⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 hying pelock 0.4.x oep finder v0.1.txt

📁 700个脱壳脚本, 可以放在在OD的ollyscript Plugin中.
💻 TXT
字号:
/*//////////////////////////////////////////////////	Hying'pelock unpack script v0.1 	Author:	loveboom	Email : loveboom#163.com	OS    : WinXP sp1,Ollydbg 1.1,OllyScript v0.92	Date  : 2005-3-20        Action: 修复IAT,停在oep处.只对旧版本有效	Config: Ignore all exceptions	Note  : If you have one or more question, email me please,thank you!//////////////////////////////////////////////////*/  var addr  var cbase  var csize  var jmpaddr  var jmptovalue  var hmem  start:  msgyn "setting:Ignore all exceptions,continue?"  cmp $RESULT,0  jne lbl1  retlbl1:  gmi eip,CODEBASE		//获取code段信息  mov cbase,$RESULT  gmi eip,CODESIZE  mov csize,$RESULTlblrun1:  bprm cbase,csize  eob lbl2  eoe lblabort  esto  lbl2:  bpmc  cob  coe  lblbpAPI1:  gpa "VirtualAlloc","kernel32.dll"  bprm $RESULT,2		//在VirtualAlloc的前四个字节下内存访问断点  run  lbl3:  bpmc  find eip,#C60768897701C64705C383C706#,  /*  	查找以下语句:	C607 68         MOV BYTE PTR DS:[EDI],68	8977 01         MOV DWORD PTR DS:[EDI+1],ESI	C647 05 C3      MOV BYTE PTR DS:[EDI+5],0C3	83C7 06         ADD EDI,6  	把api直接变成push api retn的方式  */  cmp $RESULT,0  je lblabort  mov jmpaddr,eip  fill jmpaddr,1,E9  inc jmpaddr  mov jmptovalue,$RESULT  sub jmptovalue,jmpaddr  sub jmptovalue,4  mov [jmpaddr],jmptovalue		//跳过抽api代码lblmsg1:  msgyn "Try fix IAT?"				//判断是否要修复api		  cmp $RESULT,0  je lblgotoOEP  gpa "GetModuleHandleA","kernel32.dll"	  go $RESULT  rtu  lbl4:  find eip,#66C707FF35C7470681342400894702C6470DC3#  /*  查找以下命令:	66:C707 FF35        MOV WORD PTR DS:[EDI],35FF	C747 06 81342400    MOV DWORD PTR DS:[EDI+6],243481	8947 02             MOV DWORD PTR DS:[EDI+2],EAX	C647 0D C3          MOV BYTE PTR DS:[EDI+D],0C3  */  cmp $RESULT,0  je lblabort  mov jmpaddr,$RESULT  bp jmpaddr  eob lbl5  eoe lblgotoOEP  run  lbl5:  bc jmpaddr  cob  coe  exec    pushad    push 0FF			//分配空间    push 40    call GlobalAlloc  ende  mov jmptovalue,eax  mov hmem,eax			//保存申请的空间地址  exec    popad			//还原现场  ende  add jmpaddr,0c  fill jmpaddr,1,e8  sub jmptovalue,jmpaddr  sub jmptovalue,5  inc jmpaddr  mov [jmpaddr],jmptovalue  add jmpaddr,4  fill jmpaddr,2,90  mov [hmem],#894702C7470D83C404C3C3#  /*  修复成以下方式:    push [xx]    xor [esp],xorkey    add esp,4    ret  */  lbl6:  gpa "lstrcmpiA","kernel32.dll"  mov addr,$RESULT  mov [addr],#B8FFFFFFFFC20800#lblgotoOEP:  esto  esto  lbl7:  bprm cbase,csize  estolbl8:  bpmc  cmp hmem,0  je lblend  exec    pushad    push {hmem}    call GlobalFree    popad  ende  lblend:  cmt eip,"OEP"  retlblabort:  msg "Error,script aborted,maybe target is not protect by hying's arm v0.4x or you forgot ignore all exceptions."  ret

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -