i find by using a software calld "Xuetr" some SSDT function was inline hook,but,i using similar "Kernel Detective v1.3.1" and "Rootkit Unhook" no find SSDT functions has been hook,but i using "Rootkit Unhook" viewing has been source ASM code of the hook functions,found some clues,which are using such methods
//---------------------------------
push 0x123456 //assume it's 0x123456
ret
//---------------------------------------------
I Want recover them,May I ask What? or some examples.,BTW:in cann't directly "NOP" the cases.Thans for help me.
//---------------------------------
push 0x123456 //assume it's 0x123456
ret
//---------------------------------------------
I Want recover them,May I ask What? or some examples.,BTW:in cann't directly "NOP" the cases.Thans for help me.