<0041216C>
0041216C 6A 10
PUSH
0x10
...
004121A9 FF15 0C575500
CALL
NEAR
DWORD
PTR
[0x55570C]
0012FD40 00400000 |hInst = 00400000
0012FD44 005BBBD0 |pTemplate = 360Crack.005BBBD0
0012FD48 00000000 |hOwner = NULL
0012FD4C 0041166C |pDlgProc = 360Crack.0041166C
0012FD50 00000000 \lParam = 0x0
...
004121C7 C2 1400
RETN
0x14
</0041216C>
<0041166C>
0041166C 55
PUSH
EBP
0041166D 8BEC
MOV
EBP
,
ESP
0041166F 817D 0C 10010000
CMP
DWORD
PTR
[
EBP
+0xC], 0x110
...
00411676 75 2A
JNZ
SHORT
004116A2
00411678 FF75 08
PUSH
DWORD
PTR
[
EBP
+0x8]
0041167B E8 AD830000
CALL
00419A2D
00411680 50
PUSH
EAX
00411681 68 086E5500
PUSH
00556E08
00556E08 00556E00 ASCII
"CDialog"
00411686 E8 91CE0000
CALL
0041E51C
0041168B 59
POP
ECX
0041168C 59
POP
ECX
0041168D 85C0
TEST
EAX
,
EAX
0041168F 74 0C
JE
SHORT
0041169D
00411691 8B10
MOV
EDX
,
DWORD
PTR
[
EAX
]
00411693 8BC8
MOV
ECX
,
EAX
00411695 FF92 74010000
CALL
NEAR
DWORD
PTR
[
EDX
+0x174]
0041169B /EB 07
JMP
SHORT
004116A4
0041169D |33C0
XOR
EAX
,
EAX
0041169F |40
INC
EAX
004116A0 |EB 02
JMP
SHORT
004116A4
004116A2 |33C0
XOR
EAX
,
EAX
004116A4 -5D
POP
EBP
004116A5 C2 1000
RETN
0x10
</0041166C>
<00401CC0>
00401CC0 55
PUSH
EBP
00401CC1 8BEC
MOV
EBP
,
ESP
00401CC3 83E4 F8
AND
ESP
, 0xFFFFFFF8
00401CC6 81EC D8020000
SUB
ESP
, 0x2D8
...
00401D0D 8D8424 C4000000
LEA
EAX
,
DWORD
PTR
[
ESP
+0xC4]
00401D14 50
PUSH
EAX
00401D15 6A 00
PUSH
0x0
00401D17 0F57C0
XORPS
XMM0
,
XMM0
00401D1A 6A 00
PUSH
0x0
00401D1C C74424 14 00000000
MOV
DWORD
PTR
[
ESP
+0x14], 0x0
00401D24 660FD6442418
MOVQ
[
ESP
][018],
XMM0
00401D2A C74424 20 00000000
MOV
DWORD
PTR
[
ESP
+0x20], 0x0
00401D32 C78424 D0000000 68006D00
MOV
DWORD
PTR
[
ESP
+0xD0], 0x6D0068
00401D3D C78424 D4000000 69006C00
MOV
DWORD
PTR
[
ESP
+0xD4], 006C0069
00401D48 C78424 D8000000 79000000
MOV
DWORD
PTR
[
ESP
+0xD8], 0x79
00401D53 FF15 48545500
CALL
NEAR
DWORD
PTR
[0x555448]
0012F4E4 00000000 |pSecurity = NULL
0012F4E8 00000000 |InitialOwner = FALSE
0012F4EC 0012F5B4 \MutexName =
"hmily"
00401D59 85C0
TEST
EAX
,
EAX
00401D5B 0F84 14010000
JE
00401E75
00401D61 FF15 44545500
CALL
NEAR
DWORD
PTR
[0x555444]
00401D67 3D B7000000
CMP
EAX
, 0xB7
00401D6C /0F84 EE000000
JE
00401E60
00401D72 |33C0
XOR
EAX
,
EAX
00401D74 |68 06020000
PUSH
0x206
00401D79 |50
PUSH
EAX
00401D7A |66:898424 D8000000
MOV
WORD
PTR
[
ESP
+0xD8],
AX
00401D82 |8D8424 DA000000
LEA
EAX
,
DWORD
PTR
[
ESP
+0xDA]
00401D89 |50
PUSH
EAX
00401D8A |E8 316E1200
CALL
00528BC0
00401D8F |6A 40
PUSH
0x40
00401D91 |8D8424 8C000000
LEA
EAX
,
DWORD
PTR
[
ESP
+0x8C]
00401D98 |6A 00
PUSH
0x0
00401D9A |50
PUSH
EAX
00401D9B |E8 206E1200
CALL
00528BC0
00401DA0 |83C4 18
ADD
ESP
, 0x18
00401DA3 |8D8424 D0000000
LEA
EAX
,
DWORD
PTR
[
ESP
+0xD0]
00401DAA |68 08020000
PUSH
0x208
00401DAF |50
PUSH
EAX
00401DB0 |6A 00
PUSH
0x0
00401DB2 |C78424 84000000 44000000
MOV
DWORD
PTR
[
ESP
+0x84], 0x44
00401DBD |FF15 40545500
CALL
NEAR
DWORD
PTR
[0x555440]
0012F4E4 00000000 |hModule = NULL
0012F4E8 0012F5C0 |PathBuffer = 0012F5C0
0012F4EC 00000208 \BufSize = 208 (520.)
00401DC3 |8D4424 08
LEA
EAX
,
DWORD
PTR
[
ESP
+0x8]
00401DC7 |50
PUSH
EAX
00401DC8 |8D4424 7C
LEA
EAX
,
DWORD
PTR
[
ESP
+0x7C]
00401DCC |50
PUSH
EAX
00401DCD |6A 00
PUSH
0x0
00401DCF |6A 00
PUSH
0x0
00401DD1 |6A 01
PUSH
0x1
00401DD3 |6A 00
PUSH
0x0
00401DD5 |6A 00
PUSH
0x0
00401DD7 |6A 00
PUSH
0x0
00401DD9 |6A 00
PUSH
0x0
00401DDB |8D8424 F4000000
LEA
EAX
,
DWORD
PTR
[
ESP
+0xF4]
00401DE2 |50
PUSH
EAX
00401DE3 |FF15 3C545500
CALL
NEAR
DWORD
PTR
[0x55543C]
0012F4C8 0012F5C0 |ModuleFileName =
"C:\Temp\52T253719\360CrackMe.exe"
0012F4CC 00000000 |CommandLine = NULL
0012F4D0 00000000 |pProcessSecurity = NULL
0012F4D4 00000000 |pThreadSecurity = NULL
0012F4D8 00000000 |InheritHandles = FALSE
0012F4DC 00000001 |CreationFlags = DEBUG_PROCESS
0012F4E0 00000000 |pEnvironment = NULL
0012F4E4 00000000 |CurrentDir = NULL
0012F4E8 0012F568 |pStartupInfo = 0012F568
0012F4EC 0012F4F8 \pProcessInfo = 0012F4F8
00401DE9 |85C0
TEST
EAX
,
EAX
00401DEB |0F84 84000000
JE
00401E75
00401DF1 |6A 5C
PUSH
0x5C
00401DF3 |8D4424 20
LEA
EAX
,
DWORD
PTR
[
ESP
+0x20]
00401DF7 |6A 00
PUSH
0x0
00401DF9 |50
PUSH
EAX
00401DFA |C74424 24 00000000
MOV
DWORD
PTR
[
ESP
+0x24], 0x0
00401E02 |E8 B96D1200
CALL
00528BC0
00401E07 |8B35 38545500
MOV
ESI
,
DWORD
PTR
[0x555438]
00401E0D |83C4 0C
ADD
ESP
, 0xC
00401E10 |8D4424 18
LEA
EAX
,
DWORD
PTR
[
ESP
+0x18]
00401E14 |6A FF
PUSH
-0x1
00401E16 |50
PUSH
EAX
00401E17 |FFD6
CALL
NEAR
ESI
0012F4E4 00401E19 /
CALL
to WaitForDebugEvent from 360Crack.00401E17
0012F4E8 0012F508 |pDebugEvent = 0012F508
0012F4EC FFFFFFFF \Timeout = INFINITE
00401E19 |85C0
TEST
EAX
,
EAX
00401E1B |74 29
JE
SHORT
00401E46
00401E1D |8B3D 34545500
MOV
EDI
,
DWORD
PTR
[0x555434]
00401E23 -|837C24 18 08
CMP
DWORD
PTR
[
ESP
+0x18], 0x8
00401E28 ||74 1C
JE
SHORT
00401E46
00401E2A ||68 02000100
PUSH
0x10002
00401E2F ||FF7424 24
PUSH
DWORD
PTR
[
ESP
+0x24]
00401E33 ||FF7424 24
PUSH
DWORD
PTR
[
ESP
+0x24]
00401E37 ||FFD7
CALL
NEAR
EDI
00401E39 ||6A FF
PUSH
-0x1
00401E3B ||8D4424 1C
LEA
EAX
,
DWORD
PTR
[
ESP
+0x1C]
00401E3F ||50
PUSH
EAX
00401E40 ||FFD6
CALL
NEAR
ESI
00401E42 ||85C0
TEST
EAX
,
EAX
00401E44 \|75
DD
JNZ
SHORT
00401E23
00401E46 |6A 00
PUSH
0x0
00401E48 |FF15 30545500
CALL
NEAR
DWORD
PTR
[0x555430]
00401E4E |FF7424 10
PUSH
DWORD
PTR
[
ESP
+0x10]
00401E52 |FF15 2C545500
CALL
NEAR
DWORD
PTR
[0x55542C]
00401E58 |6A 00
PUSH
0x0
00401E5A |FF15 28545500
CALL
NEAR
DWORD
PTR
[0x555428]
00401E60 \6A 00
PUSH
0x0
00401E62 6A 00
PUSH
0x0
00401E64 6A 00
PUSH
0x0
00401E66 68 C01B4000
PUSH
00401BC0
00401E6B 6A 00
PUSH
0x0
00401E6D 6A 00
PUSH
0x0
00401E6F FF15 6C545500
CALL
NEAR
DWORD
PTR
[0x55546C]
00401E75 8B8C24 DC020000
MOV
ECX
,
DWORD
PTR
[
ESP
+0x2DC]
00401E7C 5F
POP
EDI
00401E7D 5E
POP
ESI
00401E7E 33CC
XOR
ECX
,
ESP
00401E80 B8 01000000
MOV
EAX
, 0x1
00401E85 E8 12551200
CALL
0052739C
00401E8A 8BE5
MOV
ESP
,
EBP
00401E8C 5D
POP
EBP
00401E8D C3
RETN
</00401CC0>