能力值:
( LV2,RANK:10 )
|
-
-
9 楼
- -, 我可能表意不清, 我目前脱了sr8的那层壳并且在解密vm而不是game的那层壳,如果脱了那个就没什么了。。。。。
。。。。等我搞定VM可能会把完整脱壳笔记发上来的。。。。
目前在写VM反汇编器。。。。。
0000c40[278b694, 3f] mov4 %189, [%153]
0000c48[277cafb, 44] add4 %153, 68h
0000c54[28868f0, a0] mov4 %143, 1eh
0000c60[288c95e, e1] expr %143
0000c68[28a94a2, 32] mov4 %194, 36d873dh
0000c74[2814708, 37] sub4 %194, 6bbah
0000c80[275e072, 96] cmp4 %189, %194
0000c88[28a94a2, ec] mov4 %13, 5678685eh
0000c94[28868f0, 14] mov4 %14, 90c31234h
0000ca0[27d67ce, e1] push %161
0000ca8[28447ab, 09] push %193
0000cb0[27aef63, 95] push %194
0000cb8[2792ed2, 9d] push %101
0000cc0[2786c67, 5b] push %169
0000cc8[2786c67, f4] push %125
0000cd0[27f2583, 94] push %153
0000cd8[2899a76, 31] stvx ; save v_curr state
0000ce0[2827e83, 6c] xjmp %13 ; jmp to x86 code
0000ce8[27c6277, fb] ldvx ; load v_curr state
0000cf0[2898bb0, bf] xmov %189, %eax ; xreg=1
0000cf8[2898bb0, 8a] xmov %193, %ebx ; xreg=2
0000d00[2803639, e8] xmov %194, %ecx ; xreg=3
0000d08[2869705, b5] xmov %101, %edx ; xreg=4
0000d10[2898bb0, 5f] xmov %169, %edi ; xreg=5
0000d18[2869705, 91] xmov %125, %esi ; xreg=6
0000d20[27767e3, 6f] xmov %153, %ebp ; xreg=7
0000d28[2809c07, f0] sub4 %153, 74h
0000d34[28b0fe2, 2f] add4 %153, d0h
0000d40[2780933, 42] mov4 [%153], %125
0000d48[27f1df1, ae] sub4 %223, 5ch
0000d54[2891b88, 01] bgt 0072f8h ; trigger, h=2795b6c, m=54, f=65a4
0000d64[2782a19, f2] beq 006df4h ; trigger, h=27e70ff, m=ad, f=6090 传递的api参数无效
00072f8[2795b6c, 54] mov4 %0, %0
0007300[277d72b, c2] mov4 %194, 4d238cach
000730c[27fd5a6, 44] cmp4 %194, %189
0007314[27e1a93, f2] bgt 0099e8h ; trigger, h=27e70ff, m=ef, f=26d4
0007324[27e1a93, 39] beq 0094e8h ; trigger, h=27d3d26, m=ef, f=21c4
00009d0[2760a43, bb] ldvx ; load v_curr state
00009d8[27d9f2c, 78] xmov %189, %eax ; xreg=1
00009e0[27ad1ff, 9e] xmov %193, %ebx ; xreg=2
00009e8[2869705, d9] xmov %194, %ecx ; xreg=3
00009f0[27727f2, eb] xmov %101, %edx ; xreg=4
00009f8[2869705, 3c] xmov %169, %edi ; xreg=5
0000a00[2803639, 35] xmov %125, %esi ; xreg=6
0000a08[2803639, 93] xmov %153, %ebp ; xreg=7
0000a10[2793c50, 72] cmp4 %189, %167
0000a18[283c097, 43] mov4 %13, 56786859h
0000a24[281c77c, 52] mov4 %14, 90c31234h
0000a30[27aef63, c5] push %189
0000a38[27ef71d, 71] push %193
0000a40[288c6fa, d4] push %194
0000a48[2786c67, 6f] push %101
0000a50[27e4c25, 6c] push %169
0000a58[27d13ef, 0f] push %125
0000a60[275dabe, c1] push %153
0000a68[27636de, bf] stvx ; save v_curr state
0000a70[27d3a13, b6] xjmp %13 ; jmp to x86 code
0000a78[27c6277, 13] ldvx ; load v_curr state
0000a80[27ec896, 11] xmov %189, %eax ; xreg=1
0000a88[27da302, 5e] xmov %193, %ebx ; xreg=2
0000a90[2881a9f, 30] xmov %194, %ecx ; xreg=3
0000a98[27ad1ff, 59] xmov %101, %edx ; xreg=4
0000aa0[27778d1, 3e] xmov %169, %edi ; xreg=5
0000aa8[2898bb0, 86] xmov %125, %esi ; xreg=6
0000ab0[27da302, 4f] xmov %153, %ebp ; xreg=7
0000ab8[289291e, 8c] bne 00d330h ; trigger, h=27c2354, m=61, f=c878
0000ac8[277d72b, 9c] mov4 %125, 30e91bdh
0000ad4[27aa28b, 5f] add4 %125, f663h
0000ae0[2819edc, 5f] expr %125
0000ae8[27d13ef, ad] push %189
0000af0[288c6fa, e7] push %193
0000af8[278d1ce, e9] push %194
0000b00[27d67ce, cd] push %161
0000b08[27e4c25, cd] push %169
0000b10[27d67ce, 3e] push %161
0000b18[2792ed2, 47] push %153
0000b20[2899a76, a4] stvx ; save v_curr state
0000b28[277d72b, 5f] mov4 %143, 2908220h
0000b34[2872949, 2d] xjmp %143 ; jmp to x86 code
0000b3c[2792cdd, fd] ldvx ; load v_curr state
0000b44[2869705, 0a] xmov %189, %eax ; xreg=1
0000b4c[2758d29, c6] xmov %193, %ebx ; xreg=2
0000b54[27ad1ff, f1] xmov %194, %ecx ; xreg=3
0000b5c[2897de0, 86] xmov %101, %edx ; xreg=4
0000b64[27767e3, f5] xmov %169, %edi ; xreg=5
0000b6c[2869705, ed] xmov %125, %esi ; xreg=6
0000b74[2758d29, b4] xmov %153, %ebp ; xreg=7
0000b7c[275e072, 61] cmp4 %189, %125
0000b84[27c570b, 3c] mov4 %13, 56786859h
0000b90[277d72b, c2] mov4 %14, 90c31234h
0000b9c[27e4c25, 41] push %189
0000ba4[2786c67, 19] push %193
0000bac[278d1ce, 93] push %194
0000bb4[27ef71d, 8a] push %101
0000bbc[27d13ef, a3] push %169
0000bc4[2881877, 42] push %125
0000bcc[275dabe, f2] push %153
0000bd4[278eab0, 1a] stvx ; save v_curr state
0000bdc[27ca28a, ca] xjmp %13 ; jmp to x86 code
0000be4[2792cdd, 51] ldvx ; load v_curr state
0000bec[27ec896, c0] xmov %189, %eax ; xreg=1
0000bf4[2803639, 7a] xmov %193, %ebx ; xreg=2
0000bfc[27d9f2c, b2] xmov %194, %ecx ; xreg=3
0000c04[27da302, 37] xmov %101, %edx ; xreg=4
0000c0c[27727f2, 21] xmov %169, %edi ; xreg=5
0000c14[2869705, c2] xmov %125, %esi ; xreg=6
0000c1c[27767e3, 29] xmov %153, %ebp ; xreg=7
0000c24[279a4cc, 94] bne 00d330h ; trigger, h=27c2354, m=61, f=c70c
0000c34[27f02f3, f7] add4 %153, 68h
0000c40[278b694, 3f] mov4 %189, [%153]
0000c48[277cafb, 44] add4 %153, 68h
0000c54[28868f0, a0] mov4 %143, 1eh
0000c60[288c95e, e1] expr %143
0000c68[28a94a2, 32] mov4 %194, 36d873dh
0000c74[2814708, 37] sub4 %194, 6bbah
0000c80[275e072, 96] cmp4 %189, %194
0000c88[28a94a2, ec] mov4 %13, 5678685eh
0000c94[28868f0, 14] mov4 %14, 90c31234h
0000ca0[27d67ce, e1] push %161
0000ca8[28447ab, 09] push %193
0000cb0[27aef63, 95] push %194
0000cb8[2792ed2, 9d] push %101
0000cc0[2786c67, 5b] push %169
0000cc8[2786c67, f4] push %125
0000cd0[27f2583, 94] push %153
0000cd8[2899a76, 31] stvx ; save v_curr state
0000ce0[2827e83, 6c] xjmp %13 ; jmp to x86 code
0000ce8[27c6277, fb] ldvx ; load v_curr state
0000cf0[2898bb0, bf] xmov %189, %eax ; xreg=1
0000cf8[2898bb0, 8a] xmov %193, %ebx ; xreg=2
0000d00[2803639, e8] xmov %194, %ecx ; xreg=3
0000d08[2869705, b5] xmov %101, %edx ; xreg=4
0000d10[2898bb0, 5f] xmov %169, %edi ; xreg=5
0000d18[2869705, 91] xmov %125, %esi ; xreg=6
0000d20[27767e3, 6f] xmov %153, %ebp ; xreg=7
0000d28[2809c07, f0] sub4 %153, 74h
0000d34[28b0fe2, 2f] add4 %153, d0h
0000d40[2780933, 42] mov4 [%153], %125
0000d48[27f1df1, ae] sub4 %223, 5ch
0000d54[2891b88, 01] bgt 0072f8h ; trigger, h=2795b6c, m=54, f=65a4
0000d64[2782a19, f2] beq 006df4h ; trigger, h=27e70ff, m=ad, f=6090
sr8_vm reg.vm 0 d330 27c2354 61
sr8_vm reg.vm 0 72f8 2795b6c 54
00072f8[2795b6c, 54] mov4 %0, %0
0007300[277d72b, c2] mov4 %194, 4d238cach
000730c[27fd5a6, 44] cmp4 %194, %189
0007314[27e1a93, f2] bgt 0099e8h ; trigger, h=27e70ff, m=ef, f=26d4
0007324[27e1a93, 39] beq 0094e8h ; trigger, h=27d3d26, m=ef, f=21c4
sr8_vm reg.vm 0 99e8 27e70ff cc
sr8_vm reg.vm 0 94e8 27d3d26 cc
但几乎一个指令一个handler,而且每个指令的执行要依靠前一条指令的参数,追根溯源的方法用起来不方便。。。。。郁闷。。。。
s组的绕过估计是建立在正版KEY激活流程的分析和paul.dll对exe参数输入的基础上。。。。
但我没这个条件,只能硬解码vm.....
|