【吾爱2013CM大赛解答】-无邪分析
本帖最后由 Chief 于 2013-12-16 21:37 编辑【文章标题】: 吾爱2013CM大赛解答--无邪分析
【文章作者】:zxcfvasd
【作者主页】: 无
【软件名称】:2013CM_无邪.exe
【操作平台】: win xp
【工具】 OD
易语言程序:
直接下按钮事件:FF 55 FC 5F 5E
成功的断下来
004010A1/.55 push ebp
004010A2|.8BEC mov ebp,esp
004010A4|.81EC 1C000000 sub esp,0x1C
004010AA|.68 010100A0 push 0xA0000101
004010AF|.6A 00 push 0x0
004010B1|.68 50AB4600 push 2013CM_?0046AB50
004010B6|.68 01000000 push 0x1
004010BB|.BB 501B4000 mov ebx,2013CM_?00401B50
004010C0|.E8 15090000 call 2013CM_?004019DA ;asduiashdihasdjkanksd(str1)
004010C5|.83C4 10 add esp,0x10
004010C8|.8945 FC mov ,eax
004010CB|.6A FF push -0x1
004010CD|.6A 08 push 0x8
004010CF|.68 04000116 push 0x16010004
004010D4|.68 01000152 push 0x52010001
004010D9|.E8 02090000 call 2013CM_?004019E0 ;获取输入注册码(str2)
004010DE|.83C4 10 add esp,0x10
004010E1|.8945 F8 mov ,eax
004010E4|.8B45 FC mov eax,
004010E7|.50 push eax ;str1
004010E8|.FF75 F8 push ;str2
004010EB|.E8 14FFFFFF call 2013CM_?00401004 ;strcmp判断输入的注册码是否正确
004010F0|.83C4 08 add esp,0x8
004010F3|.83F8 00 cmp eax,0x0
004010F6|.B8 00000000 mov eax,0x0
004010FB|.0F94C0 sete al
004010FE|.8945 F4 mov ,eax
00401101|.8B5D F8 mov ebx,
00401104|.85DB test ebx,ebx
00401106|.74 09 je X2013CM_?00401111
00401108|.53 push ebx ;注册码
00401109|.E8 C0080000 call 2013CM_?004019CE
0040110E|.83C4 04 add esp,0x4
00401111|>8B5D FC mov ebx,
00401114|.85DB test ebx,ebx
00401116|.74 09 je X2013CM_?00401121
00401118|.53 push ebx
00401119|.E8 B0080000 call 2013CM_?004019CE
0040111E|.83C4 04 add esp,0x4
00401121|>837D F4 00 cmp ,0x0
00401125|.0F84 88000000 je 2013CM_?004011B3
0040112B|.68 010100A0 push 0xA0000101
00401130|.6A 00 push 0x0
00401132|.68 6DAB4600 push 2013CM_?0046AB6D
00401137|.68 01000000 push 0x1
0040113C|.BB 501B4000 mov ebx,2013CM_?00401B50
00401141|.E8 94080000 call 2013CM_?004019DA ;asduiashdihasdjkanksd
00401146|.83C4 10 add esp,0x10
00401149|.8945 F0 mov ,eax
0040114C|.6A FF push -0x1
0040114E|.6A 08 push 0x8
00401150|.68 05000116 push 0x16010005
00401155|.68 01000152 push 0x52010001
0040115A|.E8 81080000 call 2013CM_?004019E0 ;输入用户名
0040115F|.83C4 10 add esp,0x10
00401162|.8945 EC mov ,eax
00401165|.8B45 F0 mov eax,
00401168|.50 push eax
00401169|.FF75 EC push
0040116C|.E8 93FEFFFF call 2013CM_?00401004 ;strcmp
就是明码比较了,,,后面我就没有多看了。
来看下大牛如何操刀的 学习了。分析得简单明了。 分析的不错 学习了
页:
[1]