您的位置:首页精文荟萃破解文章 → 算法分析之六

算法分析之六

时间:2004/10/15 0:55:00来源:本站整理作者:蓝点我要评论(0)

 * Reference To: USER32.GetWindowTextA, Ord:0000h
|
:0040119A E859900000 Call 0040A1F8
:0040119F 6A66 push 00000066 ------->Í£ÔÚÕâ¶ù¡£
:004011A1 56 push esi

* Reference To: USER32.GetDlgItem, Ord:0000h
|
:004011A2 E84B900000 Call 0040A1F2
:004011A7 6A19 push 00000019
:004011A9 8D4DC8 lea ecx, dword ptr [ebp-38]
:004011AC 51 push ecx
:004011AD 50 push eax

* Reference To: USER32.GetWindowTextA, Ord:0000h
|
:004011AE E845900000 Call 0040A1F8
:004011B3 8D45E4 lea eax, dword ptr [ebp-1C]
:004011B6 50 push eax
:004011B7 E8A4120000 call 00402460
:004011BC 59 pop ecx
:004011BD 8BC8 mov ecx, eax -------->ECX£½×¢²áÂëλÊý
:004011BF 83F904 cmp ecx, 00000004 -------->Óû§ÃûÉÙÓÚ4λ£¿
:004011C2 7D14 jge 004011D8 -------->²»»á°É£¿£¿£¿£¿£¿
:004011C4 6A10 push 00000010

* Possible StringData Ref from Data Obj ->"ERROR"
|
:004011C6 687CB14000 push 0040B17C

* Possible StringData Ref from Data Obj ->"Your name must contain at least "
->"4 characters!
"
|
:004011CB 684CB14000 push 0040B14C
:004011D0 56 push esi

* Reference To: USER32.MessageBoxA, Ord:0000h
|
:004011D1 E828900000 Call 0040A1FE
:004011D6 EB67 jmp 0040123F

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004011C2(C)
|
:004011D8 33D2 xor edx, edx ------>EDXÇå0£¬ÏÂÃæÓõ½¡£
:004011DA 33C0 xor eax, eax ------>EAXÇå0£¬ÏÂÃæÓõ½¡£
:004011DC 3BC8 cmp ecx, eax ------>ÊäÈë×¢²áÂëÁËÂð£¿
:004011DE 7E0D jle 004011ED ------>ûÊäÈë¾Í²Òඣ¡£¡

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004011EB(C)
£½£½£½£½£½£½£½£½£½£½£½£½£½£½¡ø£½¼ÆË㿪ʼ£½¡ø£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½

|
:004011E0 33DB xor ebx, ebx ---------->EBXÇå0¡£
:004011E2 8A5C05E4 mov bl, byte ptr [ebp+eax-1C]--->ÒÀ´Îȡע²áÃû
×Ö·ûµÄ16½øÖÆÖµËÍÈëEBXµÄµÍλ¡£

:004011E6 03D3 add edx, ebx ---------->EDX£½EBX£«EDX
ÆäÖУ¬EDXµÄ³õʼֵΪ0¡£EDXÓÃÀ´±£´æÿ´ÎÑ­»·ºóµÄ½á¹û¡£

:004011E8 40 inc eax --------->EAX¼Ó1£¬×÷Ϊ¼ÆÊýÆ÷
:004011E9 3BC8 cmp ecx, eax --------->È¡ÍêÁËÂ𣿣¿
:004011EB 7FF3 jg 004011E0 --------->ûȡÍê¾ÍÌø»ØÑ­»·¡£

£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½¼ÆËã½áÊø£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½£½

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004011DE(C)
|
:004011ED 52 push edx

* Possible StringData Ref from Data Obj ->"%d"
|
:004011EE 6882B14000 push 0040B182
:004011F3 8D45AC lea eax, dword ptr [ebp-54]
:004011F6 50 push eax
:004011F7 E8C0280000 call 00403ABC ------->½«½á¹ûֵת»»Îª10½øÖÆÖµ
:004011FC 83C40C add esp, 0000000C
:004011FF 8D55AC lea edx, dword ptr [ebp-54]
:00401202 52 push edx ------->ÕýÈ·×¢²áÂëÀ²£¡
:00401203 8D4DC8 lea ecx, dword ptr [ebp-38]
:00401206 51 push ecx
:00401207 E808120000 call 00402414
:0040120C 83C408 add esp, 00000008
:0040120F 85C0 test eax, eax
:00401211 7517 jne 0040122A
:00401213 6830000400 push 00040030

* Possible StringData Ref from Data Obj ->"You Did It!"
|
:00401218 68CEB14000 push 0040B1CE

* Possible StringData Ref from Data Obj ->"Congradulations, you have figured "
->"out Step1
Step1 unlock code is: "
->"17FF25"
|
:0040121D 6885B14000 push 0040B185
:00401222 56 push esi

* Reference To: USER32.MessageBoxA, Ord:0000h
|
:00401223 E8D68F0000 Call 0040A1FE
:00401228 EB15 jmp 0040123F

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401211(C)
|
:0040122A 6830000400 push 00040030

* Possible StringData Ref from Data Obj ->"Wrong!"
|
:0040122F 68EDB14000 push 0040B1ED

    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程