首页 > 代码库 > [反汇编练习] 160个CrackMe之017

[反汇编练习] 160个CrackMe之017

[反汇编练习] 160个CrackMe之017.

本系列文章的目的是从一个没有任何经验的新手的角度(其实就是我自己),一步步尝试将160个CrackMe全部破解,如果可以,通过任何方式写出一个类似于注册机的东西。

其中,文章中按照如下逻辑编排(解决如下问题):

1、使用什么环境和工具

2、程序分析

3、思路分析和破解流程

4、注册机的探索

----------------------------------

提醒各位看客: 如果文章中的逻辑看不明白,那你一定是没有亲手操刀!OD中的跳转提示很强大,只要你跟踪了,不用怎么看代码就理解了!

----------------------------------

1、工具和环境:

WinXP SP3 + 52Pojie六周年纪念版OD + PEID + 汇编金手指。

160个CrackMe的打包文件。

下载地址: http://pan.baidu.com/s/1xUWOY 密码: jbnq

注:

1、Win7系统对于模块和程序开启了随机初始地址的功能,会给分析带来很大的负担,所以不建议使用Win7进行分析。

2、以上工具都是在52PoJie论坛下的原版程序,NOD32不报毒,个人承诺绝对不会进行任何和木马病毒相关内容。

wps_clip_image-880

2、程序分析:

想要破解一个程序,必须先了解这个程序。所以,在破解过程中,对最初程序的分析很重要,他可以帮助我们理解作者的目的和意图,特别是对于注册码的处理细节,从而方便我们反向跟踪和推导。

和上一节一样,打开CHM,选择第17个BJCM30A.exe,保存下来。运行程序,程序界面如下:

image

 

3、思路分析和破解流程

又见信息框,我很高兴啊!

PEID: Microsoft Visual Basic 5.0 / 6.0

和以前的一样,直接上步骤:

1、打开OD,将exe拖到OD窗口中,等程序暂停后,直接点击运行按钮(F9),不用理会。

2、在exe中输入Key:bbdxf。点击OK按钮,弹出错误信息框,不要关闭。

3、在OD中点击暂停按钮(Ctrl+F2),再点击堆栈K按钮(Ctrl+K),可以看到当前堆栈情况。

3

在反汇编窗口信息:

00404E30     /0F84 AD000000 je 00404EE3                              ;  // 关键跳转00404E36   . |8B1D CC104000 mov ebx,dword ptr ds:[<&MSVBVM60.__vbaVa>;  msvbvm60.__vbaVarDup00404E3C   . |B9 04000280   mov ecx,0x8002000400404E41   . |898D 20FFFFFF mov dword ptr ss:[ebp-0xE0],ecx00404E47   . |B8 0A000000   mov eax,0xA00404E4C   . |898D 30FFFFFF mov dword ptr ss:[ebp-0xD0],ecx00404E52   . |8D95 F8FEFFFF lea edx,dword ptr ss:[ebp-0x108]00404E58   . |8D8D 38FFFFFF lea ecx,dword ptr ss:[ebp-0xC8]00404E5E   . |8985 18FFFFFF mov dword ptr ss:[ebp-0xE8],eax00404E64   . |8985 28FFFFFF mov dword ptr ss:[ebp-0xD8],eax00404E6A   . |C785 00FFFFFF>mov dword ptr ss:[ebp-0x100],00402BB4    ;  UNICODE "Correct serial!"00404E74   . |89B5 F8FEFFFF mov dword ptr ss:[ebp-0x108],esi00404E7A   . |FFD3          call ebx                                 ;  <&MSVBVM60.__vbaVarDup>00404E7C   . |8D95 08FFFFFF lea edx,dword ptr ss:[ebp-0xF8]00404E82   . |8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-0xB8]00404E88   . |C785 10FFFFFF>mov dword ptr ss:[ebp-0xF0],00402B68     ;  UNICODE "Good job, tell me how you do that!"00404E92   . |89B5 08FFFFFF mov dword ptr ss:[ebp-0xF8],esi00404E98   . |FFD3          call ebx00404E9A   . |8D8D 18FFFFFF lea ecx,dword ptr ss:[ebp-0xE8]00404EA0   . |8D95 28FFFFFF lea edx,dword ptr ss:[ebp-0xD8]00404EA6   . |51            push ecx00404EA7   . |8D85 38FFFFFF lea eax,dword ptr ss:[ebp-0xC8]00404EAD   . |52            push edx00404EAE   . |50            push eax00404EAF   . |8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-0xB8]00404EB5   . |57            push edi00404EB6   . |51            push ecx00404EB7   . |FF15 3C104000 call dword ptr ds:[<&MSVBVM60.#595>]     ;  msvbvm60.rtcMsgBox00404EBD   . |8D95 18FFFFFF lea edx,dword ptr ss:[ebp-0xE8]00404EC3   . |8D85 28FFFFFF lea eax,dword ptr ss:[ebp-0xD8]00404EC9   . |52            push edx00404ECA   . |8D8D 38FFFFFF lea ecx,dword ptr ss:[ebp-0xC8]00404ED0   . |50            push eax00404ED1   . |8D95 48FFFFFF lea edx,dword ptr ss:[ebp-0xB8]00404ED7   . |51            push ecx00404ED8   . |52            push edx00404ED9   . |E9 A8000000   jmp 00404F8600404EDE   > |BE 08000000   mov esi,0x800404EE3   > \8B1D CC104000 mov ebx,dword ptr ds:[<&MSVBVM60.__vbaVa>;  msvbvm60.__vbaVarDup00404EE9   .  B9 04000280   mov ecx,0x8002000400404EEE   .  898D 20FFFFFF mov dword ptr ss:[ebp-0xE0],ecx00404EF4   .  B8 0A000000   mov eax,0xA00404EF9   .  898D 30FFFFFF mov dword ptr ss:[ebp-0xD0],ecx00404EFF   .  8D95 F8FEFFFF lea edx,dword ptr ss:[ebp-0x108]00404F05   .  8D8D 38FFFFFF lea ecx,dword ptr ss:[ebp-0xC8]00404F0B   .  8985 18FFFFFF mov dword ptr ss:[ebp-0xE8],eax00404F11   .  8985 28FFFFFF mov dword ptr ss:[ebp-0xD8],eax00404F17   .  C785 00FFFFFF>mov dword ptr ss:[ebp-0x100],00402A10    ;  UNICODE "Wrong serial!"00404F21   .  89B5 F8FEFFFF mov dword ptr ss:[ebp-0x108],esi00404F27   .  FFD3          call ebx                                 ;  <&MSVBVM60.__vbaVarDup>00404F29   .  8D95 08FFFFFF lea edx,dword ptr ss:[ebp-0xF8]00404F2F   .  8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-0xB8]00404F35   .  C785 10FFFFFF>mov dword ptr ss:[ebp-0xF0],00402BD8     ;  UNICODE "Sorry, try again!"00404F3F   .  89B5 08FFFFFF mov dword ptr ss:[ebp-0xF8],esi00404F45   .  FFD3          call ebx00404F47   .  8D85 18FFFFFF lea eax,dword ptr ss:[ebp-0xE8]00404F4D   .  8D8D 28FFFFFF lea ecx,dword ptr ss:[ebp-0xD8]00404F53   .  50            push eax00404F54   .  8D95 38FFFFFF lea edx,dword ptr ss:[ebp-0xC8]00404F5A   .  51            push ecx00404F5B   .  52            push edx00404F5C   .  8D85 48FFFFFF lea eax,dword ptr ss:[ebp-0xB8]00404F62   .  57            push edi00404F63   .  50            push eax00404F64   .  FF15 3C104000 call dword ptr ds:[<&MSVBVM60.#595>]     ;  msvbvm60.rtcMsgBox

随意向上翻翻,就发现了不同含义的文本,寻找je跳转,哈哈,是不是又被找出来了!

直接选中je 00404EE3 ,右键->Binary->Fill with NOPs.再试试:

1

哈哈,是不是被爆破了!

4、注册机的探索

写得多了,写到这里就郁闷了!

由于是VB程序,所以注册码比较的关键一般都是那几个文本比较函数,__vbastrcomp,__vbavartsteq,__vbastrcmp等。我们从关键跳转向上浏览,不理解的地方F8跟随:

0040461C   .  51            push ecx                                 ;  // ecx ="123123"0040461D   .  FF15 14104000 call dword ptr ds:[<&MSVBVM60.__vbaLenBs>;  msvbvm60.__vbaLenBstr00404623   .  8985 00FFFFFF mov dword ptr ss:[ebp-0x100],eax00404629   .  8D95 08FFFFFF lea edx,dword ptr ss:[ebp-0xF8]0040462F   .  8D85 F8FEFFFF lea eax,dword ptr ss:[ebp-0x108]00404635   .  52            push edx00404636   .  8D8D E8FEFFFF lea ecx,dword ptr ss:[ebp-0x118]0040463C   .  50            push eax0040463D   .  8D95 64FEFFFF lea edx,dword ptr ss:[ebp-0x19C]00404643   .  51            push ecx00404644   .  8D85 74FEFFFF lea eax,dword ptr ss:[ebp-0x18C]0040464A   .  52            push edx0040464B   .  8D4D 94       lea ecx,dword ptr ss:[ebp-0x6C]0040464E   .  50            push eax0040464F   .  51            push ecx00404650   .  C785 F8FEFFFF>mov dword ptr ss:[ebp-0x108],0x30040465A   .  C785 F0FEFFFF>mov dword ptr ss:[ebp-0x110],0x100404664   .  C785 E8FEFFFF>mov dword ptr ss:[ebp-0x118],0x2         ;  // for 循环0040466E   .  FF15 38104000 call dword ptr ds:[<&MSVBVM60.__vbaVarFo>;  msvbvm60.__vbaVarForInit00404674   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]0040467A   .  8985 30FEFFFF mov dword ptr ss:[ebp-0x1D0],eax00404680   .  FF15 F0104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStr00404686   .  8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-0xA4]0040468C   .  FF15 F4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;  msvbvm60.__vbaFreeObj00404692   .  8B1D DC104000 mov ebx,dword ptr ds:[<&MSVBVM60.__vbaSt>;  msvbvm60.__vbaStrMove00404698   >  39BD 30FEFFFF cmp dword ptr ss:[ebp-0x1D0],edi         ;  1 00040469E   .  0F84 F5010000 je 00404899004046A4   .  8B16          mov edx,dword ptr ds:[esi]004046A6   .  56            push esi004046A7   .  FF92 08030000 call dword ptr ds:[edx+0x308]004046AD   .  50            push eax004046AE   .  8D85 5CFFFFFF lea eax,dword ptr ss:[ebp-0xA4]004046B4   .  50            push eax004046B5   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet004046BB   .  8B08          mov ecx,dword ptr ds:[eax]004046BD   .  8D95 7CFFFFFF lea edx,dword ptr ss:[ebp-0x84]004046C3   .  52            push edx004046C4   .  50            push eax004046C5   .  8985 D4FEFFFF mov dword ptr ss:[ebp-0x12C],eax004046CB   .  FF91 A0000000 call dword ptr ds:[ecx+0xA0]004046D1   .  3BC7          cmp eax,edi004046D3   .  DBE2          fclex004046D5   .  7D 18         jge short 004046EF004046D7   .  8B8D D4FEFFFF mov ecx,dword ptr ss:[ebp-0x12C]004046DD   .  68 A0000000   push 0xA0004046E2   .  68 442B4000   push 00402B44004046E7   .  51            push ecx004046E8   .  50            push eax004046E9   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj004046EF   >  8B16          mov edx,dword ptr ds:[esi]004046F1   .  56            push esi004046F2   .  FF92 08030000 call dword ptr ds:[edx+0x308]004046F8   .  50            push eax004046F9   .  8D85 58FFFFFF lea eax,dword ptr ss:[ebp-0xA8]004046FF   .  50            push eax00404700   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet00404706   .  8B08          mov ecx,dword ptr ds:[eax]00404708   .  8D95 78FFFFFF lea edx,dword ptr ss:[ebp-0x88]0040470E   .  52            push edx0040470F   .  50            push eax00404710   .  8985 CCFEFFFF mov dword ptr ss:[ebp-0x134],eax00404716   .  FF91 A0000000 call dword ptr ds:[ecx+0xA0]0040471C   .  3BC7          cmp eax,edi0040471E   .  DBE2          fclex00404720   .  7D 18         jge short 0040473A00404722   .  8B8D CCFEFFFF mov ecx,dword ptr ss:[ebp-0x134]00404728   .  68 A0000000   push 0xA00040472D   .  68 442B4000   push 00402B4400404732   .  51            push ecx00404733   .  50            push eax00404734   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj0040473A   >  B8 01000000   mov eax,0x10040473F   .  8D95 48FFFFFF lea edx,dword ptr ss:[ebp-0xB8]00404745   .  8985 50FFFFFF mov dword ptr ss:[ebp-0xB0],eax0040474B   .  8985 30FFFFFF mov dword ptr ss:[ebp-0xD0],eax00404751   .  8985 00FFFFFF mov dword ptr ss:[ebp-0x100],eax00404757   .  8D45 94       lea eax,dword ptr ss:[ebp-0x6C]0040475A   .  B9 02000000   mov ecx,0x20040475F   .  52            push edx                                 ;  100404760   .  50            push eax                                 ;  100404761   .  898D 48FFFFFF mov dword ptr ss:[ebp-0xB8],ecx00404767   .  898D 28FFFFFF mov dword ptr ss:[ebp-0xD8],ecx0040476D   .  898D F8FEFFFF mov dword ptr ss:[ebp-0x108],ecx00404773   .  FF15 C4104000 call dword ptr ds:[<&MSVBVM60.__vbaI4Var>;  msvbvm60.__vbaI4Var00404779   .  8B8D 7CFFFFFF mov ecx,dword ptr ss:[ebp-0x84]0040477F   .  8B3D 54104000 mov edi,dword ptr ds:[<&MSVBVM60.#631>]  ;  msvbvm60.rtcMidCharBstr00404785   .  50            push eax                                 ;  // eax = 1 2  300404786   .  51            push ecx                                 ;  // ecx ="123123"00404787   .  FFD7          call edi                                 ;  msvbvm60.rtcMidCharBstr; <&MSVBVM60.#631>00404789   .  8BD0          mov edx,eax                              ;  // eax = "1"  "2" "3"0040478B   .  8D8D 74FFFFFF lea ecx,dword ptr ss:[ebp-0x8C]00404791   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404793   .  50            push eax                                 ;  // eax = "1"  "2"00404794   .  8D95 28FFFFFF lea edx,dword ptr ss:[ebp-0xD8]0040479A   .  8D45 94       lea eax,dword ptr ss:[ebp-0x6C]0040479D   .  52            push edx                                 ;  10040479E   .  8D8D F8FEFFFF lea ecx,dword ptr ss:[ebp-0x108]004047A4   .  50            push eax                                 ;  1004047A5   .  8D95 38FFFFFF lea edx,dword ptr ss:[ebp-0xC8]004047AB   .  51            push ecx                                 ;  1004047AC   .  52            push edx                                 ;  -1004047AD   .  FF15 C8104000 call dword ptr ds:[<&MSVBVM60.__vbaVarAd>;  msvbvm60.__vbaVarAdd004047B3   .  50            push eax004047B4   .  FF15 C4104000 call dword ptr ds:[<&MSVBVM60.__vbaI4Var>;  msvbvm60.__vbaI4Var004047BA   .  50            push eax                                 ;  // eax = 2  3   4004047BB   .  8B85 78FFFFFF mov eax,dword ptr ss:[ebp-0x88]004047C1   .  50            push eax                                 ;  // eax = "123123"004047C2   .  FFD7          call edi                                 ;  msvbvm60.rtcMidCharBstr004047C4   .  8BD0          mov edx,eax                              ;  // eax = "2"  "3" "1"004047C6   .  8D8D 70FFFFFF lea ecx,dword ptr ss:[ebp-0x90]004047CC   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove004047CE   .  50            push eax004047CF   .  FF15 68104000 call dword ptr ds:[<&MSVBVM60.__vbaStrCm>;  msvbvm60.__vbaStrCmp004047D5   .  8BF8          mov edi,eax                              ;  eax = -1004047D7   .  8D8D 70FFFFFF lea ecx,dword ptr ss:[ebp-0x90]004047DD   .  F7DF          neg edi004047DF   .  8D95 74FFFFFF lea edx,dword ptr ss:[ebp-0x8C]004047E5   .  51            push ecx004047E6   .  8D85 78FFFFFF lea eax,dword ptr ss:[ebp-0x88]004047EC   .  52            push edx004047ED   .  1BFF          sbb edi,edi004047EF   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]004047F5   .  50            push eax004047F6   .  47            inc edi004047F7   .  51            push ecx004047F8   .  6A 04         push 0x4004047FA   .  F7DF          neg edi004047FC   .  FF15 B4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStrList00404802   .  8D95 58FFFFFF lea edx,dword ptr ss:[ebp-0xA8]00404808   .  8D85 5CFFFFFF lea eax,dword ptr ss:[ebp-0xA4]0040480E   .  52            push edx0040480F   .  50            push eax00404810   .  6A 02         push 0x200404812   .  FF15 24104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;  msvbvm60.__vbaFreeObjList00404818   .  8D8D 28FFFFFF lea ecx,dword ptr ss:[ebp-0xD8]0040481E   .  8D95 38FFFFFF lea edx,dword ptr ss:[ebp-0xC8]00404824   .  51            push ecx00404825   .  8D85 48FFFFFF lea eax,dword ptr ss:[ebp-0xB8]0040482B   .  52            push edx0040482C   .  50            push eax0040482D   .  6A 03         push 0x30040482F   .  FF15 18104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeV>;  msvbvm60.__vbaFreeVarList00404835   .  83C4 30       add esp,0x3000404838   .  66:85FF       test di,di0040483B   .  74 37         je short 004048740040483D   .  8D4D B8       lea ecx,dword ptr ss:[ebp-0x48]00404840   .  8D95 08FFFFFF lea edx,dword ptr ss:[ebp-0xF8]00404846   .  51            push ecx00404847   .  8D85 48FFFFFF lea eax,dword ptr ss:[ebp-0xB8]0040484D   .  52            push edx0040484E   .  50            push eax0040484F   .  C785 10FFFFFF>mov dword ptr ss:[ebp-0xF0],0x100404859   .  C785 08FFFFFF>mov dword ptr ss:[ebp-0xF8],0x200404863   .  FF15 C8104000 call dword ptr ds:[<&MSVBVM60.__vbaVarAd>;  msvbvm60.__vbaVarAdd00404869   .  8BD0          mov edx,eax0040486B   .  8D4D B8       lea ecx,dword ptr ss:[ebp-0x48]0040486E   .  FF15 08104000 call dword ptr ds:[<&MSVBVM60.__vbaVarMo>;  msvbvm60.__vbaVarMove00404874   >  8D8D 64FEFFFF lea ecx,dword ptr ss:[ebp-0x19C]0040487A   .  8D95 74FEFFFF lea edx,dword ptr ss:[ebp-0x18C]00404880   .  51            push ecx00404881   .  8D45 94       lea eax,dword ptr ss:[ebp-0x6C]00404884   .  52            push edx00404885   .  50            push eax00404886   .  FF15 E8104000 call dword ptr ds:[<&MSVBVM60.__vbaVarFo>;  msvbvm60.__vbaVarForNext0040488C   .  8985 30FEFFFF mov dword ptr ss:[ebp-0x1D0],eax00404892   .  33FF          xor edi,edi00404894   .^ E9 FFFDFFFF   jmp 00404698                             ;  // for 循环00404899   >  8B0E          mov ecx,dword ptr ds:[esi]0040489B   .  56            push esi0040489C   .  FF91 08030000 call dword ptr ds:[ecx+0x308]004048A2   .  8D95 5CFFFFFF lea edx,dword ptr ss:[ebp-0xA4]004048A8   .  50            push eax004048A9   .  52            push edx004048AA   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet004048B0   .  8B08          mov ecx,dword ptr ds:[eax]004048B2   .  8D95 7CFFFFFF lea edx,dword ptr ss:[ebp-0x84]004048B8   .  52            push edx004048B9   .  50            push eax004048BA   .  8985 D4FEFFFF mov dword ptr ss:[ebp-0x12C],eax004048C0   .  FF91 A0000000 call dword ptr ds:[ecx+0xA0]004048C6   .  3BC7          cmp eax,edi004048C8   .  DBE2          fclex004048CA   .  7D 18         jge short 004048E4004048CC   .  8B8D D4FEFFFF mov ecx,dword ptr ss:[ebp-0x12C]004048D2   .  68 A0000000   push 0xA0004048D7   .  68 442B4000   push 00402B44004048DC   .  51            push ecx004048DD   .  50            push eax004048DE   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj004048E4   >  8B95 7CFFFFFF mov edx,dword ptr ss:[ebp-0x84]004048EA   .  52            push edx004048EB   .  FF15 14104000 call dword ptr ds:[<&MSVBVM60.__vbaLenBs>;  msvbvm60.__vbaLenBstr004048F1   .  83E8 01       sub eax,0x1004048F4   .  8D8D 08FFFFFF lea ecx,dword ptr ss:[ebp-0xF8]004048FA   .  0F80 AA070000 jo 004050AA                              ;  // 溢出错误00404900   .  8985 10FFFFFF mov dword ptr ss:[ebp-0xF0],eax00404906   .  8D45 B8       lea eax,dword ptr ss:[ebp-0x48]00404909   .  50            push eax0040490A   .  51            push ecx0040490B   .  C785 08FFFFFF>mov dword ptr ss:[ebp-0xF8],0x800300404915   .  FF15 6C104000 call dword ptr ds:[<&MSVBVM60.__vbaVarTs>;  msvbvm60.__vbaVarTstEq0040491B   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]00404921   .  66:8985 CCFEF>mov word ptr ss:[ebp-0x134],ax00404928   .  FF15 F0104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStr0040492E   .  8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-0xA4]00404934   .  FF15 F4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;  msvbvm60.__vbaFreeObj0040493A   .  66:39BD CCFEF>cmp word ptr ss:[ebp-0x134],di00404941   .  0F85 97050000 jnz 00404EDE                             ;  // 跳到错误提示00404947   .  8B16          mov edx,dword ptr ds:[esi]00404949   .  56            push esi0040494A   .  C785 10FFFFFF>mov dword ptr ss:[ebp-0xF0],0x100404954   .  C785 08FFFFFF>mov dword ptr ss:[ebp-0xF8],0x20040495E   .  FF92 08030000 call dword ptr ds:[edx+0x308]00404964   .  50            push eax00404965   .  8D85 5CFFFFFF lea eax,dword ptr ss:[ebp-0xA4]0040496B   .  50            push eax0040496C   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet00404972   .  8B08          mov ecx,dword ptr ds:[eax]00404974   .  8D95 7CFFFFFF lea edx,dword ptr ss:[ebp-0x84]0040497A   .  52            push edx0040497B   .  50            push eax0040497C   .  8985 D4FEFFFF mov dword ptr ss:[ebp-0x12C],eax00404982   .  FF91 A0000000 call dword ptr ds:[ecx+0xA0]00404988   .  3BC7          cmp eax,edi0040498A   .  DBE2          fclex0040498C   .  7D 18         jge short 004049A60040498E   .  8B8D D4FEFFFF mov ecx,dword ptr ss:[ebp-0x12C]00404994   .  68 A0000000   push 0xA000404999   .  68 442B4000   push 00402B440040499E   .  51            push ecx0040499F   .  50            push eax004049A0   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj004049A6   >  8B95 7CFFFFFF mov edx,dword ptr ss:[ebp-0x84]004049AC   .  52            push edx                                 ;  // edx = "123123"004049AD   .  FF15 14104000 call dword ptr ds:[<&MSVBVM60.__vbaLenBs>;  msvbvm60.__vbaLenBstr004049B3   .  8985 00FFFFFF mov dword ptr ss:[ebp-0x100],eax         ;  // eax = 6004049B9   .  8D85 08FFFFFF lea eax,dword ptr ss:[ebp-0xF8]004049BF   .  8D8D F8FEFFFF lea ecx,dword ptr ss:[ebp-0x108]004049C5   .  50            push eax004049C6   .  8D95 E8FEFFFF lea edx,dword ptr ss:[ebp-0x118]004049CC   .  51            push ecx004049CD   .  8D85 44FEFFFF lea eax,dword ptr ss:[ebp-0x1BC]004049D3   .  52            push edx004049D4   .  8D8D 54FEFFFF lea ecx,dword ptr ss:[ebp-0x1AC]004049DA   .  50            push eax004049DB   .  8D55 94       lea edx,dword ptr ss:[ebp-0x6C]004049DE   .  51            push ecx004049DF   .  52            push edx004049E0   .  C785 F8FEFFFF>mov dword ptr ss:[ebp-0x108],0x3004049EA   .  C785 F0FEFFFF>mov dword ptr ss:[ebp-0x110],0x1004049F4   .  C785 E8FEFFFF>mov dword ptr ss:[ebp-0x118],0x2         ;  // for 循环开始004049FE   .  FF15 38104000 call dword ptr ds:[<&MSVBVM60.__vbaVarFo>;  msvbvm60.__vbaVarForInit00404A04   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]00404A0A   .  8985 2CFEFFFF mov dword ptr ss:[ebp-0x1D4],eax00404A10   .  FF15 F0104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStr00404A16   .  8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-0xA4]00404A1C   .  FF15 F4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;  msvbvm60.__vbaFreeObj00404A22   >  39BD 2CFEFFFF cmp dword ptr ss:[ebp-0x1D4],edi         ;  // 循环条件判断00404A28   .  0F84 1D030000 je 00404D4B00404A2E   .  8B06          mov eax,dword ptr ds:[esi]00404A30   .  56            push esi00404A31   .  FF90 08030000 call dword ptr ds:[eax+0x308]00404A37   .  8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-0xA4]00404A3D   .  50            push eax00404A3E   .  51            push ecx00404A3F   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet00404A45   .  8B10          mov edx,dword ptr ds:[eax]00404A47   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]00404A4D   .  51            push ecx00404A4E   .  50            push eax00404A4F   .  8985 D4FEFFFF mov dword ptr ss:[ebp-0x12C],eax00404A55   .  FF92 A0000000 call dword ptr ds:[edx+0xA0]00404A5B   .  3BC7          cmp eax,edi00404A5D   .  DBE2          fclex00404A5F   .  7D 18         jge short 00404A7900404A61   .  8B95 D4FEFFFF mov edx,dword ptr ss:[ebp-0x12C]00404A67   .  68 A0000000   push 0xA000404A6C   .  68 442B4000   push 00402B4400404A71   .  52            push edx00404A72   .  50            push eax00404A73   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj00404A79   >  8B85 7CFFFFFF mov eax,dword ptr ss:[ebp-0x84]00404A7F   .  50            push eax                                 ;  // eax = "123123"00404A80   .  FF15 14104000 call dword ptr ds:[<&MSVBVM60.__vbaLenBs>;  msvbvm60.__vbaLenBstr00404A86   .  8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-0xB8]          ;  // eax = 600404A8C   .  8985 50FFFFFF mov dword ptr ss:[ebp-0xB0],eax00404A92   .  51            push ecx                                 ;  600404A93   .  C785 48FFFFFF>mov dword ptr ss:[ebp-0xB8],0x300404A9D   .  FF15 A8104000 call dword ptr ds:[<&MSVBVM60.#572>]     ;  msvbvm60.rtcHexBstrFromVar00404AA3   .  8BD0          mov edx,eax                              ;  // eax = 6 ; 长度的16进制文本00404AA5   .  8D8D 64FFFFFF lea ecx,dword ptr ss:[ebp-0x9C]00404AAB   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404AAD   .  8B16          mov edx,dword ptr ds:[esi]00404AAF   .  56            push esi00404AB0   .  FF92 08030000 call dword ptr ds:[edx+0x308]00404AB6   .  50            push eax00404AB7   .  8D85 58FFFFFF lea eax,dword ptr ss:[ebp-0xA8]00404ABD   .  50            push eax00404ABE   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet00404AC4   .  8B85 58FFFFFF mov eax,dword ptr ss:[ebp-0xA8]00404ACA   .  8D8D 38FFFFFF lea ecx,dword ptr ss:[ebp-0xC8]00404AD0   .  6A 01         push 0x1                                 ;  100404AD2   .  8D95 28FFFFFF lea edx,dword ptr ss:[ebp-0xD8]00404AD8   .  51            push ecx                                 ;  0700404AD9   .  52            push edx                                 ;  100404ADA   .  89BD 58FFFFFF mov dword ptr ss:[ebp-0xA8],edi00404AE0   .  8985 40FFFFFF mov dword ptr ss:[ebp-0xC0],eax00404AE6   .  C785 38FFFFFF>mov dword ptr ss:[ebp-0xC8],0x900404AF0   .  FF15 D4104000 call dword ptr ds:[<&MSVBVM60.#617>]     ;  msvbvm60.rtcLeftCharVar00404AF6   .  8D85 28FFFFFF lea eax,dword ptr ss:[ebp-0xD8]          ;  // eax = "1"00404AFC   .  8D8D 78FFFFFF lea ecx,dword ptr ss:[ebp-0x88]00404B02   .  50            push eax00404B03   .  51            push ecx00404B04   .  FF15 90104000 call dword ptr ds:[<&MSVBVM60.__vbaStrVa>;  msvbvm60.__vbaStrVarVal00404B0A   .  50            push eax                                 ;  // eax ="1"00404B0B   .  FF15 28104000 call dword ptr ds:[<&MSVBVM60.#516>]     ;  msvbvm60.rtcAnsiValueBstr00404B11   .  8D95 18FFFFFF lea edx,dword ptr ss:[ebp-0xE8]          ;  // eax = 0x3100404B17   .  66:8985 20FFF>mov word ptr ss:[ebp-0xE0],ax00404B1E   .  52            push edx                                 ;  0x3100404B1F   .  C785 18FFFFFF>mov dword ptr ss:[ebp-0xE8],0x200404B29   .  FF15 A8104000 call dword ptr ds:[<&MSVBVM60.#572>]     ;  msvbvm60.rtcHexBstrFromVar00404B2F   .  8BD0          mov edx,eax                              ;  // eax ="31"00404B31   .  8D8D 60FFFFFF lea ecx,dword ptr ss:[ebp-0xA0]00404B37   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404B39   .  BA 6C294000   mov edx,0040296C                         ;  UNICODE "*"00404B3E   .  8D8D 6CFFFFFF lea ecx,dword ptr ss:[ebp-0x94]00404B44   .  FF15 B0104000 call dword ptr ds:[<&MSVBVM60.__vbaStrCo>;  msvbvm60.__vbaStrCopy00404B4A   .  8B95 60FFFFFF mov edx,dword ptr ss:[ebp-0xA0]          ;  // eax ="*", edx="31"00404B50   .  8D8D 70FFFFFF lea ecx,dword ptr ss:[ebp-0x90]00404B56   .  89BD 60FFFFFF mov dword ptr ss:[ebp-0xA0],edi00404B5C   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404B5E   .  8B95 64FFFFFF mov edx,dword ptr ss:[ebp-0x9C]          ;  // eax ="31"00404B64   .  8D8D 74FFFFFF lea ecx,dword ptr ss:[ebp-0x8C]          ;  // ecx = "123123"00404B6A   .  89BD 64FFFFFF mov dword ptr ss:[ebp-0x9C],edi          ;  000404B70   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404B72   .  8B06          mov eax,dword ptr ds:[esi]00404B74   .  8D8D 68FFFFFF lea ecx,dword ptr ss:[ebp-0x98]00404B7A   .  8D95 6CFFFFFF lea edx,dword ptr ss:[ebp-0x94]00404B80   .  51            push ecx00404B81   .  52            push edx00404B82   .  8D8D 70FFFFFF lea ecx,dword ptr ss:[ebp-0x90]00404B88   .  8D95 74FFFFFF lea edx,dword ptr ss:[ebp-0x8C]00404B8E   .  51            push ecx00404B8F   .  52            push edx00404B90   .  56            push esi00404B91   .  FF90 F8060000 call dword ptr ds:[eax+0x6F8]            ;  BJCM30A.00401FE800404B97   .  3BC7          cmp eax,edi00404B99   .  7D 12         jge short 00404BAD00404B9B   .  68 F8060000   push 0x6F800404BA0   .  68 B4274000   push 004027B400404BA5   .  56            push esi00404BA6   .  50            push eax00404BA7   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj00404BAD   >  8B95 68FFFFFF mov edx,dword ptr ss:[ebp-0x98]00404BB3   .  8D4D C8       lea ecx,dword ptr ss:[ebp-0x38]00404BB6   .  89BD 68FFFFFF mov dword ptr ss:[ebp-0x98],edi00404BBC   .  FFD3          call ebx00404BBE   .  8D85 60FFFFFF lea eax,dword ptr ss:[ebp-0xA0]00404BC4   .  8D8D 64FFFFFF lea ecx,dword ptr ss:[ebp-0x9C]00404BCA   .  50            push eax00404BCB   .  8D95 6CFFFFFF lea edx,dword ptr ss:[ebp-0x94]00404BD1   .  51            push ecx00404BD2   .  8D85 70FFFFFF lea eax,dword ptr ss:[ebp-0x90]00404BD8   .  52            push edx00404BD9   .  8D8D 74FFFFFF lea ecx,dword ptr ss:[ebp-0x8C]00404BDF   .  50            push eax00404BE0   .  8D95 78FFFFFF lea edx,dword ptr ss:[ebp-0x88]00404BE6   .  51            push ecx00404BE7   .  8D85 7CFFFFFF lea eax,dword ptr ss:[ebp-0x84]00404BED   .  52            push edx00404BEE   .  50            push eax00404BEF   .  6A 07         push 0x700404BF1   .  FF15 B4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStrList00404BF7   .  8D8D 58FFFFFF lea ecx,dword ptr ss:[ebp-0xA8]00404BFD   .  8D95 5CFFFFFF lea edx,dword ptr ss:[ebp-0xA4]00404C03   .  51            push ecx00404C04   .  52            push edx00404C05   .  6A 02         push 0x200404C07   .  FF15 24104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;  msvbvm60.__vbaFreeObjList00404C0D   .  8D85 18FFFFFF lea eax,dword ptr ss:[ebp-0xE8]00404C13   .  8D8D 28FFFFFF lea ecx,dword ptr ss:[ebp-0xD8]00404C19   .  50            push eax00404C1A   .  8D95 38FFFFFF lea edx,dword ptr ss:[ebp-0xC8]00404C20   .  51            push ecx00404C21   .  8D85 48FFFFFF lea eax,dword ptr ss:[ebp-0xB8]00404C27   .  52            push edx00404C28   .  50            push eax00404C29   .  6A 04         push 0x400404C2B   .  FF15 18104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeV>;  msvbvm60.__vbaFreeVarList00404C31   .  8B0E          mov ecx,dword ptr ds:[esi]00404C33   .  83C4 40       add esp,0x4000404C36   .  56            push esi00404C37   .  FF91 08030000 call dword ptr ds:[ecx+0x308]00404C3D   .  8D95 5CFFFFFF lea edx,dword ptr ss:[ebp-0xA4]00404C43   .  50            push eax00404C44   .  52            push edx00404C45   .  FF15 40104000 call dword ptr ds:[<&MSVBVM60.__vbaObjSe>;  msvbvm60.__vbaObjSet00404C4B   .  8B08          mov ecx,dword ptr ds:[eax]00404C4D   .  8D95 7CFFFFFF lea edx,dword ptr ss:[ebp-0x84]00404C53   .  52            push edx00404C54   .  50            push eax00404C55   .  8985 D4FEFFFF mov dword ptr ss:[ebp-0x12C],eax00404C5B   .  FF91 A0000000 call dword ptr ds:[ecx+0xA0]00404C61   .  3BC7          cmp eax,edi00404C63   .  DBE2          fclex00404C65   .  7D 18         jge short 00404C7F00404C67   .  8B8D D4FEFFFF mov ecx,dword ptr ss:[ebp-0x12C]00404C6D   .  68 A0000000   push 0xA000404C72   .  68 442B4000   push 00402B4400404C77   .  51            push ecx00404C78   .  50            push eax00404C79   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj00404C7F   >  8D95 48FFFFFF lea edx,dword ptr ss:[ebp-0xB8]00404C85   .  8D45 94       lea eax,dword ptr ss:[ebp-0x6C]00404C88   .  52            push edx                                 ;  100404C89   .  50            push eax                                 ;  100404C8A   .  C785 50FFFFFF>mov dword ptr ss:[ebp-0xB0],0x100404C94   .  C785 48FFFFFF>mov dword ptr ss:[ebp-0xB8],0x200404C9E   .  FF15 C4104000 call dword ptr ds:[<&MSVBVM60.__vbaI4Var>;  msvbvm60.__vbaI4Var00404CA4   .  8B8D 7CFFFFFF mov ecx,dword ptr ss:[ebp-0x84]          ;  // eax = 100404CAA   .  50            push eax00404CAB   .  51            push ecx                                 ;  // ecx ="123123"00404CAC   .  FF15 54104000 call dword ptr ds:[<&MSVBVM60.#631>]     ;  msvbvm60.rtcMidCharBstr00404CB2   .  8BD0          mov edx,eax                              ;  // eax ="1" "2"00404CB4   .  8D8D 78FFFFFF lea ecx,dword ptr ss:[ebp-0x88]00404CBA   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404CBC   .  50            push eax00404CBD   .  FF15 28104000 call dword ptr ds:[<&MSVBVM60.#516>]     ;  msvbvm60.rtcAnsiValueBstr00404CC3   .  66:8985 00FFF>mov word ptr ss:[ebp-0x100],ax           ;  // eax =0x31 0x3200404CCA   .  8D55 CC       lea edx,dword ptr ss:[ebp-0x34]00404CCD   .  8D85 F8FEFFFF lea eax,dword ptr ss:[ebp-0x108]00404CD3   .  52            push edx                                 ;  100404CD4   .  8D8D 38FFFFFF lea ecx,dword ptr ss:[ebp-0xC8]00404CDA   .  50            push eax                                 ;  3100404CDB   .  51            push ecx00404CDC   .  C785 F8FEFFFF>mov dword ptr ss:[ebp-0x108],0x200404CE6   .  FF15 C8104000 call dword ptr ds:[<&MSVBVM60.__vbaVarAd>;  msvbvm60.__vbaVarAdd00404CEC   .  8BD0          mov edx,eax                              ;  // eax =3100404CEE   .  8D4D CC       lea ecx,dword ptr ss:[ebp-0x34]00404CF1   .  FF15 08104000 call dword ptr ds:[<&MSVBVM60.__vbaVarMo>;  msvbvm60.__vbaVarMove00404CF7   .  8D95 78FFFFFF lea edx,dword ptr ss:[ebp-0x88]00404CFD   .  8D85 7CFFFFFF lea eax,dword ptr ss:[ebp-0x84]00404D03   .  52            push edx00404D04   .  50            push eax00404D05   .  6A 02         push 0x200404D07   .  FF15 B4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStrList00404D0D   .  83C4 0C       add esp,0xC00404D10   .  8D8D 5CFFFFFF lea ecx,dword ptr ss:[ebp-0xA4]00404D16   .  FF15 F4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeO>;  msvbvm60.__vbaFreeObj00404D1C   .  8D8D 48FFFFFF lea ecx,dword ptr ss:[ebp-0xB8]00404D22   .  FF15 10104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeV>;  msvbvm60.__vbaFreeVar00404D28   .  8D8D 44FEFFFF lea ecx,dword ptr ss:[ebp-0x1BC]00404D2E   .  8D95 54FEFFFF lea edx,dword ptr ss:[ebp-0x1AC]00404D34   .  51            push ecx00404D35   .  8D45 94       lea eax,dword ptr ss:[ebp-0x6C]00404D38   .  52            push edx00404D39   .  50            push eax00404D3A   .  FF15 E8104000 call dword ptr ds:[<&MSVBVM60.__vbaVarFo>;  msvbvm60.__vbaVarForNext00404D40   .  8985 2CFEFFFF mov dword ptr ss:[ebp-0x1D4],eax00404D46   .^ E9 D7FCFFFF   jmp 00404A22                             ;  // for 循环00404D4B   >  8D4D CC       lea ecx,dword ptr ss:[ebp-0x34]00404D4E   .  51            push ecx                                 ;  // ecx = 00D2012C00404D4F   .  FF15 A8104000 call dword ptr ds:[<&MSVBVM60.#572>]     ;  msvbvm60.rtcHexBstrFromVar00404D55   .  8BD0          mov edx,eax00404D57   .  8D8D 70FFFFFF lea ecx,dword ptr ss:[ebp-0x90]00404D5D   .  FFD3          call ebx00404D5F   .  BA 0C294000   mov edx,0040290C                         ;  UNICODE "="00404D64   .  8D8D 78FFFFFF lea ecx,dword ptr ss:[ebp-0x88]          ;  eax ="12C"00404D6A   .  FF15 B0104000 call dword ptr ds:[<&MSVBVM60.__vbaStrCo>;  msvbvm60.__vbaStrCopy00404D70   .  8B95 70FFFFFF mov edx,dword ptr ss:[ebp-0x90]          ;  // eax = "="00404D76   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]00404D7C   .  89BD 70FFFFFF mov dword ptr ss:[ebp-0x90],edi00404D82   .  FFD3          call ebx                                 ;  msvbvm60.__vbaStrMove00404D84   .  8B16          mov edx,dword ptr ds:[esi]00404D86   .  8D85 74FFFFFF lea eax,dword ptr ss:[ebp-0x8C]00404D8C   .  8D8D 78FFFFFF lea ecx,dword ptr ss:[ebp-0x88]00404D92   .  50            push eax00404D93   .  51            push ecx00404D94   .  8D85 7CFFFFFF lea eax,dword ptr ss:[ebp-0x84]00404D9A   .  8D4D C8       lea ecx,dword ptr ss:[ebp-0x38]00404D9D   .  50            push eax00404D9E   .  51            push ecx00404D9F   .  56            push esi00404DA0   .  FF92 F8060000 call dword ptr ds:[edx+0x6F8]00404DA6   .  3BC7          cmp eax,edi00404DA8   .  7D 12         jge short 00404DBC00404DAA   .  68 F8060000   push 0x6F800404DAF   .  68 B4274000   push 004027B400404DB4   .  56            push esi00404DB5   .  50            push eax00404DB6   .  FF15 30104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>;  msvbvm60.__vbaHresultCheckObj00404DBC   >  8B85 74FFFFFF mov eax,dword ptr ss:[ebp-0x8C]00404DC2   .  BE 08000000   mov esi,0x800404DC7   .  8D95 48FFFFFF lea edx,dword ptr ss:[ebp-0xB8]00404DCD   .  8D4D CC       lea ecx,dword ptr ss:[ebp-0x34]00404DD0   .  89BD 74FFFFFF mov dword ptr ss:[ebp-0x8C],edi00404DD6   .  8985 50FFFFFF mov dword ptr ss:[ebp-0xB0],eax          ;  // eax="0"00404DDC   .  89B5 48FFFFFF mov dword ptr ss:[ebp-0xB8],esi00404DE2   .  FF15 08104000 call dword ptr ds:[<&MSVBVM60.__vbaVarMo>;  msvbvm60.__vbaVarMove00404DE8   .  8D95 70FFFFFF lea edx,dword ptr ss:[ebp-0x90]          ;  // eax="0"00404DEE   .  8D85 78FFFFFF lea eax,dword ptr ss:[ebp-0x88]00404DF4   .  52            push edx00404DF5   .  8D8D 7CFFFFFF lea ecx,dword ptr ss:[ebp-0x84]00404DFB   .  50            push eax00404DFC   .  51            push ecx00404DFD   .  6A 03         push 0x300404DFF   .  FF15 B4104000 call dword ptr ds:[<&MSVBVM60.__vbaFreeS>;  msvbvm60.__vbaFreeStrList00404E05   .  83C4 10       add esp,0x1000404E08   .  8D55 CC       lea edx,dword ptr ss:[ebp-0x34]00404E0B   .  8D85 08FFFFFF lea eax,dword ptr ss:[ebp-0xF8]00404E11   .  C785 10FFFFFF>mov dword ptr ss:[ebp-0xF0],00402B58     ;  UNICODE "FFFF"00404E1B   .  52            push edx                                 ;  // edx = "0"00404E1C   .  50            push eax                                 ;  // eax = "FFFF"00404E1D   .  C785 08FFFFFF>mov dword ptr ss:[ebp-0xF8],0x800800404E27   .  FF15 6C104000 call dword ptr ds:[<&MSVBVM60.__vbaVarTs>;  msvbvm60.__vbaVarTstEq00404E2D   .  66:85C0       test ax,ax00404E30      0F84 AD000000 je 00404EE3                              ;  // 关键跳转

对于上面的这一长段反汇编,我不想做什么详细解释了。前2/3部分都是For循环,并且没有做什么有用的东西,最后的msvbvm60.__vbaVarTstEq 附近才算了一些东西,但是我也没弄明白到底是怎么回事。所以,抱歉了!

 

由于使用OD没搞明白,使用VB Decoder反编译如下:

Private Sub Command1_Click() ‘404230  Dim var_A4 As TextBox  Dim var_A8 As TextBox  loc_00404255: var_8 = &H401130  loc_00404326: Var_Ret_1 = CLng(Timer)  loc_0040432C: var_5C = Var_Ret_1  loc_0040435B: var_F0 = 1  loc_00404365: var_F8 = 2  loc_0040436B: var_100 = &H3E8  loc_00404375: var_108 = 2  loc_0040437B: var_110 = 1  loc_00404385: var_118 = 2                For var_80 = 1 To 1000 Step 1                If var_14C = 0 Then GoTo loc_00404461  loc_004043A4: var_F0 = 1  loc_004043AA: var_110 = 1  loc_004043D1: var_F8 = 2  loc_004043D7: var_100 = &HFA  loc_004043E1: var_108 = 2  loc_004043E7: var_118 = 2                For var_58 = 1 To 250 Step 1                If var_16C = 0 Then GoTo loc_00404444                If (4205108 <> 4205108) <> 0 Then GoTo loc_0040442A  loc_00404414: var_F0 = 1  loc_0040441E: var_F8 = 2  loc_00404424: var_24 = 1  loc_0040442A:                 Next var_58  loc_00404442: GoTo loc_004043F3  loc_00404444:                 Next var_80  loc_0040445C: GoTo loc_00404391  loc_00404461:   loc_00404467: Var_Ret_2 = CLng(Timer)  loc_0040446D: Var_Ret_2 = Var_Ret_2 - Var_Ret_1                If Var_Ret_2 <= 0 Then GoTo loc_0040452C  loc_0040448A: var_E0 = 80020004h  loc_00404495: var_D0 = 80020004h  loc_004044AC: var_E8 = 10  loc_004044B2: var_D8 = 10  loc_004044B8: var_100 = "Cheater!!!   CHEATER!!!   Cheater!!!   CHEATER!!!"  loc_004044C2: var_108 = 8  loc_004044D6: var_F0 = "You have SmartCheck loaded!...Close it and try again!!!"  loc_004044E0: var_F8 = 8  loc_004044E6: var_B8 = "You have SmartCheck loaded!...Close it and try again!!!"  loc_00404505: MsgBox var_B8, 0, "Cheater!!!   CHEATER!!!   Cheater!!!   CHEATER!!!"  loc_00404527: GoTo loc_00404F86  loc_0040452C:   loc_0040453D: Set var_A4 = var_B8  loc_0040457F: setl bl                If ebx <> 0 Then GoTo loc_00404EDE  loc_004045B9: var_F8 = 2  loc_004045C8: var_F0 = 1  loc_004045D2: var_F8 = 2  loc_004045E6: Set var_A4 = 8  loc_004045F8: var_84 = Text1.Text  loc_00404623: var_100 = Len(var_84)  loc_00404650: var_108 = 3  loc_0040465A: var_110 = 1  loc_00404664: var_118 = 2                For var_6C = 1 To Len(var_84) Step 1  loc_0040467A: var_1D0 = var_18C                If var_18C = 0 Then GoTo loc_00404899  loc_004046C5: var_12C = var_18C  loc_004046CB: var_84 = Text1.Text  loc_00404700: Set var_A8 = var_84  loc_00404710: var_134 = var_A8  loc_00404716: var_88 = Text1.Text  loc_00404745: var_B0 = 1  loc_0040474B: var_D0 = 1  loc_00404751: var_100 = 1  loc_00404767: var_D8 = 2  loc_0040476D: var_108 = 2  loc_00404773: Var_Ret_3 = CLng(var_6C)  loc_00404791: var_8C = Mid$(var_84, Var_Ret_3, 2)  loc_004047AD: Var_Ret_4 = var_6C + 1  loc_004047B4: Var_Ret_5 = CLng(Var_Ret_4)  loc_004047F6: edi = (var_8C = Mid$(var_88, Var_Ret_5, 1)) + 1                If (var_8C = var_90) + 1 = 0 Then GoTo loc_00404874  loc_0040484F: var_F0 = 1  loc_00404859: var_F8 = 2  loc_00404863: Var_Ret_6 = 0 + 1  loc_0040486E: var_48 = Var_Ret_6  loc_00404874:                 Next var_6C  loc_00404894: GoTo loc_00404698  loc_00404899:   loc_004048BA: var_12C = Next var_6C  loc_004048C0: var_84 = Text1.Text  loc_004048F1: Len(var_84) = Len(var_84) - 00000001h  loc_00404900: var_F0 = Len(var_84)  loc_0040490B: var_F8 = &H8003  loc_00404915: Var_Ret_7 = (var_48 = Len(var_84))  loc_00404921: var_134 = Var_Ret_7                If var_A8 <> 0 Then GoTo loc_00404EDE  loc_0040494A: var_F0 = 1  loc_00404954: var_F8 = 2  loc_0040497C: var_12C = Var_Ret_7  loc_00404982: var_84 = Text1.Text  loc_004049B3: var_100 = Len(var_84)  loc_004049E0: var_108 = 3  loc_004049EA: var_110 = 1  loc_004049F4: var_118 = 2                For var_6C = 1 To Len(var_84) Step 1  loc_00404A0A: var_1D4 = var_1BC                If var_1BC = 0 Then GoTo loc_00404D4B  loc_00404A4F: var_12C = 8  loc_00404A55: var_84 = Text1.Text  loc_00404A8C: var_B0 = Len(var_84)  loc_00404A93: var_B8 = 3  loc_00404AAB: var_9C = Hex$(Len(var_84))  loc_00404AE0: var_C0 = var_9C  loc_00404AE6: var_C8 = 9  loc_00404AF0: var_D8 = Left(vbObject, 1)  loc_00404B17: var_E0 = Asc(CStr(1))  loc_00404B1F: var_E8 = 2  loc_00404B44: var_94 = 0040296Ch  loc_00404B5C: var_90 = Hex$(0)  loc_00404B70: var_8C = var_9C  loc_00404B91: Unknown_VTable_Call[eax+000006F8h]  loc_00404BBC: var_38 = var_98  loc_00404C55: var_12C = Len(var_84)  loc_00404C5B: var_84 = Text1.Text  loc_00404C8A: var_B0 = 1  loc_00404C94: var_B8 = 2  loc_00404C9E: Var_Ret_8 = CLng(var_6C)  loc_00404CC3: var_100 = Asc(Mid$(var_84, Var_Ret_8, 1))  loc_00404CDC: var_108 = 2  loc_00404CE6: Var_Ret_9 = var_34 + 0  loc_00404CF1: var_34 = Var_Ret_9                Next var_6C  loc_00404D46: GoTo loc_00404A22  loc_00404D4B:   loc_00404D6A: var_88 = 0040290Ch  loc_00404D82: var_84 = Hex$(var_34)  loc_00404DA0: Unknown_VTable_Call[edx+000006F8h]  loc_00404DD6: var_B0 = var_8C  loc_00404DDC: var_B8 = 8  loc_00404E11: var_F0 = "FFFF"  loc_00404E1D: var_F8 = &H8008  loc_00404E27: Var_Ret_A = (var_8C = "FFFF")                If Var_Ret_A = 0 Then GoTo loc_00404EE3  loc_00404E41: var_E0 = 80020004h  loc_00404E4C: var_D0 = 80020004h  loc_00404E5E: var_E8 = 10  loc_00404E64: var_D8 = 10  loc_00404E6A: var_100 = "Correct serial!"  loc_00404E74: var_108 = 8  loc_00404E88: var_F0 = "Good job, tell me how you do that!"  loc_00404E92: var_F8 = 8  loc_00404EB7: MsgBox "Good job, tell me how you do that!", 0, "Correct serial!"  loc_00404ED9: GoTo loc_00404F86  loc_00404EDE:   loc_00404EE3:   loc_00404EEE: var_E0 = 80020004h  loc_00404EF9: var_D0 = 80020004h  loc_00404F0B: var_E8 = 10  loc_00404F11: var_D8 = 10  loc_00404F17: var_100 = "Wrong serial!"  loc_00404F21: var_108 = 8  loc_00404F35: var_F0 = "Sorry, try again!"  loc_00404F3F: var_F8 = 8  loc_00404F64: MsgBox "Sorry, try again!", 0, "Wrong serial!"  loc_00404F86:   loc_00404F9A: GoTo loc_00404F1A  loc_00405019: Exit Sub  loc_0040508A: Exit SubEnd Sub

不好意思,看的更迷糊了。

暂时只到这里,留待以后继续深挖!

 

BY   笨笨D幸福