0048671A E8 71FEFFFF call 00486590 堆
0048671F 8D45 E4 lea eax, dword ptr [ebp-1C]栈 ss:[0012FE5C]=01033FD0, (ASCII "Ea3st8Re#m04170B5DAB63041B") 给他变成32位密文
eax=00000010 7885265317e0d0bd3f810bc2b12523be
00486722 8D55 D8 lea edx, dword ptr [ebp-28]
00486725 E8 DAFEFFFF call 00486604 算法CALL
0048672A 8B45 D8 mov eax, dword ptr [ebp-28] 堆栈 ss:[0012FE54]=010307C4, (ASCII "f6d063d0088c3890374cc7f81d73e9d6")
eax=00000000
关健CALL跟进
00486604 55 push ebp
00486605 8BEC mov ebp, esp
00486607 83C4 E8 add esp, -18
0048660A 53 push ebx
0048660B 56 push esi
0048660C 57 push edi
0048660D 33C9 xor ecx, ecx
0048660F 894D EC mov dword ptr [ebp-14], ecx
00486612 894D E8 mov dword ptr [ebp-18], ecx
00486615 8BF0 mov esi, eax
00486617 8D7D F0 lea edi, dword ptr [ebp-10]
0048661A A5 movs dword ptr es:[edi], dword ptr [esi]
0048661B A5 movs dword ptr es:[edi], dword ptr [esi]
0048661C A5 movs dword ptr es:[edi], dword ptr [esi]
0048661D A5 movs dword ptr es:[edi], dword ptr [esi]
0048661E 8BFA mov edi, edx
00486620 33C0 xor eax, eax
00486622 55 push ebp
00486623 68 9F664800 push 0048669F
00486628 64:FF30 push dword ptr fs:[eax]
0048662B 64:8920 mov dword ptr fs:[eax], esp
0048662E 8BC7 mov eax, edi
00486630 E8 D7E3F7FF call 00404A0C
00486635 B3 10 mov bl, 10
00486637 8D75 F0 lea esi, dword ptr [ebp-10]
0048663A FF37 push dword ptr [edi]
0048663C 8D45 EC lea eax, dword ptr [ebp-14]
0048663F 33D2 xor edx, edx
00486641 8A16 mov dl, byte ptr [esi]
00486643 C1EA 04 shr edx, 4
00486646 83E2 0F and edx, 0F
00486649 8A92 44A45300 mov dl, byte ptr [edx+53A444]
0048664F E8 A0E5F7FF call 00404BF4
00486654 FF75 EC push dword ptr [ebp-14]
00486657 8D45 E8 lea eax, dword ptr [ebp-18]
0048665A 8A16 mov dl, byte ptr [esi]
0048665C 80E2 0F and dl, 0F
0048665F 81E2 FF000000 and edx, 0FF
00486665 8A92 44A45300 mov dl, byte ptr [edx+53A444]
0048666B E8 84E5F7FF call 00404BF4
00486670 FF75 E8 push dword ptr [ebp-18]
00486673 8BC7 mov eax, edi
00486675 BA 03000000 mov edx, 3
0048667A E8 0DE7F7FF call 00404D8C
0048667F 46 inc esi
00486680 FECB dec bl
00486682 ^ 75 B6 jnz short 0048663A
00486684 33C0 xor eax, eax
00486686 5A pop edx
00486687 59 pop ecx
00486688 59 pop ecx
00486689 64:8910 mov dword ptr fs:[eax], edx
0048668C 68 A6664800 push 004866A6
00486691 8D45 E8 lea eax, dword ptr [ebp-18]
00486694 BA 02000000 mov edx, 2
00486699 E8 92E3F7FF call 00404A30
0048669E C3 retn
0048669F ^ E9 08DCF7FF jmp 004042AC
004866A4 ^ EB EB jmp short 00486691
004866A6 5F pop edi
004866A7 5E pop esi
004866A8 5B pop ebx
004866A9 8BE5 mov esp, ebp
004866AB 5D pop ebp
004866AC C3 retn
请问一下f6d063d0088c3890374cc7f81d73e9d6这个MD5密文是根据什么算出来的
能在算法CALL里边看到他算之前的明文吗。
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)