Spencer
March 30th, 2004, 16:31
Hi Guys,
I found a little and interesting app on the web. I suspect the possibility of this utility being a hoax and I would like to ear an opinion.
Let me explain :
First of all this app is protected by a packer named ExeStealth that I have already unpacked and have presented me with a VB P-Code exe
.
0040104C > $ 68 C8954000 PUSH Xxxxxxx.004095C8
00401051 . E8 EEFFFFFF CALL <JMP.&MSVBVM60.#100>
it jumps to MSVBVM60.dll and the only call to the app code is to do this:
0040A91C . B8 4C000000 MOV EAX,4C
0040A921 . 66:3D 33C0 CMP AX,0C033
0040A925 . BA B0AB4000 MOV EDX,Xxxxxxx.0040ABB0
0040A92A . 68 3E104000 PUSH <JMP.&MSVBVM60.MethCallEngine>
0040A92F . C3 RETN
and return to the VB library and call the the app again for Form Load procedure. Ok I have decompiled the target and this is what I take:
[Form]
Private Sub Form_Load()
'-=-=-=-=-=-=-= ProcAddr Range: [0040AB74 - 0040ABB0] , ProcSize: 3C =-=-=-=-=-=-=-
0040AB74: 27 08 FF LitVar_Missing PushVarError 80020004 (missing) VT_ERROR signifies an optional argument that is missing
0040AB77: 27 28 FF LitVar_Missing PushVarError 80020004 (missing) VT_ERROR signifies an optional argument that is missing
*********** Referent String: "WARNING UNAUTHORIZED! Dongle not found." ***********
|
0040AB7A: 3A 58 FF 00 00 LitVarStr PushVarString Ptr_00409C48
0040AB7F: 4E 48 FF FStVarCopyObj [local_B8]=vbaVarDup(Pop)
0040AB82: 04 48 FF FLdRfVar Push local_B8
0040AB85: F5 10 00 00 00 LitI4: Push 00000010
0040AB8A: 1B 01 00 LitStr: Push Ptr_00409B58
0040AB8D: 1B 02 00 LitStr: Push Ptr_00409BB8
0040AB90: 2A ConcatStr vbaStrCat
0040AB91: 23 78 FF FStStrNoPop SysFreeString [local_88]; [local_88]=[stack]
0040AB94: 1B 03 00 LitStr: Push Ptr_00409BC4
0040AB97: 2A ConcatStr vbaStrCat
0040AB98: 46 68 FF CVarStr
0040AB9B: 0A 04 00 14 00 ImpAdCallFPR4 Call Ptr_00401020; check stack 0014 (no return value)
0040ABA0: 2F 78 FF FFree1Str SysFreeString [local_88]; [local_88]=0
0040ABA3: 36 08 00 68 FF 48 FFreeVar Free 0008 variants : 68 FF 48 FF 28 FF 08 FF
FF 28 FF 08 FF
0040ABAE: 13 ExitProcHresult
0040ABAF: 00 A4 LargeBos IDE beginning of line with A4 byte codes
Now what do you think it is a hoax or not ?
Rgds
Spencer
I found a little and interesting app on the web. I suspect the possibility of this utility being a hoax and I would like to ear an opinion.
Let me explain :
First of all this app is protected by a packer named ExeStealth that I have already unpacked and have presented me with a VB P-Code exe

0040104C > $ 68 C8954000 PUSH Xxxxxxx.004095C8
00401051 . E8 EEFFFFFF CALL <JMP.&MSVBVM60.#100>
it jumps to MSVBVM60.dll and the only call to the app code is to do this:
0040A91C . B8 4C000000 MOV EAX,4C
0040A921 . 66:3D 33C0 CMP AX,0C033
0040A925 . BA B0AB4000 MOV EDX,Xxxxxxx.0040ABB0
0040A92A . 68 3E104000 PUSH <JMP.&MSVBVM60.MethCallEngine>
0040A92F . C3 RETN
and return to the VB library and call the the app again for Form Load procedure. Ok I have decompiled the target and this is what I take:
[Form]
Private Sub Form_Load()
'-=-=-=-=-=-=-= ProcAddr Range: [0040AB74 - 0040ABB0] , ProcSize: 3C =-=-=-=-=-=-=-
0040AB74: 27 08 FF LitVar_Missing PushVarError 80020004 (missing) VT_ERROR signifies an optional argument that is missing
0040AB77: 27 28 FF LitVar_Missing PushVarError 80020004 (missing) VT_ERROR signifies an optional argument that is missing
*********** Referent String: "WARNING UNAUTHORIZED! Dongle not found." ***********
|
0040AB7A: 3A 58 FF 00 00 LitVarStr PushVarString Ptr_00409C48
0040AB7F: 4E 48 FF FStVarCopyObj [local_B8]=vbaVarDup(Pop)
0040AB82: 04 48 FF FLdRfVar Push local_B8
0040AB85: F5 10 00 00 00 LitI4: Push 00000010
0040AB8A: 1B 01 00 LitStr: Push Ptr_00409B58
0040AB8D: 1B 02 00 LitStr: Push Ptr_00409BB8
0040AB90: 2A ConcatStr vbaStrCat
0040AB91: 23 78 FF FStStrNoPop SysFreeString [local_88]; [local_88]=[stack]
0040AB94: 1B 03 00 LitStr: Push Ptr_00409BC4
0040AB97: 2A ConcatStr vbaStrCat
0040AB98: 46 68 FF CVarStr
0040AB9B: 0A 04 00 14 00 ImpAdCallFPR4 Call Ptr_00401020; check stack 0014 (no return value)
0040ABA0: 2F 78 FF FFree1Str SysFreeString [local_88]; [local_88]=0
0040ABA3: 36 08 00 68 FF 48 FFreeVar Free 0008 variants : 68 FF 48 FF 28 FF 08 FF
FF 28 FF 08 FF
0040ABAE: 13 ExitProcHresult
0040ABAF: 00 A4 LargeBos IDE beginning of line with A4 byte codes
Now what do you think it is a hoax or not ?
Rgds
Spencer