+SplAj
February 22nd, 2001, 01:36
Hi fellow reversers,
We all know very well the redirected API trick that ASprotect employs to deter dumping and rebuilding protected exe's.
Well last nite I played with Rot8 target 'TagRename' from softpointer.com. When I had unpacked it with Revirgins help, the program still did not run. Further analysis showed the following call very early on :-
EAX=00000000 EBX=00710000 ECX=00000000 EDX=00000000 ESI=818AD11C
EDI=00000000 EBP=0081FE38 ESP=0081FE28 EIP=0127C784 o d I s Z a P c
CS=0167 DS=016F SS=016F ES=016F FS=1B57 GS=3356 DS:012835A8=00536778
ÄÄÄÄÄTAGRENAME!+0C44ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄbyteÄÄÄÄÄÄÄÄÄÄÄÄÄÄPROTÄÄÄ(0)ÄÄ
0030:0053BC44 84 C7 27 01 00 00 00 00-00 00 00 00 00 00 00 00 ..'.............
0030:0053BC54 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC64 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC74 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC84 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC94 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCA4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCB4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCC4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCD4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄPROT32Ä
0167:0127C783 90 NOP
0167:0127C784 833DA835280100 CMP DWORD PTR [012835A8],00
0167:0127C78B 7406 JZ 0127C793
0167:0127C78D FF15A8352801 CALL [012835A8]
0167:0127C793 C3 RET
The CALL [012835A8] is really CALL 536778.
i.e. there is now REDIRECTED 'CODE' as well. In this case just 1 call to manually fix to point to the real 'call 536778' instead of the 0127C784 .Replacing the bytes 84C72701 at 53BC44 with 78675300 (reverse bytes) . Then the program ran sweet. BUT in the future maybe many of these with a twist of bitter lemon for us ???
So what else can he do ?
SplAj
We all know very well the redirected API trick that ASprotect employs to deter dumping and rebuilding protected exe's.
Well last nite I played with Rot8 target 'TagRename' from softpointer.com. When I had unpacked it with Revirgins help, the program still did not run. Further analysis showed the following call very early on :-
EAX=00000000 EBX=00710000 ECX=00000000 EDX=00000000 ESI=818AD11C
EDI=00000000 EBP=0081FE38 ESP=0081FE28 EIP=0127C784 o d I s Z a P c
CS=0167 DS=016F SS=016F ES=016F FS=1B57 GS=3356 DS:012835A8=00536778
ÄÄÄÄÄTAGRENAME!+0C44ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄbyteÄÄÄÄÄÄÄÄÄÄÄÄÄÄPROTÄÄÄ(0)ÄÄ
0030:0053BC44 84 C7 27 01 00 00 00 00-00 00 00 00 00 00 00 00 ..'.............
0030:0053BC54 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC64 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC74 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC84 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BC94 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCA4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCB4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCC4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
0030:0053BCD4 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄPROT32Ä
0167:0127C783 90 NOP
0167:0127C784 833DA835280100 CMP DWORD PTR [012835A8],00
0167:0127C78B 7406 JZ 0127C793
0167:0127C78D FF15A8352801 CALL [012835A8]
0167:0127C793 C3 RET
The CALL [012835A8] is really CALL 536778.
i.e. there is now REDIRECTED 'CODE' as well. In this case just 1 call to manually fix to point to the real 'call 536778' instead of the 0127C784 .Replacing the bytes 84C72701 at 53BC44 with 78675300 (reverse bytes) . Then the program ran sweet. BUT in the future maybe many of these with a twist of bitter lemon for us ???
So what else can he do ?
SplAj