- UID
- 36431
注册时间2007-11-2
阅读权限20
最后登录1970-1-1
以武会友
该用户从未签到
|
破解PYG CrackMe2006 8.28自校验
先脱壳,然后开两个od比较文件的不同
下断点为: BP rtcFileLen ,回车, 然后F9运行,断下后,ALT+F9返回
ASPack 2.12 -> Alexey Solodovnikov
004034DC . 83C4 28 ADD ESP,28
004034DF . 81FE 003C0000 CMP ESI,3C00 ?
004034E5 . 74 06 JE SHORT 130C.004034ED 自校验
004034E7 . FF15 14104000 CALL DWORD PTR DS:[<&msvbvm60.__vbaEnd>] ; msvbvm60.__vbaEnd
004034ED > 8D4D B4 LEA ECX,DWORD PTR SS:[EBP-4C]
00403069 . 0FBF8D 48FFFF>MOVSX ECX,WORD PTR SS:[EBP-B8]
00403070 . 85C9 TEST ECX,ECX
00403072 . 0F84 98000000 JE 88.00403110 ?
00403078 . C745 FC 1D000>MOV DWORD PTR SS:[EBP-4],1D
0040307F . C745 9C 04000>MOV DWORD PTR SS:[EBP-64],80020004
00403086 . C745 94 0A000>MOV DWORD PTR SS:[EBP-6C],0A
0040308D . C745 AC 04000>MOV DWORD PTR SS:[EBP-54],80020004
00403094 . C745 A4 0A000>MOV DWORD PTR SS:[EBP-5C],0A
0040309B . C785 7CFFFFFF>MOV DWORD PTR SS:[EBP-84],88.004022BC
004030A5 . C785 74FFFFFF>MOV DWORD PTR SS:[EBP-8C],8
004030AF . 8D95 74FFFFFF LEA EDX,DWORD PTR SS:[EBP-8C]
004030B5 . 8D4D B4 LEA ECX,DWORD PTR SS:[EBP-4C]
004030B8 . FF15 B4104000 CALL DWORD PTR DS:[<&msvbvm60.__vbaVarDu>; msvbvm60.__vbaVarDup
004030BE . C745 8C A8224>MOV DWORD PTR SS:[EBP-74],88.004022A8
004030C5 . C745 84 08000>MOV DWORD PTR SS:[EBP-7C],8
004030CC . 8D55 84 LEA EDX,DWORD PTR SS:[EBP-7C]
004030CF . 8D4D C4 LEA ECX,DWORD PTR SS:[EBP-3C]
004030D2 . FF15 B4104000 CALL DWORD PTR DS:[<&msvbvm60.__vbaVarDu>; msvbvm60.__vbaVarDup
004030D8 . 8D55 94 LEA EDX,DWORD PTR SS:[EBP-6C]
004030DB . 52 PUSH EDX
004030DC . 8D45 A4 LEA EAX,DWORD PTR SS:[EBP-5C]
004030DF . 50 PUSH EAX
004030E0 . 8D4D B4 LEA ECX,DWORD PTR SS:[EBP-4C]
004030E3 . 51 PUSH ECX
004030E4 . 6A 40 PUSH 40
004030E6 . 8D55 C4 LEA EDX,DWORD PTR SS:[EBP-3C]
004030E9 . 52 PUSH EDX
004030EA . FF15 38104000 CALL DWORD PTR DS:[<&msvbvm60.rtcMsgBox>>; msvbvm60.rtcMsgBox
004030F0 . 8D45 94 LEA EAX,DWORD PTR SS:[EBP-6C]
004030F3 . 50 PUSH EAX
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?加入我们
x
|