能力值:
(RANK:215 )
|
-
-
6 楼
启动有验证,楼主的注册不对,最后暴力解决
004BD0EC |. 55 PUSH EBP
004BD0ED |. 68 B9D44B00 PUSH a_.004BD4B9
004BD0F2 |. 64:FF30 PUSH DWORD PTR FS:[EAX]
004BD0F5 |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
004BD0F8 |. B2 01 MOV DL,1
004BD0FA |. A1 B8554600 MOV EAX,DWORD PTR DS:[4655B8]
004BD0FF |. E8 8885FAFF CALL a_.0046568C
004BD104 |. 8BF0 MOV ESI,EAX
004BD106 |. BA 02000080 MOV EDX,80000002
004BD10B |. 8BC6 MOV EAX,ESI
004BD10D |. E8 1A86FAFF CALL a_.0046572C
004BD112 |. 68 80000000 PUSH 80 ; /NewValue = 80
004BD117 |. 6A EC PUSH -14 ; |Index = GWL_EXSTYLE
004BD119 |. A1 1CFF4B00 MOV EAX,DWORD PTR DS:[4BFF1C] ; |
004BD11E |. 8B00 MOV EAX,DWORD PTR DS:[EAX] ; |
004BD120 |. 8B40 30 MOV EAX,DWORD PTR DS:[EAX+30] ; |
004BD123 |. 50 PUSH EAX ; |hWnd
004BD124 |. E8 7FA2F4FF CALL <JMP.&user32.SetWindowLongA> ; \SetWindowLongA
004BD129 |. 6A 28 PUSH 28 ; /BufSize = 28 (40.)
004BD12B |. 8D45 C8 LEA EAX,DWORD PTR SS:[EBP-38] ; |
004BD12E |. 50 PUSH EAX ; |Buffer
004BD12F |. E8 AC99F4FF CALL <JMP.&kernel32.GetSystemDirectoryA> ; \GetSystemDirectoryA
004BD134 |. 8D55 C4 LEA EDX,DWORD PTR SS:[EBP-3C]
004BD137 |. 8D45 C8 LEA EAX,DWORD PTR SS:[EBP-38]
004BD13A |. E8 FDBFF4FF CALL a_.0040913C
004BD13F |. FF75 C4 PUSH DWORD PTR SS:[EBP-3C]
004BD142 |. 68 D0D44B00 PUSH a_.004BD4D0
004BD147 |. 68 DCD44B00 PUSH a_.004BD4DC ; ASCII "sys8.exe"
004BD14C |. B8 601D4C00 MOV EAX,a_.004C1D60
004BD151 |. BA 03000000 MOV EDX,3
004BD156 |. E8 6D76F4FF CALL a_.004047C8
004BD15B |. 8B0D 601D4C00 MOV ECX,DWORD PTR DS:[4C1D60]
004BD161 |. B2 01 MOV DL,1
004BD163 |. A1 68464600 MOV EAX,DWORD PTR DS:[464668]
004BD168 |. E8 AB75FAFF CALL a_.00464718
004BD16D |. A3 5C1D4C00 MOV DWORD PTR DS:[4C1D5C],EAX
004BD172 |. 68 AC260000 PUSH 26AC
004BD177 |. B9 F0D44B00 MOV ECX,a_.004BD4F0
004BD17C |. BA FCD44B00 MOV EDX,a_.004BD4FC ; ASCII "setting"
004BD181 |. A1 5C1D4C00 MOV EAX,DWORD PTR DS:[4C1D5C]
004BD186 |. 8B38 MOV EDI,DWORD PTR DS:[EAX]
004BD188 |. FF57 08 CALL DWORD PTR DS:[EDI+8]
004BD18B |. A3 C01D4C00 MOV DWORD PTR DS:[4C1DC0],EAX
004BD190 |. B8 0CD54B00 MOV EAX,a_.004BD50C ; ASCII "c:\a.bat"
004BD195 |. E8 D2BBF4FF CALL a_.00408D6C
004BD19A |. 84C0 TEST AL,AL
004BD19C 75 4F JNZ SHORT a_.004BD1ED
004BD19E |. 8B83 18030000 MOV EAX,DWORD PTR DS:[EBX+318]
004BD1A4 |. 8B80 20020000 MOV EAX,DWORD PTR DS:[EAX+220]
004BD1AA |. BA 0CD54B00 MOV EDX,a_.004BD50C ; ASCII "c:\a.bat"
004BD1AF |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
004BD1B1 |. FF51 74 CALL DWORD PTR DS:[ECX+74]
004BD1B4 |. B1 01 MOV CL,1
004BD1B6 |. BA 20D54B00 MOV EDX,a_.004BD520 ; ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
004BD1BB |. 8BC6 MOV EAX,ESI
004BD1BD |. E8 CE85FAFF CALL a_.00465790
004BD1C2 |. 8D55 BC LEA EDX,DWORD PTR SS:[EBP-44]
004BD1C5 |. A1 1CFF4B00 MOV EAX,DWORD PTR DS:[4BFF1C]
004BD1CA |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
004BD1CC |. E8 E364FAFF CALL a_.004636B4
004BD1D1 |. 8B45 BC MOV EAX,DWORD PTR SS:[EBP-44]
004BD1D4 |. 8D55 C0 LEA EDX,DWORD PTR SS:[EBP-40]
004BD1D7 |. E8 B8BCF4FF CALL a_.00408E94
004BD1DC |. 8B4D C0 MOV ECX,DWORD PTR SS:[EBP-40]
004BD1DF |. BA 58D54B00 MOV EDX,a_.004BD558 ; ASCII "friend"
004BD1E4 |. 8BC6 MOV EAX,ESI
004BD1E6 |. E8 3987FAFF CALL a_.00465924
004BD1EB |. EB 0B JMP SHORT a_.004BD1F8
004BD1ED |> A1 1CFF4B00 MOV EAX,DWORD PTR DS:[4BFF1C]
004BD1F2 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
004BD1F4 |. C640 5B 00 MOV BYTE PTR DS:[EAX+5B],0
004BD1F8 |> C705 681D4C00>MOV DWORD PTR DS:[4C1D68],58
004BD202 |. 8BC3 MOV EAX,EBX
004BD204 |. E8 97B9F8FF CALL a_.00448BA0
004BD209 |. A3 6C1D4C00 MOV DWORD PTR DS:[4C1D6C],EAX
004BD20E |. C705 701D4C00>MOV DWORD PTR DS:[4C1D70],1
004BD218 |. A1 1CFF4B00 MOV EAX,DWORD PTR DS:[4BFF1C]
004BD21D |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
004BD21F |. 8B80 98000000 MOV EAX,DWORD PTR DS:[EAX+98]
004BD225 |. E8 86B4F6FF CALL a_.004286B0
004BD22A |. A3 7C1D4C00 MOV DWORD PTR DS:[4C1D7C],EAX
004BD22F |. A1 1CFF4B00 MOV EAX,DWORD PTR DS:[4BFF1C]
004BD234 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
004BD236 |. 8B80 98000000 MOV EAX,DWORD PTR DS:[EAX+98]
004BD23C |. E8 6FB4F6FF CALL a_.004286B0
004BD241 |. A3 7C1D4C00 MOV DWORD PTR DS:[4C1D7C],EAX
004BD246 |. BE 60D54B00 MOV ESI,a_.004BD560
004BD24B |. BF 801D4C00 MOV EDI,a_.004C1D80
004BD250 |. B9 10000000 MOV ECX,10
004BD255 |. F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS>
004BD257 |. C705 781D4C00>MOV DWORD PTR DS:[4C1D78],401
004BD261 |. C705 741D4C00>MOV DWORD PTR DS:[4C1D74],7
004BD26B |. 68 681D4C00 PUSH a_.004C1D68
004BD270 |. 6A 00 PUSH 0
004BD272 |. E8 69A7F7FF CALL <JMP.&shell32.Shell_NotifyIcon>
004BD277 |. 68 A8D54B00 PUSH a_.004BD5A8 ; ASCII "000"
004BD27C |. 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004BD27F |. 50 PUSH EAX
004BD280 |. B9 B4D54B00 MOV ECX,a_.004BD5B4 ; ASCII "ma"
004BD285 |. BA FCD44B00 MOV EDX,a_.004BD4FC ; ASCII "setting"
004BD28A |. A1 5C1D4C00 MOV EAX,DWORD PTR DS:[4C1D5C]
004BD28F |. 8B30 MOV ESI,DWORD PTR DS:[EAX]
004BD291 |. FF16 CALL DWORD PTR DS:[ESI]
004BD293 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004BD296 |. E8 6D74F4FF CALL a_.00404708
004BD29B |. 83F8 08 CMP EAX,8
004BD29E |. 7E 53 JLE SHORT a_.004BD2F3
004BD2A0 |. 8D45 B8 LEA EAX,DWORD PTR SS:[EBP-48]
004BD2A3 |. 50 PUSH EAX
004BD2A4 |. B9 06000000 MOV ECX,6
004BD2A9 |. BA 01000000 MOV EDX,1
004BD2AE |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004BD2B1 |. E8 AA76F4FF CALL a_.00404960
004BD2B6 |. 8B55 B8 MOV EDX,DWORD PTR SS:[EBP-48]
004BD2B9 |. A1 74004C00 MOV EAX,DWORD PTR DS:[4C0074]
004BD2BE |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
004BD2C0 |. E8 E3F2FFFF CALL a_.004BC5A8
004BD2C5 |. 3C 01 CMP AL,1
004BD2C7 |. 75 2A JNZ SHORT a_.004BD2F3
004BD2C9 |. 8D45 B4 LEA EAX,DWORD PTR SS:[EBP-4C]
004BD2CC |. 50 PUSH EAX
004BD2CD |. B9 06000000 MOV ECX,6
004BD2D2 |. BA 01000000 MOV EDX,1
004BD2D7 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004BD2DA |. E8 8176F4FF CALL a_.00404960
004BD2DF |. 8B55 B4 MOV EDX,DWORD PTR SS:[EBP-4C]
004BD2E2 |. A1 74004C00 MOV EAX,DWORD PTR DS:[4C0074]
004BD2E7 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
004BD2E9 |. E8 BAF2FFFF CALL a_.004BC5A8
004BD2EE |. 34 01 XOR AL,1
004BD2F0 |. 8845 FB MOV BYTE PTR SS:[EBP-5],AL
004BD2F3 |> 807D FB 00 CMP BYTE PTR SS:[EBP-5],0
004BD2F7 |. 0F85 A7000000 JNZ a_.004BD3A4
004BD2FD |. 8D45 B0 LEA EAX,DWORD PTR SS:[EBP-50]
004BD300 |. 50 PUSH EAX
004BD301 |. B9 03000000 MOV ECX,3
004BD306 |. BA 07000000 MOV EDX,7
004BD30B |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4] ; 假码入EAX
004BD30E |. E8 4D76F4FF CALL a_.00404960
004BD313 |. 8B45 B0 MOV EAX,DWORD PTR SS:[EBP-50]
004BD316 |. E8 6DF9FFFF CALL a_.004BCC88
004BD31B 84C0 TEST AL,AL
004BD31D 0F84 81000000 JE a_.004BD3A4
004BD323 |. 33D2 XOR EDX,EDX
004BD325 |. 8B83 1C030000 MOV EAX,DWORD PTR DS:[EBX+31C]
004BD32B |. E8 406CF9FF CALL a_.00453F70
004BD330 |. 68 B8D54B00 PUSH a_.004BD5B8 ; /AtomName = "UserDefineHotKey"
004BD335 |. E8 DE97F4FF CALL <JMP.&kernel32.GlobalAddAtomA> ; \GlobalAddAtomA
004BD33A |. 0FB7C0 MOVZX EAX,AX
004BD33D |. 2D 00C00000 SUB EAX,0C000
004BD342 |. 8983 34030000 MOV DWORD PTR DS:[EBX+334],EAX
004BD348 |. 6A 7A PUSH 7A
004BD34A |. 6A 02 PUSH 2
004BD34C |. 8B83 34030000 MOV EAX,DWORD PTR DS:[EBX+334]
004BD352 |. 50 PUSH EAX
004BD353 |. 8BC3 MOV EAX,EBX
004BD355 |. E8 46B8F8FF CALL a_.00448BA0
004BD35A |. 50 PUSH EAX ; |hWnd
004BD35B |. E8 789FF4FF CALL <JMP.&user32.RegisterHotKey> ; \RegisterHotKey
004BD360 |. 68 CCD54B00 PUSH a_.004BD5CC ; /AtomName = "UsergfDefineHotKey"
004BD365 |. E8 AE97F4FF CALL <JMP.&kernel32.GlobalAddAtomA> ; \GlobalAddAtomA
004BD36A |. 0FB7C0 MOVZX EAX,AX
004BD36D |. 2D 00C00000 SUB EAX,0C000
004BD372 |. 8983 38030000 MOV DWORD PTR DS:[EBX+338],EAX
004BD378 |. 6A 7B PUSH 7B
004BD37A |. 6A 02 PUSH 2
004BD37C |. 8B83 38030000 MOV EAX,DWORD PTR DS:[EBX+338]
004BD382 |. 50 PUSH EAX
004BD383 |. 8BC3 MOV EAX,EBX
004BD385 |. E8 16B8F8FF CALL a_.00448BA0
004BD38A |. 50 PUSH EAX ; |hWnd
004BD38B |. E8 489FF4FF CALL <JMP.&user32.RegisterHotKey> ; \RegisterHotKey
004BD390 |. BA E8D54B00 MOV EDX,a_.004BD5E8
004BD395 |. A1 641D4C00 MOV EAX,DWORD PTR DS:[4C1D64]
004BD39A |. E8 8550F8FF CALL a_.00442424
004BD39F |. E9 F2000000 JMP a_.004BD496
004BD3A4 |> 68 AC260000 PUSH 26AC
004BD3A9 |. B9 F0D44B00 MOV ECX,a_.004BD4F0
004BD3AE |. BA FCD44B00 MOV EDX,a_.004BD4FC ; ASCII "setting"
004BD3B3 |. A1 5C1D4C00 MOV EAX,DWORD PTR DS:[4C1D5C]
004BD3B8 |. 8B30 MOV ESI,DWORD PTR DS:[EAX]
004BD3BA |. FF56 08 CALL DWORD PTR DS:[ESI+8]
004BD3BD |. 3D C0260000 CMP EAX,26C0
004BD3C2 |. 7C 43 JL SHORT a_.004BD407
004BD3C4 |. 33D2 XOR EDX,EDX
004BD3C6 |. 8B83 F0020000 MOV EAX,DWORD PTR DS:[EBX+2F0]
004BD3CC |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
004BD3CE |. FF51 64 CALL DWORD PTR DS:[ECX+64]
004BD3D1 |. 33D2 XOR EDX,EDX
004BD3D3 |. 8B83 F4020000 MOV EAX,DWORD PTR DS:[EBX+2F4]
004BD3D9 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
004BD3DB |. FF51 64 CALL DWORD PTR DS:[ECX+64]
004BD3DE |. 33D2 XOR EDX,EDX
004BD3E0 |. 8B83 04030000 MOV EAX,DWORD PTR DS:[EBX+304]
004BD3E6 |. E8 856BF9FF CALL a_.00453F70
004BD3EB |. 33D2 XOR EDX,EDX
004BD3ED |. 8B83 08030000 MOV EAX,DWORD PTR DS:[EBX+308]
004BD3F3 |. E8 786BF9FF CALL a_.00453F70
004BD3F8 |. B8 04D64B00 MOV EAX,a_.004BD604
004BD3FD |. E8 E6E1F7FF CALL a_.0043B5E8
004BD402 |. E9 8F000000 JMP a_.004BD496
004BD407 |> 68 B8D54B00 PUSH a_.004BD5B8 ; /AtomName = "UserDefineHotKey"
004BD40C |. E8 0797F4FF CALL <JMP.&kernel32.GlobalAddAtomA> ; \GlobalAddAtomA
004BD411 |. 0FB7C0 MOVZX EAX,AX
004BD414 |. 2D 00C00000 SUB EAX,0C000
004BD419 |. 8983 34030000 MOV DWORD PTR DS:[EBX+334],EAX
004BD41F |. 6A 7A PUSH 7A
004BD421 |. 6A 02 PUSH 2
004BD423 |. 8B83 34030000 MOV EAX,DWORD PTR DS:[EBX+334]
004BD429 |. 50 PUSH EAX
004BD42A |. 8BC3 MOV EAX,EBX
004BD42C |. E8 6FB7F8FF CALL a_.00448BA0
004BD431 |. 50 PUSH EAX ; |hWnd
004BD432 |. E8 A19EF4FF CALL <JMP.&user32.RegisterHotKey> ; \RegisterHotKey
004BD437 |. 68 CCD54B00 PUSH a_.004BD5CC ; /AtomName = "UsergfDefineHotKey"
004BD43C |. E8 D796F4FF CALL <JMP.&kernel32.GlobalAddAtomA> ; \GlobalAddAtomA
004BD441 |. 0FB7C0 MOVZX EAX,AX
004BD444 |. 2D 00C00000 SUB EAX,0C000
004BD449 |. 8983 38030000 MOV DWORD PTR DS:[EBX+338],EAX
004BD44F |. 6A 7B PUSH 7B
004BD451 |. 6A 02 PUSH 2
004BD453 |. 8B83 38030000 MOV EAX,DWORD PTR DS:[EBX+338]
004BD459 |. 50 PUSH EAX
004BD45A |. 8BC3 MOV EAX,EBX
004BD45C |. E8 3FB7F8FF CALL a_.00448BA0
004BD461 |. 50 PUSH EAX ; |hWnd
004BD462 |. E8 719EF4FF CALL <JMP.&user32.RegisterHotKey> ; \RegisterHotKey
004BD467 |. 68 AC260000 PUSH 26AC
004BD46C |. B9 F0D44B00 MOV ECX,a_.004BD4F0
004BD471 |. BA FCD44B00 MOV EDX,a_.004BD4FC ; ASCII "setting"
004BD476 |. A1 5C1D4C00 MOV EAX,DWORD PTR DS:[4C1D5C]
004BD47B |. 8B18 MOV EBX,DWORD PTR DS:[EAX]
004BD47D |. FF53 08 CALL DWORD PTR DS:[EBX+8]
004BD480 |. 40 INC EAX
004BD481 |. 50 PUSH EAX
004BD482 |. B9 F0D44B00 MOV ECX,a_.004BD4F0
004BD487 |. BA FCD44B00 MOV EDX,a_.004BD4FC ; ASCII "setting"
004BD48C |. A1 5C1D4C00 MOV EAX,DWORD PTR DS:[4C1D5C]
004BD491 |. 8B18 MOV EBX,DWORD PTR DS:[EAX]
004BD493 |. FF53 0C CALL DWORD PTR DS:[EBX+C]
004BD496 |> 33C0 XOR EAX,EAX
004BD498 |. 5A POP EDX
004BD499 |. 59 POP ECX
004BD49A |. 59 POP ECX
004BD49B |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
004BD49E |. 68 C0D44B00 PUSH a_.004BD4C0
004BD4A3 |> 8D45 B0 LEA EAX,DWORD PTR SS:[EBP-50]
004BD4A6 |. BA 06000000 MOV EDX,6
004BD4AB |. E8 C46FF4FF CALL a_.00404474
004BD4B0 |. 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004BD4B3 |. E8 986FF4FF CALL a_.00404450
004BD4B8 \. C3 RETN
检查文件在windows/system32下面的sys8.exe,实际为txt文件,启动D=后面的数字为使用记录,开始值为9920也就是16进制的,然后记数。
|