|
ASProtect SKE 2.2 SDK中的API修复
但是那几个的地址跟这地址不一样,是不是一定要运行脱壳程序出错后看堆椎的返回???我现在脱的一个文件运行后不会出错(没有反应),所以在堆栈里看不到这个地址了 |
|
ASProtect SKE 2.2 SDK中的API修复
如果此时运行脱壳后的文件dumped_.exe,就会异常,因为程序里会调用ASProtect的API函数: 00404A18 $- FF25 0C504000 jmp [40500C] //F2下断点 00404A1E $- FF25 08504000 jmp [405008] //F2下断点 00404A24 $- FF25 04504000 jmp [405004] //F2下断点 00404A2A $- FF25 00504000 jmp [405000] //F2下断点 00404A30 $- FF25 10504000 jmp [405010] //F2下断点 请问这个00404A18这些地址是怎么找出来的? |
|
ASProtect 2.1x SKE -> Alexey Solodovnikov [Overlay]有自校验吗?
怎么修复SDK啊,在论坛上看了很久,弄不明白,能介绍详细一点吗? |
|
ASProtect 2.1x SKE -> Alexey Solodovnikov [Overlay]有自校验吗?
在修复指针的时候有5个无效的指针,这是不是就是说有SDK做怪?? 保存树文件如下 ; Thunk 中每个函数语法 (分隔符为 TAB) ; ------------------------------------------------------------ ; 标志 RVA 模块名 序号 名称 ; ; 关于 <Valid> 参数细节: ; ------------------------------ ; 标志: 0 = valid: no -> - 名称包含已重定位的 API 的地址 (你可以设置 ; 其为零如果你要编辑它的话). ; - 序号不被考虑但你需要使用 '0000' 作为值. ; - 模块名将不会被考虑但你需要使用 '?' 作为值. ; ; 1 = valid: yes -> 所有在此行的下个参数将被考虑. ; 函数按序号输入应没有名称 (需要有第四个制表符(TAB) ; 放在前面). ; ; 2 = 等于 0 但其用于载入器. ; ; 3 = 等于 1 但其用于载入器. ; ; 4 = 等于 0 并带有 (R) 标签. ; ; 5 = 等于 1 并带有 (R) 标签. ; ; 最后, 你可自己冒险编辑此文件! :-) Target: C:\Program Files\16xia\QQDDZSF\QQDDZSF.exe OEP: 00001000 IATRVA: 00091164 IATSize: 00000700 FThunk: 00091168 NbFunc: 00000024 1 00091168 kernel32.dll 0080 DeleteCriticalSection 1 0009116C kernel32.dll 0241 LeaveCriticalSection 1 00091170 kernel32.dll 0097 EnterCriticalSection 1 00091174 kernel32.dll 0216 InitializeCriticalSection 1 00091178 kernel32.dll 036E VirtualFree 1 0009117C kernel32.dll 036B VirtualAlloc 1 00091180 kernel32.dll 024C LocalFree 1 00091184 kernel32.dll 0248 LocalAlloc 1 00091188 kernel32.dll 01DB GetVersion 1 0009118C kernel32.dll 013F GetCurrentThreadId 1 00091190 kernel32.dll 021A InterlockedDecrement 1 00091194 kernel32.dll 021E InterlockedIncrement 1 00091198 kernel32.dll 0373 VirtualQuery 1 0009119C kernel32.dll 037F WideCharToMultiByte 1 000911A0 kernel32.dll 0265 MultiByteToWideChar 1 000911A4 kernel32.dll 03B3 lstrlen 1 000911A8 kernel32.dll 03B0 lstrcpyn 1 000911AC kernel32.dll 0243 LoadLibraryExA 1 000911B0 kernel32.dll 01CD GetThreadLocale 1 000911B4 kernel32.dll 01AD GetStartupInfoA 1 000911B8 kernel32.dll 0198 GetProcAddress 1 000911BC kernel32.dll 0176 GetModuleHandleA 1 000911C0 kernel32.dll 0174 GetModuleFileNameA 1 000911C4 kernel32.dll 016C GetLocaleInfoA 1 000911C8 kernel32.dll 010A GetCommandLineA 1 000911CC kernel32.dll 00F1 FreeLibrary 1 000911D0 kernel32.dll 00D1 FindFirstFileA 1 000911D4 kernel32.dll 00CD FindClose 1 000911D8 kernel32.dll 00B7 ExitProcess 1 000911DC kernel32.dll 00B8 ExitThread 1 000911E0 kernel32.dll 006D CreateThread 1 000911E4 kernel32.dll 038C WriteFile 1 000911E8 kernel32.dll 0358 UnhandledExceptionFilter 1 000911EC kernel32.dll 02C5 RtlUnwind 1 000911F0 kernel32.dll 0297 RaiseException 1 000911F4 kernel32.dll 01AF GetStdHandle FThunk: 000911FC NbFunc: 00000004 1 000911FC user32.dll 0128 GetKeyboardType 1 00091200 user32.dll 01C9 LoadStringA 1 00091204 user32.dll 01DD MessageBoxA 1 00091208 user32.dll 002B CharNextA FThunk: 00091210 NbFunc: 00000003 1 00091210 advapi32.dll 01EE RegQueryValueExA 1 00091214 advapi32.dll 01E4 RegOpenKeyExA 1 00091218 advapi32.dll 01CB RegCloseKey FThunk: 00091220 NbFunc: 00000003 1 00091220 oleaut32.dll 0006 SysFreeString 1 00091224 oleaut32.dll 0005 SysReAllocStringLen 1 00091228 oleaut32.dll 0004 SysAllocStringLen FThunk: 00091230 NbFunc: 00000004 1 00091230 kernel32.dll 034F TlsSetValue 1 00091234 kernel32.dll 034E TlsGetValue 1 00091238 kernel32.dll 0248 LocalAlloc 1 0009123C kernel32.dll 0176 GetModuleHandleA FThunk: 00091244 NbFunc: 00000006 1 00091244 advapi32.dll 01FB RegSetValueExA 1 00091248 advapi32.dll 01EE RegQueryValueExA 1 0009124C advapi32.dll 01E4 RegOpenKeyExA 1 00091250 advapi32.dll 01DD RegFlushKey 1 00091254 advapi32.dll 01CF RegCreateKeyExA 1 00091258 advapi32.dll 01CB RegCloseKey FThunk: 00091260 NbFunc: 00000053 1 00091260 kernel32.dll 03AD lstrcpy 1 00091264 kernel32.dll 0395 WriteProcessMemory 1 00091268 kernel32.dll 038C WriteFile 1 0009126C kernel32.dll 037B WaitForSingleObject 1 00091270 kernel32.dll 0373 VirtualQuery 1 00091274 kernel32.dll 036F VirtualFreeEx 1 00091278 kernel32.dll 036C VirtualAllocEx 1 0009127C kernel32.dll 036B VirtualAlloc 1 00091280 kernel32.dll 033F Sleep 1 00091284 kernel32.dll 033E SizeofResource 1 00091288 kernel32.dll 032D SetThreadLocale 1 0009128C kernel32.dll 0317 SetLocalTime 1 00091290 kernel32.dll 0307 SetFilePointer 1 00091294 kernel32.dll 0302 SetEvent 1 00091298 kernel32.dll 0301 SetErrorMode 1 0009129C kernel32.dll 02FE SetEndOfFile 1 000912A0 kernel32.dll 02C0 ResumeThread 1 000912A4 kernel32.dll 02BD ResetEvent 1 000912A8 kernel32.dll 02A7 ReadProcessMemory 1 000912AC kernel32.dll 02A4 ReadFile 1 000912B0 kernel32.dll 0275 OpenProcess 1 000912B4 kernel32.dll 0265 MultiByteToWideChar 1 000912B8 kernel32.dll 0264 MulDiv 1 000912BC kernel32.dll 0255 LockResource 1 000912C0 kernel32.dll 0247 LoadResource 1 000912C4 kernel32.dll 0242 LoadLibraryA 1 000912C8 kernel32.dll 0241 LeaveCriticalSection 1 000912CC kernel32.dll 0216 InitializeCriticalSection 1 000912D0 kernel32.dll 01FD GlobalUnlock 1 000912D4 kernel32.dll 01FA GlobalSize 1 000912D8 kernel32.dll 01F9 GlobalReAlloc 1 000912DC kernel32.dll 01F5 GlobalHandle 1 000912E0 kernel32.dll 01F6 GlobalLock 1 000912E4 kernel32.dll 01F2 GlobalFree 1 000912E8 kernel32.dll 01EE GlobalFindAtomA 1 000912EC kernel32.dll 01ED GlobalDeleteAtom 1 000912F0 kernel32.dll 01EB GlobalAlloc 1 000912F4 kernel32.dll 01E9 GlobalAddAtomA 1 000912F8 kernel32.dll 01DC GetVersionExA 1 000912FC kernel32.dll 01DB GetVersion 1 00091300 kernel32.dll 01D6 GetUserDefaultLCID 1 00091304 kernel32.dll 01D5 GetTimeZoneInformation 1 00091308 kernel32.dll 01D2 GetTickCount 1 0009130C kernel32.dll 01CD GetThreadLocale 1 00091310 kernel32.dll 01C9 GetTempPathA 1 00091314 kernel32.dll 01B9 GetSystemInfo 1 00091318 kernel32.dll 01B1 GetStringTypeExA 1 0009131C kernel32.dll 01AF GetStdHandle 1 00091320 kernel32.dll 0198 GetProcAddress 1 00091324 kernel32.dll 0176 GetModuleHandleA 1 00091328 kernel32.dll 0174 GetModuleFileNameA 1 0009132C kernel32.dll 016C GetLocaleInfoA 1 00091330 kernel32.dll 016B GetLocalTime 1 00091334 kernel32.dll 0169 GetLastError 1 00091338 kernel32.dll 0162 GetFullPathNameA 1 0009133C kernel32.dll 015C GetFileSize 1 00091340 kernel32.dll 0154 GetExitCodeThread 1 00091344 kernel32.dll 0146 GetDiskFreeSpaceA 1 00091348 kernel32.dll 0140 GetDateFormatA 1 0009134C kernel32.dll 013F GetCurrentThreadId 1 00091350 kernel32.dll 013D GetCurrentProcessId 1 00091354 kernel32.dll 010E GetComputerNameA 1 00091358 kernel32.dll 00FE GetCPInfo 1 0009135C kernel32.dll 00F7 GetACP 1 00091360 kernel32.dll 00F3 FreeResource 1 00091364 kernel32.dll 021E InterlockedIncrement 1 00091368 kernel32.dll 021B InterlockedExchange 1 0009136C kernel32.dll 021A InterlockedDecrement 1 00091370 kernel32.dll 00F1 FreeLibrary 1 00091374 kernel32.dll 00EC FormatMessageA 1 00091378 kernel32.dll 00E0 FindResourceA 1 0009137C kernel32.dll 00D1 FindFirstFileA 1 00091380 kernel32.dll 00CD FindClose 1 00091384 kernel32.dll 00C3 FileTimeToLocalFileTime 1 00091388 kernel32.dll 00C2 FileTimeToDosDateTime 1 0009138C kernel32.dll 0098 EnumCalendarInfoA 1 00091390 kernel32.dll 0097 EnterCriticalSection 1 00091394 kernel32.dll 0080 DeleteCriticalSection 1 00091398 kernel32.dll 006D CreateThread 1 0009139C kernel32.dll 0050 CreateFileA 1 000913A0 kernel32.dll 004C CreateEventA 1 000913A4 kernel32.dll 0038 CompareStringA 1 000913A8 kernel32.dll 0032 CloseHandle FThunk: 000913B0 NbFunc: 00000003 1 000913B0 version.dll 000B VerQueryValueA 1 000913B4 version.dll 0002 GetFileVersionInfoSizeA 1 000913B8 version.dll 0001 GetFileVersionInfoA FThunk: 000913C0 NbFunc: 00000046 1 000913C0 gdi32.dll 0253 UnrealizeObject 1 000913C4 gdi32.dll 024A StretchBlt 1 000913C8 gdi32.dll 0244 SetWindowOrgEx 1 000913CC gdi32.dll 0242 SetWinMetaFileBits 1 000913D0 gdi32.dll 0240 SetViewportOrgEx 1 000913D4 gdi32.dll 023D SetTextColor 1 000913D8 gdi32.dll 0239 SetStretchBltMode 1 000913DC gdi32.dll 0236 SetROP2 1 000913E0 gdi32.dll 0232 SetPixel 1 000913E4 gdi32.dll 022C SetMapMode 1 000913E8 gdi32.dll 0223 SetEnhMetaFileBits 1 000913EC gdi32.dll 021F SetDIBColorTable 1 000913F0 gdi32.dll 021A SetBrushOrgEx 1 000913F4 gdi32.dll 0217 SetBkMode 1 000913F8 gdi32.dll 0216 SetBkColor 1 000913FC gdi32.dll 0210 SelectPalette 1 00091400 gdi32.dll 020F SelectObject 1 00091404 gdi32.dll 020D SelectClipRgn 1 00091408 gdi32.dll 0208 SaveDC 1 0009140C gdi32.dll 0201 RestoreDC 1 00091410 gdi32.dll 01F6 RectVisible 1 00091414 gdi32.dll 01F4 RealizePalette 1 00091418 gdi32.dll 01E1 PlayEnhMetaFile 1 0009141C gdi32.dll 01DE PatBlt 1 00091420 gdi32.dll 01D2 MoveToEx 1 00091424 gdi32.dll 01CF MaskBlt 1 00091428 gdi32.dll 01CE LineTo 1 0009142C gdi32.dll 01CC LPtoDP 1 00091430 gdi32.dll 01C8 IntersectClipRect 1 00091434 gdi32.dll 01C4 GetWindowOrgEx 1 00091438 gdi32.dll 01C2 GetWinMetaFileBits 1 0009143C gdi32.dll 01BD GetTextMetricsA 1 00091440 gdi32.dll 01B5 GetTextExtentPoint32A 1 00091444 gdi32.dll 01AA GetSystemPaletteEntries 1 00091448 gdi32.dll 01A6 GetStockObject 1 0009144C gdi32.dll 019D GetPixel 1 00091450 gdi32.dll 019B GetPaletteEntries 1 00091454 gdi32.dll 0196 GetObjectA 1 00091458 gdi32.dll 0176 GetEnhMetaFilePaletteEntries 1 0009145C gdi32.dll 0175 GetEnhMetaFileHeader 1 00091460 gdi32.dll 0173 GetEnhMetaFileDescriptionA 1 00091464 gdi32.dll 0172 GetEnhMetaFileBits 1 00091468 gdi32.dll 016C GetDeviceCaps 1 0009146C gdi32.dll 016B GetDIBits 1 00091470 gdi32.dll 016A GetDIBColorTable 1 00091474 gdi32.dll 0168 GetDCOrgEx 1 00091478 gdi32.dll 0166 GetCurrentPositionEx 1 0009147C gdi32.dll 0161 GetClipBox 1 00091480 gdi32.dll 0151 GetBrushOrgEx 1 00091484 gdi32.dll 014B GetBitmapBits 1 00091488 gdi32.dll 00DE ExtTextOutA 1 0009148C gdi32.dll 00D8 ExcludeClipRect 1 00091490 gdi32.dll 0090 DeleteObject 1 00091494 gdi32.dll 008E DeleteEnhMetaFile 1 00091498 gdi32.dll 008D DeleteDC 1 0009149C gdi32.dll 0051 CreateSolidBrush 1 000914A0 gdi32.dll 0049 CreatePenIndirect 1 000914A4 gdi32.dll 0046 CreatePalette 1 000914A8 gdi32.dll 0040 CreateHalftonePalette 1 000914AC gdi32.dll 003B CreateFontIndirectA 1 000914B0 gdi32.dll 0038 CreateEnhMetaFileA 1 000914B4 gdi32.dll 0034 CreateDIBitmap 1 000914B8 gdi32.dll 0033 CreateDIBSection 1 000914BC gdi32.dll 002E CreateCompatibleDC 1 000914C0 gdi32.dll 002D CreateCompatibleBitmap 1 000914C4 gdi32.dll 002A CreateBrushIndirect 1 000914C8 gdi32.dll 0028 CreateBitmap 1 000914CC gdi32.dll 0024 CopyEnhMetaFileA 1 000914D0 gdi32.dll 001D CloseEnhMetaFile 1 000914D4 gdi32.dll 0013 BitBlt FThunk: 000914DC NbFunc: 000000A2 1 000914DC user32.dll 0061 CreateWindowExA 1 000914E0 user32.dll 02D6 WindowFromPoint 1 000914E4 user32.dll 02D3 WinHelpA 1 000914E8 user32.dll 02D1 WaitMessage 1 000914EC user32.dll 02BC UpdateWindow 1 000914F0 user32.dll 02B4 UnregisterClassA 1 000914F4 user32.dll 02AF UnhookWindowsHookEx 1 000914F8 user32.dll 02AB TranslateMessage 1 000914FC user32.dll 02AA TranslateMDISysAccel 1 00091500 user32.dll 02A5 TrackPopupMenu 1 00091504 user32.dll 029A SystemParametersInfoA 1 00091508 user32.dll 0293 ShowWindow 1 0009150C user32.dll 0291 ShowScrollBar 1 00091510 user32.dll 0290 ShowOwnedPopups 1 00091514 user32.dll 028F ShowCursor 1 00091518 user32.dll 028B SetWindowsHookExA 1 0009151C user32.dll 0287 SetWindowTextA 1 00091520 user32.dll 0284 SetWindowPos 1 00091524 user32.dll 0283 SetWindowPlacement 1 00091528 user32.dll 0281 SetWindowLongA 1 0009152C user32.dll 027B SetTimer 1 00091530 user32.dll 0271 SetScrollRange 1 00091534 user32.dll 0270 SetScrollPos 1 00091538 user32.dll 026F SetScrollInfo 1 0009153C user32.dll 026D SetRect 1 00091540 user32.dll 026B SetPropA 1 00091544 user32.dll 0267 SetParent 1 00091548 user32.dll 0263 SetMenuItemInfoA 1 0009154C user32.dll 025E SetMenu 1 00091550 user32.dll 0258 SetForegroundWindow 1 00091554 user32.dll 0257 SetFocus 1 00091558 user32.dll 024E SetCursor 1 0009155C user32.dll 0248 SetClassLongA 1 00091560 user32.dll 0245 SetCapture 1 00091564 user32.dll 0244 SetActiveWindow 1 00091568 user32.dll 023C SendMessageA 1 0009156C user32.dll 0235 ScrollWindow 1 00091570 user32.dll 0232 ScreenToClient 1 00091574 user32.dll 022D RemovePropA 1 00091578 user32.dll 022C RemoveMenu 1 0009157C user32.dll 022B ReleaseDC 1 00091580 user32.dll 022A ReleaseCapture 1 00091584 user32.dll 021B RegisterClipboardFormatA 1 00091588 user32.dll 021B RegisterClipboardFormatA 1 0009158C user32.dll 0217 RegisterClassA 1 00091590 user32.dll 0216 RedrawWindow 1 00091594 user32.dll 020C PtInRect 1 00091598 user32.dll 0202 PostQuitMessage 1 0009159C user32.dll 0200 PostMessageA 1 000915A0 user32.dll 01FE PeekMessageA 1 000915A4 user32.dll 01F3 OffsetRect 1 000915A8 user32.dll 01EF OemToCharA 1 000915AC user32.dll 01EB MsgWaitForMultipleObjects 1 000915B0 user32.dll 01DD MessageBoxA 1 000915B4 user32.dll 01D8 MapWindowPoints 1 000915B8 user32.dll 01D4 MapVirtualKeyA 1 000915BC user32.dll 01C9 LoadStringA 1 000915C0 user32.dll 01C0 LoadKeyboardLayoutA 1 000915C4 user32.dll 01BC LoadIconA 1 000915C8 user32.dll 01B8 LoadCursorA 1 000915CC user32.dll 01B6 LoadBitmapA 1 000915D0 user32.dll 01B3 KillTimer 1 000915D4 user32.dll 01B1 IsZoomed 1 000915D8 user32.dll 01B0 IsWindowVisible 1 000915DC user32.dll 01AD IsWindowEnabled 1 000915E0 user32.dll 01AC IsWindow 1 000915E4 user32.dll 01A9 IsRectEmpty 1 000915E8 user32.dll 01A7 IsIconic 1 000915EC user32.dll 01A1 IsDialogMessage 1 000915F0 user32.dll 019F IsChild 1 000915F4 user32.dll 0194 InvalidateRect 1 000915F8 user32.dll 0193 IntersectRect 1 000915FC user32.dll 018F InsertMenuItemA 1 00091600 user32.dll 018E InsertMenuA 1 00091604 user32.dll 018B InflateRect 1 00091608 user32.dll 017C GetWindowThreadProcessId 1 0009160C user32.dll 0178 GetWindowTextA 1 00091610 user32.dll 0175 GetWindowRect 1 00091614 user32.dll 0174 GetWindowPlacement 1 00091618 user32.dll 016F GetWindowLongA 1 0009161C user32.dll 016D GetWindowDC 1 00091620 user32.dll 0164 GetTopWindow 1 00091624 user32.dll 015E GetSystemMetrics 1 00091628 user32.dll 015D GetSystemMenu 1 0009162C user32.dll 015C GetSysColorBrush 1 00091630 user32.dll 015B GetSysColor 1 00091634 user32.dll 015A GetSubMenu 1 00091638 user32.dll 0158 GetScrollRange 1 0009163C user32.dll 0157 GetScrollPos 1 00091640 user32.dll 0156 GetScrollInfo 1 00091644 user32.dll 014B GetPropA 1 00091648 user32.dll 0146 GetParent 1 0009164C user32.dll 016B GetWindow 1 00091650 user32.dll 013E GetMessageTime 1 00091654 user32.dll 0139 GetMenuStringA 1 00091658 user32.dll 0138 GetMenuState 1 0009165C user32.dll 0135 GetMenuItemInfoA 1 00091660 user32.dll 0134 GetMenuItemID 1 00091664 user32.dll 0133 GetMenuItemCount 1 00091668 user32.dll 012D GetMenu 1 0009166C user32.dll 0129 GetLastActivePopup 1 00091670 user32.dll 0127 GetKeyboardState 1 00091674 user32.dll 0124 GetKeyboardLayoutList 1 00091678 user32.dll 0123 GetKeyboardLayout 1 0009167C user32.dll 0122 GetKeyState 1 00091680 user32.dll 0120 GetKeyNameTextA 1 00091684 user32.dll 011B GetIconInfo 1 00091688 user32.dll 0118 GetForegroundWindow 1 0009168C user32.dll 0117 GetFocus 1 00091690 user32.dll 0112 GetDlgItem 1 00091694 user32.dll 010F GetDesktopWindow 1 00091698 user32.dll 010E GetDCEx 1 0009169C user32.dll 010D GetDC 1 000916A0 user32.dll 010C GetCursorPos 1 000916A4 user32.dll 0109 GetCursor 1 000916A8 user32.dll 0102 GetClipboardData 1 000916AC user32.dll 0100 GetClientRect 1 000916B0 user32.dll 00FD GetClassNameA 1 000916B4 user32.dll 00F7 GetClassInfoA 1 000916B8 user32.dll 00F4 GetCapture 1 000916BC user32.dll 00EC GetActiveWindow 1 000916C0 user32.dll 00EA FrameRect 1 000916C4 user32.dll 00E4 FindWindowA 1 000916C8 user32.dll 00E3 FillRect 1 000916CC user32.dll 00E0 EqualRect 1 000916D0 user32.dll 00DF EnumWindows 1 000916D4 user32.dll 00DC EnumThreadWindows 1 000916D8 user32.dll 00C9 EndPaint 1 000916DC user32.dll 00C5 EnableWindow 1 000916E0 user32.dll 00C4 EnableScrollBar 1 000916E4 user32.dll 00C3 EnableMenuItem 1 000916E8 user32.dll 00BD DrawTextA 1 000916EC user32.dll 00B9 DrawMenuBar 1 000916F0 user32.dll 00B8 DrawIconEx 1 000916F4 user32.dll 00B7 DrawIcon 1 000916F8 user32.dll 00B6 DrawFrameControl 1 000916FC user32.dll 00B4 DrawFocusRect 1 00091700 user32.dll 00B3 DrawEdge 1 00091704 user32.dll 00A2 DispatchMessageA 1 00091708 user32.dll 009A DestroyWindow 1 0009170C user32.dll 0098 DestroyMenu 1 00091710 user32.dll 0096 DestroyCursor 1 00091714 user32.dll 0096 DestroyCursor 1 00091718 user32.dll 0092 DeleteMenu 1 0009171C user32.dll 008F DefWindowProcA 1 00091720 user32.dll 008C DefMDIChildProcA 1 00091724 user32.dll 008A DefFrameProcA 1 00091728 user32.dll 005F CreatePopupMenu 1 0009172C user32.dll 005E CreateMenu 1 00091730 user32.dll 0058 CreateIcon 1 00091734 user32.dll 0041 ClientToScreen 1 00091738 user32.dll 003A CheckMenuItem 1 0009173C user32.dll 001C CallWindowProcA 1 00091740 user32.dll 001B CallNextHookEx 1 00091744 user32.dll 000E BeginPaint 1 00091748 user32.dll 002B CharNextA 1 0009174C user32.dll 0028 CharLowerBuffA 1 00091750 user32.dll 0027 CharLowerA 1 00091754 user32.dll 0036 CharUpperBuffA 1 00091758 user32.dll 0031 CharToOemA 1 0009175C user32.dll 0003 AdjustWindowRectEx 1 00091760 user32.dll 0001 ActivateKeyboardLayout FThunk: 00091768 NbFunc: 00000001 1 00091768 kernel32.dll 033F Sleep FThunk: 00091770 NbFunc: 00000008 1 00091770 oleaut32.dll 0094 SafeArrayPtrOfIndex 1 00091774 oleaut32.dll 0013 SafeArrayGetUBound 1 00091778 oleaut32.dll 0014 SafeArrayGetLBound 1 0009177C oleaut32.dll 000F SafeArrayCreate 1 00091780 oleaut32.dll 000C VariantChangeType 1 00091784 oleaut32.dll 000A VariantCopy 1 00091788 oleaut32.dll 0009 VariantClear 1 0009178C oleaut32.dll 0008 VariantInit FThunk: 00091794 NbFunc: 0000000C 1 00091794 ole32.dll 0093 CreateStreamOnHGlobal 1 00091798 ole32.dll 00D7 IsAccelerator 1 0009179C ole32.dll 00F7 OleDraw 1 000917A0 ole32.dll 0113 OleSetMenuDescriptor 1 000917A4 ole32.dll 0066 CoTaskMemFree 1 000917A8 ole32.dll 0117 ProgIDFromCLSID 1 000917AC ole32.dll 0143 StringFromCLSID 1 000917B0 ole32.dll 0012 CoCreateInstance 1 000917B4 ole32.dll 0024 CoGetClassObject 1 000917B8 ole32.dll 006A CoUninitialize 1 000917BC ole32.dll 003C CoInitialize 1 000917C0 ole32.dll 00D8 IsEqualGUID FThunk: 000917C8 NbFunc: 00000003 1 000917C8 oleaut32.dll 00C8 GetErrorInfo 1 000917CC oleaut32.dll 0023 GetActiveObject 1 000917D0 oleaut32.dll 0006 SysFreeString FThunk: 000917D8 NbFunc: 00000019 1 000917D8 comctl32.dll 0052 ImageList_SetIconSize 1 000917DC comctl32.dll 003D ImageList_GetIconSize 1 000917E0 comctl32.dll 0055 ImageList_Write 1 000917E4 comctl32.dll 0045 ImageList_Read 1 000917E8 comctl32.dll 003A ImageList_GetDragImage 1 000917EC comctl32.dll 0033 ImageList_DragShowNolock 1 000917F0 comctl32.dll 004F ImageList_SetDragCursorImage 1 000917F4 comctl32.dll 0032 ImageList_DragMove 1 000917F8 comctl32.dll 0031 ImageList_DragLeave 1 000917FC comctl32.dll 0030 ImageList_DragEnter 1 00091800 comctl32.dll 0038 ImageList_EndDrag 1 00091804 comctl32.dll 002C ImageList_BeginDrag 1 00091808 comctl32.dll 003C ImageList_GetIcon 1 0009180C comctl32.dll 004B ImageList_Remove 1 00091810 comctl32.dll 0035 ImageList_DrawEx 1 00091814 comctl32.dll 004C ImageList_Replace 1 00091818 comctl32.dll 0034 ImageList_Draw 1 0009181C comctl32.dll 0039 ImageList_GetBkColor 1 00091820 comctl32.dll 004E ImageList_SetBkColor 1 00091824 comctl32.dll 004D ImageList_ReplaceIcon 1 00091828 comctl32.dll 0029 ImageList_Add 1 0009182C comctl32.dll 003E ImageList_GetImageCount 1 00091830 comctl32.dll 002F ImageList_Destroy 1 00091834 comctl32.dll 002E ImageList_Create 1 00091838 comctl32.dll 0011 InitCommonControls FThunk: 00091840 NbFunc: 00000002 1 00091840 shell32.dll 016D Shell_NotifyIcon 1 00091844 shell32.dll 0167 ShellExecuteA FThunk: 0009184C NbFunc: 00000005 0 0009184C ? 0000 00E68024 0 00091850 ? 0000 00E67FD8 0 00091854 ? 0000 00E67E60 0 00091858 ? 0000 00E67CCC 0 0009185C ? 0000 00E67BE0 |
|
ASProtect 2.1x SKE -> Alexey Solodovnikov [Overlay]有自校验吗?
而且在同一个区段里像特征码:8B 40 34 FF D0 有8处,是不是都要改啊,上面那一处不改会弹出错误信息,改了以后,运行软件没有反应,而且进程也关不掉 |
|
脱壳ASProtect 2.1x SKE -> Alexey Solodovnikov问题
是不是有stone code?? |
|
请问RSA算法256位分解因子大约要多少时间啊?
各位大哥知道的说一下吧,也好有个数,谢谢啊 |
|
为什么Keymake做了个内存注册机,移到别的地方就不能用了
程序移过去,可以正常运行,就是注册机运行没有反应,调不出原程序 |
|
[求助]内存注册机不能跨机
我做了个注册机,从C盘移动到D盘就已经不行了,也是用keymake做的 |
|
QQ象棋刷分外挂网络验证破解
自校验没有头绪啊,我也想脱壳,改自校验,那样方便一点,。能改吗? |
|
脱壳高手帮忙看看这个软件是什么壳??
0043A8D1 > $ 36: prefix ss: 0043A8D2 . 26:0FB7D9 movzx ebx,cx 0043A8D6 . 2E:47 inc edi 0043A8D8 . 1C 03 sbb al,3 0043A8DA . 0C 51 or al,51 0043A8DC . 48 dec eax 0043A8DD . 13F5 adc esi,ebp 0043A8DF . 0FBEEA movsx ebp,dl 0043A8E2 . 43 inc ebx 0043A8E3 . 2E:BE 756497F>mov esi,FE976475 0043A8E9 . 2E:87F1 xchg ecx,esi 0043A8EC . 1AE2 sbb ah,dl 0043A8EE . C1F3 A1 sal ebx,0A1 0043A8F1 . 88F0 mov al,dh 0043A8F3 . 11EE adc esi,ebp 0043A8F5 . 65:0FCB bswap ebx 0043A8F8 . 0FB7CF movzx ecx,di 0043A8FB . 47 inc edi 0043A8FC . 86E7 xchg bh,ah 0043A8FE . D1F3 sal ebx,1 0043A900 . C1E1 DC shl ecx,0DC 0043A903 . 0FA4F7 1D shld edi,esi,1D 0043A907 . 0FA4F7 ED shld edi,esi,0ED 0043A90B . 0FBBF7 btc edi,esi 0043A90E . 0FACFD 3B shrd ebp,edi,3B 0043A912 . C0CA C9 ror dl,0C9 0043A915 . 0FBAE0 E7 bt eax,0E7 0043A919 . 0FBEF4 movsx esi,ah 0043A91C . 88D4 mov ah,dl 0043A91E . 0FC1DA xadd edx,ebx 0043A921 . 0FABC1 bts ecx,eax 0043A924 . 0FA5F7 shld edi,esi,cl 0043A927 . 0FBDEF bsr ebp,edi 0043A92A . 43 inc ebx 0043A92B . 81E1 E4177E49 and ecx,497E17E4 0043A931 . 0FBEC6 movsx eax,dh 0043A934 . 0FCF bswap edi 0043A936 . 80DC 53 sbb ah,53 0043A939 . 0FC0D5 xadd ch,dl 0043A93C . 89F9 mov ecx,edi 0043A93E . F7D6 not esi 0043A940 . 0FC0E7 xadd bh,ah 0043A943 . C1F3 F9 sal ebx,0F9 0043A946 . 0FBEC6 movsx eax,dh 0043A949 . 8BF5 mov esi,ebp 0043A94B . 88D4 mov ah,dl 0043A94D . 35 D150D34A xor eax,4AD350D1 0043A952 . C0DC 23 rcr ah,23 0043A955 . 80CA 71 or dl,71 0043A958 . 0FA3D8 bt eax,ebx 0043A95B . 3E:4D dec ebp 0043A95D . 0FB7D9 movzx ebx,cx 0043A960 . 23CF and ecx,edi 0043A962 . 8BF5 mov esi,ebp 0043A964 . D2DC rcr ah,cl 0043A966 . 0FBAFB 21 btc ebx,21 0043A96A . 38F0 cmp al,dh 0043A96C . C1D6 ED rcl esi,0ED 0043A96F . 0FBCFE bsf edi,esi 0043A972 . 0FBDEF bsr ebp,edi 0043A975 . 0FC1DA xadd edx,ebx 0043A978 . EB 01 jmp short chess.0043A97B 0043A97A . F4 hlt 0043A97B > 47 inc edi 0043A97C . 0FADFD shrd ebp,edi,cl 0043A97F . D1F3 sal ebx,1 0043A981 . 0FA5C1 shld ecx,eax,cl 0043A984 . C1D6 6D rcl esi,6D 0043A987 . 69FE 3D0C9FE6 imul edi,esi,E69F0C3D 0043A98D . FFC1 inc ecx 0043A98F . 85C3 test ebx,eax 0043A991 . 0FACFD 5B shrd ebp,edi,5B 0043A995 . 4A dec edx 0043A996 . 64:0FCF bswap edi 0043A999 . 65:0FA4D3 C1 shld ebx,edx,0C1 0043A99E . 26:69FE 8D1C6>imul edi,esi,766F1C8D 0043A9A5 . F7D1 not ecx 0043A9A7 . C7C6 2D3C0F96 mov esi,960F3C2D 0043A9AD . 0FC1C8 xadd eax,ecx 0043A9B0 . D1D6 rcl esi,1 0043A9B2 . 0FADFD shrd ebp,edi,cl 0043A9B5 . EB 01 jmp short chess.0043A9B8 0043A9B7 D9 db D9 0043A9B8 > 0FACD8 77 shrd eax,ebx,77 0043A9BC . 0FACCE 25 shrd esi,ecx,25 0043A9C0 . E8 00000000 call chess.0043A9C5 0043A9C5 /$ 59 pop ecx 0043A9C6 |. 83C1 07 add ecx,7 0043A9C9 |. 51 push ecx 0043A9CA \. C3 retn 0043A9CB > C3 retn 0043A9CC . BF 50A74300 mov edi,chess.0043A750 0043A9D1 . 57 push edi 0043A9D2 . B9 B0000000 mov ecx,0B0 0043A9D7 > 8137 06531C00 xor dword ptr ds:[edi],1C5306 0043A9DD . 51 push ecx 0043A9DE . 2BC9 sub ecx,ecx 0043A9E0 . B9 04000000 mov ecx,4 0043A9E5 > 83C7 01 add edi,1 0043A9E8 .^ E2 FB loopd short chess.0043A9E5 0043A9EA . 59 pop ecx 0043A9EB . 83E9 03 sub ecx,3 0043A9EE .^ E2 E7 loopd short chess.0043A9D7 0043A9F0 .^ EB D9 jmp short chess.0043A9CB 这里跳到下面,应该是UPX壳的起点吧?? 0043A750 . 60 pushad 0043A751 . BE 00604200 mov esi,chess.00426000 0043A756 . 8DBE 00B0FDFF lea edi,dword ptr ds:[esi+FFFDB0> 0043A75C . 57 push edi 0043A75D . 83CD FF or ebp,FFFFFFFF 0043A760 . EB 10 jmp short chess.0043A772 0043A762 90 nop 0043A763 90 nop 0043A764 90 nop 0043A765 90 nop 0043A766 90 nop 0043A767 90 nop 0043A768 > 8A06 mov al,byte ptr ds:[esi] 0043A76A . 46 inc esi 0043A76B . 8807 mov byte ptr ds:[edi],al 0043A76D . 47 inc edi 0043A76E > 01DB add ebx,ebx 0043A770 . 75 07 jnz short chess.0043A779 0043A772 > 8B1E mov ebx,dword ptr ds:[esi] 0043A774 . 83EE FC sub esi,-4 0043A777 . 11DB adc ebx,ebx 0043A779 >^ 72 ED jb short chess.0043A768 0043A77B . B8 01000000 mov eax,1 0043A780 > 01DB add ebx,ebx 0043A782 . 75 07 jnz short chess.0043A78B 0043A784 . 8B1E mov ebx,dword ptr ds:[esi] 0043A786 . 83EE FC sub esi,-4 0043A789 . 11DB adc ebx,ebx 0043A78B > 11C0 adc eax,eax 0043A78D . 01DB add ebx,ebx 0043A78F .^ 73 EF jnb short chess.0043A780 0043A791 . 75 09 jnz short chess.0043A79C 0043A793 . 8B1E mov ebx,dword ptr ds:[esi] 0043A795 . 83EE FC sub esi,-4 0043A798 . 11DB adc ebx,ebx 0043A79A .^ 73 E4 jnb short chess.0043A780 0043A79C > 31C9 xor ecx,ecx 0043A79E . 83E8 03 sub eax,3 0043A7A1 . 72 0D jb short chess.0043A7B0 0043A7A3 . C1E0 08 shl eax,8 0043A7A6 . 8A06 mov al,byte ptr ds:[esi] 0043A7A8 . 46 inc esi 0043A7A9 . 83F0 FF xor eax,FFFFFFFF 0043A7AC . 74 74 je short chess.0043A822 0043A7AE . 89C5 mov ebp,eax 0043A7B0 > 01DB add ebx,ebx 0043A7B2 . 75 07 jnz short chess.0043A7BB 0043A7B4 . 8B1E mov ebx,dword ptr ds:[esi] 0043A7B6 . 83EE FC sub esi,-4 0043A7B9 . 11DB adc ebx,ebx 0043A7BB > 11C9 adc ecx,ecx 0043A7BD . 01DB add ebx,ebx 0043A7BF . 75 07 jnz short chess.0043A7C8 0043A7C1 . 8B1E mov ebx,dword ptr ds:[esi] 0043A7C3 . 83EE FC sub esi,-4 0043A7C6 . 11DB adc ebx,ebx 0043A7C8 > 11C9 adc ecx,ecx 0043A7CA . 75 20 jnz short chess.0043A7EC 0043A7CC . 41 inc ecx 0043A7CD > 01DB add ebx,ebx 0043A7CF . 75 07 jnz short chess.0043A7D8 0043A7D1 . 8B1E mov ebx,dword ptr ds:[esi] 0043A7D3 . 83EE FC sub esi,-4 0043A7D6 . 11DB adc ebx,ebx 0043A7D8 > 11C9 adc ecx,ecx 0043A7DA . 01DB add ebx,ebx 0043A7DC .^ 73 EF jnb short chess.0043A7CD 0043A7DE . 75 09 jnz short chess.0043A7E9 0043A7E0 . 8B1E mov ebx,dword ptr ds:[esi] 0043A7E2 . 83EE FC sub esi,-4 0043A7E5 . 11DB adc ebx,ebx 0043A7E7 .^ 73 E4 jnb short chess.0043A7CD 0043A7E9 > 83C1 02 add ecx,2 0043A7EC > 81FD 00F3FFFF cmp ebp,-0D00 0043A7F2 . 83D1 01 adc ecx,1 0043A7F5 . 8D142F lea edx,dword ptr ds:[edi+ebp] 0043A7F8 . 83FD FC cmp ebp,-4 0043A7FB . 76 0F jbe short chess.0043A80C 0043A7FD > 8A02 mov al,byte ptr ds:[edx] 0043A7FF . 42 inc edx 0043A800 . 8807 mov byte ptr ds:[edi],al 0043A802 . 47 inc edi 0043A803 . 49 dec ecx 0043A804 .^ 75 F7 jnz short chess.0043A7FD 0043A806 .^ E9 63FFFFFF jmp chess.0043A76E 0043A80B 90 nop 0043A80C > 8B02 mov eax,dword ptr ds:[edx] 0043A80E . 83C2 04 add edx,4 0043A811 . 8907 mov dword ptr ds:[edi],eax 0043A813 . 83C7 04 add edi,4 0043A816 . 83E9 04 sub ecx,4 0043A819 .^ 77 F1 ja short chess.0043A80C 0043A81B . 01CF add edi,ecx 0043A81D .^ E9 4CFFFFFF jmp chess.0043A76E 0043A822 > 5E pop esi 0043A823 . 89F7 mov edi,esi 0043A825 . B9 BC0C0000 mov ecx,0CBC 0043A82A > 8A07 mov al,byte ptr ds:[edi] 0043A82C . 47 inc edi 0043A82D . 2C E8 sub al,0E8 0043A82F > 3C 01 cmp al,1 0043A831 .^ 77 F7 ja short chess.0043A82A 0043A833 . 803F 0A cmp byte ptr ds:[edi],0A 0043A836 .^ 75 F2 jnz short chess.0043A82A 0043A838 . 8B07 mov eax,dword ptr ds:[edi] 0043A83A . 8A5F 04 mov bl,byte ptr ds:[edi+4] 0043A83D . 66:C1E8 08 shr ax,8 0043A841 . C1C0 10 rol eax,10 0043A844 . 86C4 xchg ah,al 0043A846 . 29F8 sub eax,edi 0043A848 . 80EB E8 sub bl,0E8 0043A84B . 01F0 add eax,esi 0043A84D . 8907 mov dword ptr ds:[edi],eax 0043A84F . 83C7 05 add edi,5 0043A852 . 89D8 mov eax,ebx 0043A854 .^ E2 D9 loopd short chess.0043A82F 0043A856 . 8DBE 00700300 lea edi,dword ptr ds:[esi+37000] 0043A85C > 8B07 mov eax,dword ptr ds:[edi] 0043A85E . 09C0 or eax,eax 0043A860 . 74 45 je short chess.0043A8A7 0043A862 . 8B5F 04 mov ebx,dword ptr ds:[edi+4] 0043A865 . 8D8430 A00304>lea eax,dword ptr ds:[eax+esi+40> 0043A86C . 01F3 add ebx,esi 0043A86E . 50 push eax 0043A86F . 83C7 08 add edi,8 0043A872 . FF96 90040400 call dword ptr ds:[esi+40490] 0043A878 . 95 xchg eax,ebp 0043A879 > 8A07 mov al,byte ptr ds:[edi] 0043A87B . 47 inc edi 0043A87C . 08C0 or al,al 0043A87E .^ 74 DC je short chess.0043A85C 0043A880 . 89F9 mov ecx,edi 0043A882 . 79 07 jns short chess.0043A88B 0043A884 . 0FB707 movzx eax,word ptr ds:[edi] 0043A887 . 47 inc edi 0043A888 . 50 push eax 0043A889 . 47 inc edi 0043A88A B9 db B9 0043A88B . 57 push edi 0043A88C . 48 dec eax 0043A88D . F2:AE repne scas byte ptr es:[edi] 0043A88F . 55 push ebp 0043A890 . FF96 94040400 call dword ptr ds:[esi+40494] 0043A896 . 09C0 or eax,eax 0043A898 . 74 07 je short chess.0043A8A1 0043A89A . 8903 mov dword ptr ds:[ebx],eax 0043A89C . 83C3 04 add ebx,4 0043A89F .^ EB D8 jmp short chess.0043A879 0043A8A1 > FF96 98040400 call dword ptr ds:[esi+40498] 0043A8A7 > 61 popad 0043A8A8 .- E9 0BC9FCFF jmp chess.004071B8发现这个,应该UPX壳已经结束,下面就是跳到程序的入口 00401000 81EC 68040000 sub esp,468 00401006 A1 B08A4200 mov eax,dword ptr ds:[428AB0] 0040100B 898424 64040000 mov dword ptr ss:[esp+464],eax 00401012 68 04010000 push 104 00401017 8D4424 58 lea eax,dword ptr ss:[esp+58] 0040101B 50 push eax 0040101C 6A 00 push 0 0040101E FF15 94024200 call dword ptr ds:[420294] ; kernel32.GetModuleFileNameA 00401024 85C0 test eax,eax 00401026 0F84 10010000 je chess.0040113C 0040102C 68 04010000 push 104 00401031 8D8C24 5C010000 lea ecx,dword ptr ss:[esp+15C] 00401038 51 push ecx 00401039 68 2C054200 push chess.0042052C ; ASCII "COMSPEC" 0040103E FF15 98024200 call dword ptr ds:[420298] ; kernel32.GetEnvironmentVariableA 00401044 85C0 test eax,eax 00401046 0F84 F0000000 je chess.0040113C 0040104C 68 04010000 push 104 00401051 8D5424 58 lea edx,dword ptr ss:[esp+58] 00401055 52 push edx 00401056 8BC2 mov eax,edx 00401058 50 push eax 00401059 FF15 9C024200 call dword ptr ds:[42029C] ; kernel32.GetShortPathNameA 0040105F 85C0 test eax,eax 00401061 0F84 D5000000 je chess.0040113C 00401067 57 push edi 00401068 33C0 xor eax,eax 0040106A B9 11000000 mov ecx,11 0040106F 8D7C24 14 lea edi,dword ptr ss:[esp+14] 00401073 F3:AB rep stos dword ptr es:[edi] 00401075 33C9 xor ecx,ecx 。。。 。。。 。。。 004071B8 6A 60 push 60 前面61 POPAD之后跳到这里,在这里DUMP之后,用ImportREC修复之后,程序运行出错??? 004071BA 68 A8294200 push chess.004229A8 004071BF E8 EC0A0000 call chess.00407CB0 004071C4 BF 94000000 mov edi,94 004071C9 8BC7 mov eax,edi 004071CB E8 B0FBFFFF call chess.00406D80 004071D0 8965 E8 mov dword ptr ss:[ebp-18],esp 004071D3 8BF4 mov esi,esp 004071D5 893E mov dword ptr ds:[esi],edi 004071D7 56 push esi 004071D8 FF15 80024200 call dword ptr ds:[420280] ; kernel32.GetVersionExA 004071DE 8B4E 10 mov ecx,dword ptr ds:[esi+10] 004071E1 890D 08BA4200 mov dword ptr ds:[42BA08],ecx 004071E7 8B46 04 mov eax,dword ptr ds:[esi+4] 004071EA A3 14BA4200 mov dword ptr ds:[42BA14],eax 004071EF 8B56 08 mov edx,dword ptr ds:[esi+8] 004071F2 8915 18BA4200 mov dword ptr ds:[42BA18],edx 004071F8 8B76 0C mov esi,dword ptr ds:[esi+C] 004071FB 81E6 FF7F0000 and esi,7FFF 00407201 8935 0CBA4200 mov dword ptr ds:[42BA0C],esi 00407207 83F9 02 cmp ecx,2 0040720A 74 0C je short chess.00407218 0040720C 81CE 00800000 or esi,8000 00407212 8935 0CBA4200 mov dword ptr ds:[42BA0C],esi 00407218 C1E0 08 shl eax,8 0040721B 03C2 add eax,edx 0040721D A3 10BA4200 mov dword ptr ds:[42BA10],eax 00407222 33F6 xor esi,esi 00407224 56 push esi 00407225 8B3D 40024200 mov edi,dword ptr ds:[420240] ; kernel32.GetModuleHandleA 0040722B FFD7 call edi 0040722D 66:8138 4D5A cmp word ptr ds:[eax],5A4D 00407232 75 1F jnz short chess.00407253 00407234 8B48 3C mov ecx,dword ptr ds:[eax+3C] 00407237 03C8 add ecx,eax 00407239 8139 50450000 cmp dword ptr ds:[ecx],4550 0040723F 75 12 jnz short chess.00407253 00407241 0FB741 18 movzx eax,word ptr ds:[ecx+18] 00407245 3D 0B010000 cmp eax,10B 0040724A 74 1F je short chess.0040726B 0040724C 3D 0B020000 cmp eax,20B 00407251 74 05 je short chess.00407258 00407253 8975 E4 mov dword ptr ss:[ebp-1C],esi 00407256 EB 27 jmp short chess.0040727F 00407258 83B9 84000000 0>cmp dword ptr ds:[ecx+84],0E 0040725F ^ 76 F2 jbe short chess.00407253 00407261 33C0 xor eax,eax 00407263 39B1 F8000000 cmp dword ptr ds:[ecx+F8],esi 00407269 EB 0E jmp short chess.00407279 0040726B 8379 74 0E cmp dword ptr ds:[ecx+74],0E 0040726F ^ 76 E2 jbe short chess.00407253 00407271 33C0 xor eax,eax 00407273 39B1 E8000000 cmp dword ptr ds:[ecx+E8],esi 00407279 0F95C0 setne al 0040727C 8945 E4 mov dword ptr ss:[ebp-1C],eax 0040727F 6A 01 push 1 00407281 E8 87450000 call chess.0040B80D 00407286 59 pop ecx 00407287 85C0 test eax,eax 00407289 75 08 jnz short chess.00407293 0040728B 6A 1C push 1C 0040728D E8 02FFFFFF call chess.00407194 00407292 59 pop ecx 00407293 E8 E0340000 call chess.0040A778 00407298 85C0 test eax,eax 0040729A 75 08 jnz short chess.004072A4 0040729C 6A 10 push 10 0040729E E8 F1FEFFFF call chess.00407194 004072A3 59 pop ecx 004072A4 E8 63660000 call chess.0040D90C 004072A9 8975 FC mov dword ptr ss:[ebp-4],esi 004072AC E8 5D640000 call chess.0040D70E 004072B1 85C0 test eax,eax 004072B3 7D 08 jge short chess.004072BD 004072B5 6A 1B push 1B 004072B7 E8 B3FEFFFF call chess.0040716F 004072BC 59 pop ecx 004072BD FF15 B4004200 call dword ptr ds:[4200B4] ; kernel32.GetCommandLineA 004072C3 A3 D0D24200 mov dword ptr ds:[42D2D0],eax 004072C8 E8 1F630000 call chess.0040D5EC 004072CD A3 F4B94200 mov dword ptr ds:[42B9F4],eax 004072D2 E8 73620000 call chess.0040D54A 004072D7 85C0 test eax,eax 004072D9 7D 08 jge short chess.004072E3 004072DB 6A 08 push 8 004072DD E8 8DFEFFFF call chess.0040716F 004072E2 59 pop ecx 004072E3 E8 2F600000 call chess.0040D317 004072E8 85C0 test eax,eax 004072EA 7D 08 jge short chess.004072F4 004072EC 6A 09 push 9 004072EE E8 7CFEFFFF call chess.0040716F 004072F3 59 pop ecx 004072F4 6A 01 push 1 004072F6 E8 1E0C0000 call chess.00407F19 脱掉之后,运行不起来,把入口地址由71B8改成1000,结果程序自动消失 请fly帮忙,这个入口地址应该是71B8还是1000??? |
|
脱壳高手帮忙看看这个软件是什么壳??
哪位大哥能讲讲对付自杀程序的思路啊?谢谢,一点头绪都没有,郁闷 |
|
脱壳高手帮忙看看这个软件是什么壳??
壳已经脱了,但是运行的时候却出错,是正常的吗? |
|
问一下大家,关于怎样才能学会脱壳?
呵呵,楼上的不是在打击我们菜鸟的信心嘛 |
|
脱壳高手帮忙看看这个软件是什么壳??
谢谢了各位朋友,慢慢研究呵呵 |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值