00463318 . 8BC3 mov eax, ebx
0046331A . E8 F9DFFDFF call 00441318
0046331F . 50 push eax ; |hWnd
00463320 . E8 5779FCFF call <jmp.&shell32.ShellExecuteA> ; \ShellExecuteA
00463325 . 5B pop ebx
00463326 . C3 retn
00463327 00 db 00
00463328 . 68 74 74 70 3A 2F 2F 7>ascii "http://www.softr"
00463338 . 65 67 2E 63 6F 6D 2E 6>ascii "eg.com.cn/sharew"
00463348 . 61 72 65 5F 76 69 65 7>ascii "are_view.asp?id="
00463358 . 2F 39 30 31 36 33 36 4>ascii "/901636C5-BAF7-4"
00463368 . 31 45 36 2D 39 38 37 3>ascii "1E6-9870-22E84F0"
00463378 . 31 36 46 32 35 2F 00 ascii "16F25/",0
0046337F 00 db 00
00463380 . 53 push ebx
00463381 . 8BD8 mov ebx, eax
00463383 . B8 B4334600 mov eax, 004633B4 ; 注册码无效,请与jpsofts@163.com联系
00463388 . E8 7B8BFCFF call 0042BF08
0046338D . 33D2 xor edx, edx
0046338F . 8B83 04030000 mov eax, dword ptr [ebx+304]
00463395 . E8 8676FDFF call 0043AA20
0046339A . 8B83 04030000 mov eax, dword ptr [ebx+304]
004633A0 . 8B10 mov edx, dword ptr [eax]
004633A2 . FF92 C4000000 call dword ptr [edx+C4]
004633A8 . 5B pop ebx
004633A9 . C3 retn
请各位大虾看一下463328--463378那段是否是加密的东东呢?这种该怎么破解呢?
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课