好友
阅读权限25
听众
最后登录1970-1-1
|
黑谍的那些软件都是UPX, 一次ESP就能脱掉, 然后直接爆破就好了。是不是这么简单的?
004B0829 /0F85 80000000 jz 1.004B08AF
004B082F |. |B2 01 mov dl,0x1
004B0831 |. |A1 84B04B00 mov eax,dword ptr ds:[0x4BB084]
004B0836 |. |E8 0D080000 call 1.004B1048
004B083B |. |BA 540A4B00 mov edx,1.004B0A54 ; 注册验证成功,您的电脑已注册!
004B0840 |. |8BC3 mov eax,ebx
004B0842 |. |E8 2D150000 call 1.004B1D74
004B0847 |. |E8 EC9DF5FF call 1.0040A638
004B084C |. |83C4 F8 add esp,-0x8
004B084F |. |DD1C24 fstp qword ptr ss:[esp]
004B0852 |. |9B wait
004B0853 |. |8D45 EC lea eax,[local.5]
004B0856 |. |E8 45AAF5FF call 1.0040B2A0
004B085B |. |8D45 EC lea eax,[local.5]
004B085E |. |BA 7C0A4B00 mov edx,1.004B0A7C ; 注册验证成功,您的电脑已注册!
004B0863 |. |E8 1C3CF5FF call 1.00404484
004B0868 |. |8B45 EC mov eax,[local.5]
004B086B |. |50 push eax
004B086C |. |8B83 6C040000 mov eax,dword ptr ds:[ebx+0x46C]
004B0872 |. |8B80 08020000 mov eax,dword ptr ds:[eax+0x208]
004B0878 |. |33D2 xor edx,edx ; ntdll.KiFastSystemCallRet
004B087A |. |E8 25D8F8FF call 1.0043E0A4
004B087F |. |5A pop edx ; kernel32.7C81776F
004B0880 |. |E8 7BD7F8FF call 1.0043E000
004B0885 |. |A1 84B04B00 mov eax,dword ptr ds:[0x4BB084]
004B088A |. |8B40 14 mov eax,dword ptr ds:[eax+0x14]
004B088D |. |BA A40A4B00 mov edx,1.004B0AA4 ; A12BS2E06F6AA8595523
004B0892 |. |E8 313DF5FF call 1.004045C8
004B0897 |. |0F85 BD000000 jnz 1.004B095A
004B089D |. |B2 01 mov dl,0x1
004B089F |. |8B83 84040000 mov eax,dword ptr ds:[ebx+0x484]
004B08A5 |. |E8 5EC6F8FF call 1.0043CF08
004B08AA |. |E9 AB000000 jmp 1.004B095A
004B08AF |> \33D2 xor edx,edx ; ntdll.KiFastSystemCallRet
|
|
发帖前要善用【论坛搜索】功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。 |
|
|
|
|