52 00 00 00 08 00 00 00 4D 00 00 00 08 00 00 00 4D 00 00 00 0C 00 00 00 70 00 00 00 08 00 00 00 45 00 00 00 08 00 00 00 52 00 00 00 08 00 00 00 52 00 00 00 0A 00 00 00 54 00 00 00 08 00 00 00 54 00 00 00 0C 00 00 00 13 00 00 00 08 00 00 00 44 00 00 00 08 00 00 00 42 00 00 00 08 00 00 00 24 00 00 00 08 00 00 00 20 00 00 00 08 00 00 00 31 00 00 00 08 00 00 00 32 00 00 00 08 00 00 00 33 00 00 00 08 00 00 00 34 00 00 00 08 00 00 00 35 00 00 00 08 00 00 00 36 00 00 00 08 00 00 00 37 00 00 00 08 00 00 00 38 00 00 00 08 00 00 00 39 00 00 00 08 00 00 00 30 00 00 00 08 00 00 00 31 00 00 00 0A 00 00 00 32 00 00 00 0A 00 00 00 33 00 00 00 0A 00 00 00 34 00 00 00 0A 00 00 00 35 00 00 00 0A 00 00 00 36 00 00 00 0A 00 00 00 37 00 00 00 0A 00 00 00 38 00 00 00 0A 00 00 00 39 00 00 00 0A 00 00 00 30 00 00 00 0A 00 00 00 31 00 00 00 0C 00 00 00 32 00 00 00 0C 00 00 00 33 00 00 00 0C 00 00 00 34 00 00 00 0C 00 00 00 35 00 00 00 0C 00 00 00 36 00 00 00 0C 00 00 00 37 00 00 00 0C 00 00 00 38 00 00 00 0C 00 00 00 39 00 00 00 0C 00 00 00 30 00 00 00 0C 00 00 00 31 00 00 00 09 00 00 00 32 00 00 00 09 00 00 00 33 00 00 00 09 00 00 00 34 00 00 00 09 00 00 00 35 00 00 00 09 00 00 00 36 00 00 00 09 00 00 00 37 00 00 00 09 00 00 00 38 00 00 00 09 00 00 00 39 00 00 00 09 00 00 00 30 00 00 00 09 00 00 00 31 00 00 00 0E 00 00 00 32 00 00 00 0E 00 00 00 33 00 00 00 0E 00 00 00 34 00 00 00 0E 00 00 00 35 00 00 00 0E 00 00 00 36 00 00 00 0E 00 00 00 37 00 00 00 0E 00 00 00 38 00 00 00 0E 00 00 00 39 00 00 00 0E 00 00 00 30
win+HOME:将当前工作窗口以外的其他窗口最小化
Win+Shift+T 则是后退
# 具体过程
windows自带的搜索实在是很垃圾,但是它占用了Win+F快捷键,我又不想总挂个破钩子用电脑,但是也不能禁用所有的快捷键,终于找到突破点了:找出存储快捷键表的地址,就可以解决所有问题了。在这之前的思路是:找到explorer进程,然后反注册,结果证明没什么用,有人说必须用钩子干掉相应的消息就不会响应了,但是想想就很恶心,而且那个家伙还说:涉及内核云云,我真就不信了http://www.zhihu.com/question/22681222
废话结束,
使用IDA分析,得到了RegisterHotKey跳前的重要参数:vk和fsmodifiers
这是explorer中的一个调用,定位到了对应的地址,再到x64dbg中定位调试,最终,找到了这个表!
接下来就好办了,我把我要干掉的Win+F中的F改写成之前已经注册好的热键,比如Win+R,由于已经注册,所以再次注册就会失效,等以后如果想改Win+E或者其他的热键,依此方法依然可以干掉!
软件使用技巧(在IDA中甚至可以在IDA View中直接搜索函数名!)
在x64dbg中,可以使用intermolecular calls搜索所有的调用的函数名!
由于win7安全性高,所以即使修改成功,保存也有问题,需要到PE中进行替换,这时,只需要修改windows目录下的explorer,其他的是不需要考虑的~
r8d,rXXXd之类就是指rXXX寄存器本身
没有评论:
发表评论