谢谢回复!还是找不到...
不过用RKUnhooker3.7检测出来code hooks:
2个inline hook
ntkrnlpa.exe-->DbgPrint, Type: Inline - RelativeJump at address 0x8052C892 hook handler located in [TesSafe.sys]
ntkrnlpa.exe-->PsGetVersion, Type: Inline - RelativeJump at address 0x8052C062 hook handler located in [TesSafe.sys]
3个dll hook
[3024]CG_Ystjc.exe-->kernel32.dll-->LoadLibraryExW, Type: Inline - RelativeJump at address 0x7C801AF5 hook handler located in [ystjc.dll]
[3024]CG_Ystjc.exe-->kernel32.dll-->OutputDebugStringA, Type: Inline - DirectJump at address 0x7C85AD4C hook handler located in [ystjc.dll]/*防止调试?*/
[3024]CG_Ystjc.exe-->user32.dll-->SendMessageA, Type: Inline - RelativeJump at address 0x77D2F3C2 hook handler located in [ystjc.dll]