【文章标题】: zapline转载CM(第九天)分析
【文章作者】: creantan
【作者邮箱】: creantan@126.com
【作者主页】: www.crack-me.com
【下载地址】: http://bbs.52pojie.cn/thread-18577-1-1.html
【作者声明】: 只是感兴趣,没有其他目的。失误之处敬请诸位大侠赐教!
【详细过程】
peid查壳->MASM32 / TASM32 [Overlay]
汇编的。。呵呵。。
代码清晰。。。0040105C . 6A 00 push 0
0040105E . 68 6F214000 push 0040216F
00401063 . 6A 03 push 3
00401065 . 6A 00 push 0
00401067 . 6A 03 push 3
00401069 . 68 000000C0 push C0000000
0040106E . 68 79204000 push 00402079
00401073 . E8 0B020000 call <jmp.&KERNEL32.CreateFileA>
00401078 . 83F8 FF cmp eax, -1
0040107B . 75 1D jnz short 0040109A
0040107D . 6A 00 push 0
0040107F . 68 01204000 push 00402001
00401084 . 68 17204000 push 00402017
00401089 . 6A 00 push 0
0040108B . E8 D7020000 call <jmp.&USER32.MessageBoxA>
00401090 . E8 24020000 call <jmp.&KERNEL32.ExitProcess>
00401095 . E9 28010000 jmp 004011C2
0040109A > 6A 00 push 0
0040109C . 68 73214000 push 00402173
004010A1 . 6A 46 push 46
004010A3 . 68 1A214000 push 0040211A
004010A8 . 50 push eax
004010A9 . E8 2F020000 call <jmp.&KERNEL32.ReadFile>
004010AE . 85C0 test eax, eax
004010B0 . 75 02 jnz short 004010B4
004010B2 . EB 43 jmp short 004010F7
004010B4 > 33DB xor ebx, ebx
004010B6 . 33F6 xor esi, esi
004010B8 . 833D 73214000>cmp dword ptr [402173], 12
004010BF . 7C 36 jl short 004010F7
004010C1 > 8A83 1A214000 mov al, byte ptr [ebx+40211A]
004010C7 . 3C 00 cmp al, 0
004010C9 . 74 08 je short 004010D3
004010CB . 3C 01 cmp al, 1
004010CD . 75 01 jnz short 004010D0
004010CF . 46 inc esi
004010D0 > 43 inc ebx
004010D1 .^ EB EE jmp short 004010C1
004010D3 > 83FE 02 cmp esi, 2
004010D6 . 7C 1F jl short 004010F7
004010D8 . 33F6 xor esi, esi
004010DA . 33DB xor ebx, ebx
004010DC > 8A83 1A214000 mov al, byte ptr [ebx+40211A]
004010E2 . 3C 00 cmp al, 0
004010E4 . 74 09 je short 004010EF
004010E6 . 3C 01 cmp al, 1
004010E8 . 74 05 je short 004010EF
004010EA . 03F0 add esi, eax
004010EC . 43 inc ebx
004010ED .^ EB ED jmp short 004010DC
004010EF > 81FE D5010000 cmp esi, 1D5
004010F5 . 74 1D je short 00401114
004010F7 > 6A 00 push 0
004010F9 . 68 01204000 push 00402001
004010FE . 68 86204000 push 00402086
00401103 . 6A 00 push 0
00401105 . E8 5D020000 call <jmp.&USER32.MessageBoxA>
0040110A . E8 AA010000 call <jmp.&KERNEL32.ExitProcess>
0040110F . E9 AE000000 jmp 004011C2
00401114 > 33F6 xor esi, esi
00401116 > 43 inc ebx
00401117 . 8A83 1A214000 mov al, byte ptr [ebx+40211A]
0040111D . 3C 00 cmp al, 0
0040111F . 74 18 je short 00401139
00401121 . 3C 01 cmp al, 1
00401123 . 74 14 je short 00401139
00401125 . 83FE 0F cmp esi, 0F
00401128 . 73 0F jnb short 00401139
0040112A . 3286 1A214000 xor al, byte ptr [esi+40211A]
00401130 . 8986 60214000 mov dword ptr [esi+402160], eax
00401136 . 46 inc esi
00401137 .^ EB DD jmp short 00401116
00401139 > 43 inc ebx
0040113A . 33F6 xor esi, esi
0040113C > 8A83 1A214000 mov al, byte ptr [ebx+40211A]
00401142 . 3C 00 cmp al, 0
00401144 . 74 09 je short 0040114F
00401146 . 3C 01 cmp al, 1
00401148 .^ 74 F2 je short 0040113C
0040114A . 03F0 add esi, eax
0040114C . 43 inc ebx
0040114D .^ EB ED jmp short 0040113C
0040114F > 81FE B2010000 cmp esi, 1B2
00401155 .^ 75 A0 jnz short 004010F7
00401157 . 6A 00 push 0
00401159 . 68 C9114000 push 004011C9
0040115E . 6A 00 push 0
00401160 . 6A 05 push 5
00401162 . FF35 77214000 push dword ptr [402177]
00401168 . E8 42020000 call <jmp.&USER32.DialogBoxParamA>
004011F4 > \68 60214000 push 00402160
004011F9 . 6A 01 push 1
004011FB . FF75 08 push dword ptr [ebp+8]
004011FE . E8 5E010000 call <jmp.&USER32.SetDlgItemTextA>
--------------------------------------------------------------------------------
【经验总结】
汇编的代码比较清晰。。。喜欢。。。提供一个KEY文件。见附件
--------------------------------------------------------------------------------
【版权声明】: 本文原创于creantan, 转载请注明作者并保持文章的完整, 谢谢!
2009年02月05日 9:05:20 |