📄 tmdscript-1.9.1+_private_0.7.txt
字号:
////////////////////////////////////////////////////////////
/// Themida & WinLicen 1.9.1 - 1.9.5 系列脱壳脚本 ///
/// by fxyang ///
/// version public 1.1 ///
/// private_0.7 修正版 ///
/// 感谢 fly 的建议,海风月影 测试 ///
/// http://www.unpack.cn ///
/// 2008.01.08 ///
////////////////////////////////////////////////////////////
/*
+ 添加对windows2K的支持 <---感谢 Hexer
+ 修正密码表过短跑飞 <---感谢 shoooo
+ 对delphi OEP VM 的修复,依旧没有支持长OeP代码 <---感谢 a__p 测试
· 修正恢复IAT可能存在的错误
+ 对VB程序的支持
+ 对Borland C++ 的支持
+ VB VC6 VC7 OEP VM修复,可能存在bug,不再更新。
· 修复findop问题
+ VM OEP find 可能存在bug,不再更新。
· 修正Delphi VM OEP修复Bug
+ 对win2003RC2支持 <---感谢 sunsjw
+ 增加对okdodo200703脚本集成。 <---感谢 okdodo
· 修正对VC7的OEP VM修复
+ 增加okdodo的申请低地址内存的代码,便于补区段。
+ 增加对1.9.5版支持,硬编码,可能有问题
+ 修正查找iat表基地址问题
+ 修正VB程序中iat前后90问题
+ 修正多重壳可能修改区段问题
*/
data:
var cbase
var csize
var dllimg
var dllsize
var loadlib
var mem
var getprocadd
var gatprocadd_2
var tmp
var temp
var tmppn
var tmpdir
var tmpefn
var vbflag
cmp $VERSION, "1.52"
jb odbgver
#log
mov vbapp,0
bphwcall
bpmc
gmi eip,CODEBASE
mov cbase,$RESULT
bphws cbase,"w"
gmemi eip,MEMORYBASE //壳段的基地址
mov dllimg,$RESULT
log dllimg
gmemi eip,MEMORYSIZE //壳段的长度
mov dllsize,$RESULT
log dllsize
gpi PROCESSNAME
mov tmppn, $RESULT
gpi CURRENTDIR
mov tmpdir, $RESULT
GPI EXEFILENAME
mov tmpefn, $RESULT
gmi eip,MODULEBASE
mov modbase,$RESULT
sub modbase,10000
/*
allocloop0:
alloc 1000
mov mem, $RESULT
cmp mem,modbase
log mem
jne allocloop0
*/
findapibase:
gpa "GetProcAddress", "kernel32.dll"
mov getprocadd,$RESULT //取GetProcAddress函数地址,用于定位加密表
cmp getprocadd,0
gpa "_lclose","kernel32.dll" //同上
mov getprocadd_2,$RESULT
gpa "GetLocalTime", "kernel32.dll" //下面代码取自okdodo 感谢 okdodo
mov tmpbp,$RESULT
cmp tmpbp,0
je stop
bphws tmpbp ,"x"
esto
bphwc tmpbp
rtu
gpa "VirtualAlloc", "kernel32.dll"
mov tmpbp,$RESULT
cmp tmpbp,0
je stop
bphws tmpbp ,"x"
esto
bphwc tmpbp
rtu
mov apibase,eax
log apibase
gpa "LoadLibraryA", "kernel32.dll"
mov tmpbp,$RESULT
cmp tmpbp,0
je stop
mov loadlib,tmpbp
bphws tmpbp ,"x"
esto
bphwc tmpbp
rtu
findVirtualAlloc:
find apibase,#558BECFF7514FF7510FF750CFF75086AFFE8090000005DC21000# //查找被虚拟的VirtualAlloc函数
mov tmpbp,$RESULT
cmp tmpbp,0
je win2003
bphws tmpbp ,"x"
jmp tmploop
win2003:
find apibase,#558BECFF7514FF7510FF750CFF75086AFFE878FFFFFF5DC21000#
mov tmpbp,$RESULT
cmp tmpbp,0
je win2003RC2
bphws tmpbp ,"x"
jmp tmploop
win2003RC2:
find apibase,#558BECFF7514FF7510FF750CFF75086AFFE884FFFFFF5DC21000#
mov tmpbp,$RESULT
cmp tmpbp,0
je nextva
bphws tmpbp ,"x"
jmp tmploop
nextva:
find apibase,#558BECFF7514FF7510FF750CFF75086AFFE81B0000005DC21000#
mov tmpbp,$RESULT
cmp tmpbp,0
je stop
tmploop:
mov tmp,0
tmploop01: //下面代码重新改写
esto
//查找编程语言
bphws loadlib ,"x"
esto
bphwc loadlib
mov temp,esp
add temp,04
mov temp,[temp]
scmp [temp],"MFC42.DLL"
je mfcapp
scmp [temp],"MSVBVM60.DLL"
je vbapp
scmp [temp],"Iphlpapi.dll"
je delphiapp
jmp tmploopgp
mfcapp:
log "这是个MFC 程序"
jmp tmploopgp
vbapp:
log "这是个VB 程序,将特别处理!"
mov vbflag,1
jmp tmploopgp
delphiapp:
log "这是个Delphi 程序"
jmp tmploopgp
/*
inc tmp
cmp tmp,19
je tmploopgp
///////////////////////
find dllimg,#50516033C0#
cmp $RESULT,0
jne findoldver
////////////////////////////
cmp eax,getprocadd //定位加密表出现时机
je iatbegin
cmp eax,getprocadd_2
je iatbegin
jne tmploop01
*/
tmploopgp:
esto
cmp eip,tmpbp
jne getcodesize
cmp eax,getprocadd //定位加密表出现时机
je iatbegin
cmp eax,getprocadd_2
je iatbegin
jne tmploopgp
getcodesize:
mov tmp,cbase
inc tmp
cmp tmp,edi
je getcodesizepatch
jmp tmploopgp
getcodesizepatch:
bphwc cbase
mov csize,ecx
log csize
jmp tmploopgp
iatbegin:
esto
esto
bphwc tmpbp
rtr
sti
find eip, #8BB5??????09#
mov tmpbp,$RESULT
cmp tmpbp,0
jne next1
find eip, #8BB5??????06#
mov tmpbp,$RESULT
cmp tmpbp,0
jne next1
find eip,#8BB5??????0A#
mov tmpbp,$RESULT
cmp tmpbp,0
jne next1
find eip,#8BB5??????0C#
mov tmpbp,$RESULT
cmp tmpbp,0
jne next1
find eip,#8BB5??????07#
mov tmpbp,$RESULT
cmp tmpbp,0
jne next1
find eip,#8BB5??????0?#
mov tmpbp,$RESULT
cmp tmpbp,0
jne next1
je findnext_1
next1:
cmp tmpbp,eip
je findtlb
bphws tmpbp ,"x"
esto
findtlb:
sti
var iatcalltop //加密表的首地址
var iatcallend
mov iatcalltop,esi
find iatcalltop,#00000000#
mov iatcallend,$RESULT
log iatcallend
var iatfn
var iattop
var codeadd
var antiadd
bphwcall
jmp codebegin
findnext_1:
sti
find dllimg, #FFFFFFFFDDDDDDDD#
mov tmpbp,$RESULT
cmp tmpbp,0
je notlb
var iatcalltop //加密表的首地址
var iatcallend
mov iatcalltop,$RESULT
sub iatcalltop,10
log iatcalltop
find iatcalltop,#00000000#
mov iatcallend,$RESULT
log iatcallend
var iatfn
var iattop
var codeadd
var antiadd
mov tmp,eax
mov eax,iatcalltop
mov eax,[eax]
shr eax,10
cmp ax,0
jne iatbegin_2
add iatcalltop,04
iatbegin_2:
mov eax,tmp
codebegin:
bphws iatcalltop,"r"
esto
bphwcall
//cmp vbflag,1 //vb标记
//je next_1
find eip,#2BD90F84#
cmp $RESULT ,0
jne findtmd195
find eip,#3B020F84#
cmp $RESULT ,0
je add_1
bphws $RESULT ,"x"
esto
add_1:
sti
bphwcall
mov tmp,eip
add tmp,02
mov tmp,[tmp]
add tmp,eip
add tmp,06
bphws tmp,"x"
esto
sti
sti
sti
find eip,#83BD????????01#
bphws $RESULT ,"x"
mov tmp,$RESULT
sub tmp,02
mov antiadd,tmp
esto
cmp vbflag,1
je _vbpatch
sti
bphwcall
mov temp,eip
mov [temp],#909090909090#
mov tmp,0
loop1:
find eip,#3B8D????????0F84#
bphws $RESULT ,"x"
cmp $RESULT,0
je findnewver
esto
bphwcall
mov iatfn,eax //获得函数,并修改magic jump
log iatfn
sti
mov temp,eip
mov [temp],#909090909090#
inc tmp
cmp tmp,03
je next_1
jmp loop1
findtmd195:
bphws $RESULT ,"x"
esto
mov iatfn,eax
log iatfn
mov temp,eip
add temp,02
mov antiadd,temp
mov [temp],#909090909090#
find eip,#2BD90F84#
mov temp,$RESULT
add temp,02
mov [temp],#909090909090#
find eip,#2BD90F84#
mov temp,$RESULT
add temp,02
mov [temp],#909090909090#
jmp next_1
_vbpatch:
mov tmp,ebp
mov temp,eip
add temp,02
add tmp,[temp]
mov [tmp],0
next_1:
add iatcalltop,04
bphws iatcalltop,"r"
esto
bphwcall
findiataddpro: //iataddress
find eip,#0385????????#
bphws $RESULT,"x"
mov tmp,$RESULT
add tmp,05
find tmp,#0385????????#
bphws $RESULT,"x"
//pause
esto
sti
bphwcall
//pause
mov iattop,eax //此时EAX是iat表中函数写入地址,然后判断这个值最小时就是iat基地址
log iattop
mov iatcalltop,esi
cmp vbflag,1
je __vbnext
bphws antiadd,"r"
esto
find eip,#3985????????0F84#,
mov temp, $RESULT
bphws temp,"x"
cmp temp,0
je oepbegin
esto
bphwcall
sti
mov temp,eip
//pause
mov [temp],#90E9# //处理效验
log temp
__vbnext:
sub iatcallend,04
cmp iatcallend,0
je oepbegin
sub iatcallend,8
bphws iatcallend,"w"
esto
oepbegin:
sti
sti
/////////////////////////////////////////////////////////////////////
////////VM
var vmbegin
var key1
var tempvm
mov tempvm,0
mov temp,ebx
findvmoeploop:
//pause
find temp,#68????????E9??????FF#
mov tmp,$RESULT
cmp $RESULT,0
je findcvgt
//inc tempvm
cmp tempvm,10
//je findcvgt
add tmp,06
mov vmbegin,[tmp]
add tmp,vmbegin
add tmp,04
mov temp,eax
mov al,[tmp]
cmp al,6A
je findvmoepbegin
cmp al,60
je findvmoepbegin
mov eax,temp
mov temp,$RESULT
add temp,0a
jmp findvmoeploop
findvmoepbegin:
mov vmbegin,tmp
log vmbegin
bphws vmbegin,"x"
findcvgt:
var vcget
var codeone
gpa "GetVersion", "kernel32.dll"
mov vcget,$RESULT
mov tmp,cbase
add tmp,csize
bprm cbase,csize
esto
bpmc
bphwcall
cmp vmbegin,eip
jne findoepnext1
var vmbeginoep
mov key1,[esp]
mov vmbeginoep, iatcalltop
mov eip,vmbeginoep
eval "push {key1}"
asm eip,$RESULT
add iatcalltop,05
eval "jmp {vmbegin}"
asm iatcalltop,$RESULT
add esp,04
add iatcalltop,10
cmp vbflag,1
je _nextvb
msgyn "程序发现被VM oeP,脚本patch了入口,现在可以在这里dump下程序补区段,修复代码!,你也可以选择[否]到普通方式修复!"
cmp $RESULT,0
je findoepnext1
mov temp,eip
eval "VM oeP :{temp}"
log $RESULT
eval "VM oeP :{temp},你可以到log中查看"
msg $RESULT
eval "{tmpdir}fvmoepdump.exe"
dpe $RESULT, eip
_nextvb:
mov tmp,cbase
add tmp,csize
bprm cbase,csize
esto
bpmc
cmp vbflag,1
je vbvm
findoepnext1:
mov codeone,eax
mov temp,[codeone]
cmp temp,vcget
je findvc6code_a
mov codeone,ecx
mov temp,[codeone]
cmp temp,vcget
je findvc6code_c
mov codeone,edx
mov temp,[codeone]
cmp temp,vcget
je findvc6code_d
mov codeone,ebx
mov temp,[codeone]
cmp temp,vcget
je findvc6code_b
cmp tmp,eip
ja findoep
loopoep:
bprm cbase,csize
esto
bpmc
cmp tmp,eip
ja findoep
jmp loopoep
findvc6code:
msgyn "可能是VC6程序,我将尝试运行到oep并修复代码,你也可以选择[否]自己修复。目前能修复的长度为0x52"
cmp $RESULT,0
je findoepbegin
msg "开始在这里dump程序,然后用下面修复的oep代码修改,因为这时初始化还没有完成,这个文件保存在你的目录!"
eval "{tmpdir}fdump.exe"
dpe $RESULT, eip
var vcwoep
var vcadd1
var vcadd2
var vcadd3
var vcadd4
var vcadd5
var vccall1
var vccall2
var vccall3
var vccall4
var vccall5
var vctmpoep
var vctmp2
var vccodeend
/////////////////////////////////////////////////////////////////////////
//vc6code:
findvc6code_a:
bprm cbase,csize
esto
bpmc
mov vcadd3,eax
cmp tmp,eip
ja findoepvc6_0
bprm cbase,csize
esto
bpmc
mov vcadd4,eax
cmp tmp,eip
ja findoepvc6_0
loopoepvc60:
bprm cbase,csize
esto
bpmc
cmp tmp,eip
ja findoepvc6_0
jmp loopoepvc60
findvc6code_d:
bprm cbase,csize
esto
bpmc
mov vcadd3,edx
cmp tmp,eip
ja findoepvc6_0
bprm cbase,csize
esto
bpmc
mov vcadd4,edx
cmp tmp,eip
ja findoepvc6_0
loopoepvc60:
bprm cbase,csize
esto
bpmc
cmp tmp,eip
ja findoepvc6_0
jmp loopoepvc60
findvc6code_b:
bprm cbase,csize
esto
bpmc
mov vcadd3,ebx
cmp tmp,eip
ja findoepvc6_0
bprm cbase,csize
esto
bpmc
mov vcadd4,ebx
cmp tmp,eip
ja findoepvc6_0
loopoepvc60:
bprm cbase,csize
esto
bpmc
cmp tmp,eip
ja findoepvc6_0
jmp loopoepvc60
findvc6code_c:
bprm cbase,csize
esto
bpmc
mov vcadd3,ecx
cmp tmp,eip
ja findoepvc6_0
bprm cbase,csize
esto
bpmc
mov vcadd4,ecx
cmp tmp,eip
ja findoepvc6_0
loopoepvc60:
bprm cbase,csize
esto
bpmc
cmp tmp,eip
ja findoepvc6_0
jmp loopoepvc60
findoepvc6_0:
mov vctmp2,esp
loopvc1:
cmp [vctmp2],-1
je vc6code1
add vctmp2,04
jmp loopvc1
vc6code1:
sub vctmp2,04
mov vcadd1,[vctmp2]
sub vctmp2,04
mov vcadd2,[vctmp2]
mov vccall1,codeone
mov vcwoep,eip
find eip,#A3#
mov vctmpoep,$RESULT
sub vctmpoep,052
mov eip,vctmpoep
mov [vctmpoep],#558BEC6AFF68#
add vctmpoep,06
mov [vctmpoep],vcadd1
add vctmpoep,04
eval "push {vcadd2}"
asm vctmpoep,$RESULT
add vctmpoep,05
mov [vctmpoep],#64A100000000506489250000000083EC585356578965E8#
add vctmpoep,17
mov [vctmpoep],15ff
add vctmpoep,02
mov [vctmpoep],vccall1
add vctmpoep,04
mov vctmp2,vcwoep
sub vctmp2,vctmpoep
cmp vctmp2,0
je findoepbegin
mov [vctmpoep],#33D2#
add vctmpoep,02
mov vctmp2,vcwoep
sub vctmp2,vctmpoep
cmp vctmp2,0
je findoepbegin
mov [vctmpoep],#8AD4#
add vctmpoep,02
mov vctmp2,vcwoep
sub vctmp2,vctmpoep
cmp vctmp2,0
je findoepbegin
mov [vctmpoep],#8915#
add vctmpoep,06
mov [vctmpoep],vcadd3
add vctmpoep,04
mov vctmp2,vcwoep
sub vctmp2,vctmpoep
cmp vctmp2,0
je findoepbegin
mov [vctmpoep],#8BC881E1FF000000890D#
add vctmpoep,0a
mov [vctmpoep],vcadd4
jmp findoepbegin
/////////////////////////////////////////////////////////////////////////////
findoep:
mov temp,eax
cmp temp,cbase
ja nextcmp
jmp findoepbegin
nextcmp:
cmp temp,tmp
jb finddelphi
jmp findoepbegin
finddelphi:
msgyn "可能是Delphi程序,我将尝试运行到oep并修复代码,你也可以选择[否]自己修复。"
cmp $RESULT,0
je findoepbegin
/*
/////////////////////////////////////////////////////////////////
dloop: //dump区段
mov tmp,count
eval "{tmpdir}{vm1}.bin"
dm vm1,vm1size,$RESULT
sub tmp,1
cmp tmp,0
je exit
eval "{tmpdir}{vm2}.bin"
dm vm2,vm2size,$RESULT
sub tmp,1
cmp tmp,0
je exit
eval "{tmpdir}{vm3}.bin"
dm vm3,vm3size,$RESULT
sub tmp,1
cmp tmp,0
je exit
///////////////////////////////////////////////////////////////
*/
var woep
var add1
var add2
var add3
var add4
var add5
var call1
var call2
var call3
var call4
var call5
var tmpoep
var tmp2
var codel
var codeend
mov codel,cbase
add codel,csize
mov call1,eip
mov woep,[esp]
mov add1,eax
find eip,#C3#
bp $RESULT
esto
bc eip
sti
sti
sti
bprm cbase,csize
esto
bpmc
mov tmp,eax
mov al,[eip]
cmp al,0ff
je nextdelphi6_2
cmp al,8B
je nextdelphi5_2
/////////////////////////////////////////
//delphi6:
nextdelphi6_2:
mov al,[eip+1]
cmp al,030
je findeax
cmp al,031
je findecx
cmp al,032
je findedx
cmp al,033
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -