ccfer 果然是
问下CCFER0040229E B9 09000000 MOV ECX,9
004022A3 BE 58214100 MOV ESI,crackme5.00412158
004022A8 8DBD F4FEFFFF LEA EDI,DWORD PTR SS:[EBP-10C]
004022AE F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ESI]
004022B0 8B0D 50214100 MOV ECX,DWORD PTR DS:[412150]
004022B6 894D 9C MOV DWORD PTR SS:[EBP-64],ECX
004022B9 8B15 54214100 MOV EDX,DWORD PTR DS:[412154]
004022BF 8955 A0 MOV DWORD PTR SS:[EBP-60],EDX
004022C2 6A 00 PUSH 0
004022C4 6A 00 PUSH 0
004022C6 8D45 9C LEA EAX,DWORD PTR SS:[EBP-64]
004022C9 50 PUSH EAX
004022CA 8D8D F4FEFFFF LEA ECX,DWORD PTR SS:[EBP-10C]
004022D0 51 PUSH ECX
004022D1 8B15 D4734100 MOV EDX,DWORD PTR DS:[4173D4]
004022D7 52 PUSH EDX
004022D8 FF15 E4204100 CALL DWORD PTR DS:[<&USER32.MessageBoxExA>] ; USER32.MessageBoxExA
是怎么解密的?