You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
VMProtect started using Heaven's gate to make it difficult to bypass Usermode Anti-Debug.
VMP uses ZwQueryInformationProcess (ProcessWow64Information) to check if the running process is wow64, and if the value is 0, it runs the sysenter opcode, judging that it is a 32bit operating system.
An exception occurred when the wow64 process ran the "sysenter" opcode, and I installed VectorHandler to handle the exception.
Exception Handler Functions:
check that the exception location that occurred is the "sysenter" opcode.
Check which Zw** APIs are called (checked in the eax register)
load all the arguments recorded in ContextRecord and call the Zw** function as proxy. (API with anti-debug bypass)
put the return value of the API into eax and resume the execution flow with the next instruction in the "sysenter" opcode.
Through the above process, I was able to bypass the VMP Anti-Debug!
Test Environment: Windows 1022H2 (19045.3324) x64
VMP Version: 3.8.4 Build 1754
Description
VMProtect started using Heaven's gate to make it difficult to bypass Usermode Anti-Debug.
VMP uses ZwQueryInformationProcess (ProcessWow64Information) to check if the running process is wow64, and if the value is 0, it runs the sysenter opcode, judging that it is a 32bit operating system.
An exception occurred when the wow64 process ran the "sysenter" opcode, and I installed VectorHandler to handle the exception.
Exception Handler Functions:
check that the exception location that occurred is the "sysenter" opcode.
Check which Zw** APIs are called (checked in the eax register)
load all the arguments recorded in ContextRecord and call the Zw** function as proxy. (API with anti-debug bypass)
put the return value of the API into eax and resume the execution flow with the next instruction in the "sysenter" opcode.
Through the above process, I was able to bypass the VMP Anti-Debug!
bandicam.2023-08-30.23-52-29-912.mp4
fork url : master...miketestz:ScyllaHide_VMPHeavensgateBypass:master
The text was updated successfully, but these errors were encountered: