当前位置: 移动技术网 > 网络运营>安全>加解密 > 简单判断是否进入OEP

简单判断是否进入OEP

2018年03月31日  | 移动技术网网络运营  | 我要评论

总结:

 Microsoft Visual C++ 6.0
 
00496EB8 >/$  55            PUSH EBP                                 ;  (初始 cpu 选择)
00496EB9  |.  8BEC          MOV EBP,ESP
00496EBB  |.  6A FF         PUSH -1
00496EBD  |.  68 40375600   PUSH Screensh.00563740
00496EC2  |.  68 8CC74900   PUSH Screensh.0049C78C                   ;  SE 处理程序安装
00496EC7  |.  64:A1 0000000>MOV EAX,DWORD PTR FS:[0]
00496ECD  |.  50            PUSH EAX
00496ECE  |.  64:8925 00000>MOV DWORD PTR FS:[0],ESP
00496ED5  |.  83EC 58       SUB ESP,58
 
   
 
 
Microsoft Visual Basic 5.0 / 6.0
 
00401166  - FF25 6C104000   JMP DWORD PTR DS:[<&MSVBVM60.#100>]      ; MSVBVM60.ThunRTMain
0040116C >  68 147C4000     PUSH PACKME.00407C14
00401171    E8 F0FFFFFF     CALL <JMP.&MSVBVM60.#100>
00401176    0000            ADD BYTE PTR DS:[EAX],AL
00401178    0000            ADD BYTE PTR DS:[EAX],AL
0040117A    0000            ADD BYTE PTR DS:[EAX],AL
0040117C    3000            XOR BYTE PTR DS:[EAX],AL
 
或省略第一行的JMP
 
00401FBC >  68 D0D44000        push dumped_.0040D4D0
00401FC1    E8 EEFFFFFF        call <jmp.&msvbvm60.ThunRTMain>
00401FC6    0000               add byte ptr ds:[eax],al
00401FC8    0000               add byte ptr ds:[eax],al
00401FCA    0000               add byte ptr ds:[eax],al
00401FCC    3000               xor byte ptr ds:[eax],al
00401FCE    0000               add byte ptr ds:[eax],al
 
BC++
 
0040163C > $ /EB 10         JMP SHORT BCLOCK.0040164E
0040163E     |66            DB 66                                    ;  CHAR f
0040163F     |62            DB 62                                    ;  CHAR b
00401640     |3A            DB 3A                                    ;  CHAR :
00401641     |43            DB 43                                    ;  CHAR C
00401642     |2B            DB 2B                                    ;  CHAR +
00401643     |2B            DB 2B                                    ;  CHAR +
00401644     |48            DB 48                                    ;  CHAR H
00401645     |4F            DB 4F                                    ;  CHAR O
00401646     |4F            DB 4F                                    ;  CHAR O
00401647     |4B            DB 4B                                    ;  CHAR K
00401648     |90            NOP
00401649     |E9            DB E9
0040164A   . |98E04E00      DD OFFSET BCLOCK.___CPPdebugHook
0040164E   > A1 8BE04E00   MOV EAX,DWORD PTR DS:[4EE08B]
00401653   .  C1E0 02       SHL EAX,2
00401656   .  A3 8FE04E00   MOV DWORD PTR DS:[4EE08F],EAX
0040165B   .  52            PUSH EDX
0040165C   .  6A 00         PUSH 0                                   ; /pModule = NULL
0040165E   .  E8 DFBC0E00   CALL <JMP.&KERNEL32.GetModuleHandleA>    ; GetModuleHandleA
00401663   .  8BD0          MOV EDX,EAX
 
Borland Delphi 6.0 - 7.0
 
00509CB0 > $  55            PUSH EB

如对本文有疑问, 点击进行留言回复!!

相关文章:

验证码:
移动技术网