附件下载地址↓:
http://www.lao-dao.cn/Project2.rar
00696610 > 9C PUSHFD OD断在这里
00696611 60 PUSHAD
00696612 E8 00000000 CALL Project2.00696617 \\ESP
00696617 5D POP EBP
00696618 83ED 07 SUB EBP,7
0069661B 8D8D D4FCFFFF LEA ECX,DWORD PTR SS:[EBP-32C]
00696621 8039 01 CMP BYTE PTR DS:[ECX],1
00696624 0F84 42020000 JE Project2.0069686C
0069662A C601 01 MOV BYTE PTR DS:[ECX],1
00696881 9D POPFD
00696882 - E9 680CFFFF JMP Project2.006874EF
这里应该是跳到 OEP吧
00696887 8BB5 60FCFFFF MOV ESI,DWORD PTR SS:[EBP-3A0]
0069688D 0BF6 OR ESI,ESI
0069688F 0F84 97000000 JE Project2.0069692C
00696895 8B95 68FCFFFF MOV EDX,DWORD PTR SS:[EBP-398]
0069689B 03F2 ADD ESI,EDX
006874EF 68 C32EFD75 PUSH 75FD2EC3 \\
这里是OEP吗?脱壳后查壳深度扫描显示:Anti007 V1.0-V2.X -> NsPacK Private 而且无法运行。修复不了006874F4 E8 917F0000 CALL Project2.0068F48A
006874F9 68 962CF775 PUSH 75F72C96
006874FE E8 877F0000 CALL Project2.0068F48A
00687503 0F4402 CMOVE EAX,DWORD PTR DS:[EDX]
00687506 3B0A CMP ECX,DWORD PTR DS:[EDX]
00687508 9B WAIT
00687509 04 0F ADD AL,0F
0068750B ^ 70 83 JO SHORT Project2.00687490
0068750D 42 INC EDX
鼠标向上滚动 ↓:
006874EF 68 C32EFD75 PUSH 75FD2EC3
006874F4 E8 917F0000 CALL Project2.0068F48A
006874F9 68 962CF775 PUSH 75F72C96
006874FE E8 877F0000 CALL Project2.0068F48A
00687503 0F4402 CMOVE EAX,DWORD PTR DS:[EDX]
00687506 3B0A CMP ECX,DWORD PTR DS:[EDX]
00687508 9B WAIT
00687509 04 0F ADD AL,0F
0068750B ^ 70 83 JO SHORT Project2.00687490
0068750D 42 INC EDX
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)