可以帮助我脱一下ASProtect 2.1x SKE -> Alexey Solodovnikov的壳吗?
可以帮助我脱一下ASProtect 2.1x SKE -> Alexey Solodovnikov的壳吗?目标软件下载:
一流QQ斗地主刷分器V1.99[所有截图在附件可以看到!!!]
http://wg.16xia.com/html/55.html,
我不知道用哪个脚本,用Aspr2.XX_unpacker_v1.13SC.osc脚本会出现:[截图1]
OS: Windows XP Professional, SP3
CPU: AuthenticAMD, AMD AMD Athlon(tm) 64 Processor 3000+, MMX @ 30100 MHz
Module name: C:\Documents and Settings\Administrator\桌面\QQDDZSF.exe
Application data:
VmVyc2lvbjogV3RPNXcvUlNWYkt5c043UThNeXF2OS9QL1ZjbksxYzl
JejBnUGlFL1RUd3hIQmhKSVQwbU5IZGdmM3B6Tnlnck55Z2pPa2wrY0
hsOGJudERNejk3WTFOQVFVbEdVV1ZtWm5nSQ0KSW1hZ2VCYXNlOiAwM
DQwMDAwMA0KRWlwOiBBRjAwNzcNCkVheDogMA0KRWN4OiAxMzIwMDAw
DQpFZHg6IDEyRkY4MA0KRWJ4OiAxMzU0MDAwDQpFc2k6IDEzMzAwMDA
NCkVkaTogNDA2ODM4DQpFYnA6IDEyRkY5OA0KRXNwOiAxMkVGMjgNCk
Vycm9yQ29kZTogDQo4OSwzQiw4Myw1LDQsMSxBRiwwLDgsNUIsOTAsO
TAsNTYsRjIsRUIsRTksM0YsMCw4NSwwLDkwLDkwLDkwLDkwLDkwLDAs
MCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsQTEsNCwxLEFGLDA
sQzcsMCxCQyxERSw0OCwwLi4uDQpDb2RlID0gWzIxNF0NCi0gMA0KLS
AwDQotIDIyNw0KLSAwDQotIFtdDQo+IEM6XERvY3VtZW50cyBhbmQgU
2V0dGluZ3NcQWRtaW5pc3RyYXRvclzXwMPmXFFRRERaU0YuZXhlDQoN
CjE2eGlhLmNvbQ0K0rvB91FRtre12Nb3y6K31sb3DQoxLjkuOS43NQ0
KMTZ4aWEuY29tDQoxNnhpYS5jb20NCjEuMC4wLjANCg0KPiBDOlxXSU
5ET1dTXHN5c3RlbTMyXG50ZGxsLmRsbA0KPiBDOlxXSU5ET1dTXHN5c
3RlbTMyXGtlcm5lbDMyLmRsbA0KPiBDOlxXSU5ET1dTXHN5c3RlbTMy
XHVzZXIzMi5kbGwNCj4gQzpcV0lORE9XU1xzeXN0ZW0zMlxHREkzMi5
kbGwNCj4gQzpcV0lORE9XU1xzeXN0ZW0zMlxhZHZhcGkzMi5kbGwNCj
4gQzpcV0lORE9XU1xzeXN0ZW0zMlxSUENSVDQuZGxsDQo+IEM6XFdJT
kRPV1Ncc3lzdGVtMzJcU2VjdXIzMi5kbGwNCj4gQzpcV0lORE9XU1xz
eXN0ZW0zMlxvbGVhdXQzMi5kbGwNCj4gQzpcV0lORE9XU1xzeXN0ZW0
zMlxtc3ZjcnQuZGxsDQo+IEM6XFdJTkRPV1Ncc3lzdGVtMzJcb2xlMz
IuZGxsDQo+IEM6XFdJTkRPV1Ncc3lzdGVtMzJcdmVyc2lvbi5kbGwNC
j4gQzpcV0lORE9XU1xXaW5TeFNceDg2X01pY3Jvc29mdC5XaW5kb3dz
LkNvbW1vbi1Db250cm9sc182NTk1YjY0MTQ0Y2NmMWRmXzYuMC4yNjA
wLjU1MTJfeC13d18zNWQ0Y2U4M1xjb21jdGwzMi5kbGwNCj4gQzpcV0
lORE9XU1xzeXN0ZW0zMlxTSExXQVBJLmRsbA0KPiBDOlxXSU5ET1dTX
HN5c3RlbTMyXHNoZWxsMzIuZGxsDQo+IEM6XFdJTkRPV1Ncc3lzdGVt
MzJcSU1NMzIuRExMDQo+IEM6XFdJTkRPV1Ncc3lzdGVtMzJcTFBLLkR
MTA0KPiBDOlxXSU5ET1dTXHN5c3RlbTMyXFVTUDEwLmRsbA0KPiBDOl
xXSU5ET1dTXHN5c3RlbTMyXGttb24uZGxsDQoNCkJlaWppbmcgUmlza
W5nIEluZm9ybWF0aW9uIFRlY2hub2xvZ3kgQ28uLCBMdGQuDQpLYUth
IE1vbml0b3JzDQoxLCAwLCAwLCAyOA0KQmVpamluZyBSaXNpbmcgSW5
mb3JtYXRpb24gVGVjaG5vbG9neSBDby4sIEx0ZC4NCkNvcHlyaWdodC
hDKSAyMDA4IEJlaWppbmcgUmlzaW5nIEluZm9ybWF0aW9uIFRlY2hub
2xvZ3kgQ28uLCBMdGQuIEFsbCBSaWdodHMgUmVzZXJ2ZWQuDQpSSVNJ
TkcNCmttb24uZGxsDQoxLCAwLCAwLCAyOA0KS2FLYSBNb25pdG9ycw0
KMjAwODA4MjUxNjE4MzY5NTMNCg0KPiBDOlxQcm9ncmFtIEZpbGVzXF
Jpc2luZ1xBbnRpU3B5d2FyZVxjb214My5kbGwNCg0KQmVpamluZyBSa
XNpbmcgSW5mb3JtYXRpb24gVGVjaG5vbG9neSBDby4sIEx0ZC4NCmNv
bXgzIER5bmFtaWMgTGluayBMaWJyYXJ5DQoyMS4wLjAuMzQNCkJlaWp
pbmcgUmlzaW5nIEluZm9ybWF0aW9uIFRlY2hub2xvZ3kgQ28uLCBMdG
QuDQpDb3B5cmlnaHQoQykgMjAwOCBCZWlqaW5nIFJpc2luZyBJbmZvc
m1hdGlvbiBUZWNobm9sb2d5IENvLiwgTHRkLiBBbGwgUmlnaHRzIFJl
c2VydmVkLg0KY29teDMuZGxsDQoyMS4wMA0KUmlzaW5nIEJhc2UgRnV
uY3Rpb24NCjIwMDgwOTA2MTUzMDA0OTg0DQoNCj4gQzpcUHJvZ3JhbS
BGaWxlc1xSaXNpbmdcQW50aVNweXdhcmVcU3lzbGF5LmRsbA0KDQpCZ
WlqaW5nIFJpc2luZyBJbmZvcm1hdGlvbiBUZWNobm9sb2d5IENvLiwg
THRkLg0KU3lzbGF5DQoyMS4wLjAuNg0KQmVpamluZyBSaXNpbmcgSW5
mb3JtYXRpb24gVGVjaG5vbG9neSBDby4sIEx0ZC4NCkNvcHlyaWdodC
hDKSAyMDA4IEJlaWppbmcgUmlzaW5nIEluZm9ybWF0aW9uIFRlY2hub
2xvZ3kgQ28uLCBMdGQuIEFsbCBSaWdodHMgUmVzZXJ2ZWQuDQpTeXNs
YXkuZGxsDQoyMS4wMA0KUmlzaW5nIEJhc2UgRnVuY3Rpb24NCjIwMDg
wODE5MTczNDEzMjAzDQoNCj4gQzpcV0lORE9XU1xzeXN0ZW0zMlxXdH
NhcGkzMi5kbGwNCj4gQzpcV0lORE9XU1xzeXN0ZW0zMlxXSU5TVEEuZ
GxsDQo+IEM6XFdJTkRPV1Ncc3lzdGVtMzJcTkVUQVBJMzIuZGxsDQo+
IEM6XFdJTkRPV1Ncc3lzdGVtMzJcdXJsbW9uLmRsbA0KPiBDOlxXSU5
ET1dTXHN5c3RlbTMyXHdzb2NrMzIuZGxsDQo+IEM6XFdJTkRPV1Ncc3
lzdGVtMzJcV1MyXzMyLmRsbA0KPiBDOlxXSU5ET1dTXHN5c3RlbTMyX
FdTMkhFTFAuZGxsDQo+IEM6XFdJTkRPV1Ncc3lzdGVtMzJcdXh0aGVt
ZS5kbGwNCj4gQzpcV0lORE9XU1xzeXN0ZW0zMlxNU0NURi5kbGwNCj4
gRDpcUHJvZ3JhbSBGaWxlc1wzNjBzYWZlXHNhZmVtb25cc2FmZW1vbi
5kbGwNCg0KMzYwLkNODQozNjCwssirzsDKv8q1yrGxo7ukxKO/6Q0KN
CwgMiwgMCwgMTAwNQ0KsObIqMv509AoQykgMjAwNi0yMDA4IDM2MC5D
Tg0Kc2FmZW1vbi5kbGwNCjQsIDIsIDAsIDEwMDUNCg0KPiBDOlxXSU5
ET1dTXHN5c3RlbTMyXFBTQVBJLkRMTA0KPiBDOlxXSU5ET1dTXHN5c3
RlbTMyXG1zY3RmaW1lLmltZQ==
,然后我又运行Aspr2.XX_unpacker_v1.13SC.osc脚本,[截图2],[截图3],然后然上面的信息用ImportREC修复时出现[截图4]
,然后我就不知道该怎么做了,教教我可以吗? 我试过了,没有你说的问题,脱壳修复正常,如上面截图3所示
多出来3个无效指针,直接剪切后修复文件即可
你的问题应该出在OD身上
隐藏下OD,或者换个修改版的OD,比如ODbyDYK v1.10
回复 2# 的帖子
我刚才用OD脱壳,运行脚本Aspr2.XX_IATfixer_v2.2s.osc后出现Ollyscript error :Error on line 285 ,Text:and tmp3,0FFFF
错误对话框,怎么办呢?我想应该是脚本的问题...... 隐藏OD,用Aspr2.XX_unpacker_v1.13SC.osc脚本
下面是Aspr2.XX_unpacker_v1.13SC.osc和Aspr2.XX_unpacker_v1.14SC.osc的脚本,也是目前最新最好用,几乎可以自动解决90%以上的Aspro壳的脚本 隐藏OD,用Aspr2.XX_unpacker_v1.14aSC.osc脚本,就可以脱壳了,修复后完全可用,在我机器上已试验通过! 将Aspr2.XX_unpacker_v1.14aSC.osc的脚本上传,详见附件! 脱壳没有总是,但软件好像已经破过了
回复 5# 的帖子
我用脚本脱壳了,修复时出现无效函数,怎么修复啊?用插件吗?我看到一个教程使用插件的,截图在下面...... 先用等级1修复 再试试试插件或者关闭OD 直接打开加壳程序 用等级3修复 新手碰到这个壳就头疼,修复我怎么感觉好像没有多大用啊。/:L /:L /:L
页:
[1]