我已经把文件上传到网盘了,有兴趣的朋友一起研究一下。下载地址:
dd0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0S2P5h3k6A6L8r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0W2V1x3o6N6S2k6U0N6S2i4K6u0V1y4U0M7@1x3W2)9J5k6o6p5I4k6e0m8Q4x3X3c8T1z5e0V1K6i4K6u0V1x3o6l9I4y4h3x3#2y4h3c8T1y4K6y4V1i4K6u0r3
程序用PEID查壳显示:ASPack 2.12 -> Alexey Solodovnikov
OD载入,入口代码:
008DD001 > 60 pushad
008DD002 E8 03000000 call 求索固定.008DD00A
008DD007 - E9 EB045D45 jmp 45EAD4F7
008DD00C 55 push ebp
008DD00D C3 retn
008DD00E E8 01000000 call 求索固定.008DD014
008DD013 EB 5D jmp X求索固定.008DD072
008DD015 BB EDFFFFFF mov ebx,-0x13
008DD01A 03DD add ebx,ebp
008DD01C 81EB 00D04D00 sub ebx,求索固定.004DD000
008DD022 83BD 88040000 0>cmp dword ptr ss:[ebp+0x488],0x0
008DD029 899D 88040000 mov dword ptr ss:[ebp+0x488],ebx
ESP定律后到达:
008DD416 /75 08 jnz X求索固定.008DD420
008DD418 |B8 01000000 mov eax,0x1
008DD41D |C2 0C00 retn 0xC
008DD420 \68 00104000 push 求索固定.00401000
008DD425 C3 retn
008DD426 8B85 8C040000 mov eax,dword ptr ss:[ebp+0x48C]
008DD42C 8D8D A1040000 lea ecx,dword ptr ss:[ebp+0x4A1]
008DD432 51 push ecx
单步到008DD425后,回来这里
00401000 E8 06000000 call 求索固定.0040100B
00401005 50 push eax
00401006 E8 BB010000 call 求索固定.004011C6 ; jmp 到 kernel32.ExitProcess
0040100B 55 push ebp
0040100C 8BEC mov ebp,esp
0040100E 81C4 F0FEFFFF add esp,-0x110
00401014 E9 83000000 jmp 求索固定.0040109C
00401019 6B72 6E 6C imul esi,dword ptr ds:[edx+0x6E],0x6C
0040101D 6E outs dx,byte ptr es:[edi]
0040101E 2E:66:6E outs dx,byte ptr es:[edi]
00401021 72 00 jb X求索固定.00401023
00401023 6B72 6E 6C imul esi,dword ptr ds:[edx+0x6E],0x6C
这里应该是OEP了吧,但是这没有任何语言特征。难道被插取了代码?但是00401000往上翻,都没地方可以补代码。
菜鸟请求牛牛解惑
[培训]科锐逆向工程师培训第53期2025年7月8日开班!