|
|
|
[求助]PC-Guard 4.03 - 4.15 -> Blagoje Ceklic ?
最初由 domino 发布 看?呃位domino ??是我?中?人的高手了.. 你怎?可以打得檫呃?老外的??呀... ?指教小弟怎?可以?他的?..可以?? |
|
[求助]PC-Guard 4.03 - 4.15 -> Blagoje Ceklic ?
沛的key 有用?? 因我的?呢重新灌了,,所以就不能用到他的key.. 你??吧 ...SH1T-096B6518-HEAD |
|
|
|
|
|
[求助]PC-Guard 4.03 - 4.15 -> Blagoje Ceklic ?
破解的人是老外的..他是世界破解高手排名十名之?..很了不起的.?在他能破解所有老外的付遑的程式. 我猜我?中?也有比他?利害的破解高手存在..?大家?力?忙..高手??出??一下. 我傥了一部份出?斤大家看: 檫始就停在呃>> 004E9C00 > FC CLD 004E9C01 55 PUSH EBP 004E9C02 50 PUSH EAX 004E9C03 E8 00000000 CALL supervox.004E9C08 004E9C08 5D POP EBP 004E9C09 EB 01 JMP SHORT supervox.004E9C0C 004E9C0B E3 60 JECXZ SHORT supervox.004E9C6D 004E9C0D E8 03000000 CALL supervox.004E9C15 004E9C12 D2EB SHR BL,CL 004E9C14 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9C17 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9C1A EB 01 JMP SHORT supervox.004E9C1D 004E9C1C 35 FFE0E761 XOR EAX,61E7E0FF 004E9C21 B8 CC814000 MOV EAX,supervox.004081CC 004E9C26 60 PUSHAD 004E9C27 E8 03000000 CALL supervox.004E9C2F 004E9C2C 83EB 0E SUB EBX,0E 004E9C2F EB 01 JMP SHORT supervox.004E9C32 004E9C31 0C 58 OR AL,58 004E9C33 EB 01 JMP SHORT supervox.004E9C36 004E9C35 35 40EB0136 XOR EAX,3601EB40 004E9C3A FFE0 JMP EAX 004E9C3C 0B61 2B OR ESP,DWORD PTR DS:[ECX+2B] 004E9C3F E8 EB01839C CALL 9CD19E2F 004E9C44 EB 01 JMP SHORT supervox.004E9C47 004E9C46 D5 EB AAD 0EB 004E9C48 0835 9DEB0189 OR BYTE PTR DS:[8901EB9D],DH 004E9C4E EB 03 JMP SHORT supervox.004E9C53 004E9C50 0BEB OR EBP,EBX 004E9C52 F758 EB NEG DWORD PTR DS:[EAX-15] 004E9C55 01E3 ADD EBX,ESP 004E9C57 60 PUSHAD 004E9C58 E8 03000000 CALL supervox.004E9C60 004E9C5D D2EB SHR BL,CL 004E9C5F 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9C62 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9C65 EB 01 JMP SHORT supervox.004E9C68 004E9C67 35 FFE0E761 XOR EAX,61E7E0FF 004E9C6C 8985 9C4E4100 MOV DWORD PTR SS:[EBP+414E9C],EAX 004E9C72 EB 01 JMP SHORT supervox.004E9C75 004E9C74 839CEB 01D5EB08>SBB DWORD PTR DS:[EBX+EBP*8+8EBD501],35 004E9C7C 9D POPFD 004E9C7D EB 01 JMP SHORT supervox.004E9C80 004E9C7F 89EB MOV EBX,EBP 004E9C81 030B ADD ECX,DWORD PTR DS:[EBX] 004E9C83 ^ EB F7 JMP SHORT supervox.004E9C7C 004E9C85 58 POP EAX 004E9C86 60 PUSHAD 004E9C87 E8 03000000 CALL supervox.004E9C8F 004E9C8C 83EB 0E SUB EBX,0E 004E9C8F EB 01 JMP SHORT supervox.004E9C92 004E9C91 0C 58 OR AL,58 004E9C93 EB 01 JMP SHORT supervox.004E9C96 004E9C95 35 40EB0136 XOR EAX,3601EB40 004E9C9A FFE0 JMP EAX 004E9C9C 0B61 89 OR ESP,DWORD PTR DS:[ECX-77] 004E9C9F 85B44E 4100EB01 TEST DWORD PTR DS:[ESI+ECX*2+1EB0041],ES> 004E9CA6 839CEB 01D5EB08>SBB DWORD PTR DS:[EBX+EBP*8+8EBD501],35 004E9CAE 9D POPFD 004E9CAF EB 01 JMP SHORT supervox.004E9CB2 004E9CB1 89EB MOV EBX,EBP 004E9CB3 030B ADD ECX,DWORD PTR DS:[EBX] 004E9CB5 ^ EB F7 JMP SHORT supervox.004E9CAE 004E9CB7 899D A04E4100 MOV DWORD PTR SS:[EBP+414EA0],EBX 004E9CBD EB 01 JMP SHORT supervox.004E9CC0 004E9CBF E3 60 JECXZ SHORT supervox.004E9D21 004E9CC1 E8 03000000 CALL supervox.004E9CC9 004E9CC6 D2EB SHR BL,CL 004E9CC8 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9CCB 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9CCE EB 01 JMP SHORT supervox.004E9CD1 004E9CD0 35 FFE0E761 XOR EAX,61E7E0FF 004E9CD5 898D A44E4100 MOV DWORD PTR SS:[EBP+414EA4],ECX 004E9CDB 60 PUSHAD 004E9CDC E8 03000000 CALL supervox.004E9CE4 004E9CE1 83EB 0E SUB EBX,0E 004E9CE4 EB 01 JMP SHORT supervox.004E9CE7 004E9CE6 0C 58 OR AL,58 004E9CE8 EB 01 JMP SHORT supervox.004E9CEB 004E9CEA 35 40EB0136 XOR EAX,3601EB40 004E9CEF FFE0 JMP EAX 004E9CF1 0B61 89 OR ESP,DWORD PTR DS:[ECX-77] 004E9CF4 95 XCHG EAX,EBP 004E9CF5 A8 4E TEST AL,4E 004E9CF7 41 INC ECX 004E9CF8 00EB ADD BL,CH 004E9CFA 01E3 ADD EBX,ESP 004E9CFC 60 PUSHAD 004E9CFD E8 03000000 CALL supervox.004E9D05 004E9D02 D2EB SHR BL,CL 004E9D04 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9D07 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9D0A EB 01 JMP SHORT supervox.004E9D0D 004E9D0C 35 FFE0E761 XOR EAX,61E7E0FF 004E9D11 89B5 AC4E4100 MOV DWORD PTR SS:[EBP+414EAC],ESI 004E9D17 EB 01 JMP SHORT supervox.004E9D1A 004E9D19 839CEB 01D5EB08>SBB DWORD PTR DS:[EBX+EBP*8+8EBD501],35 004E9D21 9D POPFD 004E9D22 EB 01 JMP SHORT supervox.004E9D25 004E9D24 89EB MOV EBX,EBP 004E9D26 030B ADD ECX,DWORD PTR DS:[EBX] 004E9D28 ^ EB F7 JMP SHORT supervox.004E9D21 004E9D2A 89BD B04E4100 MOV DWORD PTR SS:[EBP+414EB0],EDI 004E9D30 60 PUSHAD 004E9D31 E8 03000000 CALL supervox.004E9D39 004E9D36 83EB 0E SUB EBX,0E 004E9D39 EB 01 JMP SHORT supervox.004E9D3C 004E9D3B 0C 58 OR AL,58 004E9D3D EB 01 JMP SHORT supervox.004E9D40 004E9D3F 35 40EB0136 XOR EAX,3601EB40 004E9D44 FFE0 JMP EAX 004E9D46 0B61 89 OR ESP,DWORD PTR DS:[ECX-77] 004E9D49 A5 MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ES> 004E9D4A B8 4E4100EB MOV EAX,EB00414E 004E9D4F 01E3 ADD EBX,ESP 004E9D51 60 PUSHAD 004E9D52 E8 03000000 CALL supervox.004E9D5A 004E9D57 D2EB SHR BL,CL 004E9D59 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9D5C 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9D5F EB 01 JMP SHORT supervox.004E9D62 004E9D61 35 FFE0E761 XOR EAX,61E7E0FF 004E9D66 83EC 78 SUB ESP,78 004E9D69 60 PUSHAD 004E9D6A E8 03000000 CALL supervox.004E9D72 004E9D6F 83EB 0E SUB EBX,0E 004E9D72 EB 01 JMP SHORT supervox.004E9D75 004E9D74 0C 58 OR AL,58 004E9D76 EB 01 JMP SHORT supervox.004E9D79 004E9D78 35 40EB0136 XOR EAX,3601EB40 004E9D7D FFE0 JMP EAX 004E9D7F 0B61 E8 OR ESP,DWORD PTR DS:[ECX-18] 004E9D82 0000 ADD BYTE PTR DS:[EAX],AL 004E9D84 0000 ADD BYTE PTR DS:[EAX],AL 004E9D86 58 POP EAX 004E9D87 EB 01 JMP SHORT supervox.004E9D8A 004E9D89 E3 60 JECXZ SHORT supervox.004E9DEB 004E9D8B E8 03000000 CALL supervox.004E9D93 004E9D90 D2EB SHR BL,CL 004E9D92 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9D95 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9D98 EB 01 JMP SHORT supervox.004E9D9B 004E9D9A 35 FFE0E761 XOR EAX,61E7E0FF 004E9D9F 2D 86010000 SUB EAX,186 004E9DA4 EB 01 JMP SHORT supervox.004E9DA7 004E9DA6 839CEB 01D5EB08>SBB DWORD PTR DS:[EBX+EBP*8+8EBD501],35 004E9DAE 9D POPFD 004E9DAF EB 01 JMP SHORT supervox.004E9DB2 004E9DB1 89EB MOV EBX,EBP 004E9DB3 030B ADD ECX,DWORD PTR DS:[EBX] 004E9DB5 ^ EB F7 JMP SHORT supervox.004E9DAE 004E9DB7 2B85 104E4100 SUB EAX,DWORD PTR SS:[EBP+414E10] 004E9DBD 60 PUSHAD 004E9DBE E8 03000000 CALL supervox.004E9DC6 004E9DC3 83EB 0E SUB EBX,0E 004E9DC6 EB 01 JMP SHORT supervox.004E9DC9 004E9DC8 0C 58 OR AL,58 004E9DCA EB 01 JMP SHORT supervox.004E9DCD 004E9DCC 35 40EB0136 XOR EAX,3601EB40 004E9DD1 FFE0 JMP EAX 004E9DD3 0B61 89 OR ESP,DWORD PTR DS:[ECX-77] 004E9DD6 85044E TEST DWORD PTR DS:[ESI+ECX*2],EAX 004E9DD9 41 INC ECX 004E9DDA 008B 85284E41 ADD BYTE PTR DS:[EBX+414E2885],CL 004E9DE0 0060 E8 ADD BYTE PTR DS:[EAX-18],AH 004E9DE3 0300 ADD EAX,DWORD PTR DS:[EAX] 004E9DE5 0000 ADD BYTE PTR DS:[EAX],AL 004E9DE7 83EB 0E SUB EBX,0E 004E9DEA EB 01 JMP SHORT supervox.004E9DED 004E9DEC 0C 58 OR AL,58 004E9DEE EB 01 JMP SHORT supervox.004E9DF1 004E9DF0 35 40EB0136 XOR EAX,3601EB40 004E9DF5 FFE0 JMP EAX 004E9DF7 0B61 85 OR ESP,DWORD PTR DS:[ECX-7B] 004E9DFA C0EB 01 SHR BL,1 004E9DFD 839CEB 01D5EB08>SBB DWORD PTR DS:[EBX+EBP*8+8EBD501],35 004E9E05 9D POPFD 004E9E06 EB 01 JMP SHORT supervox.004E9E09 004E9E08 89EB MOV EBX,EBP 004E9E0A 030B ADD ECX,DWORD PTR DS:[EBX] 004E9E0C ^ EB F7 JMP SHORT supervox.004E9E05 004E9E0E 0F85 E1C70000 JNZ supervox.004F65F5 004E9E14 EB 01 JMP SHORT supervox.004E9E17 004E9E16 E3 60 JECXZ SHORT supervox.004E9E78 004E9E18 E8 03000000 CALL supervox.004E9E20 004E9E1D D2EB SHR BL,CL 004E9E1F 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9E22 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9E25 EB 01 JMP SHORT supervox.004E9E28 004E9E27 35 FFE0E761 XOR EAX,61E7E0FF 004E9E2C 40 INC EAX 004E9E2D 60 PUSHAD 004E9E2E E8 03000000 CALL supervox.004E9E36 004E9E33 83EB 0E SUB EBX,0E 004E9E36 EB 01 JMP SHORT supervox.004E9E39 004E9E38 0C 58 OR AL,58 004E9E3A EB 01 JMP SHORT supervox.004E9E3D 004E9E3C 35 40EB0136 XOR EAX,3601EB40 004E9E41 FFE0 JMP EAX 004E9E43 0B61 89 OR ESP,DWORD PTR DS:[ECX-77] 004E9E46 8528 TEST DWORD PTR DS:[EAX],EBP 004E9E48 4E DEC ESI 004E9E49 41 INC ECX 004E9E4A 00EB ADD BL,CH 004E9E4C 01E3 ADD EBX,ESP 004E9E4E 60 PUSHAD 004E9E4F E8 03000000 CALL supervox.004E9E57 004E9E54 D2EB SHR BL,CL 004E9E56 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9E59 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9E5C EB 01 JMP SHORT supervox.004E9E5F 004E9E5E 35 FFE0E761 XOR EAX,61E7E0FF 004E9E63 64:67:A1 3000 MOV EAX,DWORD PTR FS:[30] 004E9E68 60 PUSHAD 004E9E69 E8 03000000 CALL supervox.004E9E71 004E9E6E 83EB 0E SUB EBX,0E 004E9E71 EB 01 JMP SHORT supervox.004E9E74 004E9E73 0C 58 OR AL,58 004E9E75 EB 01 JMP SHORT supervox.004E9E78 004E9E77 35 40EB0136 XOR EAX,3601EB40 004E9E7C FFE0 JMP EAX 004E9E7E 0B61 8D OR ESP,DWORD PTR DS:[ECX-73] 004E9E81 858D 10B416EB TEST DWORD PTR SS:[EBP+EB16B410],ECX 004E9E87 0135 B91AC600 ADD DWORD PTR DS:[C61AB9],ESI 004E9E8D 00EB ADD BL,CH 004E9E8F 0183 33DB2D62 ADD DWORD PTR DS:[EBX+622DDB33],EAX 004E9E95 8A73 16 MOV DH,BYTE PTR DS:[EBX+16] 004E9E98 EB 01 JMP SHORT supervox.004E9E9B 004E9E9A 0B8B F848968B OR ECX,DWORD PTR DS:[EBX+8B9648F8] 004E9EA0 D6 SALC 004E9EA1 60 PUSHAD 004E9EA2 EB 01 JMP SHORT supervox.004E9EA5 004E9EA4 E3 60 JECXZ SHORT supervox.004E9F06 004E9EA6 E8 03000000 CALL supervox.004E9EAE 004E9EAB D2EB SHR BL,CL 004E9EAD 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9EB0 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9EB3 EB 01 JMP SHORT supervox.004E9EB6 004E9EB5 35 FFE0E761 XOR EAX,61E7E0FF 004E9EBA BB 6EAB7E65 MOV EBX,657EAB6E 004E9EBF 60 PUSHAD 004E9EC0 E8 03000000 CALL supervox.004E9EC8 004E9EC5 83EB 0E SUB EBX,0E 004E9EC8 EB 01 JMP SHORT supervox.004E9ECB 004E9ECA 0C 58 OR AL,58 004E9ECC EB 01 JMP SHORT supervox.004E9ECF 004E9ECE 35 40EB0136 XOR EAX,3601EB40 004E9ED3 FFE0 JMP EAX 004E9ED5 0B61 0F OR ESP,DWORD PTR DS:[ECX+F] 004E9ED8 A0 EB01839C MOV AL,BYTE PTR DS:[9C8301EB] 004E9EDD EB 01 JMP SHORT supervox.004E9EE0 004E9EDF D5 EB AAD 0EB 004E9EE1 0835 9DEB0189 OR BYTE PTR DS:[8901EB9D],DH 004E9EE7 EB 03 JMP SHORT supervox.004E9EEC 004E9EE9 0BEB OR EBP,EBX 004E9EEB F7 ??? ; 未知命令 004E9EEC 8D85 8E344C75 LEA EAX,DWORD PTR SS:[EBP+754C348E] 004E9EF2 EB 01 JMP SHORT supervox.004E9EF5 004E9EF4 E3 60 JECXZ SHORT supervox.004E9F56 004E9EF6 E8 03000000 CALL supervox.004E9EFE 004E9EFB D2EB SHR BL,CL 004E9EFD 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9F00 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9F03 EB 01 JMP SHORT supervox.004E9F06 004E9F05 35 FFE0E761 XOR EAX,61E7E0FF 004E9F0A 07 POP ES ; 段寄存器更改 004E9F0B 60 PUSHAD 004E9F0C E8 03000000 CALL supervox.004E9F14 004E9F11 83EB 0E SUB EBX,0E 004E9F14 EB 01 JMP SHORT supervox.004E9F17 004E9F16 0C 58 OR AL,58 004E9F18 EB 01 JMP SHORT supervox.004E9F1B 004E9F1A 35 40EB0136 XOR EAX,3601EB40 004E9F1F FFE0 JMP EAX 004E9F21 0B61 05 OR ESP,DWORD PTR DS:[ECX+5] 004E9F24 2951 F4 SUB DWORD PTR DS:[ECX-C],EDX 004E9F27 8AEB MOV CH,BL 004E9F29 0183 9CEB01D5 ADD DWORD PTR DS:[EBX+D501EB9C],EAX 004E9F2F EB 08 JMP SHORT supervox.004E9F39 004E9F31 35 9DEB0189 XOR EAX,8901EB9D 004E9F36 EB 03 JMP SHORT supervox.004E9F3B 004E9F38 0BEB OR EBP,EBX 004E9F3A F750 EB NOT DWORD PTR DS:[EAX-15] 004E9F3D 01E3 ADD EBX,ESP 004E9F3F 60 PUSHAD 004E9F40 E8 03000000 CALL supervox.004E9F48 004E9F45 D2EB SHR BL,CL 004E9F47 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9F4A 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9F4D EB 01 JMP SHORT supervox.004E9F50 004E9F4F 35 FFE0E761 XOR EAX,61E7E0FF 004E9F54 26:8B83 9254819>MOV EAX,DWORD PTR ES:[EBX+9A815492] 004E9F5B 60 PUSHAD 004E9F5C E8 03000000 CALL supervox.004E9F64 004E9F61 83EB 0E SUB EBX,0E 004E9F64 EB 01 JMP SHORT supervox.004E9F67 004E9F66 0C 58 OR AL,58 004E9F68 EB 01 JMP SHORT supervox.004E9F6B 004E9F6A 35 40EB0136 XOR EAX,3601EB40 004E9F6F FFE0 JMP EAX 004E9F71 0B61 50 OR ESP,DWORD PTR DS:[ECX+50] 004E9F74 EB 01 JMP SHORT supervox.004E9F77 004E9F76 839CEB 01D5EB08>SBB DWORD PTR DS:[EBX+EBP*8+8EBD501],35 004E9F7E 9D POPFD 004E9F7F EB 01 JMP SHORT supervox.004E9F82 004E9F81 89EB MOV EBX,EBP 004E9F83 030B ADD ECX,DWORD PTR DS:[EBX] 004E9F85 ^ EB F7 JMP SHORT supervox.004E9F7E 004E9F87 26:89A3 9254819>MOV DWORD PTR ES:[EBX+9A815492],ESP 004E9F8E EB 01 JMP SHORT supervox.004E9F91 004E9F90 E3 60 JECXZ SHORT supervox.004E9FF2 004E9F92 E8 03000000 CALL supervox.004E9F9A 004E9F97 D2EB SHR BL,CL 004E9F99 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004E9F9C 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004E9F9F EB 01 JMP SHORT supervox.004E9FA2 004E9FA1 35 FFE0E761 XOR EAX,61E7E0FF 004E9FA6 8913 MOV DWORD PTR DS:[EBX],EDX 004E9FA8 FC CLD 004E9FA9 EB 01 JMP SHORT supervox.004E9FAC 004E9FAB 0AEB OR CH,BL 004E9FAD 2D 038B9AF6 SUB EAX,F69A8B03 004E9FB2 C11F 75 RCR DWORD PTR DS:[EDI],75 ; 移位常量超出 1..31 的范围 004E9FB5 028B F2AC8D9D ADD CL,BYTE PTR DS:[EBX+9D8DACF2] 004E9FBB AD LODS DWORD PTR DS:[ESI] 004E9FBC 0055 EB ADD BYTE PTR SS:[EBP-15],DL 004E9FBF 8A27 MOV AH,BYTE PTR DS:[EDI] 004E9FC1 EB 01 JMP SHORT supervox.004E9FC4 004E9FC3 8381 C3F284EB 1>ADD DWORD PTR DS:[ECX+EB84F2C3],14 004E9FCA EB 02 JMP SHORT supervox.004E9FCE 004E9FCC 81C3 86E053EB ADD EBX,EB53E086 004E9FD2 0181 D2C0E987 ADD DWORD PTR DS:[ECX+87E9C0D2],EAX 004E9FD8 0000 ADD BYTE PTR DS:[EAX],AL 004E9FDA 0066 49 ADD BYTE PTR DS:[ESI+49],AH 004E9FDD EB 01 JMP SHORT supervox.004E9FE0 004E9FDF 0375 CF ADD ESI,DWORD PTR SS:[EBP-31] 004E9FE2 E9 80000000 JMP supervox.004EA067 004E9FE7 8332 C4 XOR DWORD PTR DS:[EDX],FFFFFFC4 004E9FEA EB 02 JMP SHORT supervox.004E9FEE 004E9FEC 81C3 860747C3 ADD EBX,C3470786 004E9FF2 328B 642408EB XOR CL,BYTE PTR DS:[EBX+EB082464] 004E9FF8 01E3 ADD EBX,ESP 004E9FFA 60 PUSHAD 004E9FFB E8 03000000 CALL supervox.004EA003 004EA000 D2EB SHR BL,CL 004EA002 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004EA005 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004EA008 EB 01 JMP SHORT supervox.004EA00B 004EA00A 35 FFE0E761 XOR EAX,61E7E0FF 004EA00F 64:67:8F06 0000 POP DWORD PTR FS:[0] 004EA015 60 PUSHAD 004EA016 E8 03000000 CALL supervox.004EA01E 004EA01B 83EB 0E SUB EBX,0E 004EA01E EB 01 JMP SHORT supervox.004EA021 004EA020 0C 58 OR AL,58 004EA022 EB 01 JMP SHORT supervox.004EA025 004EA024 35 40EB0136 XOR EAX,3601EB40 004EA029 FFE0 JMP EAX 004EA02B 0B61 83 OR ESP,DWORD PTR DS:[ECX-7D] 004EA02E C404EB LES EAX,FWORD PTR DS:[EBX+EBP*8] ; 段寄存器更改 004EA031 0183 9CEB01D5 ADD DWORD PTR DS:[EBX+D501EB9C],EAX 004EA037 EB 08 JMP SHORT supervox.004EA041 004EA039 35 9DEB0189 XOR EAX,8901EB9D 004EA03E EB 03 JMP SHORT supervox.004EA043 004EA040 0BEB OR EBP,EBX 004EA042 F761 EB MUL DWORD PTR DS:[ECX-15] 004EA045 01E3 ADD EBX,ESP 004EA047 60 PUSHAD 004EA048 E8 03000000 CALL supervox.004EA050 004EA04D D2EB SHR BL,CL 004EA04F 0B58 EB OR EBX,DWORD PTR DS:[EAX-15] 004EA052 0148 40 ADD DWORD PTR DS:[EAX+40],ECX 004EA055 EB 01 JMP SHORT supervox.004EA058 004EA057 35 FFE0E761 XOR EAX,61E7E0FF 004EA05C FD STD 004EA05D ^ E9 4FFFFFFF JMP supervox.004E9FB1 004EA062 34 22 XOR AL,22 004EA064 ^ EB 82 JMP SHORT supervox.004E9FE8 004EA066 C1C7 1E ROL EDI,1E 004EA069 303B XOR BYTE PTR DS:[EBX],BH 004EA06B 6E OUTS DX,BYTE PTR ES:[EDI] ; I/O 命令 004EA06C C2 9E6E RETN 6E9E 004EA06F 5E POP ESI 004EA070 AD LODS DWORD PTR DS:[ESI] 004EA071 34 84 XOR AL,84 004EA073 C3 RETN 004EA074 DB ??? ; 未知命令 004EA075 E6 5A OUT 5A,AL ; I/O 命令 004EA077 C8 E489D6 ENTER 89E4,0D6 004EA07B 8227 8D AND BYTE PTR DS:[EDI],FFFFFF8D 004EA07E C147 BF 08 ROL DWORD PTR DS:[EDI-41],8 004EA082 43 INC EBX 004EA083 0B5CEE B2 OR EBX,DWORD PTR DS:[ESI+EBP*8-4E] 004EA087 D22B SHR BYTE PTR DS:[EBX],CL 004EA089 BB 6CA414AD MOV EBX,AD14A46C 004EA08E F6F7 DIV BH 004EA090 4E DEC ESI 004EA091 D1CA ROR EDX,1 004EA093 BF BFCC4DAA MOV EDI,AA4DCCBF 004EA098 2E:43 INC EBX ; 多余的前缀 004EA09A AF SCAS DWORD PTR ES:[EDI] 004EA09B 27 DAA 004EA09C 196A 14 SBB DWORD PTR DS:[EDX+14],EBP 004EA09F 42 INC EDX 004EA0A0 60 PUSHAD 004EA0A1 019F 0D5F41EB ADD DWORD PTR DS:[EDI+EB415F0D],EBX 004EA0A7 87AD 8D31D0FA XCHG DWORD PTR SS:[EBP+FAD0318D],EBP 004EA0AD 3A71 8D CMP DH,BYTE PTR DS:[ECX-73] 004EA0B0 0B2A OR EBP,DWORD PTR DS:[EDX] 004EA0B2 ^ 79 D6 JNS SHORT supervox.004EA08A 004EA0B4 0C B3 OR AL,0B3 004EA0B6 49 DEC ECX 004EA0B7 9F LAHF 004EA0B8 B4 22 MOV AH,22 004EA0BA E5 8E IN EAX,8E ; I/O 命令 004EA0BC 0F2F3D 48A1E725 COMISS XMM7,DWORD PTR DS:[25E7A148] 004EA0C3 203411 AND BYTE PTR DS:[ECX+EDX],DH |
|
[原创]手脱ASProtect第二篇---OEP 抽取
那我们换个方法,OD忽略所有异常,bp GetModuleHandleA, 不明白你怎?做呢...可以教我怎? ( 那我们换个方法,OD忽略所有异常,bp GetModuleHandleA, ) 我一檫始就是停在呃彦呀..?怎?揠.. 00401000 > 68 01305B00 PUSH iconxp.005B3001 00401005 E8 01000000 CALL iconxp.0040100B 0040100A C3 RETN 0040100B C3 RETN 0040100C 1E PUSH DS 0040100D DE27 FISUB WORD PTR DS:[EDI] 0040100F 1D D32FE96C SBB EAX,6CE92FD3 00401014 74 67 JE SHORT iconxp.0040107D 00401016 338E 079EA63C XOR ECX,DWORD PTR DS:[ESI+3CA69E07] 0040101C 9C PUSHFD 0040101D D5 86 AAD 86 0040101F D1AB 7F1FB68F SHR DWORD PTR DS:[EBX+8FB61F7F],1 00401025 0FAA RSM ; 特权命令 00401027 D6 SALC 00401028 D1FC SAR ESP,1 0040102A F5 CMC 0040102B C7 ??? ; 未知命令 0040102C 54 PUSH ESP 0040102D B5 3B MOV CH,3B 0040102F C3 RETN 00401030 D4 95 AAM 95 00401032 34 5D XOR AL,5D 00401034 16 PUSH SS |
|
[求助]ASProtect 1.2x - 1.3x [Registered] 遇到问题。
我用peid v0.93 查不出??, 用pe-scan 查出是呃, ??一下高手?怎?去??呢.. 我是一?很菜的破解??, ??忙一下.. |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值