00454B06 E8 0DDCFDFF call 00432718 获取用户名
00454B0B 8B45 FC mov eax, dword ptr [ebp-4]
00454B0E E8 4102FBFF call 00404D54 获取用户名长度
00454B13 83F8 06 cmp eax, 6 长度6位以上
00454B16 7F 1B jg short 00454B33
00454B18 8D55 F8 lea edx, dword ptr [ebp-8]
00454B1B 8B86 14030000 mov eax, dword ptr [esi+314]
00454B21 E8 F2DBFDFF call 00432718 获取注册码
00454B26 8B45 F8 mov eax, dword ptr [ebp-8]
00454B29 E8 2602FBFF call 00404D54 获取注册码长度
00454B2E 83F8 20 cmp eax, 20 长度为32位
00454B31 74 1E je short 00454B51 符合就跳转到验证函数
00454B9C E8 FF02FBFF call 00404EA0 用户名+"784D964D"构成的字符
00454BA1 0F85 98000000 jnz 00454C3F 运算后EAX != 0就跳转
00454BA7 8D55 E0 lea edx, dword ptr [ebp-20]
00454BAA 8B86 F8020000 mov eax, dword ptr [esi+2F8]
00454BB0 E8 63DBFDFF call 00432718 获取EAX=用户名长度
00454BB5 8B45 E0 mov eax, dword ptr [ebp-20]
00454BB8 8D55 E4 lea edx, dword ptr [ebp-1C]
00454BBB E8 4CF8FFFF call 0045440C 获取EDX=用户名
00454BC0 8D45 E4 lea eax, dword ptr [ebp-1C]
00454BC3 50 push eax
00454BC4 8D55 DC lea edx, dword ptr [ebp-24]
00454BC7 8B86 14030000 mov eax, dword ptr [esi+314]
00454BCD E8 46DBFDFF call 00432718 获取EAX=注册码长度
00454BD2 8B55 DC mov edx, dword ptr [ebp-24]
00454BD5 58 pop eax
00454BD6 E8 8101FBFF call 00404D5C 获取EDX=注册码
00454BDB 8B55 E4 mov edx, dword ptr [ebp-1C]
00454BDE 8B86 14030000 mov eax, dword ptr [esi+314]
00454BE4 E8 5FDBFDFF call 00432748
00454BE9 8D55 D4 lea edx, dword ptr [ebp-2C]
00454BEC A1 00644500 mov eax, dword ptr [456400]
00454BF1 8B00 mov eax, dword ptr [eax]
00454BF3 E8 40DBFFFF call 00452738
00454BF8 8B45 D4 mov eax, dword ptr [ebp-2C]
00454BFB 8D55 D8 lea edx, dword ptr [ebp-28]
00454BFE E8 B554FBFF call 0040A0B8
00454C03 8D45 D8 lea eax, dword ptr [ebp-28]J
00454C06 BA F84C4500 mov edx, 00454CF8 在目录下创建ccymm.dat
00454C0B E8 4C01FBFF call 00404D5C
00454C10 8B55 D8 mov edx, dword ptr [ebp-28]
00454C13 8B86 14030000 mov eax, dword ptr [esi+314]
00454C19 8B80 20020000 mov eax, dword ptr [eax+220]
00454C1F 8B08 mov ecx, dword ptr [eax]
00454C21 FF51 74 call dword ptr [ecx+74]
00454C24 6A 00 push 0
00454C26 68 BC4C4500 push 00454CBC ; ccymm提示:
00454C2B 68 044D4500 push 00454D04 ; 注册成功,请重启程序!
00454C30 8BC6 mov eax, esi
00454C32 E8 1143FEFF call 00438F48
00454C37 50 push eax
00454C38 E8 5726FBFF call 00407294
在00454B9C E8 FF02FBFF call 00404EA0 的CALL中
00404EA7 39D0 cmp eax, edx
00404EA9 0F84 8F000000 je 00404F3E
00404EAF 85F6 test esi, esi
00404EB1 74 68 je short 00404F1B
00404EB3 85FF test edi, edi
00404EB5 74 6B je short 00404F22
00404EB7 8B46 FC mov eax, dword ptr [esi-4]
00404EBA 8B57 FC mov edx, dword ptr [edi-4]
00404EBD 29D0 sub eax, edx
00404EBF 77 02 ja short 00404EC3
00404EC1 01C2 add edx, eax
00404EC3 52 push edx
00404EC4 C1EA 02 shr edx, 2
00404EC7 74 26 je short 00404EEF
00404EC9 8B0E mov ecx, dword ptr [esi] 用户名的前4位 倒序16进制排列
00404ECB 8B1F mov ebx, dword ptr [edi] 系统里的16进制 484DE3CE ?????
00404ECD 39D9 cmp ecx, ebx 用户名和484DE3CE比较 怎么可能有0xDE 0x3C字符呢 根本无法比较 所以永远提示错误
00404ECF 75 58 jnz short 00404F29 不相等就跳转到下面
00404ED1 4A dec edx
00404ED2 74 15 je short 00404EE9
00404ED4 8B4E 04 mov ecx, dword ptr [esi+4]
00404ED7 8B5F 04 mov ebx, dword ptr [edi+4]
由于以上原因 只能爆破
试着爆破了一下