附件:HexToStr.rar
有时分析代码的时候有很多字符串常量,在调试器下就变成了16进制的ASCII码,有时这些字符串也能帮助你的分析,我以前是照着ASCII码表进行手工转换的,后来写了一个小工具方便多了。。。
像某壳的下面这一段代码
方便多了。。。
00461220 0F84 E5010000 je UnpackMe.0046140B ;跳出这个循环了
00461226 8138 45786974 cmp dword ptr ds:[eax],74697845 ; ExitProcess
0046122C 75 19 jnz short UnpackMe.00461247
0046122E 8178 04 50726F63 cmp dword ptr ds:[eax+4],636F7250
00461235 75 10 jnz short UnpackMe.00461247
00461237 8178 08 65737300 cmp dword ptr ds:[eax+8],737365
0046123E 75 07 jnz short UnpackMe.00461247
00461240 68 C7030000 push 3C7
00461245 ^ EB BC jmp short UnpackMe.00461203
00461247 8138 56697274 cmp dword ptr ds:[eax],74726956 ; VirtualAlloc
0046124D 75 1F jnz short UnpackMe.0046126E
0046124F 8178 04 75616C41 cmp dword ptr ds:[eax+4],416C6175
00461256 75 16 jnz short UnpackMe.0046126E
00461258 8178 08 6C6C6F63 cmp dword ptr ds:[eax+8],636F6C6C
0046125F 75 0D jnz short UnpackMe.0046126E
00461261 8078 0C 00 cmp byte ptr ds:[eax+C],0
00461265 75 07 jnz short UnpackMe.0046126E
00461267 68 CB030000 push 3CB
0046126C ^ EB 95 jmp short UnpackMe.00461203
0046126E 8138 56697274 cmp dword ptr ds:[eax],74726956 ; VirtualFree
00461274 75 1C jnz short UnpackMe.00461292
00461276 8178 04 75616C46 cmp dword ptr ds:[eax+4],466C6175
0046127D 75 13 jnz short UnpackMe.00461292
0046127F 8178 08 72656500 cmp dword ptr ds:[eax+8],656572
00461286 75 0A jnz short UnpackMe.00461292
00461288 68 CF030000 push 3CF
0046128D ^ E9 71FFFFFF jmp UnpackMe.00461203
00461292 8138 43726561 cmp dword ptr ds:[eax],61657243 ; CreateMutexA
00461298 75 1C jnz short UnpackMe.004612B6
0046129A 8178 04 74654D75 cmp dword ptr ds:[eax+4],754D6574
004612A1 75 13 jnz short UnpackMe.004612B6
004612A3 8178 08 74657841 cmp dword ptr ds:[eax+8],41786574
004612AA 75 0A jnz short UnpackMe.004612B6
004612AC 68 D3030000 push 3D3
004612B1 ^ E9 4DFFFFFF jmp UnpackMe.00461203
004612B6 8138 4F70656E cmp dword ptr ds:[eax],6E65704F ; OpenProcess
004612BC 75 1C jnz short UnpackMe.004612DA
004612BE 8178 04 50726F63 cmp dword ptr ds:[eax+4],636F7250
004612C5 75 13 jnz short UnpackMe.004612DA
004612C7 8178 08 65737300 cmp dword ptr ds:[eax+8],737365
004612CE 75 0A jnz short UnpackMe.004612DA
004612D0 68 DB030000 push 3DB
004612D5 ^ E9 29FFFFFF jmp UnpackMe.00461203
004612DA 8138 47657443 cmp dword ptr ds:[eax],43746547 ; GetCurrentProcessId
004612E0 75 2E jnz short UnpackMe.00461310
004612E2 8178 04 75727265 cmp dword ptr ds:[eax+4],65727275
004612E9 75 25 jnz short UnpackMe.00461310
004612EB 8178 08 6E745072 cmp dword ptr ds:[eax+8],7250746E
004612F2 75 1C jnz short UnpackMe.00461310
004612F4 8178 0C 6F636573 cmp dword ptr ds:[eax+C],7365636F
004612FB 75 13 jnz short UnpackMe.00461310
004612FD 8178 10 73496400 cmp dword ptr ds:[eax+10],644973
00461304 75 0A jnz short UnpackMe.00461310
00461306 68 D7030000 push 3D7
0046130B ^ E9 F3FEFFFF jmp UnpackMe.00461203
00461310 8138 56697274 cmp dword ptr ds:[eax],74726956 ; VirtualProtectEx
00461316 75 25 jnz short UnpackMe.0046133D
00461318 8178 04 75616C50 cmp dword ptr ds:[eax+4],506C6175
0046131F 75 1C jnz short UnpackMe.0046133D
00461321 8178 08 726F7465 cmp dword ptr ds:[eax+8],65746F72
00461328 75 13 jnz short UnpackMe.0046133D
0046132A 8178 0C 63744578 cmp dword ptr ds:[eax+C],78457463
00461331 75 0A jnz short UnpackMe.0046133D
00461333 68 DF030000 push 3DF
00461338 ^ E9 C6FEFFFF jmp UnpackMe.00461203
0046133D 8138 43726561 cmp dword ptr ds:[eax],61657243 ; CreateFileA
00461343 75 1C jnz short UnpackMe.00461361
00461345 8178 04 74654669 cmp dword ptr ds:[eax+4],69466574
0046134C 75 13 jnz short UnpackMe.00461361
0046134E 8178 08 6C654100 cmp dword ptr ds:[eax+8],UnpackMe.0041656C
00461355 75 0A jnz short UnpackMe.00461361
00461357 68 EB030000 push 3EB
0046135C ^ E9 A2FEFFFF jmp UnpackMe.00461203
00461361 8138 436C6F73 cmp dword ptr ds:[eax],736F6C43 ; CloseHandle
00461367 75 1C jnz short UnpackMe.00461385
00461369 8178 04 6548616E cmp dword ptr ds:[eax+4],6E614865
00461370 75 13 jnz short UnpackMe.00461385
00461372 8178 08 646C6500 cmp dword ptr ds:[eax+8],656C64
00461379 75 0A jnz short UnpackMe.00461385
0046137B 68 E3030000 push 3E3
00461380 ^ E9 7EFEFFFF jmp UnpackMe.00461203
00461385 8138 52656164 cmp dword ptr ds:[eax],64616552 ; ReadFile
0046138B 75 19 jnz short UnpackMe.004613A6
0046138D 8178 04 46696C65 cmp dword ptr ds:[eax+4],656C6946
00461394 75 10 jnz short UnpackMe.004613A6
00461396 8078 08 00 cmp byte ptr ds:[eax+8],0
0046139A 75 0A jnz short UnpackMe.004613A6
0046139C 68 E7030000 push 3E7
004613A1 ^ E9 5DFEFFFF jmp UnpackMe.00461203
004613A6 8138 4765744D cmp dword ptr ds:[eax],4D746547 ; GetModuleFileNameA
004613AC 75 2D jnz short UnpackMe.004613DB
004613AE 8178 04 6F64756C cmp dword ptr ds:[eax+4],6C75646F
004613B5 75 24 jnz short UnpackMe.004613DB
004613B7 8178 08 6546696C cmp dword ptr ds:[eax+8],6C694665
004613BE 75 1B jnz short UnpackMe.004613DB
004613C0 8178 0C 654E616D cmp dword ptr ds:[eax+C],6D614E65
004613C7 75 12 jnz short UnpackMe.004613DB
004613C9 66:8178 10 6541 cmp word ptr ds:[eax+10],4165
004613CF 75 0A jnz short UnpackMe.004613DB
004613D1 68 EF030000 push 3EF
004613D6 ^ E9 28FEFFFF jmp UnpackMe.00461203
004613DB 8138 47657450 cmp dword ptr ds:[eax],50746547 ; GetProcAddre
004613E1 ^ 0F85 F1FDFFFF jnz UnpackMe.004611D8
004613E7 8178 04 726F6341 cmp dword ptr ds:[eax+4],41636F72
004613EE ^ 0F85 E4FDFFFF jnz UnpackMe.004611D8
004613F4 8178 08 64647265 cmp dword ptr ds:[eax+8],65726464
004613FB ^ 0F85 D7FDFFFF jnz UnpackMe.004611D8
00461401 68 BF030000 push 3BF
00461406 ^ E9 F8FDFFFF jmp UnpackMe.00461203
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!