debugme
没人玩crackme = =要求简单点,debugme = =
进程通讯
*新手建议不要尝试
链接:https://www.lanzouj.com/i5juxyb
被检测直接无线跳弹窗
过检测后直接跳到crackme窗口 00402B06 = 00402B12 = 0xC3 感觉是被打脸秒破了吗 这个方便 非常不错 谢谢分享 004016D5 B8 00000000 mov eax,0x0 ; GetCurrentProcessId
0040220D B8 01000000 mov eax,0x1 ; CreateToolhelp32Snapshot
004022E0 B8 02000000 mov eax,0x2 ; Process32First
00402432 B8 03000000 mov eax,0x3 ; CloseHandle
004026C0 B8 03000000 mov eax,0x3 ; CloseHandle
0040285C B8 03000000 mov eax,0x3 ; CloseHandle
00402A83 B8 03000000 mov eax,0x3 ; CloseHandle
004024EE B8 04000000 mov eax,0x4 ; Process32Next
0040277C B8 04000000 mov eax,0x4 ; Process32Next
004029CD B8 05000000 mov eax,0x5 ; CreateWaitableTimerA
00402A09 B8 06000000 mov eax,0x6 ; SetWaitableTimer
00402A40 B8 07000000 mov eax,0x7 ; MsgWaitForMultipleObjects
TWO
0040110E|.B8 00000000 mov eax,0x0 ;RtlAdjustPrivilege
004011D4 .B8 01000000 mov eax,0x1 ;DebugActiveProcess
00401269 .B8 02000000 mov eax,0x2 ;OpenProcess
004012B3 .B8 03000000 mov eax,0x3 ;DebugActiveProcessStop
00401303 .B8 04000000 mov eax,0x4 ;OpenThread
0040138A .B8 05000000 mov eax,0x5 ;ResumeThread
004013FF .B8 06000000 mov eax,0x6 ;WaitForDebugEvent
00401A7F|.B8 13000000 mov eax,0x13 ;CreateToolhelp32Snapshot
00401AB6|.B8 14000000 mov eax,0x14 ;Thread32First
00401871 .B8 0F000000 mov eax,0xF ;RtlMoveMemory
0040150B .B8 07000000 mov eax,0x7 ;GlobalSize
你的帖子都是CM,其中一大半都是VM。 jidesheng6 发表于 2019-8-13 18:16
你的帖子都是CM,其中一大半都是VM。
有vm狗屎的不玩。 {:301_998:}
页:
[1]