能力值:
( LV6,RANK:90 )
|
-
-
8 楼
004013B0 /. 55 push ebp
004013B1 |. 8BEC mov ebp,esp
004013B3 |. 83E4 F8 and esp,FFFFFFF8
004013B6 |. 6A FF push -1
004013B8 |. 68 A6364200 push CrackMe.004236A6
004013BD |. 64:A1 00000000 mov eax,dword ptr fs:[0]
004013C3 |. 50 push eax
004013C4 |. 81EC 70020000 sub esp,270
004013CA |. A1 F0CB4200 mov eax,dword ptr ds:[42CBF0]
004013CF |. 33C4 xor eax,esp
004013D1 |. 898424 68020000 mov dword ptr ss:[esp+268],eax
004013D8 |. 53 push ebx
004013D9 |. 56 push esi
004013DA |. 57 push edi
004013DB |. A1 F0CB4200 mov eax,dword ptr ds:[42CBF0]
004013E0 |. 33C4 xor eax,esp
004013E2 |. 50 push eax
004013E3 |. 8D8424 80020000 lea eax,dword ptr ss:[esp+280]
004013EA |. 64:A3 00000000 mov dword ptr fs:[0],eax
004013F0 |. 33C0 xor eax,eax
004013F2 |. 68 FF000000 push 0FF
004013F7 |. 50 push eax
004013F8 |. 894424 49 mov dword ptr ss:[esp+49],eax
004013FC |. 894424 4D mov dword ptr ss:[esp+4D],eax
00401400 |. 66:894424 51 mov word ptr ss:[esp+51],ax
00401405 |. 884424 7C mov byte ptr ss:[esp+7C],al
00401409 |. 8D4424 7D lea eax,dword ptr ss:[esp+7D]
0040140D |. 8BD9 mov ebx,ecx
0040140F |. 50 push eax
00401410 |. 895C24 30 mov dword ptr ss:[esp+30],ebx
00401414 |. E8 C7F70000 call CrackMe.00410BE0
00401419 |. 68 FF000000 push 0FF
0040141E |. 8D8C24 84000000 lea ecx,dword ptr ss:[esp+84]
00401425 |. 6A 00 push 0
00401427 |. 51 push ecx
00401428 |. E8 B3F70000 call CrackMe.00410BE0
0040142D |. 83C4 18 add esp,18
00401430 |. 8D5424 74 lea edx,dword ptr ss:[esp+74]
00401434 |. 52 push edx ; /Buffer
00401435 |. 68 FF000000 push 0FF ; |BufSize = FF (255.)
0040143A |. FF15 7C424200 call dword ptr ds:[<&KERNEL32.GetCurrentDirect>; \GetCurrentDirectoryA
00401440 |. B0 61 mov al,61
00401442 |. 8D7C24 74 lea edi,dword ptr ss:[esp+74]
00401446 |. C64424 40 CA mov byte ptr ss:[esp+40],0CA
0040144B |. 884424 46 mov byte ptr ss:[esp+46],al
0040144F |. C64424 43 DD mov byte ptr ss:[esp+43],0DD
00401454 |. C64424 49 00 mov byte ptr ss:[esp+49],0
00401459 |. C64424 47 74 mov byte ptr ss:[esp+47],74
0040145E |. C64424 41 FD mov byte ptr ss:[esp+41],0FD
00401463 |. C64424 44 2E mov byte ptr ss:[esp+44],2E
00401468 |. C64424 45 64 mov byte ptr ss:[esp+45],64
0040146D |. C64424 42 BE mov byte ptr ss:[esp+42],0BE
00401472 |. 884424 48 mov byte ptr ss:[esp+48],al
00401476 |. 83C7 FF add edi,-1
00401479 |. 8DA424 00000000 lea esp,dword ptr ss:[esp]
00401480 |> 8A47 01 /mov al,byte ptr ds:[edi+1]
00401483 |. 83C7 01 |add edi,1
00401486 |. 84C0 |test al,al
00401488 |.^ 75 F6 \jnz short CrackMe.00401480
0040148A |. 66:A1 707A4200 mov ax,word ptr ds:[427A70]
00401490 |. 66:8907 mov word ptr ds:[edi],ax
00401493 |. 8D4424 40 lea eax,dword ptr ss:[esp+40]
00401497 |. 8BD0 mov edx,eax
00401499 |. 8DA424 00000000 lea esp,dword ptr ss:[esp]
004014A0 |> 8A08 /mov cl,byte ptr ds:[eax]
004014A2 |. 83C0 01 |add eax,1
004014A5 |. 84C9 |test cl,cl
004014A7 |.^ 75 F7 \jnz short CrackMe.004014A0
004014A9 |. 8D7C24 74 lea edi,dword ptr ss:[esp+74]
004014AD |. 2BC2 sub eax,edx
004014AF |. 83C7 FF add edi,-1
004014B2 |> 8A4F 01 /mov cl,byte ptr ds:[edi+1]
004014B5 |. 83C7 01 |add edi,1
004014B8 |. 84C9 |test cl,cl
004014BA |.^ 75 F6 \jnz short CrackMe.004014B2
004014BC |. 8BC8 mov ecx,eax
004014BE |. C1E9 02 shr ecx,2
004014C1 |. 8BF2 mov esi,edx
004014C3 |. F3:A5 rep movs dword ptr es:[edi],dword ptr ds:[esi]
004014C5 |. 8BC8 mov ecx,eax
004014C7 |. 83E1 03 and ecx,3
004014CA |. 68 FF000000 push 0FF
004014CF |. F3:A4 rep movs byte ptr es:[edi],byte ptr ds:[esi]
004014D1 |. 8D8C24 78010000 lea ecx,dword ptr ss:[esp+178]
004014D8 |. 6A 00 push 0
004014DA |. 51 push ecx
004014DB |. E8 00F70000 call CrackMe.00410BE0
004014E0 |. 83C4 0C add esp,0C
004014E3 |. 8D9424 74010000 lea edx,dword ptr ss:[esp+174]
004014EA |. 52 push edx ; /Arg1
004014EB |. 8BCB mov ecx,ebx ; |
004014ED |. E8 EE010000 call CrackMe.004016E0 ; \CrackMe.004016E0
004014F2 |. 8D4C24 14 lea ecx,dword ptr ss:[esp+14]
004014F6 |. E8 3E940000 call CrackMe.0040A939
004014FB |. 6A 00 push 0
004014FD |. 6A 00 push 0
004014FF |. 8D4424 7C lea eax,dword ptr ss:[esp+7C]
00401503 |. 50 push eax
00401504 |. 8D4C24 20 lea ecx,dword ptr ss:[esp+20]
00401508 |. C78424 94020000 00>mov dword ptr ss:[esp+294],0
00401513 |. E8 8D980000 call CrackMe.0040ADA5
00401518 |. 85C0 test eax,eax
0040151A |. 8D4C24 14 lea ecx,dword ptr ss:[esp+14]
0040151E |. 0F84 84010000 je CrackMe.004016A8
00401524 |. E8 03930000 call CrackMe.0040A82C
00401529 |. 8BF0 mov esi,eax
0040152B |. 56 push esi
0040152C |. E8 870A0000 call CrackMe.00401FB8
00401531 |. 83C4 04 add esp,4
00401534 |. 8BD8 mov ebx,eax
00401536 |. 56 push esi ; /Arg2
00401537 |. 53 push ebx ; |Arg1
00401538 |. 8D4C24 1C lea ecx,dword ptr ss:[esp+1C] ; |
0040153C |. E8 06910000 call CrackMe.0040A647 ; \CrackMe.0040A647
00401541 |. 8D4C24 14 lea ecx,dword ptr ss:[esp+14]
00401545 |. E8 8D930000 call CrackMe.0040A8D7
0040154A |. 33C9 xor ecx,ecx
0040154C |. 33C0 xor eax,eax
0040154E |. 3BF1 cmp esi,ecx
00401550 |. 7E 0B jle short CrackMe.0040155D
00401552 |> 803403 26 /xor byte ptr ds:[ebx+eax],26
00401556 |. 83C0 01 |add eax,1
00401559 |. 3BC6 |cmp eax,esi
0040155B |.^ 7C F5 \jl short CrackMe.00401552
0040155D |> 894C24 28 mov dword ptr ss:[esp+28],ecx
00401561 |. 894C24 30 mov dword ptr ss:[esp+30],ecx
00401565 |. 894C24 2C mov dword ptr ss:[esp+2C],ecx
00401569 |. 53 push ebx
0040156A |. 8BCE mov ecx,esi
0040156C |. 8D7C24 2C lea edi,dword ptr ss:[esp+2C]
00401570 |. C68424 8C020000 01 mov byte ptr ss:[esp+28C],1
00401578 |. E8 73040000 call CrackMe.004019F0
0040157D |. 85C0 test eax,eax
0040157F |. 75 25 jnz short CrackMe.004015A6
00401581 |. 53 push ebx
00401582 |. E8 360A0000 call CrackMe.00401FBD
00401587 |. 83C4 04 add esp,4
0040158A |. 837C24 28 00 cmp dword ptr ss:[esp+28],0
0040158F |. 0F84 0F010000 je CrackMe.004016A4
00401595 |. 8B4C24 30 mov ecx,dword ptr ss:[esp+30]
00401599 |. 68 00800000 push 8000
0040159E |. 6A 00 push 0
004015A0 |. 51 push ecx
004015A1 |. E9 F8000000 jmp CrackMe.0040169E
004015A6 |> 8D9424 74010000 lea edx,dword ptr ss:[esp+174]
004015AD |. 52 push edx ; /Arg2
004015AE |. 8D4424 2C lea eax,dword ptr ss:[esp+2C] ; |
004015B2 |. 50 push eax ; |Arg1
004015B3 |. E8 F8040000 call CrackMe.00401AB0 ; \CrackMe.00401AB0
004015B8 |. 8B0D 747A4200 mov ecx,dword ptr ds:[427A74]
004015BE |. 8B15 787A4200 mov edx,dword ptr ds:[427A78]
004015C4 |. 8BF8 mov edi,eax
004015C6 |. A1 7C7A4200 mov eax,dword ptr ds:[427A7C]
004015CB |. 894C24 64 mov dword ptr ss:[esp+64],ecx
004015CF |. 8A0D 807A4200 mov cl,byte ptr ds:[427A80]
004015D5 |. 894424 6C mov dword ptr ss:[esp+6C],eax
004015D9 |. 895424 68 mov dword ptr ss:[esp+68],edx
004015DD |. 884C24 70 mov byte ptr ss:[esp+70],cl
004015E1 |. 33C0 xor eax,eax
004015E3 |> 8A5404 64 /mov dl,byte ptr ss:[esp+eax+64]
004015E7 |. 80EA 01 |sub dl,1
004015EA |. 80F2 38 |xor dl,38
004015ED |. 885404 64 |mov byte ptr ss:[esp+eax+64],dl
004015F1 |. 83C0 01 |add eax,1
004015F4 |. 83F8 0B |cmp eax,0B
004015F7 |.^ 7C EA \jl short CrackMe.004015E3
004015F9 |. 33F6 xor esi,esi
004015FB |. EB 03 jmp short CrackMe.00401600
004015FD | 8D49 00 lea ecx,dword ptr ds:[ecx]
00401600 |> 807434 40 38 /xor byte ptr ss:[esp+esi+40],38
00401605 |. 807C34 40 32 |cmp byte ptr ss:[esp+esi+40],32
0040160A |. 76 0E |jbe short CrackMe.0040161A
0040160C |. 8B4C24 24 |mov ecx,dword ptr ss:[esp+24]
00401610 |. 8D4424 40 |lea eax,dword ptr ss:[esp+40]
00401614 |. 50 |push eax ; /Arg1
00401615 |. E8 C6000000 |call CrackMe.004016E0 ; \CrackMe.004016E0
0040161A |> 83C6 01 |add esi,1
0040161D |. 83FE 09 |cmp esi,9
00401620 |.^ 7C DE \jl short CrackMe.00401600
00401622 |. 85FF test edi,edi
00401624 |. 74 5C je short CrackMe.00401682
00401626 |. B1 B9 mov cl,0B9
00401628 |. 884C24 52 mov byte ptr ss:[esp+52],cl
0040162C |. 884C24 58 mov byte ptr ss:[esp+58],cl
00401630 |. 8D4C24 58 lea ecx,dword ptr ss:[esp+58]
00401634 |. B0 B2 mov al,0B2
00401636 |. 51 push ecx
00401637 |. 8D5424 50 lea edx,dword ptr ss:[esp+50]
0040163B |. 52 push edx
0040163C |. C64424 54 D7 mov byte ptr ss:[esp+54],0D7
00401641 |. C64424 55 A2 mov byte ptr ss:[esp+55],0A2
00401646 |. C64424 61 A7 mov byte ptr ss:[esp+61],0A7
0040164B |. C64424 57 E1 mov byte ptr ss:[esp+57],0E1
00401650 |. C64424 5C A3 mov byte ptr ss:[esp+5C],0A3
00401655 |. C64424 5B A6 mov byte ptr ss:[esp+5B],0A6
0040165A |. C64424 62 CF mov byte ptr ss:[esp+62],0CF
0040165F |. C64424 58 B3 mov byte ptr ss:[esp+58],0B3
00401664 |. 884424 56 mov byte ptr ss:[esp+56],al
00401668 |. C64424 59 C9 mov byte ptr ss:[esp+59],0C9
0040166D |. C64424 5D A1 mov byte ptr ss:[esp+5D],0A1
00401672 |. C64424 5E 00 mov byte ptr ss:[esp+5E],0
00401677 |. C64424 64 00 mov byte ptr ss:[esp+64],0
0040167C |. 884424 63 mov byte ptr ss:[esp+63],al
00401680 |. FFD7 call edi
00401682 |> 53 push ebx
00401683 |. E8 35090000 call CrackMe.00401FBD
00401688 |. 83C4 04 add esp,4
0040168B |. 837C24 28 00 cmp dword ptr ss:[esp+28],0
00401690 |. 74 12 je short CrackMe.004016A4
00401692 |. 8B4424 30 mov eax,dword ptr ss:[esp+30]
00401696 |. 68 00800000 push 8000 ; /FreeType = MEM_RELEASE
0040169B |. 6A 00 push 0 ; |Size = 0
0040169D |. 50 push eax ; |Address
0040169E |> FF15 50424200 call dword ptr ds:[<&KERNEL32.VirtualFree>] ; \VirtualFree
004016A4 |> 8D4C24 14 lea ecx,dword ptr ss:[esp+14]
004016A8 |> C78424 88020000 FF>mov dword ptr ss:[esp+288],-1
004016B3 |. E8 7D930000 call CrackMe.0040AA35
004016B8 |. 8B8C24 80020000 mov ecx,dword ptr ss:[esp+280]
004016BF |. 64:890D 00000000 mov dword ptr fs:[0],ecx
004016C6 |. 59 pop ecx
004016C7 |. 5F pop edi
004016C8 |. 5E pop esi
004016C9 |. 5B pop ebx
004016CA |. 8B8C24 68020000 mov ecx,dword ptr ss:[esp+268]
004016D1 |. 33CC xor ecx,esp
004016D3 |. E8 30E40000 call CrackMe.0040FB08
004016D8 |. 8BE5 mov esp,ebp
004016DA |. 5D pop ebp
004016DB \. C3 retn
希望对大家有用
|
能力值:
( LV12,RANK:210 )
|
-
-
10 楼
004016E0 /$ 83EC 68 sub esp,68
004016E3 |. A1 F0CB4200 mov eax,dword ptr ds:[42CBF0]
004016E8 |. 33C4 xor eax,esp
004016EA |. 894424 64 mov dword ptr ss:[esp+64],eax
004016EE |. 53 push ebx
004016EF |. 55 push ebp
004016F0 |. 8B6C24 74 mov ebp,dword ptr ss:[esp+74]
004016F4 |. 56 push esi
004016F5 |. 57 push edi
004016F6 |. 8B3D 80434200 mov edi,dword ptr ds:[<&USER32.Send>; user32.SendMessageA
004016FC |. 6A 00 push 0 ; /lParam = 0
004016FE |. 6A 00 push 0 ; |wParam = 0
00401700 |. 8BF1 mov esi,ecx ; |
00401702 |. 8B86 20010000 mov eax,dword ptr ds:[esi+120] ; |
00401708 |. 6A 0E push 0E ; |Message = WM_GETTEXTLENGTH
0040170A |. 50 push eax ; |hWnd
0040170B |. FFD7 call edi ; \SendMessageA
0040170D |. 8B8E 24010000 mov ecx,dword ptr ds:[esi+124]
00401713 |. 6A 00 push 0 ; /lParam = 0
00401715 |. 6A 00 push 0 ; |wParam = 0
00401717 |. 6A 0E push 0E ; |Message = WM_GETTEXTLENGTH
00401719 |. 51 push ecx ; |hWnd
0040171A |. 8BD8 mov ebx,eax ; |
0040171C |. FFD7 call edi ; \SendMessageA
0040171E |. 83F8 12 cmp eax,12 ; 假码的长度应该为18位, 否则就跳向错误
00401721 |. 0F85 69010000 jnz CrackMe.00401890
00401727 |. 83FB 20 cmp ebx,20
0040172A |. 0F8F 60010000 jg CrackMe.00401890
00401730 |. 85DB test ebx,ebx
00401732 |. 0F84 58010000 je CrackMe.00401890
00401738 |. 33C0 xor eax,eax
0040173A |. 8D5424 18 lea edx,dword ptr ss:[esp+18]
0040173E |. 52 push edx ; /lParam
0040173F |. 83C3 01 add ebx,1 ; |
00401742 |. 53 push ebx ; |wParam
00401743 |. 894424 20 mov dword ptr ss:[esp+20],eax ; |
00401747 |. 894424 24 mov dword ptr ss:[esp+24],eax ; |
0040174B |. 894424 28 mov dword ptr ss:[esp+28],eax ; |
0040174F |. 894424 2C mov dword ptr ss:[esp+2C],eax ; |
00401753 |. 894424 30 mov dword ptr ss:[esp+30],eax ; |
00401757 |. 894424 34 mov dword ptr ss:[esp+34],eax ; |
0040175B |. 894424 38 mov dword ptr ss:[esp+38],eax ; |
0040175F |. 894424 3C mov dword ptr ss:[esp+3C],eax ; |
00401763 |. 894424 40 mov dword ptr ss:[esp+40],eax ; |
00401767 |. 894424 44 mov dword ptr ss:[esp+44],eax ; |
0040176B |. 894424 48 mov dword ptr ss:[esp+48],eax ; |
0040176F |. 894424 4C mov dword ptr ss:[esp+4C],eax ; |
00401773 |. 894424 50 mov dword ptr ss:[esp+50],eax ; |
00401777 |. 894424 54 mov dword ptr ss:[esp+54],eax ; |
0040177B |. 894424 58 mov dword ptr ss:[esp+58],eax ; |
0040177F |. 894424 5C mov dword ptr ss:[esp+5C],eax ; |
00401783 |. 894424 60 mov dword ptr ss:[esp+60],eax ; |
00401787 |. 894424 64 mov dword ptr ss:[esp+64],eax ; |
0040178B |. 894424 68 mov dword ptr ss:[esp+68],eax ; |
0040178F |. 894424 6C mov dword ptr ss:[esp+6C],eax ; |
00401793 |. 8B86 20010000 mov eax,dword ptr ds:[esi+120] ; |
00401799 |. 6A 0D push 0D ; |Message = WM_GETTEXT
0040179B |. 50 push eax ; |hWnd
0040179C |. FFD7 call edi ; \SendMessageA
0040179E |. 8B96 24010000 mov edx,dword ptr ds:[esi+124]
004017A4 |. 8D4C24 40 lea ecx,dword ptr ss:[esp+40]
004017A8 |. 51 push ecx ; /lParam
004017A9 |. 6A 13 push 13 ; |wParam = 13
004017AB |. 6A 0D push 0D ; |Message = WM_GETTEXT
004017AD |. 52 push edx ; |hWnd
004017AE |. FFD7 call edi ; \SendMessageA
004017B0 |. 33FF xor edi,edi
004017B2 |. 8D4424 18 lea eax,dword ptr ss:[esp+18]
004017B6 |. 897C24 10 mov dword ptr ss:[esp+10],edi
004017BA |. 33C9 xor ecx,ecx
004017BC |. 8D70 01 lea esi,dword ptr ds:[eax+1]
004017BF |. 90 nop
004017C0 |> 8A10 /mov dl,byte ptr ds:[eax]
004017C2 |. 83C0 01 |add eax,1
004017C5 |. 84D2 |test dl,dl
004017C7 |.^ 75 F7 \jnz short CrackMe.004017C0
004017C9 |. 2BC6 sub eax,esi
004017CB |. 74 29 je short CrackMe.004017F6
004017CD |. 8D49 00 lea ecx,dword ptr ds:[ecx]
004017D0 |> 0FBE440C 18 /movsx eax,byte ptr ss:[esp+ecx+18]
004017D5 |. 03C1 |add eax,ecx ; ascii值加上 第N位减一
004017D7 |. 03F8 |add edi,eax ; ascii值累加
004017D9 |. 8D4424 18 |lea eax,dword ptr ss:[esp+18] ; 取用户名地址
004017DD |. 83C1 01 |add ecx,1 ; 计数器加一
004017E0 |. 8D70 01 |lea esi,dword ptr ds:[eax+1]
004017E3 |> 8A10 |/mov dl,byte ptr ds:[eax] ; 计算用户名长度
004017E5 |. 83C0 01 ||add eax,1
004017E8 |. 84D2 ||test dl,dl
004017EA |.^ 75 F7 |\jnz short CrackMe.004017E3
004017EC |. 2BC6 |sub eax,esi
004017EE |. 3BC8 |cmp ecx,eax
004017F0 |.^ 72 DE \jb short CrackMe.004017D0 ; 判断是否小于用户名长度
004017F2 |. 897C24 10 mov dword ptr ss:[esp+10],edi ; 保存 ascii的累加和
004017F6 |> 8D4424 68 lea eax,dword ptr ss:[esp+68]
004017FA |. 8BDD mov ebx,ebp
004017FC |. 8BC8 mov ecx,eax
004017FE |. 33FF xor edi,edi
00401800 |. 8D7424 40 lea esi,dword ptr ss:[esp+40] ; 取假码地址
00401804 |. 2BD9 sub ebx,ecx
00401806 |> 8B16 /mov edx,dword ptr ds:[esi]
00401808 |. 33C9 |xor ecx,ecx ; ECX 清零
0040180A |. 894C24 18 |mov dword ptr ss:[esp+18],ecx ; 变量初始化
0040180E |. 894C24 1C |mov dword ptr ss:[esp+1C],ecx
00401812 |. 894C24 20 |mov dword ptr ss:[esp+20],ecx
00401816 |. 894C24 24 |mov dword ptr ss:[esp+24],ecx
0040181A |. 894C24 28 |mov dword ptr ss:[esp+28],ecx
0040181E |. 894C24 2C |mov dword ptr ss:[esp+2C],ecx
00401822 |. 894C24 30 |mov dword ptr ss:[esp+30],ecx
00401826 |. 894C24 34 |mov dword ptr ss:[esp+34],ecx
0040182A |. 66:8B4E 04 |mov cx,word ptr ds:[esi+4]
0040182E |. 66:894C24 1C |mov word ptr ss:[esp+1C],cx
00401833 |. 895424 18 |mov dword ptr ss:[esp+18],edx
00401837 |. 66:C700 0000 |mov word ptr ds:[eax],0
0040183C |. 33C9 |xor ecx,ecx
0040183E |. 8BFF |mov edi,edi
00401840 |> 8A540C 18 |/mov dl,byte ptr ss:[esp+ecx+18]
00401844 |. 80FA 41 ||cmp dl,41 ; 判断是否小于A
00401847 |. 7C 47 ||jl short CrackMe.00401890
00401849 |. 80FA 48 ||cmp dl,48
0040184C |. 7F 42 ||jg short CrackMe.00401890 ; 判断是否大于H
0040184E |. 66:8B28 ||mov bp,word ptr ds:[eax]
00401851 |. 66:03ED ||add bp,bp
00401854 |. 66:03ED ||add bp,bp
00401857 |. 66:03ED ||add bp,bp
0040185A |. 0FBED2 ||movsx edx,dl
0040185D |. 66:03EA ||add bp,dx
00401860 |. 66:83ED 41 ||sub bp,41
00401864 |. 83C1 01 ||add ecx,1
00401867 |. 83F9 06 ||cmp ecx,6
0040186A |. 66:8928 ||mov word ptr ds:[eax],bp
0040186D |.^ 7C D1 |\jl short CrackMe.00401840
0040186F |. 66:8B4C24 10 |mov cx,word ptr ss:[esp+10]
00401874 |. 66:3108 |xor word ptr ds:[eax],cx
00401877 |. 0FB708 |movzx ecx,word ptr ds:[eax]
0040187A |. 66:890C03 |mov word ptr ds:[ebx+eax],cx
0040187E |. 83C7 01 |add edi,1
00401881 |. 83C6 06 |add esi,6
00401884 |. 83C0 02 |add eax,2
00401887 |. 83FF 03 |cmp edi,3
0040188A |.^ 0F82 76FFFFFF \jb CrackMe.00401806
00401890 |> 8B4C24 74 mov ecx,dword ptr ss:[esp+74]
00401894 |. 5F pop edi
00401895 |. 5E pop esi
00401896 |. 5D pop ebp
00401897 |. 5B pop ebx
00401898 |. 33CC xor ecx,esp
0040189A |. E8 69E20000 call CrackMe.0040FB08
0040189F |. 83C4 68 add esp,68
004018A2 \. C2 0400 retn 4
|
能力值:
( LV12,RANK:210 )
|
-
-
15 楼
我来翻页
00401622 |. 85FF test edi,edi ; EDI的值是关键
00401624 |. 74 5C je short CrackMe.00401682 ; 不能跳
00401626 |. B1 B9 mov cl,0B9
00401628 |. 884C24 52 mov byte ptr ss:[esp+52],cl
0040162C |. 884C24 58 mov byte ptr ss:[esp+58],cl
00401630 |. 8D4C24 58 lea ecx,dword ptr ss:[esp+58]
00401634 |. B0 B2 mov al,0B2
00401636 |. 51 push ecx
00401637 |. 8D5424 50 lea edx,dword ptr ss:[esp+50]
0040163B |. 52 push edx
0040163C |. C64424 54 D7 mov byte ptr ss:[esp+54],0D7 ; 注册成功解码
00401641 |. C64424 55 A2 mov byte ptr ss:[esp+55],0A2
00401646 |. C64424 61 A7 mov byte ptr ss:[esp+61],0A7
0040164B |. C64424 57 E1 mov byte ptr ss:[esp+57],0E1
00401650 |. C64424 5C A3 mov byte ptr ss:[esp+5C],0A3
00401655 |. C64424 5B A6 mov byte ptr ss:[esp+5B],0A6
0040165A |. C64424 62 CF mov byte ptr ss:[esp+62],0CF
0040165F |. C64424 58 B3 mov byte ptr ss:[esp+58],0B3
00401664 |. 884424 56 mov byte ptr ss:[esp+56],al
00401668 |. C64424 59 C9 mov byte ptr ss:[esp+59],0C9
0040166D |. C64424 5D A1 mov byte ptr ss:[esp+5D],0A1
00401672 |. C64424 5E 00 mov byte ptr ss:[esp+5E],0
00401677 |. C64424 64 00 mov byte ptr ss:[esp+64],0
0040167C |. 884424 63 mov byte ptr ss:[esp+63],al
00401680 |. FFD7 call edi ; EDI的值是关键,应该是call到一个地址,然后创建非模态对话框。
|