32位dbg中编辑的:
7711E9D3 | 6A 33 | push 33 |
7711E9D5 | E8 00000000 | call ntdll.7711E9DA | call $0
7711E9DA | 830424 05 | add dword ptr ss:[esp],5 |
7711E9DE | CB | ret far |
6A 33 E8 00 00 00 00 83 04 24 05 CB
64位dbg中获取的:
00007FFC844B11DD | 48:B8 8877665544332211 | mov rax,1122334455667788 |
00007FFC844B11E7 | 50 | push rax |
00007FFC844B11E8 | 41:50 | push r8 |
00007FFC844B11EA | 41:51 | push r9 |
00007FFC844B11EC <ntdll.LdrpGetProcApphelp | 41:52 | push r10 |
00007FFC844B11EE | 41:53 | push r11 |
00007FFC844B11F0 | 41:54 | push r12 |
00007FFC844B11F2 | 41:55 | push r13 |
00007FFC844B11F4 | 41:56 | push r14 | r14:"minkernel\\ntdll\\ldrinit.c"
00007FFC844B11F6 | 41:57 | push r15 |
00007FFC844B11F8 | 50 | push rax |
00007FFC844B11F9 | E8 00000000 | call ntdll.7FFC844B11FE | call $0
00007FFC844B11FE | C74424 04 23000000 | mov dword ptr ss:[rsp+4],23 | 23:'#'
00007FFC844B1206 | 830424 0D | add dword ptr ss:[rsp],D |
00007FFC844B120A | CB | ret far |
00007FFC844B120B | 90 | nop |
48 B8 88 77 66 55 44 33 22 11 50 41 50 41 51 41 52 41 53 41 54 41 55 41 56 41 57 50 E8 00 00 00 00 C7 44 24 04 23 00 00 00 83 04 24 0D CB 90
合成:
7711E9D3 | 6A 33 | push 33 |
7711E9D5 | E8 00000000 | call ntdll.7711E9DA | call $0
7711E9DA | 830424 05 | add dword ptr ss:[esp],5 |
7711E9DE | CB | ret far |
7711E9DF | 48 | dec eax |
7711E9E0 | B8 88776655 | mov eax,55667788 |
7711E9E5 | 44 | inc esp |
7711E9E6 | 3322 | xor esp,dword ptr ds:[edx] |
7711E9E8 | 1150 41 | adc dword ptr ds:[eax+41],edx |
7711E9EB | 50 | push eax |
7711E9EC | 41 | inc ecx |
7711E9ED | 51 | push ecx |
7711E9EE | 41 | inc ecx |
7711E9EF | 52 | push edx |
7711E9F0 | 41 | inc ecx |
7711E9F1 | 53 | push ebx |
7711E9F2 | 41 | inc ecx |
7711E9F3 <ntdll._LdrpForkProcess@0> | 54 | push esp |
7711E9F4 | 41 | inc ecx |
7711E9F5 | 55 | push ebp |
7711E9F6 | 41 | inc ecx |
7711E9F7 | 56 | push esi |
7711E9F8 | 41 | inc ecx |
7711E9F9 | 57 | push edi | edi:"LdrpInitializeProcess"
7711E9FA | 50 | push eax |
7711E9FB | E8 00000000 | call ntdll.7711EA00 | call $0
7711EA00 | C74424 04 23000000 | mov dword ptr ss:[esp+4],23 | 23:'#'
7711EA08 | 830424 0D | add dword ptr ss:[esp],D |
7711EA0C | CB | ret far |
7711EA0D | 90 | nop |
6A 33 E8 00 00 00 00 83 04 24 05 CB 48 B8 88 77 66 55 44 33 22 11 50 41 50 41 51 41 52 41 53 41 54 41 55 41 56 41 57 50 E8 00 00 00 00 C7 44 24 04 23 00 00 00 83 04 24 0D CB 90
取回来的栈: win10_64
$ ==> 1122334455667788
0000000077063620 r15
$+10 0000000000A6E940 0000000000A6FDA0
$+20 0000000002C0A000 0000000000000246
$+30 0000000000000000 00000000770E1FCC
$+40 000000000000002B 1122334455667788
取回来的栈: win7_64
$ ==> > 55667788 11223344
75062450 00000000 r15
$+10 > 0008EC80 00000000 0008FD20 00000000
$+20 > 7EFDB000 00000000 00000202 00000000
$+30 > 00000000 00000000 0018FD10 00000000
$+40 > 778B01C4 00000000 55667788 11223344