能力值:
( LV2,RANK:10 )
|
-
-
2 楼
找了几天,总算有点头绪了,下面的这一段应该是比较真假注册码的吧,谁能说下注册码是怎么算出来的?
00402EAE . /74 11 JE SHORT 白云视频.00402EC1
00402EB0 . |6A 00 PUSH 0
00402EB2 . |68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示
00402EB7 . |68 94C14000 PUSH 白云视频.0040C194 ; 已注册成功!
00402EBC . |E9 88010000 JMP 白云视频.00403049
00402EC1 > \6A 01 PUSH 1
00402EC3 . 8BCD MOV ECX,EBP
00402EC5 . E8 EA560000 CALL <JMP.&MFC42.#6334_?UpdateData@CWnd@>
00402ECA . 8B7D 60 MOV EDI,DWORD PTR SS:[EBP+60]
00402ECD . 83C9 FF OR ECX,FFFFFFFF
00402ED0 . 33C0 XOR EAX,EAX
00402ED2 . 8D9424 98000000 LEA EDX,DWORD PTR SS:[ESP+98]
00402ED9 . F2:AE REPNE SCAS BYTE PTR ES:[EDI]
00402EDB . F7D1 NOT ECX
00402EDD . 2BF9 SUB EDI,ECX
00402EDF . 8BC1 MOV EAX,ECX
00402EE1 . 8BF7 MOV ESI,EDI
00402EE3 . 8BFA MOV EDI,EDX
00402EE5 . C1E9 02 SHR ECX,2
00402EE8 . F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS>
00402EEA . 8BC8 MOV ECX,EAX
00402EEC . 83E1 03 AND ECX,3
00402EEF . F3:A4 REP MOVS BYTE PTR ES:[EDI],BYTE PTR DS:[>
00402EF1 . E8 34560000 CALL <JMP.&MFC42.#1168_?AfxGetModuleStat>
00402EF6 . 8B40 04 MOV EAX,DWORD PTR DS:[EAX+4]
00402EF9 . 68 C0CD4000 PUSH 白云视频.0040CDC0
00402EFE . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
00402F02 . A3 90C24000 MOV DWORD PTR DS:[40C290],EAX
00402F07 . E8 96560000 CALL <JMP.&MFC42.#860_??4CString@@QAEABV>
00402F0C . 6A 00 PUSH 0
00402F0E . 68 E4C04000 PUSH 白云视频.0040C0E4 ; ld
00402F13 . 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18]
00402F17 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player
00402F1C . 51 PUSH ECX
00402F1D . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8
00402F23 . E8 6E560000 CALL <JMP.&MFC42.#3522_?GetProfileString>
00402F28 . 50 PUSH EAX
00402F29 . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
00402F2D . C68424 24010000 >MOV BYTE PTR SS:[ESP+124],1
00402F35 . E8 56560000 CALL <JMP.&MFC42.#858_??4CString@@QAEABV>
00402F3A . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
00402F3E . C68424 20010000 >MOV BYTE PTR SS:[ESP+120],0
00402F46 . E8 F7550000 CALL <JMP.&MFC42.#800_??1CString@@QAE@XZ>
00402F4B . 8DB424 98000000 LEA ESI,DWORD PTR SS:[ESP+98]
00402F52 . B8 94C24000 MOV EAX,白云视频.0040C294 ; 9izwwsk3
00402F57 > 8A10 MOV DL,BYTE PTR DS:[EAX]
00402F59 . 8ACA MOV CL,DL
00402F5B . 3A16 CMP DL,BYTE PTR DS:[ESI]
00402F5D . 75 1C JNZ SHORT 白云视频.00402F7B
00402F5F . 84C9 TEST CL,CL
00402F61 . 74 14 JE SHORT 白云视频.00402F77
00402F63 . 8A50 01 MOV DL,BYTE PTR DS:[EAX+1]
00402F66 . 8ACA MOV CL,DL
00402F68 . 3A56 01 CMP DL,BYTE PTR DS:[ESI+1]
00402F6B . 75 0E JNZ SHORT 白云视频.00402F7B
00402F6D . 83C0 02 ADD EAX,2
00402F70 . 83C6 02 ADD ESI,2
00402F73 . 84C9 TEST CL,CL
00402F75 .^ 75 E0 JNZ SHORT 白云视频.00402F57
00402F77 > 33C0 XOR EAX,EAX
00402F79 . EB 05 JMP SHORT 白云视频.00402F80
00402F7B > 1BC0 SBB EAX,EAX
00402F7D . 83D8 FF SBB EAX,-1
00402F80 > 85C0 TEST EAX,EAX
00402F82 . 0F85 9E000000 JNZ 白云视频.00403026
00402F88 . 8B45 60 MOV EAX,DWORD PTR SS:[EBP+60]
00402F8B . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8
00402F91 . 50 PUSH EAX
00402F92 . 68 D0C04000 PUSH 白云视频.0040C0D0 ; serial1
00402F97 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player
00402F9C . E8 0D560000 CALL <JMP.&MFC42.#6403_?WriteProfileStri>
00402FA1 . 8B4424 0C MOV EAX,DWORD PTR SS:[ESP+C]
00402FA5 . 68 C0CD4000 PUSH 白云视频.0040CDC0 ; /s2 = ""
00402FAA . 50 PUSH EAX ; |s1
00402FAB . FF15 7C924000 CALL DWORD PTR DS:[<&MSVCRT._mbscmp>] ; \_mbscmp
00402FB1 . 83C4 08 ADD ESP,8
00402FB4 . 85C0 TEST EAX,EAX
00402FB6 . 75 34 JNZ SHORT 白云视频.00402FEC
00402FB8 . 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18]
00402FBC . 51 PUSH ECX
00402FBD . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8
00402FC3 . 68 E4C04000 PUSH 白云视频.0040C0E4 ; ld
00402FC8 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player
00402FCD . E8 DC550000 CALL <JMP.&MFC42.#6403_?WriteProfileStri>
00402FD2 . 8B0D 90C24000 MOV ECX,DWORD PTR DS:[40C290] ; 白云视频.0040C1C8
00402FD8 . 8D5424 18 LEA EDX,DWORD PTR SS:[ESP+18]
00402FDC . 52 PUSH EDX
00402FDD . 68 D8C04000 PUSH 白云视频.0040C0D8 ; nld
00402FE2 . 68 DCC04000 PUSH 白云视频.0040C0DC ; player
00402FE7 . E8 C2550000 CALL <JMP.&MFC42.#6403_?WriteProfileStri>
00402FEC > BF 70C14000 MOV EDI,白云视频.0040C170
00402FF1 . 83C9 FF OR ECX,FFFFFFFF
00402FF4 . 33C0 XOR EAX,EAX
00402FF6 . 6A 00 PUSH 0
00402FF8 . F2:AE REPNE SCAS BYTE PTR ES:[EDI]
00402FFA . F7D1 NOT ECX
00402FFC . 2BF9 SUB EDI,ECX
00402FFE . 68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示
00403003 . 8BC1 MOV EAX,ECX
00403005 . 8BF7 MOV ESI,EDI
00403007 . BF 94C24000 MOV EDI,白云视频.0040C294 ; 9izwwsk3
0040300C . C605 C4CD4000 01 MOV BYTE PTR DS:[40CDC4],1
00403013 . C1E9 02 SHR ECX,2
00403016 . F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS>
00403018 . 8BC8 MOV ECX,EAX
0040301A . 68 54C14000 PUSH 白云视频.0040C154 ; 注册成功!请重新运行软件!
0040301F . 83E1 03 AND ECX,3
00403022 . F3:A4 REP MOVS BYTE PTR ES:[EDI],BYTE PTR DS:[>
00403024 . EB 23 JMP SHORT 白云视频.00403049
00403026 > 803D C4CD4000 01 CMP BYTE PTR DS:[40CDC4],1
0040302D . 75 0E JNZ SHORT 白云视频.0040303D
0040302F . 6A 00 PUSH 0
00403031 . 68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示
00403036 . 68 54C14000 PUSH 白云视频.0040C154 ; 注册成功!请重新运行软件!
0040303B . EB 0C JMP SHORT 白云视频.00403049
0040303D > 6A 00 PUSH 0
0040303F . 68 C8C04000 PUSH 白云视频.0040C0C8 ; 提示
00403044 . 68 3CC14000 PUSH 白云视频.0040C13C ; 注册号错误,请重新输入!
00403049 > 8BCD MOV ECX,EBP
0040304B . E8 3A550000 CALL <JMP.&MFC42.#4224_?MessageBoxA@CWnd>
00403050 . 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C]
00403054 . C78424 20010000 >MOV DWORD PTR SS:[ESP+120],-1
0040305F . E8 DE540000 CALL <JMP.&MFC42.#800_??1CString@@QAE@XZ>
00403064 . 8B8C24 18010000 MOV ECX,DWORD PTR SS:[ESP+118]
0040306B . 5F POP EDI
0040306C . 5E POP ESI
0040306D . 5D POP EBP
0040306E . 64:890D 00000000 MOV DWORD PTR FS:[0],ECX
00403075 . 81C4 18010000 ADD ESP,118
0040307B . C3 RETN
|