  rax,eax
00000000`772b9b08 ffe0            jmp     rax
 
 
Original ZwQueueApcThread:
00000000`02339110 4c8bd1          mov     r10,rcx
00000000`02339113 b842000000      mov     eax,42h
00000000`02339118 0f05            syscall
 
Changed ZwQueueApcThread:
00000000`772b9cd0 b800702300      mov     eax,237000h
00000000`772b9cd5 4863c0          movsxd  rax,eax
00000000`772b9cd8 ffe0            jmp     rax
 
 
Original ZwQueueApcThreadEx:
00000000`02339fd0 4c8bd1          mov     r10,rcx
00000000`02339fd3 b82e010000      mov     eax,12Eh
00000000`02339fd8 0f05            syscall
 
Changed ZwQueueApcThreadEx:
00000000`772bab90 b810712300      mov     eax,237110h
00000000`772bab95 4863c0          movsxd  rax,eax
00000000`772bab98 ffe0            jmp     rax
 
 
Original ZwSetContextThread:
00000000`0233a1f0 4c8bd1          mov     r10,rcx
00000000`0233a1f3 b850010000      mov     eax,150h
00000000`0233a1f8 0f05            syscall
 
Changed ZwSetContextThread:
00000000`772badb0 b840762300      mov     eax,237640h
00000000`772badb5 4863c0          movsxd  rax,eax
00000000`772badb8 ffe0            jmp     rax
 
 
Original ZwSetInformationThread:
00000000`02338d90 4c8bd1          mov     r10,rcx
00000000`02338d93 b80a000000      mov     eax,0Ah
00000000`02338d98 0f05            syscall
 
Changed ZwSetInformationThread:
00000000`772b9950 b820772300      mov     eax,237720h
00000000`772b9955 4863c0          movsxd  rax,eax
00000000`772b9958 ffe0            jmp     rax
 
 
Original ZwSetSystemInformation:
00000000`0233a3b0 4c8bd1          mov     r10,rcx
00000000`0233a3b3 b86c010000      mov     eax,16Ch
00000000`0233a3b8 0f05            syscall
 
Changed ZwSetSystemInformation:
00000000`772baf70 b8307a2300      mov     eax,237A30h
00000000`772baf75 4863c0          movsxd  rax,eax
00000000`772baf78 ffe0            jmp     rax
 
 
Original ZwSetSystemTime:
00000000`0233a3d0 4c8bd1          mov     r10,rcx
00000000`0233a3d3 b86e010000      mov     eax,16Eh
00000000`0233a3d8 0f05            syscall
 
Changed ZwSetSystemTime:
00000000`772baf90 b8107b2300      mov     eax,237B10h
00000000`772baf95 4863c0          movsxd  rax,eax
00000000`772baf98 ffe0            jmp     rax
 
 
Original ZwUnmapViewOfSection:
00000000`02338f60 4c8bd1          mov     r10,rcx
00000000`02338f63 b827000000      mov     eax,27h
00000000`02338f68 0f05            syscall
 
Changed ZwUnmapViewOfSection:
00000000`772b9b20 b8b0752300      mov     eax,2375B0h
00000000`772b9b25 4863c0          movsxd  rax,eax
00000000`772b9b28 ffe0            jmp     rax
 
 
Original ZwWriteVirtualMemory:
00000000`02339060 4c8bd1          mov     r10,rcx
00000000`02339063 b837000000      mov     eax,37h
00000000`02339068 0f05            syscall
 
Changed ZwWriteVirtualMemory:
00000000`772b9c20 b8e06b2300      mov     eax,236BE0h
00000000`772b9c25 4863c0          movsxd  rax,eax
00000000`772b9c28 ffe0            jmp     rax
Код:
Original NlsAnsiCodePage:
01a25d70 0000            add     byte ptr [eax],al
 
Changed NlsAnsiCodePage:
77dc8150 e404            in      al,4
 
 
Original NtCreateProcess:
01994640 b84f000000      mov     eax,4Fh
 
Changed NtCreateProcess:
77d35220 e9dbad5388      jmp     00270000
 
 
Original NtCreateProcessEx:
01994650 b850000000      mov     eax,50h
 
Changed NtCreateProcessEx:
77d35230 e9cbbd5388      jmp     00271000
 
 
Original NtCreateUserProcess:
01994720 b85d000000      mov     eax,5Dh
 
Changed NtCreateUserProcess:
77d35300 e9fbcc5388      jmp     00272000
 
 
Original ZwCreateProcess:
01994640 b84f000000      mov     eax,4Fh
 
Changed ZwCreateProcess:
77d35220 e9dbad5388      jmp     00270000
 
 
Original ZwCreateProcessEx:
01994650 b850000000      mov     eax,50h
 
Changed ZwCreateProcessEx:
77d35230 e9cbbd5388      jmp     00271000
 
 
Original ZwCreateUserProcess:
01994720 b85d000000      mov     eax,5Dh
 
Changed ZwCreateUserProcess:
77d35300 e9fbcc5388      jmp     00272000
 
 
Original CopyFileExW:
0198b4a8 6a18            push    18h
0198b4aa 68f0b4e177      push    offset ntdll!LdrSystemDllInitBlock+0x4bc28 (77e1b4f0)
 
Changed CopyFileExW:
76e8b488 e9731b3f89      jmp     0027d000
76e8b48d e876e8bc19      call    90a59d08
 
 
Original CreateDirectoryExW:
019d7fe1 8bff            mov     edi,edi
019d7fe3 55              push    ebp
019d7fe4 8bec            mov     ebp,esp
 
Changed CreateDirectoryExW:
76ed7fc1 e93a603a89      jmp     0027e000
 
 
Original OpenMutexA:
01990632 8bff            mov     edi,edi
01990634 55              push    ebp
01990635 8bec            mov     ebp,esp
 
Changed OpenMutexA:
76e90612 e9e9a93e89      jmp     0027b000
Код:
Original NtCreateFile:
00000000`02539210 4c8bd1          mov     r10,rcx
00000000`02539213 b852000000      mov     eax,52h
 
Changed NtCreateFile:
00000000`77029dd0 e938fd76fd      jmp     SYSFER+0x19b0d (00000000`74799b0d)
 
 
Original NtCreateKey:
00000000`02538e90 4c8bd1          mov     r10,rcx
00000000`02538e93 b81a000000      mov     eax,1Ah
 
Changed NtCreateKey:
00000000`77029a50 e9f40077fd      jmp     SYSFER+0x19b49 (00000000`74799b49)
 
 
Original NtCreateUserProcess:
00000000`02539790 4c8bd1          mov     r10,rcx
00000000`02539793 b8aa000000      mov     eax,0AAh
 
Changed NtCreateUserProcess:
00000000`7702a350 e930f876fd      jmp     SYSFER+0x19b85 (00000000`74799b85)
 
 
Original NtDeleteFile:
00000000`02539810 4c8bd1          mov     r10,rcx
00000000`02539813 b8b2000000      mov     eax,0B2h
 
Changed NtDeleteFile:
00000000`7702a3d0 e9ecf776fd      jmp     SYSFER+0x19bc1 (00000000`74799bc1)
 
 
Original NtDeleteKey:
00000000`02539820 4c8bd1          mov     r10,rcx
00000000`02539823 b8b3000000      mov     eax,0B3h
 
Changed NtDeleteKey:
00000000`7702a3e0 e944f976fd      jmp     SYSFER+0x19d29 (00000000`74799d29)
 
 
Original NtDeleteValueKey:
00000000`02539850 4c8bd1          mov     r10,rcx
00000000`02539853 b8b6000000      mov     eax,0B6h
 
Changed NtDeleteValueKey:
00000000`7702a410 e9e8f776fd      jmp     SYSFER+0x19bfd (00000000`74799bfd)
 
 
Original NtMapViewOfSection:
00000000`02538f40 4c8bd1          mov     r10,rcx
00000000`02538f43 b825000000      mov     eax,25h
 
Changed NtMapViewOfSection:
00000000`77029b00 e9340177fd      jmp     SYSFER+0x19c39 (00000000`74799c39)
 
 
Original NtOpenFile:
00000000`02538ff0 4c8bd1          mov     r10,rcx
00000000`02538ff3 b830000000      mov     eax,30h
 
Changed NtOpenFile:
00000000`77029bb0 e9c00077fd      jmp     SYSFER+0x19c75 (00000000`74799c75)
 
 
Original NtOpenKey:
00000000`02538de0 4c8bd1          mov     r10,rcx
00000000`02538de3 b80f000000      mov     eax,0Fh
 
Changed NtOpenKey:
00000000`770299a0 e90c0377fd      jmp     SYSFER+0x19cb1 (00000000`74799cb1)
 
 
Original NtOpenKeyEx:
00000000`02539c10 4c8bd1          mov     r10,rcx
00000000`02539c13 b8f2000000      mov     eax,0F2h
 
Changed NtOpenKeyEx:
00000000`7702a7d0 e918f576fd      jmp     SYSFER+0x19ced (00000000`74799ced)
 
 
Original NtRenameKey:
00000000`0253a0a0 4c8bd1          mov     r10,rcx
00000000`0253a0a3 b83b010000      mov     eax,13Bh
 
Changed NtRenameKey:
00000000`7702ac60 e900f176fd      jmp     SYSFER+0x19d65 (00000000`74799d65)
 
 
Original NtSetInformationFile:
00000000`02538f30 4c8bd1          mov     r10,rcx
00000000`02538f33 b824000000      mov     eax,24h
 
Changed NtSetInformationFile:
00000000`77029af0 e9ac0277fd      jmp     SYSFER+0x19da1 (00000000`74799da1)
 
 
Original NtSetValueKey:
00000000`025392c0 4c8bd1          mov     r10,rcx
00000000`025392c3 b85d000000      mov     eax,5Dh
 
Changed NtSetValueKey:
00000000`77029e80 e958ff76fd      jmp     SYSFER+0x19ddd (00000000`74799ddd)
 
 
Original NtTerminateProcess:
00000000`02538f80 4c8bd1          mov     r10,rcx
00000000`02538f83 b829000000      mov     eax,29h
 
Changed NtTerminateProcess:
00000000`77029b40 e9d40277fd      jmp     SYSFER+0x19e19 (00000000`74799e19)
 
 
Original NtTerminateThread:
00000000`025391f0 4c8bd1          mov     r10,rcx
00000000`025391f3 b850000000      mov     eax,50h
 
Changed NtTerminateThread:
00000000`77029db0 e9a00077fd      jmp     SYSFER+0x19e55 (00000000`74799e55)
 
 
Original ZwCreateFile:
00000000`02539210 4c8bd1          mov     r10,rcx
00000000`02539213 b852000000      mov     eax,52h
 
Changed ZwCreateFile:
00000000`77029dd0 e938fd76fd      jmp     SYSFER+0x19b0d (00000000`74799b0d)
 
 
Original ZwCreateKey:
00000000`02538e90 4c8bd1          mov     r10,rcx
00000000`02538e93 b81a000000      mov     eax,1Ah
 
Changed ZwCreateKey:
00000000`77029a50 e9f40077fd      jmp     SYSFER+0x19b49 (00000000`74799b49)
 
 
Original ZwCreateUserProcess:
00000000`02539790 4c8bd1          mov     r10,rcx
00000000`02539793 b8aa000000      mov     eax,0AAh
 
Changed ZwCreateUserProcess:
00000000`7702a350 e930f876fd      jmp     SYSFER+0x19b85 (00000000`74799b85)
 
 
Original ZwDeleteFile:
00000000`02539810 4c8bd1          mov     r10,rcx
00000000`02539813 b8b2000000      mov     eax,0B2h
 
Changed ZwDeleteFile:
00000000`7702a3d0 e9ecf776fd      jmp     SYSFER+0x19bc1 (00000000`74799bc1)
 
 
Original ZwDeleteKey:
00000000`02539820 4c8bd1          mov     r10,rcx
00000000`02539823 b8b3000000      mov     eax,0B3h
 
Changed ZwDeleteKey:
00000000`7702a3e0 e944f976fd      jmp     SYSFER+0x19d29 (00000000`74799d29)
 
 
Original ZwDeleteValueKey:
00000000`02539850 4c8bd1          mov     r10,rcx
00000000`02539853 b8b6000000      mov     eax,0B6h
 
Changed ZwDeleteValueKey:
00000000`7702a410 e9e8f776fd      jmp     SYSFER+0x19bfd (00000000`74799bfd)
 
 
Original ZwMapViewOfSection:
00000000`02538f40 4c8bd1          mov     r10,rcx
00000000`02538f43 b825000000      mov     eax,25h
 
Changed ZwMapViewOfSection:
00000000`77029b00 e9340177fd      jmp     SYSFER+0x19c39 (00000000`74799c39)
 
 
Original ZwOpenFile:
00000000`02538ff0 4c8bd1          mov     r10,rcx
00000000`02538ff3 b830000000      mov     eax,30h
 
Changed ZwOpenFile:
00000000`77029bb0 e9c00077fd      jmp     SYSFER+0x19c75 (00000000`74799c75)
 
 
Original ZwOpenKey:
00000000`02538de0 4c8bd1          mov     r10,rcx
00000000`02538de3 b80f000000      mov     eax,0Fh
 
Changed ZwOpenKey:
00000000`770299a0 e90c0377fd      jmp     SYSFER+0x19cb1 (00000000`74799cb1)
 
 
Original ZwOpenKeyEx:
00000000`02539c10 4c8bd1          mov     r10,rcx
00000000`02539c13 b8f2000000      mov     eax,0F2h
 
Changed ZwOpenKeyEx:
00000000`7702a7d0 e918f576fd      jmp     SYSFER+0x19ced (00000000`74799ced)
 
 
Original ZwRenameKey:
00000000`0253a0a0 4c8bd1          mov     r10,rcx
00000000`0253a0a3 b83b010000      mov     eax,13Bh
 
Changed ZwRenameKey:
00000000`7702ac60 e900f176fd      jmp     SYSFER+0x19d65 (00000000`74799d65)
 
 
Original ZwSetInformationFile:
00000000`02538f30 4c8bd1          mov     r10,rcx
00000000`02538f33 b824000000      mov     eax,24h
 
Changed ZwSetInformationFile:
00000000`77029af0 e9ac0277fd      jmp     SYSFER+0x19da1 (00000000`74799da1)
 
 
Original ZwSetValueKey:
00000000`025392c0 4c8bd1          mov     r10,rcx
00000000`025392c3 b85d000000      mov     eax,5Dh
 
Changed ZwSetValueKey:
00000000`77029e80 e958ff76fd      jmp     SYSFER+0x19ddd (00000000`74799ddd)
 
 
Original ZwTerminateProcess:
00000000`02538f80 4c8bd1          mov     r10,rcx
00000000`02538f83 b829000000      mov     eax,29h
 
Changed ZwTerminateProcess:
00000000`77029b40 e9d40277fd      jmp     SYSFER+0x19e19 (00000000`74799e19)
 
 
Original ZwTerminateThread:
00000000`025391f0 4c8bd1          mov     r10,rcx
00000000`025391f3 b850000000      mov     eax,50h
 
Changed ZwTerminateThread:
00000000`77029db0 e9a00077fd      jmp     SYSFER+0x19e55 (00000000`74799e55)
 

Вложения

  • analyze.zip
    13.4 КБ · Просмотры: 12
Сейчас тулзы выводят информацию в stdout, я правильно понимаю, что чтобы протестить на динчеке надо в OutputDebugString писать?
Думаю-да, честно неразу не использовал дичек для этой цели.

Кстати тоже написал тулзу, которая делает дамп номеров сисколов, это потом можно использовать для получения номера сискола в ntdll, вот-что на моей системе получилось:

SYSCALL ADDRESS FUNCTION
-----------------------------------------
0x02 00007FF9B9CEF790 NtAcceptConnectPort
0x00 00007FF9B9CEF750 NtAccessCheck
0x29 00007FF9B9CEFC70 NtAccessCheckAndAuditAlarm
0x63 00007FF9B9CF03A0 NtAccessCheckByType
0x59 00007FF9B9CF0270 NtAccessCheckByTypeAndAuditAlarm
0x64 00007FF9B9CF03C0 NtAccessCheckByTypeResultList
0x65 00007FF9B9CF03E0 NtAccessCheckByTypeResultListAndAuditAlarm
0x66 00007FF9B9CF0400 NtAccessCheckByTypeResultListAndAuditAlarmByHandle
0x67 00007FF9B9CF0420 NtAcquireProcessActivityReference
0x47 00007FF9B9CF0030 NtAddAtom
0x68 00007FF9B9CF0440 NtAddAtomEx
0x69 00007FF9B9CF0460 NtAddBootEntry
0x6A 00007FF9B9CF0480 NtAddDriverEntry
0x6B 00007FF9B9CF04A0 NtAdjustGroupsToken
0x41 00007FF9B9CEFF70 NtAdjustPrivilegesToken
0x6C 00007FF9B9CF04C0 NtAdjustTokenClaimsAndDeviceGroups
0x6D 00007FF9B9CF04E0 NtAlertResumeThread
0x6E 00007FF9B9CF0500 NtAlertThread
0x6F 00007FF9B9CF0520 NtAlertThreadByThreadId
0x70 00007FF9B9CF0540 NtAllocateLocallyUniqueId
0x71 00007FF9B9CF0560 NtAllocateReserveObject
0x72 00007FF9B9CF0580 NtAllocateUserPhysicalPages
0x73 00007FF9B9CF05A0 NtAllocateUuids
0x18 00007FF9B9CEFA50 NtAllocateVirtualMemory
0x74 00007FF9B9CF05C0 NtAllocateVirtualMemoryEx
0x75 00007FF9B9CF05E0 NtAlpcAcceptConnectPort
0x76 00007FF9B9CF0600 NtAlpcCancelMessage
0x77 00007FF9B9CF0620 NtAlpcConnectPort
0x78 00007FF9B9CF0640 NtAlpcConnectPortEx
0x79 00007FF9B9CF0660 NtAlpcCreatePort
0x7A 00007FF9B9CF0680 NtAlpcCreatePortSection
0x7B 00007FF9B9CF06A0 NtAlpcCreateResourceReserve
0x7C 00007FF9B9CF06C0 NtAlpcCreateSectionView
0x7D 00007FF9B9CF06E0 NtAlpcCreateSecurityContext
0x7E 00007FF9B9CF0700 NtAlpcDeletePortSection
0x7F 00007FF9B9CF0720 NtAlpcDeleteResourceReserve
0x80 00007FF9B9CF0740 NtAlpcDeleteSectionView
0x81 00007FF9B9CF0760 NtAlpcDeleteSecurityContext
0x82 00007FF9B9CF0780 NtAlpcDisconnectPort
0x83 00007FF9B9CF07A0 NtAlpcImpersonateClientContainerOfPort
0x84 00007FF9B9CF07C0 NtAlpcImpersonateClientOfPort
0x85 00007FF9B9CF07E0 NtAlpcOpenSenderProcess
0x86 00007FF9B9CF0800 NtAlpcOpenSenderThread
0x87 00007FF9B9CF0820 NtAlpcQueryInformation
0x88 00007FF9B9CF0840 NtAlpcQueryInformationMessage
0x89 00007FF9B9CF0860 NtAlpcRevokeSecurityContext
0x8A 00007FF9B9CF0880 NtAlpcSendWaitReceivePort
0x8B 00007FF9B9CF08A0 NtAlpcSetInformation
0x4C 00007FF9B9CF00D0 NtApphelpCacheControl
0x8C 00007FF9B9CF08C0 NtAreMappedFilesTheSame
0x8D 00007FF9B9CF08E0 NtAssignProcessToJobObject
0x8E 00007FF9B9CF0900 NtAssociateWaitCompletionPacket
0x8F 00007FF9B9CF0920 NtCallEnclave
0x05 00007FF9B9CEF7F0 NtCallbackReturn
0x5D 00007FF9B9CF02E0 NtCancelIoFile
0x90 00007FF9B9CF0940 NtCancelIoFileEx
0x91 00007FF9B9CF0960 NtCancelSynchronousIoFile
0x61 00007FF9B9CF0360 NtCancelTimer
0x92 00007FF9B9CF0980 NtCancelTimer2
0x93 00007FF9B9CF09A0 NtCancelWaitCompletionPacket
0x3E 00007FF9B9CEFF10 NtClearEvent
0x0F 00007FF9B9CEF930 NtClose
0x3B 00007FF9B9CEFEB0 NtCloseObjectAuditAlarm
0x94 00007FF9B9CF09C0 NtCommitComplete
0x95 00007FF9B9CF09E0 NtCommitEnlistment
0x96 00007FF9B9CF0A00 NtCommitRegistryTransaction
0x97 00007FF9B9CF0A20 NtCommitTransaction
0x98 00007FF9B9CF0A40 NtCompactKeys
0x99 00007FF9B9CF0A60 NtCompareObjects
0x9A 00007FF9B9CF0A80 NtCompareSigningLevels
0x9B 00007FF9B9CF0AA0 NtCompareTokens
0x9C 00007FF9B9CF0AC0 NtCompleteConnectPort
0x9D 00007FF9B9CF0AE0 NtCompressKey
0x9E 00007FF9B9CF0B00 NtConnectPort
0x43 00007FF9B9CEFFB0 NtContinue
0x9F 00007FF9B9CF0B20 NtConvertBetweenAuxiliaryCounterAndPerformanceCounter
0xA0 00007FF9B9CF0B40 NtCreateDebugObject
0xA1 00007FF9B9CF0B60 NtCreateDirectoryObject
0xA2 00007FF9B9CF0B80 NtCreateDirectoryObjectEx
0xA3 00007FF9B9CF0BA0 NtCreateEnclave
0xA4 00007FF9B9CF0BC0 NtCreateEnlistment
0x48 00007FF9B9CF0050 NtCreateEvent
0xA5 00007FF9B9CF0BE0 NtCreateEventPair
0x55 00007FF9B9CF01F0 NtCreateFile
0xA6 00007FF9B9CF0C00 NtCreateIRTimer
0xA7 00007FF9B9CF0C20 NtCreateIoCompletion
0xA8 00007FF9B9CF0C40 NtCreateJobObject
0xA9 00007FF9B9CF0C60 NtCreateJobSet
0x1D 00007FF9B9CEFAF0 NtCreateKey
0xAA 00007FF9B9CF0C80 NtCreateKeyTransacted
0xAB 00007FF9B9CF0CA0 NtCreateKeyedEvent
0xAC 00007FF9B9CF0CC0 NtCreateLowBoxToken
0xAD 00007FF9B9CF0CE0 NtCreateMailslotFile
0xAE 00007FF9B9CF0D00 NtCreateMutant
0xAF 00007FF9B9CF0D20 NtCreateNamedPipeFile
0xB0 00007FF9B9CF0D40 NtCreatePagingFile
0xB1 00007FF9B9CF0D60 NtCreatePartition
0xB2 00007FF9B9CF0D80 NtCreatePort
0xB3 00007FF9B9CF0DA0 NtCreatePrivateNamespace
0xB4 00007FF9B9CF0DC0 NtCreateProcess
0x4D 00007FF9B9CF00F0 NtCreateProcessEx
0xB5 00007FF9B9CF0DE0 NtCreateProfile
0xB6 00007FF9B9CF0E00 NtCreateProfileEx
0xB7 00007FF9B9CF0E20 NtCreateRegistryTransaction
0xB8 00007FF9B9CF0E40 NtCreateResourceManager
0x4A 00007FF9B9CF0090 NtCreateSection
0xB9 00007FF9B9CF0E60 NtCreateSectionEx
0xBA 00007FF9B9CF0E80 NtCreateSemaphore
0xBB 00007FF9B9CF0EA0 NtCreateSymbolicLinkObject
0x4E 00007FF9B9CF0110 NtCreateThread
0xBC 00007FF9B9CF0EC0 NtCreateThreadEx
0xBD 00007FF9B9CF0EE0 NtCreateTimer
0xBE 00007FF9B9CF0F00 NtCreateTimer2
0xBF 00007FF9B9CF0F20 NtCreateToken
0xC0 00007FF9B9CF0F40 NtCreateTokenEx
0xC1 00007FF9B9CF0F60 NtCreateTransaction
0xC2 00007FF9B9CF0F80 NtCreateTransactionManager
0xC3 00007FF9B9CF0FA0 NtCreateUserProcess
0xC4 00007FF9B9CF0FC0 NtCreateWaitCompletionPacket
0xC5 00007FF9B9CF0FE0 NtCreateWaitablePort
0xC6 00007FF9B9CF1000 NtCreateWnfStateName
0xC7 00007FF9B9CF1020 NtCreateWorkerFactory
0xC8 00007FF9B9CF1040 NtDebugActiveProcess
0xC9 00007FF9B9CF1060 NtDebugContinue
0x34 00007FF9B9CEFDD0 NtDelayExecution
0xCA 00007FF9B9CF1080 NtDeleteAtom
0xCB 00007FF9B9CF10A0 NtDeleteBootEntry
0xCC 00007FF9B9CF10C0 NtDeleteDriverEntry
0xCD 00007FF9B9CF10E0 NtDeleteFile
0xCE 00007FF9B9CF1100 NtDeleteKey
0xCF 00007FF9B9CF1120 NtDeleteObjectAuditAlarm
0xD0 00007FF9B9CF1140 NtDeletePrivateNamespace
0xD1 00007FF9B9CF1160 NtDeleteValueKey
0xD2 00007FF9B9CF1180 NtDeleteWnfStateData
0xD3 00007FF9B9CF11A0 NtDeleteWnfStateName
0x07 00007FF9B9CEF830 NtDeviceIoControlFile
0xD4 00007FF9B9CF11C0 NtDisableLastKnownGood
0xD5 00007FF9B9CF11E0 NtDisplayString
0xD6 00007FF9B9CF1200 NtDrawText
0x3C 00007FF9B9CEFED0 NtDuplicateObject
0x42 00007FF9B9CEFF90 NtDuplicateToken
0xD7 00007FF9B9CF1220 NtEnableLastKnownGood
0xD8 00007FF9B9CF1240 NtEnumerateBootEntries
0xD9 00007FF9B9CF1260 NtEnumerateDriverEntries
0x32 00007FF9B9CEFD90 NtEnumerateKey
0xDA 00007FF9B9CF1280 NtEnumerateSystemEnvironmentValuesEx
0xDB 00007FF9B9CF12A0 NtEnumerateTransactionObject
0x13 00007FF9B9CEF9B0 NtEnumerateValueKey
0xDC 00007FF9B9CF12C0 NtExtendSection
0xDD 00007FF9B9CF12E0 NtFilterBootOption
0xDE 00007FF9B9CF1300 NtFilterToken
0xDF 00007FF9B9CF1320 NtFilterTokenEx
0x14 00007FF9B9CEF9D0 NtFindAtom
0x4B 00007FF9B9CF00B0 NtFlushBuffersFile
0xE0 00007FF9B9CF1340 NtFlushBuffersFileEx
0xE1 00007FF9B9CF1360 NtFlushInstallUILanguage
0xE2 00007FF9B9CF1380 NtFlushInstructionCache
0xE3 00007FF9B9CF13A0 NtFlushKey
0xE4 00007FF9B9CF13C0 NtFlushProcessWriteBuffers
0xE5 00007FF9B9CF13E0 NtFlushVirtualMemory
0xE6 00007FF9B9CF1400 NtFlushWriteBuffer
0xE7 00007FF9B9CF1420 NtFreeUserPhysicalPages
0x1E 00007FF9B9CEFB10 NtFreeVirtualMemory
0xE8 00007FF9B9CF1440 NtFreezeRegistry
0xE9 00007FF9B9CF1460 NtFreezeTransactions
0x39 00007FF9B9CEFE70 NtFsControlFile
0xEA 00007FF9B9CF1480 NtGetCachedSigningLevel
0xEB 00007FF9B9CF14A0 NtGetCompleteWnfStateSubscription
0xEC 00007FF9B9CF14C0 NtGetContextThread
0xED 00007FF9B9CF14E0 NtGetCurrentProcessorNumber
0xEE 00007FF9B9CF1500 NtGetCurrentProcessorNumberEx
0xEF 00007FF9B9CF1520 NtGetDevicePowerState
0xF0 00007FF9B9CF1540 NtGetMUIRegistryInfo
0xF1 00007FF9B9CF1560 NtGetNextProcess
0xF2 00007FF9B9CF1580 NtGetNextThread
0xF3 00007FF9B9CF15A0 NtGetNlsSectionPtr
0xF4 00007FF9B9CF15C0 NtGetNotificationResourceManager
0xF5 00007FF9B9CF15E0 NtGetWriteWatch
0xF6 00007FF9B9CF1600 NtImpersonateAnonymousToken
0x1F 00007FF9B9CEFB30 NtImpersonateClientOfPort
0xF7 00007FF9B9CF1620 NtImpersonateThread
0xF8 00007FF9B9CF1640 NtInitializeEnclave
0xF9 00007FF9B9CF1660 NtInitializeNlsFiles
0xFA 00007FF9B9CF1680 NtInitializeRegistry
0xFB 00007FF9B9CF16A0 NtInitiatePowerAction
0x4F 00007FF9B9CF0130 NtIsProcessInJob
0xFC 00007FF9B9CF16C0 NtIsSystemResumeAutomatic
0xFD 00007FF9B9CF16E0 NtIsUILanguageComitted
0xFE 00007FF9B9CF1700 NtListenPort
0xFF 00007FF9B9CF1720 NtLoadDriver
0x00 00007FF9B9CF1740 NtLoadEnclaveData
0x01 00007FF9B9CF1760 NtLoadKey
0x02 00007FF9B9CF1780 NtLoadKey2
0xCF 00007FF9B9CF3120 NtLoadKey3
0x03 00007FF9B9CF17A0 NtLoadKeyEx
0x04 00007FF9B9CF17C0 NtLockFile
0x05 00007FF9B9CF17E0 NtLockProductActivationKeys
0x06 00007FF9B9CF1800 NtLockRegistryKey
0x07 00007FF9B9CF1820 NtLockVirtualMemory
0x08 00007FF9B9CF1840 NtMakePermanentObject
0x09 00007FF9B9CF1860 NtMakeTemporaryObject
0x0A 00007FF9B9CF1880 NtManageHotPatch
0x0B 00007FF9B9CF18A0 NtManagePartition
0x0C 00007FF9B9CF18C0 NtMapCMFModule
0x0D 00007FF9B9CF18E0 NtMapUserPhysicalPages
0x03 00007FF9B9CEF7B0 NtMapUserPhysicalPagesScatter
0x28 00007FF9B9CEFC50 NtMapViewOfSection
0x0E 00007FF9B9CF1900 NtMapViewOfSectionEx
0x0F 00007FF9B9CF1920 NtModifyBootEntry
0x10 00007FF9B9CF1940 NtModifyDriverEntry
0x11 00007FF9B9CF1960 NtNotifyChangeDirectoryFile
0x12 00007FF9B9CF1980 NtNotifyChangeDirectoryFileEx
0x13 00007FF9B9CF19A0 NtNotifyChangeKey
0x14 00007FF9B9CF19C0 NtNotifyChangeMultipleKeys
0x15 00007FF9B9CF19E0 NtNotifyChangeSession
0x58 00007FF9B9CF0250 NtOpenDirectoryObject
0x16 00007FF9B9CF1A00 NtOpenEnlistment
0x40 00007FF9B9CEFF50 NtOpenEvent
0x17 00007FF9B9CF1A20 NtOpenEventPair
0x33 00007FF9B9CEFDB0 NtOpenFile
0x18 00007FF9B9CF1A40 NtOpenIoCompletion
0x19 00007FF9B9CF1A60 NtOpenJobObject
0x12 00007FF9B9CEF990 NtOpenKey
0x1A 00007FF9B9CF1A80 NtOpenKeyEx
0x1B 00007FF9B9CF1AA0 NtOpenKeyTransacted
0x1C 00007FF9B9CF1AC0 NtOpenKeyTransactedEx
0x1D 00007FF9B9CF1AE0 NtOpenKeyedEvent
0x1E 00007FF9B9CF1B00 NtOpenMutant
0x1F 00007FF9B9CF1B20 NtOpenObjectAuditAlarm
0x20 00007FF9B9CF1B40 NtOpenPartition
0x21 00007FF9B9CF1B60 NtOpenPrivateNamespace
0x26 00007FF9B9CEFC10 NtOpenProcess
0x22 00007FF9B9CF1B80 NtOpenProcessToken
0x30 00007FF9B9CEFD50 NtOpenProcessTokenEx
0x23 00007FF9B9CF1BA0 NtOpenRegistryTransaction
0x24 00007FF9B9CF1BC0 NtOpenResourceManager
0x37 00007FF9B9CEFE30 NtOpenSection
0x25 00007FF9B9CF1BE0 NtOpenSemaphore
0x26 00007FF9B9CF1C00 NtOpenSession
0x27 00007FF9B9CF1C20 NtOpenSymbolicLinkObject
0x28 00007FF9B9CF1C40 NtOpenThread
0x24 00007FF9B9CEFBD0 NtOpenThreadToken
0x2F 00007FF9B9CEFD30 NtOpenThreadTokenEx
0x29 00007FF9B9CF1C60 NtOpenTimer
0x2A 00007FF9B9CF1C80 NtOpenTransaction
0x2B 00007FF9B9CF1CA0 NtOpenTransactionManager
0x2C 00007FF9B9CF1CC0 NtPlugPlayControl
0x5F 00007FF9B9CF0320 NtPowerInformation
0x2D 00007FF9B9CF1CE0 NtPrePrepareComplete
0x2E 00007FF9B9CF1D00 NtPrePrepareEnlistment
0x2F 00007FF9B9CF1D20 NtPrepareComplete
0x30 00007FF9B9CF1D40 NtPrepareEnlistment
0x31 00007FF9B9CF1D60 NtPrivilegeCheck
0x32 00007FF9B9CF1D80 NtPrivilegeObjectAuditAlarm
0x33 00007FF9B9CF1DA0 NtPrivilegedServiceAuditAlarm
0x34 00007FF9B9CF1DC0 NtPropagationComplete
0x35 00007FF9B9CF1DE0 NtPropagationFailed
0x50 00007FF9B9CF0150 NtProtectVirtualMemory
0x36 00007FF9B9CF1E00 NtPulseEvent
0x3D 00007FF9B9CEFEF0 NtQueryAttributesFile
0x37 00007FF9B9CF1E20 NtQueryAuxiliaryCounterFrequency
0x38 00007FF9B9CF1E40 NtQueryBootEntryOrder
0x39 00007FF9B9CF1E60 NtQueryBootOptions
0x3A 00007FF9B9CF1E80 NtQueryDebugFilterState
0x15 00007FF9B9CEF9F0 NtQueryDefaultLocale
0x44 00007FF9B9CEFFD0 NtQueryDefaultUILanguage
0x35 00007FF9B9CEFDF0 NtQueryDirectoryFile
0x3B 00007FF9B9CF1EA0 NtQueryDirectoryFileEx
0x3C 00007FF9B9CF1EC0 NtQueryDirectoryObject
0x3D 00007FF9B9CF1EE0 NtQueryDriverEntryOrder
0x3E 00007FF9B9CF1F00 NtQueryEaFile
0x56 00007FF9B9CF0210 NtQueryEvent
0x3F 00007FF9B9CF1F20 NtQueryFullAttributesFile
0x40 00007FF9B9CF1F40 NtQueryInformationAtom
0x41 00007FF9B9CF1F60 NtQueryInformationByName
0x42 00007FF9B9CF1F80 NtQueryInformationEnlistment
0x11 00007FF9B9CEF970 NtQueryInformationFile
0x43 00007FF9B9CF1FA0 NtQueryInformationJobObject
0x44 00007FF9B9CF1FC0 NtQueryInformationPort
0x19 00007FF9B9CEFA70 NtQueryInformationProcess
0x45 00007FF9B9CF1FE0 NtQueryInformationResourceManager
0x25 00007FF9B9CEFBF0 NtQueryInformationThread
0x21 00007FF9B9CEFB70 NtQueryInformationToken
0x46 00007FF9B9CF2000 NtQueryInformationTransaction
0x47 00007FF9B9CF2020 NtQueryInformationTransactionManager
0x48 00007FF9B9CF2040 NtQueryInformationWorkerFactory
0x49 00007FF9B9CF2060 NtQueryInstallUILanguage
0x4A 00007FF9B9CF2080 NtQueryIntervalProfile
0x4B 00007FF9B9CF20A0 NtQueryIoCompletion
0x16 00007FF9B9CEFA10 NtQueryKey
0x4C 00007FF9B9CF20C0 NtQueryLicenseValue
0x4D 00007FF9B9CF20E0 NtQueryMultipleValueKey
0x4E 00007FF9B9CF2100 NtQueryMutant
0x10 00007FF9B9CEF950 NtQueryObject
0x4F 00007FF9B9CF2120 NtQueryOpenSubKeys
0x50 00007FF9B9CF2140 NtQueryOpenSubKeysEx
0x31 00007FF9B9CEFD70 NtQueryPerformanceCounter
0x51 00007FF9B9CF2160 NtQueryPortInformationProcess
0x52 00007FF9B9CF2180 NtQueryQuotaInformationFile
0x51 00007FF9B9CF0170 NtQuerySection
0x53 00007FF9B9CF21A0 NtQuerySecurityAttributesToken
0x54 00007FF9B9CF21C0 NtQuerySecurityObject
0x55 00007FF9B9CF21E0 NtQuerySecurityPolicy
0x56 00007FF9B9CF2200 NtQuerySemaphore
0x57 00007FF9B9CF2220 NtQuerySymbolicLinkObject
0x58 00007FF9B9CF2240 NtQuerySystemEnvironmentValue
0x59 00007FF9B9CF2260 NtQuerySystemEnvironmentValueEx
0x36 00007FF9B9CEFE10 NtQuerySystemInformation
0x5A 00007FF9B9CF2280 NtQuerySystemInformationEx
0x38 00007FF9B9CEFE50 NtQueryTimer
0x5B 00007FF9B9CF22A0 NtQueryTimerResolution
0x17 00007FF9B9CEFA30 NtQueryValueKey
0x23 00007FF9B9CEFBB0 NtQueryVirtualMemory
0x49 00007FF9B9CF0070 NtQueryVolumeInformationFile
0x5C 00007FF9B9CF22C0 NtQueryWnfStateData
0x5D 00007FF9B9CF22E0 NtQueryWnfStateNameInformation
0x45 00007FF9B9CEFFF0 NtQueueApcThread
0x5E 00007FF9B9CF2300 NtQueueApcThreadEx
0x5F 00007FF9B9CF2320 NtRaiseException
0x60 00007FF9B9CF2340 NtRaiseHardError
0x06 00007FF9B9CEF810 NtReadFile
0x2E 00007FF9B9CEFD10 NtReadFileScatter
0x61 00007FF9B9CF2360 NtReadOnlyEnlistment
0x54 00007FF9B9CF01D0 NtReadRequestData
0x3F 00007FF9B9CEFF30 NtReadVirtualMemory
0x62 00007FF9B9CF2380 NtRecoverEnlistment
0x63 00007FF9B9CF23A0 NtRecoverResourceManager
0x64 00007FF9B9CF23C0 NtRecoverTransactionManager
0x65 00007FF9B9CF23E0 NtRegisterProtocolAddressInformation
0x66 00007FF9B9CF2400 NtRegisterThreadTerminatePort
0x67 00007FF9B9CF2420 NtReleaseKeyedEvent
0x20 00007FF9B9CEFB50 NtReleaseMutant
0x0A 00007FF9B9CEF890 NtReleaseSemaphore
0x68 00007FF9B9CF2440 NtReleaseWorkerFactoryWorker
0x09 00007FF9B9CEF870 NtRemoveIoCompletion
0x69 00007FF9B9CF2460 NtRemoveIoCompletionEx
0x6A 00007FF9B9CF2480 NtRemoveProcessDebug
0x6B 00007FF9B9CF24A0 NtRenameKey
0x6C 00007FF9B9CF24C0 NtRenameTransactionManager
0x6D 00007FF9B9CF24E0 NtReplaceKey
0x6E 00007FF9B9CF2500 NtReplacePartitionUnit
0x0C 00007FF9B9CEF8D0 NtReplyPort
0x0B 00007FF9B9CEF8B0 NtReplyWaitReceivePort
0x2B 00007FF9B9CEFCB0 NtReplyWaitReceivePortEx
0x6F 00007FF9B9CF2520 NtReplyWaitReplyPort
0x70 00007FF9B9CF2540 NtRequestPort
0x22 00007FF9B9CEFB90 NtRequestWaitReplyPort
0x71 00007FF9B9CF2560 NtResetEvent
0x72 00007FF9B9CF2580 NtResetWriteWatch
0x73 00007FF9B9CF25A0 NtRestoreKey
0x74 00007FF9B9CF25C0 NtResumeProcess
0x52 00007FF9B9CF0190 NtResumeThread
0x75 00007FF9B9CF25E0 NtRevertContainerImpersonation
0x76 00007FF9B9CF2600 NtRollbackComplete
0x77 00007FF9B9CF2620 NtRollbackEnlistment
0x78 00007FF9B9CF2640 NtRollbackRegistryTransaction
0x79 00007FF9B9CF2660 NtRollbackTransaction
0x7A 00007FF9B9CF2680 NtRollforwardTransactionManager
0x7B 00007FF9B9CF26A0 NtSaveKey
0x7C 00007FF9B9CF26C0 NtSaveKeyEx
0x7D 00007FF9B9CF26E0 NtSaveMergedKeys
0x7E 00007FF9B9CF2700 NtSecureConnectPort
0x7F 00007FF9B9CF2720 NtSerializeBoot
0x80 00007FF9B9CF2740 NtSetBootEntryOrder
0x81 00007FF9B9CF2760 NtSetBootOptions
0x82 00007FF9B9CF2780 NtSetCachedSigningLevel
0x83 00007FF9B9CF27A0 NtSetCachedSigningLevel2
0x84 00007FF9B9CF27C0 NtSetContextThread
0x85 00007FF9B9CF27E0 NtSetDebugFilterState
0x86 00007FF9B9CF2800 NtSetDefaultHardErrorPort
0x87 00007FF9B9CF2820 NtSetDefaultLocale
0x88 00007FF9B9CF2840 NtSetDefaultUILanguage
0x89 00007FF9B9CF2860 NtSetDriverEntryOrder
0x8A 00007FF9B9CF2880 NtSetEaFile
0x0E 00007FF9B9CEF910 NtSetEvent
0x2D 00007FF9B9CEFCF0 NtSetEventBoostPriority
0x8B 00007FF9B9CF28A0 NtSetHighEventPair
0x8C 00007FF9B9CF28C0 NtSetHighWaitLowEventPair
0x8D 00007FF9B9CF28E0 NtSetIRTimer
0x8E 00007FF9B9CF2900 NtSetInformationDebugObject
0x8F 00007FF9B9CF2920 NtSetInformationEnlistment
0x27 00007FF9B9CEFC30 NtSetInformationFile
0x90 00007FF9B9CF2940 NtSetInformationJobObject
0x91 00007FF9B9CF2960 NtSetInformationKey
0x5C 00007FF9B9CF02C0 NtSetInformationObject
0x1C 00007FF9B9CEFAD0 NtSetInformationProcess
0x92 00007FF9B9CF2980 NtSetInformationResourceManager
0x93 00007FF9B9CF29A0 NtSetInformationSymbolicLink
0x0D 00007FF9B9CEF8F0 NtSetInformationThread
0x94 00007FF9B9CF29C0 NtSetInformationToken
0x95 00007FF9B9CF29E0 NtSetInformationTransaction
0x96 00007FF9B9CF2A00 NtSetInformationTransactionManager
0x97 00007FF9B9CF2A20 NtSetInformationVirtualMemory
0x98 00007FF9B9CF2A40 NtSetInformationWorkerFactory
0x99 00007FF9B9CF2A60 NtSetIntervalProfile
0x9A 00007FF9B9CF2A80 NtSetIoCompletion
0x9B 00007FF9B9CF2AA0 NtSetIoCompletionEx
0x9C 00007FF9B9CF2AC0 NtSetLdtEntries
0x9D 00007FF9B9CF2AE0 NtSetLowEventPair
0x9E 00007FF9B9CF2B00 NtSetLowWaitHighEventPair
0x9F 00007FF9B9CF2B20 NtSetQuotaInformationFile
0xA0 00007FF9B9CF2B40 NtSetSecurityObject
0xA1 00007FF9B9CF2B60 NtSetSystemEnvironmentValue
0xA2 00007FF9B9CF2B80 NtSetSystemEnvironmentValueEx
0xA3 00007FF9B9CF2BA0 NtSetSystemInformation
0xA4 00007FF9B9CF2BC0 NtSetSystemPowerState
0xA5 00007FF9B9CF2BE0 NtSetSystemTime
0xA6 00007FF9B9CF2C00 NtSetThreadExecutionState
0x62 00007FF9B9CF0380 NtSetTimer
0xA7 00007FF9B9CF2C20 NtSetTimer2
0xA8 00007FF9B9CF2C40 NtSetTimerEx
0xA9 00007FF9B9CF2C60 NtSetTimerResolution
0xAA 00007FF9B9CF2C80 NtSetUuidSeed
0x60 00007FF9B9CF0340 NtSetValueKey
0xAB 00007FF9B9CF2CA0 NtSetVolumeInformationFile
0xAC 00007FF9B9CF2CC0 NtSetWnfProcessNotificationEvent
0xAD 00007FF9B9CF2CE0 NtShutdownSystem
0xAE 00007FF9B9CF2D00 NtShutdownWorkerFactory
0xAF 00007FF9B9CF2D20 NtSignalAndWaitForSingleObject
0xB0 00007FF9B9CF2D40 NtSinglePhaseReject
0xB1 00007FF9B9CF2D60 NtStartProfile
0xB2 00007FF9B9CF2D80 NtStopProfile
0xB3 00007FF9B9CF2DA0 NtSubscribeWnfStateChange
0xB4 00007FF9B9CF2DC0 NtSuspendProcess
0xB5 00007FF9B9CF2DE0 NtSuspendThread
0xB6 00007FF9B9CF2E00 NtSystemDebugControl
0xB7 00007FF9B9CF2E20 NtTerminateEnclave
0xB8 00007FF9B9CF2E40 NtTerminateJobObject
0x2C 00007FF9B9CEFCD0 NtTerminateProcess
0x53 00007FF9B9CF01B0 NtTerminateThread
0xB9 00007FF9B9CF2E60 NtTestAlert
0xBA 00007FF9B9CF2E80 NtThawRegistry
0xBB 00007FF9B9CF2EA0 NtThawTransactions
0xBC 00007FF9B9CF2EC0 NtTraceControl
0x5E 00007FF9B9CF0300 NtTraceEvent
0xBD 00007FF9B9CF2EE0 NtTranslateFilePath
0xBE 00007FF9B9CF2F00 NtUmsThreadYield
0xBF 00007FF9B9CF2F20 NtUnloadDriver
0xC0 00007FF9B9CF2F40 NtUnloadKey
0xC1 00007FF9B9CF2F60 NtUnloadKey2
0xC2 00007FF9B9CF2F80 NtUnloadKeyEx
0xC3 00007FF9B9CF2FA0 NtUnlockFile
0xC4 00007FF9B9CF2FC0 NtUnlockVirtualMemory
0x2A 00007FF9B9CEFC90 NtUnmapViewOfSection
0xC5 00007FF9B9CF2FE0 NtUnmapViewOfSectionEx
0xC6 00007FF9B9CF3000 NtUnsubscribeWnfStateChange
0xC7 00007FF9B9CF3020 NtUpdateWnfStateData
0xC8 00007FF9B9CF3040 NtVdmControl
0xC9 00007FF9B9CF3060 NtWaitForAlertByThreadId
0xCA 00007FF9B9CF3080 NtWaitForDebugEvent
0xCB 00007FF9B9CF30A0 NtWaitForKeyedEvent
0x5B 00007FF9B9CF02A0 NtWaitForMultipleObjects
0x1A 00007FF9B9CEFA90 NtWaitForMultipleObjects32
0x04 00007FF9B9CEF7D0 NtWaitForSingleObject
0xCC 00007FF9B9CF30C0 NtWaitForWorkViaWorkerFactory
0xCD 00007FF9B9CF30E0 NtWaitHighEventPair
0xCE 00007FF9B9CF3100 NtWaitLowEventPair
0x01 00007FF9B9CEF770 NtWorkerFactoryWorkerReady
0x08 00007FF9B9CEF850 NtWriteFile
0x1B 00007FF9B9CEFAB0 NtWriteFileGather
0x57 00007FF9B9CF0230 NtWriteRequestData
0x3A 00007FF9B9CEFE90 NtWriteVirtualMemory
0x46 00007FF9B9CF0010 NtYieldExecution
0x36 00007FF9B9CEFE10 RtlGetNativeSystemInformation
0x02 00007FF9B9CEF790 ZwAcceptConnectPort
0x00 00007FF9B9CEF750 ZwAccessCheck
0x29 00007FF9B9CEFC70 ZwAccessCheckAndAuditAlarm
0x63 00007FF9B9CF03A0 ZwAccessCheckByType
0x59 00007FF9B9CF0270 ZwAccessCheckByTypeAndAuditAlarm
0x64 00007FF9B9CF03C0 ZwAccessCheckByTypeResultList
0x65 00007FF9B9CF03E0 ZwAccessCheckByTypeResultListAndAuditAlarm
0x66 00007FF9B9CF0400 ZwAccessCheckByTypeResultListAndAuditAlarmByHandle
0x67 00007FF9B9CF0420 ZwAcquireProcessActivityReference
0x47 00007FF9B9CF0030 ZwAddAtom
0x68 00007FF9B9CF0440 ZwAddAtomEx
0x69 00007FF9B9CF0460 ZwAddBootEntry
0x6A 00007FF9B9CF0480 ZwAddDriverEntry
0x6B 00007FF9B9CF04A0 ZwAdjustGroupsToken
0x41 00007FF9B9CEFF70 ZwAdjustPrivilegesToken
0x6C 00007FF9B9CF04C0 ZwAdjustTokenClaimsAndDeviceGroups
0x6D 00007FF9B9CF04E0 ZwAlertResumeThread
0x6E 00007FF9B9CF0500 ZwAlertThread
0x6F 00007FF9B9CF0520 ZwAlertThreadByThreadId
0x70 00007FF9B9CF0540 ZwAllocateLocallyUniqueId
0x71 00007FF9B9CF0560 ZwAllocateReserveObject
0x72 00007FF9B9CF0580 ZwAllocateUserPhysicalPages
0x73 00007FF9B9CF05A0 ZwAllocateUuids
0x18 00007FF9B9CEFA50 ZwAllocateVirtualMemory
0x74 00007FF9B9CF05C0 ZwAllocateVirtualMemoryEx
0x75 00007FF9B9CF05E0 ZwAlpcAcceptConnectPort
0x76 00007FF9B9CF0600 ZwAlpcCancelMessage
0x77 00007FF9B9CF0620 ZwAlpcConnectPort
0x78 00007FF9B9CF0640 ZwAlpcConnectPortEx
0x79 00007FF9B9CF0660 ZwAlpcCreatePort
0x7A 00007FF9B9CF0680 ZwAlpcCreatePortSection
0x7B 00007FF9B9CF06A0 ZwAlpcCreateResourceReserve
0x7C 00007FF9B9CF06C0 ZwAlpcCreateSectionView
0x7D 00007FF9B9CF06E0 ZwAlpcCreateSecurityContext
0x7E 00007FF9B9CF0700 ZwAlpcDeletePortSection
0x7F 00007FF9B9CF0720 ZwAlpcDeleteResourceReserve
0x80 00007FF9B9CF0740 ZwAlpcDeleteSectionView
0x81 00007FF9B9CF0760 ZwAlpcDeleteSecurityContext
0x82 00007FF9B9CF0780 ZwAlpcDisconnectPort
0x83 00007FF9B9CF07A0 ZwAlpcImpersonateClientContainerOfPort
0x84 00007FF9B9CF07C0 ZwAlpcImpersonateClientOfPort
0x85 00007FF9B9CF07E0 ZwAlpcOpenSenderProcess
0x86 00007FF9B9CF0800 ZwAlpcOpenSenderThread
0x87 00007FF9B9CF0820 ZwAlpcQueryInformation
0x88 00007FF9B9CF0840 ZwAlpcQueryInformationMessage
0x89 00007FF9B9CF0860 ZwAlpcRevokeSecurityContext
0x8A 00007FF9B9CF0880 ZwAlpcSendWaitReceivePort
0x8B 00007FF9B9CF08A0 ZwAlpcSetInformation
0x4C 00007FF9B9CF00D0 ZwApphelpCacheControl
0x8C 00007FF9B9CF08C0 ZwAreMappedFilesTheSame
0x8D 00007FF9B9CF08E0 ZwAssignProcessToJobObject
0x8E 00007FF9B9CF0900 ZwAssociateWaitCompletionPacket
0x8F 00007FF9B9CF0920 ZwCallEnclave
0x05 00007FF9B9CEF7F0 ZwCallbackReturn
0x5D 00007FF9B9CF02E0 ZwCancelIoFile
0x90 00007FF9B9CF0940 ZwCancelIoFileEx
0x91 00007FF9B9CF0960 ZwCancelSynchronousIoFile
0x61 00007FF9B9CF0360 ZwCancelTimer
0x92 00007FF9B9CF0980 ZwCancelTimer2
0x93 00007FF9B9CF09A0 ZwCancelWaitCompletionPacket
0x3E 00007FF9B9CEFF10 ZwClearEvent
0x0F 00007FF9B9CEF930 ZwClose
0x3B 00007FF9B9CEFEB0 ZwCloseObjectAuditAlarm
0x94 00007FF9B9CF09C0 ZwCommitComplete
0x95 00007FF9B9CF09E0 ZwCommitEnlistment
0x96 00007FF9B9CF0A00 ZwCommitRegistryTransaction
0x97 00007FF9B9CF0A20 ZwCommitTransaction
0x98 00007FF9B9CF0A40 ZwCompactKeys
0x99 00007FF9B9CF0A60 ZwCompareObjects
0x9A 00007FF9B9CF0A80 ZwCompareSigningLevels
0x9B 00007FF9B9CF0AA0 ZwCompareTokens
0x9C 00007FF9B9CF0AC0 ZwCompleteConnectPort
0x9D 00007FF9B9CF0AE0 ZwCompressKey
0x9E 00007FF9B9CF0B00 ZwConnectPort
0x43 00007FF9B9CEFFB0 ZwContinue
0x9F 00007FF9B9CF0B20 ZwConvertBetweenAuxiliaryCounterAndPerformanceCounter
0xA0 00007FF9B9CF0B40 ZwCreateDebugObject
0xA1 00007FF9B9CF0B60 ZwCreateDirectoryObject
0xA2 00007FF9B9CF0B80 ZwCreateDirectoryObjectEx
0xA3 00007FF9B9CF0BA0 ZwCreateEnclave
0xA4 00007FF9B9CF0BC0 ZwCreateEnlistment
0x48 00007FF9B9CF0050 ZwCreateEvent
0xA5 00007FF9B9CF0BE0 ZwCreateEventPair
0x55 00007FF9B9CF01F0 ZwCreateFile
0xA6 00007FF9B9CF0C00 ZwCreateIRTimer
0xA7 00007FF9B9CF0C20 ZwCreateIoCompletion
0xA8 00007FF9B9CF0C40 ZwCreateJobObject
0xA9 00007FF9B9CF0C60 ZwCreateJobSet
0x1D 00007FF9B9CEFAF0 ZwCreateKey
0xAA 00007FF9B9CF0C80 ZwCreateKeyTransacted
0xAB 00007FF9B9CF0CA0 ZwCreateKeyedEvent
0xAC 00007FF9B9CF0CC0 ZwCreateLowBoxToken
0xAD 00007FF9B9CF0CE0 ZwCreateMailslotFile
0xAE 00007FF9B9CF0D00 ZwCreateMutant
0xAF 00007FF9B9CF0D20 ZwCreateNamedPipeFile
0xB0 00007FF9B9CF0D40 ZwCreatePagingFile
0xB1 00007FF9B9CF0D60 ZwCreatePartition
0xB2 00007FF9B9CF0D80 ZwCreatePort
0xB3 00007FF9B9CF0DA0 ZwCreatePrivateNamespace
0xB4 00007FF9B9CF0DC0 ZwCreateProcess
0x4D 00007FF9B9CF00F0 ZwCreateProcessEx
0xB5 00007FF9B9CF0DE0 ZwCreateProfile
0xB6 00007FF9B9CF0E00 ZwCreateProfileEx
0xB7 00007FF9B9CF0E20 ZwCreateRegistryTransaction
0xB8 00007FF9B9CF0E40 ZwCreateResourceManager
0x4A 00007FF9B9CF0090 ZwCreateSection
0xB9 00007FF9B9CF0E60 ZwCreateSectionEx
0xBA 00007FF9B9CF0E80 ZwCreateSemaphore
0xBB 00007FF9B9CF0EA0 ZwCreateSymbolicLinkObject
0x4E 00007FF9B9CF0110 ZwCreateThread
0xBC 00007FF9B9CF0EC0 ZwCreateThreadEx
0xBD 00007FF9B9CF0EE0 ZwCreateTimer
0xBE 00007FF9B9CF0F00 ZwCreateTimer2
0xBF 00007FF9B9CF0F20 ZwCreateToken
0xC0 00007FF9B9CF0F40 ZwCreateTokenEx
0xC1 00007FF9B9CF0F60 ZwCreateTransaction
0xC2 00007FF9B9CF0F80 ZwCreateTransactionManager
0xC3 00007FF9B9CF0FA0 ZwCreateUserProcess
0xC4 00007FF9B9CF0FC0 ZwCreateWaitCompletionPacket
0xC5 00007FF9B9CF0FE0 ZwCreateWaitablePort
0xC6 00007FF9B9CF1000 ZwCreateWnfStateName
0xC7 00007FF9B9CF1020 ZwCreateWorkerFactory
0xC8 00007FF9B9CF1040 ZwDebugActiveProcess
0xC9 00007FF9B9CF1060 ZwDebugContinue
0x34 00007FF9B9CEFDD0 ZwDelayExecution
0xCA 00007FF9B9CF1080 ZwDeleteAtom
0xCB 00007FF9B9CF10A0 ZwDeleteBootEntry
0xCC 00007FF9B9CF10C0 ZwDeleteDriverEntry
0xCD 00007FF9B9CF10E0 ZwDeleteFile
0xCE 00007FF9B9CF1100 ZwDeleteKey
0xCF 00007FF9B9CF1120 ZwDeleteObjectAuditAlarm
0xD0 00007FF9B9CF1140 ZwDeletePrivateNamespace
0xD1 00007FF9B9CF1160 ZwDeleteValueKey
0xD2 00007FF9B9CF1180 ZwDeleteWnfStateData
0xD3 00007FF9B9CF11A0 ZwDeleteWnfStateName
0x07 00007FF9B9CEF830 ZwDeviceIoControlFile
0xD4 00007FF9B9CF11C0 ZwDisableLastKnownGood
0xD5 00007FF9B9CF11E0 ZwDisplayString
0xD6 00007FF9B9CF1200 ZwDrawText
0x3C 00007FF9B9CEFED0 ZwDuplicateObject
0x42 00007FF9B9CEFF90 ZwDuplicateToken
0xD7 00007FF9B9CF1220 ZwEnableLastKnownGood
0xD8 00007FF9B9CF1240 ZwEnumerateBootEntries
0xD9 00007FF9B9CF1260 ZwEnumerateDriverEntries
0x32 00007FF9B9CEFD90 ZwEnumerateKey
0xDA 00007FF9B9CF1280 ZwEnumerateSystemEnvironmentValuesEx
0xDB 00007FF9B9CF12A0 ZwEnumerateTransactionObject
0x13 00007FF9B9CEF9B0 ZwEnumerateValueKey
0xDC 00007FF9B9CF12C0 ZwExtendSection
0xDD 00007FF9B9CF12E0 ZwFilterBootOption
0xDE 00007FF9B9CF1300 ZwFilterToken
0xDF 00007FF9B9CF1320 ZwFilterTokenEx
0x14 00007FF9B9CEF9D0 ZwFindAtom
0x4B 00007FF9B9CF00B0 ZwFlushBuffersFile
0xE0 00007FF9B9CF1340 ZwFlushBuffersFileEx
0xE1 00007FF9B9CF1360 ZwFlushInstallUILanguage
0xE2 00007FF9B9CF1380 ZwFlushInstructionCache
0xE3 00007FF9B9CF13A0 ZwFlushKey
0xE4 00007FF9B9CF13C0 ZwFlushProcessWriteBuffers
0xE5 00007FF9B9CF13E0 ZwFlushVirtualMemory
0xE6 00007FF9B9CF1400 ZwFlushWriteBuffer
0xE7 00007FF9B9CF1420 ZwFreeUserPhysicalPages
0x1E 00007FF9B9CEFB10 ZwFreeVirtualMemory
0xE8 00007FF9B9CF1440 ZwFreezeRegistry
0xE9 00007FF9B9CF1460 ZwFreezeTransactions
0x39 00007FF9B9CEFE70 ZwFsControlFile
0xEA 00007FF9B9CF1480 ZwGetCachedSigningLevel
0xEB 00007FF9B9CF14A0 ZwGetCompleteWnfStateSubscription
0xEC 00007FF9B9CF14C0 ZwGetContextThread
0xED 00007FF9B9CF14E0 ZwGetCurrentProcessorNumber
0xEE 00007FF9B9CF1500 ZwGetCurrentProcessorNumberEx
0xEF 00007FF9B9CF1520 ZwGetDevicePowerState
0xF0 00007FF9B9CF1540 ZwGetMUIRegistryInfo
0xF1 00007FF9B9CF1560 ZwGetNextProcess
0xF2 00007FF9B9CF1580 ZwGetNextThread
0xF3 00007FF9B9CF15A0 ZwGetNlsSectionPtr
0xF4 00007FF9B9CF15C0 ZwGetNotificationResourceManager
0xF5 00007FF9B9CF15E0 ZwGetWriteWatch
0xF6 00007FF9B9CF1600 ZwImpersonateAnonymousToken
0x1F 00007FF9B9CEFB30 ZwImpersonateClientOfPort
0xF7 00007FF9B9CF1620 ZwImpersonateThread
0xF8 00007FF9B9CF1640 ZwInitializeEnclave
0xF9 00007FF9B9CF1660 ZwInitializeNlsFiles
0xFA 00007FF9B9CF1680 ZwInitializeRegistry
0xFB 00007FF9B9CF16A0 ZwInitiatePowerAction
0x4F 00007FF9B9CF0130 ZwIsProcessInJob
0xFC 00007FF9B9CF16C0 ZwIsSystemResumeAutomatic
0xFD 00007FF9B9CF16E0 ZwIsUILanguageComitted
0xFE 00007FF9B9CF1700 ZwListenPort
0xFF 00007FF9B9CF1720 ZwLoadDriver
0x00 00007FF9B9CF1740 ZwLoadEnclaveData
0x01 00007FF9B9CF1760 ZwLoadKey
0x02 00007FF9B9CF1780 ZwLoadKey2
0xCF 00007FF9B9CF3120 ZwLoadKey3
0x03 00007FF9B9CF17A0 ZwLoadKeyEx
0x04 00007FF9B9CF17C0 ZwLockFile
0x05 00007FF9B9CF17E0 ZwLockProductActivationKeys
0x06 00007FF9B9CF1800 ZwLockRegistryKey
0x07 00007FF9B9CF1820 ZwLockVirtualMemory
0x08 00007FF9B9CF1840 ZwMakePermanentObject
0x09 00007FF9B9CF1860 ZwMakeTemporaryObject
0x0A 00007FF9B9CF1880 ZwManageHotPatch
0x0B 00007FF9B9CF18A0 ZwManagePartition
0x0C 00007FF9B9CF18C0 ZwMapCMFModule
0x0D 00007FF9B9CF18E0 ZwMapUserPhysicalPages
0x03 00007FF9B9CEF7B0 ZwMapUserPhysicalPagesScatter
0x28 00007FF9B9CEFC50 ZwMapViewOfSection
0x0E 00007FF9B9CF1900 ZwMapViewOfSectionEx
0x0F 00007FF9B9CF1920 ZwModifyBootEntry
0x10 00007FF9B9CF1940 ZwModifyDriverEntry
0x11 00007FF9B9CF1960 ZwNotifyChangeDirectoryFile
0x12 00007FF9B9CF1980 ZwNotifyChangeDirectoryFileEx
0x13 00007FF9B9CF19A0 ZwNotifyChangeKey
0x14 00007FF9B9CF19C0 ZwNotifyChangeMultipleKeys
0x15 00007FF9B9CF19E0 ZwNotifyChangeSession
0x58 00007FF9B9CF0250 ZwOpenDirectoryObject
0x16 00007FF9B9CF1A00 ZwOpenEnlistment
0x40 00007FF9B9CEFF50 ZwOpenEvent
0x17 00007FF9B9CF1A20 ZwOpenEventPair
0x33 00007FF9B9CEFDB0 ZwOpenFile
0x18 00007FF9B9CF1A40 ZwOpenIoCompletion
0x19 00007FF9B9CF1A60 ZwOpenJobObject
0x12 00007FF9B9CEF990 ZwOpenKey
0x1A 00007FF9B9CF1A80 ZwOpenKeyEx
0x1B 00007FF9B9CF1AA0 ZwOpenKeyTransacted
0x1C 00007FF9B9CF1AC0 ZwOpenKeyTransactedEx
0x1D 00007FF9B9CF1AE0 ZwOpenKeyedEvent
0x1E 00007FF9B9CF1B00 ZwOpenMutant
0x1F 00007FF9B9CF1B20 ZwOpenObjectAuditAlarm
0x20 00007FF9B9CF1B40 ZwOpenPartition
0x21 00007FF9B9CF1B60 ZwOpenPrivateNamespace
0x26 00007FF9B9CEFC10 ZwOpenProcess
0x22 00007FF9B9CF1B80 ZwOpenProcessToken
0x30 00007FF9B9CEFD50 ZwOpenProcessTokenEx
0x23 00007FF9B9CF1BA0 ZwOpenRegistryTransaction
0x24 00007FF9B9CF1BC0 ZwOpenResourceManager
0x37 00007FF9B9CEFE30 ZwOpenSection
0x25 00007FF9B9CF1BE0 ZwOpenSemaphore
0x26 00007FF9B9CF1C00 ZwOpenSession
0x27 00007FF9B9CF1C20 ZwOpenSymbolicLinkObject
0x28 00007FF9B9CF1C40 ZwOpenThread
0x24 00007FF9B9CEFBD0 ZwOpenThreadToken
0x2F 00007FF9B9CEFD30 ZwOpenThreadTokenEx
0x29 00007FF9B9CF1C60 ZwOpenTimer
0x2A 00007FF9B9CF1C80 ZwOpenTransaction
0x2B 00007FF9B9CF1CA0 ZwOpenTransactionManager
0x2C 00007FF9B9CF1CC0 ZwPlugPlayControl
0x5F 00007FF9B9CF0320 ZwPowerInformation
0x2D 00007FF9B9CF1CE0 ZwPrePrepareComplete
0x2E 00007FF9B9CF1D00 ZwPrePrepareEnlistment
0x2F 00007FF9B9CF1D20 ZwPrepareComplete
0x30 00007FF9B9CF1D40 ZwPrepareEnlistment
0x31 00007FF9B9CF1D60 ZwPrivilegeCheck
0x32 00007FF9B9CF1D80 ZwPrivilegeObjectAuditAlarm
0x33 00007FF9B9CF1DA0 ZwPrivilegedServiceAuditAlarm
0x34 00007FF9B9CF1DC0 ZwPropagationComplete
0x35 00007FF9B9CF1DE0 ZwPropagationFailed
0x50 00007FF9B9CF0150 ZwProtectVirtualMemory
0x36 00007FF9B9CF1E00 ZwPulseEvent
0x3D 00007FF9B9CEFEF0 ZwQueryAttributesFile
0x37 00007FF9B9CF1E20 ZwQueryAuxiliaryCounterFrequency
0x38 00007FF9B9CF1E40 ZwQueryBootEntryOrder
0x39 00007FF9B9CF1E60 ZwQueryBootOptions
0x3A 00007FF9B9CF1E80 ZwQueryDebugFilterState
0x15 00007FF9B9CEF9F0 ZwQueryDefaultLocale
0x44 00007FF9B9CEFFD0 ZwQueryDefaultUILanguage
0x35 00007FF9B9CEFDF0 ZwQueryDirectoryFile
0x3B 00007FF9B9CF1EA0 ZwQueryDirectoryFileEx
0x3C 00007FF9B9CF1EC0 ZwQueryDirectoryObject
0x3D 00007FF9B9CF1EE0 ZwQueryDriverEntryOrder
0x3E 00007FF9B9CF1F00 ZwQueryEaFile
0x56 00007FF9B9CF0210 ZwQueryEvent
0x3F 00007FF9B9CF1F20 ZwQueryFullAttributesFile
0x40 00007FF9B9CF1F40 ZwQueryInformationAtom
0x41 00007FF9B9CF1F60 ZwQueryInformationByName
0x42 00007FF9B9CF1F80 ZwQueryInformationEnlistment
0x11 00007FF9B9CEF970 ZwQueryInformationFile
0x43 00007FF9B9CF1FA0 ZwQueryInformationJobObject
0x44 00007FF9B9CF1FC0 ZwQueryInformationPort
0x19 00007FF9B9CEFA70 ZwQueryInformationProcess
0x45 00007FF9B9CF1FE0 ZwQueryInformationResourceManager
0x25 00007FF9B9CEFBF0 ZwQueryInformationThread
0x21 00007FF9B9CEFB70 ZwQueryInformationToken
0x46 00007FF9B9CF2000 ZwQueryInformationTransaction
0x47 00007FF9B9CF2020 ZwQueryInformationTransactionManager
0x48 00007FF9B9CF2040 ZwQueryInformationWorkerFactory
0x49 00007FF9B9CF2060 ZwQueryInstallUILanguage
0x4A 00007FF9B9CF2080 ZwQueryIntervalProfile
0x4B 00007FF9B9CF20A0 ZwQueryIoCompletion
0x16 00007FF9B9CEFA10 ZwQueryKey
0x4C 00007FF9B9CF20C0 ZwQueryLicenseValue
0x4D 00007FF9B9CF20E0 ZwQueryMultipleValueKey
0x4E 00007FF9B9CF2100 ZwQueryMutant
0x10 00007FF9B9CEF950 ZwQueryObject
0x4F 00007FF9B9CF2120 ZwQueryOpenSubKeys
0x50 00007FF9B9CF2140 ZwQueryOpenSubKeysEx
0x31 00007FF9B9CEFD70 ZwQueryPerformanceCounter
0x51 00007FF9B9CF2160 ZwQueryPortInformationProcess
0x52 00007FF9B9CF2180 ZwQueryQuotaInformationFile
0x51 00007FF9B9CF0170 ZwQuerySection
0x53 00007FF9B9CF21A0 ZwQuerySecurityAttributesToken
0x54 00007FF9B9CF21C0 ZwQuerySecurityObject
0x55 00007FF9B9CF21E0 ZwQuerySecurityPolicy
0x56 00007FF9B9CF2200 ZwQuerySemaphore
0x57 00007FF9B9CF2220 ZwQuerySymbolicLinkObject
0x58 00007FF9B9CF2240 ZwQuerySystemEnvironmentValue
0x59 00007FF9B9CF2260 ZwQuerySystemEnvironmentValueEx
0x36 00007FF9B9CEFE10 ZwQuerySystemInformation
0x5A 00007FF9B9CF2280 ZwQuerySystemInformationEx
0x38 00007FF9B9CEFE50 ZwQueryTimer
0x5B 00007FF9B9CF22A0 ZwQueryTimerResolution
0x17 00007FF9B9CEFA30 ZwQueryValueKey
0x23 00007FF9B9CEFBB0 ZwQueryVirtualMemory
0x49 00007FF9B9CF0070 ZwQueryVolumeInformationFile
0x5C 00007FF9B9CF22C0 ZwQueryWnfStateData
0x5D 00007FF9B9CF22E0 ZwQueryWnfStateNameInformation
0x45 00007FF9B9CEFFF0 ZwQueueApcThread
0x5E 00007FF9B9CF2300 ZwQueueApcThreadEx
0x5F 00007FF9B9CF2320 ZwRaiseException
0x60 00007FF9B9CF2340 ZwRaiseHardError
0x06 00007FF9B9CEF810 ZwReadFile
0x2E 00007FF9B9CEFD10 ZwReadFileScatter
0x61 00007FF9B9CF2360 ZwReadOnlyEnlistment
0x54 00007FF9B9CF01D0 ZwReadRequestData
0x3F 00007FF9B9CEFF30 ZwReadVirtualMemory
0x62 00007FF9B9CF2380 ZwRecoverEnlistment
0x63 00007FF9B9CF23A0 ZwRecoverResourceManager
0x64 00007FF9B9CF23C0 ZwRecoverTransactionManager
0x65 00007FF9B9CF23E0 ZwRegisterProtocolAddressInformation
0x66 00007FF9B9CF2400 ZwRegisterThreadTerminatePort
0x67 00007FF9B9CF2420 ZwReleaseKeyedEvent
0x20 00007FF9B9CEFB50 ZwReleaseMutant
0x0A 00007FF9B9CEF890 ZwReleaseSemaphore
0x68 00007FF9B9CF2440 ZwReleaseWorkerFactoryWorker
0x09 00007FF9B9CEF870 ZwRemoveIoCompletion
0x69 00007FF9B9CF2460 ZwRemoveIoCompletionEx
0x6A 00007FF9B9CF2480 ZwRemoveProcessDebug
0x6B 00007FF9B9CF24A0 ZwRenameKey
0x6C 00007FF9B9CF24C0 ZwRenameTransactionManager
0x6D 00007FF9B9CF24E0 ZwReplaceKey
0x6E 00007FF9B9CF2500 ZwReplacePartitionUnit
0x0C 00007FF9B9CEF8D0 ZwReplyPort
0x0B 00007FF9B9CEF8B0 ZwReplyWaitReceivePort
0x2B 00007FF9B9CEFCB0 ZwReplyWaitReceivePortEx
0x6F 00007FF9B9CF2520 ZwReplyWaitReplyPort
0x70 00007FF9B9CF2540 ZwRequestPort
0x22 00007FF9B9CEFB90 ZwRequestWaitReplyPort
0x71 00007FF9B9CF2560 ZwResetEvent
0x72 00007FF9B9CF2580 ZwResetWriteWatch
0x73 00007FF9B9CF25A0 ZwRestoreKey
0x74 00007FF9B9CF25C0 ZwResumeProcess
0x52 00007FF9B9CF0190 ZwResumeThread
0x75 00007FF9B9CF25E0 ZwRevertContainerImpersonation
0x76 00007FF9B9CF2600 ZwRollbackComplete
0x77 00007FF9B9CF2620 ZwRollbackEnlistment
0x78 00007FF9B9CF2640 ZwRollbackRegistryTransaction
0x79 00007FF9B9CF2660 ZwRollbackTransaction
0x7A 00007FF9B9CF2680 ZwRollforwardTransactionManager
0x7B 00007FF9B9CF26A0 ZwSaveKey
0x7C 00007FF9B9CF26C0 ZwSaveKeyEx
0x7D 00007FF9B9CF26E0 ZwSaveMergedKeys
0x7E 00007FF9B9CF2700 ZwSecureConnectPort
0x7F 00007FF9B9CF2720 ZwSerializeBoot
0x80 00007FF9B9CF2740 ZwSetBootEntryOrder
0x81 00007FF9B9CF2760 ZwSetBootOptions
0x82 00007FF9B9CF2780 ZwSetCachedSigningLevel
0x83 00007FF9B9CF27A0 ZwSetCachedSigningLevel2
0x84 00007FF9B9CF27C0 ZwSetContextThread
0x85 00007FF9B9CF27E0 ZwSetDebugFilterState
0x86 00007FF9B9CF2800 ZwSetDefaultHardErrorPort
0x87 00007FF9B9CF2820 ZwSetDefaultLocale
0x88 00007FF9B9CF2840 ZwSetDefaultUILanguage
0x89 00007FF9B9CF2860 ZwSetDriverEntryOrder
0x8A 00007FF9B9CF2880 ZwSetEaFile
0x0E 00007FF9B9CEF910 ZwSetEvent
0x2D 00007FF9B9CEFCF0 ZwSetEventBoostPriority
0x8B 00007FF9B9CF28A0 ZwSetHighEventPair
0x8C 00007FF9B9CF28C0 ZwSetHighWaitLowEventPair
0x8D 00007FF9B9CF28E0 ZwSetIRTimer
0x8E 00007FF9B9CF2900 ZwSetInformationDebugObject
0x8F 00007FF9B9CF2920 ZwSetInformationEnlistment
0x27 00007FF9B9CEFC30 ZwSetInformationFile
0x90 00007FF9B9CF2940 ZwSetInformationJobObject
0x91 00007FF9B9CF2960 ZwSetInformationKey
0x5C 00007FF9B9CF02C0 ZwSetInformationObject
0x1C 00007FF9B9CEFAD0 ZwSetInformationProcess
0x92 00007FF9B9CF2980 ZwSetInformationResourceManager
0x93 00007FF9B9CF29A0 ZwSetInformationSymbolicLink
0x0D 00007FF9B9CEF8F0 ZwSetInformationThread
0x94 00007FF9B9CF29C0 ZwSetInformationToken
0x95 00007FF9B9CF29E0 ZwSetInformationTransaction
0x96 00007FF9B9CF2A00 ZwSetInformationTransactionManager
0x97 00007FF9B9CF2A20 ZwSetInformationVirtualMemory
0x98 00007FF9B9CF2A40 ZwSetInformationWorkerFactory
0x99 00007FF9B9CF2A60 ZwSetIntervalProfile
0x9A 00007FF9B9CF2A80 ZwSetIoCompletion
0x9B 00007FF9B9CF2AA0 ZwSetIoCompletionEx
0x9C 00007FF9B9CF2AC0 ZwSetLdtEntries
0x9D 00007FF9B9CF2AE0 ZwSetLowEventPair
0x9E 00007FF9B9CF2B00 ZwSetLowWaitHighEventPair
0x9F 00007FF9B9CF2B20 ZwSetQuotaInformationFile
0xA0 00007FF9B9CF2B40 ZwSetSecurityObject
0xA1 00007FF9B9CF2B60 ZwSetSystemEnvironmentValue
0xA2 00007FF9B9CF2B80 ZwSetSystemEnvironmentValueEx
0xA3 00007FF9B9CF2BA0 ZwSetSystemInformation
0xA4 00007FF9B9CF2BC0 ZwSetSystemPowerState
0xA5 00007FF9B9CF2BE0 ZwSetSystemTime
0xA6 00007FF9B9CF2C00 ZwSetThreadExecutionState
0x62 00007FF9B9CF0380 ZwSetTimer
0xA7 00007FF9B9CF2C20 ZwSetTimer2
0xA8 00007FF9B9CF2C40 ZwSetTimerEx
0xA9 00007FF9B9CF2C60 ZwSetTimerResolution
0xAA 00007FF9B9CF2C80 ZwSetUuidSeed
0x60 00007FF9B9CF0340 ZwSetValueKey
0xAB 00007FF9B9CF2CA0 ZwSetVolumeInformationFile
0xAC 00007FF9B9CF2CC0 ZwSetWnfProcessNotificationEvent
0xAD 00007FF9B9CF2CE0 ZwShutdownSystem
0xAE 00007FF9B9CF2D00 ZwShutdownWorkerFactory
0xAF 00007FF9B9CF2D20 ZwSignalAndWaitForSingleObject
0xB0 00007FF9B9CF2D40 ZwSinglePhaseReject
0xB1 00007FF9B9CF2D60 ZwStartProfile
0xB2 00007FF9B9CF2D80 ZwStopProfile
0xB3 00007FF9B9CF2DA0 ZwSubscribeWnfStateChange
0xB4 00007FF9B9CF2DC0 ZwSuspendProcess
0xB5 00007FF9B9CF2DE0 ZwSuspendThread
0xB6 00007FF9B9CF2E00 ZwSystemDebugControl
0xB7 00007FF9B9CF2E20 ZwTerminateEnclave
0xB8 00007FF9B9CF2E40 ZwTerminateJobObject
0x2C 00007FF9B9CEFCD0 ZwTerminateProcess
0x53 00007FF9B9CF01B0 ZwTerminateThread
0xB9 00007FF9B9CF2E60 ZwTestAlert
0xBA 00007FF9B9CF2E80 ZwThawRegistry
0xBB 00007FF9B9CF2EA0 ZwThawTransactions
0xBC 00007FF9B9CF2EC0 ZwTraceControl
0x5E 00007FF9B9CF0300 ZwTraceEvent
0xBD 00007FF9B9CF2EE0 ZwTranslateFilePath
0xBE 00007FF9B9CF2F00 ZwUmsThreadYield
0xBF 00007FF9B9CF2F20 ZwUnloadDriver
0xC0 00007FF9B9CF2F40 ZwUnloadKey
0xC1 00007FF9B9CF2F60 ZwUnloadKey2
0xC2 00007FF9B9CF2F80 ZwUnloadKeyEx
0xC3 00007FF9B9CF2FA0 ZwUnlockFile
0xC4 00007FF9B9CF2FC0 ZwUnlockVirtualMemory
0x2A 00007FF9B9CEFC90 ZwUnmapViewOfSection
0xC5 00007FF9B9CF2FE0 ZwUnmapViewOfSectionEx
0xC6 00007FF9B9CF3000 ZwUnsubscribeWnfStateChange
0xC7 00007FF9B9CF3020 ZwUpdateWnfStateData
0xC8 00007FF9B9CF3040 ZwVdmControl
0xC9 00007FF9B9CF3060 ZwWaitForAlertByThreadId
0xCA 00007FF9B9CF3080 ZwWaitForDebugEvent
0xCB 00007FF9B9CF30A0 ZwWaitForKeyedEvent
0x5B 00007FF9B9CF02A0 ZwWaitForMultipleObjects
0x1A 00007FF9B9CEFA90 ZwWaitForMultipleObjects32
0x04 00007FF9B9CEF7D0 ZwWaitForSingleObject
0xCC 00007FF9B9CF30C0 ZwWaitForWorkViaWorkerFactory
0xCD 00007FF9B9CF30E0 ZwWaitHighEventPair
0xCE 00007FF9B9CF3100 ZwWaitLowEventPair
0x01 00007FF9B9CEF770 ZwWorkerFactoryWorkerReady
0x08 00007FF9B9CEF850 ZwWriteFile
0x1B 00007FF9B9CEFAB0 ZwWriteFileGather
0x57 00007FF9B9CF0230 ZwWriteRequestData
0x3A 00007FF9B9CEFE90 ZwWriteVirtualMemory
0x46 00007FF9B9CF0010 ZwYieldExecution
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Кстати тоже написал тулзу, которая делает дамп номеров сисколов, это потом можно использовать для получения номера сискола в ntdll, вот-что на моей системе получилось
Ну просто находишь mov eax, <dword>, это дворд, следующий за байтом 0xb8, так?
 
Ну просто находишь mov eax, <dword>, это дворд, следующий за байтом 0xb8, так?
Ну-да, там очень просто всё оказалось, прям на удивление легко...

Нахожу:
Код:
mov r10, rcx

Это опкоды:
4C 8B D1

Далее за ними и будет номер сискола, т.е:
Код:
mov eax, number_syscall

Если интересно, вот функция поиска сискола по названию API:
C:
static unsigned char GetSysCallNumber(uintptr_t module, char *name_api)
{
    unsigned char call_number = 0;
    PIMAGE_DOS_HEADER pDosHeader = (PIMAGE_DOS_HEADER) module;
    PIMAGE_NT_HEADERS pNtHeader = (PIMAGE_NT_HEADERS)((LPBYTE)pDosHeader + pDosHeader->e_lfanew);

    if (pDosHeader->e_magic != IMAGE_DOS_SIGNATURE || pNtHeader->Signature != IMAGE_NT_SIGNATURE)
    {
        printf("+++ Error header\n");
        return -1;
    }

    PIMAGE_EXPORT_DIRECTORY pExportDirectory = (PIMAGE_EXPORT_DIRECTORY)((LPBYTE)pDosHeader + pNtHeader->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress);
    if (!pExportDirectory)
    {
        printf("+++ Error export dir\n");
        return -1;
    }

    PDWORD dwAddress = (PDWORD)((LPBYTE)pDosHeader + pExportDirectory->AddressOfFunctions);
    PDWORD dwName = (PDWORD)((LPBYTE)pDosHeader + pExportDirectory->AddressOfNames);
    PWORD dwOrdinal = (PWORD)((LPBYTE)pDosHeader + pExportDirectory->AddressOfNameOrdinals);

    unsigned char pBuf[32] = { 0 };
    const unsigned char pSig[4] = { 0x4C, 0x8B, 0xD1, 0xB8 };

    for (DWORD i = 0; i < pExportDirectory->NumberOfFunctions; i++)
    {
        memset(&pBuf, 0, 32);
        PVOID pAddr = (PVOID)((LPBYTE)pDosHeader + dwAddress[dwOrdinal[i]]);
        char* szName = (char*)pDosHeader + dwName[i];

        memcpy(&pBuf, pAddr, 32);

        if (!pAddr || !szName)
            break;

        for (int x = 0; x < sizeof(pSig); x++)
        {
            if (pBuf[x] != pSig[x])
                break;

            if (x == sizeof(pSig) - 1) {
                if (!strcmp(name_api, szName))
                {
                    call_number = pBuf[4];
                    break;
                }
            }
        }
    }

    return call_number;
}

Я уже написал проект, который создаёт файлик, напишу ещё пару функций и выложу в гит, как пример и дополнение к данной статье.

Ну и ждём от тебя тогда статьи...

Я статью не буду писать, т.к. особо нечего сказать более, описание проекта сделаю и всё.)
 
если интересно будет, то погоняйте на своих антивирусах и закиньте результат сюда.
Аваст:

Код:
Z:\>cmd.exe
Microsoft Windows [Version 10.0.17763.1158]
(c) Корпорация Майкрософт (Microsoft Corporation), 2018. Все права защищены.

Z:\>analyze64.exe
Original KiUserInvertedFunctionTable:
00000000`02308510 0100            add     dword ptr [rax],eax

Changed KiUserInvertedFunctionTable:
00007ffa`870684d0 2000            and     byte ptr [rax],al


Original LdrLoadDll:
00000000`021dec20 48895c2410      mov     qword ptr [rsp+10h],rbx
00000000`021dec25 56              push    rsi

Changed LdrLoadDll:
00007ffa`86f357e0 e9d3ae03c0      jmp     00007ffa`46f706b8
00007ffa`86f357e5 cc              int     3


Original NtCreateEvent:
00000000`02239490 4c8bd1          mov     r10,rcx
00000000`02239493 b848000000      mov     eax,48h

Changed NtCreateEvent:
00007ffa`86f90050 e9a302febf      jmp     00007ffa`46f702f8
00007ffa`86f90055 cc              int     3
00007ffa`86f90056 cc              int     3
00007ffa`86f90057 cc              int     3


Original NtCreateMutant:
00000000`0223a140 4c8bd1          mov     r10,rcx
00000000`0223a143 b8ae000000      mov     eax,0AEh

Changed NtCreateMutant:
00007ffa`86f90d00 e953f6fdbf      jmp     00007ffa`46f70358
00007ffa`86f90d05 cc              int     3
00007ffa`86f90d06 cc              int     3
00007ffa`86f90d07 cc              int     3


Original NtCreateSection:
00000000`022394d0 4c8bd1          mov     r10,rcx
00000000`022394d3 b84a000000      mov     eax,4Ah

Changed NtCreateSection:
00007ffa`86f90090 e98306febf      jmp     00007ffa`46f70718
00007ffa`86f90095 cc              int     3
00007ffa`86f90096 cc              int     3
00007ffa`86f90097 cc              int     3


Original NtCreateSemaphore:
00000000`0223a2c0 4c8bd1          mov     r10,rcx
00000000`0223a2c3 b8ba000000      mov     eax,0BAh

Changed NtCreateSemaphore:
00007ffa`86f90e80 e933f5fdbf      jmp     00007ffa`46f703b8
00007ffa`86f90e85 cc              int     3
00007ffa`86f90e86 cc              int     3
00007ffa`86f90e87 cc              int     3


Original NtCreateUserProcess:
00000000`0223a3e0 4c8bd1          mov     r10,rcx
00000000`0223a3e3 b8c3000000      mov     eax,0C3h

Changed NtCreateUserProcess:
00007ffa`86f90fa0 e973f4fdbf      jmp     00007ffa`46f70418
00007ffa`86f90fa5 cc              int     3
00007ffa`86f90fa6 cc              int     3
00007ffa`86f90fa7 cc              int     3


Original NtMapViewOfSection:
00000000`02239090 4c8bd1          mov     r10,rcx
00000000`02239093 b828000000      mov     eax,28h

Changed NtMapViewOfSection:
00007ffa`86f8fc50 e9e305febf      jmp     00007ffa`46f70238
00007ffa`86f8fc55 cc              int     3
00007ffa`86f8fc56 cc              int     3
00007ffa`86f8fc57 cc              int     3


Original NtOpenEvent:
00000000`02239390 4c8bd1          mov     r10,rcx
00000000`02239393 b840000000      mov     eax,40h

Changed NtOpenEvent:
00007ffa`86f8ff50 e92305febf      jmp     00007ffa`46f70478
00007ffa`86f8ff55 cc              int     3
00007ffa`86f8ff56 cc              int     3
00007ffa`86f8ff57 cc              int     3


Original NtOpenMutant:
00000000`0223af40 4c8bd1          mov     r10,rcx
00000000`0223af43 b81e010000      mov     eax,11Eh

Changed NtOpenMutant:
00007ffa`86f91b00 e9d3e9fdbf      jmp     00007ffa`46f704d8
00007ffa`86f91b05 cc              int     3
00007ffa`86f91b06 cc              int     3
00007ffa`86f91b07 cc              int     3


Original NtOpenSection:
00000000`02239270 4c8bd1          mov     r10,rcx
00000000`02239273 b837000000      mov     eax,37h

Changed NtOpenSection:
00007ffa`86f8fe30 e94309febf      jmp     00007ffa`46f70778
00007ffa`86f8fe35 cc              int     3
00007ffa`86f8fe36 cc              int     3
00007ffa`86f8fe37 cc              int     3


Original NtOpenSemaphore:
00000000`0223b020 4c8bd1          mov     r10,rcx
00000000`0223b023 b825010000      mov     eax,125h

Changed NtOpenSemaphore:
00007ffa`86f91be0 e953e9fdbf      jmp     00007ffa`46f70538
00007ffa`86f91be5 cc              int     3
00007ffa`86f91be6 cc              int     3
00007ffa`86f91be7 cc              int     3


Original NtOpenThread:
00000000`0223b080 4c8bd1          mov     r10,rcx
00000000`0223b083 b828010000      mov     eax,128h

Changed NtOpenThread:
00007ffa`86f91c40 e993ebfdbf      jmp     00007ffa`46f707d8
00007ffa`86f91c45 cc              int     3
00007ffa`86f91c46 cc              int     3
00007ffa`86f91c47 cc              int     3


Original NtProtectVirtualMemory:
00000000`02239590 4c8bd1          mov     r10,rcx
00000000`02239593 b850000000      mov     eax,50h

Changed NtProtectVirtualMemory:
00007ffa`86f90150 e98300febf      jmp     00007ffa`46f701d8
00007ffa`86f90155 cc              int     3
00007ffa`86f90156 cc              int     3
00007ffa`86f90157 cc              int     3


Original NtQueryInformationProcess:
00000000`02238eb0 4c8bd1          mov     r10,rcx
00000000`02238eb3 b819000000      mov     eax,19h

Changed NtQueryInformationProcess:
00007ffa`86f8fa70 e9e30bfebf      jmp     00007ffa`46f70658
00007ffa`86f8fa75 cc              int     3
00007ffa`86f8fa76 cc              int     3
00007ffa`86f8fa77 cc              int     3


Original NtResumeThread:
00000000`022395d0 4c8bd1          mov     r10,rcx
00000000`022395d3 b852000000      mov     eax,52h

Changed NtResumeThread:
00007ffa`86f90190 e90301febf      jmp     00007ffa`46f70298
00007ffa`86f90195 cc              int     3
00007ffa`86f90196 cc              int     3
00007ffa`86f90197 cc              int     3


Original NtSuspendProcess:
00000000`0223c200 4c8bd1          mov     r10,rcx
00000000`0223c203 b8b4010000      mov     eax,1B4h

Changed NtSuspendProcess:
00007ffa`86f92dc0 e9d3dafdbf      jmp     00007ffa`46f70898
00007ffa`86f92dc5 cc              int     3
00007ffa`86f92dc6 cc              int     3
00007ffa`86f92dc7 cc              int     3


Original NtTerminateProcess:
00000000`02239110 4c8bd1          mov     r10,rcx
00000000`02239113 b82c000000      mov     eax,2Ch

Changed NtTerminateProcess:
00007ffa`86f8fcd0 e9630bfebf      jmp     00007ffa`46f70838
00007ffa`86f8fcd5 cc              int     3
00007ffa`86f8fcd6 cc              int     3
00007ffa`86f8fcd7 cc              int     3


Original NtWriteVirtualMemory:
00000000`022392d0 4c8bd1          mov     r10,rcx
00000000`022392d3 b83a000000      mov     eax,3Ah

Changed NtWriteVirtualMemory:
00007ffa`86f8fe90 e9e302febf      jmp     00007ffa`46f70178
00007ffa`86f8fe95 cc              int     3
00007ffa`86f8fe96 cc              int     3
00007ffa`86f8fe97 cc              int     3


Original RtlDecompressBuffer:
00000000`0228dcd0 48895c2408      mov     qword ptr [rsp+8],rbx
00000000`0228dcd5 57              push    rdi

Changed RtlDecompressBuffer:
00007ffa`86fe4890 e903bdf8bf      jmp     00007ffa`46f70598
00007ffa`86fe4895 cc              int     3


Original RtlQueryEnvironmentVariable:
00000000`021dd1b0 4c8bdc          mov     r11,rsp
00000000`021dd1b3 49895b08        mov     qword ptr [r11+8],rbx

Changed RtlQueryEnvironmentVariable:
00007ffa`86f33d70 e983c803c0      jmp     00007ffa`46f705f8
00007ffa`86f33d75 cc              int     3
00007ffa`86f33d76 cc              int     3


Original ZwCreateEvent:
00000000`02239490 4c8bd1          mov     r10,rcx
00000000`02239493 b848000000      mov     eax,48h

Changed ZwCreateEvent:
00007ffa`86f90050 e9a302febf      jmp     00007ffa`46f702f8
00007ffa`86f90055 cc              int     3
00007ffa`86f90056 cc              int     3
00007ffa`86f90057 cc              int     3


Original ZwCreateMutant:
00000000`0223a140 4c8bd1          mov     r10,rcx
00000000`0223a143 b8ae000000      mov     eax,0AEh

Changed ZwCreateMutant:
00007ffa`86f90d00 e953f6fdbf      jmp     00007ffa`46f70358
00007ffa`86f90d05 cc              int     3
00007ffa`86f90d06 cc              int     3
00007ffa`86f90d07 cc              int     3


Original ZwCreateSection:
00000000`022394d0 4c8bd1          mov     r10,rcx
00000000`022394d3 b84a000000      mov     eax,4Ah

Changed ZwCreateSection:
00007ffa`86f90090 e98306febf      jmp     00007ffa`46f70718
00007ffa`86f90095 cc              int     3
00007ffa`86f90096 cc              int     3
00007ffa`86f90097 cc              int     3


Original ZwCreateSemaphore:
00000000`0223a2c0 4c8bd1          mov     r10,rcx
00000000`0223a2c3 b8ba000000      mov     eax,0BAh

Changed ZwCreateSemaphore:
00007ffa`86f90e80 e933f5fdbf      jmp     00007ffa`46f703b8
00007ffa`86f90e85 cc              int     3
00007ffa`86f90e86 cc              int     3
00007ffa`86f90e87 cc              int     3


Original ZwCreateUserProcess:
00000000`0223a3e0 4c8bd1          mov     r10,rcx
00000000`0223a3e3 b8c3000000      mov     eax,0C3h

Changed ZwCreateUserProcess:
00007ffa`86f90fa0 e973f4fdbf      jmp     00007ffa`46f70418
00007ffa`86f90fa5 cc              int     3
00007ffa`86f90fa6 cc              int     3
00007ffa`86f90fa7 cc              int     3


Original ZwMapViewOfSection:
00000000`02239090 4c8bd1          mov     r10,rcx
00000000`02239093 b828000000      mov     eax,28h

Changed ZwMapViewOfSection:
00007ffa`86f8fc50 e9e305febf      jmp     00007ffa`46f70238
00007ffa`86f8fc55 cc              int     3
00007ffa`86f8fc56 cc              int     3
00007ffa`86f8fc57 cc              int     3


Original ZwOpenEvent:
00000000`02239390 4c8bd1          mov     r10,rcx
00000000`02239393 b840000000      mov     eax,40h

Changed ZwOpenEvent:
00007ffa`86f8ff50 e92305febf      jmp     00007ffa`46f70478
00007ffa`86f8ff55 cc              int     3
00007ffa`86f8ff56 cc              int     3
00007ffa`86f8ff57 cc              int     3


Original ZwOpenMutant:
00000000`0223af40 4c8bd1          mov     r10,rcx
00000000`0223af43 b81e010000      mov     eax,11Eh

Changed ZwOpenMutant:
00007ffa`86f91b00 e9d3e9fdbf      jmp     00007ffa`46f704d8
00007ffa`86f91b05 cc              int     3
00007ffa`86f91b06 cc              int     3
00007ffa`86f91b07 cc              int     3


Original ZwOpenSection:
00000000`02239270 4c8bd1          mov     r10,rcx
00000000`02239273 b837000000      mov     eax,37h

Changed ZwOpenSection:
00007ffa`86f8fe30 e94309febf      jmp     00007ffa`46f70778
00007ffa`86f8fe35 cc              int     3
00007ffa`86f8fe36 cc              int     3
00007ffa`86f8fe37 cc              int     3


Original ZwOpenSemaphore:
00000000`0223b020 4c8bd1          mov     r10,rcx
00000000`0223b023 b825010000      mov     eax,125h

Changed ZwOpenSemaphore:
00007ffa`86f91be0 e953e9fdbf      jmp     00007ffa`46f70538
00007ffa`86f91be5 cc              int     3
00007ffa`86f91be6 cc              int     3
00007ffa`86f91be7 cc              int     3


Original ZwOpenThread:
00000000`0223b080 4c8bd1          mov     r10,rcx
00000000`0223b083 b828010000      mov     eax,128h

Changed ZwOpenThread:
00007ffa`86f91c40 e993ebfdbf      jmp     00007ffa`46f707d8
00007ffa`86f91c45 cc              int     3
00007ffa`86f91c46 cc              int     3
00007ffa`86f91c47 cc              int     3


Original ZwProtectVirtualMemory:
00000000`02239590 4c8bd1          mov     r10,rcx
00000000`02239593 b850000000      mov     eax,50h

Changed ZwProtectVirtualMemory:
00007ffa`86f90150 e98300febf      jmp     00007ffa`46f701d8
00007ffa`86f90155 cc              int     3
00007ffa`86f90156 cc              int     3
00007ffa`86f90157 cc              int     3


Original ZwQueryInformationProcess:
00000000`02238eb0 4c8bd1          mov     r10,rcx
00000000`02238eb3 b819000000      mov     eax,19h

Changed ZwQueryInformationProcess:
00007ffa`86f8fa70 e9e30bfebf      jmp     00007ffa`46f70658
00007ffa`86f8fa75 cc              int     3
00007ffa`86f8fa76 cc              int     3
00007ffa`86f8fa77 cc              int     3


Original ZwResumeThread:
00000000`022395d0 4c8bd1          mov     r10,rcx
00000000`022395d3 b852000000      mov     eax,52h

Changed ZwResumeThread:
00007ffa`86f90190 e90301febf      jmp     00007ffa`46f70298
00007ffa`86f90195 cc              int     3
00007ffa`86f90196 cc              int     3
00007ffa`86f90197 cc              int     3


Original ZwSuspendProcess:
00000000`0223c200 4c8bd1          mov     r10,rcx
00000000`0223c203 b8b4010000      mov     eax,1B4h

Changed ZwSuspendProcess:
00007ffa`86f92dc0 e9d3dafdbf      jmp     00007ffa`46f70898
00007ffa`86f92dc5 cc              int     3
00007ffa`86f92dc6 cc              int     3
00007ffa`86f92dc7 cc              int     3


Original ZwTerminateProcess:
00000000`02239110 4c8bd1          mov     r10,rcx
00000000`02239113 b82c000000      mov     eax,2Ch

Changed ZwTerminateProcess:
00007ffa`86f8fcd0 e9630bfebf      jmp     00007ffa`46f70838
00007ffa`86f8fcd5 cc              int     3
00007ffa`86f8fcd6 cc              int     3
00007ffa`86f8fcd7 cc              int     3


Original ZwWriteVirtualMemory:
00000000`022392d0 4c8bd1          mov     r10,rcx
00000000`022392d3 b83a000000      mov     eax,3Ah

Changed ZwWriteVirtualMemory:
00007ffa`86f8fe90 e9e302febf      jmp     00007ffa`46f70178
00007ffa`86f8fe95 cc              int     3
00007ffa`86f8fe96 cc              int     3
00007ffa`86f8fe97 cc              int     3



Z:\>
Z:\>analyze32.exe
Original LdrLoadDll:
024577a0 8bff            mov     edi,edi
024577a2 55              push    ebp
024577a3 8bec            mov     ebp,esp

Changed LdrLoadDll:
76edd380 e9db6451fc      jmp     aswhook+0x3860 (733f3860)


Original NtCreateEvent:
0247af20 b848000000      mov     eax,48h

Changed NtCreateEvent:
76f00b00 e9bb254ffc      jmp     aswhook+0x30c0 (733f30c0)


Original NtCreateMutant:
0247b580 b8ae000000      mov     eax,0AEh

Changed NtCreateMutant:
76f01160 e99b1f4ffc      jmp     aswhook+0x3100 (733f3100)


Original NtCreateSection:
0247af40 b84a000000      mov     eax,4Ah

Changed NtCreateSection:
76f00b20 e9ab2e4ffc      jmp     aswhook+0x39d0 (733f39d0)


Original NtCreateSemaphore:
0247b640 b8ba000000      mov     eax,0BAh

Changed NtCreateSemaphore:
76f01220 e91b1f4ffc      jmp     aswhook+0x3140 (733f3140)


Original NtCreateUserProcess:
0247b6d0 b8c3000000      mov     eax,0C3h

Changed NtCreateUserProcess:
76f012b0 e9cb1e4ffc      jmp     aswhook+0x3180 (733f3180)


Original NtMapViewOfSection:
0247ad20 b828000000      mov     eax,28h

Changed NtMapViewOfSection:
76f00900 e94b224ffc      jmp     aswhook+0x2b50 (733f2b50)


Original NtOpenEvent:
0247aea0 b840000000      mov     eax,40h

Changed NtOpenEvent:
76f00a80 e95b264ffc      jmp     aswhook+0x30e0 (733f30e0)


Original NtOpenMutant:
0247bc80 b81e010000      mov     eax,11Eh

Changed NtOpenMutant:
76f01860 e9bb184ffc      jmp     aswhook+0x3120 (733f3120)


Original NtOpenSection:
0247ae10 b837000000      mov     eax,37h

Changed NtOpenSection:
76f009f0 e92b304ffc      jmp     aswhook+0x3a20 (733f3a20)


Original NtOpenSemaphore:
0247bcf0 b825010000      mov     eax,125h

Changed NtOpenSemaphore:
76f018d0 e98b184ffc      jmp     aswhook+0x3160 (733f3160)


Original NtOpenThread:
0247bd20 b828010000      mov     eax,128h

Changed NtOpenThread:
76f01900 e9eb144ffc      jmp     aswhook+0x2df0 (733f2df0)


Original NtProtectVirtualMemory:
0247afa0 b850000000      mov     eax,50h

Changed NtProtectVirtualMemory:
76f00b80 e97b1f4ffc      jmp     aswhook+0x2b00 (733f2b00)


Original NtQueryInformationProcess:
0247ac10 b819000000      mov     eax,19h

Changed NtQueryInformationProcess:
76f007f0 e9eb2c4ffc      jmp     aswhook+0x34e0 (733f34e0)


Original NtResumeThread:
0247afc0 b852000700      mov     eax,70052h

Changed NtResumeThread:
76f00ba0 e9db234ffc      jmp     aswhook+0x2f80 (733f2f80)


Original NtSuspendProcess:
0247c5e0 b8b4010300      mov     eax,301B4h

Changed NtSuspendProcess:
76f021c0 e94b1b4ffc      jmp     aswhook+0x3d10 (733f3d10)


Original NtTerminateProcess:
0247ad60 b82c000700      mov     eax,7002Ch

Changed NtTerminateProcess:
76f00940 e95b324ffc      jmp     aswhook+0x3ba0 (733f3ba0)


Original NtWriteVirtualMemory:
0247ae40 b83a000000      mov     eax,3Ah

Changed NtWriteVirtualMemory:
76f00a20 e91b204ffc      jmp     aswhook+0x2a40 (733f2a40)


Original RtlDecompressBuffer:
024e1970 8bff            mov     edi,edi
024e1972 55              push    ebp
024e1973 8bec            mov     ebp,esp

Changed RtlDecompressBuffer:
76f67550 e92bbd48fc      jmp     aswhook+0x3280 (733f3280)


Original RtlQueryEnvironmentVariable:
0245c160 8bff            mov     edi,edi
0245c162 55              push    ebp
0245c163 8bec            mov     ebp,esp

Changed RtlQueryEnvironmentVariable:
76ee1d40 e9eb1651fc      jmp     aswhook+0x3430 (733f3430)


Original ZwCreateEvent:
0247af20 b848000000      mov     eax,48h

Changed ZwCreateEvent:
76f00b00 e9bb254ffc      jmp     aswhook+0x30c0 (733f30c0)


Original ZwCreateMutant:
0247b580 b8ae000000      mov     eax,0AEh

Changed ZwCreateMutant:
76f01160 e99b1f4ffc      jmp     aswhook+0x3100 (733f3100)


Original ZwCreateSection:
0247af40 b84a000000      mov     eax,4Ah

Changed ZwCreateSection:
76f00b20 e9ab2e4ffc      jmp     aswhook+0x39d0 (733f39d0)


Original ZwCreateSemaphore:
0247b640 b8ba000000      mov     eax,0BAh

Changed ZwCreateSemaphore:
76f01220 e91b1f4ffc      jmp     aswhook+0x3140 (733f3140)


Original ZwCreateUserProcess:
0247b6d0 b8c3000000      mov     eax,0C3h

Changed ZwCreateUserProcess:
76f012b0 e9cb1e4ffc      jmp     aswhook+0x3180 (733f3180)


Original ZwMapViewOfSection:
0247ad20 b828000000      mov     eax,28h

Changed ZwMapViewOfSection:
76f00900 e94b224ffc      jmp     aswhook+0x2b50 (733f2b50)


Original ZwOpenEvent:
0247aea0 b840000000      mov     eax,40h

Changed ZwOpenEvent:
76f00a80 e95b264ffc      jmp     aswhook+0x30e0 (733f30e0)


Original ZwOpenMutant:
0247bc80 b81e010000      mov     eax,11Eh

Changed ZwOpenMutant:
76f01860 e9bb184ffc      jmp     aswhook+0x3120 (733f3120)


Original ZwOpenSection:
0247ae10 b837000000      mov     eax,37h

Changed ZwOpenSection:
76f009f0 e92b304ffc      jmp     aswhook+0x3a20 (733f3a20)


Original ZwOpenSemaphore:
0247bcf0 b825010000      mov     eax,125h

Changed ZwOpenSemaphore:
76f018d0 e98b184ffc      jmp     aswhook+0x3160 (733f3160)


Original ZwOpenThread:
0247bd20 b828010000      mov     eax,128h

Changed ZwOpenThread:
76f01900 e9eb144ffc      jmp     aswhook+0x2df0 (733f2df0)


Original ZwProtectVirtualMemory:
0247afa0 b850000000      mov     eax,50h

Changed ZwProtectVirtualMemory:
76f00b80 e97b1f4ffc      jmp     aswhook+0x2b00 (733f2b00)


Original ZwQueryInformationProcess:
0247ac10 b819000000      mov     eax,19h

Changed ZwQueryInformationProcess:
76f007f0 e9eb2c4ffc      jmp     aswhook+0x34e0 (733f34e0)


Original ZwResumeThread:
0247afc0 b852000700      mov     eax,70052h

Changed ZwResumeThread:
76f00ba0 e9db234ffc      jmp     aswhook+0x2f80 (733f2f80)


Original ZwSuspendProcess:
0247c5e0 b8b4010300      mov     eax,301B4h

Changed ZwSuspendProcess:
76f021c0 e94b1b4ffc      jmp     aswhook+0x3d10 (733f3d10)


Original ZwTerminateProcess:
0247ad60 b82c000700      mov     eax,7002Ch

Changed ZwTerminateProcess:
76f00940 e95b324ffc      jmp     aswhook+0x3ba0 (733f3ba0)


Original ZwWriteVirtualMemory:
0247ae40 b83a000000      mov     eax,3Ah

Changed ZwWriteVirtualMemory:
76f00a20 e91b204ffc      jmp     aswhook+0x2a40 (733f2a40)


Original Wow64Transition:
0067dfac 104982          adc     byte ptr [ecx-7Eh],cl
0067dfaf 6bf002          imul    esi,eax,2

Changed Wow64Transition:
75df1f8c 0060e8          add     byte ptr [eax-18h],ah
75df1f8f 76f0            jbe     KERNEL32!WerpLaunchAeDebug+0x1ea81 (75df1f81)
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Ну и ждём от тебя тогда статьи...
На самом деле об этом канеш много уже написано, ну попробую на выходных что-то оформить. Копирование сискола из файла на диске работает для нативных приложений (32-битных на 32-битных осях, 64-битных на 64-битных осях, само собой не работает для wow64, но в этом случае можно воспользоваться хевенсгейтом, вряд ли аверы настолько харкорны, что будут перехватывать и 64-битный ntdll.dll). Получения номера сискола тоже работает, но я чет не могу понять, как на сишечке сделать унтверсальную функцию для вызова сисколла по номеру. Не натыкался на такую реализацию?
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх