您的位置:首页精文荟萃破解文章 → 亿维E书 V1.0算法

亿维E书 V1.0算法

时间:2004/10/15 0:56:00来源:本站整理作者:蓝点我要评论(0)

 关键call//
004DBB77 F8跟进//
------------------------------

0167:004DB7AC 55 PUSH EBP
0167:004DB7AD 8BEC MOV EBP,ESP
0167:004DB7AF 83C4D0 ADD ESP,BYTE -30
0167:004DB7B2 53 PUSH EBX
0167:004DB7B3 56 PUSH ESI
0167:004DB7B4 57 PUSH EDI
0167:004DB7B5 33D2 XOR EDX,EDX
0167:004DB7B7 8955D0 MOV [EBP-30],EDX
0167:004DB7BA 8955D4 MOV [EBP-2C],EDX
0167:004DB7BD 8955F8 MOV [EBP-08],EDX
0167:004DB7C0 8955F4 MOV [EBP-0C],EDX
0167:004DB7C3 8955EC MOV [EBP-14],EDX
0167:004DB7C6 8955E4 MOV [EBP-1C],EDX
0167:004DB7C9 8945FC MOV [EBP-04],EAX
0167:004DB7CC 33C0 XOR EAX,EAX
0167:004DB7CE 55 PUSH EBP
0167:004DB7CF 6803BA4D00 PUSH DWORD 004DBA03
0167:004DB7D4 64FF30 PUSH DWORD [FS:EAX]
0167:004DB7D7 648920 MOV [FS:EAX],ESP
0167:004DB7DA 8D55F8 LEA EDX,[EBP-08]
0167:004DB7DD A198174E00 MOV EAX,[004E1798]
0167:004DB7E2 8B00 MOV EAX,[EAX]
0167:004DB7E4 8B80F8020000 MOV EAX,[EAX+02F8]
0167:004DB7EA E8310DF9FF CALL 0046C520
0167:004DB7EF 8D45E4 LEA EAX,[EBP-1C] 中间值"ILOVEADA"
0167:004DB7F2 BA1CBA4D00 MOV EDX,004DBA1C
0167:004DB7F7 E8B48FF2FF CALL 004047B0
0167:004DB7FC 8D55F4 LEA EDX,[EBP-0C]
0167:004DB7FF A198174E00 MOV EAX,[004E1798]
0167:004DB804 8B00 MOV EAX,[EAX]
0167:004DB806 8B80FC020000 MOV EAX,[EAX+02FC]
0167:004DB80C E80F0DF9FF CALL 0046C520
0167:004DB811 8B45E4 MOV EAX,[EBP-1C]
0167:004DB814 E8BF91F2FF CALL 004049D8
0167:004DB819 8945F0 MOV [EBP-10],EAX
0167:004DB81C 33FF XOR EDI,EDI
0167:004DB81E C745E801000000 MOV DWORD [EBP-18],01
0167:004DB825 BB80000000 MOV EBX,80 EBX初始=$80
0167:004DB82A C645E300 MOV BYTE [EBP-1D],00
0167:004DB82E 8B45F8 MOV EAX,[EBP-08] 用户名
0167:004DB831 E8A291F2FF CALL 004049D8 计算长度
0167:004DB836 8BF0 MOV ESI,EAX 用户名长度
0167:004DB838 83FE01 CMP ESI,BYTE +01
0167:004DB83B 0F8CA7000000 JL NEAR 004DB8E8
0167:004DB841 8B45F8 MOV EAX,[EBP-08] 用户名
0167:004DB844 0FB64430FF MOVZX EAX,BYTE [EAX+ESI-01] 从最后一位开始取注册名ASCII码
0167:004DB849 03C3 ADD EAX,EBX EAX=EAX+EBX
0167:004DB84B B9FF000000 MOV ECX,FF ECX=$FF
0167:004DB850 99 CDQ EDX清零
0167:004DB851 F7F9 IDIV ECX EAX除$FF
0167:004DB853 8BDA MOV EBX,EDX 余数放到EBX,准备第二轮计算初始值
0167:004DB855 3B7DF0 CMP EDI,[EBP-10] 注册码长度和中间数长度比较
0167:004DB858 7D03 JNL 004DB85D 没有继续
0167:004DB85A 47 INC EDI 计数器加一
0167:004DB85B EB05 JMP SHORT 004DB862
0167:004DB85D BF01000000 MOV EDI,01 用户名大于中间数,则从1开始计算,也就是重复循环
0167:004DB862 8B45E4 MOV EAX,[EBP-1C] 取中间数"ILOVEADA"
0167:004DB865 0FB64438FF MOVZX EAX,BYTE [EAX+EDI-01] 逐位取ASCII码
0167:004DB86A 33D8 XOR EBX,EAX 和前面计算的结果XOR
0167:004DB86C 8D45EC LEA EAX,[EBP-14]
0167:004DB86F 50 PUSH EAX
0167:004DB870 895DD8 MOV [EBP-28],EBX 放到[EBP-28]存起来
0167:004DB873 C645DC00 MOV BYTE [EBP-24],00
0167:004DB877 8D55D8 LEA EDX,[EBP-28]
0167:004DB87A 33C9 XOR ECX,ECX
0167:004DB87C B830BA4D00 MOV EAX,004DBA30
0167:004DB881 E8EEE2F2FF CALL 00409B74 转换成字母
0167:004DB886 8D45D4 LEA EAX,[EBP-2C]
0167:004DB889 50 PUSH EAX
0167:004DB88A 8B45EC MOV EAX,[EBP-14]
0167:004DB88D E84691F2FF CALL 004049D8
0167:004DB892 8BC8 MOV ECX,EAX
0167:004DB894 8B55E8 MOV EDX,[EBP-18]
0167:004DB897 8B45F4 MOV EAX,[EBP-0C]
0167:004DB89A E89993F2FF CALL 00404C38
0167:004DB89F 8B45D4 MOV EAX,[EBP-2C] 取2位假码
0167:004DB8A2 8B55EC MOV EDX,[EBP-14] 取相应计算出来的2位真码
0167:004DB8A5 E87A92F2FF CALL 00404B24 比较
0167:004DB8AA 0F9445E3 SETZ [EBP-1D] 设标志位,不对就拜拜了!
0167:004DB8AE 8D45D0 LEA EAX,[EBP-30]
0167:004DB8B1 50 PUSH EAX
0167:004DB8B2 8B45EC MOV EAX,[EBP-14]
0167:004DB8B5 E81E91F2FF CALL 004049D8
0167:004DB8BA 8BC8 MOV ECX,EAX
0167:004DB8BC 8B55E8 MOV EDX,[EBP-18]
0167:004DB8BF 8B45F4 MOV EAX,[EBP-0C]
0167:004DB8C2 E87193F2FF CALL 00404C38
0167:004DB8C7 8B55D0 MOV EDX,[EBP-30]
0167:004DB8CA 8B45EC MOV EAX,[EBP-14]
0167:004DB8CD E85292F2FF CALL 00404B24 还是比较
0167:004DB8D2 750B JNZ 004DB8DF 对了继续下两位计算!
0167:004DB8D4 8B45EC MOV EAX,[EBP-14]
0167:004DB8D7 E8FC90F2FF CALL 004049D8
0167:004DB8DC 0145E8 ADD [EBP-18],EAX
0167:004DB8DF 4E DEC ESI
0167:004DB8E0 85F6 TEST ESI,ESI
0167:004DB8E2 0F8559FFFFFF JNZ NEAR 004DB841
0167:004DB8E8 807DE300 CMP BYTE [EBP-1D],00
0167:004DB8EC 0F84B8000000 JZ NEAR 004DB9AA
0167:004DB8F2 B201 MOV DL,01
0167:004DB8F4 A100D84300 MOV EAX,[0043D800]
0167:004DB8F9 E80220F6FF CALL 0043D900
0167:004DB8FE 8BD8 MOV EBX,EAX
0167:004DB900 BA01000080 MOV EDX,80000001
0167:004DB905 8BC3 MOV EAX,EBX
0167:004DB907 E89420F6FF CALL 0043D9A0
0167:004DB90C B101 MOV CL,01
0167:004DB90E BA40BA4D00 MOV EDX,004DBA40
0167:004DB913 8BC3 MOV EAX,EBX
0167:004DB915 E8EA20F6FF CALL 0043DA04
0167:004DB91A 84C0 TEST AL,AL
0167:004DB91C 7426 JZ 004DB944
0167:004DB91E 8B4DF8 MOV ECX,[EBP-08]
0167:004DB921 BA6CBA4D00 MOV EDX,004DBA6C
0167:004DB926 8BC3 MOV EAX,EBX
0167:004DB928 E89322F6FF CALL 0043DBC0
0167:004DB92D 8B4DF4 MOV ECX,[EBP-0C]
0167:004DB930 BA7CBA4D00 MOV EDX,004DBA7C
0167:004DB935 8BC3 MOV EAX,EBX
0167:004DB937 E88422F6FF CALL 0043DBC0
0167:004DB93C A1F81A4E00 MOV EAX,[004E1AF8]
0167:004DB941 C60001 MOV BYTE [EAX],01
0167:004DB944 8BC3 MOV EAX,EBX
0167:004DB946 E82520F6FF CALL 0043D970
0167:004DB94B 8BC3 MOV EAX,EBX
0167:004DB94D E8B27FF2FF CALL 00403904
0167:004DB952 8B45FC MOV EAX,[EBP-04]
0167:004DB955 8B809C050000 MOV EAX,[EAX+059C]
0167:004DB95B 33D2 XOR EDX,EDX
0167:004DB95D E87A2DFAFF CALL 0047E6DC
0167:004DB962 8B45FC MOV EAX,[EBP-04]
0167:004DB965 8B80A0050000 MOV EAX,[EAX+05A0]
0167:004DB96B 33D2 XOR EDX,EDX
0167:004DB96D E86A2DFAFF CALL 0047E6DC
0167:004DB972 8B45FC MOV EAX,[EBP-04]
0167:004DB975 8B80A4050000 MOV EAX,[EAX+05A4]
0167:004DB97B 33D2 XOR EDX,EDX
0167:004DB97D E85A2DFAFF CALL 0047E6DC
0167:004DB982 E8152AFFFF CALL 004CE39C
0167:004DB987 6A40 PUSH BYTE +40
0167:004DB989 A114184E00 MOV EAX,[004E1814]
0167:004DB98E 8B00 MOV EAX,[EAX]
0167:004DB990 E84392F2FF CALL 00404BD8
0167:004DB995 8BD0 MOV EDX,EAX
0167:004DB997 B984BA4D00 MOV ECX,004DBA84
0167:004DB99C A1181A4E00 MOV EAX,[004E1A18]
0167:004DB9A1 8B00 MOV EAX,[EAX]
0167:004DB9A3 E8D016FBFF CALL 0048D078
0167:004DB9A8 EB21 JMP SHORT 004DB9CB
0167:004DB9AA 6A40 PUSH BYTE +40
0167:004DB9AC A1E8174E00 MOV EAX,[004E17E8]
0167:004DB9B1 8B00 MOV EAX,[EAX]
0167:004DB9B3 E82092F2FF CALL 00404BD8
0167:004DB9B8 8BD0 MOV EDX,EAX
0167:004DB9BA B984BA4D00 MOV ECX,004DBA84
0167:004DB9BF A1181A4E00 MOV EAX,[004E1A18]
0167:004DB9C4 8B00 MOV EAX,[EAX]
0167:004DB9C6 E8AD16FBFF CALL 0048D078
0167:004DB9CB 33C0 XOR EAX,EAX
0167:004DB9CD 5A POP EDX
0167:004DB9CE 59 POP ECX
0167:004DB9CF 59 POP ECX
0167:004DB9D0 648910 MOV [FS:EAX],EDX
0167:004DB9D3 680ABA4D00 PUSH DWORD 004DBA0A
0167:004DB9D8 8D45D0 LEA EAX,[EBP-30]
0167:004DB9DB BA02000000 MOV EDX,02
0167:004DB9E0 E8578DF2FF CALL 0040473C
0167:004DB9E5 8D45E4 LEA EAX,[EBP-1C]
0167:004DB9E8 E82B8DF2FF CALL 00404718
0167:004DB9ED 8D45EC LEA EAX,[EBP-14]
0167:004DB9F0 E8238DF2FF CALL 00404718
0167:004DB9F5 8D45F4 LEA EAX,[EBP-0C]
0167:004DB9F8 BA02000000 MOV EDX,02
0167:004DB9FD E83A8DF2FF CALL 0040473C

    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程