本帖最后由 吾爱|破解 于 2024-6-21 18:11 编辑
在脱PESpin 壳遇到解密call 但是里面是将输入的字符 与 一大串 特殊符号进行相加 没看到有判断 我用 真密码 也是这样 这种怎么解
[Asm] 纯文本查看 复制代码
00731F6B 002B add byte ptr ds:[ebx],ch
00731F6D C9 leave
00731F6E 68 00040000 push 0x400
00731F73 53 push ebx ; 回调函数
00731F74 6A 00 push 0x0
00731F76 52 push edx
00731F77 50 push eax ; wow64cpu.77611CFC
00731F78 FF95 405A4000 call dword ptr ss:[ebp+0x405A40] ; user32.DialogBoxIndirectParamA
00731F7E 0BC0 or eax,eax ; wow64cpu.77611CFC
00731F80 75 07 jnz short 飞秋FeiQ.00731F89
00731F82 50 push eax ; wow64cpu.77611CFC
00731F83 FF97 87594000 call dword ptr ds:[edi+0x405987]
00731F89 91 xchg eax,ecx
00731F8A 8DBD 09534000 lea edi,dword ptr ss:[ebp+0x405309]
00731F90 51 push ecx ; 输入的长度
00731F91 57 push edi ; 输入的字符
00731F92 E8 0A020000 call 飞秋FeiQ.007321A1 ; 应该是判断接口
00731F97 33C0 xor eax,eax ; wow64cpu.77611CFC
00731F99 F3:AA rep stos byte ptr es:[edi]
00731F9B 0FB78D 55594000 movzx ecx,word ptr ss:[ebp+0x405955]
00731FA2 8B95 5B594000 mov edx,dword ptr ss:[ebp+0x40595B] ; 飞秋FeiQ.00400108
00731FA8 81C2 F8000000 add edx,0xF8
00731FAE 8D9D A86B4200 lea ebx,dword ptr ss:[ebp+0x426BA8]
00731FB4 81EB C0E80100 sub ebx,0x1E8C0
00731FBA 8B1B mov ebx,dword ptr ds:[ebx]
00731FBC 2BC0 sub eax,eax ; wow64cpu.77611CFC
00731FBE 51 push ecx
00731FBF 0FA3C3 bt ebx,eax ; wow64cpu.77611CFC
00731FC2 73 13 jnb short 飞秋FeiQ.00731FD7
00731FC4 8B7A 0C mov edi,dword ptr ds:[edx+0xC]
00731FC7 03BD 51594000 add edi,dword ptr ss:[ebp+0x405951] ; 飞秋FeiQ.00400000
00731FCD 8B4A 10 mov ecx,dword ptr ds:[edx+0x10]
00731FD0 51 push ecx
00731FD1 57 push edi ; 飞秋FeiQ.00731E57
00731FD2 E8 5E020000 call 飞秋FeiQ.00732235
00731FD7 40 inc eax ; wow64cpu.77611CFC
00731FD8 83C2 28 add edx,0x28
00731FDB 59 pop ecx ; 飞秋FeiQ.007305AF
00731FDC ^ E2 E0 loopd short 飞秋FeiQ.00731FBE
[Asm] 纯文本查看 复制代码
]007321A4 60 pushad
007321A5 33C0 xor eax,eax ; wow64cpu.77611CFC
007321A7 BF 00001840 mov edi,0x40180000
007321AC E8 00000000 call 飞秋FeiQ.007321B1
007321B1 5B pop ebx ; 飞秋FeiQ.007305AF
007321B2 81EB 63564000 sub ebx,飞秋FeiQ.00405663
007321B8 E8 00000000 call 飞秋FeiQ.007321BD
007321BD 5F pop edi ; 飞秋FeiQ.007305AF
007321BE 81EF 1C010000 sub edi,0x11C
007321C4 89BB C2564000 mov dword ptr ds:[ebx+0x4056C2],edi ; 飞秋FeiQ.00731E57
007321CA 89BB C8564000 mov dword ptr ds:[ebx+0x4056C8],edi ; 飞秋FeiQ.00731E57
007321D0 89BB CE564000 mov dword ptr ds:[ebx+0x4056CE],edi ; 飞秋FeiQ.00731E57
007321D6 89BB D4564000 mov dword ptr ds:[ebx+0x4056D4],edi ; 飞秋FeiQ.00731E57
007321DC 89BB DA564000 mov dword ptr ds:[ebx+0x4056DA],edi ; 飞秋FeiQ.00731E57
007321E2 89BB EC564000 mov dword ptr ds:[ebx+0x4056EC],edi ; 飞秋FeiQ.00731E57
007321E8 89BB 93544000 mov dword ptr ds:[ebx+0x405493],edi ; 飞秋FeiQ.00731E57
007321EE 89BB 5A564000 mov dword ptr ds:[ebx+0x40565A],edi ; 飞秋FeiQ.00731E57
007321F4 AA stos byte ptr es:[edi]
007321F5 FEC0 inc al
007321F7 ^ 75 FB jnz short 飞秋FeiQ.007321F4 ; 写入特殊字符
007321F9 8B7D 08 mov edi,dword ptr ss:[ebp+0x8]
007321FC 33C9 xor ecx,ecx
007321FE 33C0 xor eax,eax ; wow64cpu.77611CFC
00732200 33D2 xor edx,edx
00732202 8B75 0C mov esi,dword ptr ss:[ebp+0xC]
00732205 EB 04 jmp short 飞秋FeiQ.0073220B
00732207 42 inc edx
00732208 4E dec esi ; user32.771E0000
00732209 ^ 74 F5 je short 飞秋FeiQ.00732200
0073220B 02043A add al,byte ptr ds:[edx+edi]
0073220E 0281 53554000 add al,byte ptr ds:[ecx+0x405553]
00732214 8A98 53554000 mov bl,byte ptr ds:[eax+0x405553]
0073221A 8AB9 53554000 mov bh,byte ptr ds:[ecx+0x405553]
00732220 8899 53554000 mov byte ptr ds:[ecx+0x405553],bl
00732226 88B8 53554000 mov byte ptr ds:[eax+0x405553],bh
0073222C FEC1 inc cl
0073222E ^ 75 D7 jnz short 飞秋FeiQ.00732207 ; 这段在加密一样
00732230 61 popad
00732231 C9 leave
00732232 C2 0800 retn 0x8
|