好友
阅读权限10
听众
最后登录1970-1-1
|
OD载入
ALT + E
可执行模块, 条目 1
基址=10000000
大小=0011D000 (1167360.)
入口=1009EF14 krnln.<模块入口点>
名称=krnln
文件版本=1, 0, 0, 1
路径=C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\E_N4\krnln.fnr
双击
CTRL + B输入“FF55FC”
F2下断
运行
F7进入
0040979555PUSH EBP
004097968BECMOV EBP,ESP
0040979881EC 08000000 SUB ESP,8
0040979E6A FF PUSH -1
004097A06A 08 PUSH 8
004097A268 05000116 PUSH 16010005
004097A768 01000152 PUSH 52010001
004097ACE8 31010000 CALL Crack_Me.004098E2
004097B183C4 10 ADD ESP,10
004097B48945 FC MOV DWORD PTR SS:[EBP-4],EAX
004097B768 CB904000 PUSH Crack_Me.004090CB ; ASCII "1234567" //注册码 居然在这里。。
004097BCFF75 FC PUSH DWORD PTR SS:[EBP-4]
004097BFE8 34FFFFFF CALL Crack_Me.004096F8 ; //算法CALL F7进入
004097C483C4 08 ADD ESP,8
004097C783F8 00 CMP EAX,0
004097CAB8 00000000 MOV EAX,0
004097CF0F94C0SETE AL
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
004096F88B5424 04 MOV EDX,DWORD PTR SS:[ESP+4]
004096FC8B4C24 08 MOV ECX,DWORD PTR SS:[ESP+8]
0040970085D2TEST EDX,EDX
0040970275 0D JNZ SHORT Crack_Me.00409711
0040970433C0XOR EAX,EAX
0040970685C9TEST ECX,ECX
0040970874 06 JE SHORT Crack_Me.00409710
0040970A8039 00 CMP BYTE PTR DS:[ECX],0
0040970D74 01 JE SHORT Crack_Me.00409710
0040970F48DEC EAX
00409710C3RETN
0040971185C9TEST ECX,ECX
0040971375 09 JNZ SHORT Crack_Me.0040971E
0040971533C0XOR EAX,EAX
00409717803A 00 CMP BYTE PTR DS:[EDX],0
0040971A74 01 JE SHORT Crack_Me.0040971D
0040971C40INC EAX
0040971DC3RETN
0040971EF7C2 03000000 TEST EDX,3
0040972475 37 JNZ SHORT Crack_Me.0040975D
004097268B02MOV EAX,DWORD PTR DS:[EDX] ; 假码写入EAX 准备比较
004097283A01CMP AL,BYTE PTR DS:[ECX] ; 取真码第一位与假码第一位进行比较
0040972A75 2B JNZ SHORT Crack_Me.00409757; 不相等就出错
0040972C0AC0OR AL,AL
0040972E74 24 JE SHORT Crack_Me.00409754 ; 如条件全部为真则跳向成功
004097303A61 01 CMP AH,BYTE PTR DS:[ECX+1] ; 取真码第二位与假码进行比较
0040973375 22 JNZ SHORT Crack_Me.00409757; 不等则跳 以下以此类推
004097350AE4OR AH,AH
0040973774 1B JE SHORT Crack_Me.00409754
00409739C1E8 10 SHR EAX,10
0040973C3A41 02 CMP AL,BYTE PTR DS:[ECX+2]
0040973F75 16 JNZ SHORT Crack_Me.00409757
004097410AC0OR AL,AL
0040974374 0F JE SHORT Crack_Me.00409754
004097453A61 03 CMP AH,BYTE PTR DS:[ECX+3]
0040974875 0D JNZ SHORT Crack_Me.00409757
0040974A83C1 04 ADD ECX,4
0040974D83C2 04 ADD EDX,4
004097500AE4OR AH,AH
00409752^ 75 D2 JNZ SHORT Crack_Me.00409726
0040975433C0XOR EAX,EAX
00409756C3RETN |
|