1、PE查壳:ASProtect V2.X Registered -> Alexey Solodovnikov *未能识别!
2、Quick Unpack分析壳是: ASProtect 1.33 - 2.1 Registered -> Alexey Solodovnikov *
3、载入OD,利用OD自带的ASProtect托壳脚本脱壳,运行到这里出现
00F2F7F3 /74 5F JE SHORT 00F2F854
00F2F7F5 |8B5C24 04 MOV EBX,DWORD PTR SS:[ESP+4]
00F2F7F9 |03DE ADD EBX,ESI
00F2F7FB |EB 51 JMP SHORT 00F2F84E
00F2F7FD |8D43 04 LEA EAX,DWORD PTR DS:[EBX+4]
00F2F800 |8B00 MOV EAX,DWORD PTR DS:[EAX]
00F2F802 |83E8 08 SUB EAX,8
00F2F805 |D1E8 SHR EAX,1
00F2F807 |8BFA MOV EDI,EDX
00F2F809 |037C24 04 ADD EDI,DWORD PTR SS:[ESP+4]
00F2F80D |83C3 08 ADD EBX,8
00F2F810 |8BF0 MOV ESI,EAX
00F2F812 |85F6 TEST ESI,ESI
00F2F814 |76 38 JBE SHORT 00F2F84E
00F2F816 |66:8B13 MOV DX,WORD PTR DS:[EBX]
00F2F819 |0FB7C2 MOVZX EAX,DX
00F2F81C |C1E8 0C SHR EAX,0C
00F2F81F |66:83E8 01 SUB AX,1
00F2F823 |72 23 JB SHORT 00F2F848
00F2F825 |66:83E8 02 SUB AX,2
00F2F829 |74 02 JE SHORT 00F2F82D
00F2F82B |EB 11 JMP SHORT 00F2F83E
00F2F82D |66:81E2 FF0F AND DX,0FFF
00F2F832 |0FB7C2 MOVZX EAX,DX
00F2F835 |03C7 ADD EAX,EDI
00F2F837 |8B1424 MOV EDX,DWORD PTR SS:[ESP]
00F2F83A |0110 ADD DWORD PTR DS:[EAX],EDX
00F2F83C |EB 0A JMP SHORT 00F2F848
00F2F83E |68 74F8F200 PUSH 0F2F874 ; ASCII "34
"
00F2F843 |E8 8864FDFF CALL 00F05CD0
00F2F848 |83C3 02 ADD EBX,2
00F2F84B |4E DEC ESI
00F2F84C ^|75 C8 JNZ SHORT 00F2F816
00F2F84E |8B13 MOV EDX,DWORD PTR DS:[EBX]
00F2F850 |85D2 TEST EDX,EDX
00F2F852 ^|75 A9 JNZ SHORT 00F2F7FD
00F2F854 \83C4 30 ADD ESP,30
出项一个错误提示框框:OllyScript error!---Erroe on line 285
Text:and tmp3,OFFFF
请问接下来在哪里断点???断点过后 直接用OD脱壳吗?谢谢
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课