没有商业目的,只为学习和交流.
程序没有加壳,00488973:: 68 18C65600 PUSH 56C618 \->: 注册错误
00488978:: 68 84C55600 PUSH 56C584 \->: 注册码不合法,如果您注册购买了,请确保输入正确。\x0A如果您是未注册用户,请先进行合法注册购买彩影。\x0A\x0A点击“取消”重新输入。\x0A点击“确认”查看注册方法。
请大家分析爆破点
004887D0 . 64:A1 0000000>mov eax, dword ptr fs:[0]
004887D6 . 6A FF push -1
004887D8 . 68 BE375200 push 005237BE
004887DD . 50 push eax
004887DE . 64:8925 00000>mov dword ptr fs:[0], esp
004887E5 . 81EC 44030000 sub esp, 344
004887EB . 53 push ebx
004887EC . 55 push ebp
004887ED . 57 push edi
004887EE . 8BE9 mov ebp, ecx
004887F0 . 6A 01 push 1
004887F2 . E8 21780200 call <jmp.&MFC42.#6334>
004887F7 . 8B85 A0010000 mov eax, dword ptr [ebp+1A0]
004887FD . 33DB xor ebx, ebx
004887FF . 3958 F8 cmp dword ptr [eax-8], ebx
00488802 . 0F84 51020000 je 00488A59
00488808 . 8B8D A4010000 mov ecx, dword ptr [ebp+1A4]
0048880E . 3959 F8 cmp dword ptr [ecx-8], ebx
00488811 . 0F84 42020000 je 00488A59
00488817 . 56 push esi
00488818 . 8D4C24 10 lea ecx, dword ptr [esp+10]
0048881C . E8 A56F0200 call <jmp.&MFC42.#540>
00488821 . 66:8B15 44885>mov dx, word ptr [578844]
00488828 . B9 40000000 mov ecx, 40
0048882D . 33C0 xor eax, eax
0048882F . 8D7C24 26 lea edi, dword ptr [esp+26]
00488833 . 66:895424 24 mov word ptr [esp+24], dx
00488838 . 68 04010000 push 104 ; /BufSize = 104 (260.)
0048883D . F3:AB rep stos dword ptr es:[edi] ; |
0048883F . 66:AB stos word ptr es:[edi] ; |
00488841 . 8D4424 28 lea eax, dword ptr [esp+28] ; |
00488845 . 899C24 600300>mov dword ptr [esp+360], ebx ; |
0048884C . 50 push eax ; |PathBuffer
0048884D . 53 push ebx ; |hModule
0048884E . FF15 10525200 call dword ptr [<&KERNEL32.GetModuleF>; \GetModuleFileNameA
00488854 . 8D4C24 24 lea ecx, dword ptr [esp+24]
00488858 . 51 push ecx
00488859 . 8D4C24 14 lea ecx, dword ptr [esp+14]
0048885D . E8 526F0200 call <jmp.&MFC42.#860>
00488862 . 83CF FF or edi, FFFFFFFF
00488865 . 8D4C24 10 lea ecx, dword ptr [esp+10]
00488869 . 57 push edi
0048886A . E8 CF6F0200 call <jmp.&MFC42.#5572>
0048886F . 6A 5C push 5C
00488871 . 8D4C24 14 lea ecx, dword ptr [esp+14]
00488875 . E8 BE6F0200 call <jmp.&MFC42.#5683>
0048887A . 8D5424 20 lea edx, dword ptr [esp+20]
0048887E . 50 push eax
0048887F . 52 push edx
00488880 . 8D4C24 18 lea ecx, dword ptr [esp+18]
00488884 . E8 A96F0200 call <jmp.&MFC42.#4129>
00488889 . 50 push eax
0048888A . 8D4C24 14 lea ecx, dword ptr [esp+14]
0048888E . C68424 600300>mov byte ptr [esp+360], 1
00488896 . E8 916F0200 call <jmp.&MFC42.#858>
0048889B . 8D4C24 20 lea ecx, dword ptr [esp+20]
0048889F . 889C24 5C0300>mov byte ptr [esp+35C], bl
004888A6 . E8 F76E0200 call <jmp.&MFC42.#800>
004888AB . 8D4C24 18 lea ecx, dword ptr [esp+18]
004888AF . E8 126F0200 call <jmp.&MFC42.#540>
004888B4 . 8D4C24 1C lea ecx, dword ptr [esp+1C]
004888B8 . C68424 5C0300>mov byte ptr [esp+35C], 2
004888C0 . E8 016F0200 call <jmp.&MFC42.#540>
004888C5 . 8D4424 18 lea eax, dword ptr [esp+18]
004888C9 . 8D8D E0000000 lea ecx, dword ptr [ebp+E0]
004888CF . 50 push eax
004888D0 . C68424 600300>mov byte ptr [esp+360], 3
004888D8 . E8 81700200 call <jmp.&MFC42.#3874>
004888DD . 8D4C24 18 lea ecx, dword ptr [esp+18]
004888E1 . 51 push ecx
004888E2 . 8D4C24 20 lea ecx, dword ptr [esp+20]
004888E6 . E8 416F0200 call <jmp.&MFC42.#858>
004888EB . 8D5424 20 lea edx, dword ptr [esp+20]
004888EF . 6A 0A push 0A
004888F1 . 52 push edx
004888F2 . 8D4C24 20 lea ecx, dword ptr [esp+20]
004888F6 . E8 6D6F0200 call <jmp.&MFC42.#4277>
004888FB . 8B00 mov eax, dword ptr [eax]
004888FD . BE 54C75600 mov esi, 0056C754 ; ASCII "ZWCY"
00488902 > 8A10 mov dl, byte ptr [eax]
00488904 . 8ACA mov cl, dl
00488906 . 3A16 cmp dl, byte ptr [esi]
00488908 . 75 1C jnz short 00488926
0048890A . 3ACB cmp cl, bl
0048890C . 74 14 je short 00488922
0048890E . 8A50 01 mov dl, byte ptr [eax+1]
00488911 . 8ACA mov cl, dl
00488913 . 3A56 01 cmp dl, byte ptr [esi+1]
00488916 . 75 0E jnz short 00488926
00488918 . 83C0 02 add eax, 2
0048891B . 83C6 02 add esi, 2
0048891E . 3ACB cmp cl, bl
00488920 .^ 75 E0 jnz short 00488902
00488922 > 33C0 xor eax, eax
00488924 . EB 04 jmp short 0048892A
00488926 > 1BC0 sbb eax, eax
00488928 . 1BC7 sbb eax, edi
0048892A > 3BC3 cmp eax, ebx
0048892C . 8D4C24 20 lea ecx, dword ptr [esp+20]
00488930 . 0F944424 17 sete byte ptr [esp+17]
00488935 . E8 686E0200 call <jmp.&MFC42.#800>
0048893A . 8A4424 17 mov al, byte ptr [esp+17]
0048893E . 5E pop esi
0048893F . 3AC3 cmp al, bl
00488941 . 74 2E je short 00488971
00488943 . 53 push ebx
00488944 . 6A 40 push 40
00488946 . 68 24C65600 push 0056C624
0048894B . E8 26700200 call <jmp.&MFC42.#1200>
00488950 . 6A 03 push 3 ; /IsShown = 3
00488952 . 53 push ebx ; |DefDir
00488953 . 53 push ebx ; |Parameters
00488954 . 68 DC9A5600 push 00569ADC ; |FileName = "http://www.powerrsoft.com/cy/userlogin.asp"
00488959 . 68 E4975600 push 005697E4 ; |Operation = "open"
0048895E . 53 push ebx ; |hWnd
0048895F . FF15 805F5200 call dword ptr [<&SHELL32.ShellExecut>; \ShellExecuteA
00488965 . 8BCD mov ecx, ebp
00488967 . E8 846E0200 call <jmp.&MFC42.#4853>
0048896C . E9 B5000000 jmp 00488A26
00488971 > 6A 41 push 41
00488973 . 68 18C65600 push 0056C618
00488978 . 68 84C55600 push 0056C584
0048897D . 8BCD mov ecx, ebp
0048897F . E8 726E0200 call <jmp.&MFC42.#4224>
00488984 . 83F8 01 cmp eax, 1
00488987 . 0F85 99000000 jnz 00488A26
0048898D . 53 push ebx
0048898E . 8D8C24 280100>lea ecx, dword ptr [esp+128]
00488995 . E8 36070000 call 004890D0
0048899A . 8D8C24 240100>lea ecx, dword ptr [esp+124]
004889A1 . C68424 580300>mov byte ptr [esp+358], 2A
004889A9 . E8 F26C0200 call <jmp.&MFC42.#2514>
004889AE . 8D8C24 840200>lea ecx, dword ptr [esp+284]
004889B5 . C68424 580300>mov byte ptr [esp+358], 2F
004889BD . E8 8E26FDFF call 0045B050
004889C2 . 8D8C24 440200>lea ecx, dword ptr [esp+244]
004889C9 . C68424 580300>mov byte ptr [esp+358], 2E
004889D1 . E8 C66D0200 call <jmp.&MFC42.#609>
004889D6 . 8D8C24 040200>lea ecx, dword ptr [esp+204]
004889DD . C68424 580300>mov byte ptr [esp+358], 2D
004889E5 . E8 B26D0200 call <jmp.&MFC42.#609>
004889EA . 8D8C24 C40100>lea ecx, dword ptr [esp+1C4]
004889F1 . C68424 580300>mov byte ptr [esp+358], 2C
004889F9 . E8 9E6D0200 call <jmp.&MFC42.#609>
004889FE . 8D8C24 840100>lea ecx, dword ptr [esp+184]
00488A05 . C68424 580300>mov byte ptr [esp+358], 2B
00488A0D . E8 8A6D0200 call <jmp.&MFC42.#609>
00488A12 . 8D8C24 240100>lea ecx, dword ptr [esp+124]
00488A19 . C68424 580300>mov byte ptr [esp+358], 3
00488A21 . E8 886D0200 call <jmp.&MFC42.#641>
00488A26 > 8D4C24 18 lea ecx, dword ptr [esp+18]
00488A2A . C68424 580300>mov byte ptr [esp+358], 2
00488A32 . E8 6B6D0200 call <jmp.&MFC42.#800>
00488A37 . 8D4C24 14 lea ecx, dword ptr [esp+14]
00488A3B . 889C24 580300>mov byte ptr [esp+358], bl
00488A42 . E8 5B6D0200 call <jmp.&MFC42.#800>
00488A47 . 8D4C24 0C lea ecx, dword ptr [esp+C]
00488A4B . 89BC24 580300>mov dword ptr [esp+358], edi
00488A52 . E8 4B6D0200 call <jmp.&MFC42.#800>
00488A57 . EB 0C jmp short 00488A65
00488A59 > 53 push ebx
00488A5A . 53 push ebx
00488A5B . 68 68C55600 push 0056C568
00488A60 . E8 116F0200 call <jmp.&MFC42.#1200>
00488A65 > 8B8C24 500300>mov ecx, dword ptr [esp+350]
00488A6C . 5F pop edi
00488A6D . 5D pop ebp
00488A6E . 5B pop ebx
00488A6F . 64:890D 00000>mov dword ptr fs:[0], ecx
00488A76 . 81C4 50030000 add esp, 350
00488A7C . C3 retn
附件上传不了,程序下载地址:http://www.softreg.com.cn/Detail.aspx?id=/5b9034ac-ad15-467d-bb3c-8377020ab62e/
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课