Strangerke
May 5th, 2004, 09:41
Hi,
I'm busy on a tool packed with ASProtect 1.23 RC4 for DAYS and I read a lot of tutorials just to be sure I wasn't doing stupid things.
Well, I thing that what still missing are the stolen bytes and obviously the final OEP modification (I've already set it to a temporary value I got by using tc eip<900000)
I'm sure there are stolen bytes because in the trace run I can see
REPSTOSB
POPFD
POPAD
RETN
I then tried to use LaBBa trick (searching for a "push ebx push esi push edi" block) but found nothing useful.
And when I take a look at the bytes before the OEP, I just can find 46 (!!!) stolen bytes.
My question is the following :
Does someone already saw this king of enormous amount of stolen bytes ?
By the way, I identified the version ASProtect by using PEid. Is there anothere way to do so ? (Manually if possible)
Thanks in advance for your precious help...
I'm busy on a tool packed with ASProtect 1.23 RC4 for DAYS and I read a lot of tutorials just to be sure I wasn't doing stupid things.
Well, I thing that what still missing are the stolen bytes and obviously the final OEP modification (I've already set it to a temporary value I got by using tc eip<900000)
I'm sure there are stolen bytes because in the trace run I can see
REPSTOSB
POPFD
POPAD
RETN
I then tried to use LaBBa trick (searching for a "push ebx push esi push edi" block) but found nothing useful.
And when I take a look at the bytes before the OEP, I just can find 46 (!!!) stolen bytes.
My question is the following :
Does someone already saw this king of enormous amount of stolen bytes ?
By the way, I identified the version ASProtect by using PEid. Is there anothere way to do so ? (Manually if possible)
Thanks in advance for your precious help...