首页
社区
课程
招聘
[求助]帮忙看看字符串解密的算法
2009-10-3 08:12 3210

[求助]帮忙看看字符串解密的算法

2009-10-3 08:12
3210
这是一个计算机考试程序中的一段,该程序用MDB为数据库存放题库,内容为加密字符串。
现在怀疑以下程序是解密字符串的算法,但不确定,请各位帮忙看看,多谢。

004214ED . FF15 94104000 call dword ptr [<&MSVBVM60.__vbaHresultCheckObj>>; MSVBVM60.__vbaHresultCheckObj
004214F3 > 8B45 B8 mov eax, dword ptr [ebp-48]
004214F6 . 8985 60FEFFFF mov dword ptr [ebp-1A0], eax
004214FC . C785 34FFFFFF>mov dword ptr [ebp-CC], 00409E84 ; dzda
00421506 . B9 08000000 mov ecx, 8
0042150B . 898D 2CFFFFFF mov dword ptr [ebp-D4], ecx
00421511 . 8B10 mov edx, dword ptr [eax]
00421513 . 8D5D B4 lea ebx, dword ptr [ebp-4C]
00421516 . 53 push ebx
00421517 . 83EC 10 sub esp, 10
0042151A . 8BDC mov ebx, esp
0042151C . 890B mov dword ptr [ebx], ecx
0042151E . 8B8D 30FFFFFF mov ecx, dword ptr [ebp-D0]
00421524 . 894B 04 mov dword ptr [ebx+4], ecx
00421527 . 8B8D 34FFFFFF mov ecx, dword ptr [ebp-CC]
0042152D . 894B 08 mov dword ptr [ebx+8], ecx
00421530 . 8B8D 38FFFFFF mov ecx, dword ptr [ebp-C8]
00421536 . 894B 0C mov dword ptr [ebx+C], ecx
00421539 . 50 push eax
0042153A . FF52 30 call dword ptr [edx+30]
0042153D . DBE2 fclex
0042153F . 85C0 test eax, eax
00421541 . 7D 15 jge short 00421558
00421543 . 6A 30 push 30
00421545 . 68 509D4000 push 00409D50 ; s
0042154A . 8B95 60FEFFFF mov edx, dword ptr [ebp-1A0]
00421550 . 52 push edx
00421551 . 50 push eax
00421552 . FF15 94104000 call dword ptr [<&MSVBVM60.__vbaHresultCheckObj>>; MSVBVM60.__vbaHresultCheckObj
00421558 > 8B45 B4 mov eax, dword ptr [ebp-4C]
0042155B . 8BD8 mov ebx, eax
0042155D . 8B08 mov ecx, dword ptr [eax]
0042155F . 8D55 9C lea edx, dword ptr [ebp-64]
00421562 . 52 push edx
00421563 . 50 push eax
00421564 . FF51 44 call dword ptr [ecx+44]
00421567 . DBE2 fclex
00421569 . 85C0 test eax, eax
0042156B . 7D 0F jge short 0042157C
0042156D . 6A 44 push 44
0042156F . 68 609D4000 push 00409D60 ; q
00421574 . 53 push ebx
00421575 . 50 push eax
00421576 . FF15 94104000 call dword ptr [<&MSVBVM60.__vbaHresultCheckObj>>; MSVBVM60.__vbaHresultCheckObj
0042157C > 8B45 DC mov eax, dword ptr [ebp-24]
0042157F . 85C0 test eax, eax
00421581 . 75 0F jnz short 00421592
00421583 . 8D45 DC lea eax, dword ptr [ebp-24]
00421586 . 50 push eax
00421587 . 68 B09D4000 push 00409DB0
0042158C . FF15 40124000 call dword ptr [<&MSVBVM60.__vbaNew2>] ; MSVBVM60.__vbaNew2
00421592 > 8B5D DC mov ebx, dword ptr [ebp-24]
00421595 . BA 3C904000 mov edx, 0040903C ; jihjemk93j
0042159A . 8D4D C0 lea ecx, dword ptr [ebp-40]
0042159D . FFD7 call edi
0042159F . 8D4D 9C lea ecx, dword ptr [ebp-64]
004215A2 . 51 push ecx
004215A3 . FF15 34104000 call dword ptr [<&MSVBVM60.__vbaStrVarMove>] ; MSVBVM60.__vbaStrVarMove
004215A9 . 8BD0 mov edx, eax
004215AB . 8D4D C4 lea ecx, dword ptr [ebp-3C]
004215AE . FFD6 call esi
004215B0 . 8B13 mov edx, dword ptr [ebx]
004215B2 . 8D45 BC lea eax, dword ptr [ebp-44]
004215B5 . 50 push eax
004215B6 . 8D4D C0 lea ecx, dword ptr [ebp-40]
004215B9 . 51 push ecx
004215BA . 8D45 C4 lea eax, dword ptr [ebp-3C]
004215BD . 50 push eax
004215BE . 53 push ebx
004215BF . FF52 20 call dword ptr [edx+20]
004215C2 . DBE2 fclex
004215C4 . 85C0 test eax, eax
004215C6 . 7D 0F jge short 004215D7
004215C8 . 6A 20 push 20
004215CA . 68 A09D4000 push 00409DA0
004215CF . 53 push ebx
004215D0 . 50 push eax
004215D1 . FF15 94104000 call dword ptr [<&MSVBVM60.__vbaHresultCheckObj>>; MSVBVM60.__vbaHresultCheckObj
004215D7 > 8B55 BC mov edx, dword ptr [ebp-44]
004215DA . C745 BC 00000>mov dword ptr [ebp-44], 0
004215E1 . 8D4D C8 lea ecx, dword ptr [ebp-38]
004215E4 . FFD6 call esi
004215E6 . 8D4D C0 lea ecx, dword ptr [ebp-40]
004215E9 . 51 push ecx
004215EA . 8D55 C4 lea edx, dword ptr [ebp-3C]
004215ED . 52 push edx
004215EE . 6A 02 push 2
004215F0 . FF15 60124000 call dword ptr [<&MSVBVM60.__vbaFreeStrList>] ; MSVBVM60.__vbaFreeStrList
004215F6 . 8D45 B4 lea eax, dword ptr [ebp-4C]
004215F9 . 50 push eax
004215FA . 8D4D B8 lea ecx, dword ptr [ebp-48]
004215FD . 51 push ecx
004215FE . 6A 02 push 2
00421600 . FF15 60104000 call dword ptr [<&MSVBVM60.__vbaFreeObjList>] ; MSVBVM60.__vbaFreeObjList
00421606 . 83C4 18 add esp, 18
00421609 . 8D4D 9C lea ecx, dword ptr [ebp-64]
0042160C . FF15 28104000 call dword ptr [<&MSVBVM60.__vbaFreeVar>] ; MSVBVM60.__vbaFreeVar
00421612 . 8B55 C8 mov edx, dword ptr [ebp-38]
00421615 . 8D4D D0 lea ecx, dword ptr [ebp-30]
00421618 . FFD7 call edi
0042161A . 68 B0904000 push 004090B0 ; :
0042161F . 8D55 D0 lea edx, dword ptr [ebp-30]
00421622 . 52 push edx
00421623 . E8 B8100200 call 004426E0
00421628 . 8BD0 mov edx, eax
0042162A . 8D4D C4 lea ecx, dword ptr [ebp-3C]
0042162D . FFD6 call esi
0042162F . 50 push eax
00421630 . FF15 D4114000 call dword ptr [<&MSVBVM60.__vbaI2Str>] ; MSVBVM60.__vbaI2Str
00421636 . 0FBFC0 movsx eax, ax
00421639 . A3 24304A00 mov dword ptr [4A3024], eax
0042163E . 8D4D C4 lea ecx, dword ptr [ebp-3C]
00421641 . 8B1D 18134000 mov ebx, dword ptr [<&MSVBVM60.__vbaFreeStr>] ; MSVBVM60.__vbaFreeStr
00421647 . FFD3 call ebx ; <&MSVBVM60.__vbaFreeStr>
00421649 . 8B55 D0 mov edx, dword ptr [ebp-30]
0042164C . B9 38304A00 mov ecx, 004A3038
00421651 . FFD7 call edi
00421653 . 8B85 30FEFFFF mov eax, dword ptr [ebp-1D0]
00421659 . 8B08 mov ecx, dword ptr [eax]
0042165B . 8D55 B8 lea edx, dword ptr [ebp-48]
0042165E . 52 push edx
0042165F . 50 push eax
00421660 . FF91 B4000000 call dword ptr [ecx+B4]
00421666 . DBE2 fclex
00421668 . 85C0 test eax, eax
0042166A . 7D 18 jge short 00421684
0042166C . 68 B4000000 push 0B4
00421671 . 68 509C4000 push 00409C50 ; 1
00421676 . 8B8D 30FEFFFF mov ecx, dword ptr [ebp-1D0]
0042167C . 51 push ecx
0042167D . 50 push eax
0042167E . FF15 94104000 call dword ptr [<&MSVBVM60.__vbaHresultCheckObj>>; MSVBVM60.__vbaHresultCheckObj


以下是加密后的字符串
ANS: BC126650CBD4C73748DA510EDD24E671
TM:  5F29F5804DA552C552797DC11112150D  6BAD473B2FADD90720F65DDA92E9EFB7  098D93F50928089C76135EB16FE99F27

[培训]内核驱动高级班,冲击BAT一流互联网大厂工 作,每周日13:00-18:00直播授课

收藏
点赞0
打赏
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回