|
[求助]视频播放器的算法
找了几天,总算有点头绪了,下面的这一段应该是比较真假注册码的吧,谁能说下注册码是怎么算出来的? 00402EAE . /74 11 JE SHORT 白云视频.00402EC1 00402EB0 . |6A 00 PUSH 0 00402EB2 . |68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示 00402EB7 . |68 94C14000 PUSH 白云视频.0040C194 ; 已注册成功! 00402EBC . |E9 88010000 JMP 白云视频.00403049 00402EC1 > \6A 01 PUSH 1 00402EC3 . 8BCD MOV ECX,EBP 00402EC5 . E8 EA560000 CALL <JMP.&MFC42.#6334_?UpdateData@CWnd@> 00402ECA . 8B7D 60 MOV EDI,DWORD PTR SS:[EBP+60] 00402ECD . 83C9 FF OR ECX,FFFFFFFF 00402ED0 . 33C0 XOR EAX,EAX 00402ED2 . 8D9424 98000000 LEA EDX,DWORD PTR SS:[ESP+98] 00402ED9 . F2:AE REPNE SCAS BYTE PTR ES:[EDI] 00402EDB . F7D1 NOT ECX 00402EDD . 2BF9 SUB EDI,ECX 00402EDF . 8BC1 MOV EAX,ECX 00402EE1 . 8BF7 MOV ESI,EDI 00402EE3 . 8BFA MOV EDI,EDX 00402EE5 . C1E9 02 SHR ECX,2 00402EE8 . F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS> 00402EEA . 8BC8 MOV ECX,EAX 00402EEC . 83E1 03 AND ECX,3 00402EEF . F3:A4 REP MOVS BYTE PTR ES:[EDI],BYTE PTR DS:[> 00402EF1 . E8 34560000 CALL <JMP.&MFC42.#1168_?AfxGetModuleStat> 00402EF6 . 8B40 04 MOV EAX,DWORD PTR DS:[EAX+4] 00402EF9 . 68 C0CD4000 PUSH 白云视频.0040CDC0 00402EFE . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10] 00402F02 . A3 90C24000 MOV DWORD PTR DS:[40C290],EAX 00402F07 . E8 96560000 CALL <JMP.&MFC42.#860_??4CString@@QAEABV> 00402F0C . 6A 00 PUSH 0 00402F0E . 68 E4C04000 PUSH 白云视频.0040C0E4 ; ld 00402F13 . 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18] 00402F17 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player 00402F1C . 51 PUSH ECX 00402F1D . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8 00402F23 . E8 6E560000 CALL <JMP.&MFC42.#3522_?GetProfileString> 00402F28 . 50 PUSH EAX 00402F29 . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10] 00402F2D . C68424 24010000 >MOV BYTE PTR SS:[ESP+124],1 00402F35 . E8 56560000 CALL <JMP.&MFC42.#858_??4CString@@QAEABV> 00402F3A . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10] 00402F3E . C68424 20010000 >MOV BYTE PTR SS:[ESP+120],0 00402F46 . E8 F7550000 CALL <JMP.&MFC42.#800_??1CString@@QAE@XZ> 00402F4B . 8DB424 98000000 LEA ESI,DWORD PTR SS:[ESP+98] 00402F52 . B8 94C24000 MOV EAX,白云视频.0040C294 ; 9izwwsk3 00402F57 > 8A10 MOV DL,BYTE PTR DS:[EAX] 00402F59 . 8ACA MOV CL,DL 00402F5B . 3A16 CMP DL,BYTE PTR DS:[ESI] 00402F5D . 75 1C JNZ SHORT 白云视频.00402F7B 00402F5F . 84C9 TEST CL,CL 00402F61 . 74 14 JE SHORT 白云视频.00402F77 00402F63 . 8A50 01 MOV DL,BYTE PTR DS:[EAX+1] 00402F66 . 8ACA MOV CL,DL 00402F68 . 3A56 01 CMP DL,BYTE PTR DS:[ESI+1] 00402F6B . 75 0E JNZ SHORT 白云视频.00402F7B 00402F6D . 83C0 02 ADD EAX,2 00402F70 . 83C6 02 ADD ESI,2 00402F73 . 84C9 TEST CL,CL 00402F75 .^ 75 E0 JNZ SHORT 白云视频.00402F57 00402F77 > 33C0 XOR EAX,EAX 00402F79 . EB 05 JMP SHORT 白云视频.00402F80 00402F7B > 1BC0 SBB EAX,EAX 00402F7D . 83D8 FF SBB EAX,-1 00402F80 > 85C0 TEST EAX,EAX 00402F82 . 0F85 9E000000 JNZ 白云视频.00403026 00402F88 . 8B45 60 MOV EAX,DWORD PTR SS:[EBP+60] 00402F8B . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8 00402F91 . 50 PUSH EAX 00402F92 . 68 D0C04000 PUSH 白云视频.0040C0D0 ; serial1 00402F97 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player 00402F9C . E8 0D560000 CALL <JMP.&MFC42.#6403_?WriteProfileStri> 00402FA1 . 8B4424 0C MOV EAX,DWORD PTR SS:[ESP+C] 00402FA5 . 68 C0CD4000 PUSH 白云视频.0040CDC0 ; /s2 = "" 00402FAA . 50 PUSH EAX ; |s1 00402FAB . FF15 7C924000 CALL DWORD PTR DS:[<&MSVCRT._mbscmp>] ; \_mbscmp 00402FB1 . 83C4 08 ADD ESP,8 00402FB4 . 85C0 TEST EAX,EAX 00402FB6 . 75 34 JNZ SHORT 白云视频.00402FEC 00402FB8 . 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18] 00402FBC . 51 PUSH ECX 00402FBD . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8 00402FC3 . 68 E4C04000 PUSH 白云视频.0040C0E4 ; ld 00402FC8 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player 00402FCD . E8 DC550000 CALL <JMP.&MFC42.#6403_?WriteProfileStri> 00402FD2 . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8 00402FD8 . 8D5424 18 LEA EDX,DWORD PTR SS:[ESP+18] 00402FDC . 52 PUSH EDX 00402FDD . 68 D8C04000 PUSH 白云视频.0040C0D8 ; nld 00402FE2 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player 00402FE7 . E8 C2550000 CALL <JMP.&MFC42.#6403_?WriteProfileStri> 00402FEC > BF 70C14000 MOV EDI,白云视频.0040C170 00402FF1 . 83C9 FF OR ECX,FFFFFFFF 00402FF4 . 33C0 XOR EAX,EAX 00402FF6 . 6A 00 PUSH 0 00402FF8 . F2:AE REPNE SCAS BYTE PTR ES:[EDI] 00402FFA . F7D1 NOT ECX 00402FFC . 2BF9 SUB EDI,ECX 00402FFE . 68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示 00403003 . 8BC1 MOV EAX,ECX 00403005 . 8BF7 MOV ESI,EDI 00403007 . BF 94C24000 MOV EDI,白云视频.0040C294 ; 9izwwsk3 0040300C . C605 C4CD4000 01 MOV BYTE PTR DS:[40CDC4],1 00403013 . C1E9 02 SHR ECX,2 00403016 . F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS> 00403018 . 8BC8 MOV ECX,EAX 0040301A . 68 54C14000 PUSH 白云视频.0040C154 ; 注册成功!请重新运行软件! 0040301F . 83E1 03 AND ECX,3 00403022 . F3:A4 REP MOVS BYTE PTR ES:[EDI],BYTE PTR DS:[> 00403024 . EB 23 JMP SHORT 白云视频.00403049 00403026 > 803D C4CD4000 01 CMP BYTE PTR DS:[40CDC4],1 0040302D . 75 0E JNZ SHORT 白云视频.0040303D 0040302F . 6A 00 PUSH 0 00403031 . 68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示 00403036 . 68 54C14000 PUSH 白云视频.0040C154 ; 注册成功!请重新运行软件! 0040303B . EB 0C JMP SHORT 白云视频.00403049 0040303D > 6A 00 PUSH 0 0040303F . 68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示 00403044 . 68 3CC14000 PUSH 白云视频.0040C13C ; 注册号错误,请重新输入! 00403049 > 8BCD MOV ECX,EBP 0040304B . E8 3A550000 CALL <JMP.&MFC42.#4224_?MessageBoxA@CWnd> 00403050 . 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C] 00403054 . C78424 20010000 >MOV DWORD PTR SS:[ESP+120],-1 0040305F . E8 DE540000 CALL <JMP.&MFC42.#800_??1CString@@QAE@XZ> 00403064 . 8B8C24 18010000 MOV ECX,DWORD PTR SS:[ESP+118] 0040306B . 5F POP EDI 0040306C . 5E POP ESI 0040306D . 5D POP EBP 0040306E . 64:890D 00000000 MOV DWORD PTR FS:[0],ECX 00403075 . 81C4 18010000 ADD ESP,118 0040307B . C3 RETN |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值