带壳破解mp3变小
00403C40 - FF25 24114000 JMP DWORD PTR DS:[401124] ; msvbvm60.__vbaChkstk
00404162 - FF25 A0124000 JMP DWORD PTR DS:[4012A0] ; msvbvm60.ThunRTMain
00433E13 FF15 9C104000 CALL DWORD PTR DS:[40109C] ; msvbvm60.rtcMsgBox
00433CB0 55 PUSH EBP oep 脱壳 不能运行
00433CB1 8BEC MOV EBP,ESP
00433CB3 83EC 0C SUB ESP,0C
00433CB6 68 463C4000 PUSH mp3变小.00403C46 ; JMP 到 msvbvm60.__vbaExceptHandler
00433CBB 64:A1 00000000 MOV EAX,DWORD PTR FS:[0]
00433CC1 50 PUSH EAX
直接破解
; msvbvm60.rtcMsgBox
00433D67 E8 B4080200 CALL mp3变小.00454620
00433D6C 8BD0 MOV EDX,EAX 寄存器出现注册码
EAX=0017B1D4, (UNICODE "1ACED9D534097894312C763A")
EDX=004085E4 (mp3变小.004085E4)
0012F594 |77F33418 UNICODE "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
EAX 0017A8BC UNICODE "1ACED9D534097894312C763A"
ECX 0012F640
EDX 004085E4 mp3变小.004085E4
00433D9B . 8D4D D0 LEA ECX,DWORD PTR SS:[EBP-30]
00433D9E . FF15 68134000 CALL DWORD PTR DS:[401368] ; msvbvm60.__vbaFreeObj
00433DA4 . 66:3BFB CMP DI,BX
00433DA7 . 0F84 8C000000 JE mp3变小.00433E39 关键跳
00433DAD . 8B35 D0124000 MOV ESI,DWORD PTR DS:[4012D0] ; msvbvm60.__vbaVarDup
00433DB3 . B9 04000280 MOV ECX,80020004
c991ffeb8ef784031e0c6f881ffdda14 教程.exe
仅供大家学习QQ群38603947
带壳破解mp3变小
402K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6S2L8h3W2H3j5h3&6Q4x3X3g2U0L8$3#2Q4x3V1k6V1i4K6u0r3i4K6t1#2k6e0g2Q4x3U0g2T1z5q4)9J5y4h3p5$3i4K6t1#2k6e0g2Q4x3U0g2S2x3#2)9J5y4h3t1K6i4K6t1#2k6e0N6Q4x3U0g2S2x3q4)9J5y4h3t1@1i4K6t1#2k6e0S2Q4x3U0g2S2y4#2)9J5y4h3p5K6L8i4l9K6i4K6t1#2k6e0g2Q4x3U0f1^5k6W2)9J5y4e0V1^5i4K6t1#2k6e0g2Q4x3U0g2T1x3q4)9J5y4e0S2X3i4K6u0W2M7X3q4J5i4K6u0r3j5K6t1J5j5h3x3^5j5X3x3H3k6e0R3^5x3X3j5#2y4e0M7$3j5X3t1#2y4e0x3&6x3K6l9&6x3o6V1H3x3K6W2V1y4o6g2U0j5X3f1J5y4h3x3K6k6o6b7I4z5e0l9I4
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课