请大家帮我看一下,这是不是放注册码的地方,是的话,注册怎么做,我做了一个可是注册不上,没有明码,注册码不管对与不对,都会关闭程序
0041F9BB 90 nop
0041F9BC $ 55 push ebp
0041F9BD . 8BEC mov ebp, esp
0041F9BF . 81C4 8CF9FFFF add esp, -674
0041F9C5 . 53 push ebx
0041F9C6 . 33D2 xor edx, edx
0041F9C8 . 8995 8CF9FFFF mov dword ptr [ebp-674], edx
0041F9CE . 8995 90F9FFFF mov dword ptr [ebp-670], edx
0041F9D4 . 8845 FF mov byte ptr [ebp-1], al
0041F9D7 . 33C0 xor eax, eax
0041F9D9 . 55 push ebp
0041F9DA . 68 90FC4100 push 0041FC90
0041F9DF . 64:FF30 push dword ptr fs:[eax]
0041F9E2 . 64:8920 mov dword ptr fs:[eax], esp
0041F9E5 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041F9EB . E8 20FEFFFF call 0041F810
0041F9F0 . 8D85 94F9FFFF lea eax, dword ptr [ebp-66C]
0041F9F6 . BA FF000000 mov edx, 0FF
0041F9FB . E8 54B5FFFF call 0041AF54
0041FA00 . B9 14000000 mov ecx, 14
0041FA05 . 8D85 95F9FFFF lea eax, dword ptr [ebp-66B]
0041FA0B . 8D95 94FAFFFF lea edx, dword ptr [ebp-56C]
0041FA11 > 8A18 mov bl, byte ptr [eax]
0041FA13 . 881A mov byte ptr [edx], bl
0041FA15 . 42 inc edx
0041FA16 . 40 inc eax
0041FA17 . 49 dec ecx
0041FA18 .^ 75 F7 jnz short 0041FA11
0041FA1A . 8D95 94FAFFFF lea edx, dword ptr [ebp-56C]
0041FA20 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FA26 . B9 14000000 mov ecx, 14
0041FA2B . E8 28FEFFFF call 0041F858
0041FA30 . 8D55 F8 lea edx, dword ptr [ebp-8]
0041FA33 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FA39 . B9 04000000 mov ecx, 4
0041FA3E . E8 19FFFFFF call 0041F95C
0041FA43 . E9 2A020000 jmp 0041FC72
0041FA48 . F645 FF 01 test byte ptr [ebp-1], 1
0041FA4C . 0F84 BB000000 je 0041FB0D
0041FA52 . 8D45 F0 lea eax, dword ptr [ebp-10]
0041FA55 . 50 push eax ; /pHandle
0041FA56 . 6A 01 push 1 ; |Access = KEY_QUERY_VALUE
0041FA58 . 6A 00 push 0 ; |Reserved = 0
0041FA5A . 68 A0FC4100 push 0041FCA0 ; |Subkey = "Software\Microsoft\Windows NT\CurrentVersion"
0041FA5F . 68 02000080 push 80000002 ; |hKey = HKEY_LOCAL_MACHINE
0041FA64 . E8 E725FEFF call <jmp.&ADVAPI32.RegOpenKeyExA> ; \RegOpenKeyExA
0041FA69 . 85C0 test eax, eax
0041FA6B . 74 1F je short 0041FA8C
0041FA6D . 8D45 F0 lea eax, dword ptr [ebp-10]
0041FA70 . 50 push eax ; /pHandle
0041FA71 . 6A 01 push 1 ; |Access = KEY_QUERY_VALUE
0041FA73 . 6A 00 push 0 ; |Reserved = 0
0041FA75 . 68 D0FC4100 push 0041FCD0 ; |Subkey = "Software\Microsoft\Windows\CurrentVersion"
0041FA7A . 68 02000080 push 80000002 ; |hKey = HKEY_LOCAL_MACHINE
0041FA7F . E8 CC25FEFF call <jmp.&ADVAPI32.RegOpenKeyExA> ; \RegOpenKeyExA
0041FA84 . 85C0 test eax, eax
0041FA86 . 0F85 81000000 jnz 0041FB0D
0041FA8C > C745 F4 00040>mov dword ptr [ebp-C], 400
0041FA93 . 8D45 F4 lea eax, dword ptr [ebp-C]
0041FA96 . 50 push eax ; /pBufSize
0041FA97 . 8D85 94FAFFFF lea eax, dword ptr [ebp-56C] ; |
0041FA9D . 50 push eax ; |Buffer
0041FA9E . 6A 00 push 0 ; |pValueType = NULL
0041FAA0 . 6A 00 push 0 ; |Reserved = NULL
0041FAA2 . 68 FCFC4100 push 0041FCFC ; |ValueName = "RegisteredOwner"
0041FAA7 . 8B45 F0 mov eax, dword ptr [ebp-10] ; |
0041FAAA . 50 push eax ; |hKey
0041FAAB . E8 A825FEFF call <jmp.&ADVAPI32.RegQueryValueExA> ; \RegQueryValueExA
0041FAB0 . 85C0 test eax, eax
0041FAB2 . 75 14 jnz short 0041FAC8
0041FAB4 . 8D95 94FAFFFF lea edx, dword ptr [ebp-56C]
0041FABA . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FAC0 . 8B4D F4 mov ecx, dword ptr [ebp-C]
0041FAC3 . E8 90FDFFFF call 0041F858
0041FAC8 > C745 F4 00040>mov dword ptr [ebp-C], 400
0041FACF . 8D45 F4 lea eax, dword ptr [ebp-C]
0041FAD2 . 50 push eax ; /pBufSize
0041FAD3 . 8D85 94FAFFFF lea eax, dword ptr [ebp-56C] ; |
0041FAD9 . 50 push eax ; |Buffer
0041FADA . 6A 00 push 0 ; |pValueType = NULL
0041FADC . 6A 00 push 0 ; |Reserved = NULL
0041FADE . 68 0CFD4100 push 0041FD0C ; |ValueName = "RegisteredOrganization"
0041FAE3 . 8B45 F0 mov eax, dword ptr [ebp-10] ; |
0041FAE6 . 50 push eax ; |hKey
0041FAE7 . E8 6C25FEFF call <jmp.&ADVAPI32.RegQueryValueExA> ; \RegQueryValueExA
0041FAEC . 85C0 test eax, eax
0041FAEE . 75 14 jnz short 0041FB04
0041FAF0 . 8D95 94FAFFFF lea edx, dword ptr [ebp-56C]
0041FAF6 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FAFC . 8B4D F4 mov ecx, dword ptr [ebp-C]
0041FAFF . E8 54FDFFFF call 0041F858
0041FB04 > 8B45 F0 mov eax, dword ptr [ebp-10]
0041FB07 . 50 push eax ; /hKey
0041FB08 . E8 3B25FEFF call <jmp.&ADVAPI32.RegCloseKey> ; \RegCloseKey
0041FB0D > F645 FF 02 test byte ptr [ebp-1], 2
0041FB11 . 74 35 je short 0041FB48
0041FB13 . 8D45 AC lea eax, dword ptr [ebp-54]
0041FB16 . 50 push eax ; /pSystemInfo
0041FB17 . E8 9C26FEFF call <jmp.&KERNEL32.GetSystemInfo> ; \GetSystemInfo
0041FB1C . 8D85 94FAFFFF lea eax, dword ptr [ebp-56C]
0041FB22 . 8B55 AC mov edx, dword ptr [ebp-54]
0041FB25 . 8910 mov dword ptr [eax], edx
0041FB27 . 8D85 98FAFFFF lea eax, dword ptr [ebp-568]
0041FB2D . 8B55 C4 mov edx, dword ptr [ebp-3C]
0041FB30 . 8910 mov dword ptr [eax], edx
0041FB32 . 8D95 94FAFFFF lea edx, dword ptr [ebp-56C]
0041FB38 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FB3E . B9 08000000 mov ecx, 8
0041FB43 . E8 10FDFFFF call 0041F858
0041FB48 > F645 FF 04 test byte ptr [ebp-1], 4
0041FB4C . 74 55 je short 0041FBA3
0041FB4E . 8D45 E0 lea eax, dword ptr [ebp-20]
0041FB51 . 50 push eax
0041FB52 . E8 E123FEFF call <jmp.&ole32.CoCreateGuid>
0041FB57 . 8D45 D0 lea eax, dword ptr [ebp-30]
0041FB5A . 50 push eax
0041FB5B . E8 D823FEFF call <jmp.&ole32.CoCreateGuid>
0041FB60 . 8A45 EA mov al, byte ptr [ebp-16]
0041FB63 . 3A45 DA cmp al, byte ptr [ebp-26]
0041FB66 . 75 3B jnz short 0041FBA3
0041FB68 . 8A45 EB mov al, byte ptr [ebp-15]
0041FB6B . 3A45 DB cmp al, byte ptr [ebp-25]
0041FB6E . 75 33 jnz short 0041FBA3
0041FB70 . 8A45 EC mov al, byte ptr [ebp-14]
0041FB73 . 3A45 DC cmp al, byte ptr [ebp-24]
0041FB76 . 75 2B jnz short 0041FBA3
0041FB78 . 8A45 ED mov al, byte ptr [ebp-13]
0041FB7B . 3A45 DD cmp al, byte ptr [ebp-23]
0041FB7E . 75 23 jnz short 0041FBA3
0041FB80 . 8A45 EE mov al, byte ptr [ebp-12]
0041FB83 . 3A45 DE cmp al, byte ptr [ebp-22]
0041FB86 . 75 1B jnz short 0041FBA3
0041FB88 . 8A45 EF mov al, byte ptr [ebp-11]
0041FB8B . 3A45 DF cmp al, byte ptr [ebp-21]
0041FB8E . 75 13 jnz short 0041FBA3
0041FB90 . 8D55 EA lea edx, dword ptr [ebp-16]
0041FB93 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FB99 . B9 06000000 mov ecx, 6
0041FB9E . E8 B5FCFFFF call 0041F858
0041FBA3 > F645 FF 08 test byte ptr [ebp-1], 8
0041FBA7 . 0F84 B2000000 je 0041FC5F
0041FBAD . B3 43 mov bl, 43
0041FBAF > 8D85 90F9FFFF lea eax, dword ptr [ebp-670]
0041FBB5 . 8BD3 mov edx, ebx
0041FBB7 . E8 1417FEFF call <jmp.&rtl70.System::LStrFromChar>
0041FBBC . 8D85 90F9FFFF lea eax, dword ptr [ebp-670]
0041FBC2 . BA 2CFD4100 mov edx, 0041FD2C ; ASCII ":\"
0041FBC7 . E8 3C17FEFF call <jmp.&rtl70.System::LStrCat>
0041FBCC . 8B85 90F9FFFF mov eax, dword ptr [ebp-670]
0041FBD2 . E8 5917FEFF call <jmp.&rtl70.System::LStrToPChar>
0041FBD7 . 50 push eax ; /RootPathName
0041FBD8 . E8 7325FEFF call <jmp.&KERNEL32.GetDriveTypeA> ; \GetDriveTypeA
0041FBDD . 83F8 03 cmp eax, 3
0041FBE0 . 75 73 jnz short 0041FC55
0041FBE2 . 8D85 94FAFFFF lea eax, dword ptr [ebp-56C]
0041FBE8 . 33C9 xor ecx, ecx
0041FBEA . BA 00040000 mov edx, 400
0041FBEF . E8 0C15FEFF call <jmp.&rtl70.System::FillChar>
0041FBF4 . 889D 94FAFFFF mov byte ptr [ebp-56C], bl
0041FBFA . 6A 00 push 0
0041FBFC . 6A 00 push 0
0041FBFE . 8D45 F4 lea eax, dword ptr [ebp-C]
0041FC01 . 50 push eax
0041FC02 . 8D45 F4 lea eax, dword ptr [ebp-C]
0041FC05 . 50 push eax
0041FC06 . 8D85 95FAFFFF lea eax, dword ptr [ebp-56B]
0041FC0C . 50 push eax
0041FC0D . 6A 00 push 0
0041FC0F . 6A 00 push 0
0041FC11 . 8D85 8CF9FFFF lea eax, dword ptr [ebp-674]
0041FC17 . 8BD3 mov edx, ebx
0041FC19 . E8 B216FEFF call <jmp.&rtl70.System::LStrFromChar>
0041FC1E . 8D85 8CF9FFFF lea eax, dword ptr [ebp-674]
0041FC24 . BA 2CFD4100 mov edx, 0041FD2C ; ASCII ":\"
0041FC29 . E8 DA16FEFF call <jmp.&rtl70.System::LStrCat>
0041FC2E . 8B85 8CF9FFFF mov eax, dword ptr [ebp-674]
0041FC34 . E8 F716FEFF call <jmp.&rtl70.System::LStrToPChar>
0041FC39 . 50 push eax ; |RootPathName
0041FC3A . E8 B925FEFF call <jmp.&KERNEL32.GetVolumeInformat>; \GetVolumeInformationA
0041FC3F . 8D95 94FAFFFF lea edx, dword ptr [ebp-56C]
0041FC45 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FC4B . B9 05000000 mov ecx, 5
0041FC50 . E8 03FCFFFF call 0041F858
0041FC55 > 43 inc ebx
0041FC56 . 80FB 5B cmp bl, 5B
0041FC59 .^ 0F85 50FFFFFF jnz 0041FBAF
0041FC5F > 8D55 F8 lea edx, dword ptr [ebp-8]
0041FC62 . 8D85 94FEFFFF lea eax, dword ptr [ebp-16C]
0041FC68 . B9 04000000 mov ecx, 4
0041FC6D . E8 EAFCFFFF call 0041F95C
0041FC72 > 33C0 xor eax, eax
0041FC74 . 5A pop edx
0041FC75 . 59 pop ecx
0041FC76 . 59 pop ecx
0041FC77 . 64:8910 mov dword ptr fs:[eax], edx
0041FC7A . 68 97FC4100 push 0041FC97
0041FC7F > 8D85 8CF9FFFF lea eax, dword ptr [ebp-674]
0041FC85 . BA 02000000 mov edx, 2
0041FC8A . E8 2116FEFF call <jmp.&rtl70.System::LStrArrayClr>
0041FC8F . C3 retn
0041FC90 .^ E9 AB15FEFF jmp <jmp.&rtl70.System::HandleFinall>
0041FC95 .^ EB E8 jmp short 0041FC7F
0041FC97 . 8B45 F8 mov eax, dword ptr [ebp-8]
0041FC9A . 5B pop ebx
0041FC9B . 8BE5 mov esp, ebp
0041FC9D . 5D pop ebp
0041FC9E . C3 retn
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课