有带花指令的Armadillo吗?
返回到这里,是不是花指令?
004398DE FF52 FF call [edx-1]
004398E1 15 A0104600 adc eax, <&KERNEL32.WaitForDebugEven>
004398E6 85C0 test eax, eax
004398E8 0F84 B1230000 je 0043BC9F
004398EE 60 pushad
004398EF 33C0 xor eax, eax
004398F1 75 02 jnz short 004398F5
004398F3 EB 15 jmp short 0043990A
004398F5 EB 33 jmp short 0043992A
004398F7 C075 18 7A sal byte ptr [ebp+18], 7A
004398FB 0C 70 or al, 70
004398FD 0E push cs
004398FE EB 0D jmp short 0043990D
00439900 E8 720E79F1 call F1BCA777
00439905 FF15 00790974 call [74097900]
0043990B F0:EB 87 lock jmp short 00439895 ; 不允许锁定前缀
0043990E DB7A F0 fstp tbyte ptr [edx-10]
00439911 A0 336133C0 mov al, [C0336133]
00439916 A0 BC4A4600 mov al, [464ABC]
0043991B 85C0 test eax, eax
0043991D 0F85 00010000 jnz 00439A23
00439923 60 pushad
00439924 33C0 xor eax, eax
00439926 75 02 jnz short 0043992A
00439928 EB 15 jmp short 0043993F
0043992A EB 33 jmp short 0043995F
0043992C C075 18 7A sal byte ptr [ebp+18], 7A
00439930 0C 70 or al, 70
00439932 0E push cs
00439933 EB 0D jmp short 00439942
00439935 E8 720E79F1 call F1BCA7AC
0043993A FF15 00790974 call [74097900]
00439940 F0:EB 87 lock jmp short 004398CA ; 不允许锁定前缀
00439943 DB7A F0 fstp tbyte ptr [edx-10]
00439946 A0 33618B8D mov al, [8D8B6133]
0043994B 48 dec eax
0043994C F6FF idiv bh
0043994E FF81 E1FF0000 inc dword ptr [ecx+FFE1]
00439954 0085 C90F84C6 add [ebp+C6840FC9], al
0043995A 0000 add [eax], al
0043995C 009C60 EB2BD270 add [eax+70D22BEB], bl
00439963 0E push cs
00439964 EB 1D jmp short 00439983
00439966 33C9 xor ecx, ecx
00439968 74 00 je short 0043996A
0043996A EB 10 jmp short 0043997C
0043996C F9 stc
0043996D 83F1 03 xor ecx, 3
00439970 ^ 74 90 je short 00439902
[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法