- UID
- 2446
注册时间2005-7-21
阅读权限30
最后登录1970-1-1
龙战于野
该用户从未签到
|
发表于 2006-5-28 21:17:15
|
显示全部楼层
应该只是简单的FindWindow反调试,修改版没事
命令行下断 BP FindWindowA ,中断后返回
0046C051 55 push ebp
0046C052 68 C0C14600 push Crackme_.0046C1C0
0046C057 64:FF30 push dword ptr fs:[eax]
0046C05A 64:8920 mov dword ptr fs:[eax],esp
0046C05D B8 D0C14600 mov eax,Crackme_.0046C1D0 ; ASCII "OllyDbg"
0046C062 8945 D8 mov dword ptr ss:[ebp-28],eax
0046C065 B8 D8C14600 mov eax,Crackme_.0046C1D8 ; ASCII "UkillOD"
0046C06A 8945 DC mov dword ptr ss:[ebp-24],eax
0046C06D B8 E0C14600 mov eax,Crackme_.0046C1E0 ; ASCII "FuckAll"
0046C072 8945 E0 mov dword ptr ss:[ebp-20],eax
0046C075 B8 E8C14600 mov eax,Crackme_.0046C1E8
0046C07A 8945 E4 mov dword ptr ss:[ebp-1C],eax
0046C07D B8 F0C14600 mov eax,Crackme_.0046C1F0 ; ASCII "WHXMDI0"
0046C082 8945 E8 mov dword ptr ss:[ebp-18],eax
0046C085 B8 F8C14600 mov eax,Crackme_.0046C1F8 ; ASCII "NMSCMW50"
0046C08A 8945 EC mov dword ptr ss:[ebp-14],eax
0046C08D B8 04C24600 mov eax,Crackme_.0046C204 ; ASCII "gold"
0046C092 8945 F0 mov dword ptr ss:[ebp-10],eax
0046C095 B8 0CC24600 mov eax,Crackme_.0046C20C ; ASCII "W32dasm"
0046C09A 8945 F4 mov dword ptr ss:[ebp-C],eax
0046C09D B8 14C24600 mov eax,Crackme_.0046C214 ; ASCII "DeDe"
0046C0A2 8945 F8 mov dword ptr ss:[ebp-8],eax
0046C0A5 B8 1CC24600 mov eax,Crackme_.0046C21C ; ASCII "DArk"
0046C0AA 8945 FC mov dword ptr ss:[ebp-4],eax
0046C0AD BE 0A000000 mov esi,0A
0046C0B2 8D7D D8 lea edi,dword ptr ss:[ebp-28]
0046C0B5 6A 00 push 0
0046C0B7 8B07 mov eax,dword ptr ds:[edi]
0046C0B9 50 push eax
0046C0BA E8 E1A2F9FF call <jmp.&user32.FindWindowA>
0046C0BF 8BD8 mov ebx,eax ; 返回这里
0046C0C1 85DB test ebx,ebx
0046C0C3 74 5E je short Crackme_.0046C123 ;修改为 JMP 跳过反调试
………………省略部分………………
0046C133 50 push eax
0046C134 6A 00 push 0
0046C136 E8 65A2F9FF call <jmp.&user32.FindWindowA>
0046C13B 8BD8 mov ebx,eax
0046C13D 85DB test ebx,ebx
0046C13F 74 5E je short Crackme_.0046C19F ; 修改为JMP
PEID 查到密码学算法base64 & des,我就不看了```哈``` |
|