亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? morphine.dpr

?? File Protector Morphine
?? DPR
?? 第 1 頁 / 共 5 頁
字號:
        push 0C0000000h
        push ebx            // \\.\SICE
        call eax            //CreateFileA
        cmp eax, 0FFFFFFFFh // if invalid handle value
        je @NTICEDetector   // jumps here
        push eax
        mov eax, [ebp-184h]
        call eax            //CloseHandle
        jmp @DebuggerDetected
      @NTICEDetector:
        mov [ebp-0203h], 05C2E5C5Ch
        mov [ebp-01FFh], 04349544Eh
        mov [ebp-01FBh], 000000045h
        mov ebx, ebp
        sub ebx, 0203h
        mov eax, [ebp-180h]
        push 000000000h
        push 000000080h
        push 000000003h
        push 000000000h
        push 000000003h
        push 0C0000000h
        push ebx            // \\.\NTICE
        call eax            //CreateFileA
        cmp eax, 0FFFFFFFFh // if invalid handle value
        je @FinishingLine   // jumps here
        push eax
        mov eax, [ebp-184h]
        call eax            //CloseHandle
        jmp @DebuggerDetected
    @FinishingLine:
        db 0Fh, 031h
        mov [ebp-0203h], eax
        db 0Fh, 031h
        add eax, ebx
        mov [ebp-01FFh], eax
        db 0Fh, 031h
        sub eax, ebx
        mov [ebp-01FBh], eax
        call @CheckCRC64
   @CheckCRC64:
      pop eax
      mov ebx, eax
      add eax, 000000031h
      sub ebx, 0000001F9h
      @CalcCrc64:
        mov edx, eax //ebx - zacatek ; eax - konyc
        sub edx, ebx //vypocita velkost
        mov esi, ebx //zacatek
        mov ecx, edx //velkost
        xor ebx, ebx
        xor edx, edx
        mov eax, 001h
        @L0:
          movzx ebx, byte ptr [esi]
          inc esi
          add eax, ecx
          add eax, ebx
          xor eax, ebx
          xor edx, eax
          dec ecx
          jne @L0
        cmp edx, [ebp-19Ch]
        jne @DebuggerDetected
   popad
   jmp @Depackers
@DebuggerDetected:
   call @FindNow
@FindNow:
   pop eax
  @FindLDRStart:
     dec eax
     cmp [eax], 00F50310Fh
   jne @FindLDRStart
     cmp [eax+04h], 024042B31h
   jne @FindLDRStart
   call @FindNow2
@FindNow2:
   pop edi
   sub edi, 08h
  @EraseLoop1:
     mov dword ptr[eax], 00h
     inc eax
     cmp eax, edi
   jne @EraseLoop1
   call @FindNow3
@FindNow3:
   pop eax
 @FindFileEnd:
     inc eax
     cmp [eax], 06E52654Bh
     jne @FindFileEnd
     cmp [eax+04h], 032336C45h
     jne @FindFileEnd
     cmp [eax+08h], 06C4C642Eh
   jne @FindFileEnd
   sub eax, 09Ch
   call @FindNow4
@FindNow4:
   pop ebx
 @FindLoaderX:
   inc ebx
   cmp [ebx], 0642E3233h
   jne @FindLoaderX
   cmp [ebx+05h], 072657375h
 jne @FindLoaderX
@EraseLoop2:
     mov dword ptr[eax], 00h
     dec eax
     cmp eax, ebx
 jne @EraseLoop2
//Vypisuvac Textu
  call @FinXXXXXX
@FinXXXXXX:
  pop eax
  add eax, 0FFFh
  mov ebx, eax
  add ebx, 00ACh
  mov [eax], 0656C6946h
  mov [eax+04h], 0636E4920h
  mov [eax+08h], 07572726Fh
  mov [eax+0Ch], 064657470h
  mov [eax+010h], 002021h
  mov [ebx], 06F727245h
  mov [ebx+04h], 052h
//End
   mov ecx, [ebp-190h]
   mov [ebp-190h], eax
   push 00000000
   push ebx //caption
   push eax //text
   push 00000000
   call ecx
   mov eax, [ebp-190h]
   mov [eax], 000h
   mov [eax+04h], 000h
   mov [eax+08h], 000h
   mov [eax+0Ch], 000h
   mov [eax+010h], 000h
   mov ebx, eax
   add ebx, 00ACh
   mov [ebx], 000h
   mov [ebx+04h], 000h
//Erase MY Improts
  mov ebx, ebp
  sub ebx, 174h
  mov edx, [ebp-198h]
@EraseImportLoop:
  sub ebx, 04h
  mov [ebx],000h
  mov eax, ebp
  sub eax, 194h
  cmp ebx, eax
jne @EraseImportLoop
  push PAGE_READWRITE                   //flProtect
  push MEM_COMMIT or MEM_RESERVE        //flAllocationType
  push 0100h                            //dwSize
  push 0                                //lpAddress
  call edx                              //VirtualAlloc
  mov edx, eax

  mov [eax], 04259d231h
  add eax, 04h
  mov [eax], 000AFFA81h
  add eax, 04h
  mov [eax], 0F6750000h
  add eax, 04h
  mov [eax], 0C750C083h
  add eax, 04h
  mov [eax], 001010100h
  add eax, 04h
  mov [eax], 004E88301h
  add eax, 04h
  mov [eax], 075003883h
  add eax, 04h
  mov [eax], 0FC7883F2h
  add eax, 04h
  mov [eax], 031EC7500h
  add eax, 04h
  mov [eax], 000C390C0h

  call @CallMeXXX
@CallMeXXX:
  pop eax
  push edx
  retn
              popad
                 xor eax, eax
             popad
               xor ebx, ebx
           popad
             xor ecx, ecx
         popad
           xor edi, edi
       popad
         xor esi, esi
     popad
       xor eax, eax
   popad
   xor edi, edi
   push eax
     xor ebx, ebx
     push ebx
       xor esi, esi
       push ecx
         xor ecx, ecx
         push edi
           xor al, al
           push esi
             xor ax, ax
             call @ultra
@Ultra:
             pop eax
             sub eax, 03h
@UltraEraseLoop:
             mov [eax], 001010101h
             sub eax, 04h
             cmp [eax], 00h
             jne @UltraEraseLoop
             cmp [eax-04h], 00h
             jne @UltraEraseLoop
             xor eax, eax
             push eax
             retn
@LoadLibraries:
  pop eax
//Added by Silent Shield (Dayvo)
  push 000006C6Ch
  push 0642E3233h
  push 072657375h                       //user32.dll on stack
  push esp                              //lpLibFileName
  mov eax,[ebp+010h]                    //ImportThunk.LoadLibrary
  call [eax]                            //LoadLibrary
  add esp,010h
  mov [ebp-178h],eax                    //user32.dll on my stack
  test eax,eax
  jz @DynLoader_end
//End of Added

  push 000h
  push 06C6C642Eh
  push 032336C65h
  push 06E72656Bh                       //kernel32.dll on stack
  push esp                              //lpLibFileName
  mov eax,[ebp+010h]                    //ImportThunk.LoadLibrary
  call [eax]                            //LoadLibrary
  add esp,010h
  mov [ebp-174h],eax                    //kenrel32.dll on my stack
  mov edi,eax

  push 000h
  push 0636F6C6Ch
  push 0416C6175h
  push 074726956h                       //VirtualAlloc on stack
  push esp                              //lpProcName
  push eax                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-198h],eax                    //VirtualAlloc on my stack
  mov ebx,eax
  test eax,eax
  jz @DynLoader_end

//Newly Added by Silent Shield (Dayvo)
  push 000000074h
  push 06E657365h
  push 072507265h
  push 067677562h
  push 065447349h                       //IsDbgPresent on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-17Ch],eax                    //IsDebuggerPresent on my stack
  test eax,eax
  jz @DynLoader_end

  push 00041656Ch
  push 069466574h
  push 061657243h                       //CreateFileA on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-180h],eax                    //CreateFileA on my stack
  test eax,eax
  jz @DynLoader_end

  push 000656C64h
  push 06E614865h
  push 0736F6C43h                       //CloseHandle on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-184h],eax                    //CloseHandle on my stack
  test eax,eax
  jz @DynLoader_end

  mov edi, [ebp-178h] //now loading from user32.dll - hmmm

  push 00041776Fh
  push 0646E6957h
  push 0646E6946h                       //FindWindowA on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-188h],eax                    //FindWindowA on my stack
  test eax,eax
  jz @DynLoader_end

  push 000004174h
  push 078655477h
  push 06F646E69h
  push 057746547h                       //GetWindowTextA on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-18Ch],eax                    //GetWindowTextA on my stack
  test eax,eax
  jz @DynLoader_end

  push 00041786Fh
  push 042656761h
  push 07373654Dh                       //MessageBoxA on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-190h],eax                    //MessageBoxA on my stack
  test eax,eax
  jz @DynLoader_end

  push 000h
  push 041687467h
  push 06E654C74h
  push 078655477h
  push 06F646E69h
  push 057746547h                       //GetWindowTextLengthA on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-194h],eax                    //GetWindowTextLengthA on my stack
  test eax,eax
  jz @DynLoader_end

  mov edi, [ebp-174h] //for security systems I write back kernel32.dll - hmmm
//End of Added

//CRC CHECK - FIELD
  mov [ebp-19Ch], 00003B173h
//END OF CRC CHECK - FIELD

  push 000007463h
  push 065746f72h
  push 0506C6175h
  push 074726956h                       //VirtualProtect on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-074h],eax                    //VirtualProtect
  test eax,eax
  jz @DynLoader_end

  push 000h
  push 079726575h
  push 0516C6175h
  push 074726956h                       //VirtualQuery on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-078h],eax                    //VirtualQuery
  test eax,eax
  jz @DynLoader_end

  push 000h
  push 072745064h
  push 061655264h
  push 061427349h                       //IsBadReadPtr on stack
  push esp                              //lpProcName
  push edi                              //hModule
  mov eax,[ebp+00Ch]                    //ImportThunk.GetProcAddress
  call [eax]                            //GetProcAddress
  add esp,010h
  mov [ebp-07Ch],eax                    //IsBadReadPtr
  test eax,eax
  jz @DynLoader_end
  jmp @SuperAntiDebugger

@UnpackerEntryPoint:
  call @LoadLibraries
@Depackers:
  call @depackit

  lea edi,[ebp-01F8h]                   //NtHeaders
  push edi
  mov esi,[ebp+008h]                    //TImageDosHeader
  add esi,[esi+03Ch]                    //TImageDosHeader._lfanew
  push 03Eh                             //SizeOf(NtHeaders) div 4
  pop ecx
  rep movsd
  pop edi
  mov eax,[edi+034h]                    //NtHeaders.OptionalHeader.ImageBase
  mov [ebp-004h],eax                    //ImageBaseOrg
  mov ecx,[edi+050h]                    //NtHeaders.OptionalHeader.SizeOfImage
  mov [ebp-008h],ecx                    //ImageSizeOrg

  push ecx
  push PAGE_EXECUTE_READWRITE           //flProtect
  push MEM_COMMIT or MEM_RESERVE        //flAllocationType
  push ecx                              //dwSize
  push eax                              //lpAddress
  call ebx                              //VirtualAlloc
  pop ecx
  test eax,eax
  jnz @DynLoader_alloc_done

  push PAGE_EXECUTE_READWRITE           //flProtect
  push MEM_COMMIT                       //flAllocationType
  push ecx                              //dwSize
  push eax                              //lpAddress
  call ebx                              //VirtualAlloc
  test eax,eax
  jz @DynLoader_end

 @DynLoader_alloc_done:
  mov [ebp-00Ch],eax                    //FileData
  mov edi,eax
  mov esi,[ebp+008h]                    //TImageDosHeader
  push esi
  mov ecx,esi                           //TImageDosHeader

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美在线视频你懂得| 久久99国产精品麻豆| 视频一区二区欧美| 成人性生交大合| 色综合中文字幕国产| 97se亚洲国产综合在线| 国产福利91精品一区二区三区| 国产一区 二区 三区一级| 成人污污视频在线观看| 色诱视频网站一区| 欧美一区二区三区免费观看视频| 日韩欧美国产一区二区三区| 欧美精品一区二区三区久久久| 中文字幕第一页久久| 一级做a爱片久久| 久久99久久99| 91黄色激情网站| 久久只精品国产| 亚洲午夜成aⅴ人片| 国产乱淫av一区二区三区| 97精品国产露脸对白| 欧美男生操女生| 欧美国产精品中文字幕| 免费久久99精品国产| 色哟哟国产精品| 中文字幕国产精品一区二区| 热久久一区二区| 欧美日韩精品一区二区在线播放| 91麻豆精品国产91久久久使用方法 | 日韩高清中文字幕一区| voyeur盗摄精品| 精品国产免费一区二区三区香蕉| 亚洲一二三四区不卡| 99国产精品久久久久久久久久 | 色综合久久中文字幕综合网| 日韩精品专区在线影院观看| 午夜电影网亚洲视频| 在线亚洲一区二区| **网站欧美大片在线观看| 国产福利一区二区三区视频| 久久女同性恋中文字幕| 国产精品中文字幕欧美| 久久精品免费在线观看| 国产成人综合精品三级| 国产三级精品三级| 成人免费电影视频| 亚洲精品伦理在线| 欧美日韩精品是欧美日韩精品| 午夜亚洲国产au精品一区二区| 91精品婷婷国产综合久久竹菊| 日韩精品成人一区二区在线| 欧美挠脚心视频网站| 国产精品一线二线三线精华| 中文字幕精品三区| 欧美日韩免费电影| 日韩精品91亚洲二区在线观看 | 成人蜜臀av电影| 一区二区三区精密机械公司| 欧美一区二区三区性视频| 精品制服美女久久| 亚洲欧洲国产日韩| 欧美一级高清片| 91小视频在线| 国产一区久久久| 午夜欧美电影在线观看| 久久精品在这里| 69av一区二区三区| jiyouzz国产精品久久| 乱中年女人伦av一区二区| 成人免费在线视频观看| 久久久精品国产99久久精品芒果| 色婷婷综合久久| av不卡免费在线观看| 国产一区二区福利视频| 免费观看久久久4p| 亚洲18色成人| 五月天激情综合网| 亚洲制服欧美中文字幕中文字幕| 国产精品毛片久久久久久久| 91精品一区二区三区在线观看| gogo大胆日本视频一区| www.日本不卡| 91免费国产在线| 一本一道综合狠狠老| 福利视频网站一区二区三区| 国产成人综合网站| 成人美女在线视频| 成人美女视频在线观看18| av网站一区二区三区| 成人av免费在线观看| 成a人片国产精品| 色综合天天综合给合国产| 色老综合老女人久久久| 欧美日韩国产在线观看| 欧美一区二区三区视频免费 | 国产91精品一区二区麻豆亚洲| 久久精品国产久精国产| 成人99免费视频| 欧美亚洲愉拍一区二区| 欧美一区二区福利在线| 国产亚洲美州欧州综合国| 亚洲欧美欧美一区二区三区| 亚洲成av人综合在线观看| 秋霞电影一区二区| www.av精品| 欧美一区二区视频在线观看2022| 久久综合九色综合97婷婷| 成人欧美一区二区三区小说| 日韩和欧美一区二区三区| 国产精品资源网站| 69久久夜色精品国产69蝌蚪网| 日本一区二区三区视频视频| 亚洲午夜私人影院| 不卡免费追剧大全电视剧网站| 69成人精品免费视频| 亚洲免费观看视频| 国产精品99久久不卡二区| 精品视频1区2区| 综合久久给合久久狠狠狠97色| 精东粉嫩av免费一区二区三区| 欧美日本在线看| 艳妇臀荡乳欲伦亚洲一区| 成人av电影在线| 国产拍揄自揄精品视频麻豆| 激情伊人五月天久久综合| 欧美剧在线免费观看网站| 一区二区三区美女| 色噜噜狠狠色综合中国| 一个色综合av| 欧美午夜精品理论片a级按摩| 亚洲精品videosex极品| 91丨九色丨蝌蚪丨老版| 亚洲精品欧美二区三区中文字幕| 成人免费精品视频| 亚洲日本va午夜在线电影| 不卡的电影网站| 一区二区在线电影| 欧美精品丝袜久久久中文字幕| 亚洲一级电影视频| 欧美一区二区女人| 国产精品一二三| 中文字幕一区二区三中文字幕| 波多野结衣视频一区| 亚洲精品国产一区二区精华液| 99re成人精品视频| 丝袜亚洲另类欧美综合| 久久久久久亚洲综合| 色呦呦国产精品| 蜜桃久久精品一区二区| 国产精品天美传媒| 91精品国产综合久久婷婷香蕉| 黄色资源网久久资源365| 午夜久久福利影院| 久久免费电影网| 欧美一区二区私人影院日本| 99免费精品在线观看| 国产一区啦啦啦在线观看| 亚洲一区二区三区不卡国产欧美| 日韩精品专区在线影院重磅| 91亚洲男人天堂| 成人免费视频视频| 久久99九九99精品| 日本伊人精品一区二区三区观看方式| 亚洲欧美影音先锋| 久久久777精品电影网影网| 在线成人午夜影院| 91久久精品网| 91久久精品网| 色一情一乱一乱一91av| 不卡视频在线看| 成人免费看视频| 成人av在线资源| 99视频一区二区| 97se亚洲国产综合自在线观| 成人性色生活片| 国产成人福利片| 日韩精品国产精品| 亚洲成人你懂的| 国产精品久久久久久久午夜片| wwww国产精品欧美| 欧美精品一区二区久久婷婷| 精品欧美黑人一区二区三区| 亚洲日本韩国一区| 亚洲色大成网站www久久九九| 国产精品嫩草影院com| 国产精品国产三级国产aⅴ中文| 亚洲人成亚洲人成在线观看图片| 亚洲女女做受ⅹxx高潮| 日韩精品一级二级| 国产在线日韩欧美| 91在线视频18| 337p亚洲精品色噜噜| 国产日韩av一区| 亚洲国产精品久久艾草纯爱| 国内外成人在线| 色狠狠一区二区| 久久精品男人天堂av| 午夜国产精品影院在线观看| 韩国精品主播一区二区在线观看 | 国产日产亚洲精品系列|