本人初学请各位高手指点!谢谢!
用PE测试得到 Microsoft Visual C++ 6.0 [Overlay]
这有壳吗?是什么壳?
00403831 >/$ 55 PUSH EBP
00403832 |. 8BEC MOV EBP,ESP
00403834 |. 6A FF PUSH -1
00403836 |. 68 F0624000 PUSH 工具.004062F0
0040383B |. 68 A44C4000 PUSH 工具.00404CA4 ; SE handler installation (入口点???)
00403840 |. 64:A1 00000000 MOV EAX,DWORD PTR FS:[0]
00403846 |. 50 PUSH EAX
00403847 |. 64:8925 000000>MOV DWORD PTR FS:[0],ESP
0040384E |. 83EC 58 SUB ESP,58
00403851 |. 53 PUSH EBX
00403852 |. 56 PUSH ESI
00403853 |. 57 PUSH EDI
00403854 |. 8965 E8 MOV DWORD PTR SS:[EBP-18],ESP
00403857 |. FF15 48604000 CALL DWORD PTR DS:[<&KERNEL32.GetVersion>; kernel32.GetVersion
0040385D |. 33D2 XOR EDX,EDX
0040385F |. 8AD4 MOV DL,AH
00403861 |. 8915 6C8A4000 MOV DWORD PTR DS:[408A6C],EDX
00403867 |. 8BC8 MOV ECX,EAX
00403869 |. 81E1 FF000000 AND ECX,0FF
0040386F |. 890D 688A4000 MOV DWORD PTR DS:[408A68],ECX
00403875 |. C1E1 08 SHL ECX,8
00403878 |. 03CA ADD ECX,EDX
0040387A |. 890D 648A4000 MOV DWORD PTR DS:[408A64],ECX
00403880 |. C1E8 10 SHR EAX,10
00403883 |. A3 608A4000 MOV DWORD PTR DS:[408A60],EAX
00403888 |. 33F6 XOR ESI,ESI
0040388A |. 56 PUSH ESI
0040388B |. E8 D3010000 CALL 工具.00403A63
00403890 |. 59 POP ECX
00403891 |. 85C0 TEST EAX,EAX
00403893 |. 75 08 JNZ SHORT 工具.0040389D
00403895 |. 6A 1C PUSH 1C
00403897 |. E8 B0000000 CALL 工具.0040394C
0040389C |. 59 POP ECX
0040389D |> 8975 FC MOV DWORD PTR SS:[EBP-4],ESI
004038A0 |. E8 59110000 CALL 工具.004049FE
004038A5 |. FF15 44604000 CALL DWORD PTR DS:[<&KERNEL32.GetCommand>; [GetCommandLineA
004038AB |. A3 548F4000 MOV DWORD PTR DS:[408F54],EAX
004038B0 |. E8 17100000 CALL 工具.004048CC
004038B5 |. A3 408A4000 MOV DWORD PTR DS:[408A40],EAX
004038BA |. E8 C00D0000 CALL 工具.0040467F
004038BF |. E8 020D0000 CALL 工具.004045C6
004038C4 |. E8 1F0A0000 CALL 工具.004042E8
004038C9 |. 8975 D0 MOV DWORD PTR SS:[EBP-30],ESI
004038CC |. 8D45 A4 LEA EAX,DWORD PTR SS:[EBP-5C]
004038CF |. 50 PUSH EAX ; /pStartupinfo
004038D0 |. FF15 40604000 CALL DWORD PTR DS:[<&KERNEL32.GetStartup>; \GetStartupInfoA
004038D6 |. E8 930C0000 CALL 工具.0040456E
004038DB |. 8945 9C MOV DWORD PTR SS:[EBP-64],EAX
004038DE |. F645 D0 01 TEST BYTE PTR SS:[EBP-30],1
004038E2 |. 74 06 JE SHORT 工具.004038EA
004038E4 |. 0FB745 D4 MOVZX EAX,WORD PTR SS:[EBP-2C]
004038E8 |. EB 03 JMP SHORT 工具.004038ED
004038EA |> 6A 0A PUSH 0A
004038EC |. 58 POP EAX
004038ED |> 50 PUSH EAX ; /Arg4
004038EE |. FF75 9C PUSH DWORD PTR SS:[EBP-64] ; |Arg3
004038F1 |. 56 PUSH ESI ; |Arg2
004038F2 |. 56 PUSH ESI ; |/pModule
004038F3 |. FF15 3C604000 CALL DWORD PTR DS:[<&KERNEL32.GetModuleH>; |\GetModuleHandleA
004038F9 |. 50 PUSH EAX ; |Arg1
004038FA |. E8 3BD8FFFF CALL 工具.0040113A ; \工具.0040113A (走到这步就弹出喊注册相信了)
请各位朋友辅导下刚刚进来的我,谢谢!
[培训]科锐逆向工程师培训第53期2025年7月8日开班!