阅读:1303回复:9
偶有mydoom_a的源代码
嘿嘿。。。
想要的话联系偶 不要发mail 去聊天室找偶。。。。 |
|
|
沙发#
发布于:2004-02-08 18:17
发给我。你这个家伙 :P
|
|
|
板凳#
发布于:2004-02-08 21:06
老实说,是不是你干的? :cool:
|
|
|
地板#
发布于:2004-02-08 21:08
我也想要
请问能给我一份吗? |
|
|
地下室#
发布于:2004-02-09 09:38
什么东东?
我也要一份!??? |
|
5楼#
发布于:2004-02-09 12:13
好啊,,
来传给你们。。 |
|
|
6楼#
发布于:2004-02-09 13:47
好啊,, 谢谢,举手之劳.. |
|
|
7楼#
发布于:2004-02-09 13:59
不信,贴出来看看 :D
|
|
|
8楼#
发布于:2004-02-09 20:36
给你们的肯定是可执行程序!!!
|
|
9楼#
发布于:2004-02-10 12:08
只贴一部分
嘿嘿。。。 Disassembly of File: office_crack.exe Code Offset = 00000400, Code Size = 00000000 Data Offset = 00000400, Data Size = 00000000 Number of Objects = 0003 (dec), Imagebase = 004A0000h Object01: UPX0 RVA: 00001000 Offset: 00000400 Size: 00000000 Flags: E0000080 Object02: UPX1 RVA: 00007000 Offset: 00000400 Size: 00005000 Flags: E0000040 Object03: .rsrc RVA: 0000C000 Offset: 00005400 Size: 00000400 Flags: C0000040 +++++++++++++++++++ MENU INFORMATION ++++++++++++++++++ There Are No Menu Resources in This Application +++++++++++++++++ DIALOG INFORMATION ++++++++++++++++++ There Are No Dialog Resources in This Application 0 +++++++++++++++++++ IMPORTED FUNCTIONS ++++++++++++++++++ 0 Number of Imported Modules = 0 (decimal) +++++++++++++++++++ IMPORT MODULE DETAILS +++++++++++++++ 0 +++++++++++++++++++ EXPORTED FUNCTIONS ++++++++++++++++++ 0 Number of Exported Functions = 0000 (decimal) ++ +++++++++++++++++++ ASSEMBLY CODE LISTING ++++++++++++++++++ //********************** Start of Code in Object UPX0 ************** Program Entry Point = 004ABE60 (office_crack.exe File Offset:0000B260) g :004A7000 EE out dx, al :004A7001 8702 xchg dword ptr [edx], eax :004A7003 92 xchg eax,edx r :004A7004 005026 add byte ptr [eax+26], dl :004A7007 4A dec edx p :004A7008 004003 add byte ptr [eax+03], al :004A700B FD std by :004A700C B269 mov dl, 69 :004A700E 9A2C1004F425E8 call E825:F404102C :004A7015 0100 add dword ptr [eax], eax :004A7017 4B dec ebx d :004A7018 CE into b :004A7019 699A6ED91FC82AC003B8 imul ebx, dword ptr [edx+C81FD96E], B803C02A 0 :004A7023 B0A8 mov al, A8 :004A7025 A6 cmpsb :004A7026 699AA6A0989088809AA6 imul ebx, dword ptr [edx+9098A0A6], A69A8088 0 :004A7030 699A787068605850CD60 imul ebx, dword ptr [edx+60687078], 60CD5058 0 :004A703A 9F lahf e :004A703B 69480044073830 imul ecx, dword ptr [eax+00], 30380744 :004A7042 344D xor al, 4D :004A7044 D3 BYTE 0d0h :004A7045 7403 je 004A704A or :004A7047 28241C sub byte ptr [esp+ebx], ah * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:004A7045(C) y | 00 :004A704A 1810 sbb byte ptr [eax], dl :004A704C D32CBB shr dword ptr [ebx+4*edi], cl :004A704F D7 xlat w :004A7050 0823 or byte ptr [ebx], ah :004A7052 03F8 add edi, eax e :004A7054 29F0 sub eax, esi e :004A7056 E84DD3344D call 4D7F43A8 :004A705B E0D8 loopnz 004A7035 ], :004A705D D0C8 ror al, 1 :004A705F BCB4344DD3 mov esp, D34D34B4 :004A7064 34AC xor al, AC :004A7066 A4 movsb |
|
|