381400744
发表于 2014-3-5 10:26
六人行
发表于 2014-3-9 09:12
按钮事件地址:401211
00401211/.55 push ebp
00401212|.8BEC mov ebp,esp
00401214|.81EC 0C000000 sub esp,0C
0040121A|.68 010100A0 push A0000101
0040121F|.6A 00 push 0
00401221|.68 05AD4600 push CM,新手.0046AD05
00401226|.68 01000000 push 1
0040122B|.BB C0164000 mov ebx,CM,新手.004016C0
00401230|.E8 17030000 call CM,新手.0040154C
00401235|.83C4 10 add esp,10 ;EAX 00164458 ASCII "www.52pojie.cn"引起重示
00401238|.8945 FC mov dword ptr ss:,eax
0040123B|.6A FF push -1
0040123D|.6A 08 push 8
0040123F|.68 03000116 push 16010003
00401244|.68 01000152 push 52010001
00401249|.E8 E0020000 call CM,新手.0040152E
0040124E|.83C4 10 add esp,10
00401251|.8945 F8 mov dword ptr ss:,eax
00401254|.8B45 FC mov eax,dword ptr ss:
00401257|.50 push eax
00401258|.FF75 F8 push dword ptr ss:
0040125B|.E8 14FFFFFF call CM,新手.00401174
00401260|.83C4 08 add esp,8 ;ECX 00164458 ASCII "www.52pojie.cn"真码
;EDX 00163FC8 ASCII "xxxxxxxxx"假码
00401263|.83F8 00 cmp eax,0
00401266|.B8 00000000 mov eax,0
0040126B|.0F94C0 sete al
0040126E|.8945 F4 mov dword ptr ss:,eax
00401271|.8B5D F8 mov ebx,dword ptr ss:
00401274|.85DB test ebx,ebx
00401276|.74 09 je short CM,新手.00401281
00401278|.53 push ebx
00401279|.E8 AA020000 call CM,新手.00401528
0040127E|.83C4 04 add esp,4
00401281|>8B5D FC mov ebx,dword ptr ss:
00401284|.85DB test ebx,ebx
00401286|.74 09 je short CM,新手.00401291
00401288|.53 push ebx
00401289|.E8 9A020000 call CM,新手.00401528
0040128E|.83C4 04 add esp,4
00401291|>837D F4 00 cmp dword ptr ss:,0
00401295|.0F84 3B000000 je CM,新手.004012D6 ;关键跳转,nop掉即可爆破
0040129B|.B8 1BAD4600 mov eax,CM,新手.0046AD1B
004012A0|.85C0 test eax,eax
004012A2|.74 13 je short CM,新手.004012B7
004012A4|.50 push eax
004012A5|.8B40 04 mov eax,dword ptr ds:
004012A8|.83C0 08 add eax,8
004012AB|.50 push eax
004012AC|.E8 95020000 call CM,新手.00401546
004012B1|.59 pop ecx
004012B2|.5E pop esi
004012B3|.8BF8 mov edi,eax
004012B5|.F3:A4 rep movs byte ptr es:,byte ptr ds:[>
004012B7|>50 push eax
004012B8|.8B1D D4814800 mov ebx,dword ptr ds:
004012BE|.85DB test ebx,ebx
004012C0|.74 09 je short CM,新手.004012CB
004012C2|.53 push ebx
004012C3|.E8 60020000 call CM,新手.00401528
004012C8|.83C4 04 add esp,4
004012CB|>58 pop eax
004012CC|.A3 D4814800 mov dword ptr ds:,eax
004012D1|.E9 36000000 jmp CM,新手.0040130C
004012D6|>B8 4BAD4600 mov eax,CM,新手.0046AD4B ;0046AD4B存放失败信息
004012DB|.85C0 test eax,eax
004012DD|.74 13 je short CM,新手.004012F2
004012DF|.50 push eax
004012E0|.8B40 04 mov eax,dword ptr ds:
004012E3|.83C0 08 add eax,8
004012E6|.50 push eax
004012E7|.E8 5A020000 call CM,新手.00401546
004012EC|.59 pop ecx
004012ED|.5E pop esi
004012EE|.8BF8 mov edi,eax
004012F0|.F3:A4 rep movs byte ptr es:,byte ptr ds:[>
004012F2|>50 push eax
004012F3|.8B1D D4814800 mov ebx,dword ptr ds:
004012F9|.85DB test ebx,ebx
004012FB|.74 09 je short CM,新手.00401306
004012FD|.53 push ebx
004012FE|.E8 25020000 call CM,新手.00401528
00401303|.83C4 04 add esp,4
00401306|>58 pop eax
00401307|.A3 D4814800 mov dword ptr ds:,eax
0040130C|>8BE5 mov esp,ebp
0040130E|.5D pop ebp
0040130F\.C3 retn
lxczeus
发表于 2014-3-5 10:28
坐等来秒破,我现在也是一名专业的水军
381400744
发表于 2014-3-5 10:35
逍遥枷锁
发表于 2014-3-5 10:43
本帖最后由 逍遥枷锁 于 2014-3-5 10:48 编辑
膜拜CM大牛,直接给我猜想出注册码。
375505211
发表于 2014-3-5 10:51
哈哈哈哈,楼上亮了
wuhui181
发表于 2014-3-5 10:52
下载学习了!
381400744
发表于 2014-3-5 10:53
892644330
发表于 2014-3-5 10:57
H2o
发表于 2014-3-5 11:01
貌似加了虚假中文注释?
mjxk
发表于 2014-3-5 11:01