首页
社区
课程
招聘
[转帖]DeCV 1.0b By p_k (Decompiler for Code Virtualizer 1.3.8)
发表于: 2013-3-20 21:28 3399

[转帖]DeCV 1.0b By p_k (Decompiler for Code Virtualizer 1.3.8)

2013-3-20 21:28
3399

5b5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6G2M7Y4g2E0i4K6u0W2N6s2g2@1M7K6c8&6L8%4g2Q4x3X3g2U0L8$3#2Q4x3V1k6@1L8%4m8A6j5#2)9J5c8U0x3H3x3e0j5#2i4K6u0V1k6r3g2U0N6W2)9J5k6o6p5H3j5W2)9J5k6r3u0&6i4K6u0V1M7q4)9J5k6r3E0Q4x3X3c8V1k6h3y4G2L8i4m8A6L8r3g2J5i4K6u0V1k6X3!0J5i4K6u0V1j5$3!0V1k6g2)9J5k6s2k6A6M7Y4c8#2j5h3I4A6P5X3g2J5i4K6u0V1x3e0x3^5i4K6u0r3

DeCV 1.0b
---------

- What is it
- Usage
- Possible problems

About
-----
DeCV is a decompiler for files protected with Code Virtualizer v1.3.8.0 by
Oreans Technologies (261K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3!0J5k6h3q4F1M7#2)9J5k6h3y4G2L8g2)9J5z5g2)9J5k6b7`.`.

It's able to devirtualize macro-protected code back to a stack language used
by CV. If anyone is interested enough to write a CVL -> x86 converter, take
a look at recover_x86.py -- it it's not hard to extend this code to handle
more opcodes, but it's quite a bit of work.

Usage
-----
DeCV was tested on IDA 6.2.x with IDAPython.

To use, open the file you want to deprotect and load decv.py script and wait.
DeCV will automatically perform all tasks.

Possible problems
-----------------
DeCV relies on IDA to correctly disassemble code. If you encounter problems
during the handler parsing (basic block creation), manifested in errors like:
- outside handler: *address*
- Problem with getting mnemonic @ *address*
they are most likely caused by incorrect disasm generated by IDA.

To fix, go to the address you see in the error message. If you see garbage
instructions or data mixed with code (DB xxh), undefine whole block by
pressing 'u', and then directly convert to code, by pressing 'c'. Resulting
code should be cleaner and should not have garbage instructions, or DB xxh
stuff in it.

p_k
gdtr.wordpress.com
twitter.com/pa_kt

more info And Ref:
5cdK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3N6V1N6s2u0Q4x3X3g2%4L8%4u0V1M7s2u0W2M7#2)9J5k6g2)9J5k6g2)9J5k6h3W2*7k6i4u0Q4x3X3c8T1P5g2)9J5k6r3!0J5k6h3q4F1M7#2)9J5c8R3`.`.

Sources:
db1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6H3j5h3E0@1i4K6u0r3k6r3g2U0N6R3`.`.

Typical decompilation output:
adeK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8S2M7%4c8W2j5X3W2F1i4K6u0W2j5$3!0E0i4K6u0r3k6i4c8*7j5X3q4g2K9p5t1`.

Regards 

[培训]科锐逆向工程师培训第53期2025年7月8日开班!

收藏
免费 0
支持
分享
最新回复 (1)
雪    币: 106611
活跃值: (202414)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
2
Thanks for share.
2013-3-20 21:34
0
游客
登录 | 注册 方可回帖
返回