能力值:
( LV2,RANK:10 )
|
-
-
2 楼
不知这样行不行,爆的
|
能力值:
( LV9,RANK:420 )
|
-
-
3 楼
楼上的你太强了,他又是CRC有是ANTI-DEDE的,你都给爆了,你实在是太牛了
说下方法吧
|
能力值:
( LV15,RANK:3306 )
|
-
-
4 楼
估计2楼爆的地方不太对。。
|
能力值:
(RANK:330 )
|
-
-
5 楼

00458D14 . 55 push ebp
00458D15 . 8BEC mov ebp, esp
00458D17 . 6A 00 push 0
00458D19 . 6A 00 push 0
00458D1B . 6A 00 push 0
00458D1D . 53 push ebx
00458D1E . 8BD8 mov ebx, eax
00458D20 . 33C0 xor eax, eax
00458D22 . 55 push ebp
00458D23 . 68 938D4500 push 00458D93
00458D28 . 64:FF30 push dword ptr fs:[eax]
00458D2B . 64:8920 mov dword ptr fs:[eax], esp
00458D2E . 8D55 F8 lea edx, dword ptr [ebp-8]
00458D31 . 8B83 04030000 mov eax, dword ptr [ebx+304]
00458D37 . E8 10DDFDFF call 00436A4C
00458D3C . 8B45 F8 mov eax, dword ptr [ebp-8]
00458D3F . 8D55 FC lea edx, dword ptr [ebp-4]
00458D42 . E8 61FDFFFF call 00458AA8 ; 乱搞密码
00458D47 . 8B45 FC mov eax, dword ptr [ebp-4]
00458D4A . 50 push eax
00458D4B . 8D55 F4 lea edx, dword ptr [ebp-C]
00458D4E . 8B83 00030000 mov eax, dword ptr [ebx+300]
00458D54 . E8 F3DCFDFF call 00436A4C ; ~~~~~~~~~~~
00458D59 . 8B55 F4 mov edx, dword ptr [ebp-C]
00458D5C . 58 pop eax
00458D5D . E8 42B6FAFF call 004043A4 ; 效验
00458D62 75 0C jnz short 00458D70
00458D64 . EB 0A jmp short 00458D70
00458D66 . B8 A88D4500 mov eax, 00458DA8 ; ASCII "OK"
00458D6B . E8 D8E9FCFF call 00427748
00458D70 > 33C0 xor eax, eax
00458D72 . 5A pop edx
00458D73 . 59 pop ecx
没多看了,看到有个OK就认了.
|
能力值:
( LV9,RANK:290 )
|
-
-
6 楼
|
能力值:
( LV9,RANK:850 )
|
-
-
7 楼
|
能力值:
( LV9,RANK:210 )
|
-
-
8 楼
师傅?
谁?
共享出来....
|
能力值:
( LV9,RANK:850 )
|
-
-
9 楼
请把师父共享出来```
|
能力值:
( LV9,RANK:210 )
|
-
-
10 楼
|
能力值:
( LV12,RANK:410 )
|
-
-
11 楼
呵,这是陷井来的~~
|
能力值:
( LV12,RANK:410 )
|
-
-
12 楼
师付说了,要保密~~
pediy unpack CSDN
某软件公司的主编~~
只能说这么多了,你们猜吧,哈~~
|
能力值:
( LV9,RANK:210 )
|
-
-
13 楼
FiveFN?
|
能力值:
( LV9,RANK:210 )
|
-
-
14 楼
这些是什么?
看不懂,不看了
0044EDD4 . 55 push ebp
0044EDD5 . 8BEC mov ebp, esp
0044EDD7 . 81C4 ECFEFFFF add esp, -114
0044EDDD . 53 push ebx
0044EDDE . 33DB xor ebx, ebx
0044EDE0 . 899D ECFEFFFF mov dword ptr [ebp-114], ebx
0044EDE6 . 84D2 test dl, dl
0044EDE8 . 74 08 je short 0044EDF2
0044EDEA . 83C4 F0 add esp, -10
0044EDED . E8 7A47FBFF call 0040356C
0044EDF2 > 8BD9 mov ebx, ecx
0044EDF4 . 8855 FB mov byte ptr [ebp-5], dl
0044EDF7 . 8945 FC mov dword ptr [ebp-4], eax
0044EDFA . 33C0 xor eax, eax
0044EDFC . 55 push ebp
0044EDFD . 68 38EF4400 push 0044EF38
0044EE02 . 64:FF30 push dword ptr fs:[eax]
0044EE05 . 64:8920 mov dword ptr fs:[eax], esp
0044EE08 . A1 14B24500 mov eax, dword ptr [45B214]
0044EE0D . 8B00 mov eax, dword ptr [eax]
0044EE0F . 8B10 mov edx, dword ptr [eax]
0044EE11 . FF52 14 call dword ptr [edx+14]
0044EE14 . 33C0 xor eax, eax
0044EE16 . 55 push ebp
0044EE17 . 68 18EF4400 push 0044EF18
0044EE1C . 64:FF30 push dword ptr fs:[eax]
0044EE1F . 64:8920 mov dword ptr fs:[eax], esp
0044EE22 . 6A 00 push 0
0044EE24 . 8BCB mov ecx, ebx
0044EE26 . 33D2 xor edx, edx
0044EE28 . 8B45 FC mov eax, dword ptr [ebp-4]
0044EE2B . 8B18 mov ebx, dword ptr [eax]
0044EE2D . FF93 E0000000 call dword ptr [ebx+E0]
0044EE33 . 8B45 FC mov eax, dword ptr [ebp-4]
0044EE36 . E8 5543FBFF call 00403190
0044EE3B . 3B05 40C34400 cmp eax, dword ptr [44C340] ; CrackMe3.0044C38C
0044EE41 0F84 B7000000 je 0044EEFE
0044EE47 . 8B45 FC mov eax, dword ptr [ebp-4]
0044EE4A . F640 1C 10 test byte ptr [eax+1C], 10
0044EE4E . 0F85 AA000000 jnz 0044EEFE
0044EE54 . 8B45 FC mov eax, dword ptr [ebp-4]
0044EE57 . 8088 F4020000>or byte ptr [eax+2F4], 1
0044EE5E . 33C0 xor eax, eax
0044EE60 . 55 push ebp
0044EE61 . 68 E0EE4400 push 0044EEE0
0044EE66 . 64:FF30 push dword ptr fs:[eax]
0044EE69 . 64:8920 mov dword ptr fs:[eax], esp
0044EE6C . 8B15 40C34400 mov edx, dword ptr [44C340] ; CrackMe3.0044C38C
0044EE72 . 8B45 FC mov eax, dword ptr [ebp-4]
0044EE75 . E8 164BFCFF call 00413990
0044EE7A . 84C0 test al, al
0044EE7C . 75 4A jnz short 0044EEC8
0044EE7E . 8D95 F0FEFFFF lea edx, dword ptr [ebp-110]
0044EE84 . 8B45 FC mov eax, dword ptr [ebp-4]
0044EE87 . 8B00 mov eax, dword ptr [eax]
0044EE89 . E8 0A43FBFF call 00403198
0044EE8E . 8D85 F0FEFFFF lea eax, dword ptr [ebp-110]
0044EE94 . 8945 F0 mov dword ptr [ebp-10], eax
0044EE97 . C645 F4 04 mov byte ptr [ebp-C], 4
0044EE9B . 8D45 F0 lea eax, dword ptr [ebp-10]
0044EE9E . 50 push eax
0044EE9F . 6A 00 push 0
0044EEA1 . 8D95 ECFEFFFF lea edx, dword ptr [ebp-114]
0044EEA7 . A1 20B04500 mov eax, dword ptr [45B020]
0044EEAC . E8 776DFBFF call 00405C28
0044EEB1 . 8B8D ECFEFFFF mov ecx, dword ptr [ebp-114]
0044EEB7 . B2 01 mov dl, 1
0044EEB9 . A1 E4154100 mov eax, dword ptr [4115E4]
0044EEBE . E8 81C6FBFF call 0040B544
0044EEC3 . E8 0C4BFBFF call 004039D4
0044EEC8 > 33C0 xor eax, eax
0044EECA . 5A pop edx
0044EECB . 59 pop ecx
0044EECC . 59 pop ecx
0044EECD . 64:8910 mov dword ptr fs:[eax], edx
0044EED0 . 68 E7EE4400 push 0044EEE7
0044EED5 > 8B45 FC mov eax, dword ptr [ebp-4]
0044EED8 . 80A0 F4020000>and byte ptr [eax+2F4], 0FE
0044EEDF . C3 retn ; RET 用作跳转到 0044EEE7
|
能力值:
( LV2,RANK:10 )
|
-
-
15 楼
先谢谢了,哥们
|
能力值:
( LV4,RANK:50 )
|
-
-
16 楼
难道 用了传说中的 jmp 改成 jnz jz ?
|
能力值:
( LV12,RANK:410 )
|
-
-
17 楼
没有。。。
|
能力值:
( LV2,RANK:10 )
|
-
-
18 楼
 投降,还不公布答案?
|
能力值:
( LV9,RANK:170 )
|
-
-
19 楼
不想搞,爆掉了
00458D62 /75 0C jnz short CrackMe3.00458D70
00458D64 |EB 0A jmp short CrackMe3.00458D70
禁断的Nop之法..........
|
能力值:
( LV9,RANK:170 )
|
-
-
20 楼
就让我无耻的爆掉你吧!
|
能力值:
( LV6,RANK:90 )
|
-
-
21 楼
name:请哥慢捂
code:75F745459b8d5d91b4
|
能力值:
( LV15,RANK:3306 )
|
-
-
22 楼
学习ing...
|
|
|