peid显示是:ASPack 2.12 -> Alexey Solodovnikov
00401000 > $ 60 pushad
00401001 . E8 03000000 call Pcshare?00401009
00401006 E9 db E9
00401007 EB db EB
00401008 04 db 04
00401009 /$ 5D pop ebp
0040100A |. 45 inc ebp
0040100B |. 55 push ebp
0040100C \. C3 retn
0040100D E8 db E8
0040100E 01 db 01
0040100F 00 db 00
00401010 00 db 00
00401011 . 00EB add bl,ch
00401013 . 5D pop ebp
00401014 . BB EDFFFFFF mov ebx,-13
00401019 . 03DD add ebx,ebp
0040101B . 81EB 00400000 sub ebx,4000
00401021 . 61 popad
00401022 .- E9 D07D4800 jmp Pcshare?00888DF7
00401027 00 db 00
00888DF7 60 pushad
00888DF8 E8 00000000 call Pcshare?00888DFD
00888DFD 83C4 04 add esp,4
00888E00 8B6C24 FC mov ebp,dword ptr ss:[esp-4]
00888E04 E8 8B020000 call Pcshare?00889094
00888E09 E8 74240000 call Pcshare?0088B282
00888E0E E8 88430000 call Pcshare?0088D19B
00888E13 837C24 28 01 cmp dword ptr ss:[esp+28],1
00888E18 75 0C jnz short Pcshare?00888E26
00888E1A 8B4424 24 mov eax,dword ptr ss:[esp+24]
00888E1E 8985 7E470000 mov dword ptr ss:[ebp+477E],eax
00888E24 EB 0C jmp short Pcshare?00888E32
00888E26 8B85 7A470000 mov eax,dword ptr ss:[ebp+477A]
00888E2C 8985 7E470000 mov dword ptr ss:[ebp+477E],eax
00888E32 E8 100D0000 call Pcshare?00889B47
00888E37 EB 03 jmp short Pcshare?00888E3C
00888E39 24 00 and al,0
用esp 定律怎么都脱不掉!!!郁闷 是不是peid被欺骗了?
[课程]FART 脱壳王!加量不加价!FART作者讲授!