-
-
[旧帖]
[求助]反汇编代码
0.00雪花
-
发表于:
2008-7-7 16:09
3186
-
利用Wdasm找到这部分代码,这里似乎是激活码的算法,不知道那位高人能指导一下,究竟如何才能算出Key来?或者跳过这段代码,不用激活?
:0057B3C0 BA6CB55700 mov edx, 0057B56C
:0057B3C5 A1B8EA9200 mov eax, dword ptr [0092EAB8]
:0057B3CA 8B00 mov eax, dword ptr [eax]
:0057B3CC E8131EF3FF call 004AD1E4
:0057B3D1 E94D010000 jmp 0057B523
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0057B3B7(C)
|
:0057B3D6 8D55F4 lea edx, dword ptr [ebp-0C]
:0057B3D9 8B830C030000 mov eax, dword ptr [ebx+0000030C]
:0057B3DF E89858F7FF call 004F0C7C
:0057B3E4 8B45F4 mov eax, dword ptr [ebp-0C]
:0057B3E7 8D55FC lea edx, dword ptr [ebp-04]
:0057B3EA E89DE3E8FF call 0040978C
:0057B3EF 8D55F0 lea edx, dword ptr [ebp-10]
:0057B3F2 8B8304030000 mov eax, dword ptr [ebx+00000304]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0057B383(C)
|
:0057B3F8 E87F58F7FF call 004F0C7C
:0057B3FD 8B45F0 mov eax, dword ptr [ebp-10]
:0057B400 8D55F8 lea edx, dword ptr [ebp-08]
:0057B403 E884E3E8FF call 0040978C
:0057B408 33C0 xor eax, eax
:0057B40A 55 push ebp
:0057B40B 6801B55700 push 0057B501
:0057B410 64FF30 push dword ptr fs:[eax]
:0057B413 648920 mov dword ptr fs:[eax], esp
:0057B416 8BB328030000 mov esi, dword ptr [ebx+00000328]
:0057B41C 8A869D000000 mov al, byte ptr [esi+0000009D]
:0057B422 04FE add al, FE
:0057B424 2C02 sub al, 02
:0057B426 730A jnb 0057B432
:0057B428 8BC6 mov eax, esi
:0057B42A 8B10 mov edx, dword ptr [eax]
:0057B42C FF924C020000 call dword ptr [edx+0000024C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0057B426(C)
|
:0057B432 A188EF9200 mov eax, dword ptr [0092EF88]
:0057B437 8B00 mov eax, dword ptr [eax]
:0057B439 8B4DFC mov ecx, dword ptr [ebp-04]
:0057B43C 8B55F8 mov edx, dword ptr [ebp-08]
:0057B43F E884240000 call 0057D8C8
:0057B444 84C0 test al, al
:0057B446 0F8493000000 je 0057B4DF
:0057B44C 6A40 push 00000040
* Possible StringData Ref from Code Obj ->"提示"
|
:0057B44E B964B55700 mov ecx, 0057B564
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课