⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 enigma 1.02 oep finder.txt

📁 700个脱壳脚本, 可以放在在OD的ollyscript Plugin中.
💻 TXT
字号:
/*=============================================================== Enigma protector 1.02 - OEP and stolen code finder script===============================================================The purpose of this script is to find basic information aboutprotected file so you can use second script for unwrapping &dumping. For using this script you must ignore ALL exceptionsand delete ALL breakpoints (hardware, toggle or memory)!Script must be started from protectors original Entry Point!Protector has option to emulate OEP's of couple compilers.those oep's are placed in original code section. You need totrace with F7 untill you enter in last section of file wherefirst opcode is PUSHAD. Then you can run script. When scriptends, check log and write down OEP and stolen OEP details!Then restart and run second script.haggar================================================================*///Initialization:var ModBasevar ModSizevar loader_jumpvar loader_oepvar loader_basevar internal_check_startvar internal_check_endvar countervar stolen_code_startvar stolen_code_endvar oepmov stolen_code_start,0mov stolen_code_end,0dbhcmt eip,"!!! P L E A S E  W A I T !!!"//Module base and size:gmi eip,MODULEBASEmov ModBase,$RESULTgmi eip,MODULESIZEmov ModSize,$RESULTadd ModSize,ModBase//Find jump to loader:find eip,#EB019AC35589E5FF750CFF7508E846000000#cmp $RESULT,0je ERRORmov loader_jump,$RESULTadd loader_jump,3bp loader_jumpestobc eip//Find loader base:stimov loader_oep,eipmov loader_base,loader_oepsub loader_base,2720C//Find internal check:mov internal_check_start,loader_baseadd internal_check_start,1FEE8mov internal_check_end,internal_check_startadd internal_check_end,37//Find jump to OEP or stolen code:mov counter,0LABEL_01:bp internal_check_startestobc eipbphws internal_check_end,"x"estobphwc internal_check_endstirtrstiinc countercmp counter,6je ERRORfind eip,#A3????????8B65088B450C8944241C61A1????????50A1????????010424C3#cmp $RESULT,eipjne LABEL_01rtrsti//OEP or stolen code:cmp eip,ModSizejb LABEL_02cmt eip,"<-- Start of stolen code!"msg "Stolen code found! Check log later."mov stolen_code_start,eipfind eip,#6031C0B9????????BF????????F2AA47ABAB61C3000000000000000000000000000000#cmp $RESULT,0je ERRORbp $RESULTestobc eipfill eip,13,90rtrmov stolen_code_end,eipcmt eip,"<-- End of stolen code! Press F7 to land on OEP."mov oep,[esp]cmt oep,"<== OEP found! Script by haggar ;)"jmp ENDLABEL_02:mov oep,eipcmt eip,"<== OEP found! Script by haggar ;)"END://Logging variables:log " "log ": S C R I P T  I N F O R M A T I O N :"log " "log ModBaselog ModSizelog loader_jumplog loader_oeplog loader_baselog internal_check_startlog internal_check_endlog counterlog stolen_code_startlog stolen_code_endlog oepdbsretdbsERROR:msg "Error in script! Sorry :( . "ret

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -