Screensaver password Raiders

xiaoxiao2021-03-06  75

Screensaver password Raiders

* Reference To: USER32.GetDlgItemTextA, Ord: 00FDh |: 78054201 FF15DC720578 Call dword ptr [780572DC]: 78054207 85FF test edi, edi file: // ---- thus out: 78054209 751B jne 78054226: 7805420B 8D45FC lea eax, DWORD PTR [EBP-04]: 7805420E 8D8D78FFFFFFFFFFFFFFFFFFFFFFFFFFFFFETERN PUSH EAX: 78054215 51 PUSH ECX

* Reference To: MPR.WNetVerifyPasswordA, Ord: 004Eh |: 78054216 E87F020000 Call 7805449A: 7805421B 85C0 test eax, eax: 7805421D 7440 je 7805425F: 7805421F B801000000 mov eax, 00000001: 78054224 EB79 jmp 7805429F

* Referenced by a (U) nconditional or (C) onditional Jump at Address: |: 78054209 (C) |: 78054226 8D8574FEFFFF lea eax, dword ptr [ebp FFFFFE74]: 7805422C 8D8D78FFFFFF lea ecx, dword ptr [ebp FFFFFF78] : 78054232 50 Push Eax: 78054233 51 PUSH ECX

* Reference To: KERNEL32.lstrlenA, Ord: 02E7h |: 78054234 FF1558720578 Call dword ptr [78057258]: 7805423A 50 push eax: 7805423B 8D8D78FFFFFF lea ecx, dword ptr [ebp FFFFFF78]: 78054241 51 push ecx: 78054242 E89A010000 call 780543E1: 78054247 57 Push Edi file: // Here you entered after you entered: 78054248 8D8D74Fefff Lea ECX, DWORD PTR [EBP fffe74]: 7805424e 51 Push ECX File: / / Here is encrypted ciphertext

* Reference To: KERNEL32.lstrcmpiA, Ord: 02DEh |: 7805424F FF1554720578 Call dword ptr [78057254]: 78054255 83F801 cmp eax, 00000001: 78054258 1BC0 sbb eax, eax: 7805425A F7D8 neg eax: 7805425C 8945FC mov dword ptr [ebp-04 ], EAX * REFERENECED BY A (U) Nconditional OR (C) ONDITIONAL JUMP AT Address: |: 7805421d (c) |: 7805421d (c) |: 7805421D (C) |: 7805421D (C) |: 7805421D (C) |: 7805421D (C) |: 7805421D (C) |: 7805421D (C) |: 7805421D (C) |: 7805421D (C) |: 7805425F 33FF XOR EDI, EDI: 78054261 B801000000 MOV Eax, 00000001: 78054266 397DFC CMP DWORD PTR [EBP- 04], EDI: 78054269 7534 JNE 7805429F file: // ********* Key jumping place ***********

转载请注明原文地址:https://www.9cbs.com/read-121454.html

New Post(0)