Riremito

jms v312

Aug 6th, 2024
278
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.96 KB | None | 0 0
  1.  
  2. 00F38401 - 8D 71 2C - lea esi,[ecx+2C]
  3. 00F38404 - 8B CE - mov ecx,esi
  4. 00F38406 - E8 553680FF - call 0073BA60 // HS flag
  5. 00F3840B - 85 C0 - test eax,eax
  6. 00F3840D - 74 1C - je 00F3842B
  7.  
  8.  
  9. 00F38584 - 89 74 24 08 - mov [esp+08],esi
  10. 00F38588 - C7 06 884C3401 - mov [esi],01344C88 { (00F38940) }
  11. 00F3858E - C7 44 24 14 08000000 - mov [esp+14],00000008 { 8 }
  12. 00F385A9 - 8B CE - mov ecx,esi
  13. 00F385AB - E8 50FEFFFF - call 00F38400
  14.  
  15. ->
  16.  
  17. 00F386FE - 33 DB - xor ebx,ebx
  18. 00F38700 - 3B C3 - cmp eax,ebx
  19. 00F38702 - 74 0B - je 00F3870F
  20. 00F38704 - 8D 48 FC - lea ecx,[eax-04]
  21. 00F38707 - 89 0D 001B4901 - mov [01491B00],ecx { (0) }
  22. 00F3870D - EB 06 - jmp 00F38715
  23. 00F3870F - 89 1D 001B4901 - mov [01491B00],ebx { (0) }
  24. 00F38715 - C7 06 884C3401 - mov [esi],01344C88 { (00F38940) }
  25.  
  26. // VMP
  27. 00DA2C81 | 8910 | mov dword ptr ds:[eax],edx | // Stack Clear and death
  28. 00DA2C83 | 9C | pushfd |
  29. 00DA2C84 | 60 | pushad |
  30. 00DA2C85 | 884424 04 | mov byte ptr ss:[esp+4],al |
  31. 00DA2C89 | 8D6424 24 | lea esp,dword ptr ss:[esp+24] |
  32. 00DA2C8D | E9 3C1176FF | jmp jms_v312.0_lt.503DCE |
  33.  
  34. 00DA2AB7 | 6A 00 | push 0 |
  35. 00DA2AB9 | E9 B21C8200 | jmp jms_v312.0_lt.15C4770 |
  36.  
  37. virtual protect
  38. 010E421C
  39.  
  40. // SCRIPT
  41. // HS_TEST
  42. //00F38704:
  43. //db 31 C9 90
  44.  
  45. 00F38704:
  46. db 90 90 90 90
  47. call 0162B000+400000 // call .patch section (added code)
  48.  
  49. // Check_Language
  50. 00E8E210:
  51. db 90 E9
  52.  
  53. // Check_Mutex
  54. 00E8E019:
  55. db 90 E9
  56.  
  57. // DR_Check
  58. //00504030:
  59. //db 31 C0 C3
  60.  
  61. // Launcher
  62. 0095C220:
  63. db B8 01 00 00 00 C3
  64.  
  65. // ServerIP
  66. 012B543C:
  67. db '127.0.0.1' 00 00 00 00 00
  68.  
  69. // ServerIP
  70. 012B544C:
  71. db '127.0.0.1' 00 00 00 00 00
  72.  
  73.  
  74. // code
  75. pushad // save registers
  76. sub esp,04 // allocate 4 bytes
  77. lea eax,[esp] // DWORD var
  78. // restore PE header part
  79. push eax // oldprotect
  80. push 00000004 // PAGE_READWRITE
  81. push 00001000 // PE header size
  82. push 00400000 // PE header addr
  83. call dword ptr [010E421C] // VirtualProtect IAT
  84. mov ecx,00001000
  85. mov esi,01A2E000
  86. mov edi,00400000
  87. repe movsb
  88. lea eax,[esp]
  89. push eax // oldprotect
  90. push [eax] // restore oldprotect
  91. push 00001000 // PE header size
  92. push 00400000 // PE header addr
  93. call dword ptr [010E421C] // VirtualProtect IAT
  94. lea eax,[esp]
  95. push eax // oldprotect
  96. push 00000040 // PAGE_EXECUTE_READWRITE
  97. push 00CE3000 // .text section size
  98. push 00401000 // .text section addr
  99. call dword ptr [010E421C] // VirtualProtect IAT
  100. // restore client edit part
  101. mov eax,00E8E210
  102. mov byte ptr [eax],0F
  103. mov byte ptr [eax+01],-7C
  104. mov eax,00E8E019
  105. mov byte ptr [eax],0F
  106. mov byte ptr [eax+01],-7B
  107. mov eax,0095C220
  108. mov byte ptr [eax],-7D
  109. mov byte ptr [eax+01],-14
  110. mov byte ptr [eax+02],5C
  111. mov byte ptr [eax+03],56
  112. mov byte ptr [eax+04],57
  113. mov byte ptr [eax+05],33
  114. mov eax,00F38704
  115. mov byte ptr [eax],-73
  116. mov byte ptr [eax+01],48
  117. mov byte ptr [eax+02],-04
  118. mov byte ptr [eax+03],-77
  119. mov byte ptr [eax+04],0D
  120. mov byte ptr [eax+05],00
  121. mov byte ptr [eax+06],1B
  122. mov byte ptr [eax+07],49
  123. mov byte ptr [eax+08],01
  124. lea eax,[esp]
  125. push eax // oldprotect
  126. push [eax] // restore oldprotect
  127. push 00CE3000 // .text section size
  128. push 00401000 // .text section addr
  129. call dword ptr [010E421C] // VirtualProtect IAT
  130. add esp,04 // delete allocated 4 bytes
  131. popad // restore registers
  132. // remove hackshield
  133. xor ecx,ecx
  134. mov [01491B00],ecx
  135. ret
  136.  
Advertisement
Add Comment
Please, Sign In to add comment