-
-
[旧帖] [求助]遇到新问题........... 0.00雪花
-
2007-12-9 18:24 2471
-
004F0DD4 /$ 55 PUSH EBP
004F0DD5 |. 8BEC MOV EBP,ESP
004F0DD7 |. 83C4 C0 ADD ESP,-40
004F0DDA |. 53 PUSH EBX
004F0DDB |. 56 PUSH ESI
004F0DDC |. 8BD9 MOV EBX,ECX
004F0DDE |. 85DB TEST EBX,EBX
004F0DE0 |. 78 0A JS SHORT de_Camer.004F0DEC
004F0DE2 |. C1EB 02 SHR EBX,2
004F0DE5 |> 8B349A /MOV ESI,DWORD PTR DS:[EDX+EBX*4]
004F0DE8 |. 4B |DEC EBX
004F0DE9 |. 56 |PUSH ESI
004F0DEA |.^ 79 F9 \JNS SHORT de_Camer.004F0DE5
004F0DEC |> 8BD4 MOV EDX,ESP
004F0DEE |. 8955 F8 MOV DWORD PTR SS:[EBP-8],EDX
004F0DF1 |. 8945 FC MOV DWORD PTR SS:[EBP-4],EAX
004F0DF4 |. C645 F6 20 MOV BYTE PTR SS:[EBP-A],20
004F0DF8 |. B3 03 MOV BL,3
004F0DFA |. B8 20000000 MOV EAX,20
004F0DFF |. 8B55 F8 MOV EDX,DWORD PTR SS:[EBP-8]
004F0E02 |. 8D75 D5 LEA ESI,DWORD PTR SS:[EBP-2B]
004F0E05 |> 8A0A /MOV CL,BYTE PTR DS:[EDX]
004F0E07 |. 880E |MOV BYTE PTR DS:[ESI],CL
004F0E09 |. 46 |INC ESI
004F0E0A |. 42 |INC EDX
004F0E0B |. 48 |DEC EAX
004F0E0C |.^ 75 F7 \JNZ SHORT de_Camer.004F0E05
004F0E0E |. 8D45 F5 LEA EAX,DWORD PTR SS:[EBP-B]
004F0E11 |. 50 PUSH EAX ; /Arg1
004F0E12 |. 8D4D C1 LEA ECX,DWORD PTR SS:[EBP-3F] ; |
004F0E15 |. 8D45 D5 LEA EAX,DWORD PTR SS:[EBP-2B] ; |
004F0E18 |. 8A55 F6 MOV DL,BYTE PTR SS:[EBP-A] ; |
004F0E1B |. E8 EC17FEFF CALL de_Camer.004D260C ; \de_Camer.004D260C
004F0E20 |. 84C0 TEST AL,AL
004F0E22 |. 74 6D JE SHORT de_Camer.004F0E91
004F0E24 |. 33D2 XOR EDX,EDX
004F0E26 |. B8 09000000 MOV EAX,9
004F0E2B |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E2E |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E30 |. 46 |INC ESI
004F0E31 |. 48 |DEC EAX
004F0E32 |.^ 75 FA \JNZ SHORT de_Camer.004F0E2E
004F0E34 |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E37 |. 8845 D1 MOV BYTE PTR SS:[EBP-2F],AL
004F0E3A |. 33D2 XOR EDX,EDX
004F0E3C |. B8 07000000 MOV EAX,7
004F0E41 |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E44 |. 83C6 09 ADD ESI,9
004F0E47 |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E49 |. 46 |INC ESI
004F0E4A |. 48 |DEC EAX
004F0E4B |.^ 75 FA \JNZ SHORT de_Camer.004F0E47
004F0E4D |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E50 |. 8845 D2 MOV BYTE PTR SS:[EBP-2E],AL
004F0E53 |. 33D2 XOR EDX,EDX
004F0E55 |. B8 08000000 MOV EAX,8
004F0E5A |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E5D |. 83C6 10 ADD ESI,10
004F0E60 |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E62 |. 46 |INC ESI
004F0E63 |. 48 |DEC EAX
004F0E64 |.^ 75 FA \JNZ SHORT de_Camer.004F0E60
004F0E66 |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E69 |. 8845 D3 MOV BYTE PTR SS:[EBP-2D],AL
004F0E6C |. B8 08000000 MOV EAX,8
004F0E71 |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E74 |. 83C6 18 ADD ESI,18
004F0E77 |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E79 |. 46 |INC ESI
004F0E7A |. 48 |DEC EAX
004F0E7B |.^ 75 FA \JNZ SHORT de_Camer.004F0E77
004F0E7D |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E80 |. 8845 D4 MOV BYTE PTR SS:[EBP-2C],AL
004F0E83 |. B8 10000000 MOV EAX,10
004F0E88 |. 8D55 C1 LEA EDX,DWORD PTR SS:[EBP-3F]
004F0E8B |> 001A /ADD BYTE PTR DS:[EDX],BL
004F0E8D |. 42 |INC EDX
004F0E8E |. 48 |DEC EAX
004F0E8F |.^ 75 FA \JNZ SHORT de_Camer.004F0E8B
004F0E91 |> 33DB XOR EBX,EBX
004F0E93 |. 8A45 D1 MOV AL,BYTE PTR SS:[EBP-2F]
004F0E96 |. 3245 D2 XOR AL,BYTE PTR SS:[EBP-2E]
004F0E99 |. 0245 D3 ADD AL,BYTE PTR SS:[EBP-2D]
004F0E9C |. 3245 D4 XOR AL,BYTE PTR SS:[EBP-2C]
004F0E9F |. 8845 F7 MOV BYTE PTR SS:[EBP-9],AL
004F0EA2 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F0EA5 |. 8B70 04 MOV ESI,DWORD PTR DS:[EAX+4]
004F0EA8 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F0EAB |. E8 FC04F3FF CALL de_Camer.004213AC
004F0EB0 |. 85C0 TEST EAX,EAX
004F0EB2 |. 7E 1D JLE SHORT de_Camer.004F0ED1
004F0EB4 |> 80FB 13 /CMP BL,13
004F0EB7 |. 73 03 |JNB SHORT de_Camer.004F0EBC
004F0EB9 |. 43 |INC EBX
004F0EBA |. EB 02 |JMP SHORT de_Camer.004F0EBE
004F0EBC |> 33DB |XOR EBX,EBX
004F0EBE |> 8A16 |MOV DL,BYTE PTR DS:[ESI]
004F0EC0 |. 33C9 |XOR ECX,ECX
004F0EC2 |. 8ACB |MOV CL,BL
004F0EC4 |. 32540D C1 |XOR DL,BYTE PTR SS:[EBP+ECX-3F]
004F0EC8 |. 2A55 F7 |SUB DL,BYTE PTR SS:[EBP-9]
004F0ECB |. 8816 |MOV BYTE PTR DS:[ESI],DL
004F0ECD |. 46 |INC ESI
004F0ECE |. 48 |DEC EAX
004F0ECF |.^ 75 E3 \JNZ SHORT de_Camer.004F0EB4
004F0ED1 |> 8B75 B8 MOV ESI,DWORD PTR SS:[EBP-48]
004F0ED4 |. 8B5D BC MOV EBX,DWORD PTR SS:[EBP-44]
004F0ED7 |. 8BE5 MOV ESP,EBP
004F0ED9 |. 5D POP EBP
004F0EDA \. C3 RETN
004F0EDB 90 NOP
004F0EDC $ 55 PUSH EBP
004F0EDD . 8BEC MOV EBP,ESP
004F0EDF . 81C4 74F8FFFF ADD ESP,-78C
004F0EE5 . 53 PUSH EBX
004F0EE6 . 56 PUSH ESI
004F0EE7 . 57 PUSH EDI
004F0EE8 . 33C0 XOR EAX,EAX
004F0EEA . 8985 74F8FFFF MOV DWORD PTR SS:[EBP-78C],EAX
004F0EF0 . 8985 78F8FFFF MOV DWORD PTR SS:[EBP-788],EAX
004F0EF6 . 8985 7CF8FFFF MOV DWORD PTR SS:[EBP-784],EAX
004F0EFC . 8985 80F8FFFF MOV DWORD PTR SS:[EBP-780],EAX
004F0F02 . 8985 84F8FFFF MOV DWORD PTR SS:[EBP-77C],EAX
004F0F08 . 8985 88F8FFFF MOV DWORD PTR SS:[EBP-778],EAX
004F0F0E . 8945 FC MOV DWORD PTR SS:[EBP-4],EAX
004F0F11 . 8945 F0 MOV DWORD PTR SS:[EBP-10],EAX
004F0F14 . 8945 EC MOV DWORD PTR SS:[EBP-14],EAX
004F0F17 . 33C0 XOR EAX,EAX
004F0F19 55 PUSH EBP
004F0F1A 68 93184F00 PUSH de_Camer.004F1893
004F0F1F 64:FF30 PUSH DWORD PTR FS:[EAX]
004F0F22 64:8920 MOV DWORD PTR FS:[EAX],ESP
004F0F25 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004F0F28 B9 AC184F00 MOV ECX,de_Camer.004F18AC ; ASCII "Title.dat"
004F0F2D 8B15 08365C00 MOV EDX,DWORD PTR DS:[5C3608]
004F0F33 E8 003CF1FF CALL de_Camer.00404B38
004F0F38 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F0F3B E8 C889F1FF CALL de_Camer.00409908
004F0F40 84C0 TEST AL,AL
004F0F42 0F84 18090000 JE de_Camer.004F1860
004F0F48 68 B8184F00 PUSH de_Camer.004F18B8 ; /ResourceType = "dogfile"
004F0F4D 68 C0184F00 PUSH de_Camer.004F18C0 ; |ResourceName = "rsakey"
004F0F52 A1 18675B00 MOV EAX,DWORD PTR DS:[5B6718] ; |
004F0F57 50 PUSH EAX ; |hModule => NULL
004F0F58 E8 0363F1FF CALL <JMP.&kernel32.FindResourceA> ; \FindResourceA
004F0F5D 8BD8 MOV EBX,EAX
004F0F5F 53 PUSH EBX ; /hResource
004F0F60 A1 18675B00 MOV EAX,DWORD PTR DS:[5B6718] ; |
004F0F65 50 PUSH EAX ; |hModule => NULL
004F0F66 E8 4D65F1FF CALL <JMP.&kernel32.SizeofResource> ; \SizeofResource
004F0F6B 8BF0 MOV ESI,EAX
004F0F6D 53 PUSH EBX ; /hResource
004F0F6E A1 18675B00 MOV EAX,DWORD PTR DS:[5B6718] ; |
004F0F73 50 PUSH EAX ; |hModule => NULL
004F0F74 E8 8F64F1FF CALL <JMP.&kernel32.LoadResource> ; \LoadResource
004F0F79 8BD8 MOV EBX,EAX
004F0F7B 53 PUSH EBX ; /hResource
004F0F7C E8 A764F1FF CALL <JMP.&kernel32.LockResource> ; \LockResource
004F0F81 8D95 B0FCFFFF LEA EDX,DWORD PTR SS:[EBP-350]
004F0F87 8BCE MOV ECX,ESI
004F0F89 92 XCHG EAX,EDX
004F0F8A E8 416EF1FF CALL de_Camer.00407DD0
004F0F8F 53 PUSH EBX ; /hResource
004F0F90 E8 E362F1FF CALL <JMP.&kernel32.FreeResource> ; \FreeResource
004F0F95 C785 ACFCFFFF>MOV DWORD PTR SS:[EBP-354],400
004F0F9F E8 BC63F1FF CALL <JMP.&kernel32.GetTickCount> ; [GetTickCount
004F0FA4 8B15 68585B00 MOV EDX,DWORD PTR DS:[5B5868] ; de_Camer.005AD008
004F0FAA 8902 MOV DWORD PTR DS:[EDX],EAX
004F0FAC 33DB XOR EBX,EBX
004F0FAE 8DB5 8CFCFFFF LEA ESI,DWORD PTR SS:[EBP-374]
004F0FB4 B8 FF000000 MOV EAX,0FF
004F0FB9 E8 A221F1FF CALL de_Camer.00403160
004F0FBE 8806 MOV BYTE PTR DS:[ESI],AL
004F0FC0 43 INC EBX
004F0FC1 46 INC ESI
004F0FC2 80FB 20 CMP BL,20
004F0FC5 ^ 75 ED JNZ SHORT de_Camer.004F0FB4
004F0FC7 8D85 ACFCFFFF LEA EAX,DWORD PTR SS:[EBP-354]
004F0FCD 50 PUSH EAX
004F0FCE 6A 20 PUSH 20
004F0FD0 8D85 8CFCFFFF LEA EAX,DWORD PTR SS:[EBP-374]
004F0FD6 50 PUSH EAX
004F0FD7 8D45 E0 LEA EAX,DWORD PTR SS:[EBP-20]
004F0FDA 50 PUSH EAX
004F0FDB 8D85 8CF8FFFF LEA EAX,DWORD PTR SS:[EBP-774]
004F0FE1 50 PUSH EAX
004F0FE2 E8 710CFEFF CALL <JMP.&crypt.RSAPublicEncrypt>
004F0FE7 85C0 TEST EAX,EAX
004F0FE9 74 3C JE SHORT de_Camer.004F1027
004F0FEB 6A 10 PUSH 10
004F0FED 8D95 88F8FFFF LEA EDX,DWORD PTR SS:[EBP-778]
004F0FF3 A1 0C545B00 MOV EAX,DWORD PTR DS:[5B540C]
004F0FF8 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F0FFA E8 65F3F7FF CALL de_Camer.00470364
004F0FFF 8B85 88F8FFFF MOV EAX,DWORD PTR SS:[EBP-778]
004F1005 E8 DA3CF1FF CALL de_Camer.00404CE4
004F100A 8BC8 MOV ECX,EAX
004F100C BA C8184F00 MOV EDX,de_Camer.004F18C8 请插入加密狗
004F1011 A1 0C545B00 MOV EAX,DWORD PTR DS:[5B540C]
004F1016 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F1018 E8 1FF9F7FF CALL de_Camer.0047093C
004F101D E8 7E36F1FF CALL de_Camer.004046A0
004F1022 E9 39080000 JMP de_Camer.004F1860
004F1027 B2 01 MOV DL,1
004F1029 A1 D4C14100 MOV EAX,DWORD PTR DS:[41C1D4]
004F102E E8 E128F1FF CALL de_Camer.00403914
004F1033 8945 F8 MOV DWORD PTR SS:[EBP-8],EAX
004F1036 33C9 XOR ECX,ECX
004F1038 . 55 PUSH EBP
004F1039 . 68 59184F00 PUSH de_Camer.004F1859
004F103E . 64:FF31 PUSH DWORD PTR FS:[ECX]
004F1041 . 64:8921 MOV DWORD PTR FS:[ECX],ESP
004F1044 . 8B55 FC MOV EDX,DWORD PTR SS:[EBP-4]
004F1047 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F104A . E8 D50AF3FF CALL de_Camer.00421B24
004F104F . 33C9 XOR ECX,ECX
004F1051 . 33D2 XOR EDX,EDX
004F1053 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F1056 . 8B18 MOV EBX,DWORD PTR DS:[EAX]
004F1058 . FF53 10 CALL DWORD PTR DS:[EBX+10]
004F105B . 8D4D F0 LEA ECX,DWORD PTR SS:[EBP-10]
004F105E . BA 05000000 MOV EDX,5
004F1063 . B0 20 MOV AL,20
004F1065 . E8 6A3EF1FF CALL de_Camer.00404ED4
004F106A . 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
004F106D . E8 CA3CF1FF CALL de_Camer.00404D3C
004F1072 . 8BD0 MOV EDX,EAX
004F1074 . B9 05000000 MOV ECX,5
004F1079 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F107C . 8B18 MOV EBX,DWORD PTR DS:[EAX]
004F107E . FF53 08 CALL DWORD PTR DS:[EBX+8]
004F1081 . 8B45 F0 MOV EAX,DWORD PTR SS:[EBP-10]
004F1084 . BA E0184F00 MOV EDX,de_Camer.004F18E0 ; ASCII "Title"
004F1089 . E8 A23BF1FF CALL de_Camer.00404C30
004F108E . 74 0A JE SHORT de_Camer.004F109A
004F1090 . E8 EB31F1FF CALL de_Camer.00404280
004F1095 . E9 C6070000 JMP de_Camer.004F1860
004F109A > 8D55 BC LEA EDX,DWORD PTR SS:[EBP-44]
004F109D . B9 20000000 MOV ECX,20
004F10A2 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F10A5 . E8 FA04F3FF CALL de_Camer.004215A4
004F10AA . C705 64765C00>MOV DWORD PTR DS:[5C7664],1
004F10B4 . C645 E5 14 MOV BYTE PTR SS:[EBP-1B],14
004F10B8 . E8 A362F1FF CALL <JMP.&kernel32.GetTickCount> ; [GetTickCount
004F10BD . 8B15 68585B00 MOV EDX,DWORD PTR DS:[5B5868] ; de_Camer.005AD008
004F10C3 . 8902 MOV DWORD PTR DS:[EDX],EAX
004F10C5 . B8 FF000000 MOV EAX,0FF
004F10CA . E8 9120F1FF CALL de_Camer.00403160
004F10CF . 8845 E4 MOV BYTE PTR SS:[EBP-1C],AL
004F10D2 . 8A45 E4 MOV AL,BYTE PTR SS:[EBP-1C]
004F10D5 . 8885 B1FEFFFF MOV BYTE PTR SS:[EBP-14F],AL
004F10DB . C685 B2FEFFFF>MOV BYTE PTR SS:[EBP-14E],55
004F10E2 . 8A45 E5 MOV AL,BYTE PTR SS:[EBP-1B]
004F10E5 . 8885 B3FEFFFF MOV BYTE PTR SS:[EBP-14D],AL
004F10EB . A1 64765C00 MOV EAX,DWORD PTR DS:[5C7664]
004F10F0 . C1E8 18 SHR EAX,18
004F10F3 . 24 FF AND AL,0FF
004F10F5 . 8885 B4FEFFFF MOV BYTE PTR SS:[EBP-14C],AL
004F10FB . A1 64765C00 MOV EAX,DWORD PTR DS:[5C7664]
004F1100 . C1E8 10 SHR EAX,10
004F1103 . 24 FF AND AL,0FF
004F1105 . 8885 B5FEFFFF MOV BYTE PTR SS:[EBP-14B],AL
004F110B . A1 64765C00 MOV EAX,DWORD PTR DS:[5C7664]
004F1110 . C1E8 08 SHR EAX,8
004F1113 . 24 FF AND AL,0FF
004F1115 . 8885 B6FEFFFF MOV BYTE PTR SS:[EBP-14A],AL
004F111B . A0 64765C00 MOV AL,BYTE PTR DS:[5C7664]
004F1120 . 24 FF AND AL,0FF
004F1122 . 8885 B7FEFFFF MOV BYTE PTR SS:[EBP-149],AL
004F1128 . 33C9 XOR ECX,ECX
004F112A . 8A4D E5 MOV CL,BYTE PTR SS:[EBP-1B]
004F112D . 8D95 8CF8FFFF LEA EDX,DWORD PTR SS:[EBP-774]
004F1133 . 8D85 B8FEFFFF LEA EAX,DWORD PTR SS:[EBP-148]
004F1139 . E8 926CF1FF CALL de_Camer.00407DD0
004F113E . 33C0 XOR EAX,EAX
004F1140 . 8A55 E5 MOV DL,BYTE PTR SS:[EBP-1B]
004F1143 . 80C2 07 ADD DL,7
004F1146 . 84D2 TEST DL,DL
004F1148 . 76 10 JBE SHORT de_Camer.004F115A
004F114A . B3 01 MOV BL,1
004F114C . 8DB5 B1FEFFFF LEA ESI,DWORD PTR SS:[EBP-14F]
004F1152 > 3206 XOR AL,BYTE PTR DS:[ESI]
004F1154 . 43 INC EBX
004F1155 . 46 INC ESI
004F1156 . FECA DEC DL
004F1158 .^ 75 F8 JNZ SHORT de_Camer.004F1152
004F115A > 33D2 XOR EDX,EDX
004F115C . 8AD3 MOV DL,BL
004F115E . 888415 B0FEFF>MOV BYTE PTR SS:[EBP+EDX-150],AL
004F1165 . BF 7D000000 MOV EDI,7D
004F116A . C645 E7 04 MOV BYTE PTR SS:[EBP-19],4
004F116E . 33C0 XOR EAX,EAX
004F1170 . C645 E6 01 MOV BYTE PTR SS:[EBP-1A],1
004F1174 . 33DB XOR EBX,EBX
004F1176 . 8DB5 B4FEFFFF LEA ESI,DWORD PTR SS:[EBP-14C]
004F117C > 33D2 XOR EDX,EDX
004F117E . 8A55 E7 MOV DL,BYTE PTR SS:[EBP-19]
004F1181 . 8A9415 B0FEFF>MOV DL,BYTE PTR SS:[EBP+EDX-150]
004F1188 . 0055 E4 ADD BYTE PTR SS:[EBP-1C],DL
004F118B . 33D2 XOR EDX,EDX
004F118D . 8A55 E6 MOV DL,BYTE PTR SS:[EBP-1A]
004F1190 . B9 F0184F00 MOV ECX,de_Camer.004F18F0 ; ASCII "3848329r834kafhweiwojkdaskfjdsakiqoew909023qjewfui3f349ir8439q4ujknBYUGHYI:LKJIDuf980q83IUoiafuewoifew*&*&*hasjkfjdjdksjjdsfh"
004F1195 . 8A5411 FF MOV DL,BYTE PTR DS:[ECX+EDX-1]
004F1199 . 3055 E4 XOR BYTE PTR SS:[EBP-1C],DL
004F119C . 33D2 XOR EDX,EDX
004F119E . 8A55 E6 MOV DL,BYTE PTR SS:[EBP-1A]
004F11A1 . 3BFA CMP EDI,EDX
004F11A3 . 7E 05 JLE SHORT de_Camer.004F11AA
004F11A5 . FE45 E6 INC BYTE PTR SS:[EBP-1A]
004F11A8 . EB 04 JMP SHORT de_Camer.004F11AE
004F11AA > C645 E6 01 MOV BYTE PTR SS:[EBP-1A],1
004F11AE > 8A55 E4 MOV DL,BYTE PTR SS:[EBP-1C]
004F11B1 . 8816 MOV BYTE PTR DS:[ESI],DL
004F11B3 . 3245 E4 XOR AL,BYTE PTR SS:[EBP-1C]
004F11B6 . FE45 E7 INC BYTE PTR SS:[EBP-19]
004F11B9 . 33D2 XOR EDX,EDX
004F11BB . 8A55 E7 MOV DL,BYTE PTR SS:[EBP-19]
004F11BE . 33C9 XOR ECX,ECX
004F11C0 . 8A4D E5 MOV CL,BYTE PTR SS:[EBP-1B]
004F11C3 . 83C1 04 ADD ECX,4
004F11C6 . 83C1 04 ADD ECX,4
004F11C9 . 3BD1 CMP EDX,ECX
004F11CB . 76 04 JBE SHORT de_Camer.004F11D1
004F11CD . C645 E7 04 MOV BYTE PTR SS:[EBP-19],4
004F11D1 > 43 INC EBX
004F11D2 . 46 INC ESI
004F11D3 . 80FB 7C CMP BL,7C
004F11D6 .^ 75 A4 JNZ SHORT de_Camer.004F117C
004F11D8 . 3085 B1FEFFFF XOR BYTE PTR SS:[EBP-14F],AL
004F11DE . 3085 B2FEFFFF XOR BYTE PTR SS:[EBP-14E],AL
004F11E4 . 3085 B3FEFFFF XOR BYTE PTR SS:[EBP-14D],AL
004F11EA . 8A85 B1FEFFFF MOV AL,BYTE PTR SS:[EBP-14F]
004F11F0 . 3285 B2FEFFFF XOR AL,BYTE PTR SS:[EBP-14E]
004F11F6 . 34 01 XOR AL,1
004F11F8 . 8885 B0FEFFFF MOV BYTE PTR SS:[EBP-150],AL
004F11FE . 8D85 B0FDFFFF LEA EAX,DWORD PTR SS:[EBP-250]
004F1204 . 50 PUSH EAX
004F1205 . 68 FF000000 PUSH 0FF
004F120A . 8D45 E8 LEA EAX,DWORD PTR SS:[EBP-18]
004F120D . 50 PUSH EAX
004F120E . 8D85 B0FEFFFF LEA EAX,DWORD PTR SS:[EBP-150]
004F1214 . B9 80000000 MOV ECX,80
004F1219 . BA FF000000 MOV EDX,0FF
004F121E . E8 810AFEFF CALL de_Camer.004D1CA4
004F1223 . 84C0 TEST AL,AL
004F1225 . 0F84 98010000 JE de_Camer.004F13C3
这段代码怎么把狗对话框去掉~~~~~~~~~
004F0DD5 |. 8BEC MOV EBP,ESP
004F0DD7 |. 83C4 C0 ADD ESP,-40
004F0DDA |. 53 PUSH EBX
004F0DDB |. 56 PUSH ESI
004F0DDC |. 8BD9 MOV EBX,ECX
004F0DDE |. 85DB TEST EBX,EBX
004F0DE0 |. 78 0A JS SHORT de_Camer.004F0DEC
004F0DE2 |. C1EB 02 SHR EBX,2
004F0DE5 |> 8B349A /MOV ESI,DWORD PTR DS:[EDX+EBX*4]
004F0DE8 |. 4B |DEC EBX
004F0DE9 |. 56 |PUSH ESI
004F0DEA |.^ 79 F9 \JNS SHORT de_Camer.004F0DE5
004F0DEC |> 8BD4 MOV EDX,ESP
004F0DEE |. 8955 F8 MOV DWORD PTR SS:[EBP-8],EDX
004F0DF1 |. 8945 FC MOV DWORD PTR SS:[EBP-4],EAX
004F0DF4 |. C645 F6 20 MOV BYTE PTR SS:[EBP-A],20
004F0DF8 |. B3 03 MOV BL,3
004F0DFA |. B8 20000000 MOV EAX,20
004F0DFF |. 8B55 F8 MOV EDX,DWORD PTR SS:[EBP-8]
004F0E02 |. 8D75 D5 LEA ESI,DWORD PTR SS:[EBP-2B]
004F0E05 |> 8A0A /MOV CL,BYTE PTR DS:[EDX]
004F0E07 |. 880E |MOV BYTE PTR DS:[ESI],CL
004F0E09 |. 46 |INC ESI
004F0E0A |. 42 |INC EDX
004F0E0B |. 48 |DEC EAX
004F0E0C |.^ 75 F7 \JNZ SHORT de_Camer.004F0E05
004F0E0E |. 8D45 F5 LEA EAX,DWORD PTR SS:[EBP-B]
004F0E11 |. 50 PUSH EAX ; /Arg1
004F0E12 |. 8D4D C1 LEA ECX,DWORD PTR SS:[EBP-3F] ; |
004F0E15 |. 8D45 D5 LEA EAX,DWORD PTR SS:[EBP-2B] ; |
004F0E18 |. 8A55 F6 MOV DL,BYTE PTR SS:[EBP-A] ; |
004F0E1B |. E8 EC17FEFF CALL de_Camer.004D260C ; \de_Camer.004D260C
004F0E20 |. 84C0 TEST AL,AL
004F0E22 |. 74 6D JE SHORT de_Camer.004F0E91
004F0E24 |. 33D2 XOR EDX,EDX
004F0E26 |. B8 09000000 MOV EAX,9
004F0E2B |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E2E |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E30 |. 46 |INC ESI
004F0E31 |. 48 |DEC EAX
004F0E32 |.^ 75 FA \JNZ SHORT de_Camer.004F0E2E
004F0E34 |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E37 |. 8845 D1 MOV BYTE PTR SS:[EBP-2F],AL
004F0E3A |. 33D2 XOR EDX,EDX
004F0E3C |. B8 07000000 MOV EAX,7
004F0E41 |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E44 |. 83C6 09 ADD ESI,9
004F0E47 |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E49 |. 46 |INC ESI
004F0E4A |. 48 |DEC EAX
004F0E4B |.^ 75 FA \JNZ SHORT de_Camer.004F0E47
004F0E4D |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E50 |. 8845 D2 MOV BYTE PTR SS:[EBP-2E],AL
004F0E53 |. 33D2 XOR EDX,EDX
004F0E55 |. B8 08000000 MOV EAX,8
004F0E5A |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E5D |. 83C6 10 ADD ESI,10
004F0E60 |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E62 |. 46 |INC ESI
004F0E63 |. 48 |DEC EAX
004F0E64 |.^ 75 FA \JNZ SHORT de_Camer.004F0E60
004F0E66 |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E69 |. 8845 D3 MOV BYTE PTR SS:[EBP-2D],AL
004F0E6C |. B8 08000000 MOV EAX,8
004F0E71 |. 8B75 F8 MOV ESI,DWORD PTR SS:[EBP-8]
004F0E74 |. 83C6 18 ADD ESI,18
004F0E77 |> 3216 /XOR DL,BYTE PTR DS:[ESI]
004F0E79 |. 46 |INC ESI
004F0E7A |. 48 |DEC EAX
004F0E7B |.^ 75 FA \JNZ SHORT de_Camer.004F0E77
004F0E7D |. 8D0413 LEA EAX,DWORD PTR DS:[EBX+EDX]
004F0E80 |. 8845 D4 MOV BYTE PTR SS:[EBP-2C],AL
004F0E83 |. B8 10000000 MOV EAX,10
004F0E88 |. 8D55 C1 LEA EDX,DWORD PTR SS:[EBP-3F]
004F0E8B |> 001A /ADD BYTE PTR DS:[EDX],BL
004F0E8D |. 42 |INC EDX
004F0E8E |. 48 |DEC EAX
004F0E8F |.^ 75 FA \JNZ SHORT de_Camer.004F0E8B
004F0E91 |> 33DB XOR EBX,EBX
004F0E93 |. 8A45 D1 MOV AL,BYTE PTR SS:[EBP-2F]
004F0E96 |. 3245 D2 XOR AL,BYTE PTR SS:[EBP-2E]
004F0E99 |. 0245 D3 ADD AL,BYTE PTR SS:[EBP-2D]
004F0E9C |. 3245 D4 XOR AL,BYTE PTR SS:[EBP-2C]
004F0E9F |. 8845 F7 MOV BYTE PTR SS:[EBP-9],AL
004F0EA2 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F0EA5 |. 8B70 04 MOV ESI,DWORD PTR DS:[EAX+4]
004F0EA8 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F0EAB |. E8 FC04F3FF CALL de_Camer.004213AC
004F0EB0 |. 85C0 TEST EAX,EAX
004F0EB2 |. 7E 1D JLE SHORT de_Camer.004F0ED1
004F0EB4 |> 80FB 13 /CMP BL,13
004F0EB7 |. 73 03 |JNB SHORT de_Camer.004F0EBC
004F0EB9 |. 43 |INC EBX
004F0EBA |. EB 02 |JMP SHORT de_Camer.004F0EBE
004F0EBC |> 33DB |XOR EBX,EBX
004F0EBE |> 8A16 |MOV DL,BYTE PTR DS:[ESI]
004F0EC0 |. 33C9 |XOR ECX,ECX
004F0EC2 |. 8ACB |MOV CL,BL
004F0EC4 |. 32540D C1 |XOR DL,BYTE PTR SS:[EBP+ECX-3F]
004F0EC8 |. 2A55 F7 |SUB DL,BYTE PTR SS:[EBP-9]
004F0ECB |. 8816 |MOV BYTE PTR DS:[ESI],DL
004F0ECD |. 46 |INC ESI
004F0ECE |. 48 |DEC EAX
004F0ECF |.^ 75 E3 \JNZ SHORT de_Camer.004F0EB4
004F0ED1 |> 8B75 B8 MOV ESI,DWORD PTR SS:[EBP-48]
004F0ED4 |. 8B5D BC MOV EBX,DWORD PTR SS:[EBP-44]
004F0ED7 |. 8BE5 MOV ESP,EBP
004F0ED9 |. 5D POP EBP
004F0EDA \. C3 RETN
004F0EDB 90 NOP
004F0EDC $ 55 PUSH EBP
004F0EDD . 8BEC MOV EBP,ESP
004F0EDF . 81C4 74F8FFFF ADD ESP,-78C
004F0EE5 . 53 PUSH EBX
004F0EE6 . 56 PUSH ESI
004F0EE7 . 57 PUSH EDI
004F0EE8 . 33C0 XOR EAX,EAX
004F0EEA . 8985 74F8FFFF MOV DWORD PTR SS:[EBP-78C],EAX
004F0EF0 . 8985 78F8FFFF MOV DWORD PTR SS:[EBP-788],EAX
004F0EF6 . 8985 7CF8FFFF MOV DWORD PTR SS:[EBP-784],EAX
004F0EFC . 8985 80F8FFFF MOV DWORD PTR SS:[EBP-780],EAX
004F0F02 . 8985 84F8FFFF MOV DWORD PTR SS:[EBP-77C],EAX
004F0F08 . 8985 88F8FFFF MOV DWORD PTR SS:[EBP-778],EAX
004F0F0E . 8945 FC MOV DWORD PTR SS:[EBP-4],EAX
004F0F11 . 8945 F0 MOV DWORD PTR SS:[EBP-10],EAX
004F0F14 . 8945 EC MOV DWORD PTR SS:[EBP-14],EAX
004F0F17 . 33C0 XOR EAX,EAX
004F0F19 55 PUSH EBP
004F0F1A 68 93184F00 PUSH de_Camer.004F1893
004F0F1F 64:FF30 PUSH DWORD PTR FS:[EAX]
004F0F22 64:8920 MOV DWORD PTR FS:[EAX],ESP
004F0F25 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
004F0F28 B9 AC184F00 MOV ECX,de_Camer.004F18AC ; ASCII "Title.dat"
004F0F2D 8B15 08365C00 MOV EDX,DWORD PTR DS:[5C3608]
004F0F33 E8 003CF1FF CALL de_Camer.00404B38
004F0F38 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004F0F3B E8 C889F1FF CALL de_Camer.00409908
004F0F40 84C0 TEST AL,AL
004F0F42 0F84 18090000 JE de_Camer.004F1860
004F0F48 68 B8184F00 PUSH de_Camer.004F18B8 ; /ResourceType = "dogfile"
004F0F4D 68 C0184F00 PUSH de_Camer.004F18C0 ; |ResourceName = "rsakey"
004F0F52 A1 18675B00 MOV EAX,DWORD PTR DS:[5B6718] ; |
004F0F57 50 PUSH EAX ; |hModule => NULL
004F0F58 E8 0363F1FF CALL <JMP.&kernel32.FindResourceA> ; \FindResourceA
004F0F5D 8BD8 MOV EBX,EAX
004F0F5F 53 PUSH EBX ; /hResource
004F0F60 A1 18675B00 MOV EAX,DWORD PTR DS:[5B6718] ; |
004F0F65 50 PUSH EAX ; |hModule => NULL
004F0F66 E8 4D65F1FF CALL <JMP.&kernel32.SizeofResource> ; \SizeofResource
004F0F6B 8BF0 MOV ESI,EAX
004F0F6D 53 PUSH EBX ; /hResource
004F0F6E A1 18675B00 MOV EAX,DWORD PTR DS:[5B6718] ; |
004F0F73 50 PUSH EAX ; |hModule => NULL
004F0F74 E8 8F64F1FF CALL <JMP.&kernel32.LoadResource> ; \LoadResource
004F0F79 8BD8 MOV EBX,EAX
004F0F7B 53 PUSH EBX ; /hResource
004F0F7C E8 A764F1FF CALL <JMP.&kernel32.LockResource> ; \LockResource
004F0F81 8D95 B0FCFFFF LEA EDX,DWORD PTR SS:[EBP-350]
004F0F87 8BCE MOV ECX,ESI
004F0F89 92 XCHG EAX,EDX
004F0F8A E8 416EF1FF CALL de_Camer.00407DD0
004F0F8F 53 PUSH EBX ; /hResource
004F0F90 E8 E362F1FF CALL <JMP.&kernel32.FreeResource> ; \FreeResource
004F0F95 C785 ACFCFFFF>MOV DWORD PTR SS:[EBP-354],400
004F0F9F E8 BC63F1FF CALL <JMP.&kernel32.GetTickCount> ; [GetTickCount
004F0FA4 8B15 68585B00 MOV EDX,DWORD PTR DS:[5B5868] ; de_Camer.005AD008
004F0FAA 8902 MOV DWORD PTR DS:[EDX],EAX
004F0FAC 33DB XOR EBX,EBX
004F0FAE 8DB5 8CFCFFFF LEA ESI,DWORD PTR SS:[EBP-374]
004F0FB4 B8 FF000000 MOV EAX,0FF
004F0FB9 E8 A221F1FF CALL de_Camer.00403160
004F0FBE 8806 MOV BYTE PTR DS:[ESI],AL
004F0FC0 43 INC EBX
004F0FC1 46 INC ESI
004F0FC2 80FB 20 CMP BL,20
004F0FC5 ^ 75 ED JNZ SHORT de_Camer.004F0FB4
004F0FC7 8D85 ACFCFFFF LEA EAX,DWORD PTR SS:[EBP-354]
004F0FCD 50 PUSH EAX
004F0FCE 6A 20 PUSH 20
004F0FD0 8D85 8CFCFFFF LEA EAX,DWORD PTR SS:[EBP-374]
004F0FD6 50 PUSH EAX
004F0FD7 8D45 E0 LEA EAX,DWORD PTR SS:[EBP-20]
004F0FDA 50 PUSH EAX
004F0FDB 8D85 8CF8FFFF LEA EAX,DWORD PTR SS:[EBP-774]
004F0FE1 50 PUSH EAX
004F0FE2 E8 710CFEFF CALL <JMP.&crypt.RSAPublicEncrypt>
004F0FE7 85C0 TEST EAX,EAX
004F0FE9 74 3C JE SHORT de_Camer.004F1027
004F0FEB 6A 10 PUSH 10
004F0FED 8D95 88F8FFFF LEA EDX,DWORD PTR SS:[EBP-778]
004F0FF3 A1 0C545B00 MOV EAX,DWORD PTR DS:[5B540C]
004F0FF8 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F0FFA E8 65F3F7FF CALL de_Camer.00470364
004F0FFF 8B85 88F8FFFF MOV EAX,DWORD PTR SS:[EBP-778]
004F1005 E8 DA3CF1FF CALL de_Camer.00404CE4
004F100A 8BC8 MOV ECX,EAX
004F100C BA C8184F00 MOV EDX,de_Camer.004F18C8 请插入加密狗
004F1011 A1 0C545B00 MOV EAX,DWORD PTR DS:[5B540C]
004F1016 8B00 MOV EAX,DWORD PTR DS:[EAX]
004F1018 E8 1FF9F7FF CALL de_Camer.0047093C
004F101D E8 7E36F1FF CALL de_Camer.004046A0
004F1022 E9 39080000 JMP de_Camer.004F1860
004F1027 B2 01 MOV DL,1
004F1029 A1 D4C14100 MOV EAX,DWORD PTR DS:[41C1D4]
004F102E E8 E128F1FF CALL de_Camer.00403914
004F1033 8945 F8 MOV DWORD PTR SS:[EBP-8],EAX
004F1036 33C9 XOR ECX,ECX
004F1038 . 55 PUSH EBP
004F1039 . 68 59184F00 PUSH de_Camer.004F1859
004F103E . 64:FF31 PUSH DWORD PTR FS:[ECX]
004F1041 . 64:8921 MOV DWORD PTR FS:[ECX],ESP
004F1044 . 8B55 FC MOV EDX,DWORD PTR SS:[EBP-4]
004F1047 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F104A . E8 D50AF3FF CALL de_Camer.00421B24
004F104F . 33C9 XOR ECX,ECX
004F1051 . 33D2 XOR EDX,EDX
004F1053 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F1056 . 8B18 MOV EBX,DWORD PTR DS:[EAX]
004F1058 . FF53 10 CALL DWORD PTR DS:[EBX+10]
004F105B . 8D4D F0 LEA ECX,DWORD PTR SS:[EBP-10]
004F105E . BA 05000000 MOV EDX,5
004F1063 . B0 20 MOV AL,20
004F1065 . E8 6A3EF1FF CALL de_Camer.00404ED4
004F106A . 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10]
004F106D . E8 CA3CF1FF CALL de_Camer.00404D3C
004F1072 . 8BD0 MOV EDX,EAX
004F1074 . B9 05000000 MOV ECX,5
004F1079 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F107C . 8B18 MOV EBX,DWORD PTR DS:[EAX]
004F107E . FF53 08 CALL DWORD PTR DS:[EBX+8]
004F1081 . 8B45 F0 MOV EAX,DWORD PTR SS:[EBP-10]
004F1084 . BA E0184F00 MOV EDX,de_Camer.004F18E0 ; ASCII "Title"
004F1089 . E8 A23BF1FF CALL de_Camer.00404C30
004F108E . 74 0A JE SHORT de_Camer.004F109A
004F1090 . E8 EB31F1FF CALL de_Camer.00404280
004F1095 . E9 C6070000 JMP de_Camer.004F1860
004F109A > 8D55 BC LEA EDX,DWORD PTR SS:[EBP-44]
004F109D . B9 20000000 MOV ECX,20
004F10A2 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004F10A5 . E8 FA04F3FF CALL de_Camer.004215A4
004F10AA . C705 64765C00>MOV DWORD PTR DS:[5C7664],1
004F10B4 . C645 E5 14 MOV BYTE PTR SS:[EBP-1B],14
004F10B8 . E8 A362F1FF CALL <JMP.&kernel32.GetTickCount> ; [GetTickCount
004F10BD . 8B15 68585B00 MOV EDX,DWORD PTR DS:[5B5868] ; de_Camer.005AD008
004F10C3 . 8902 MOV DWORD PTR DS:[EDX],EAX
004F10C5 . B8 FF000000 MOV EAX,0FF
004F10CA . E8 9120F1FF CALL de_Camer.00403160
004F10CF . 8845 E4 MOV BYTE PTR SS:[EBP-1C],AL
004F10D2 . 8A45 E4 MOV AL,BYTE PTR SS:[EBP-1C]
004F10D5 . 8885 B1FEFFFF MOV BYTE PTR SS:[EBP-14F],AL
004F10DB . C685 B2FEFFFF>MOV BYTE PTR SS:[EBP-14E],55
004F10E2 . 8A45 E5 MOV AL,BYTE PTR SS:[EBP-1B]
004F10E5 . 8885 B3FEFFFF MOV BYTE PTR SS:[EBP-14D],AL
004F10EB . A1 64765C00 MOV EAX,DWORD PTR DS:[5C7664]
004F10F0 . C1E8 18 SHR EAX,18
004F10F3 . 24 FF AND AL,0FF
004F10F5 . 8885 B4FEFFFF MOV BYTE PTR SS:[EBP-14C],AL
004F10FB . A1 64765C00 MOV EAX,DWORD PTR DS:[5C7664]
004F1100 . C1E8 10 SHR EAX,10
004F1103 . 24 FF AND AL,0FF
004F1105 . 8885 B5FEFFFF MOV BYTE PTR SS:[EBP-14B],AL
004F110B . A1 64765C00 MOV EAX,DWORD PTR DS:[5C7664]
004F1110 . C1E8 08 SHR EAX,8
004F1113 . 24 FF AND AL,0FF
004F1115 . 8885 B6FEFFFF MOV BYTE PTR SS:[EBP-14A],AL
004F111B . A0 64765C00 MOV AL,BYTE PTR DS:[5C7664]
004F1120 . 24 FF AND AL,0FF
004F1122 . 8885 B7FEFFFF MOV BYTE PTR SS:[EBP-149],AL
004F1128 . 33C9 XOR ECX,ECX
004F112A . 8A4D E5 MOV CL,BYTE PTR SS:[EBP-1B]
004F112D . 8D95 8CF8FFFF LEA EDX,DWORD PTR SS:[EBP-774]
004F1133 . 8D85 B8FEFFFF LEA EAX,DWORD PTR SS:[EBP-148]
004F1139 . E8 926CF1FF CALL de_Camer.00407DD0
004F113E . 33C0 XOR EAX,EAX
004F1140 . 8A55 E5 MOV DL,BYTE PTR SS:[EBP-1B]
004F1143 . 80C2 07 ADD DL,7
004F1146 . 84D2 TEST DL,DL
004F1148 . 76 10 JBE SHORT de_Camer.004F115A
004F114A . B3 01 MOV BL,1
004F114C . 8DB5 B1FEFFFF LEA ESI,DWORD PTR SS:[EBP-14F]
004F1152 > 3206 XOR AL,BYTE PTR DS:[ESI]
004F1154 . 43 INC EBX
004F1155 . 46 INC ESI
004F1156 . FECA DEC DL
004F1158 .^ 75 F8 JNZ SHORT de_Camer.004F1152
004F115A > 33D2 XOR EDX,EDX
004F115C . 8AD3 MOV DL,BL
004F115E . 888415 B0FEFF>MOV BYTE PTR SS:[EBP+EDX-150],AL
004F1165 . BF 7D000000 MOV EDI,7D
004F116A . C645 E7 04 MOV BYTE PTR SS:[EBP-19],4
004F116E . 33C0 XOR EAX,EAX
004F1170 . C645 E6 01 MOV BYTE PTR SS:[EBP-1A],1
004F1174 . 33DB XOR EBX,EBX
004F1176 . 8DB5 B4FEFFFF LEA ESI,DWORD PTR SS:[EBP-14C]
004F117C > 33D2 XOR EDX,EDX
004F117E . 8A55 E7 MOV DL,BYTE PTR SS:[EBP-19]
004F1181 . 8A9415 B0FEFF>MOV DL,BYTE PTR SS:[EBP+EDX-150]
004F1188 . 0055 E4 ADD BYTE PTR SS:[EBP-1C],DL
004F118B . 33D2 XOR EDX,EDX
004F118D . 8A55 E6 MOV DL,BYTE PTR SS:[EBP-1A]
004F1190 . B9 F0184F00 MOV ECX,de_Camer.004F18F0 ; ASCII "3848329r834kafhweiwojkdaskfjdsakiqoew909023qjewfui3f349ir8439q4ujknBYUGHYI:LKJIDuf980q83IUoiafuewoifew*&*&*hasjkfjdjdksjjdsfh"
004F1195 . 8A5411 FF MOV DL,BYTE PTR DS:[ECX+EDX-1]
004F1199 . 3055 E4 XOR BYTE PTR SS:[EBP-1C],DL
004F119C . 33D2 XOR EDX,EDX
004F119E . 8A55 E6 MOV DL,BYTE PTR SS:[EBP-1A]
004F11A1 . 3BFA CMP EDI,EDX
004F11A3 . 7E 05 JLE SHORT de_Camer.004F11AA
004F11A5 . FE45 E6 INC BYTE PTR SS:[EBP-1A]
004F11A8 . EB 04 JMP SHORT de_Camer.004F11AE
004F11AA > C645 E6 01 MOV BYTE PTR SS:[EBP-1A],1
004F11AE > 8A55 E4 MOV DL,BYTE PTR SS:[EBP-1C]
004F11B1 . 8816 MOV BYTE PTR DS:[ESI],DL
004F11B3 . 3245 E4 XOR AL,BYTE PTR SS:[EBP-1C]
004F11B6 . FE45 E7 INC BYTE PTR SS:[EBP-19]
004F11B9 . 33D2 XOR EDX,EDX
004F11BB . 8A55 E7 MOV DL,BYTE PTR SS:[EBP-19]
004F11BE . 33C9 XOR ECX,ECX
004F11C0 . 8A4D E5 MOV CL,BYTE PTR SS:[EBP-1B]
004F11C3 . 83C1 04 ADD ECX,4
004F11C6 . 83C1 04 ADD ECX,4
004F11C9 . 3BD1 CMP EDX,ECX
004F11CB . 76 04 JBE SHORT de_Camer.004F11D1
004F11CD . C645 E7 04 MOV BYTE PTR SS:[EBP-19],4
004F11D1 > 43 INC EBX
004F11D2 . 46 INC ESI
004F11D3 . 80FB 7C CMP BL,7C
004F11D6 .^ 75 A4 JNZ SHORT de_Camer.004F117C
004F11D8 . 3085 B1FEFFFF XOR BYTE PTR SS:[EBP-14F],AL
004F11DE . 3085 B2FEFFFF XOR BYTE PTR SS:[EBP-14E],AL
004F11E4 . 3085 B3FEFFFF XOR BYTE PTR SS:[EBP-14D],AL
004F11EA . 8A85 B1FEFFFF MOV AL,BYTE PTR SS:[EBP-14F]
004F11F0 . 3285 B2FEFFFF XOR AL,BYTE PTR SS:[EBP-14E]
004F11F6 . 34 01 XOR AL,1
004F11F8 . 8885 B0FEFFFF MOV BYTE PTR SS:[EBP-150],AL
004F11FE . 8D85 B0FDFFFF LEA EAX,DWORD PTR SS:[EBP-250]
004F1204 . 50 PUSH EAX
004F1205 . 68 FF000000 PUSH 0FF
004F120A . 8D45 E8 LEA EAX,DWORD PTR SS:[EBP-18]
004F120D . 50 PUSH EAX
004F120E . 8D85 B0FEFFFF LEA EAX,DWORD PTR SS:[EBP-150]
004F1214 . B9 80000000 MOV ECX,80
004F1219 . BA FF000000 MOV EDX,0FF
004F121E . E8 810AFEFF CALL de_Camer.004D1CA4
004F1223 . 84C0 TEST AL,AL
004F1225 . 0F84 98010000 JE de_Camer.004F13C3
这段代码怎么把狗对话框去掉~~~~~~~~~
[培训]二进制漏洞攻防(第3期);满10人开班;模糊测试与工具使用二次开发;网络协议漏洞挖掘;Linux内核漏洞挖掘与利用;AOSP漏洞挖掘与利用;代码审计。
赞赏
他的文章
SKN文件怎么改里面的图片
2829
[求助]帮我脱个DLL的壳
2050
[求助]这个问题怎么解决....
2557
[求助]一软件软件狗的问题~~~
3562
[求助]遇到新问题...........
2472
看原图