能力值:
( LV2,RANK:10 )
|
-
-
2 楼
新做了一个,快来下载!
http://pickup.mofile.com/0640610208535806
请坛主帮转一下。。。
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
下载不了....
|
能力值:
( LV2,RANK:10 )
|
-
-
4 楼
最初由 AV仔 发布 下载不了....
现在能用了吗?
|
能力值:
( LV9,RANK:1140 )
|
-
-
5 楼
运行不了!
Microsoft Visual C# / Basic .NET
|
能力值:
( LV2,RANK:10 )
|
-
-
6 楼
遗憾啊,老兄的第一个就...
|
能力值:
( LV8,RANK:130 )
|
-
-
7 楼
最初由 雪域神狐 发布 新做了一个,快来下载! http://pickup.mofile.com/0640610208535806 请坛主帮转一下。。。
我帮你传一下。vb,不会玩
|
能力值:
( LV2,RANK:10 )
|
-
-
8 楼
vb的东西不懂,功力不够,只能爆破,OD栽入,下断bp rtcmsgbox,
00402450 . FFD3 CALL EBX ; <&MSVBVM60.__vbaFreeVarList>
00402452 . 83C4 30 ADD ESP,30
00402455 . B9 04000280 MOV ECX,80020004
0040245A . B8 0A000000 MOV EAX,0A
0040245F . 66:3BF7 CMP SI,DI
00402462 . 894D A4 MOV DWORD PTR SS:[EBP-5C],ECX
00402465 . 8945 9C MOV DWORD PTR SS:[EBP-64],EAX
00402468 . 894D B4 MOV DWORD PTR SS:[EBP-4C],ECX
0040246B . 8945 AC MOV DWORD PTR SS:[EBP-54],EAX
0040246E . 894D C4 MOV DWORD PTR SS:[EBP-3C],ECX
00402471 . 8945 BC MOV DWORD PTR SS:[EBP-44],EAX
00402474 74 4C JE SHORT CrackMe(.004024C2 这里判断,是否正确注册码,改为NOP即可爆破
00402476 . 8D95 1CFFFFFF LEA EDX,DWORD PTR SS:[EBP-E4]
0040247C . 8D4D CC LEA ECX,DWORD PTR SS:[EBP-34]
0040247F . C785 24FFFFFF>MOV DWORD PTR SS:[EBP-DC],CrackMe(.00401998
00402489 . C785 1CFFFFFF>MOV DWORD PTR SS:[EBP-E4],8
00402493 . FF15 B0104000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaVarDup>] ; MSVBVM60.__vbaVarDup
00402499 . 8D4D 9C LEA ECX,DWORD PTR SS:[EBP-64]
0040249C . 8D55 AC LEA EDX,DWORD PTR SS:[EBP-54]
0040249F . 51 PUSH ECX
004024A0 . 8D45 BC LEA EAX,DWORD PTR SS:[EBP-44]
004024A3 . 52 PUSH EDX
004024A4 . 50 PUSH EAX
004024A5 . 8D4D CC LEA ECX,DWORD PTR SS:[EBP-34]
004024A8 . 57 PUSH EDI
004024A9 . 51 PUSH ECX
004024AA . FF15 34104000 CALL DWORD PTR DS:[<&MSVBVM60.#595>] ; MSVBVM60.rtcMsgBox
004024B0 . 8D55 9C LEA EDX,DWORD PTR SS:[EBP-64]
004024B3 . 8D45 AC LEA EAX,DWORD PTR SS:[EBP-54]
004024B6 . 52 PUSH EDX
004024B7 . 8D4D BC LEA ECX,DWORD PTR SS:[EBP-44]
004024BA . 50 PUSH EAX
004024BB . 8D55 CC LEA EDX,DWORD PTR SS:[EBP-34]
004024BE . 51 PUSH ECX
004024BF . 52 PUSH EDX
004024C0 . EB 4A JMP SHORT CrackMe(.0040250C
004024C2 > 8D95 1CFFFFFF LEA EDX,DWORD PTR SS:[EBP-E4]
004024C8 . 8D4D CC LEA ECX,DWORD PTR SS:[EBP-34]
004024CB . C785 24FFFFFF>MOV DWORD PTR SS:[EBP-DC],CrackMe(.004019E0
004024D5 . C785 1CFFFFFF>MOV DWORD PTR SS:[EBP-E4],8
004024DF . FF15 B0104000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaVarDup>] ; MSVBVM60.__vbaVarDup
004024E5 . 8D45 9C LEA EAX,DWORD PTR SS:[EBP-64]
004024E8 . 8D4D AC LEA ECX,DWORD PTR SS:[EBP-54]
004024EB . 50 PUSH EAX
004024EC . 8D55 BC LEA EDX,DWORD PTR SS:[EBP-44]
004024EF . 51 PUSH ECX
004024F0 . 52 PUSH EDX
004024F1 . 8D45 CC LEA EAX,DWORD PTR SS:[EBP-34]
004024F4 . 57 PUSH EDI
004024F5 . 50 PUSH EAX
004024F6 . FF15 34104000 CALL DWORD PTR DS:[<&MSVBVM60.#595>] ; MSVBVM60.rtcMsgBox 断在这,向上找判断语句,来到00402474
004024FC . 8D4D 9C LEA ECX,DWORD PTR SS:[EBP-64]
|