【吾爱破解2014CrackMe大赛】【第八组】
本帖最后由 L4Nce 于 2014-11-1 14:46 编辑delphi 程序
直接下按钮断点,断下在这里
00451F1C .55 push ebp
00451F1D .8BEC mov ebp,esp
00451F1F .B9 06000000 mov ecx,0x6
00451F24 >6A 00 push 0x0
00451F26 .6A 00 push 0x0
00451F28 .49 dec ecx
00451F29 .^ 75 F9 jnz short CrackMe.00451F24
00451F2B .53 push ebx
00451F2C .56 push esi
00451F2D .57 push edi
00451F2E .8BD8 mov ebx,eax
00451F30 .BF 243D4500 mov edi,CrackMe.00453D24
00451F35 .33C0 xor eax,eax
00451F37 .55 push ebp
00451F38 .68 00214500 push CrackMe.00452100
00451F3D .64:FF30 push dword ptr fs:
00451F40 .64:8920 mov dword ptr fs:,esp
00451F43 .8D55 FC lea edx,dword ptr ss:
00451F46 .8B83 04030000 mov eax,dword ptr ds:
00451F4C .E8 1BE7FDFF call CrackMe.0043066C
00451F51 .8D55 F8 lea edx,dword ptr ss:
00451F54 .8B83 08030000 mov eax,dword ptr ds:
00451F5A .E8 0DE7FDFF call CrackMe.0043066C
00451F5F .8B45 F8 mov eax,dword ptr ss:
00451F62 .E8 3925FBFF call CrackMe.004044A0
00451F67 .8BF0 mov esi,eax
00451F69 .D1FE sar esi,1
00451F6B .79 03 jns short CrackMe.00451F70
00451F6D .83D6 00 adc esi,0x0
00451F70 >33C9 xor ecx,ecx
00451F72 .55 push ebp
00451F73 .68 CE204500 push CrackMe.004520CE
00451F78 .64:FF31 push dword ptr fs:
00451F7B .64:8921 mov dword ptr fs:,esp
00451F7E .8D45 F0 lea eax,dword ptr ss:
00451F81 .E8 5A22FBFF call CrackMe.004041E0
00451F86 .8BDE mov ebx,esi
00451F88 .4B dec ebx
00451F89 .85DB test ebx,ebx
00451F8B .7C 2C jl short CrackMe.00451FB9
00451F8D .43 inc ebx
00451F8E .C745 E8 00000>mov dword ptr ss:,0x0
00451F95 >8D45 E4 lea eax,dword ptr ss:
00451F98 .8B55 E8 mov edx,dword ptr ss:
00451F9B .03D2 add edx,edx
00451F9D .8B4D F8 mov ecx,dword ptr ss:
00451FA0 .8A1411 mov dl,byte ptr ds:
00451FA3 .E8 2024FBFF call CrackMe.004043C8
00451FA8 .8B55 E4 mov edx,dword ptr ss:
00451FAB .8D45 F0 lea eax,dword ptr ss:
00451FAE .E8 F524FBFF call CrackMe.004044A8
00451FB3 .FF45 E8 inc dword ptr ss:
00451FB6 .4B dec ebx
00451FB7 .^ 75 DC jnz short CrackMe.00451F95
00451FB9 >8D45 F4 lea eax,dword ptr ss:
00451FBC .E8 1F22FBFF call CrackMe.004041E0
00451FC1 .8BDE mov ebx,esi
00451FC3 .85DB test ebx,ebx
00451FC5 .7E 2C jle short CrackMe.00451FF3
00451FC7 .C745 E8 01000>mov dword ptr ss:,0x1
00451FCE >8D45 E0 lea eax,dword ptr ss:
00451FD1 .8B55 E8 mov edx,dword ptr ss:
00451FD4 .03D2 add edx,edx
00451FD6 .8B4D F8 mov ecx,dword ptr ss:
00451FD9 .8A5411 FF mov dl,byte ptr ds:
00451FDD .E8 E623FBFF call CrackMe.004043C8
00451FE2 .8B55 E0 mov edx,dword ptr ss:
00451FE5 .8D45 F4 lea eax,dword ptr ss:
00451FE8 .E8 BB24FBFF call CrackMe.004044A8
00451FED .FF45 E8 inc dword ptr ss:
00451FF0 .4B dec ebx
00451FF1 .^ 75 DB jnz short CrackMe.00451FCE
00451FF3 >8BDE mov ebx,esi
00451FF5 .85DB test ebx,ebx
00451FF7 .7E 48 jle short CrackMe.00452041
00451FF9 .C745 E8 01000>mov dword ptr ss:,0x1
00452000 >8D45 DC lea eax,dword ptr ss:
00452003 .8B55 F4 mov edx,dword ptr ss:
00452006 .8B4D E8 mov ecx,dword ptr ss:
00452009 .8A540A FF mov dl,byte ptr ds:
0045200D .E8 B623FBFF call CrackMe.004043C8
00452012 .8B45 DC mov eax,dword ptr ss:
00452015 .E8 5E61FBFF call CrackMe.00408178
0045201A .50 push eax
0045201B .8D45 D8 lea eax,dword ptr ss:
0045201E .8B55 F0 mov edx,dword ptr ss:
00452021 .8B4D E8 mov ecx,dword ptr ss:
00452024 .8A540A FF mov dl,byte ptr ds:
00452028 .E8 9B23FBFF call CrackMe.004043C8
0045202D .8B45 D8 mov eax,dword ptr ss:
00452030 .E8 4361FBFF call CrackMe.00408178
00452035 .5A pop edx
00452036 .E8 E9F7FFFF call CrackMe.00451824
0045203B .FF45 E8 inc dword ptr ss:
0045203E .4B dec ebx
0045203F 90 nop //nop 掉
00452040 90 nop
00452041 >8B47 38 mov eax,dword ptr ds:
00452044 .8B57 34 mov edx,dword ptr ds:
00452047 .3BC2 cmp eax,edx
00452049 90 nop //nop 掉
0045204A 90 nop
0045204B .3B47 44 cmp eax,dword ptr ds:
0045204E 90 nop //nop 掉
0045204F 90 nop
00452050 .3B47 48 cmp eax,dword ptr ds:
00452053 90 nop //nop 掉
00452054 90 nop
00452055 .83FA 09 cmp edx,0x9
00452058 90 nop //nop 掉
00452059 90 nop
0045205A .33C0 xor eax,eax
0045205C .55 push ebp
0045205D .68 7F204500 push CrackMe.0045207F
00452062 .64:FF30 push dword ptr fs:
00452065 .64:8920 mov dword ptr fs:,esp
00452068 .8B45 E8 mov eax,dword ptr ss:
0045206B .99 cdq
0045206C .F73D 743D4500 idiv dword ptr ds:
00452072 .8945 E8 mov dword ptr ss:,eax
00452075 .33C0 xor eax,eax
00452077 .5A pop edx
00452078 .59 pop ecx
00452079 .59 pop ecx
0045207A .64:8910 mov dword ptr fs:,edx
0045207D 90 nop nop 掉
0045207E 90 nop
0045207F 90 nop
00452080 90 nop
00452081 90 nop
00452082 90 nop
00452083 90 nop
00452084 .6A 00 push 0x0 ; /Style = MB_OK|MB_APPLMODAL
00452086 .68 10214500 push CrackMe.00452110 ; |提示
0045208B .68 18214500 push CrackMe.00452118 ; |注册成功!
00452090 .6A 00 push 0x0 ; |hOwner = NULL
00452092 .E8 BD48FBFF call <jmp.&user32.MessageBoxA> ; \MessageBoxA
00452097 .E8 D41BFBFF call CrackMe.00403C70
0045209C >8D55 D4 lea edx,dword ptr ss:
0045209F .8B45 E8 mov eax,dword ptr ss:
004520A2 .E8 955FFBFF call CrackMe.0040803C
004520A7 .8B45 D4 mov eax,dword ptr ss:
无限MSG,爆破无效
得分:0
注意程序的流程,爆破无效 每天 过来学习~~感谢分享~ 学到了谢谢楼主、。{:301_996:} {:301_998:}厉害厉害
向楼主学习!你太牛逼了 每天 过来学习~~感谢分享~ 学习谢谢楼主。
每天 过来学习~~感谢分享~ 学习学习,感谢楼主
页:
[1]
2