找回密码
 注册
搜索
热搜: 回贴

脱壳技术,Upx之enablewebcompiler1.0 去除Crc校验(图),Upx

2010-1-30 18:18| 发布者: admin| 查看: 142| 评论: 0|原作者: 潇潇雨


脱壳技术,Upx之enablewebcompiler1.0 去除Crc校验(图),Upx
2008年06月23日 星期一 下午 03:31
【破文标题】 Upx之enablewebcompiler1.0 去除Crc校验



【脱文作者】 weiyi75[Dfcg]



【作者邮箱】 weiyi75@sohu.com



【作者主页】 Dfcg官方大本营 --- http://www.chinadfcg.com/



【使用工具】 Fi3.01,Upxshell,olldbg1.10b



【脱壳平台】 Win2K/Xp



【软件名称】 enablewebcompiler



【下载地址】 本地下载



【软件简介】 普通Upx壳,Crc脱壳校验。



【软件大小】 76.5k



【加壳方式】 UPX V1.20



【脱壳声明】 我是一只小菜鸟,偶得一点心得,愿与大家分享:)







--------------------------------------------------------------------------------



【脱壳内容】



Fi查壳,为Upx V1.20。用Upxshell干净完美脱壳,运行程序提示Crc校验错误,请重装软件。



本来很简单的一个问题,搞了半天。



先从麻烦入手吧,软件Crc校验,当然和GetfileSize有关。



命令行 bp GetFileSize F9运行。



77E68854 > 55 PUSH EBP //中断,这里是系统领空,我们要返回到程序领空才能爆破或者修改Z标志。不能简单的Ctrl F9或Alt F9返回用户代码。

77E68855 8BEC MOV EBP,ESP

77E68857 51 PUSH ECX

77E68858 51 PUSH ECX

77E68859 8D45 F8 LEA EAX,DWORD PTR SS:[EBP-8]

77E6885C 50 PUSH EAX

77E6885D FF75 08 PUSH DWORD PTR SS:[EBP 8]

77E68860 E8 24000000 CALL KERNEL32.GetFileSizeEx

77E68865 85C0 TEST EAX,EAX

77E68867 0F84 D3690200 JE KERNEL32.77E8F240

77E6886D 8B45 0C MOV EAX,DWORD PTR SS:[EBP C]

77E68870 85C0 TEST EAX,EAX

77E68872 ^ 0F85 B5E6FFFF JNZ KERNEL32.77E66F2D

77E68878 837D F8 FF CMP DWORD PTR SS:[EBP-8],-1

77E6887C 0F84 B2690200 JE KERNEL32.77E8F234

77E68882 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]

77E68885 C9 LEAVE

77E68886 C2 0800 RETN 8

..........................................................



取消断点,Alt M打开内存镜像。



内存镜像,项目 13

地址=0043A000 //这次要对data段下内存访问断点。

大小=00004000 (16384.)

Owner=enablewe 00400000

区段=.data

包含=data

类型=Imag 01001002

访问=R

初始访问=RWE



00420912 . FF50 04 CALL DWORD PTR DS:[EAX 4] ; MSVBVM50.BASIC_CLASS_AddRef //好,回家了,清除内存断点。Getfilesize只是取文件大小,比较过程还要往下看。

00420915 . C745 FC 01000>MOV DWORD PTR SS:[EBP-4],1

0042091C . C745 FC 02000>MOV DWORD PTR SS:[EBP-4],2

00420923 . 6A FF PUSH -1

00420925 . FF15 00E34300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaOnErr>; MSVBVM50.__vbaOnError

0042092B . C745 FC 03000>MOV DWORD PTR SS:[EBP-4],3

00420932 . E8 99420100 CALL enablewe.00434BD0

00420937 . C745 FC 04000>MOV DWORD PTR SS:[EBP-4],4

0042093E . E8 1D160100 CALL enablewe.00431F60 //经过这个Call,Crc校验错误。

....................................................................



Vb语言特点是容易入手,但代码效率实在无法恭维,垃圾代码非常多。



要找到这个Magic Jmp 还不是很容易的事。



Ctrl F2 重启Od,直接 Ctrl G 0042093E ,F4直接到达,F7跟进。



00431F60 $Content$nbsp; 55 PUSH EBP //跟进后,代码实在太多,Ctrl F8让Od帮我们减一点负担。一段眼花缭乱后,转标签1

00431F61 . 8BEC MOV EBP,ESP

00431F63 . 83EC 18 SUB ESP,18

00431F66 . 68 261D4000 PUSH ; SE handler installation

00431F6B . 64:A1 0000000>MOV EAX,DWORD PTR FS:[0]

00431F71 . 50 PUSH EAX

00431F72 . 64:8925 00000>MOV DWORD PTR FS:[0],ESP

00431F79 . B8 58110000 MOV EAX,1158

00431F7E . E8 9DFDFCFF CALL

00431F83 . 53 PUSH EBX

00431F84 . 56 PUSH ESI

00431F85 . 57 PUSH EDI

00431F86 . 8965 E8 MOV DWORD PTR SS:[EBP-18],ESP

00431F89 . C745 EC 501A4>MOV DWORD PTR SS:[EBP-14],enablewe.00401>

00431F90 . C745 F0 00000>MOV DWORD PTR SS:[EBP-10],0

00431F97 . C745 F4 00000>MOV DWORD PTR SS:[EBP-C],0

00431F9E . C745 FC 01000>MOV DWORD PTR SS:[EBP-4],1

00431FA5 . C745 FC 02000>MOV DWORD PTR SS:[EBP-4],2

00431FAC . 6A FF PUSH -1

00431FAE . FF15 00E34300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaOnErr>; MSVBVM50.__vbaOnError

00431FB4 . C745 FC 03000>MOV DWORD PTR SS:[EBP-4],3

00431FBB . 833D CCAA4300>CMP DWORD PTR DS:[43AACC],0

00431FC2 . 75 1C JNZ SHORT enablewe.00431FE0

00431FC4 . 68 CCAA4300 PUSH enablewe.0043AACC

00431FC9 . 68 2C674000 PUSH enablewe.0040672C

00431FCE . FF15 14E44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaNew2>>; MSVBVM50.__vbaNew2

00431FD4 . C785 D4EEFFFF>MOV DWORD PTR SS:[EBP-112C],enablewe.004>

00431FDE . EB 0A JMP SHORT enablewe.00431FEA

...................................................................



标签1,向上找Magic Jmp 吧,再转标签2



004341D2 . FF15 08E34300 CALL DWORD PTR DS:[<&MSVBVM50.#595>] ; MSVBVM50.rtcMsgBox

004341D8 . 8D85 D8FDFFFF LEA EAX,DWORD PTR SS:[EBP-228]

004341DE . 50 PUSH EAX

004341DF . 8D8D E8FDFFFF LEA ECX,DWORD PTR SS:[EBP-218]

004341E5 . 51 PUSH ECX

004341E6 . 8D95 F8FDFFFF LEA EDX,DWORD PTR SS:[EBP-208]

004341EC . 52 PUSH EDX

004341ED . 8D85 08FEFFFF LEA EAX,DWORD PTR SS:[EBP-1F8]

004341F3 . 50 PUSH EAX

004341F4 . 8D8D 18FEFFFF LEA ECX,DWORD PTR SS:[EBP-1E8]

004341FA . 51 PUSH ECX

004341FB . 8D95 28FEFFFF LEA EDX,DWORD PTR SS:[EBP-1D8]

00434201 . 52 PUSH EDX

...................................................................



标签2



00433EB4 . FF15 34E44300 CALL DWORD PTR DS:[<&MSVBVM50.#578>] ; MSVBVM50.rtcFileLen

00433EBA . 8985 A4EEFFFF MOV DWORD PTR SS:[EBP-115C],EAX

00433EC0 . DB85 A4EEFFFF FILD DWORD PTR SS:[EBP-115C]

00433EC6 . DD9D 9CEEFFFF FSTP QWORD PTR SS:[EBP-1164]

00433ECC . DD85 10EFFFFF FLD QWORD PTR SS:[EBP-10F0]

00433ED2 . FF15 24E34300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaFpR8>>; MSVBVM50.__vbaFpR8

00433ED8 . DC9D 9CEEFFFF FCOMP QWORD PTR SS:[EBP-1164]

00433EDE . DFE0 FSTSW AX

00433EE0 . F6C4 01 TEST AH,1

00433EE3 . 74 0C JE SHORT enablewe.00433EF1

00433EE5 . C785 98EEFFFF>MOV DWORD PTR SS:[EBP-1168],1

00433EEF . EB 0A JMP SHORT enablewe.00433EFB

00433EF1 > C785 98EEFFFF>MOV DWORD PTR SS:[EBP-1168],0

00433EFB > 8B8D 98EEFFFF MOV ECX,DWORD PTR SS:[EBP-1168]

00433F01 . F7D9 NEG ECX

00433F03 . 0FBFD1 MOVSX EDX,CX

00433F06 . 85D2 TEST EDX,EDX

00433F08 . 0F84 33040000 JE enablewe.00434341 //找了半天就是这里,直接爆破它。



直接修改为



00433F08 /0F85 33040000 JNZ enablewe.00434341



保存为一个文件。



00433F0E . C745 FC 06000>MOV DWORD PTR SS:[EBP-4],6

00433F15 . 6A 41 PUSH 41

00433F17 . 8D45 A8 LEA EAX,DWORD PTR SS:[EBP-58]

00433F1A . 50 PUSH EAX

00433F1B . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F21 . 6A 6C PUSH 6C

00433F23 . 8D4D 98 LEA ECX,DWORD PTR SS:[EBP-68]

00433F26 . 51 PUSH ECX

00433F27 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F2D . 6A 65 PUSH 65

00433F2F . 8D95 78FFFFFF LEA EDX,DWORD PTR SS:[EBP-88]

00433F35 . 52 PUSH EDX

00433F36 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F3C . 6A 72 PUSH 72

00433F3E . 8D85 58FFFFFF LEA EAX,DWORD PTR SS:[EBP-A8]

00433F44 . 50 PUSH EAX

00433F45 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F4B . 6A 74 PUSH 74

00433F4D . 8D8D 38FFFFFF LEA ECX,DWORD PTR SS:[EBP-C8]

00433F53 . 51 PUSH ECX

00433F54 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F5A . 6A 21 PUSH 21

00433F5C . 8D95 18FFFFFF LEA EDX,DWORD PTR SS:[EBP-E8]

00433F62 . 52 PUSH EDX

00433F63 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F69 . 6A 20 PUSH 20

00433F6B . 8D85 F8FEFFFF LEA EAX,DWORD PTR SS:[EBP-108]

00433F71 . 50 PUSH EAX

00433F72 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F78 . 6A 3A PUSH 3A

00433F7A . 8D8D D8FEFFFF LEA ECX,DWORD PTR SS:[EBP-128]

00433F80 . 51 PUSH ECX

00433F81 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F87 . 6A 20 PUSH 20

00433F89 . 8D95 B8FEFFFF LEA EDX,DWORD PTR SS:[EBP-148]

00433F8F . 52 PUSH EDX

00433F90 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433F96 . 6A 43 PUSH 43

00433F98 . 8D85 98FEFFFF LEA EAX,DWORD PTR SS:[EBP-168]

00433F9E . 50 PUSH EAX

00433F9F . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FA5 . 6A 52 PUSH 52

00433FA7 . 8D8D 78FEFFFF LEA ECX,DWORD PTR SS:[EBP-188]

00433FAD . 51 PUSH ECX

00433FAE . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FB4 . 6A 43 PUSH 43

00433FB6 . 8D95 58FEFFFF LEA EDX,DWORD PTR SS:[EBP-1A8]

00433FBC . 52 PUSH EDX

00433FBD . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FC3 . 6A 20 PUSH 20

00433FC5 . 8D85 38FEFFFF LEA EAX,DWORD PTR SS:[EBP-1C8]

00433FCB . 50 PUSH EAX

00433FCC . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FD2 . 6A 45 PUSH 45

00433FD4 . 8D8D 18FEFFFF LEA ECX,DWORD PTR SS:[EBP-1E8]

00433FDA . 51 PUSH ECX

00433FDB . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FE1 . 6A 72 PUSH 72

00433FE3 . 8D95 F8FDFFFF LEA EDX,DWORD PTR SS:[EBP-208]

00433FE9 . 52 PUSH EDX

00433FEA . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FF0 . 6A 72 PUSH 72

00433FF2 . 8D85 D8FDFFFF LEA EAX,DWORD PTR SS:[EBP-228]

00433FF8 . 50 PUSH EAX

00433FF9 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

00433FFF . 6A 6F PUSH 6F

00434001 . 8D8D B8FDFFFF LEA ECX,DWORD PTR SS:[EBP-248]

00434007 . 51 PUSH ECX

00434008 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

0043400E . 6A 72 PUSH 72

00434010 . 8D95 98FDFFFF LEA EDX,DWORD PTR SS:[EBP-268]

00434016 . 52 PUSH EDX

00434017 . FF15 C4E34300 CALL DWORD PTR DS:[<&MSVBVM50.#608>] ; MSVBVM50.rtcVarBstrFromAnsi

0043401D . C785 70FDFFFF>MOV DWORD PTR SS:[EBP-290],80020004

00434027 . C785 68FDFFFF>MOV DWORD PTR SS:[EBP-298],0A

00434031 . C785 80FDFFFF>MOV DWORD PTR SS:[EBP-280],80020004

0043403B . C785 78FDFFFF>MOV DWORD PTR SS:[EBP-288],0A

00434045 . 8D45 D4 LEA EAX,DWORD PTR SS:[EBP-2C]

00434048 . 8985 40EFFFFF MOV DWORD PTR SS:[EBP-10C0],EAX

0043404E . C785 38EFFFFF>MOV DWORD PTR SS:[EBP-10C8],4008

00434058 . 8D8D 68FDFFFF LEA ECX,DWORD PTR SS:[EBP-298]

0043405E . 51 PUSH ECX

0043405F . 8D95 78FDFFFF LEA EDX,DWORD PTR SS:[EBP-288]

00434065 . 52 PUSH EDX

00434066 . 8D45 A8 LEA EAX,DWORD PTR SS:[EBP-58]

00434069 . 50 PUSH EAX

0043406A . 8D4D 98 LEA ECX,DWORD PTR SS:[EBP-68]

0043406D . 51 PUSH ECX

0043406E . 8D55 88 LEA EDX,DWORD PTR SS:[EBP-78]

00434071 . 52 PUSH EDX

00434072 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

00434078 . 50 PUSH EAX

00434079 . 8D85 78FFFFFF LEA EAX,DWORD PTR SS:[EBP-88]

0043407F . 50 PUSH EAX

00434080 . 8D8D 68FFFFFF LEA ECX,DWORD PTR SS:[EBP-98]

00434086 . 51 PUSH ECX

00434087 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

0043408D . 50 PUSH EAX

0043408E . 8D95 58FFFFFF LEA EDX,DWORD PTR SS:[EBP-A8]

00434094 . 52 PUSH EDX

00434095 . 8D85 48FFFFFF LEA EAX,DWORD PTR SS:[EBP-B8]

0043409B . 50 PUSH EAX

0043409C . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004340A2 . 50 PUSH EAX

004340A3 . 8D8D 38FFFFFF LEA ECX,DWORD PTR SS:[EBP-C8]

004340A9 . 51 PUSH ECX

004340AA . 8D95 28FFFFFF LEA EDX,DWORD PTR SS:[EBP-D8]

004340B0 . 52 PUSH EDX

004340B1 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004340B7 . 50 PUSH EAX

004340B8 . 8D85 18FFFFFF LEA EAX,DWORD PTR SS:[EBP-E8]

004340BE . 50 PUSH EAX

004340BF . 8D8D 08FFFFFF LEA ECX,DWORD PTR SS:[EBP-F8]

004340C5 . 51 PUSH ECX

004340C6 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004340CC . 50 PUSH EAX

004340CD . 8D95 F8FEFFFF LEA EDX,DWORD PTR SS:[EBP-108]

004340D3 . 52 PUSH EDX

004340D4 . 8D85 E8FEFFFF LEA EAX,DWORD PTR SS:[EBP-118]

004340DA . 50 PUSH EAX

004340DB . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004340E1 . 50 PUSH EAX

004340E2 . 8D8D D8FEFFFF LEA ECX,DWORD PTR SS:[EBP-128]

004340E8 . 51 PUSH ECX

004340E9 . 8D95 C8FEFFFF LEA EDX,DWORD PTR SS:[EBP-138]

004340EF . 52 PUSH EDX

004340F0 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004340F6 . 50 PUSH EAX

004340F7 . 8D85 B8FEFFFF LEA EAX,DWORD PTR SS:[EBP-148]

004340FD . 50 PUSH EAX

004340FE . 8D8D A8FEFFFF LEA ECX,DWORD PTR SS:[EBP-158]

00434104 . 51 PUSH ECX

00434105 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

0043410B . 50 PUSH EAX

0043410C . 8D95 98FEFFFF LEA EDX,DWORD PTR SS:[EBP-168]

00434112 . 52 PUSH EDX

00434113 . 8D85 88FEFFFF LEA EAX,DWORD PTR SS:[EBP-178]

00434119 . 50 PUSH EAX

0043411A . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

00434120 . 50 PUSH EAX

00434121 . 8D8D 78FEFFFF LEA ECX,DWORD PTR SS:[EBP-188]

00434127 . 51 PUSH ECX

00434128 . 8D95 68FEFFFF LEA EDX,DWORD PTR SS:[EBP-198]

0043412E . 52 PUSH EDX

0043412F . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

00434135 . 50 PUSH EAX

00434136 . 8D85 58FEFFFF LEA EAX,DWORD PTR SS:[EBP-1A8]

0043413C . 50 PUSH EAX

0043413D . 8D8D 48FEFFFF LEA ECX,DWORD PTR SS:[EBP-1B8]

00434143 . 51 PUSH ECX

00434144 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

0043414A . 50 PUSH EAX

0043414B . 8D95 38FEFFFF LEA EDX,DWORD PTR SS:[EBP-1C8]

00434151 . 52 PUSH EDX

00434152 . 8D85 28FEFFFF LEA EAX,DWORD PTR SS:[EBP-1D8]

00434158 . 50 PUSH EAX

00434159 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

0043415F . 50 PUSH EAX

00434160 . 8D8D 18FEFFFF LEA ECX,DWORD PTR SS:[EBP-1E8]

00434166 . 51 PUSH ECX

00434167 . 8D95 08FEFFFF LEA EDX,DWORD PTR SS:[EBP-1F8]

0043416D . 52 PUSH EDX

0043416E . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

00434174 . 50 PUSH EAX

00434175 . 8D85 F8FDFFFF LEA EAX,DWORD PTR SS:[EBP-208]

0043417B . 50 PUSH EAX

0043417C . 8D8D E8FDFFFF LEA ECX,DWORD PTR SS:[EBP-218]

00434182 . 51 PUSH ECX

00434183 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

00434189 . 50 PUSH EAX

0043418A . 8D95 D8FDFFFF LEA EDX,DWORD PTR SS:[EBP-228]

00434190 . 52 PUSH EDX

00434191 . 8D85 C8FDFFFF LEA EAX,DWORD PTR SS:[EBP-238]

00434197 . 50 PUSH EAX

00434198 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

0043419E . 50 PUSH EAX

0043419F . 8D8D B8FDFFFF LEA ECX,DWORD PTR SS:[EBP-248]

004341A5 . 51 PUSH ECX

004341A6 . 8D95 A8FDFFFF LEA EDX,DWORD PTR SS:[EBP-258]

004341AC . 52 PUSH EDX

004341AD . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004341B3 . 50 PUSH EAX

004341B4 . 8D85 98FDFFFF LEA EAX,DWORD PTR SS:[EBP-268]

004341BA . 50 PUSH EAX

004341BB . 8D8D 88FDFFFF LEA ECX,DWORD PTR SS:[EBP-278]

004341C1 . 51 PUSH ECX

004341C2 . FF15 4CE44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd

004341C8 . 50 PUSH EAX

004341C9 . 6A 40 PUSH 40

004341CB . 8D95 38EFFFFF LEA EDX,DWORD PTR SS:[EBP-10C8]

004341D1 . 52 PUSH EDX

004341D2 . FF15 08E34300 CALL DWORD PTR DS:[<&MSVBVM50.#595>] ; MSVBVM50.rtcMsgBox

//Crc校验错误。

..........................................................................



其实简单办法就是,命令行下断点 bp rtcMsgBox ,断下后返回,然后往上看,一会就会可以找到Magic Jmp。



今天胡涂了,忘记Vb程序用bp MessageBoxA 是不能断下来的。



顺路复习一下GetFileSize和Code内存断点。



最后当然看看胜利截图了。













看出字体确实存在Bug,免费软件作者当然没有什么热情更新除错了。





【破解小结】





我很忙,没时间总结了,谢谢大家耐心看完!


最新评论

QQ|小黑屋|最新主题|手机版|微赢网络技术论坛 ( 苏ICP备08020429号 )

GMT+8, 2024-9-29 23:33 , Processed in 0.264765 second(s), 12 queries , Gzip On, MemCache On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

返回顶部