能力值:
( LV4,RANK:50 )
|
-
-
2 楼
aston.exe
oep:4193a0
00985CC9 /EB 01 JMP SHORT 00985CCC
00985CCB |9A 51579CFC BF0>CALL FAR 0DBF:FC9C5751 ; 远距呼叫
00985CD2 5D POP EBP
00985CD3 98 CWDE
00985CD4 00B9 5E140000 ADD BYTE PTR DS:[ECX+145E],BH
00985CDA F3:AA REP STOS BYTE PTR ES:[EDI]
00985CDC 9D POPFD
00985CDD 5F POP EDI
00985CDE 59 POP ECX
00985CDF C3 RETN
00985CE0 55 PUSH EBP ;//oep处代码
00985CE1 8BEC MOV EBP,ESP
00985CE3 53 PUSH EBX
00985CE4 56 PUSH ESI
00985CE5 8B75 0C MOV ESI,DWORD PTR SS:[EBP+C]
00985CE8 8B5D 08 MOV EBX,DWORD PTR SS:[EBP+8]
00985CEB EB 11 JMP SHORT 00985CFE
00985CED 0FB703 MOVZX EAX,WORD PTR DS:[EBX]
问题和a-master.exe一样
004034C9 . 83C2 0F ADD EDX,0F
004034CC > 8B0D D0A54100 MOV ECX,DWORD PTR DS:[41A5D0] ; 解密ECX=41A2C8
004034D2 . 8A0C01 MOV CL,BYTE PTR DS:[ECX+EAX]
004034D5 . 300A XOR BYTE PTR DS:[EDX],CL
004034D7 . 48 DEC EAX
004034D8 . 4A DEC EDX ;//EDX是字符位置,注意这里是重后往前解密
004034D9 . 85C0 TEST EAX,EAX
004034DB .^ 75 EF JNZ SHORT ASTON1~2.004034CC
004034DD . 33C0 XOR EAX,EAX
密文:0041A2E8 E7 7A 3C 28 4C 90 10 5D 8C 8F AA FF A3 00 00 2E
解密:0041A2E8 5B 58 8B 40 02 8B 00 FF 30 8F 00 FF E3 47 70 FC
改成解密后的代码后,再改4034cc指令为:
004034CC EB 0F JMP SHORT ASTON1~2.004034DD
让他跳走,因为它已经没有用了.
0041A2E8 5B POP EBX ; ASTON1~2.004034F7,这些指令是刚刚动态解密的.
0041A2E9 58 POP EAX
0041A2EA 8B40 02 MOV EAX,DWORD PTR DS:[EAX+2]
0041A2ED 8B00 MOV EAX,DWORD PTR DS:[EAX]
0041A2EF FF30 PUSH DWORD PTR DS:[EAX] ;又来这一招,异常
0041A2F1 8F00 POP DWORD PTR DS:[EAX] ;这里pop异常
0041A2F3 FFE3 JMP EBX
改为明文后,这样改:
0041A2EF EB 02 JMP SHORT ASTON1~2.0041A2F3
---
00403532 . 83C2 0F ADD EDX,0F ; 再加密刚才解密的指令,这个不必管他
00403535 > 8B0D D0A54100 MOV ECX,DWORD PTR DS:[41A5D0] ; ASTON1~2.0041A2C8
0040353B . 8A0C01 MOV CL,BYTE PTR DS:[ECX+EAX]
0040353E . 300A XOR BYTE PTR DS:[EDX],CL
00403540 . 48 DEC EAX
00403541 . 4A DEC EDX
00403542 . 85C0 TEST EAX,EAX
00403544 .^ 75 EF JNZ SHORT ASTON1~2.00403535
00403546 . 5F POP EDI
===
00408738 . BA 80A34100 MOV EDX,ASTON1~2.0041A380 ; 解密
0040873D > 8B0D 30A94100 MOV ECX,DWORD PTR DS:[41A930] ; ASTON1~2.0041A284 //OP:EB16
00408743 . 8B09 MOV ECX,DWORD PTR DS:[ECX]
00408745 . 8A0C01 MOV CL,BYTE PTR DS:[ECX+EAX]
00408748 . 300A XOR BYTE PTR DS:[EDX],CL
0040874A . 48 DEC EAX
0040874B . 4A DEC EDX
0040874C . 85C0 TEST EAX,EAX
0040874E .^ 75 ED JNZ SHORT ASTON1~2.0040873D
00408750 . 33C0 XOR EAX,EAX
密文:0041A374 34 3E FF 37 63 F9 65 A3 7D E6 63 8D 8C
明文:0041A374 5B 58 8B 40 02 8B 00 FF 30 8F 00 FF E3
---
0041A374 5B POP EBX
0041A375 58 POP EAX
0041A376 8B40 02 MOV EAX,DWORD PTR DS:[EAX+2]
0041A379 8B00 MOV EAX,DWORD PTR DS:[EAX]
0041A37B FF30 PUSH DWORD PTR DS:[EAX]
0041A37D 8F00 POP DWORD PTR DS:[EAX] ;异常
0041A37F FFE3 JMP EBX
--
00408799 . BA 80A34100 MOV EDX,ASTON1~2.0041A380 ;再加密
0040879E > 8B0D 30A94100 MOV ECX,DWORD PTR DS:[41A930] ; ASTON1~2.0041A284
004087A4 . 8B09 MOV ECX,DWORD PTR DS:[ECX]
004087A6 . 8A0C01 MOV CL,BYTE PTR DS:[ECX+EAX]
004087A9 . 300A XOR BYTE PTR DS:[EDX],CL
004087AB . 48 DEC EAX
004087AC . 4A DEC EDX
004087AD . 85C0 TEST EAX,EAX
004087AF .^ 75 ED JNZ SHORT ASTON1~2.0040879E
***********************
右下角按钮,关于窗口 里注册用户名显示问题,这些都是密文,直接搜索是找不到的.
用WINHEX内存编辑功能搜索注册名,找到偏移,再用OD下内存访问,找到以下代码:
=================
0041212D > \57 PUSH EDI
0041212E . 89C7 MOV EDI,EAX
00412130 . BA 48214100 MOV EDX,ASTON.00412148 ;注册名加密存放在412148
00412135 . B1 14 MOV CL,14 ;放CL值用于解密,cl就是总字符个数
00412137 > 8A02 MOV AL,BYTE PTR DS:[EDX] ;逐个取字符
00412139 . 30C8 XOR AL,CL ;解密
0041213B . 8807 MOV BYTE PTR DS:[EDI],AL ;放回[edi]=41c4e0
0041213D . 42 INC EDX
0041213E . 47 INC EDI
0041213F . FEC9 DEC CL ;改变CL值
00412141 .^ 75 F4 JNZ SHORT ASTON.00412137 ;跳回解密下一个字符
00412143 . C607 00 MOV BYTE PTR DS:[EDI],0
00412146 . 5F POP EDI
00412147 . C3 RETN
00412148 50 DB 50 ; CHAR 'P' 这里就是加密的注册名,直接改为明文
00412149 7E DB 7E ; CHAR '~'
0041214A 7B DB 7B ; CHAR '{'
0041214B 65 DB 65 ; CHAR 'e'
0041214C 62 DB 62 ; CHAR 'b'
0041214D 76 DB 76 ; CHAR 'v'
0041214E 21 DB 21 ; CHAR '!'
0041214F 58 DB 58 ; CHAR 'X'
00412150 62 DB 62 ; CHAR 'b'
00412151 6F DB 6F ; CHAR 'o'
00412152 6F DB 6F ; CHAR 'o'
00412153 7B DB 7B ; CHAR '{'
00412154 58 DB 58 ; CHAR 'X'
00412155 6B DB 6B ; CHAR 'k'
00412156 06 DB 06
00412157 05 DB 05
00412158 56 DB 56 ; CHAR 'V'
00412159 46 DB 46 ; CHAR 'F'
0041215A 46 DB 46 ; CHAR 'F'
0041215B 28 DB 28 ; CHAR '('
0041215C . C3 RETN
==zzhzihui@163.net 16bytes
00400080 C705 48214100 5>MOV DWORD PTR DS:[412148],657B7E50 ;注意这里会动态写入412148内容,就是加密的注册名
0040008A C705 4C214100 6>MOV DWORD PTR DS:[41214C],58217662
00400094 C705 50214100 6>MOV DWORD PTR DS:[412150],7B6F6F62
0040009E C705 54214100 5>MOV DWORD PTR DS:[412154],05066B58 ;我们要用到这里,所以从400080要跳到400d0
004000A8 C705 342F4100 4>MOV DWORD PTR DS:[412F34],7F65604A ;这里动态写入ABOUT窗的注册名,所以也要跳过
004000B2 C705 382F4100 7>MOV DWORD PTR DS:[412F38],52277078
004000BC C705 3C2F4100 6>MOV DWORD PTR DS:[412F3C],71616168
004000C6 C705 402F4100 5>MOV DWORD PTR DS:[412F40],16176D52
004000D0 C605 E8334100 C>MOV BYTE PTR DS:[4133E8],0C3
004000D7 C605 DB344100 8>MOV BYTE PTR DS:[4134DB],84
==
修改:00400080 /EB 4E JMP SHORT ASTON.004000D0
**********************
412f42 (165h)
00412D1E 89F9 MOV ECX,EDI ;ECX=165h, 357bytes 加密的ABOUT框文本
00412D20 BE DD2D4100 MOV ESI,aston.00412DDD ;这里412ddd密文开始
00412D25 89C7 MOV EDI,EAX ;EDI=1bFC68明文开始,EDI是随机变化的
00412D27 89C2 MOV EDX,EAX ;明文开始,用于计数器
00412D29 8A06 MOV AL,BYTE PTR DS:[ESI] ;循环解密
00412D2B 30C8 XOR AL,CL ;逐字节解密(nop)
00412D2D 8802 MOV BYTE PTR DS:[EDX],AL ;逐字节放入1BFC68
00412D2F 46 INC ESI
00412D30 42 INC EDX
00412D31 49 DEC ECX
00412D32 ^ 75 F5 JNZ SHORT aston.00412D29 ;跳回继续解密
00412D34 57 PUSH EDI
00412D35 53 PUSH EBX
....
00412D42 . 89C7 MOV EDI,EAX ;这是解密字符YOU HAVE ??? DAYS LEFT
00412D44 . 89C3 MOV EBX,EAX
00412D46 . BA 422F4100 MOV EDX,ASTON.00412F42
00412D4B . B9 17000000 MOV ECX,17
00412D50 > 8A02 MOV AL,BYTE PTR DS:[EDX]
00412D52 . 30C8 XOR AL,CL ;(nop)
00412D54 . 8807 MOV BYTE PTR DS:[EDI],AL
00412D56 . 42 INC EDX
00412D57 . 47 INC EDI
00412D58 . 49 DEC ECX
00412D59 .^ 75 F5 JNZ SHORT ASTON.00412D50
00412D5B . C607 00 MOV BYTE PTR DS:[EDI],0
---------
密文:412ddd-412f58
00412DDD 24 44 30 42 35 40 10 7E 13 7C 6A 74 60 76 67 5B $D0B5@~|jt`vg[
00412DED 5F 17 3C 22 28 22 26 29 25 38 6B E3 69 79 7E 7F _<"("&)%8k汩y~
00412DFD 7C 69 71 72 71 73 1F 79 51 5D 5F 53 58 4C 58 44 |iqrqsyQ]_SXLXD
00412E0D 46 14 60 5D 57 44 58 4F 5F 49 05 27 23 69 4B 4A F`]WDXO_I'#iKJ
00412E1D 05 56 4A 45 49 54 6C 3E 6F 79 68 7F 6B 6E 72 72 VJEITl>oyhknrr
00412E2D 18 1E 56 3F 7C 71 66 62 37 2C 78 7F 79 78 68 74 V?|qfb7,xyxht
00412E3D 71 44 62 71 75 6F 91 8D 95 99 97 96 D7 9B 98 9B qDbquo?????
00412E4D F8 FE BB 9D 9C 95 CF 9E 8C 8B 8E D0 C9 80 93 92 ????????
00412E5D 95 DE CC CD 96 97 A8 F0 BC AF AF B5 B7 AB BF B3 ?掏??集?帆砍
00412E6D B9 B8 FD B1 BE BD C2 C4 C0 C6 9B B8 A6 AF B5 A7 垢?窘履榔?Ο掸
00412E7D A8 A9 AA AC A6 FA 9F F1 D1 D9 DC 9A FB CD DB CF ī???奄??巯
00412E8D D6 DC DC C4 9D 90 E1 C7 CE C7 8B EF CE C7 D5 C9 周苣?崆吻?吻丈
00412E9D D3 A9 A9 E3 C5 C4 F6 EA F4 F3 F5 FB F5 B8 C4 E3 萤┿拍鲫趔觖醺你
00412EAD E5 E4 FC E0 E5 AA AF CA E0 E5 FF F8 F0 A8 D7 F4 邃?濯?噱?皎?
00412EBD EA F7 F5 EB F3 EE 16 10 51 71 71 2A 18 0E 12 1A 犄蹼箢Qqq*
00412ECD 55 3F 1C 00 1C 19 1C 06 04 02 47 4A 39 09 12 0A U?.GJ9..
00412EDD 45 2A 0A 09 0E 0E 30 38 3B 70 56 50 1C 2E 30 33 E*..08;pVP.03
00412EED 3B 3B 25 72 1F 39 24 27 39 2D 67 6A 1D 29 35 27 ;;%r9$'9-gj)5'
00412EFD 36 64 01 30 28 3A 56 4A 4E 57 42 16 34 32 73 5B 6d0(:VJNWB42s[
00412F0D 5C 40 41 4B 11 63 5A 46 42 48 44 4F 5F 04 07 62 \@AKcZFBHDO_b
00412F1D 0B 68 0D 02 6E 4C 7A 6D 7E 74 36 4D 70 74 7B 7F h.nLzm~t6Mpt{
00412F2D 74 79 60 1F 1B 1D 05 4A 60 65 7F 78 70 27 52 68 ty`J`exp'Rh
00412F3D 64 65 72 50 6C 00 79 60 34 7B 73 67 75 2F 2B 78 derPl.y`4{sgu/+x
00412F4D 2C 6F 6B 70 20 74 2F 25 68 66 64 75 ,okp t/%hfdu
明文:
001BFC68 41 20 53 20 54 20 4F 20 4E 20 31 2E 39 2E 30 0D A S T O N 1.9.0.
001BFC78 0A 43 6F 70 79 72 69 67 68 74 20 A9 20 31 39 39 .Copyright ?199
001BFC88 39 2D 32 30 30 33 20 47 6C 61 64 69 61 74 6F 72 9-2003 Gladiator
001BFC98 73 20 53 6F 66 74 77 61 72 65 2E 0D 0A 41 6C 6C s Software...All
001BFCA8 20 72 69 67 68 74 73 20 72 65 73 65 72 76 65 64 rights reserved
001BFCB8 0D 0A 45 2D 6D 61 69 6C 3A 20 73 75 70 70 6F 72 ..E-mail: suppor
001BFCC8 74 40 61 73 74 6F 6E 73 68 65 6C 6C 2E 63 6F 6D t@astonshell.com
001BFCD8 0D 0A 48 6F 6D 65 20 70 61 67 65 3A 20 68 74 74 ..Home page: htt
001BFCE8 70 3A 2F 2F 77 77 77 2E 61 73 74 6F 6E 73 68 65 p://www.astonshe
001BFCF8 6C 6C 2E 63 6F 6D 0D 0A 0D 0A 50 72 6F 67 72 61 ll.com....Progra
001BFD08 6D 6D 69 6E 67 3A 20 4F 6C 65 67 20 42 75 6C 79 mming: Oleg Buly
001BFD18 63 68 6F 76 2C 20 4E 69 63 6B 20 45 67 6F 72 6F chov, Nick Egoro
001BFD28 76 0D 0A 41 64 64 69 74 69 6F 6E 61 6C 20 53 75 v..Additional Su
001BFD38 70 70 6F 72 74 3A 20 44 6D 69 74 72 79 20 50 72 pport: Dmitry Pr
001BFD48 6F 73 76 69 72 6E 69 6E 2C 0D 0A 50 61 76 65 6C osvirnin,..Pavel
001BFD58 20 4B 6F 72 6D 69 73 68 69 6E 2C 20 50 61 75 6C Kormishin, Paul
001BFD68 20 4E 69 6B 6F 6E 6F 66 66 2C 0D 0A 45 76 67 65 Nikonoff,..Evge
001BFD78 6E 6F 76 20 4E 69 6B 69 74 61 2C 20 54 61 72 61 nov Nikita, Tara
001BFD88 73 20 42 72 69 7A 69 74 73 6B 79 2C 0D 0A 44 6D s Brizitsky,..Dm
001BFD98 69 74 72 79 20 53 75 68 6F 64 6F 65 76 2C 20 44 itry Suhodoev, D
001BFDA8 2E 4C 2E 20 4F 6C 65 73 63 68 2D 57 69 6C 6C 69 .L. Olesch-Willi
001BFDB8 61 6D 73 0D 0A 0D 0A 44 6D 69 74 72 79 2F 55 6E ams....Dmitry/Un
001BFDC8 64 65 72 50 6C 00 derPl.
=======
方法:将密文通过WINHEX直接改为明文,将动态写入的部分跳过,将XOR AL,CL这段解密代码NOP
当然也可以根据要显示的字符通过逆算法(xor al,cl)算出密文,这样只需要直接改一小部分密文即可
|
能力值:
( LV4,RANK:50 )
|
-
-
3 楼
oep:414d9c
00995EB7 FC CLD
00995EB8 BF F55E9900 MOV EDI,995EF5
00995EBD B9 5E140000 MOV ECX,145E
00995EC2 F3:AA REP STOS BYTE PTR ES:[EDI]
00995EC4 9D POPFD
00995EC5 5F POP EDI
00995EC6 59 POP ECX
00995EC7 C3 RETN
00995EC8 55 PUSH EBP //这里STOLEN BYTES,OEP代码
00995EC9 8BEC MOV EBP,ESP
00995ECB 53 PUSH EBX
00995ECC 56 PUSH ESI
00995ECD 8B75 0C MOV ESI,DWORD PTR SS:[EBP+C]
00995ED0 8B5D 08 MOV EBX,DWORD PTR SS:[EBP+8]
00995ED3 EB 11 JMP SHORT 00995EE6
00995ED5 0FB703 MOVZX EAX,WORD PTR DS:[EBX]
--
004010F4 - FF25 1C314200 JMP DWORD PTR DS:[42311C] //tc eip<900000,停在这里,DUMP
004010FA 8BC0 MOV EAX,EAX
004010FC - FF25 18314200 JMP DWORD PTR DS:[423118]
00401102 8BC0 MOV EAX,EAX
00401104 31C0 XOR EAX,EAX
00401106 50 PUSH EAX
00401107 E8 E8FFFFFF CALL THWIZARD.004010F4
-----
修复IAT,无其他异常.
**************
注:这里面可能修改了某些信息,但是只是作为个人使用,未对外发放,请原作者见谅.
贴子很乱(垃圾贴)
需要的朋友可以搜索aston1.90下载原版,然后脱壳,如果需要98下的IAT表,可以向我询问.
zzhzihui@tom.com
|