- UID
- 14759
注册时间2006-6-3
阅读权限8
最后登录1970-1-1
初入江湖
该用户从未签到
|
用 Armadillo 5.42 加的记事本.
<------- 27-08-2008 14:36:31 ------->
C:\Documents and Settings\Administrator\桌面\notepad.exe
!- Protected Armadillo
Protection system (Professional)
!- <Protection Options>
Standard protection or Minimum protection
!- <Backup Key Options>
Fixed Backup Keys
!- <Compression Options>
Best/Slowest Compression
!- <Other Options>
!- Version 5.42 20-02-2008
!- Elapsed Time 00h 00m 00s 547ms
-------------------------------------------
忽略所有异常
下断: GetModuleHandleA+5
在shift+f9 110次后
堆栈
0007943C /0007EB50
00079440 |009E5805 返回到 009E5805 来自 kernel32.GetModuleHandleA
00079444 |00A11BA8 ASCII "kernel32.dll"
00079448 |00A12B30 ASCII "VirtualAlloc"
0007944C |4145C5FB
0007943C /0007EB50
00079440 |009E5823 返回到 009E5823 来自 kernel32.GetModuleHandleA
00079444 |00A11BA8 ASCII "kernel32.dll"
00079448 |00A12B24 ASCII "VirtualFree"
0007944C |4145C5FB
00079188 /00079440
0007918C |009C8064 返回到 009C8064 来自 kernel32.GetModuleHandleA
00079190 |00079308 ASCII "kernel32.dll"
00079194 |00000000
00079198 |0106B370 2.0106B370
断在这里
7C80B6A6 837D 08 00 cmp dword ptr [ebp+8], 0
7C80B6AA 74 18 je short 7C80B6C4
7C80B6AC FF75 08 push dword ptr [ebp+8]
7C80B6AF E8 C0290000 call 7C80E074
7C80B6B4 85C0 test eax, eax
7C80B6B6 74 08 je short 7C80B6C0
7C80B6B8 FF70 04 push dword ptr [eax+4]
7C80B6BB E8 7D2D0000 call GetModuleHandleW
7C80B6C0 5D pop ebp
7C80B6C1 C2 0400 retn 4
取消断点,ALT+F9运行返回!
停在这里:
009C8064 8B55 F4 mov edx, dword ptr [ebp-C]
009C8067 8B0D 84EFA100 mov ecx, dword ptr [A1EF84]
009C806D 890491 mov dword ptr [ecx+edx*4], eax
009C8070 8B55 F4 mov edx, dword ptr [ebp-C]
009C8073 A1 84EFA100 mov eax, dword ptr [A1EF84]
009C8078 833C90 00 cmp dword ptr [eax+edx*4], 0
009C807C 75 5C jnz short 009C80DA
009C807E 8B4D F8 mov ecx, dword ptr [ebp-8]
009C8081 8B51 08 mov edx, dword ptr [ecx+8]
009C8084 83E2 02 and edx, 2
009C8087 74 38 je short 009C80C1
009C8089 B8 0F000000 mov eax, 0F
009C808E C1E0 02 shl eax, 2
009C8091 8B0D 04CBA100 mov ecx, dword ptr [A1CB04] ; 2.0106B370
009C8097 8B15 04CBA100 mov edx, dword ptr [A1CB04] ; 2.0106B370
009C809D 8B35 04CBA100 mov esi, dword ptr [A1CB04] ; 2.0106B370
009C80A3 8B5E 18 mov ebx, dword ptr [esi+18]
009C80A6 335A 10 xor ebx, dword ptr [edx+10]
009C80A9 331C01 xor ebx, dword ptr [ecx+eax]
009C80AC 83E3 10 and ebx, 10
009C80AF F7DB neg ebx
009C80B1 1BDB sbb ebx, ebx
009C80B3 F7DB neg ebx
009C80B5 0FB6C3 movzx eax, bl
009C80B8 85C0 test eax, eax
009C80BA 75 05 jnz short 009C80C1
009C80BC ^ E9 1BFFFFFF jmp 009C7FDC
009C80C1 8D8D C8FEFFFF lea ecx, dword ptr [ebp-138]
009C80C7 51 push ecx
009C80C8 FF15 88F0A000 call dword ptr [A0F088] ; kernel32.LoadLibraryA
009C80CE 8B55 F4 mov edx, dword ptr [ebp-C]
009C80D1 8B0D 84EFA100 mov ecx, dword ptr [A1EF84]
009C80D7 890491 mov dword ptr [ecx+edx*4], eax
009C80DA 8B55 F4 mov edx, dword ptr [ebp-C]
009C80DD A1 84EFA100 mov eax, dword ptr [A1EF84]
009C80E2 833C90 00 cmp dword ptr [eax+edx*4], 0
009C80E6 75 05 jnz short 009C80ED
009C80E8 ^ E9 EFFEFFFF jmp 009C7FDC
009C80ED C785 BCFEFFFF 0>mov dword ptr [ebp-144], 0
009C80F7 C785 C0FEFFFF 0>mov dword ptr [ebp-140], 0
009C8101 8B4D F8 mov ecx, dword ptr [ebp-8]
009C8104 8B51 04 mov edx, dword ptr [ecx+4]
009C8107 8995 C4FEFFFF mov dword ptr [ebp-13C], edx
009C810D EB 0F jmp short 009C811E
009C810F 8B85 C4FEFFFF mov eax, dword ptr [ebp-13C]
009C8115 83C0 0C add eax, 0C
009C8118 8985 C4FEFFFF mov dword ptr [ebp-13C], eax
009C811E 8B8D C4FEFFFF mov ecx, dword ptr [ebp-13C]
009C8124 8339 00 cmp dword ptr [ecx], 0
009C8127 74 11 je short 009C813A
009C8129 8B95 C0FEFFFF mov edx, dword ptr [ebp-140]
009C812F 83C2 01 add edx, 1
009C8132 8995 C0FEFFFF mov dword ptr [ebp-140], edx
009C8138 ^ EB D5 jmp short 009C810F
009C813A 33C9 xor ecx, ecx
009C813C 8B85 C0FEFFFF mov eax, dword ptr [ebp-140]
009C8142 BA 04000000 mov edx, 4
009C8147 F7E2 mul edx
009C8149 0F90C1 seto cl
009C814C F7D9 neg ecx
009C814E 0BC8 or ecx, eax
009C8150 51 push ecx
009C8151 E8 59050300 call 009F86AF
009C8156 83C4 04 add esp, 4
009C8159 8985 7CFDFFFF mov dword ptr [ebp-284], eax
009C815F 8B45 F4 mov eax, dword ptr [ebp-C]
009C8162 8B0D 7CEFA100 mov ecx, dword ptr [A1EF7C]
009C8168 8B95 7CFDFFFF mov edx, dword ptr [ebp-284]
009C816E 891481 mov dword ptr [ecx+eax*4], edx
009C8171 33C9 xor ecx, ecx
009C8173 8B85 C0FEFFFF mov eax, dword ptr [ebp-140]
009C8179 BA 04000000 mov edx, 4
009C817E F7E2 mul edx
009C8180 0F90C1 seto cl
009C8183 F7D9 neg ecx
009C8185 0BC8 or ecx, eax
009C8187 51 push ecx
009C8188 E8 22050300 call 009F86AF
009C818D 83C4 04 add esp, 4
009C8190 8985 78FDFFFF mov dword ptr [ebp-288], eax
009C8196 8B45 F4 mov eax, dword ptr [ebp-C]
009C8199 8B0D 80EFA100 mov ecx, dword ptr [A1EF80]
那传说中的Magic Jump! 在哪里呢?
我是菜鸟级别,请各位给点提示.
好像这样做不对,哪位高人可以定个教程出来啊. |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?加入我们
x
|