- UID
- 5512
注册时间2005-12-19
阅读权限30
最后登录1970-1-1
龙战于野

TA的每日心情 | 开心 2022-9-25 11:58 |
---|
签到天数: 12 天 [LV.3]偶尔看看II
|
发表于 2008-9-10 00:19:41
|
显示全部楼层
啦啦啦啦啦·····- 01013010 > 60 pushad ; EP
- 01013011 33C9 xor ecx,ecx
- 01013013 8B1D 00300101 mov ebx,dword ptr ds:[1013000]
- 01013019 031D 08300101 add ebx,dword ptr ds:[1013008] ; NOTEPAD_.01000000
- 0101301F 8A0419 mov al,byte ptr ds:[ecx+ebx]
- 01013022 84C0 test al,al
- 01013024 74 09 je short NOTEPAD_.0101302F
- 01013026 3C 55 cmp al,55
- 01013028 74 05 je short NOTEPAD_.0101302F
- 0101302A 34 55 xor al,55
- 0101302C 880419 mov byte ptr ds:[ecx+ebx],al
- 0101302F 41 inc ecx
- 01013030 3B0D 04300101 cmp ecx,dword ptr ds:[1013004]
- 01013036 ^ 75 E7 jnz short NOTEPAD_.0101301F
- 01013038 A1 08300101 mov eax,dword ptr ds:[1013008]
- 0101303D 0105 0C300101 add dword ptr ds:[101300C],eax
- 01013043 61 popad
- 01013044 - FF25 0C300101 jmp dword ptr ds:[101300C] ; 这里F2设置断点,F9,中断后,F7进入下一层壳的EP或程序的OEP
- 0101304A 0000 add byte ptr ds:[eax],al
- 0101304C 0000 add byte ptr ds:[eax],al
复制代码- 010115F0 60 pushad ; EP(UPX)
- 010115F1 BE 00D00001 mov esi,NOTEPAD_.0100D000
- 010115F6 8DBE 0040FFFF lea edi,dword ptr ds:[esi+FFFF400>
- 010115FC 57 push edi
- 010115FD 83CD FF or ebp,FFFFFFFF
- 01011600 EB 10 jmp short NOTEPAD_.01011612
- 01011602 90 nop
- 01011603 90 nop
- ........
- 01011733 83C3 04 add ebx,4
- 01011736 ^ EB E1 jmp short NOTEPAD_.01011719
- 01011738 FF96 A81D0100 call dword ptr ds:[esi+11DA8]
- 0101173E 61 popad
- 0101173F - E9 DC4CFFFF jmp NOTEPAD_.01006420 ; 这里F2设置断点,F9,中断后,F7进入下一层壳的EP或程序的OEP
复制代码- 01006420 55 push ebp ; OEP
- 01006421 8BEC mov ebp,esp
- 01006423 6A FF push -1
- 01006425 68 88180001 push NOTEPAD_.01001888
- 0100642A 68 D0650001 push NOTEPAD_.010065D0 ; jmp 到 msvcrt._except_handler3
- 0100642F 64:A1 00000000 mov eax,dword ptr fs:[0]
- 01006435 50 push eax
- 01006436 64:8925 00000000 mov dword ptr fs:[0],esp
- 0100643D 83C4 98 add esp,-68
- 01006440 53 push ebx
- 01006441 56 push esi
- 01006442 57 push edi
- 01006443 8965 E8 mov dword ptr ss:[ebp-18],esp
- 01006446 C745 FC 00000000 mov dword ptr ss:[ebp-4],0
- 0100644D 6A 02 push 2
- 0100644F FF15 60110001 call dword ptr ds:[1001160] ; msvcrt.__set_app_type
- 01006455 83C4 04 add esp,4
- 01006458 C705 38990001 FFFF>mov dword ptr ds:[1009938],-1
- 01006462 C705 3C990001 FFFF>mov dword ptr ds:[100993C],-1
- 0100646C FF15 5C110001 call dword ptr ds:[100115C] ; msvcrt.__p__fmode
- 01006472 8B0D 44880001 mov ecx,dword ptr ds:[1008844]
- 01006478 8908 mov dword ptr ds:[eax],ecx
- 0100647A FF15 4C110001 call dword ptr ds:[100114C] ; msvcrt.__p__commode
复制代码
[ 本帖最后由 kungbim 于 2008-9-10 00:20 编辑 ] |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?加入我们
x
评分
-
查看全部评分
|