EBPIG |
|
MHJDQ |
֪ʶ¹²ÏíJ×ÊÔ´¹²ÏíJ×ÊÁϹ²Ïí | |
¡¾·¢ÐÐʱ¼ä¡¿2000-11-18 |
¡¾ÆÚ¿¯ºÅÂë¡¿µÚ¶þʮһÆÚ |
¡¾ÍøÕ¾µØÖ·¡¿http://programhunter.myetang.com |
¡¾°æȨÉùÃ÷¡¿¡â¨x¨y¨z¨{¨|¨}¨~¨€³ÌʽÁÔÈ˨€¨~¨}¨|¨{¨z¨y¨x¡á |
|
´ËÔÓÖ¾ÓɳÌʽÁÔÈ˱༡¢ÖÆ×÷¼°·¢ÐУ»ÔÓÖ¾¿ÉÒÔ×ÔÓÉתÔØ¡¢·Ö·¢ºÍ´«²¥£»ÈκθöÈË»òÍÅÌå²»µÃÔÚδ¾±¾ÈËÊÚȨµÄÇé¿öÏÂÐÞ¸ÄÔÓÖ¾µÄÍâ¹Û¼°ÄÚÈÝ£»ÔÓÖ¾µÄ½âÊÍȨ¹é³ÌʽÁÔÈËËùÓС£ | |
¡¾±à¼¼ÄÓï¡¿ |
{~._.~}
( Y )
()~*~()
(_)-(_) |
ÿ½ñÌì±¾Ó¦µ±Ïò´ó¼Ò·¢ÐÐÎÒ·ÒëµÄ¹ØÓÚPEµÄÎÄÕ£¬¿ÉÊÇÎÒÏëÓ¦µ±×ÐϸµÄÑо¿Ò»ÏÂÆäËûÈ˹ØÓÚimport
table·½ÃæÎÄÕ£¬±Ï¾¹ÓÐÐí¶àµ¥´ÊµÄÒâ˼²»ÊǺܺ÷Ò룬²¢ÇÒ·ÒëºóûÓÐÒ»¸öͳһµÄ±ê×¼£¬ËùÒÔ×¼±¸ÔÚÏÂÖÜÏò´ó¼Ò½éÉÜ£¬Ï£Íû´ó¼ÒÄܹ»ÔÁ¹£¬²¢ÇÒÕâ¶Îʱ¼ä±¾ÈËÒ²±È½Ï棬ËùÒÔ¶ÔÓÚÆƽⷽÃæµÄ¹¤×÷»¨µÄÒ²ÉÙ£¬ÔÙÒ»´ÎÏ£Íû´ó¼ÒÁ¹½â¡£
| |
|
¡¾Ä¿ ÿÿ ¼¡¿ |
|
|
&¡¾ÆƽâÐĵá¿ |
PixWizard ver 1.24
³ÌʽÁÔÈË
¼ò½é£ºÖ§³ÖÏ൱¶àͼÐÎÎļþ¸ñʽ¼°ÈÝÒ×ʹÓõÄÐãͼÈí¼þ£¬³ýÁËÐãͼÍ⣬»¹¿É×öÓ°Ïñ´¦
Àí£¬×ª»»£¬ÆÁĻߢȡµÈ£¬Ö§³ÖOS/2µÄBMP£¬WindowsµÄBMP£¬EMF£¬GIF£¬IFF£¬
JPEG£¬MAC£¬MSP£¬PCD£¬PCX£¬PIC£¬PICT£¬PNG£¬PPM£¬Targa£¬TIFF£¬WMF£¬WPGµÈ
¸ñʽµÄÐãͼºÍͼÐÎÎļþת»»¡£
×·×Ù£ºÕâ¸öÈí¼þÊÇtime bombÀàÐ͵ÄÈí¼þ£¬ËùÒÔ½«ËüµÄʱ¼äÏÞÖÆɾ³ý¾Í¿ÉÒÔÁË¡£
ʹÓÃW32À´·´»ã±àÕâ¸öÈí¼þºó²éÕÒ×Ö·û´®£¬ÈçÏ£º
|:004074C3(C)
|
* Possible StringData Ref from Data Obj ->"days"
|
:004074CC 68F8E54700 push 0047E5F8
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004074CA(U)
|
:004074D1 8D4C2414 lea ecx, dword ptr [esp+14]
* Reference To: MFC42.Ordinal:03AD, Ord:03ADh
|
:004074D5 E8E0390200 Call 0042AEBA
* Possible StringData Ref from Data Obj ->" left in your evaluation period."
|
:004074DA 68D4E54700 push 0047E5D4
:004074DF 8D4C2414 lea ecx, dword ptr [esp+14]
* Reference To: MFC42.Ordinal:03AD, Ord:03ADh
|
:004074E3 E8D2390200 Call 0042AEBA
:004074E8 EB0E jmp 004074F8
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00407484(C), :00407489(C)
|
* Possible StringData Ref from Data Obj ->"Your evaluation period has expired."
|
:004074EA 68B0E54700 push 0047E5B0
:004074EF 8D4C2414 lea ecx, dword ptr [esp+14]
* Reference To: MFC42.Ordinal:035C, Ord:035Ch
|
:004074F3 E8DA390200 Call 0042AED2
ÔÚÕâÉÏÃæ¿ÉÒÔ¿´µ½³ÌÐòÔÚÊÔÓÃÆÚÄں͹ýÆÚµÄ×Ö·û´®£¬ËùÒÔÏòÉϲéÕҴӺδ¦ÌøÔ¾µ½ÕâÀïÀ´µÄ¡£
* Reference To: MFC42.Ordinal:0B02, Ord:0B02h
|
:00407474 E8353A0200 Call 0042AEAE
:00407479 8B86FC000000 mov eax, dword ptr [esi+000000FC]
:0040747F 83C40C add esp, 0000000C
:00407482 3BC5 cmp eax, ebp
:00407484 7E64 jle 004074EA
:00407486 83F81E cmp eax, 0000001E
:00407489 7F5F jg 004074EA
´ÓÕâÀïÌøÔ¾ÏòÉÏÃæµÄµØ·½£¬ÏÖÔÚÖªµÀÁË£¬Ö»Òª½«ÕâÀïÐÞ¸ÄһϾͿÉÒÔÆƽâÕâ¸öÈí¼þµÄʱ¼äÕ¨µ¯ÁË¡£
ÏÖÔÚ´ó¼ÒͬһÑùÈÏΪÕâÑù×öÆƽâ¾ÍËãÍê³ÉÁË£¬¿ÉÊÇÈç¹ûÄã°´ÕÕÉÏÃæÈ¥×öµÄ»°£¬»áµÃµ½Ê²Ã´
µÄ½á¹ûÄØ£¿ÎÒÐÞ¸ÄÍêºóÔÙÔËÐгÌÐò£¬³ÌÐò¾ÍÎÞÂÛÈçºÎÒ²²»ÔÙ³öÏÖ´°¿ÚÁË¡£
ÎÒÏë³ÌÐòºÜÓпÉÄÜÊÇÓÐCRCÑéÖ¤¹ý³Ì£¬ÎÒÃÇÔÙ×·×Ù£¬¿´Ò»¿´³ÌÐòµ½µ×ÊÇÔÚÄÄÀïʹÓÃÁËCRCÑé
Ö¤¹ý³Ì¡£
:0041F32C E8E5C50000 Call 0042B916
:0041F331 8D9424B4010000 lea edx, dword ptr [esp+000001B4]
:0041F338 6804010000 push 00000104
:0041F33D 52 push edx
:0041F33E 8D8C24BC010000 lea ecx, dword ptr [esp+000001BC]
:0041F345 E8360A0000 call 0041FD80
:0041F34A 3B442418 cmp eax, dword ptr [esp+18]
:0041F34E 743A je 0041F38A
:0041F350 8D8C249C000000 lea ecx, dword ptr [esp+0000009C]
:0041F357 C684246408000004 mov byte ptr [esp+00000864], 04
:0041F35F E8AB540200 call 0044480F
:0041F364 8D8C248C000000 lea ecx, dword ptr [esp+0000008C]
:0041F36B 889C2464080000 mov byte ptr [esp+00000864], bl
* Reference To: MFC42.Ordinal:0299, Ord:0299h
|
:0041F372 E899C50000 Call 0042B910
:0041F377 8D4C2410 lea ecx, dword ptr [esp+10]
:0041F37B C684246408000001 mov byte ptr [esp+00000864], 01
* Reference To: MFC42.Ordinal:0320, Ord:0320h
|
:0041F383 E81ABB0000 Call 0042AEA2
:0041F388 EB40 jmp 0041F3CA
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0041F34E(C)
|
* Possible StringData Ref from Data Obj ->"Shareware Version"
|
:0041F38A 68308B4A00 push 004A8B30
:0041F38F 8D8C24B8010000 lea ecx, dword ptr [esp+000001B8]
:0041F396 E825EFFFFF call 0041E2C0
:0041F39B 8BF0 mov esi, eax
:0041F39D 889C2464080000 mov byte ptr [esp+00000864], bl
:0041F3A4 85F6 test esi, esi
:0041F3A6 8D8C248C000000 lea ecx, dword ptr [esp+0000008C]
:0041F3AD 7423 je 0041F3D2
:0041F3AF E87C090000 call 0041FD30
:0041F3B4 8D4C2410 lea ecx, dword ptr [esp+10]
:0041F3B8 C684246408000001 mov byte ptr [esp+00000864], 01
* Reference To: MFC42.Ordinal:0320, Ord:0320h
|
:0041F3C0 E8DDBA0000 Call 0042AEA2
:0041F3C5 83FE01 cmp esi, 00000001
:0041F3C8 741E je 0041F3E8
¾¹ý×·×Ù£¬·¢ÏÖÔÚÉÏÃæµÄ±È½ÏµØ·½ÊǹؼüµÄÌøÔ¾£¬ÕâÀïÈç¹û¸Äµôºó£¬¾Í¿ÉÒÔÔËÐÐÁË¡£
ÏÖÔÚ½«Ê±¼äµ÷ºóÒ»Ä꣬ÔÙÔËÐгÌÐò£¬´ó¼ÒÏëÒ»ÏëÈçºÎ£¬³ÌÐò³öÏÖ³ÌÐò´°¿Ú£¬Ò²³öÏÖÁËÌáʾ
´°¿Ú£¬µ«ÊǾÍÊǵ±Äãµã»÷contuneºó£¬³ÌÐò×Ô¶¯Í˳ö£¬ËùÒÔ˵Õâ¸ö³ÌÐò»¹ÓÐÑéÖ¤µØ·½£¬Ã»ÓÐ
°ì·¨£¬ÔÙ×·×Ù¡£ÔڱȽÏʱ¼äµÄµØ·½ÏòÏÂ×·×Ù£¬ÒòΪ³ÌÐòÔÚÄÄÀï¿ÉÒÔ±»À¹ÏÂÀ´£¬ËùÒÔ¾ÍÏòÏÂ×·×Ù£º
:00407547 50 push eax
:00407548 8D4C2458 lea ecx, dword ptr [esp+58]
:0040754C FF5264 call [edx+64]
:0040754F 8B86FC000000 mov eax, dword ptr [esi+000000FC]
:00407555 3BC5 cmp eax, ebp
:00407557 7E0F jle 00407568
:00407559 83F81E cmp eax, 0000001E
:0040755C 7F0A jg 00407568
:0040755E C7860C01000001000000 mov dword ptr [esi+0000010C], 00000001
À´µ½ÕâÀ´ó¼Ò·¢ÏÖ°É£¬³ÌÐòÔÚÕâÀïÓÖÊÇÒ»¸öÑé֤ʱ¼äµÄµØ·½£¬²»Óöà˵£¬¸ÄµôËü£¬Õâ
»Ø³ÌÐòÔÙÔËÐУ¬¿ÉÒÔÁË£¬ÔÚÌáʾ´°¿ÚÖÐÌáʾÄãÒѾÊÇ-345ÌìÁË¡£
ÏÖÔÚ¿ÉÒÔ˵Õâ¸öÈí¼þÊÇÆƽâ³É¹¦ÁË¡£
|
|
duelist crackme 1 Æƽâ (Ï£ÍûתÔصÄʱºò±£³ÖÍêÕû£©
×÷Õß ¶¡¶¡Ïº ddxia/[CCG]
Ä¿±ê duelist crackme 1
Ä¿±êURL http:\\go.163.com\~ddxia\crackme\DueList\Due-cm1.zip
¹¤¾ß SoftIce4.01 for NT
ÀÖȤ ¿ÉÒÔÖ±½ÓÐ޸ijÌÐò´úÂë,µÃµ½ÐòÁкÅ(ÀÁÈË·½·¨)^_^
Ê×ÏÈ¿´¿´ËüµÄreadme.txt(½¨ÒéÔÚCrack CrackmeÇ°£¬¶ÁÒ»¶Á£¬»áÓÐЩ°ïÖúµÄ)£¬ÊÇ Duel
istдµÄµÚÒ»¸ö´¿ASMµÄCrackme¡£
ÔËÐУ¬»á·¢ÏÖËüÐèÒªÒ»¸öÐòÁкţ¬±ðæÏÂÖжϣ¬¿´¿´ÊÇÄÇÒ»ÖÖ³ö´íÐÅÏ¢£¬Ëæ±ãÌîÏÂ123
£¬È»ºó°´check°´Å¥£¬»áµ¯³öÒ»¸ö³ö´í¶Ô»°¿ò£¡È»ºó°´OK·µ»ØÖ÷³ÌÐò¡£
¶ÔÖ¢ÏÂÒ©À²£¡:)
Ctrl+D ¼¤»îSICE
BPX MESSAGEBOXA
Ctrl+D ·µ»Ø³ÌÐò¡£
ÔÙ°´check°´Å¥£¬¾Í»áÀ¹½ØÏÂÀ´£¬¸ú×Å°´F11Ìø³öMESSAGEBOXAµÄϵͳ´úÂë(ÓеãÏóTRWµÄP
moudle)£¬¹â´ø»áÍ£ÔÚ001B:00401193
001B:0040117D 6800200000 PUSH 00002000
001B:00401182 6801204000 PUSH 00402001
001B:00401187 6863204000 PUSH 00402063
001B:0040118C 6A00 PUSH 00
001B:0040118E E85C010000 CALL USER32!MessageBoxA
001B:00401193 E95CFFFFFF JMP 004010F4
^^^^^^^^^^^^^^^^^^^^^^^^^^^---->¹â±ê»áÍ£ÔÚ´Ë´¦
ÓÐÁ˽á¹û£¬ÓÚÊÇÎÒÃǺÜÏëÈ¥ÖªµÀÔÒòÊÇΪʲô£¿¶ÔÂð£¿ËùÒÔÎÒÃÇÒª»Ø¹ËÒ»ÏÂÀúÊ·£¬£¨ÊÇ
°¡£¡ÔÚ´úÂëµÄÀúÊ·ÖУ¬ÓÀÔ¶¶¼²»»á¹ýÆÚ£¬¿ÉÒÔ×·Ñ°£¬¿ÉÒÔÖØÐÂÀ´¹ý£¬Ò²¿ÉÒÔÖØÍ·À´¹ý£¬µ«ÔÚ
ÏÖʵÖУ¬ÀúÊ·ÓÀÔ¶ÊÇÀúÊ·£¬ÏÖÔÚµÄÎÒÃÇÖ»ÄÜÊÇ»ØÒä¡¢ÁôÁµ£¬Èç¹ûÏëÔÚÄãµÄÀúÊ·³¤ºÓÀïÁôϾ«
²Ê˲¼ä£¬Çë°ÑÎպýñÌì°É£¡£¡£©
¼òµ¥×¢²á·½Ê½£ºµÃµ½´úÂë------¡·½øÐб仯-----¡·È»ºó½øÐбȽÏ----¡·¶Ô·ñ£¿
ÎÒÃÇ¿ÉÒÔ¿´µ½ÈçϵĴúÂ룺
001B:004010FB 6A24 PUSH 24
001B:004010FD 68F7204000 PUSH 004020F7
^^^^^^^^^^^^^^^^^^^^^^^^----->GetDlgItemTextAÊÇ´æ·ÅÄãÊäÈë
×¢²áÂëµÄµØ·½
001B:00401102 6A01 PUSH 01
001B:00401104 FF7508 PUSH DWORD PTR [EBP+08]
001B:00401107 E855020000 CALL USER32!GetDlgItemTextA
^^^^^^^^^^^^^^^^^^^^^^^^----->µÃµ½×¢²áÂë
001B:0040110C 33C0 XOR EAX,EAX
001B:0040110E 80B8F720400000 CMP BYTE PTR [EAX+004020F7],00
^^^^^^^^^^^^^^^^^^^^^^^^----->±È½ÏÊÇ·ñÊäÈ룿
001B:00401115 7418 JZ 0040112F
001B:00401117 80B0F720400043 XOR BYTE PTR [EAX+004020F7],43
001B:0040111E 80B0F72040001E XOR BYTE PTR [EAX+004020F7],1E
001B:00401125 80B0F720400055 XOR BYTE PTR [EAX+004020F7],55
^^^^^^^^^^^^^^^^^^^^^^^^----->½øÐÐ×¢²áÂë±ä»¯
001B:0040112C 40 INC EAX
001B:0040112D E2DF LOOP 0040110E
001B:0040112F 83F800 CMP EAX,00
001B:00401132 7518 JNZ 0040114C
^^^^^^^^^^^^^^^^^^^^^^^^----->ת»¯ÍêûÓУ¿£¿
001B:00401134 6800200000 PUSH 00002000
001B:00401139 6801204000 PUSH 00402001
001B:0040113E 689D204000 PUSH 0040209D
001B:00401143 6A00 PUSH 00
001B:00401145 E8A5010000 CALL USER32!MessageBoxA
001B:0040114A EBA8 JMP 004010F4
001B:0040114C 6A24 PUSH 24
001B:0040114E 68D3204000 PUSH 004020D3
001B:00401153 68F7204000 PUSH 004020F7
001B:00401158 E864000000 CALL 004011C1
^^^^^^^^^^^^^^^^^^^^^^^^----->½øÐбȽϵÄ×Ó³ÌÐò
001B:0040115D 83F800 CMP EAX,00
^^^^^^^^^^^^^^^^^^^^^^^^----->ÊÇ·ñÕýÈ·£¿£¿
001B:00401160 741B JZ 0040117D (JUMP )
001B:00401162 6800200000 PUSH 00002000
001B:00401167 6801204000 PUSH 00402001
001B:0040116C 6817204000 PUSH 00402017
001B:00401171 6A00 PUSH 00
001B:00401173 E877010000 CALL USER32!MessageBoxA
ÎÒÃÇ¿ÉÒÔ×¢Òâµ½Á½¸öµØÖ·
Ò»¸öÊÇ 004020D3 -----´æ·Å׎ø¹ý±ä»¯µÄ×¢²áÂë
ÁíÒ»¸öÊÇ004020F7 -----ÓÃÊäÈëµÄ×¢²áÂë
:d 4020d3 4020f5
0023:004020D3 7B 61 65 78 64 6D 26 6B-7A 69 6B 63 65 6D 26 3C {aexdm&kzikcem&<
0023:004020E3 26 66 6D 7F 6A 61 6D 7B-26 6A 71 26 6C 7D 6D 64 &fmjam{&jq&l}md
0023:004020F3 61 7B 7C 00 31 32 33 00-00 00 00 00 00 00 00 00 a{|.123.........
³ÌÐò½øÐб仯µÄ´úÂë½ö½öÊÇXOR£¬Ò»Öַdz£¼òµ¥¼ÓÃÜ·½·¨£¬ÓÐBUGºÇºÇ£¬ÓÚÊÇÓÃSICEÐ޸ĴúÂëΪÈçÏ£º
001B:0040110E 80B8D320400000 CMP BYTE PTR [EAX+004020D3],00
001B:00401115 7418 JZ 0040112F
001B:00401117 80B0D320400043 XOR BYTE PTR [EAX+004020D3],43
001B:0040111E 80B0D32040001E XOR BYTE PTR [EAX+004020D3],1E
001B:00401125 80B0D320400055 XOR BYTE PTR [EAX+004020D3],55
½ö½öÊÇ°ÑÕâËľäÖеÄ004020F7»»Îª004020D3£¬¼´ÐÞ¸ÄF7ΪD3£¬È»ºóÈóÌÐòÔÙÔËÐÐÒ»
±é£¬ºÇºÇ~~³ÌÐò»á×Ô¶¯ÏÔʾÕýÈ·×¢²áÂ룡¸Ï½ô³ÏÂÀ´£¡
0023:004020D3 73 69 6D 70 6C 65 2E 63-72 61 63 6B 6D 65 2E 34 simple.crackme.4
0023:004020E3 2E 6E 65 77 62 69 65 73-2E 62 79 2E 64 75 65 6C .newbies.by.duel
0023:004020F3 69 73 74 00 31 32 33 00-00 00 00 00 00 00 00 00 ist.123.........
Í˳ö³ÌÐò£¬ÖØÐÂÔËÐУ¬ÊäÈësimple.crackme.4.newbies.by.dueist£¬OK ÊÕ¹¤ :D
×ܽ᣺ÔÚCrackÖУ¬¿ÉÒÔ·¢»Ó×Ô¼ºµÄÖ÷¹ÛÄܶ¯ÐÔ(»©£¡ÉÏÇàÉÙÄêÐÞÑø¿Î°¡£¡ÎÒµ¹.........)
·¢»ÓÏëÏóÁ¦£¬²»ÐèÒª¾ÓÙ£ÓÚÄÄÒ»ÖÖ·½·¨£¬¾¡¹ÜÈ¥·¢»Ó¡£CrackµÄ¾«»ªÖ®´¦ÔÚÓÚ²»¶ÏµÄ̽Ë÷ºÍ´´Ð£¡
ʱ¼ä£º2000.10.16 19:45
ÌáÒ飺¸Ã»Ø¼Ò£¬°®»¤Ò»ÏÂ×Ô¼ºµÄθÁË :)
|
|
duelist crackme 4 Æƽâ (Ï£ÍûתÔصÄʱºò±£³ÖÍêÕû)
×÷Õß ¶¡¶¡Ïº ddxia/[CCG]
E_mail ddxia@263.net (Èç¹ûCrackme½ÌѧÎÄÕÂÖÐÓÐ´í£¬ÇëÀ´ÐÅ:))
Web http://go18.163.com/~ddxia
Ä¿±ê duelist crackme 4
Ä¿±êURL http://go18.163.com/~ddxia/crackme/DueList/Due-cm4.zip
¹¤¾ß SoftIce4.01 for NT winapi.hlp
¾Ýreadme.txt˵£¬ÓÃÃØÃܱíµÄÐÎʽÀ´½øÐмÓÃÜ£¬½âÆðÀ´ÓÐЩÀ§ÄÑ¡£Í¬Ê±Òª×öÒ»¸öKEYGEN
Õâ´Î²»ÓÃBPX MESSAGEBOXA »»Ò»Ï¿Úζ£¡:)
ÒòΪÕâ´ÎCrackmeÊÇÒªÊäÈëUSER/CODE£¬Ò»¶¨Òª¾¹ý±ä»¯²Å½øÐбȽϣ¬ËùÒÔÔÚCrackmeµÃµ½
¼ÙµÄUSER/CODEʱ£¬°ÑËü¶ÏÏÂÀ´¡£
bpx getwindowtexta ------°¡Å¶£¡£¡Ã»ÓÐÓã¡
bpx getdlgitem ------ÓëDLG²Ù×÷Óж¼¶ÏÏÂÀ´¡£
½á¹û°´ÏÂcheckºó£¬¾Í¸ø¶ÏÏÂÀ´ÁË£¬F11 È»ºóÔÙ°´F12 ·µ»ØCrackmeµÄ´úÂë¿Õ¼ä
ÓÃSICE½ØÏÂÈçÏ´úÂ룬COME ON BABY£¡£¡·ÖÎö´úÂëŶ£¡£¡·Ç³£µÄÓÐȤµÄ»îŶ£¡:)
:u 401127 L13d
001B:00401127 6A00 PUSH 00
001B:00401129 6A00 PUSH 00
001B:0040112B 6A0E PUSH 0E
001B:0040112D 6A03 PUSH 03
001B:0040112F FF7508 PUSH DWORD PTR [EBP+08]
001B:00401132 E841020000 CALL USER32!SendDlgItemMessageA
SendDlgItemMessageÕâ¸öAPIµ÷ÓÃÁËËĴΣ¬À´ÎÒÃÇ¿´Ò»¿´Ëüµ½µ×ÓÐʲôÓã¿
LONG SendDlgItemMessage(
HWND hDlg, // ¶Ô»°¿òµÄ¾ä±ú
int nIDDlgItem, // ¿Ø¼þµÄIDºÅ
UINT Msg, // ´«Ë͵ÄÏûÏ¢
WPARAM wParam, // µÚÒ»¸öÏûÏ¢²ÎÊý
LPARAM lParam // µÚ¶þ¸öÏûÏ¢²ÎÊý
);
´Ó³ÌÐòÖÐÎÒÃÇ¿ÉÒÔÖªµÀµ±UINT Msg=E ʱ ÊÇÈ¡ÊäÈë×Ö·ûµÄ¸öÊý
µ±UINT Msg=D ʱ ÊÇÈ¡ÊäÈë×Ö·ûµÄÄÚÈÝ
001B:00401137 A3AF214000 MOV [004021AF],EAX
^^^^^^^^^^^^^^^^^^^^^^^^---->È¡ÊäÈëUSERµÄ¸öÊý
001B:0040113C 83F800 CMP EAX,00
001B:0040113F 0F84D5000000 JZ 0040121A
001B:00401145 83F808 CMP EAX,08
001B:00401148 0F8FCC000000 JG 0040121A
^^^^^^^^^^^^^^^^^^^^^^^----->¼ì²éÊäÈë¸öÊýÊÇ·ñ
´óÓÚ0СÓÚ8
001B:0040114E 8BF0 MOV ESI,EAX
^^^^^^^^^^^^^^^^^^^^^^^----->×¢ÒâÕâ¸ö
001B:00401150 6A00 PUSH 00
001B:00401152 6A00 PUSH 00
001B:00401154 6A0E PUSH 0E
001B:00401156 6A04 PUSH 04
001B:00401158 FF7508 PUSH DWORD PTR [EBP+08]
001B:0040115B E818020000 CALL USER32!SendDlgItemMessageA
001B:00401160 83F800 CMP EAX,00
001B:00401163 0F84B1000000 JZ 0040121A
001B:00401169 3BF0 CMP ESI,EAX
001B:0040116B 0F85A9000000 JNZ 0040121A
^^^^^^^^^^^^^^^^^^^^^^^------>±È½Ïuser/code
ÊäÈëµÄ¸öÊýÊÇ·ñÏàµÈ
ÏàµÈ¾Í¼ÌÐø
001B:00401171 6860214000 PUSH 00402160
001B:00401176 6A08 PUSH 08
001B:00401178 6A0D PUSH 0D
001B:0040117A 6A03 PUSH 03
001B:0040117C FF7508 PUSH DWORD PTR [EBP+08]
001B:0040117F E8F4010000 CALL USER32!SendDlgItemMessageA
^^^^^^^^^^^^^^^^^^^^^^^^----->È¡µÄUSER ·ÅÈë402160
001B:00401184 6879214000 PUSH 00402179
001B:00401189 6A10 PUSH 10
001B:0040118B 6A0D PUSH 0D
001B:0040118D 6A04 PUSH 04
001B:0040118F FF7508 PUSH DWORD PTR [EBP+08]
001B:00401192 E8E1010000 CALL USER32!SendDlgItemMessageA
^^^^^^^^^^^^^^^^^^^^^^^^----->È¡µÄCODE ·ÅÈë402160
001B:00401197 B9FFFFFFFF MOV ECX,FFFFFFFF
001B:0040119C 41 INC ECX
001B:0040119D 0FBE8160214000 MOVSX EAX,BYTE PTR [ECX+00402160]
001B:004011A4 83F800 CMP EAX,00
001B:004011A7 7432 JZ 004011DB
001B:004011A9 BEFFFFFFFF MOV ESI,FFFFFFFF
001B:004011AE 83F841 CMP EAX,41
^^^^^^^^^^^^^^^^^^^^^^^^----->41=¡®A¡¯
001B:004011B1 7C67 JL 0040121A
001B:004011B3 83F87A CMP EAX,7A
^^^^^^^^^^^^^^^^^^^^^^^^----->7A=¡®z¡¯
001B:004011B6 7762 JA 0040121A
001B:004011B8 83F85A CMP EAX,5A
^^^^^^^^^^^^^^^^^^^^^^^^----->41=¡®Z¡¯
001B:004011BB 7C03 JL 004011C0
^^^^^^^^^^^^^^^^^^^^^^^^----->Õ⼸¾ä´úÂëÊÇÅжÏ
USERÊÇ·ñÊäÈëÁË×Ö·û
001B:004011BD 83E820 SUB EAX,20
^^^^^^^^^^^^^^^^^^^^^^^^----->È«²¿×ª»¯Îª´óд
001B:004011C0 46 INC ESI
001B:004011C1 0FBE9617204000 MOVSX EDX,BYTE PTR [ESI+00402017]
^^^^^^^^^^^^^^^^^^^^^^^^----->ÔÚ402017±íÏà¶ÔÓ¦µÄ
λÖÃ
001B:004011C8 3BC2 CMP EAX,EDX
001B:004011CA 75F4 JNZ 004011C0
^^^^^^^^^^^^^^^^^^^^^^^^----->±íÖÐÕÒµ½ºóÔÚÈ¥ÁíÒ»
40203C±íȥѰÕÒ¶ÔÓ¦
掙歜
001B:004011CC 0FBE863C204000 MOVSX EAX,BYTE PTR [ESI+0040203C]
001B:004011D3 898194214000 MOV [ECX+00402194],EAX
001B:004011D9 EBC1 JMP 0040119C
:d 402017
0023:00402017 41 31 4C 53 4B 32 44 4A-46 34 48 47 50 33 51 57 A1LSK2DJF4HGP3QW
0023:00402027 4F 35 45 49 52 36 55 54-59 5A 38 4D 58 4E 37 43 O5EIR6UTYZ8MXN7C
0023:00402037 42 56 39 00 BV9.
:d 40203c
0023:0040203C 53 55 37 43 53 4A 4B 46-30 39 4E 43 53 44 4F 39 SU7CSJKF09NCSDO9
0023:0040204C 53 44 46 30 39 53 44 52-4C 56 4B 37 38 30 39 53 SDF09SDRLVK7809S
0023:0040205C 34 4E 46 00 4NF.
001B:004011DB FF35AF214000 PUSH DWORD PTR [004021AF]
001B:004011E1 6894214000 PUSH 00402194
001B:004011E6 6879214000 PUSH 00402179
001B:004011EB E854000000 CALL 00401244
^^^^^^^^^^^^^^^^^^^^^^----->±È½Ï×Ó³ÌÐò
ת»»ºóµÄÖµÓëCODEÏà±È½Ï
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
±È½Ï³ÌÐò´úÂ룺£¨ËäÈ»¼òµ¥£¬µ«ÊÇÓЩ¶´Å¶£¡:) ºÇºÇ~~~ £©
µ±USERΪһ¸ö×ÖĸµÄʱºò£¬CODE¿ÉÒÔΪÈÎÒâ×Ö·û :)
¿ÉÒÔÊÔһϠuser:a /code:= ÊÇ¿ÉÒԵģ¡£¡
ÏëÒ»Ï룬¹Ø¼ü¾ÍÔÚÕâ¸öJCXZ 00401260µÄÅжÏ
²»ÖªµÀÊÇ×÷Õß¹ÊÒâµÄ£¬»¹ÊÇBUG£¬×Ô¼ºÈ¥Ïë°É ºÇºÇ~~~~~~
:u 401244 L20
001B:00401244 C8000000 ENTER 0000,00
001B:00401248 B801000000 MOV EAX,00000001
001B:0040124D 8B7D08 MOV EDI,[EBP+08]
001B:00401250 8B750C MOV ESI,[EBP+0C]
001B:00401253 8B4D10 MOV ECX,[EBP+10]
001B:00401256 F3A6 REPZ CMPSB
001B:00401258 67E305 JCXZ 00401260
001B:0040125B B800000000 MOV EAX,00000000
001B:00401260 C9 LEAVE
001B:00401261 C20C00 RET 000C
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
001B:004011F0 83F801 CMP EAX,01
001B:004011F3 0F84DEFEFFFF JZ 004010D7
001B:004011F9 EB1F JMP 0040121A
001B:004011FB 837D1001 CMP DWORD PTR [EBP+10],01
001B:004011FF 0F8422FFFFFF JZ 00401127
001B:00401205 837D1002 CMP DWORD PTR [EBP+10],02
001B:00401209 752F JNZ 0040123A
001B:0040120B E8B4000000 CALL KERNEL32!ExitProcess
001B:00401210 B801000000 MOV EAX,00000001
001B:00401215 E9FFFEFFFF JMP 00401119
001B:0040121A 6800200000 PUSH 00002000
001B:0040121F 6801204000 PUSH 00402001
001B:00401224 68AE204000 PUSH 004020AE
001B:00401229 6A00 PUSH 00
001B:0040122B E836010000 CALL USER32!MessageBoxA
001B:00401230 B800000000 MOV EAX,00000000
001B:00401235 E9DFFEFFFF JMP 00401119
001B:0040123A B800000000 MOV EAX,00000000
001B:0040123F E9D5FEFFFF JMP 00401119
ʱ¼ä£º2000.10.19 20:99
--------------------------------------------------------------------------------
|
|
,¡¾ÔÓÖ¾ÐÅÏä¡¿ |
Ͷ¸åÐÅÏ䣺discoveredit@china.com |
´ðÒÉÐÅÏ䣺discoveranswer@china.com |
°ßÖñÐÅÏ䣺programhunter@china.com |
| |