📄 armadillo 4.30a simple unpacking script.txt
字号:
/*============================================== Armadillo 4.30a - simple unpacking script==============================================This script can unpack Armadillo 4.30a with standard protection enabled.Features:- Finds OEP;- Prevents import emulation.Usage:- Ignore all exceptions!!!- Add to custom C000001E and ignore it.==============================================*///Defining_variables:var DebugStringvar TickCountvar MagicJump//==============================================// 1. Fooling Olly debug string exploit//==============================================gpa "OutputDebugStringA","kernel32.dll"mov DebugString,$RESULTbp DebugStringestobc eipasm eip,"RETN 4"//================================================================// 2. Finding import redirection procedure and preventing it//================================================================gpa "GetTickCount","kernel32.dll"mov TickCount,$RESULTbp TickCountestobc eiprtrbp eipmov TickCount,eipSearchingPlace:estostifind eip,#75118B85??????FF8B40??8985??????FFEB02EB??8B85??????FF408985??????FFEB378D8D??????FFE8????????0FB6C0996A??59F7F9#cmp $RESULT,0je SearchingPlacebc TickCountmov MagicJump,$RESULTbphws MagicJump,"x"estobphwc MagicJumpmov [eip],858B11EBfind MagicJump,#8B85??????FF8985??????FFFFB5??????FFE8??????005983BD??????FF000F84??????00#bp $RESULTestobc eipmov [MagicJump],858B1175//================// 3. Find OEP //================gpa "CreateThread","kernel32.dll"bp $RESULTestobc eiprturtrstifind eip,#FFD18945FC8B45FC5F5EC9C3#bp $RESULTestobc eipsticmt eip,"OEP found! Fix header by copy-paste before dump."ret
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -