分享
Armadillo Standard Unpack (Specific).txt
下载文档

ID:3399330

大小:1.62KB

页数:2页

格式:TXT

时间:2024-04-28

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
Armadillo Standard Unpack Specific Specific
/* .:TEAM RESURRECTiON:. Armadillo Standard Script by AvAtAr//stephenteh Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92 NOTES: - Remove all hardware breakpoints before run the script. - Add the following custom exceptions on OllyDbg: C0000005(ACCESS VIOLATION), C000001D(ILLEGAL INSTRUCTION) C000001E(INVALID LOCK SEQUENCE), C0000096(PRIVILEGED INSTRUCTION) */ var OpenMutexA var CreateMutexA var GetModuleHandleA var VirtualAlloc var CreateThread var JumpLocation var JumpLength var OEP gpa "OpenMutexA", "kernel32.dll" mov OpenMutexA, $RESULT gpa "CreateMutexA", "kernel32.dll" mov CreateMutexA, $RESULT gpa "GetModuleHandleA", "kernel32.dll" mov GetModuleHandleA, $RESULT gpa "VirtualAlloc", "kernel32.dll" mov VirtualAlloc, $RESULT gpa "CreateThread", "kernel32.dll" mov CreateThread, $RESULT bp OpenMutexA esto exec PUSHAD PUSHFD PUSH EDX XOR EAX,EAX PUSH EAX PUSH EAX CALL CreateMutexA POPFD POPAD JMP OpenMutexA ende bc OpenMutexA bphws GetModuleHandleA, "x" label1: esto cmp eax,VirtualAlloc jne label1 esto bphwc GetModuleHandleA rtu find eip, #0F84????????# mov JumpLocation, $RESULT mov JumpLength, JumpLocation add JumpLength, 2 mov JumpLength, [JumpLength] inc JumpLength mov [JumpLocation], 0E9 inc JumpLocation mov [JumpLocation], JumpLength bp CreateThread run cob bc CreateThread rtu rtr sti find eip, #2BF9FFD7# mov OEP, $RESULT add OEP, 2 bp OEP run bc OEP sti cmt eip, "<- OEP" msg "You're at the OEP, now dump with LordPE and fix the IAT with ImpRec. =)" ret

此文档下载收益归作者所有

下载文档
你可能关注的文档
收起
展开