-
-
[旧帖] [分享][分享][原创] 带壳破解WebDownR 0.00雪花
-
发表于: 2008-1-21 21:33 2865
-
带壳破解WebDownR
00401018 > $ BE E0114000 MOV ESI,WebDownR.004011E0
0040101D . FF36 PUSH DWORD PTR DS:[ESI]
0040101F . E9 C3000000 JMP WebDownR.004010E7
00401024 48 DB 48 ; CHAR 'H'
00401025 01 DB 01
00401026 8E DB 8E
00401027 81 DB 81
00401028 0B DB 0B
00401029 01 DB 01
0040102A . 4B 45 52 4E 4>ASCII "KERNEL32.DLL",0
堆栈 SS:[0012FAF4]=00AB8D50, (ASCII "5.0;WangMaS_VIP,be0445a0d9d3edcdc28248cbdff80c9e")
EAX=0012FACC
堆栈 SS:[0012FAF8]=00ACC028, (ASCII "db88d8cae198ef64a6d0e1c7f18913a3")
EAX=0012FAF8
0012FAEC 00AB8D50 ASCII "111111111"
0012FAF0 00AB8D68 ASCII "111111111"
0012FAF4 00AB8D80 ASCII "5.0;WangMaS_VIP,be0445a0d9d3edcdc28248cbdff80c9e"
0012FAF8 00AB8FF8 ASCII "db88d8cae198ef64a6d0e1c7f18913a3"
0012FAFC 00AA28D4 ASCII "WangMaS_VIP,"
00467E7F |. 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
00467E82 |. E8 ADC6F9FF CALL WebDownR.00404534 寄存器eax 出现注册码
004666CE . 64:FF30 PUSH DWORD PTR FS:[EAX] 下硬件执行
00466758 . E8 7F160000 CALL WebDownR.00467DDC
这里可以进去看看
0046675D . 84C0 TEST AL,AL
0046675F . 75 56 JNZ SHORT WebDownR.004667B7 关键跳
00466761 . 6A 00 PUSH 0
仅供大家学习QQ群38603947
教程md5 4014f138b50744aa5c7df05faa55d0e0
带壳破解WebDownR 258K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6S2L8h3W2H3j5h3&6Q4x3X3g2U0L8$3#2Q4x3V1k6V1i4K6u0r3i4K6t1#2k6e0g2Q4x3U0g2T1z5q4)9J5y4h3p5$3i4K6t1#2k6e0g2Q4x3U0g2S2x3#2)9J5y4h3t1K6i4K6t1#2k6e0N6Q4x3U0g2S2x3q4)9J5y4h3t1@1i4K6t1#2k6e0S2Q4x3U0g2S2y4#2)9J5y4h3p5K6g2$3g2T1c8r3!0%4L8W2u0Q4x3X3g2J5j5i4u0Q4x3V1j5^5x3r3j5^5k6U0f1&6j5e0y4S2j5e0N6X3y4K6q4X3x3e0l9K6k6U0M7@1j5U0g2X3y4K6N6X3z5e0R3#2k6r3j5I4y4U0W2X3j5X3j5#2z5e0j5$3y4o6f1K6x3o6p5`.
00401018 > $ BE E0114000 MOV ESI,WebDownR.004011E0
0040101D . FF36 PUSH DWORD PTR DS:[ESI]
0040101F . E9 C3000000 JMP WebDownR.004010E7
00401024 48 DB 48 ; CHAR 'H'
00401025 01 DB 01
00401026 8E DB 8E
00401027 81 DB 81
00401028 0B DB 0B
00401029 01 DB 01
0040102A . 4B 45 52 4E 4>ASCII "KERNEL32.DLL",0
堆栈 SS:[0012FAF4]=00AB8D50, (ASCII "5.0;WangMaS_VIP,be0445a0d9d3edcdc28248cbdff80c9e")
EAX=0012FACC
堆栈 SS:[0012FAF8]=00ACC028, (ASCII "db88d8cae198ef64a6d0e1c7f18913a3")
EAX=0012FAF8
0012FAEC 00AB8D50 ASCII "111111111"
0012FAF0 00AB8D68 ASCII "111111111"
0012FAF4 00AB8D80 ASCII "5.0;WangMaS_VIP,be0445a0d9d3edcdc28248cbdff80c9e"
0012FAF8 00AB8FF8 ASCII "db88d8cae198ef64a6d0e1c7f18913a3"
0012FAFC 00AA28D4 ASCII "WangMaS_VIP,"
00467E7F |. 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
00467E82 |. E8 ADC6F9FF CALL WebDownR.00404534 寄存器eax 出现注册码
004666CE . 64:FF30 PUSH DWORD PTR FS:[EAX] 下硬件执行
00466758 . E8 7F160000 CALL WebDownR.00467DDC
这里可以进去看看
0046675D . 84C0 TEST AL,AL
0046675F . 75 56 JNZ SHORT WebDownR.004667B7 关键跳
00466761 . 6A 00 PUSH 0
仅供大家学习QQ群38603947
教程md5 4014f138b50744aa5c7df05faa55d0e0
带壳破解WebDownR 258K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6S2L8h3W2H3j5h3&6Q4x3X3g2U0L8$3#2Q4x3V1k6V1i4K6u0r3i4K6t1#2k6e0g2Q4x3U0g2T1z5q4)9J5y4h3p5$3i4K6t1#2k6e0g2Q4x3U0g2S2x3#2)9J5y4h3t1K6i4K6t1#2k6e0N6Q4x3U0g2S2x3q4)9J5y4h3t1@1i4K6t1#2k6e0S2Q4x3U0g2S2y4#2)9J5y4h3p5K6g2$3g2T1c8r3!0%4L8W2u0Q4x3X3g2J5j5i4u0Q4x3V1j5^5x3r3j5^5k6U0f1&6j5e0y4S2j5e0N6X3y4K6q4X3x3e0l9K6k6U0M7@1j5U0g2X3y4K6N6X3z5e0R3#2k6r3j5I4y4U0W2X3j5X3j5#2z5e0j5$3y4o6f1K6x3o6p5`.
赞赏
他的文章
赞赏
雪币:
留言: