我用PEID没有查到,这是用OD载入情况,请问是否有壳,有壳又是什么壳,本人先谢谢了!00438000 > 68 E0F47B0E push 0E7BF4E0
00438005 59 pop ecx
00438006 BA 20804300 mov edx, 00438020
0043800B 68 C4060000 push 6C4
00438010 5F pop edi
00438011 FF343A push dword ptr [edx+edi]
00438014 310C24 xor dword ptr [esp], ecx
00438017 8F043A pop dword ptr [edx+edi]
0043801A 83EF 02 sub edi, 2
0043801D 83EF 02 sub edi, 2
00438020 ^ 75 EF jnz short 00438011
00438022 90 nop
00438023 90 nop
00438024 0889 7A0EE0F4 or byte ptr [ecx+F4E00E7A], cl
0043802A 7B 0E jpo short 0043803A
0043802C ^ E0 F4 loopdne short 00438022
0043802E 3B0E cmp ecx, dword ptr [esi]
00438030 B1 E1 mov cl, 0E1
00438032 7B 0E jpo short 00438042
00438034 - E0 B2 loopdne short 00437FE8
00438036 78 0E js short 00438046
00438038 E6 B9 out 0B9, al
0043803A 78 0E js short 0043804A
0043803C E0 44 loopdne short 00438082
0043803E 79 0E jns short 0043804E
00438040 1F pop ds
00438041 0B84F1 88853B0E or eax, dword ptr [ecx+esi*8+E3B858>
00438048 6286 3B0E5286 bound eax, qword ptr [esi+86520E3B]
0043804E 3B0E cmp ecx, dword ptr [esi]
00438050 64:A0 7B0E6086 mov al, byte ptr fs:[86600E7B]
00438056 7B 0E jpo short 00438066
00438058 50 push eax
00438059 867B 0E xchg byte ptr [ebx+E], bh
0043805C 88A1 7B0E6086 mov byte ptr [ecx+86600E7B], ah
00438062 7B 0E jpo short 00438072
00438064 50 push eax
00438065 867B 0E xchg byte ptr [ebx+E], bh
00438068 ^ E0 F4 loopdne short 0043805E
0043806A 7B 0E jpo short 0043807A
0043806C ^ E0 F4 loopdne short 00438062
0043806E 7B 0E jpo short 0043807E
00438070 ^ E0 F4 loopdne short 00438066
00438072 7B 0E jpo short 00438082
00438074 ^ E0 F4 loopdne short 0043806A
00438076 7B 0E jpo short 00438086
00438078 8C85 3B0EE0F4 mov word ptr [ebp+F4E00E3B], es
0043807E 7B 0E jpo short 0043808E
00438080 ^ E0 F4 loopdne short 00438076
00438082 7B 0E jpo short 00438092
00438084 ^ E0 F4 loopdne short 0043807A
00438086 7B 0E jpo short 00438096
00438088 ^ E0 F4 loopdne short 0043807E
0043808A 7B 0E jpo short 0043809A
0043808C ^ E0 F4 loopdne short 00438082
0043808E 7B 0E jpo short 0043809E
00438090 ^ E0 F4 loopdne short 00438086
00438092 7B 0E jpo short 004380A2
00438094 ^ E0 F4 loopdne short 0043808A
00438096 7B 0E jpo short 004380A6
00438098 ^ E0 F4 loopdne short 0043808E
0043809A 7B 0E jpo short 004380AA
0043809C ^ E0 F4 loopdne short 00438092
0043809E 7B 0E jpo short 004380AE
004380A0 ^ E0 F4 loopdne short 00438096
004380A2 7B 0E jpo short 004380B2
004380A4 0000 add byte ptr [eax], al
004380A6 0000 add byte ptr [eax], al
004380A8 AB stos dword ptr es:[edi]
004380A9 91 xchg eax, ecx
004380AA 0960 85 or dword ptr [eax-7B], esp
004380AD 98 cwde
004380AE 48 dec eax
004380AF 3C CE cmp al, 0CE
004380B1 90 nop
004380B2 17 pop ss
004380B3 62E0 bound esp, eax ; Illegal use of register
004380B5 B3 1E mov bl, 1E
004380B7 7A B4 jpe short 0043806D
004380B9 91 xchg eax, ecx
004380BA 16 push ss
004380BB ^ 7E B0 jle short 0043806D
004380BD 95 xchg eax, ebp
004380BE 0F66A1 F43C6B94 pcmpgtd mm4, qword ptr [ecx+946B3CF4]
004380C5 A0 1E6390B2 mov al, byte ptr [B290631E]
004380CA 1262 85 adc ah, byte ptr [edx-7B]
004380CD BA 1A6385B5 mov edx, B585631A
004380D2 7B 4D jpo short 00438121
004380D4 92 xchg eax, edx
004380D5 91 xchg eax, ecx
004380D6 1A7A 85 sbb bh, byte ptr [edx-7B]
004380D9 B2 12 mov dl, 12
004380DB 6285 B57B5C85 bound eax, qword ptr [ebp+855C7BB5]
004380E1 95 xchg eax, ebp
004380E2 1F pop ds
004380E3 48 dec eax
004380E4 8998 1E0EB786 mov dword ptr [eax+86B70E1E], ebx
[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法