00401284 . 43 inc ebx
00401285 . 48 dec eax
00401286 .^ 75 F0 jnz short 00401278
00401288 . 68 49674000 push 00406749 ; /String2 = ""
0040128D . 68 49654000 push 00406549 ; |String1 = crackme.00406549
00401292 . E8 5F010000 call <jmp.&kernel32.lstrcpyA> ; \lstrcpyA
00401297 . 68 00020000 push 200 ; /Count = 200 (512.)
0040129C . 68 49694000 push 00406949 ; |Buffer = crackme.00406949
004012A1 . 6A 64 push 64 ; |ControlID = 64 (100.)
004012A3 . FF75 08 push dword ptr [ebp+8] ; |hWnd
004012A6 . E8 E5000000 call <jmp.&user32.GetDlgItemTextA> ; \GetDlgItemTextA
004012AB . 68 49654000 push 00406549 ; /String2 = ""
004012B0 . 68 49694000 push 00406949 ; |String1 = ""
004012B5 . E8 36010000 call <jmp.&kernel32.lstrcmpA> ; \lstrcmpA
004012BA . 0BC0 or eax, eax
004012BC 90 nop ; 关键
004012BD 90 nop
004012BE . 6A 40 push 40 ; /Style = MB_OK|MB_ICONASTERISK|MB_APPLMODAL
004012C0 . 68 DB624000 push 004062DB ; |Title = "Good boy..."
004012C5 . 68 AC624000 push 004062AC ; |Text = "Yep, thats the right code!",LF,CR,"Go write a keygen!"
004012CA . FF75 08 push dword ptr [ebp+8] ; |hOwner
004012CD . E8 CA000000 call <jmp.&user32.MessageBoxA> ; \MessageBoxA
004012D2 . EB 14 jmp short 004012E8
004012D4 > 6A 10 push 10 ; /Style = MB_OK|MB_ICONHAND|MB_APPLMODAL
004012D6 . 68 06634000 push 00406306 ; |Title = "Bad boy..."
004012DB . 68 E7624000 push 004062E7 ; |Text = "Nope, thats not it!",LF,CR,"Try again"
004012E0 . FF75 08 push dword ptr [ebp+8] ; |hOwner
004012E3 . E8 B4000000 call <jmp.&user32.MessageBoxA> ; \MessageBoxA
004012E8 > 68 00020000 push 200 ; /Length = 200 (512.)
004012ED . 68 49654000 push 00406549 ; |Destination = crackme.00406549
004012F2 . E8 ED000000 call <jmp.&kernel32.RtlZeroMemory> ; \RtlZeroMemory
004012F7 . 68 00020000 push 200 ; /Length = 200 (512.)
004012FC . 68 49634000 push 00406349 ; |Destination = crackme.00406349
00401301 . E8 DE000000 call <jmp.&kernel32.RtlZeroMemory> ; \RtlZeroMemory
00401306 . 68 00020000 push 200 ; /Length = 200 (512.)
0040130B . 68 49674000 push 00406749 ; |Destination = crackme.00406749
00401310 . E8 CF000000 call <jmp.&kernel32.RtlZeroMemory> ; \RtlZeroMemory
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课