下载地址:
http://www.lbxin.com/n/crackme.rar
请教,,!!!花了一个下午.研究这个..还是没有结果!!!
我怎么找不到关键跳,很可能在下面..
0040D390 /$ 55 push ebp
0040D391 |. 8BEC mov ebp,esp
0040D393 |. 81EC 200400>sub esp,420
0040D399 |. 8B45 08 mov eax,dword ptr ss:[ebp+8]
0040D39C |. 3B05 DC6B42>cmp eax,dword ptr ds:[426BDC]
0040D3A2 |. 73 1F jnb short crackme1.0040D3C3
0040D3A4 |. 8B4D 08 mov ecx,dword ptr ss:[ebp+8]
0040D3A7 |. C1F9 05 sar ecx,5
0040D3AA |. 8B55 08 mov edx,dword ptr ss:[ebp+8]
0040D3AD |. 83E2 1F and edx,1F
0040D3B0 |. 8B048D A06A>mov eax,dword ptr ds:[ecx*4+426AA0]
0040D3B7 |. 0FBE4CD0 04 movsx ecx,byte ptr ds:[eax+edx*8+4]
0040D3BC |. 83E1 01 and ecx,1
0040D3BF |. 85C9 test ecx,ecx
0040D3C1 |. 75 1C jnz short crackme1.0040D3DF
0040D3C3 |> C705 E06542>mov dword ptr ds:[4265E0],9
0040D3CD |. C705 E46542>mov dword ptr ds:[4265E4],0
0040D3D7 |. 83C8 FF or eax,FFFFFFFF
0040D3DA |. E9 4F020000 jmp crackme1.0040D62E
0040D3DF |> C745 F0 000>mov dword ptr ss:[ebp-10],0
0040D3E6 |. 8B55 F0 mov edx,dword ptr ss:[ebp-10]
0040D3E9 |. 8995 E0FBFF>mov dword ptr ss:[ebp-420],edx
0040D3EF |. 837D 10 00 cmp dword ptr ss:[ebp+10],0
0040D3F3 |. 75 07 jnz short crackme1.0040D3FC
0040D3F5 |. 33C0 xor eax,eax
0040D3F7 |. E9 32020000 jmp crackme1.0040D62E
0040D3FC |> 8B45 08 mov eax,dword ptr ss:[ebp+8]
0040D3FF |. C1F8 05 sar eax,5
0040D402 |. 8B4D 08 mov ecx,dword ptr ss:[ebp+8]
0040D405 |. 83E1 1F and ecx,1F
0040D408 |. 8B1485 A06A>mov edx,dword ptr ds:[eax*4+426AA0]
0040D40F |. 0FBE44CA 04 movsx eax,byte ptr ds:[edx+ecx*8+4]
0040D414 |. 83E0 20 and eax,20
0040D417 |. 85C0 test eax,eax
0040D419 74 10 je short crackme1.0040D42B
0040D41B |. 6A 02 push 2 ; /Arg3 = 00000002
0040D41D |. 6A 00 push 0 ; |Arg2 = 00000000
0040D41F |. 8B4D 08 mov ecx,dword ptr ss:[ebp+8] ; |
0040D422 |. 51 push ecx ; |Arg1
0040D423 |. E8 18020000 call crackme1.0040D640 ; \crackme1.0040D640
0040D428 |. 83C4 0C add esp,0C
0040D42B |> 8B55 08 mov edx,dword ptr ss:[ebp+8]
0040D42E |. C1FA 05 sar edx,5
0040D431 |. 8B45 08 mov eax,dword ptr ss:[ebp+8]
0040D434 |. 83E0 1F and eax,1F
0040D437 |. 8B0C95 A06A>mov ecx,dword ptr ds:[edx*4+426AA0]
0040D43E |. 0FBE54C1 04 movsx edx,byte ptr ds:[ecx+eax*8+4]
0040D443 |. 81E2 800000>and edx,80
0040D449 |. 85D2 test edx,edx
0040D44B |. 0F84 080100>je crackme1.0040D559
0040D451 |. 8B45 0C mov eax,dword ptr ss:[ebp+C]
0040D454 |. 8945 FC mov dword ptr ss:[ebp-4],eax
0040D457 |. C745 F4 000>mov dword ptr ss:[ebp-C],0
0040D45E |> 8B4D FC /mov ecx,dword ptr ss:[ebp-4]
0040D461 |. 2B4D 0C |sub ecx,dword ptr ss:[ebp+C]
0040D464 |. 3B4D 10 |cmp ecx,dword ptr ss:[ebp+10]
0040D467 |. 0F83 EA0000>|jnb crackme1.0040D557
0040D46D |. 8D95 ECFBFF>|lea edx,dword ptr ss:[ebp-414]
0040D473 |. 8955 F8 |mov dword ptr ss:[ebp-8],edx
0040D476 |> 8B45 F8 |/mov eax,dword ptr ss:[ebp-8]
0040D479 |. 8D8D ECFBFF>||lea ecx,dword ptr ss:[ebp-414]
0040D47F |. 2BC1 ||sub eax,ecx
0040D481 |. 3D 00040000 ||cmp eax,400
0040D486 |. 7D 5F ||jge short crackme1.0040D4E7
0040D488 |. 8B55 FC ||mov edx,dword ptr ss:[ebp-4]
0040D48B |. 2B55 0C ||sub edx,dword ptr ss:[ebp+C]
0040D48E |. 3B55 10 ||cmp edx,dword ptr ss:[ebp+10]
0040D491 |. 73 54 ||jnb short crackme1.0040D4E7
0040D493 |. 8B45 FC ||mov eax,dword ptr ss:[ebp-4]
0040D496 |. 8A08 ||mov cl,byte ptr ds:[eax]
0040D498 |. 888D E4FBFF>||mov byte ptr ss:[ebp-41C],cl
0040D49E |. 8B55 FC ||mov edx,dword ptr ss:[ebp-4]
0040D4A1 |. 83C2 01 ||add edx,1
0040D4A4 |. 8955 FC ||mov dword ptr ss:[ebp-4],edx
0040D4A7 |. 0FBE85 E4FB>||movsx eax,byte ptr ss:[ebp-41C]
0040D4AE |. 83F8 0A ||cmp eax,0A
0040D4B1 |. 75 1E ||jnz short crackme1.0040D4D1
0040D4B3 |. 8B8D E0FBFF>||mov ecx,dword ptr ss:[ebp-420]
0040D4B9 |. 83C1 01 ||add ecx,1
0040D4BC |. 898D E0FBFF>||mov dword ptr ss:[ebp-420],ecx
0040D4C2 |. 8B55 F8 ||mov edx,dword ptr ss:[ebp-8]
0040D4C5 |. C602 0D ||mov byte ptr ds:[edx],0D
0040D4C8 |. 8B45 F8 ||mov eax,dword ptr ss:[ebp-8]
0040D4CB |. 83C0 01 ||add eax,1
0040D4CE |. 8945 F8 ||mov dword ptr ss:[ebp-8],eax
0040D4D1 |> 8B4D F8 ||mov ecx,dword ptr ss:[ebp-8]
0040D4D4 |. 8A95 E4FBFF>||mov dl,byte ptr ss:[ebp-41C]
0040D4DA |. 8811 ||mov byte ptr ds:[ecx],dl
0040D4DC |. 8B45 F8 ||mov eax,dword ptr ss:[ebp-8]
0040D4DF |. 83C0 01 ||add eax,1
0040D4E2 |. 8945 F8 ||mov dword ptr ss:[ebp-8],eax
0040D4E5 |.^ EB 8F |\jmp short crackme1.0040D476
0040D4E7 |> 6A 00 |push 0 ; /pOverlapped = NULL
0040D4E9 |. 8D8D E8FBFF>|lea ecx,dword ptr ss:[ebp-418] ; |
0040D4EF |. 51 |push ecx ; |pBytesWritten
0040D4F0 |. 8B55 F8 |mov edx,dword ptr ss:[ebp-8] ; |
0040D4F3 |. 8D85 ECFBFF>|lea eax,dword ptr ss:[ebp-414] ; |
0040D4F9 |. 2BD0 |sub edx,eax ; |
0040D4FB |. 52 |push edx ; |nBytesToWrite
0040D4FC |. 8D8D ECFBFF>|lea ecx,dword ptr ss:[ebp-414] ; |
0040D502 |. 51 |push ecx ; |Buffer
0040D503 |. 8B55 08 |mov edx,dword ptr ss:[ebp+8] ; |
0040D506 |. C1FA 05 |sar edx,5 ; |
0040D509 |. 8B45 08 |mov eax,dword ptr ss:[ebp+8] ; |
0040D50C |. 83E0 1F |and eax,1F ; |
0040D50F |. 8B0C95 A06A>|mov ecx,dword ptr ds:[edx*4+426AA0] ; |
0040D516 |. 8B14C1 |mov edx,dword ptr ds:[ecx+eax*8] ; |
0040D519 |. 52 |push edx ; |hFile
0040D51A |. FF15 5C8242>|call dword ptr ds:[<&KERNEL32.WriteFile>] ; \WriteFile
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)