简单算法——蓝帆打支票 V5.5
下载页面: http://www.skycn.com/soft/1469.html
软件大小: 419 KB
软件语言: 简体中文
软件类别: 国产软件 / 共享版 / 打印工具
应用平台: Win9x/NT/2000/XP
加入时间: 2003-04-12 11:03:04
下载次数: 1159
推荐等级: ***
开 发 商: http://lanfan.3322.net/
【软件简介】: 1、支持系统内的各种汉字字体。2、支持Windows下的多数打印机。3、小写到大写严格无差错转换(金额范围:0.01-999,999,999.99)。4、支票要素打印精确定位(0.1毫米)。5、支票存根可选打印。6、所见即所得,支持打印预览。7、方便的预设置,可以设置无限个收款人和用途。8、日期输入灵活、方便。9、打印记录可选保存,(history.txt)。10、Ctr+p热键,可以进行打印机设置并打印。11、大写金额自动发送到剪贴板,便于其它地方使用。12、支持横向,纵向打印,打印项目整体调整。13、可以设置不同类型的支票,一次设置安逸使用。
【软件限制】:NAG、功能限制。
【作者声明】:初学Crack,只是感兴趣,没有其它目的。失误之处敬请诸位大侠赐教!
【破解工具】:TRW2000娃娃修改版、Ollydbg1.09、PEiD、UnAspacka、W32Dasm 9.0白金版
—————————————————————————————————
【过 程】:
check.exe 是ASPack 2.1壳,用UnAspacka脱之。428K->1.26M。Borland C++ 编写。
呵呵,注册码很容易就能找到,但想找找算法还真有点麻烦,程序启动后跳出注册框,拦住后就看到注册码已经算好了。试了几次发现程序在弹出注册框之前已经“默默无闻”的算好了注册码。呵呵,真勤快呀。^Q^^Q^^Q^^Q^
序列号:3297438
试炼码:13572468
—————————————————————————————————
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401856(C)
|
:0040178B 8BCB mov ecx, ebx
:0040178D B801000000 mov eax, 00000001
:00401792 D3E0 shl eax, cl
:00401794 85F0 test eax, esi
:00401796 0F84B7000000 je 00401853
:0040179C 66C78514FFFFFF3800 mov word ptr [ebp+FFFFFF14], 0038
:004017A5 8BD3 mov edx, ebx
:004017A7 8BFB mov edi, ebx
:004017A9 80C241 add dl, 41
:004017AC 8D45E8 lea eax, dword ptr [ebp-18]
:004017AF E814320D00 call 004D49C8
:004017B4 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:004017BA 8D55E8 lea edx, dword ptr [ebp-18]
:004017BD 8D45F8 lea eax, dword ptr [ebp-08]
:004017C0 E807330D00 call 004D4ACC
:004017C5 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:004017CB 8D45E8 lea eax, dword ptr [ebp-18]
:004017CE BA02000000 mov edx, 00000002
:004017D3 E8C4320D00 call 004D4A9C
:004017D8 66C78514FFFFFF4400 mov word ptr [ebp+FFFFFF14], 0044
:004017E1 8D45E0 lea eax, dword ptr [ebp-20]
:004017E4 E8EF0F0000 call 004027D8
:004017E9 50 push eax
:004017EA FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
* Possible StringData Ref from Data Obj ->":\"
|
:004017F0 BAD0904E00 mov edx, 004E90D0
:004017F5 8D45E4 lea eax, dword ptr [ebp-1C]
:004017F8 E8FB300D00 call 004D48F8
:004017FD FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401803 8D55E4 lea edx, dword ptr [ebp-1C]
:00401806 8D45F8 lea eax, dword ptr [ebp-08]
:00401809 59 pop ecx
:0040180A E8E5320D00 call 004D4AF4
:0040180F 8D55E0 lea edx, dword ptr [ebp-20]
:00401812 8D45F8 lea eax, dword ptr [ebp-08]
:00401815 E8B2320D00 call 004D4ACC
:0040181A FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401820 8D45E0 lea eax, dword ptr [ebp-20]
:00401823 BA02000000 mov edx, 00000002
:00401828 E86F320D00 call 004D4A9C
:0040182D FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401833 8D45E4 lea eax, dword ptr [ebp-1C]
:00401836 BA02000000 mov edx, 00000002
:0040183B E85C320D00 call 004D4A9C
:00401840 8D45F8 lea eax, dword ptr [ebp-08]
:00401843 E8C00F0000 call 00402808
:00401848 50 push eax
* Reference To: KERNEL32.GetDriveTypeA, Ord:0000h
|
:00401849 E82C6A0E00 Call 004E827A
:0040184E 83F803 cmp eax, 00000003
:00401851 7409 je 0040185C
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401796(C)
|
:00401853 4B dec ebx
:00401854 85DB test ebx, ebx
:00401856 0F8F2FFFFFFF jg 0040178B
====>循环20次。得到系统中硬盘的信息。
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401851(C)
|
:0040185C 8D95D4FEFFFF lea edx, dword ptr [ebp+FFFFFED4]
:00401862 52 push edx
* Reference To: KERNEL32.GetSystemInfo, Ord:0000h
|
:00401863 E8906A0E00 Call 004E82F8
:00401868 6A00 push 00000000
:0040186A 68DD2A0000 push 00002ADD
:0040186F 8BC7 mov eax, edi
:00401871 40 inc eax
:00401872 E8D1310B00 call 004B4A48
====>取最后一个分区G盘的空间信息?
====>EAX=B4110000
:00401877 E817B80C00 call 004CD093
====>对B4110000循环逻辑左移得到新的值
====>EAX=0028092B
:0040187C 8B95ECFEFFFF mov edx, dword ptr [ebp+FFFFFEEC]
:00401882 8BCA mov ecx, edx
====>ECX=EDX=24A
:00401884 C1E204 shl edx, 04
====>EDX=24A SHL 4=24A0
:00401887 03D1 add edx, ecx
====>EDX=24A0 + 24A=26EA
:00401889 2BC2 sub eax, edx
====>EAX=0028092B - 26EA=0027E241
:0040188B 50 push eax
:0040188C E8870F0000 call 00402818
:00401891 59 pop ecx
:00401892 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=0027E241
:00401898 6A14 push 00000014
:0040189A 6A00 push 00000000
:0040189C 6A00 push 00000000
:0040189E 8D85F8FEFFFF lea eax, dword ptr [ebp+FFFFFEF8]
:004018A4 6A00 push 00000000
:004018A6 50 push eax
:004018A7 68FF000000 push 000000FF
:004018AC 6A00 push 00000000
:004018AE 8D45F8 lea eax, dword ptr [ebp-08]
:004018B1 E8520F0000 call 00402808
:004018B6 50 push eax
* Reference To: KERNEL32.GetVolumeInformationA, Ord:0000h
|
:004018B7 E8B66B0E00 Call 004E8472
====>取G盘的硬盘序列号?
:004018BC 8B85F8FEFFFF mov eax, dword ptr [ebp+FFFFFEF8]
====>EAX=[ebp+FFFFFEF8]=1EED362D
:004018C2 B9F7020000 mov ecx, 000002F7
====>ECX=2F7
:004018C7 33D2 xor edx, edx
:004018C9 F7F1 div ecx
====>EAX=1EED362D / 2F7=A6E5D
:004018CB 0385FCFEFFFF add eax, dword ptr [ebp+FFFFFEFC]
====>EAX=A6E5D + 0027E241=0032509E(H)=3297438(D)
:004018D1 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]= EAX =0032509E(H)=3297438(D)
====>呵呵,3297438就是程序显示的序列号了!
:004018D7 66C78514FFFFFF5000 mov word ptr [ebp+FFFFFF14], 0050
:004018E0 8D45F4 lea eax, dword ptr [ebp-0C]
:004018E3 E8F00E0000 call 004027D8
:004018E8 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:004018EE 66C78514FFFFFF1400 mov word ptr [ebp+FFFFFF14], 0014
:004018F7 66C78514FFFFFF5C00 mov word ptr [ebp+FFFFFF14], 005C
:00401900 8D45F0 lea eax, dword ptr [ebp-10]
:00401903 E8D00E0000 call 004027D8
:00401908 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:0040190E 66C78514FFFFFF1400 mov word ptr [ebp+FFFFFF14], 0014
:00401917 66C78514FFFFFF6800 mov word ptr [ebp+FFFFFF14], 0068
:00401920 8D45DC lea eax, dword ptr [ebp-24]
:00401923 E8B00E0000 call 004027D8
:00401928 8BD0 mov edx, eax
:0040192A FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401930 8B85FCFEFFFF mov eax, dword ptr [ebp+FFFFFEFC]
:00401936 E8BD280B00 call 004B41F8
:0040193B 8D55DC lea edx, dword ptr [ebp-24]
:0040193E 8D45F4 lea eax, dword ptr [ebp-0C]
:00401941 E886310D00 call 004D4ACC
:00401946 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:0040194C 8D45DC lea eax, dword ptr [ebp-24]
:0040194F BA02000000 mov edx, 00000002
:00401954 E843310D00 call 004D4A9C
:00401959 8D55F4 lea edx, dword ptr [ebp-0C]
:0040195C 8D45F0 lea eax, dword ptr [ebp-10]
:0040195F E868310D00 call 004D4ACC
:00401964 EB68 jmp 004019CE
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004019D9(C)
|
:00401966 66C78514FFFFFF7400 mov word ptr [ebp+FFFFFF14], 0074
:0040196F 8D45D4 lea eax, dword ptr [ebp-2C]
:00401972 E8610E0000 call 004027D8
:00401977 50 push eax
:00401978 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
* Possible StringData Ref from Data Obj ->"00燃撞"
|
:0040197E BAD3904E00 mov edx, 004E90D3
:00401983 8D45D8 lea eax, dword ptr [ebp-28]
:00401986 E86D2F0D00 call 004D48F8
:0040198B FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401991 8D55D8 lea edx, dword ptr [ebp-28]
:00401994 8D45F4 lea eax, dword ptr [ebp-0C]
:00401997 59 pop ecx
:00401998 E857310D00 call 004D4AF4
:0040199D 8D55D4 lea edx, dword ptr [ebp-2C]
:004019A0 8D45F4 lea eax, dword ptr [ebp-0C]
:004019A3 E824310D00 call 004D4ACC
:004019A8 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:004019AE 8D45D4 lea eax, dword ptr [ebp-2C]
:004019B1 BA02000000 mov edx, 00000002
:004019B6 E8E1300D00 call 004D4A9C
:004019BB FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:004019C1 8D45D8 lea eax, dword ptr [ebp-28]
:004019C4 BA02000000 mov edx, 00000002
:004019C9 E8CE300D00 call 004D4A9C
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401964(U)
|
:004019CE 8D45F4 lea eax, dword ptr [ebp-0C]
:004019D1 E8520E0000 call 00402828
:004019D6 83F809 cmp eax, 00000009
:004019D9 7C8B jl 00401966
====>比较用户号是否9位?不到9位则跳上去末尾添0
====>3297438--->329743800
:004019DB 33D2 xor edx, edx
:004019DD 8995FCFEFFFF mov dword ptr [ebp+FFFFFEFC], edx
:004019E3 66C78514FFFFFF8000 mov word ptr [ebp+FFFFFF14], 0080
:004019EC 8D45D0 lea eax, dword ptr [ebp-30]
:004019EF E8E40D0000 call 004027D8
:004019F4 50 push eax
:004019F5 8D45F4 lea eax, dword ptr [ebp-0C]
:004019F8 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
====>下面开始依次取序列号的值运算了!!
:004019FE B901000000 mov ecx, 00000001
:00401A03 BA01000000 mov edx, 00000001
:00401A08 E8C7320D00 call 004D4CD4
:00401A0D 8D45D0 lea eax, dword ptr [ebp-30]
:00401A10 8B00 mov eax, dword ptr [eax]
:00401A12 E881280B00 call 004B4298
:00401A17 8BD0 mov edx, eax
第一部分! 1、 ====>EDX=EAX=3
:00401A19 C1E204 shl edx, 04
====>EDX=3 SHL 4=30
:00401A1C 03D0 add edx, eax
====>EDX=30 + 3=33
:00401A1E 8D14D0 lea edx, dword ptr [eax+8*edx]
====>EDX=3 + 8*33=19B
:00401A21 81C2F6000000 add edx, 000000F6
====>EDX=19B + F6=291
:00401A27 0195FCFEFFFF add dword ptr [ebp+FFFFFEFC], edx
====>[ebp+FFFFFEFC]=00 + 291=291
:00401A2D FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401A33 8D45D0 lea eax, dword ptr [ebp-30]
:00401A36 BA02000000 mov edx, 00000002
:00401A3B E85C300D00 call 004D4A9C
:00401A40 66C78514FFFFFF8C00 mov word ptr [ebp+FFFFFF14], 008C
:00401A49 8D45CC lea eax, dword ptr [ebp-34]
:00401A4C E8870D0000 call 004027D8
:00401A51 50 push eax
:00401A52 8D45F4 lea eax, dword ptr [ebp-0C]
:00401A55 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401A5B B901000000 mov ecx, 00000001
:00401A60 BA02000000 mov edx, 00000002
:00401A65 E86A320D00 call 004D4CD4
:00401A6A 8D45CC lea eax, dword ptr [ebp-34]
:00401A6D 8B00 mov eax, dword ptr [eax]
:00401A6F E824280B00 call 004B4298
:00401A74 8BD8 mov ebx, eax
:00401A76 8D45C8 lea eax, dword ptr [ebp-38]
====>EAX=[ebp-38]=291
:00401A79 E85A0D0000 call 004027D8
:00401A7E 50 push eax
:00401A7F 8D45F4 lea eax, dword ptr [ebp-0C]
:00401A82 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401A88 B901000000 mov ecx, 00000001
:00401A8D BA02000000 mov edx, 00000002
:00401A92 E83D320D00 call 004D4CD4
:00401A97 8D45C8 lea eax, dword ptr [ebp-38]
:00401A9A 8B00 mov eax, dword ptr [eax]
:00401A9C E8F7270B00 call 004B4298
:00401AA1 0FAFD8 imul ebx, eax
2、 ====>EBX=2 * 2=4
:00401AA4 81C371010000 add ebx, 00000171
====>EBX=4 + 171=175
:00401AAA 019DFCFEFFFF add dword ptr [ebp+FFFFFEFC], ebx
====>[ebp+FFFFFEFC]=291 + 175=406
:00401AB0 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401AB6 8D45C8 lea eax, dword ptr [ebp-38]
:00401AB9 BA02000000 mov edx, 00000002
:00401ABE E8D92F0D00 call 004D4A9C
:00401AC3 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401AC9 8D45CC lea eax, dword ptr [ebp-34]
:00401ACC BA02000000 mov edx, 00000002
:00401AD1 E8C62F0D00 call 004D4A9C
:00401AD6 66C78514FFFFFF9800 mov word ptr [ebp+FFFFFF14], 0098
:00401ADF 8D45C4 lea eax, dword ptr [ebp-3C]
:00401AE2 E8F10C0000 call 004027D8
:00401AE7 50 push eax
:00401AE8 8D45F4 lea eax, dword ptr [ebp-0C]
:00401AEB FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401AF1 B901000000 mov ecx, 00000001
:00401AF6 BA03000000 mov edx, 00000003
:00401AFB E8D4310D00 call 004D4CD4
:00401B00 8D45C4 lea eax, dword ptr [ebp-3C]
:00401B03 8B00 mov eax, dword ptr [eax]
:00401B05 E88E270B00 call 004B4298
:00401B0A 8BD0 mov edx, eax
3、 ====>EDX=EAX=9
:00401B0C C1E209 shl edx, 09
====>EDX=9 SHL 9=1200
:00401B0F 2BD0 sub edx, eax
====>EDX=1200 - 9=11F7
:00401B11 81C207F2FFFF add edx, FFFFF207
====>EDX=11F7 + -0DF9=3FE
:00401B17 0195FCFEFFFF add dword ptr [ebp+FFFFFEFC], edx
====>[ebp+FFFFFEFC]=406 + 3FE=804
:00401B1D FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401B23 8D45C4 lea eax, dword ptr [ebp-3C]
:00401B26 BA02000000 mov edx, 00000002
:00401B2B E86C2F0D00 call 004D4A9C
:00401B30 66C78514FFFFFFA400 mov word ptr [ebp+FFFFFF14], 00A4
:00401B39 8D45C0 lea eax, dword ptr [ebp-40]
:00401B3C E8970C0000 call 004027D8
:00401B41 50 push eax
:00401B42 8D45F4 lea eax, dword ptr [ebp-0C]
:00401B45 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401B4B B901000000 mov ecx, 00000001
:00401B50 BA04000000 mov edx, 00000004
:00401B55 E87A310D00 call 004D4CD4
:00401B5A 8D45C0 lea eax, dword ptr [ebp-40]
:00401B5D 8B00 mov eax, dword ptr [eax]
4、 ====>EAX=7
:00401B5F E834270B00 call 004B4298
:00401B64 8D1440 lea edx, dword ptr [eax+2*eax]
====>EDX=7 + 2*7=15
:00401B67 C1E203 shl edx, 03
====>EDX=15 SHL 3=A8
:00401B6A 2BD0 sub edx, eax
====>EDX=A8 - 7=A1
:00401B6C C1E202 shl edx, 02
====>EDX=A1 SHL 2=284
:00401B6F 2BD0 sub edx, eax
====>EDX=284 - 7=27D
:00401B71 81C2E7230000 add edx, 000023E7
====>EDX=27D + 23E7=2664
:00401B77 0195FCFEFFFF add dword ptr [ebp+FFFFFEFC], edx
====>[ebp+FFFFFEFC]=804 + 2664=2E68
:00401B7D FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401B83 8D45C0 lea eax, dword ptr [ebp-40]
:00401B86 BA02000000 mov edx, 00000002
:00401B8B E80C2F0D00 call 004D4A9C
:00401B90 66C78514FFFFFFB000 mov word ptr [ebp+FFFFFF14], 00B0
:00401B99 8D45BC lea eax, dword ptr [ebp-44]
:00401B9C E8370C0000 call 004027D8
:00401BA1 50 push eax
:00401BA2 8D45F4 lea eax, dword ptr [ebp-0C]
:00401BA5 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401BAB B901000000 mov ecx, 00000001
:00401BB0 BA05000000 mov edx, 00000005
:00401BB5 E81A310D00 call 004D4CD4
:00401BBA 8D45BC lea eax, dword ptr [ebp-44]
:00401BBD 8B00 mov eax, dword ptr [eax]
5、 ====>EAX=4
:00401BBF E8D4260B00 call 004B4298
:00401BC4 69D0E2180000 imul edx, eax, 000018E2
====>EDX=4 * 18E2=6388
:00401BCA 81C21EE7FFFF add edx, FFFFE71E
====>EDX=6388 + -18E2=4AA6
:00401BD0 0195FCFEFFFF add dword ptr [ebp+FFFFFEFC], edx
====>[ebp+FFFFFEFC]=2E68 + 4AA6=790E
:00401BD6 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401BDC 8D45BC lea eax, dword ptr [ebp-44]
:00401BDF BA02000000 mov edx, 00000002
:00401BE4 E8B32E0D00 call 004D4A9C
:00401BE9 66C78514FFFFFFBC00 mov word ptr [ebp+FFFFFF14], 00BC
:00401BF2 8D45B8 lea eax, dword ptr [ebp-48]
:00401BF5 E8DE0B0000 call 004027D8
:00401BFA 50 push eax
:00401BFB 8D45F4 lea eax, dword ptr [ebp-0C]
:00401BFE FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401C04 B901000000 mov ecx, 00000001
:00401C09 BA06000000 mov edx, 00000006
:00401C0E E8C1300D00 call 004D4CD4
:00401C13 8D45B8 lea eax, dword ptr [ebp-48]
:00401C16 8B00 mov eax, dword ptr [eax]
6、 ====>EAX=3
:00401C18 E87B260B00 call 004B4298
:00401C1D 8D1480 lea edx, dword ptr [eax+4*eax]
====>EDX=3 + 4*3=F
:00401C20 C1E203 shl edx, 03
====>EDX=F SHL 3=78
:00401C23 2BD0 sub edx, eax
====>EDX=78 - 3=75
:00401C25 C1E203 shl edx, 03
====>EDX=75 SHL 3=3A8
:00401C28 2BD0 sub edx, eax
====>EDX=3A8 - 3=3A5
:00401C2A 81C252FFFFFF add edx, FFFFFF52
====>EDX=3A5 + -0AE=2F7
:00401C30 0195FCFEFFFF add dword ptr [ebp+FFFFFEFC], edx
====>[ebp+FFFFFEFC]=790E + 2F7=7C05
:00401C36 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401C3C 8D45B8 lea eax, dword ptr [ebp-48]
:00401C3F BA02000000 mov edx, 00000002
:00401C44 E8532E0D00 call 004D4A9C
:00401C49 66C78514FFFFFFC800 mov word ptr [ebp+FFFFFF14], 00C8
:00401C52 8D45B4 lea eax, dword ptr [ebp-4C]
:00401C55 E87E0B0000 call 004027D8
:00401C5A 50 push eax
:00401C5B 8D45F4 lea eax, dword ptr [ebp-0C]
:00401C5E FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401C64 B901000000 mov ecx, 00000001
:00401C69 BA07000000 mov edx, 00000007
:00401C6E E861300D00 call 004D4CD4
:00401C73 8D45B4 lea eax, dword ptr [ebp-4C]
:00401C76 8B00 mov eax, dword ptr [eax]
7、 ====>EAX=8
:00401C78 E81B260B00 call 004B4298
:00401C7D 8D1480 lea edx, dword ptr [eax+4*eax]
====>EDX=8 + 4*8=28
:00401C80 C1E205 shl edx, 05
====>EDX=28 * 5=500
:00401C83 03D0 add edx, eax
====>EDX=500 + 8=508
:00401C85 8D1450 lea edx, dword ptr [eax+2*edx]
====>EDX=8 + 2*508=A18
:00401C88 81C2DFCBFFFF add edx, FFFFCBDF
====>EDX=A18 + -3421=FFFFD5F7
:00401C8E 0195FCFEFFFF add dword ptr [ebp+FFFFFEFC], edx
====>[ebp+FFFFFEFC]=7C05 + FFFFD5F7=51FC
:00401C94 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401C9A 8D45B4 lea eax, dword ptr [ebp-4C]
:00401C9D BA02000000 mov edx, 00000002
:00401CA2 E8F52D0D00 call 004D4A9C
:00401CA7 66C78514FFFFFFD400 mov word ptr [ebp+FFFFFF14], 00D4
:00401CB0 8D45B0 lea eax, dword ptr [ebp-50]
:00401CB3 E8200B0000 call 004027D8
:00401CB8 50 push eax
:00401CB9 8D45F4 lea eax, dword ptr [ebp-0C]
:00401CBC FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401CC2 B901000000 mov ecx, 00000001
:00401CC7 BA08000000 mov edx, 00000008
:00401CCC E803300D00 call 004D4CD4
:00401CD1 8D45B0 lea eax, dword ptr [ebp-50]
:00401CD4 8B00 mov eax, dword ptr [eax]
8、 ====>EAX=0
:00401CD6 E8BD250B00 call 004B4298
:00401CDB 8BD8 mov ebx, eax
:00401CDD 8D45AC lea eax, dword ptr [ebp-54]
:00401CE0 E8F30A0000 call 004027D8
:00401CE5 50 push eax
:00401CE6 8D45F4 lea eax, dword ptr [ebp-0C]
:00401CE9 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401CEF B901000000 mov ecx, 00000001
:00401CF4 BA08000000 mov edx, 00000008
:00401CF9 E8D62F0D00 call 004D4CD4
:00401CFE 8D45AC lea eax, dword ptr [ebp-54]
:00401D01 8B00 mov eax, dword ptr [eax]
====>EAX=0
:00401D03 E890250B00 call 004B4298
:00401D08 0FAFD8 imul ebx, eax
====>EBX=0 * 0=0
:00401D0B 8D45A8 lea eax, dword ptr [ebp-58]
:00401D0E E8C50A0000 call 004027D8
:00401D13 50 push eax
:00401D14 8D45F4 lea eax, dword ptr [ebp-0C]
:00401D17 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401D1D B901000000 mov ecx, 00000001
:00401D22 BA08000000 mov edx, 00000008
:00401D27 E8A82F0D00 call 004D4CD4
:00401D2C 8D45A8 lea eax, dword ptr [ebp-58]
:00401D2F 8B00 mov eax, dword ptr [eax]
9、 ====>EAX=0
:00401D31 E862250B00 call 004B4298
:00401D36 0FAFD8 imul ebx, eax
====>EBX=0 * 0=0
:00401D39 81C3550B0000 add ebx, 00000B55
====>EBX=0 + B55=B55
:00401D3F 019DFCFEFFFF add dword ptr [ebp+FFFFFEFC], ebx
====>[ebp+FFFFFEFC]=51FC + B55=5D51
:00401D45 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401D4B 8D45A8 lea eax, dword ptr [ebp-58]
:00401D4E BA02000000 mov edx, 00000002
:00401D53 E8442D0D00 call 004D4A9C
:00401D58 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401D5E 8D45AC lea eax, dword ptr [ebp-54]
:00401D61 BA02000000 mov edx, 00000002
:00401D66 E8312D0D00 call 004D4A9C
:00401D6B FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401D71 8D45B0 lea eax, dword ptr [ebp-50]
:00401D74 BA02000000 mov edx, 00000002
:00401D79 E81E2D0D00 call 004D4A9C
:00401D7E 66C78514FFFFFFE000 mov word ptr [ebp+FFFFFF14], 00E0
:00401D87 8D45A4 lea eax, dword ptr [ebp-5C]
:00401D8A E8490A0000 call 004027D8
:00401D8F 50 push eax
:00401D90 8D45F4 lea eax, dword ptr [ebp-0C]
:00401D93 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401D99 B901000000 mov ecx, 00000001
:00401D9E BA01000000 mov edx, 00000001
:00401DA3 E82C2F0D00 call 004D4CD4
:00401DA8 8D45A4 lea eax, dword ptr [ebp-5C]
:00401DAB 8B00 mov eax, dword ptr [eax]
第二部分! 1、 ====>EAX=3
:00401DAD E8E6240B00 call 004B4298
:00401DB2 40 inc eax
====>EAX=3 + 1=4
:00401DB3 BA02000000 mov edx, 00000002
:00401DB8 0FAF85FCFEFFFF imul eax, dword ptr [ebp+FFFFFEFC]
====>EAX=4 * 5D51=17544
:00401DBF 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=17544
:00401DC5 8D45A4 lea eax, dword ptr [ebp-5C]
:00401DC8 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401DCE E8C92C0D00 call 004D4A9C
:00401DD3 66C78514FFFFFFEC00 mov word ptr [ebp+FFFFFF14], 00EC
:00401DDC 8D45A0 lea eax, dword ptr [ebp-60]
:00401DDF E8F4090000 call 004027D8
:00401DE4 50 push eax
:00401DE5 8D45F4 lea eax, dword ptr [ebp-0C]
:00401DE8 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401DEE B901000000 mov ecx, 00000001
:00401DF3 BA02000000 mov edx, 00000002
:00401DF8 E8D72E0D00 call 004D4CD4
:00401DFD 8D45A0 lea eax, dword ptr [ebp-60]
:00401E00 8B00 mov eax, dword ptr [eax]
2、 ====>====>EAX=2
:00401E02 E891240B00 call 004B4298
:00401E07 40 inc eax
====>EAX=2 + 1=3
:00401E08 BA02000000 mov edx, 00000002
:00401E0D 0FAF85FCFEFFFF imul eax, dword ptr [ebp+FFFFFEFC]
====>EAX=3 * 17544=45FCC
:00401E14 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=45FCC
:00401E1A 8D45A0 lea eax, dword ptr [ebp-60]
:00401E1D FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401E23 E8742C0D00 call 004D4A9C
:00401E28 66C78514FFFFFFF800 mov word ptr [ebp+FFFFFF14], 00F8
:00401E31 8D459C lea eax, dword ptr [ebp-64]
:00401E34 E89F090000 call 004027D8
:00401E39 50 push eax
:00401E3A 8D45F4 lea eax, dword ptr [ebp-0C]
:00401E3D FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401E43 B901000000 mov ecx, 00000001
:00401E48 BA03000000 mov edx, 00000003
:00401E4D E8822E0D00 call 004D4CD4
:00401E52 8D459C lea eax, dword ptr [ebp-64]
:00401E55 8B00 mov eax, dword ptr [eax]
3、 ====>====>EAX=9
:00401E57 E83C240B00 call 004B4298
:00401E5C 40 inc eax
====>EAX=9 + 1=A
:00401E5D BA02000000 mov edx, 00000002
:00401E62 0FAF85FCFEFFFF imul eax, dword ptr [ebp+FFFFFEFC]
====>EAX=A * 45FCC=2BBDF8
:00401E69 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=2BBDF8
:00401E6F 8D459C lea eax, dword ptr [ebp-64]
:00401E72 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401E78 E81F2C0D00 call 004D4A9C
:00401E7D 66C78514FFFFFF0401 mov word ptr [ebp+FFFFFF14], 0104
:00401E86 8D4598 lea eax, dword ptr [ebp-68]
:00401E89 E84A090000 call 004027D8
:00401E8E 50 push eax
:00401E8F 8D45F4 lea eax, dword ptr [ebp-0C]
:00401E92 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401E98 B901000000 mov ecx, 00000001
:00401E9D BA04000000 mov edx, 00000004
:00401EA2 E82D2E0D00 call 004D4CD4
:00401EA7 8D4598 lea eax, dword ptr [ebp-68]
:00401EAA 8B00 mov eax, dword ptr [eax]
4、 ====>EAX=7
:00401EAC E8E7230B00 call 004B4298
:00401EB1 40 inc eax
====>EAX=7 + 1=8
:00401EB2 BA02000000 mov edx, 00000002
:00401EB7 0FAF85FCFEFFFF imul eax, dword ptr [ebp+FFFFFEFC]
====>EAX=8 * 2BBDF8=15DEFC0
:00401EBE 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=15DEFC0
:00401EC4 8D4598 lea eax, dword ptr [ebp-68]
:00401EC7 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401ECD E8CA2B0D00 call 004D4A9C
:00401ED2 66C78514FFFFFF1001 mov word ptr [ebp+FFFFFF14], 0110
:00401EDB 8D4594 lea eax, dword ptr [ebp-6C]
:00401EDE E8F5080000 call 004027D8
:00401EE3 50 push eax
:00401EE4 8D45F4 lea eax, dword ptr [ebp-0C]
:00401EE7 FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401EED B901000000 mov ecx, 00000001
:00401EF2 BA05000000 mov edx, 00000005
:00401EF7 E8D82D0D00 call 004D4CD4
:00401EFC 8D4594 lea eax, dword ptr [ebp-6C]
:00401EFF 8B00 mov eax, dword ptr [eax]
5、 ====>EAX=4
:00401F01 E892230B00 call 004B4298
:00401F06 40 inc eax
====>EAX=4 + 1=5
:00401F07 BA02000000 mov edx, 00000002
:00401F0C 0FAF85FCFEFFFF imul eax, dword ptr [ebp+FFFFFEFC]
====>EAX=5 * 15DEFC0=6D5AEC0
:00401F13 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=6D5AEC0
:00401F19 8D4594 lea eax, dword ptr [ebp-6C]
:00401F1C FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401F22 E8752B0D00 call 004D4A9C
:00401F27 66C78514FFFFFF1C01 mov word ptr [ebp+FFFFFF14], 011C
:00401F30 8D4590 lea eax, dword ptr [ebp-70]
:00401F33 E8A0080000 call 004027D8
:00401F38 50 push eax
:00401F39 8D45F4 lea eax, dword ptr [ebp-0C]
:00401F3C FF8520FFFFFF inc dword ptr [ebp+FFFFFF20]
:00401F42 B901000000 mov ecx, 00000001
:00401F47 BA06000000 mov edx, 00000006
:00401F4C E8832D0D00 call 004D4CD4
:00401F51 8D4590 lea eax, dword ptr [ebp-70]
:00401F54 8B00 mov eax, dword ptr [eax]
6、 ====>EAX=3
:00401F56 E83D230B00 call 004B4298
:00401F5B 40 inc eax
====>EAX=3 + 1=4
:00401F5C BA02000000 mov edx, 00000002
:00401F61 0FAF85FCFEFFFF imul eax, dword ptr [ebp+FFFFFEFC]
====>EAX=4 * 6D5AEC0=1B56BB00
:00401F68 8985FCFEFFFF mov dword ptr [ebp+FFFFFEFC], eax
====>[ebp+FFFFFEFC]=EAX=1B56BB00
:00401F6E 8D4590 lea eax, dword ptr [ebp-70]
:00401F71 FF8D20FFFFFF dec dword ptr [ebp+FFFFFF20]
:00401F77 E8202B0D00 call 004D4A9C
:00401F7C 66C78514FFFFFF2801 mov word ptr [ebp+FFFFFF14], 0128
:00401F85 8D458C lea eax, dword ptr [ebp-74]
:00401F88 E84B080000 call 004027D8
:00401F8D 50 push eax
:00401F8E 8D45F4 lea eax, dword ptr [ebp-0C]
:00401F91 FF8520FFFFFF
相关视频
相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么
热门文章 去除winrar注册框方法
最新文章
比特币病毒怎么破解 比去除winrar注册框方法
华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据
人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程
查看所有0条评论>>