新手学习,现拿到一程序的注册运行OllyICE分析代码代码,不知哪位老大能帮忙分析一下注册机算法。先谢谢了!
OllyICE分析代码如下
0040AD40 /$ 55 push ebp
0040AD41 |. 8BEC mov ebp, esp
0040AD43 |. 33C9 xor ecx, ecx
0040AD45 |. 51 push ecx
0040AD46 |. 51 push ecx
0040AD47 |. 51 push ecx
0040AD48 |. 51 push ecx
0040AD49 |. 51 push ecx
0040AD4A |. 8945 FC mov dword ptr [ebp-4], eax
0040AD4D |. 33C0 xor eax, eax
0040AD4F |. 55 push ebp
0040AD50 |. 68 3EAE4000 push 0040AE3E
0040AD55 |. 64:FF30 push dword ptr fs:[eax]
0040AD58 |. 64:8920 mov dword ptr fs:[eax], esp
0040AD5B |. 837D F8 00 cmp dword ptr [ebp-8], 0
0040AD5F |. 75 0D jnz short 0040AD6E
0040AD61 |. 8D55 F8 lea edx, dword ptr [ebp-8]
0040AD64 |. A1 581B4000 mov eax, dword ptr [401B58]
0040AD69 |. E8 3E6EFFFF call 00401BAC
0040AD6E |> 837D F4 00 cmp dword ptr [ebp-C], 0
0040AD72 |. 75 0D jnz short 0040AD81
0040AD74 |. 8D55 F4 lea edx, dword ptr [ebp-C]
0040AD77 |. A1 6C5F4000 mov eax, dword ptr [405F6C]
0040AD7C |. E8 47B2FFFF call 00405FC8
0040AD81 |> 33C0 xor eax, eax
0040AD83 |. 55 push ebp
0040AD84 |. 68 BAAD4000 push 0040ADBA
0040AD89 |. 64:FF30 push dword ptr fs:[eax]
0040AD8C |. 64:8920 mov dword ptr fs:[eax], esp
0040AD8F |. 8B45 F8 mov eax, dword ptr [ebp-8]
0040AD92 |. 50 push eax
0040AD93 |. 8B45 F4 mov eax, dword ptr [ebp-C]
0040AD96 |. 50 push eax
0040AD97 |. 8B00 mov eax, dword ptr [eax]
0040AD99 |. FF50 0C call dword ptr [eax+C]
0040AD9C |. 33C0 xor eax, eax
0040AD9E |. 5A pop edx
0040AD9F |. 59 pop ecx
0040ADA0 |. 59 pop ecx
0040ADA1 |. 64:8910 mov dword ptr fs:[eax], edx
0040ADA4 |. 68 C1AD4000 push 0040ADC1
0040ADA9 |> 8D45 F4 lea eax, dword ptr [ebp-C]
0040ADAC |. E8 1F64FFFF call <jmp.&Vcl50.System::IntfClear>
0040ADB1 |. 8D45 F8 lea eax, dword ptr [ebp-8]
0040ADB4 |. E8 1764FFFF call <jmp.&Vcl50.System::IntfClear>
0040ADB9 \. C3 retn
0040ADBA .^ E9 F962FFFF jmp <jmp.&Vcl50.System::HandleFinally>
0040ADBF .^ EB E8 jmp short 0040ADA9
0040ADC1 . E8 E6A1FFFF call 00404FAC
0040ADC6 . 8B45 FC mov eax, dword ptr [ebp-4]
0040ADC9 . E8 A6F0FFFF call 00409E74
0040ADCE . A1 3C344000 mov eax, dword ptr [40343C]
0040ADD3 . E8 6895FFFF call 00404340
0040ADD8 . 8B40 04 mov eax, dword ptr [eax+4]
0040ADDB . 8D55 EC lea edx, dword ptr [ebp-14]
0040ADDE . E8 1587FFFF call 004034F8
0040ADE3 . 8B4D EC mov ecx, dword ptr [ebp-14]
0040ADE6 . 8D45 F0 lea eax, dword ptr [ebp-10]
0040ADE9 . BA 54AE4000 mov edx, 0040AE54
0040ADEE . E8 4D63FFFF call <jmp.&Vcl50.System::LStrCat3>
0040ADF3 . 8B45 F0 mov eax, dword ptr [ebp-10]
0040ADF6 . 50 push eax
0040ADF7 . 8B45 FC mov eax, dword ptr [ebp-4]
0040ADFA . 8B80 D8020000 mov eax, dword ptr [eax+2D8]
0040AE00 . 8B80 F0010000 mov eax, dword ptr [eax+1F0]
0040AE06 . 33D2 xor edx, edx
0040AE08 . E8 9B7DFFFF call <jmp.&Vcl50.Comctrls::TStatusPanels::>
0040AE0D . 5A pop edx
0040AE0E . E8 857DFFFF call <jmp.&Vcl50.Comctrls::TStatusPanel::S>
0040AE13 . 33C0 xor eax, eax
0040AE15 . 5A pop edx
0040AE16 . 59 pop ecx
0040AE17 . 59 pop ecx
0040AE18 . 64:8910 mov dword ptr fs:[eax], edx
0040AE1B . 68 45AE4000 push 0040AE45
0040AE20 > 8D45 EC lea eax, dword ptr [ebp-14]
0040AE23 . BA 02000000 mov edx, 2
0040AE28 . E8 CB62FFFF call <jmp.&Vcl50.System::LStrArrayClr>
0040AE2D . 8D45 F4 lea eax, dword ptr [ebp-C]
0040AE30 . E8 9B63FFFF call <jmp.&Vcl50.System::IntfClear>
0040AE35 . 8D45 F8 lea eax, dword ptr [ebp-8]
0040AE38 . E8 9363FFFF call <jmp.&Vcl50.System::IntfClear>
0040AE3D . C3 retn
0040AE3E .^ E9 7562FFFF jmp <jmp.&Vcl50.System::HandleFinally>
0040AE43 .^ EB DB jmp short 0040AE20
0040AE45 . 8BE5 mov esp, ebp
0040AE47 . 5D pop ebp
0040AE48 . C3 retn
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!