#1
|
||||
|
||||
ASPR 1.2 question
I've done the tutorials on Asprotect, and was excited when I found a program that i could apply the tutorials to. Using Olly and running the code until the last instruction before it starts I am presented with this code
00A60019 3100 XOR DWORD PTR DS:[EAX],EAX 00A6001B 64:8F05 00000000 POP DWORD PTR FS:[0] 00A60022 58 POP EAX 00A60023 833D D839A600 00 CMP DWORD PTR DS:[A639D8],0 00A6002A 74 14 JE SHORT 00A60040 00A6002C 6A 0C PUSH 0C 00A6002E B9 D839A600 MOV ECX,0A639D8 00A60033 8D45 F8 LEA EAX,DWORD PTR SS:[EBP-8] 00A60036 BA 04000000 MOV EDX,4 00A6003B E8 30C4FFFF CALL 00A5C470 00A60040 FF75 FC PUSH DWORD PTR SS:[EBP-4] 00A60043 FF75 F8 PUSH DWORD PTR SS:[EBP-8] 00A60046 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 00A60049 8338 00 CMP DWORD PTR DS:[EAX],0 00A6004C 74 02 JE SHORT 00A60050 00A6004E FF30 PUSH DWORD PTR DS:[EAX] 00A60050 FF75 F0 PUSH DWORD PTR SS:[EBP-10] 00A60053 FF65 EC JMP DWORD PTR SS:[EBP-14] <--- THIS JUMP IS NOT IN ADDRESSED IN ANY TUTORIALS 00A60056 5F POP EDI 00A60057 5E POP ESI 00A60058 5B POP EBX 00A60059 8BE5 MOV ESP,EBP 00A6005B 5D POP EBP 00A6005C C3 RETN Anyway i tried two ways, One i nop'ed the jump and traced which killed my prog and the other way i followed the jump which dropped me into the main thread and then i traced and found the OEP, Its is the same as the Entry point so I'm assuming there are no stolen bytes. Mind you i have not rebuilt the program successfully. I already unpacked it using asprstripper just for reference that my OEP was correct. So now I'm working on rebuilding the import tables now. even though 00A60056 5F POP EDI 00A60057 5E POP ESI 00A60058 5B POP EBX Looks very suspicious in reference to everything i read on stolen bytes. I however put a breakpoint on them and ran the code and the program never ran that address? I'm just curious as to what the jump is for? when nothing i read ever mentioned it, They only said that there were two RET's that i had to execute before tracing. |
#2
|
|||
|
|||
gabri3l:
You need to review R@dier's tut, found here: http://www.exetools.com/forum/showthread.php?t=3594 Now, if you look at the first graphic, you will find a section of code that looks remarkably like yours, except that it has an extra RETN where I indicate: 00A60019 3100 XOR DWORD PTR DS:[EAX],EAX 00A6001B 64:8F05 00000000 POP DWORD PTR FS:[0] 00A60022 58 POP EAX 00A60023 833D D839A600 00 CMP DWORD PTR DS:[A639D8],0 00A6002A 74 14 JE SHORT 00A60040 00A6002C 6A 0C PUSH 0C 00A6002E B9 D839A600 MOV ECX,0A639D8 00A60033 8D45 F8 LEA EAX,DWORD PTR SS:[EBP-8] 00A60036 BA 04000000 MOV EDX,4 00A6003B E8 30C4FFFF CALL 00A5C470 00A60040 FF75 FC PUSH DWORD PTR SS:[EBP-4] 00A60043 FF75 F8 PUSH DWORD PTR SS:[EBP-8] 00A60046 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 00A60049 8338 00 CMP DWORD PTR DS:[EAX],0 00A6004C 74 02 JE SHORT 00A60050 00A6004E FF30 PUSH DWORD PTR DS:[EAX] 00A60050 FF75 F0 PUSH DWORD PTR SS:[EBP-10] 00A60053 FF65 EC JMP DWORD PTR SS:[EBP-14] <--- THIS JUMP IS NOT IN ADDRESSED IN ANY TUTORIALS ADDRESS RETN <----------------------- 00A60056 5F POP EDI 00A60057 5E POP ESI 00A60058 5B POP EBX 00A60059 8BE5 MOV ESP,EBP 00A6005B 5D POP EBP 00A6005C C3 RETN In R@dier's tut he says to mark the "last" RETN with F2 THEN hit Shift+F9, one more time, which takes you to the RETN. THEN you are supposed to go to the Memory window [you can click the "M" button at the top of Olly or ALT M] and highlight the ".code" section of your target. Then Right Click and choose "Set Memory Breakpoint on Access." You then go back to the CPU window and hit CTRL+F11. You are now at the EIP, somewhere in the 00400000+ range. Here you should do a CTRL +A to "Analyse" code. To determine how many stolen bytes you may need, also follow the tut and look in the stack window. Sitting at the EIP [after your CTRL+F11] you should have something which looks like: ADDRESS $-FF25 18E36300 JMP DWORD PTR DS:[ADDRESS] Now another R@dier reported trick (don't know who started this technique): Remove the analysis. "Right Click" in the CPU window, Analysis--> Remove Analysis. Now do Alt+K to bring up the STACK window. If you did not remove the Analysis, you will probably have no entries or only one entry. If you did remove the Analysis, you will probably have one entry or two. If you Double click on the last address [or the only one if Analysis Removed], it will open the CPU window again at that location. This may be kind of tricky, because if it's at an odd address, and if you scroll up, the view shifts to an even address. [In OllyDBG you can move the display up or down, one bit at a time by using the CTRL + up or down arrow.] Generally your Stolen Bytes go right above this address and you can count the number of total bytes which need to be placed there. Now finding the Stolen Bytes can be accomplished by tooking in the Trace Window. View --> Run Trace. If you set your Debugging Options in the TRACE tab to check "Log Commands" and "Show ESP," when you open the TRACE by going to Window --> Run Trace, the window will open. Next Right Click on the window --> Highlight Register --> EBP. Now if you scroll down to the bottom of the TRACE Window, you will see alot of "REP STOS BYTE PTR ES:[EDI]" code which was used to erase the Stolen Bytes and other things. Now if you look above this section, you should have a red section in the command window. Keep looking up and you will eventually see a red highlighted EBP (Generally around 600 or less) which is identical to ESP. Look into the Command Window side, opposite the ESP, which is immediately above the highlited EBP. Here you may need some basic understanding of start-up code for various compilers, but in general, the Stolen Bytes you need are "limited" by the amount of "empty" space available above the ADDRESS you found in the bottom call in the STACK Window [look at the example in R@dier's tut if this isn't clear]. It would be a good idea to start a file of "Stolen Byte" Sequences you see in the tuts and in your efforts and save them for use at this point, as described by R@dier. Now in figuring out what the Stolen Bytes might be, you must remember that [at the moment] the last "stolen" instruction seems to usually be: MOVE EAX, target,ADDRESS This ADDRESS is generally to be found in "either" the EAX or EBX register, when the program first breaks in the EIP, after executing the proper number of SHIFT+F9's and the CTRL+F11 described in R@dier's tut. So, knowing that your "last" Stolen Byte group is probably: MOVE EAX, target,[the address shown in "either" EAX or EBX when break at EIP] or B8 ADDRESS [and remember the address is reversed, if the ADDRESS is 0063516C, it would be written in as B8 6C516300]. So this sequence takes 5 BYTES of the available space. Since you did not identify your target, this is a general approach, not necessarily specific for the target you are working on, but it should be generally correct. Regards,
__________________
JMI Last edited by JMI; 04-28-2004 at 15:05. |
#3
|
||||
|
||||
Thank you for the response. I've been working on this for the past few days. And been getting a little turned around on it. I have made a dump that will load the program but my import table is all screwed up so any menu function etc... will crash the prog, I was using ImportREC to do the IAT but I think it may take a little more of a hands on approach because it just will not rebuild properly.
I have come to the conclusion that there are no stolen bytes. The trace confirms it as does ASPRstripper. (honestly, a little dissapointed i was hoping to work with stolen bytes when i saw the three pops) I suppose where you indicated a RET, since there are no stolen bytes I immediately JMP rather than returning and stealing bytes. I could not figure out why I was not hitting any returns after my last exception. And getting curious because none of my dumps seemed to work correctly. Thank you JMI for the help. |
#4
|
|||
|
|||
gabri3l:
Have you downloaded R@dier's tut I mentioned and tried to follow his directions on rebuilding the IAT? There are many tuts on the net descussing rebuilding the IAT. There are also several good reference which discuss some of the routines ASPR renames. One can use the patterns of some of these routines to determine the name of the API. Here is one list, which is contributed by hobferret, over on the Woodmann Forum, and LaBBA. They give patterns of some which get moved or confused. Remember addresses are dependent on which OS you are using. Here's that list. Aspr notes V1.4?? Redirected calls which cannot be auto resolved! 44B717 6513C4 6513C4 55 PUSH EBP 6513C5 8BEC MOV EBP,ESP 6513C7 5D POP ESP 6513C8 C20400 RET 04 Becomes Kernel32!FreeResource 44B724 65139C 65139C 6A00 PUSH 00 65139E E8B53DFFFF CALL Kernel32!GMHA 6513A3 FF35E46C6500 PUSH DWORD [00656CE4] 6513A9 58 POP EAX 6513AA 8B05F46C6500 MOV EAX, [00656CF4] 6513B0 C3 RET Becomes Kernel32!GetCommandLineA 44B730 651388 651388 A1E86C6500 MOV EAX, [00656CE8] 65138D C3 RET Becomes Kernel32!GetCurrentProcess 44B760 65133C 65133C Look it抯 GetModuleHandleA Becomes Kernel32!GetModuleHandleA 44B770 650EE8 650EE8/F0E GetProcAddress Becomes Kernel32!GetProcAddress 44B7A0 651358 651358 6A00 PUSH 00 65135A E8F93DFFFF CALL Kernel32!GMHA 65135F FF35E46C6500 PUSH DWORD [00656CE4] 651365 58 POP EAX 651366 C3 RET Becomes Kernel32!GetCommandLineA 44B7D4 6513B4 6513B4 55 PUSH EBP 6513B5 8BEC MOV EBP,ESP 6513B7 8B05F46C6500 MOV EAX, [00656CF4] 6513BD B84508 MOV EAX, [EBP+08] 6513C0 5D POP EBP 6513C1 C20400 RET 04 Becomes Kernel32!LockResource 4753F8 - ED13D0 EDI3D0 6A00 PUSH 00 ED13D2 CALLKernel32!GMHA ED13D7 FF35E86CED00 PUSH WORD [00ED6CE8] ED13DD 58 POP EAX ED13DE 8B05F86CED00 MOV EAX, [00ED6CF8] ED13E4 C3 RET Becomes Kernel32!GetCommandLineA 4573FC - ED13C0 ED13C0 55 PUSH EBP ED13C1 8BEC MOV EBP,ESP ED13C3 CALLKernel32!GetVersion ED13C8 A1F46CED00 MOV EAX, [00ED6CF4] ED13CD 5D POP EBP ED13CE C3 RET Becomes Kernel32!GetVersion 457444 - EE9E24 EE9E24 52 PUSH EDX EE9E25 68369507C0 PUSH WORD [C0079536] EE9E2A C3 RET Becomes Kernel32!GlobalUnlock 475464 - ED13B8 ED13B8 A1EC6CED00 MOV EAX, [00ED6CEC] ED13BD C3 RET Becomes Kernel32!GetCurrentProcess 4754D0 - ED0EF0 ED0EF0\\ED0FI6 CALL Kernel32!GetProcAddress RET 08 Becomes Kernel32!GetProcAddress 475518 - ED1360 ED1360\\ED1384 CALL Hernel32!GMHA RET 04 Becomes Kernel32!GetModuleHandleA LaBBa explanation! PUSH EBP MOV EBP,ESP MOV EAX,[FF7E24] // DWORD VALUE 001522398 POP EBP RETN4 EITHER LOCK RESOURCE or FREERESOURCE PUSH DWORD PTR DS:[FF7E14] POP EAX RET GET VERSION PUSH EBP MOV EBP,ESP MOV EAX,DWORD PTR DS:[FF7E24] MOV EAX,DWORD PTR SS:[EBP+8] POP EBP RETN4 EITHER LOCKRESOURCE or FREERESOURCE MOV EAX,DWORD PTR DS:[FF7E20] RETN GETCURRENTPROCESSID MOV EAX,DWORD PTR DS:[FF7E18] RETN GETCURRENTPROCESS - GETCURRENTPROCESSID works too! PUSH EBP MOV EBP,ESP MOV EAX,DWORD PTR DS:[FF7E24] POP EBP RETN4 EITHER LOCKRESOURCE or FREERESOURCE LaBBa's tut: ASPR 1.23 Unpacking "Step-By-Step" has methods of resolving APIs with Olly. One thing to remember is that it would be unusual to find an API from a different DLL among listings for a particular DLL. By that, I mean, you won't see user32.dll listings in the middle of kernel32.dll. One recent thread here described the process in this sequence: 11) Loaded Imprec v1.6f 12) Selected DVDIdle Pro as Active Process 13) Pressed IAT Auto Search 14) Pressed Get Imports (left all values at default) 15) Pressed Show Invalid 16) Right clicked on invalid and selected: Trace Level 1 (disasm) 17) Pressed Show Invalid again 18) Right clicked on invalid and selected: Plugin Tracers-> aspr2 You can find the aspr2 tracer here: http://www.exetools.com/forum/showthread.php?t=3594&page=2 If you post your target, I may have time to take a look to confirm your information. Regards,
__________________
JMI Last edited by JMI; 04-28-2004 at 10:41. |
#5
|
||||
|
||||
The program is sagebrush's recallpro v1.3. Its an interesting program, in version 1.2 if you were running XP it had a bug that would delete your license information from the registry when you closed it. It just took a quick NOP to the call and it worked perfectly after that. Well it turns out that they still didn't fix the problem for version 1.3. Though they did decide to start packing it. I was finally able to get the IAT to work. The R@ider tut helped me out. I had ollydump rebuilding the Imports by default. One thing that had me confused was in labbas, r@diers, and MrBarby's tutorial they all say to increase the size when using Imprecf. I was getting frustrated because I was finding a lot of imports to fix. and a good amount of them were ADD [EAX], AL. By keeping the size about the same and Using both the ASPR2 tracer (Thank you by the way) and the 1.2 tracer I was able to get a working IAT. I know I must have done something incorrectly because when i try and repack it ASprotect says that it is already packed. and i get a message in w32dasm about pe file not in windows format but it runs! and I can debug it now and get rid of that registry call.
just a quick question for reference, when looking at what imports are in my range i look at the ptr:xxxxxxxxx and make sure that that is in my program range? And when fixing them since it will only run on my system, can you (iN theory), dump it again and rebuld the import table to give you the correct calls? While searching for references while working on this I was able to compile a lot of tuts on using Softice and a few on revirgin for ASPR. So I think I'll give this another try using those tools now knowing that I can actually do it. I really appreciate the help. Thank you JMI Last edited by gabri3l; 04-28-2004 at 13:18. |
#6
|
|||
|
|||
I've attached my Imprec plugins folder. In addition to excellent tutorials by LaBBA, R@dier you may also refer another excellent tutorial by Britedream on Stolen bytes.
http://grinders.withernsea.com/tutorials/britedream.rar Regards, ferrari |
#7
|
|||
|
|||
A solid recommendation, as I believe Britedream was the ultimate source of much of the unpacking information I have reported here. I've downloaded your target, and, time permitting, will take a quick look at the unpacking issues. May I recommend that you not only read the tuts you've downloaded, but that you start making your own set of compiled notes on features of various versions of your protector targets.
For example, you could start collecting the patterns of stolen bytes reported and discovered. You could start recording patterns of code found at or around the stolen bytes. You could start studying, from the trace, the patterns from the ASPR DLL. For example the Huge loop at the start of the program which is followed by another loop which seems to match the number of times you passed an exception with F9 and/or SHIFT+F9; that your OEP is probably sitting naked in the trace, if you only know where to look and that it probably is listed in the trace in a PUSH DWORD PTR DS:[ADDRESS] instruction a couple of instructions above the PUSHAD and PUSHFD which occur shortly before the REP STOS BYTE PTR ES:[EDI] routine to erase all the code that got you there in the first place. In other words, the run trace is worth close study because it is the track of ASPR's unfolding of the path to the OEP. Understanding what it's doing will help with the next target and you might note the differences you discover in the general pattern. In this effort it really helps to remove all the loop code repeats, simply noting the registers going into the start of the loop and coming out. Once you get comfortable with the unpacking, you then have to move on to the issue of whether or not their is additional code in the target which has to be changed to make it actually run fully. But for the first step, you just want to master manual unpacking and then worry about the next phase. ferrari: I've downloaded Britedream's tut both here and from somewhere else and, for some reason, I'm not seeing the illustrations. Yours has the first two only, and the other one I downloaded didn't have any. Maybe I'm just using the wrong file to open it. It's opening in Word and it's time to try something else. Regards,
__________________
JMI Last edited by JMI; 04-28-2004 at 15:41. |
#8
|
|||
|
|||
I dowloaded the file(.doc in word XP) to check and I'm able to see all the "9" illustrations. If you still got any problems then tell me. I've extracted all the images and I'll upload the file for you if needed, otherwise I might unnecessarily increase Aaron's database
Regards, ferrari |
#9
|
|||
|
|||
Thanks for the offer ferrari, but for some reason which I can't explain at the moment, it is suddenly working. The first several times I opened it, there was only the graphics on the first page. Now, if I wait awhile, they slowly appear on the other pages as well.
Be careful of road rash out there and remember that the Diety gave you only one set of family jewels and did not intend that you use them to smash into handrails and other such solid metal objects. Regards,
__________________
JMI |
#10
|
||||
|
||||
Thank you guys for the help. Good advice JMI! i have about 2 pages of notes just trying to unpack this program. (and a few more notes on a taco bell napkin) . Hopefully I will be able to figure out what I'm doing wrong so i can move on and compare them to another program.
Time willing, I hope to get a better unpack and rebuild of the program. And maybe work on cleaning the code up. I must have missed something if asprotect says that it is still packed. On Woodmanns forum there was some info on cleaning up an ASprotect unpack. I've bookmarked it to refer back to. Much Thanks Ferrari for your plugins folder. I only had aspr 1.2 and aspr2 did not even know there was one for aspr 1.23. And for the britedream tut. When im done working on this program I feel a target with stolen bytes calling me. One good thing is that I feel like I'm getting a better idea of whats actually going on rather than just blindly following a tutorial. Last edited by gabri3l; 04-29-2004 at 15:45. |
#11
|
|||
|
|||
gabri3l:
I have a question for you. I was not able to find a copy of v1.3 of the target because it's been replaced with v1.3a. Attempting to follow the code in OllyDBG it seems strange because the code for the SEH and exceptions all occur in what is listed as the main code section of the file. By this I mean that from the initial start at 0040100 all of the exception code takes place in the 00400000 range, while most ASPR files I've looked at in Olly have had these routines in a far distant address, well out of the 00400000 range of the target ".code" section. Although PEiD identifies this as ASPR I'm wondering if that is really true, considering that your version still identified ASPR even after you removed it. Using the F9 and SHIFT+F9 technique I am eventually raising the following messagebox: "Don't know how to step because memory at address XXXXXXXX is not readable.Try to change EIP or pass exception to program" and one can't set a "breakpoint on entry" to the ".code" section, because it is already IN THE CODE SECTION. I have found discussion of such a message and possible workaround on the OllyDBG Forum here: http://ollydbg.win32asmcommunity.net/index.php?action=vthread&forum=1&topic=612 But haven't had time to work through it yet. Still learning Olly's traits and settings. Does your v1.3 have it's exceptions within the 00400000 range, or does it leap off into a far address with the first or second F9/SHIFT+F9? Regards,
__________________
JMI Last edited by JMI; 04-29-2004 at 12:54. |
#12
|
||||
|
||||
JMI, I just checked and you are right 1.3a is the version I'm using as well. Though all my exceptions occur outside of the code section. all in the 00AXXXXX range.
Exceptions: 00A10671 <-- First exception ...25 exceptions later... 00A10019 <--Last exception I set a breakpoint on: 00A10053: JMP Dword PTR SS:[EBP-14] Step into the jump And begin my trace I get the entry point: 0047ED5F I'm using XP SP1 on my home comp and NT on my work comp both give me exceptions outside the programs address range. After pressing F9 to start the program I press Shift+F9 twenty six more times to end on the last instruction. That may drop you to the equivalent of the code in my first post. In HAVOK's paper in codebreakers he talked about how ASPR would jump to your .code section and then jump right back out again to make it harder to find the OEP. But as the exceptions are occuring inside the code I'm lost. I'll read up on it and see if its mentioned anywhere. But yes I was confused as to why i keep getting an already packed error. However i use stripper to dump it and it gave me the following 03:52:15 - asprotect detected.. Image Base :00400000 03:52:15 - dumping victim.. 03:52:15 - processing import table.. ImportAddressTable RVA :000990f8 - kernel32.dll ImportAddressTable RVA :00099378 - user32.dll ImportAddressTable RVA :00099024 - gdi32.dll ImportAddressTable RVA :00099000 - advapi32.dll ImportAddressTable RVA :0009936c - shell32.dll ImportAddressTable RVA :0009932c - msacm32.dll ImportAddressTable RVA :000995cc - winmm.dll ImportAddressTable RVA :000995bc - version.dll 03:52:16 - fixing import table.. ImportAddress RVA :00099224 - kernel32.dll!LockResource ImportAddress RVA :00099234 - kernel32.dll!GetCurrentProcessId ImportAddress RVA :00099258 - kernel32.dll!FreeResource ImportAddress RVA :0009925c - kernel32.dll!GetModuleHandleA ImportAddress RVA :00099284 - kernel32.dll!GetCurrentProcess ImportAddress RVA :0009929c - kernel32.dll!GetVersion ImportAddress RVA :000992f4 - kernel32.dll!GetCommandLineA ImportAddress RVA :000993d0 - user32.dll!DialogBoxParamA 03:52:18 - no stolen bytes are found.. EntryPoint RVA :0007ed5f 03:52:18 - saving unpacked file.. 03:52:18 - file was unpacked successful.. 03:52:18 - done.. A perfect unpack... Now if I could only do that. Just a thought: Maybe my problem lies not in my dump or my IAT but rather my resulting file structure. My unpack will run, but there may be garbage in there thats throwing both w32dasm and asprotect off. I'll try and study up on my PE structures tomorrow. Last edited by gabri3l; 04-29-2004 at 15:42. |
#13
|
|||
|
|||
Hi,
I unpacked this last night without any problems except olly1.10c kept crashing out so I had to revert back to 1.10b to unpack it successfully. all exception were well outside the 00400000 range so I am not sure what going on with yours JMI. I will run though it again tonight and post my notes Best Wishes R@dier |
#14
|
|||
|
|||
gabri3l:
Thanks for reminding me that it is ALWAYS a good idea to go back and read from the start of the thread. Had I done that, I would have discovered that you had reported Your "last exception" occurred with the routine between 00A60019-00A6005C. I had noticed then, that your code was nearly identical as that shown in the R@dier tut I described, except for the fact that his exceptions, as well as the ones I've seen in the few other ASPR targets I've tried in OllyDBG were clearly "outside" the range of the ".code" section shown in the Memory Map. R@dier's were in the range of 00D0XXXX, while, at least your last one, was in the range 00A60019-00A6005C. Now you are confusing me by your statement that: Exceptions: 00A10671 <-- First exception ...25 exceptions later... 00A10019 <--Last exception There is an obvious difference between a last exception routine which starts at 00A60019 and one that starts at 00A10019 is there not????? And my first exception was also at 00A10671. How did you lose 50000 bytes between what you first posted and today?????? In my version of the target, the Memory Map shows the .code section to begin at Address=00401000, with Size=00098000 (622592.) That suggests that any address within the range of 00401000 to 00499000 (which would include 00A60019-00A6005C and/or 00A10671 and 00A10019) where these exceptions are occurring is IN the code section shown in the Memory Map. I didn't hit any OUTSIDE that range and I have a file with the code addresses at each of the breaks on exception. I am also running XP SP1 and I believe the same OllyDbg version R@dier just described reverting back to, although my "About" identifies it as OllyDbg v1.10(step 2), I believe that is version 1.10b. I'm wondering if I have one of the settings wrong in Olly as I know I set several in attacking some of the other targets I finally had some time to play with, but I never got to the routine you posted in your first post, although I was watching for it. I'm going to try your break point on 00A10053 and see if it breakes, because I'm not getting anywhere near. My last exception code is happening at: 00A111D3 58 POP EAX 00A111D4 33C0 XOR EAX,EAX 00A111D6 5A POP EDX 00A111D7 59 POP ECX 00A111D8 59 POP ECX 00A111D9 64:8910 MOV DWORD PTR FS:[EAX],EDX 00A111DC 68 0E12A100 PUSH 0A1120E 00A111E1 8D85 ACD7FFFF LEA EAX,DWORD PTR SS:[EBP-2854] 00A111E7 BA 02000000 MOV EDX,2 00A111EC E8 BF1FFFFF CALL 00A031B0 00A111F1 8D45 BC LEA EAX,DWORD PTR SS:[EBP-44] 00A111F4 E8 971FFFFF CALL 00A03190 00A111F9 8D45 C4 LEA EAX,DWORD PTR SS:[EBP-3C] 00A111FC BA 02000000 MOV EDX,2 00A11201 E8 AA1FFFFF CALL 00A031B0 00A11206 C3 RETN which sure doesn't look correct and leads to the error message I posted below. R@dier: Will be happy to see your notes and would appreciate if you would include your setting in the Debugger options--->exceptions because that may be the problem here. I will be especially interested if the phrase "well outside the 00400000 range" really means something "outside" what is listed for the .code section, such something in the 00DXXXXX or 00CXXXXX perhaps. That would be very strange, and gabri3l confirms my findings that they appear to be within the .code section. I've just retried the program in OllyDbg and after the first exception, I can scroll up and see the routine at 00A10019 and if I put a breakpoint there, or at 00A10053 I'm not reaching it and still get to the routine I posted, which starts at 00A111D3 and ends in the error message. One small further intersting point. When I ran PEiD on the file it said the OEP was at 47CB16 (although I never got there in the code) while gabr3il found 0047ED5F. So I'm suspecting more and more it is something in my settings. Regards,
__________________
JMI |
#15
|
|||
|
|||
Quote:
2- highmemory+0019 is the correct last exception, which is in my pc =00A20019. you can find that out by using my last updated script "asplex-2" for last exception. Regards. Last edited by britedream; 05-01-2004 at 12:43. |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Aspr anyone know this one? | hobferret | General Discussion | 16 | 05-13-2015 22:54 |
ASPR, ARMA question | sgdt | General Discussion | 3 | 04-09-2006 03:38 |
More Aspr 1.31 | SvensK | General Discussion | 0 | 06-09-2004 22:52 |
Newbie question ASPR 1.23 RC4 (long!) | Wurstgote | General Discussion | 126 | 02-27-2004 11:41 |