bp rtcMsgBox
然后返回程序领空向上找
0040293B /74 5E je short CrackMe.0040299B//关键跳 改nop 是不是给我们破呀 00402906 .FF15 48104000 call dword ptr ds:[<&MSVBVM60.__vbaStrCm>;MSVBVM60.__vbaStrCmp ;看到这我乐了
0040290C .8BF8 mov edi,eax
0040290E .8D4D E4 lea ecx,dword ptr ss:
00402911 .F7DF neg edi
00402913 .1BFF sbb edi,edi
00402915 .8D55 E8 lea edx,dword ptr ss:
00402918 .51 push ecx
00402919 .47 inc edi
0040291A .52 push edx
0040291B .6A 02 push 0x2
0040291D .F7DF neg edi
0040291F .FF15 7C104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;MSVBVM60.__vbaFreeStrList
00402925 .8D45 DC lea eax,dword ptr ss:
00402928 .8D4D E0 lea ecx,dword ptr ss:
0040292B .50 push eax
0040292C .51 push ecx
0040292D .6A 02 push 0x2
0040292F .FF15 18104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;MSVBVM60.__vbaFreeObjList
00402935 .83C4 18 add esp,0x18
00402938 .66:85FF test di,di
0040293B 74 5E je short CrackMe.0040299B ;关键跳转,NOP或改JNE 呵呵,加了个很猛的壳....高手速度破解啊!
页:
[1]
2