Posted August 18, 200817 yr PEDIY_CrackMe_2007BP GetDlgItemTextA名称在 unpacked, 项目 4 地址=00403120 类型=导入 (已知) 名称=USER32.GetDlgItemTextA77D6AE36 > 8BFF MOV EDI,EDI77D6AE38 55 PUSH EBP77D6AE39 8BEC MOV EBP,ESP77D6AE3B FF75 0C PUSH DWORD PTR SS:[EBP+C]77D6AE3E FF75 08 PUSH DWORD PTR SS:[EBP+8]77D6AE41 E8 888FFBFF CALL USER32.GetDlgItem77D6AE46 85C0 TEST EAX,EAX0012F9B0 0040153E /CALL 到 GetDlgItemTextA 来自 unpacked.004015390012F9B4 003E0AEE |hWnd = 003E0AEE ('TheBigMan's CrackMe #6',class='#32770')0012F9B8 00000065 |ControlID = 65 (101.)0012F9BC 0012F9D0 |Buffer = 0012F9D00012F9C0 00000100 \Count = 100 (256.)0012F9C4 0012FAF7 ASCII "**** ... you entered the correct serial!"0012F9C8 00402593 ASCII "You have to make an own working keygen!Send the solutions to: t.h.e.b.i.g.m.a.n@gmx.netPatching is not allowed!Enjoy !"0040153E |. 89C3 MOV EBX,EAX00401540 |. 09DB OR EBX,EBX00401542 |. 75 04 JNZ SHORT unpacked.0040154800401544 |. 31C0 XOR EAX,EAX00401546 |. EB 50 JMP SHORT unpacked.0040159800401548 |> BF BC020000 MOV EDI,2BC00401585 |. 53 PUSH EBX00401586 |. FF75 08 PUSH DWORD PTR SS:[EBP+8]00401589 |. E8 77FDFFFF CALL unpacked.00401 ?0040158E |. 83C4 0C ADD ESP,0C00401591 |. 09C0 OR EAX,EAX004013C9 |. F7F9 IDIV ECX004013CB |. 83FA 17 CMP EDX,17004013CE |. 74 07 JE SHORT unpacked.004013D7004013D0 |. 31C0 XOR EAX,EAX004013D2 |. E9 2D010000 JMP unpacked.00401504004013D7 |> 31DB XOR EBX,EBX00401475 |> \3B5D 0C CMP EBX,DWORD PTR SS:[EBP+C]00401478 |.^ 0F8C 74FFFFFF \JL unpacked.004013F20040147E |. 8D85 FCFEFFFF LEA EAX,DWORD PTR SS:[EBP-104] ?004014B0 |. 57 PUSH EDI004014B1 |. 8DBD E1FBFFFF LEA EDI,DWORD PTR SS:[EBP-41F] T654002004014B7 |. 57 PUSH EDI堆栈地址=0012F591, (ASCII "T654002")EDI=00000062004014DF |. 8D85 E1FCFFFF LEA EAX,DWORD PTR SS:[EBP-31F] ; |004014E5 |. 50 PUSH EAX ; |Arg2004014E6 |. 8D85 E1FDFFFF LEA EAX,DWORD PTR SS:[EBP-21F] ; |004014EC |. 50 PUSH EAX ; |Arg1004014ED |. E8 D0FDFFFF CALL unpacked.004012C2 ; \unpacked.004012C2004012CD |. 46 INC ESI004012CE |. EB 29 JMP SHORT unpacked.004012F9004012D0 |> 8B55 08 /MOV EDX,DWORD PTR SS:[EBP+8]004012D3 |. 0FBE3C32 |MOVSX EDI,BYTE PTR DS:[EDX+ESI]004012D7 |. 89F8 |MOV EAX,EDI004012D9 |. 83F0 20 |XOR EAX,20004012DC |. B9 0A000000 |MOV ECX,0A004012E1 |. 99 |CDQ004012E2 |. F7F9 |IDIV ECX004012E4 |. 89D7 |MOV EDI,EDX004012E6 |. 83C7 30 |ADD EDI,30004012E9 |. 8B55 0C |MOV EDX,DWORD PTR SS:[EBP+C]004012EC |. 0FBE1432 |MOVSX EDX,BYTE PTR DS:[EDX+ESI]004012F0 |. 39D7 |CMP EDI,EDX004012F2 74 04 JE SHORT unpacked.004012F8 ???????????004012F4 |. 31C0 |XOR EAX,EAX004012F6 |. EB 08 |JMP SHORT unpacked.00401300004012F8 |> 46 |INC ESI004012F9 |> 39DE CMP ESI,EBX004012FB |.^ 7C D3 \JL SHORT unpacked.004012D0004012FD |. 31C0 XOR EAX,EAXEAX 0012F691 ASCII "999999999999999999"ECX 0012F791 ASCII "T654002-98"FCW 037F Prec NEAR,64 Mask 1 1 1 1 1 1004014DF |. 8D85 E1FCFFFF LEA EAX,DWORD PTR SS:[EBP-31F] ; |004014E5 |. 50 PUSH EAX ; |Arg2004014E6 |. 8D85 E1FDFFFF LEA EAX,DWORD PTR SS:[EBP-21F] ; |004014EC |. 50 PUSH EAX ; |Arg1004014ED |. E8 D0FDFFFF CALL unpacked.004012C2 ; \unpacked.004012C2004014F2 |. 83C4 0C ADD ESP,0C004012DC |. B9 0A000000 |MOV ECX,0A004012E1 |. 99 |CDQ004012E2 |. F7F9 |IDIV ECX004012E4 |. 89D7 |MOV EDI,EDX004012E6 |. 83C7 30 |ADD EDI,30004012E9 |. 8B55 0C |MOV EDX,DWORD PTR SS:[EBP+C]004012EC |. 0FBE1432 |MOVSX EDX,BYTE PTR DS:[EDX+ESI]004012F0 |. 39D7 |CMP EDI,EDX004012F2 |. 74 04 |JE SHORT unpacked.004012F8004012F4 |. 31C0 |XOR EAX,EAX004012F6 |. EB 08 |JMP SHORT unpacked.00401300004012F8 |> 46 |INC ESIPEDIY_CrackMe_2007视频.rarPEDIY_CrackMe_2007.rar http://www.mediafire.com/upload_complete.php?id=mrmwgyjozli
Create an account or sign in to comment