A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #3064  by EP_X0FF
 Fri Oct 15, 2010 4:43 am
Hello,

I've noticed in several AV products really interesting way to hook service table entries. Instead of direct replace of handler with their own, these products allocate in NonPaged pool little callgate which contains jump to real handler.

As for now I know two products - Avira and ESET (however I don't remember exactly version, seems to be in 4.2.64.12 there is no such behavior). Please add more if you know.
 #3069  by EP_X0FF
 Fri Oct 15, 2010 7:20 am
I do believe it was 4.x (I remember GUI), however just installed last version and this perversion is gone :?
 #3077  by nullptr
 Fri Oct 15, 2010 12:20 pm
EP_X0FF wrote:I do believe it was 4.x (I remember GUI), however just installed last version and this perversion is gone :?
Yeah, I had a brief look at v4.0.474 and that seems to have allocated a large chunk of non-paged pool memory for its self defense hooks. It looks like the handling all takes place in the stub and never jumps to any eset module...but then again, maybe I need glasses. :geek:
 #3078  by EP_X0FF
 Fri Oct 15, 2010 12:21 pm
Yes, exactly about this version I'm talking. Where I can get it? :)
 #3081  by EP_X0FF
 Fri Oct 15, 2010 12:50 pm
Downloaded, thank you :)

upd:
Code: Select all
sub esp, 0000004Ch
push esi
mov esi, [esp+58h]
cmp esi, 1DEADBEEh
jnz 81BE9CCCh
mov eax, 1BEEDEADh
pop esi
add esp, 0000004Ch
retn 0010h
This helps me solve one primitive bug with some software I'm currently developing.