端个凳子坐了先.:o
mov eax,dword ptr ds:[ebx+31C]
call CrackMe.00433FB8 ; //取注册码
mov eax,dword ptr ss:[ebp-4]
push eax
lea edx,dword ptr ss:[ebp-8]
mov eax,dword ptr ds:[ebx+318]
call CrackMe.004569D4 ; //取论坛编号
mov eax,dword ptr ss:[ebp-8]
push eax
lea edx,dword ptr ss:[ebp-C]
mov eax,dword ptr ds:[ebx+304]
call CrackMe.00433FB8 ; //取论坛名称
mov eax,dword ptr ss:[ebp-C]
push eax
lea edx,dword ptr ss:[ebp-10]
mov eax,dword ptr ds:[ebx+300]
call CrackMe.00433FB8 ; //取论坛地址
mov eax,dword ptr ss:[ebp-10]
push eax
lea edx,dword ptr ss:[ebp-14]
mov eax,dword ptr ds:[ebx+2FC]
call CrackMe.00433FB8 ; //取帖子数
mov eax,dword ptr ss:[ebp-14]
push eax
call <jmp.&Serial.MyCheck_CheckRegCode2> ; //关键CALL
dec eax
jnz short CrackMe.004598D7
push 40
mov ecx,CrackMe.00459928 ; //注册成功
mov edx,CrackMe.00459934
mov eax,dword ptr ds:[45B048]
mov eax,dword ptr ds:[eax]
call CrackMe.00453E00
jmp short CrackMe.004598EF
push 10
mov ecx,CrackMe.0045994C ; //注册失败
mov edx,CrackMe.00459954
mov eax,dword ptr ds:[45B048]
跟进关键CALL:
mov ecx,dword ptr ss:[ebp+10] ; //论坛名
mov edx,dword ptr ss:[ebp+C] ; //论坛地址
mov eax,dword ptr ss:[ebp+8] ; //帖子数
call Serial.00378C28 ; //再跟,里面就是通过调用Serial.dll生成注册码了,一看是明码比较,就懒的看算法了.
pop ebp
retn 14
...