能力值:
( LV2,RANK:10 )
|
-
-
2 楼
d32K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4k6Q4x3X3g2&6L8%4g2C8N6g2)9J5k6h3y4G2L8g2)9J5c8Y4k6Q4y4h3k6K6K9r3!0%4i4K6u0r3K9h3c8Q4y4h3k6j5e0W2c8Y4y4p5&6f1b7i4S2a6c8q4q4Q4x3@1c8Q4x3X3g2Z5N6r3#2D9
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
vb oep 特点
0040113E - FF25 34104000 JMP DWORD PTR DS:[<&MSVBVM60.EVENT_SINK_>; MSVBVM60.EVENT_SINK_Release
00401144 - FF25 64104000 JMP DWORD PTR DS:[<&MSVBVM60.#100>] ; MSVBVM60.ThunRTMain
0040114A 0000 ADD BYTE PTR DS:[EAX],AL
0040114C > 68 941F4000 PUSH 工程1.00401F94
00401151 E8 EEFFFFFF CALL <JMP.&MSVBVM60.#100>
00401156 0000 ADD BYTE PTR DS:[EAX],AL
00401158 0000 ADD BYTE PTR DS:[EAX],AL
0040115A 0000 ADD BYTE PTR DS:[EAX],AL
0040115C 3000 XOR BYTE PTR DS:[EAX],AL
0040115E 0000 ADD BYTE PTR DS:[EAX],AL
0012FFBC 00401156 返回到 工程1.00401156 来自 <JMP.&MSVBVM60.#100>
0012FFC0 00401F94 工程1.00401F94
0012FFC4 7C816FD7 返回到 kernel32.7C816FD7
0012FFC8 7C930738 ntdll.7C930738
0012FFCC FFFFFFFF
0012FFD0 7FFD5000
0012FFD4 8054507D
0012FFD8 0012FFC8
0012FFDC FC565DA8
0012FFE0 FFFFFFFF SEH 链尾部
0012FFE4 7C839AA8 SE 处理器
0012FFE8 7C816FE0 kernel32.7C816FE0
0012FFEC 00000000
0012FFF0 00000000
0012FFF4 00000000
0012FFF8 0040114C 工程1.<模块入口点>
7C92EB94 > C3 RETN
7C92EB95 8DA424 00000000 LEA ESP,DWORD PTR SS:[ESP]
7C92EB9C 8D6424 00 LEA ESP,DWORD PTR SS:[ESP]
7C92EBA0 90 NOP
7C92EBA1 90 NOP
7C92EBA2 90 NOP
0054C480 - FF25 1CF15400 JMP DWORD PTR DS:[54F11C] ; user32.MessageBoxA
0054C486 8BC0 MOV EAX,EAX
0054C488 - FF25 2CF15400 JMP DWORD PTR DS:[54F12C] ; kernel32.ExitProcess
0054C48E 8BC0 MOV EAX,EAX
0054C490 B8 98C45400 MOV EAX,UnpackME.0054C498 ; UNICODE "Enigma anti-debugger plugin - Debug Objects ?Vladimir Sukhov 30 August 2008"
0054C495 C3 RETN
0012FDE0 00000000
0012FDE4 0054C698 ASCII "Debugger is found on this machine!"
0012FDE8 0054C690 ASCII "Error"
0012FDEC 00000010
0012FDF0 00000000 /CALL 到 ExitProcess
0012FDF4 00000000 \ExitCode = 0
0012FE20 0054C740 UnpackME.0054C740
0012FE24 00520C38 UnpackME.00520C38
0012FE28 0047B949 UnpackME.0047B949
0012FE2C 0050BBFC UnpackME.0050BBFC
0012FE30 00549000 ASCII "MZP"
0054C75A 833D 64E65400 0>CMP DWORD PTR DS:[54E664],0
0054C761 74 1D JE SHORT UnpackME.0054C780 ////////////
0054C763 E8 88FFFFFF CALL UnpackME.0054C6F0
0054C768 68 28C75400 PUSH UnpackME.0054C728
0054C76D 68 D0070000 PUSH 7D0
0054C772 6A 01 PUSH 1
0054C774 6A 00 PUSH 0
0054C776 E8 F5FCFFFF CALL UnpackME.0054C470 ; JMP 到 user32.SetTimer
0054C77B A3 60E65400 MOV DWORD PTR DS:[54E660],EAX
0054C780 C3 RETN
0054C781 0000 ADD BYTE PTR DS:[EAX],AL
0054C783 004E 74 ADD BYTE PTR DS:[ESI+74],CL
DS:[0054E664]=7C92E01B (ntdll.ZwQueryInformationProcess)
0012FF10 0149B456 返回到 0149B456 来自 UnpackME.00401128
0012FF14 004263B0 ASCII "VB5!6&*"
0012FF18 004FC000 UnpackME.004FC000
0012FF1C 00000000
0012FF20 0047F000 ASCII "MZP"
0012FF24 00482F07 返回到 UnpackME.00482F07 来自 UnpackME.00482DA8
00401122 .- FF25 6C104000 JMP DWORD PTR DS:[<&msvbvm60.EVENT_SINK_>; msvbvm60.EVENT_SINK_Release
00401128 $- FF25 70104000 JMP DWORD PTR DS:[<&msvbvm60.ThunRTMain>>; msvbvm60.ThunRTMain
0040112E > $ 68 B0634200 PUSH 112E.004263B0 ; ASCII "VB5!6&*"
00401133 . E8 F0FFFFFF CALL <JMP.&msvbvm60.ThunRTMain>
445K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6G2M7Y4g2E0i4K6u0W2N6s2g2@1M7K6c8&6L8%4g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6L8X3c8W2P5q4)9J5k6i4m8Z5M7q4)9K6c8W2)9J5y4Y4y4Z5L8%4N6@1L8%4m8A6j5#2)9K6c8o6p5^5x3e0M7&6
|
能力值:
( LV2,RANK:10 )
|
-
-
4 楼
卡巴报有毒,不敢下载
|
|
|