您的位置:首页精文荟萃破解文章 → 超极公式计算机V4.53计算流程

超极公式计算机V4.53计算流程

时间:2004/10/15 0:57:00来源:本站整理作者:蓝点我要评论(0)

 

 


0167:00401631 C744244000000000 MOV DWORD [ESP+40],00
0167:00401639 E8CE060000 CALL `MFC42!ord_00000C19`
0167:0040163E 8D4C2408 LEA ECX,[ESP+08]
0167:00401642 51 PUSH ECX
0167:00401643 8BCD MOV ECX,EBP
0167:00401645 E8A6010000 CALL 004017F0 //关键CALL,F8跟进
0167:0040164A B301 MOV BL,01
0167:0040164C 681C414000 PUSH DWORD 0040411C
0167:00401651 8D4C2410 LEA ECX,[ESP+10]
0167:00401655 885C243C MOV [ESP+3C],BL
0167:00401659 E8A8060000 CALL `MFC42!ord_00000217`
0167:0040165E 8B542410 MOV EDX,[ESP+10]
0167:00401662 8B442408 MOV EAX,[ESP+08]
0167:00401666 52 PUSH EDX
0167:00401667 50 PUSH EAX
0167:00401668 C644244002 MOV BYTE [ESP+40],02
0167:0040166D FF1500324000 CALL `MSVCRT!_mbscmp` D EAX真注册码
0167:00401673 83C408 ADD ESP,BYTE +08
0167:00401676 85C0 TEST EAX,EAX
0167:00401678 7459 JZ 004016D3
0167:0040167A 6820414000 PUSH DWORD 00404120


----------------------//关键CALL//---------------------


0167:004017F0 6AFF PUSH BYTE -01
0167:004017F2 683F204000 PUSH DWORD 0040203F
0167:004017F7 64A100000000 MOV EAX,[FS:00]
0167:004017FD 50 PUSH EAX
0167:004017FE 64892500000000 MOV [FS:00],ESP
0167:00401805 83EC34 SUB ESP,BYTE +34
0167:00401808 55 PUSH EBP
0167:00401809 56 PUSH ESI
0167:0040180A 57 PUSH EDI
0167:0040180B 6A00 PUSH BYTE +00
0167:0040180D 6A00 PUSH BYTE +00
0167:0040180F 6A00 PUSH BYTE +00
0167:00401811 8D44241C LEA EAX,[ESP+1C]
0167:00401815 6A00 PUSH BYTE +00
0167:00401817 50 PUSH EAX
0167:00401818 6A00 PUSH BYTE +00
0167:0040181A 6A00 PUSH BYTE +00
0167:0040181C 6828404000 PUSH DWORD 00404028
0167:00401821 C744243400000000 MOV DWORD [ESP+34],00
0167:00401829 C744243000000000 MOV DWORD [ESP+30],00
0167:00401831 FF1500304000 CALL `KERNEL32!GetVolumeInformationA`
0167:00401837 8B442410 MOV EAX,[ESP+10]
0167:0040183B 8B3540404000 MOV ESI,[00404040]
0167:00401841 0FAFC0 IMUL EAX,EAX
0167:00401844 05A88E9314 ADD EAX,14938EA8
0167:00401849 8B3D44404000 MOV EDI,[00404044]
0167:0040184F 35D3FA9CEB XOR EAX,EB9CFAD3 ?EAX看见机器码,上面是机器码生成过程
0167:00401854 8B2D48404000 MOV EBP,[00404048] 我的机器码:0x51450762(1363478370)
0167:0040185A 99 CDQ
0167:0040185B 33C2 XOR EAX,EDX
0167:0040185D 89742430 MOV [ESP+30],ESI
0167:00401861 2BC2 SUB EAX,EDX
0167:00401863 8A154C404000 MOV DL,[0040404C] 初始为"0"
0167:00401869 8BC8 MOV ECX,EAX ecx=eax=0x51450762
0167:0040186B 89442410 MOV [ESP+10],EAX
0167:0040186F 81E1FF000000 AND ECX,FF ecx=ecx and 0xFF=0x62
0167:00401875 8854243C MOV [ESP+3C],DL dl=0
0167:00401879 C1E810 SHR EAX,10 eax=eax/2^10=0x5145
0167:0040187C 33C8 XOR ECX,EAX ecx=ecx xor eax=0x62 xor 0x5145=0x5127
0167:0040187E 88542428 MOV [ESP+28],DL
0167:00401882 8BD1 MOV EDX,ECX edx=ecx=0x5127
0167:00401884 A13C404000 MOV EAX,[0040403C] 字符串"98765G3210WXCDEF",记为表A1
0167:00401889 C1E204 SHL EDX,04 edx=edx*2^4=0x5127*2^4=0x51270
0167:0040188C 2BD1 SUB EDX,ECX edx=edx-ecx=0x51270-0x5127=0x4c149
0167:0040188E 8944242C MOV [ESP+2C],EAX
0167:00401892 F7DA NEG EDX edx取反,edx=0xFFFB3EB7
0167:00401894 C1E204 SHL EDX,04 ....略....
0167:00401897 2BD1 SUB EDX,ECX
0167:00401899 897C2434 MOV [ESP+34],EDI
0167:0040189D D1E2 SHL EDX,1
0167:0040189F 81F23FFEFFFF XOR EDX,FFFFFE3F
0167:004018A5 896C2438 MOV [ESP+38],EBP
0167:004018A9 C1EA06 SHR EDX,06
0167:004018AC 83E20F AND EDX,BYTE +0F 算出edx=0xA,控制在16以内,查表
0167:004018AF 89442418 MOV [ESP+18],EAX 字符串A1放到注册码初始位置
0167:004018B3 8974241C MOV [ESP+1C],ESI
0167:004018B7 897C2420 MOV [ESP+20],EDI
0167:004018BB 8A44142C MOV AL,[ESP+EDX+2C] //查表A1取出字符
0167:004018BF 8BD1 MOV EDX,ECX
0167:004018C1 83F2E7 XOR EDX,BYTE -19
0167:004018C4 8844241F MOV [ESP+1F],AL 替换掉第8位注册码
0167:004018C8 C1EA03 SHR EDX,03
0167:004018CB 83E20F AND EDX,BYTE +0F
0167:004018CE BF01000000 MOV EDI,01
0167:004018D3 896C2424 MOV [ESP+24],EBP
0167:004018D7 8A44142C MOV AL,[ESP+EDX+2C] //查表A1取出字符
0167:004018DB 8BD7 MOV EDX,EDI
0167:004018DD 2BD1 SUB EDX,ECX
0167:004018DF 8844241C MOV [ESP+1C],AL 替换掉第5位注册码
0167:004018E3 83F2FB XOR EDX,BYTE -05
0167:004018E6 83E20F AND EDX,BYTE +0F
0167:004018E9 8A44142C MOV AL,[ESP+EDX+2C]
0167:004018ED 8D1449 LEA EDX,[ECX+ECX*2]
0167:004018F0 8844241D MOV [ESP+1D],AL 第6位注册码
0167:004018F4 8D0491 LEA EAX,[ECX+EDX*4]
0167:004018F7 8D04C0 LEA EAX,[EAX+EAX*8]
0167:004018FA D1E0 SHL EAX,1
0167:004018FC 35000A0000 XOR EAX,0A00
0167:00401901 C1E809 SHR EAX,09
0167:00401904 83E00F AND EAX,BYTE +0F
0167:00401907 8A54042C MOV DL,[ESP+EAX+2C]
0167:0040190B 8D0449 LEA EAX,[ECX+ECX*2]
0167:0040190E 88542423 MOV [ESP+23],DL 第12位注册码
0167:00401912 8D0480 LEA EAX,[EAX+EAX*4]
0167:00401915 8D0480 LEA EAX,[EAX+EAX*4]
0167:00401918 8D04C0 LEA EAX,[EAX+EAX*8]
0167:0040191B 3500100000 XOR EAX,1000
0167:00401920 C1E80C SHR EAX,0C
0167:00401923 83E00F AND EAX,BYTE +0F
0167:00401926 BE0C000000 MOV ESI,0C
0167:0040192B 8A54042C MOV DL,[ESP+EAX+2C]
0167:0040192F 8BC1 MOV EAX,ECX
0167:00401931 3500070000 XOR EAX,0700
0167:00401936 88542424 MOV [ESP+24],DL 第13位注册码
0167:0040193A C1E808 SHR EAX,08
0167:0040193D 83E00F AND EAX,BYTE +0F
0167:00401940 8A54042C MOV DL,[ESP+EAX+2C]
0167:00401944 8BC1 MOV EAX,ECX
0167:00401946 83F070 XOR EAX,BYTE +70
0167:00401949 8854241E MOV [ESP+1E],DL 第7位注册码
0167:0040194D C1E804 SHR EAX,04
0167:00401950 83E00F AND EAX,BYTE +0F
0167:00401953 8A54042C MOV DL,[ESP+EAX+2C]
0167:00401957 8BC1 MOV EAX,ECX
0167:00401959 83F007 XOR EAX,BYTE +07
0167:0040195C 88542421 MOV [ESP+21],DL 第10位注册码
0167:00401960 83E00F AND EAX,BYTE +0F
0167:00401963 8A54042C MOV DL,[ESP+EAX+2C]
0167:00401967 8BC1 MOV EAX,ECX
0167:00401969 88542420 MOV [ESP+20],DL 第9位注册码
0167:0040196D BA03000000 MOV EDX,03
0167:00401972 2BD1 SUB EDX,ECX
0167:00401974 83E00F AND EAX,BYTE +0F
0167:00401977 81F200006000 XOR EDX,00600000
0167:0040197D C1EA14 SHR EDX,14
0167:00401980 83E20F AND EDX,BYTE +0F
0167:00401983 33D0 XOR EDX,EAX
0167:00401985 8A54142C MOV DL,[ESP+EDX+2C]
0167:00401989 88542425 MOV [ESP+25],DL 第14位注册码
0167:0040198D BA02000000 MOV EDX,02
0167:00401992 2BD1 SUB EDX,ECX
0167:00401994 81F2FFFFDFFF XOR EDX,FFDFFFFF
0167:0040199A C1EA14 SHR EDX,14
0167:0040199D 83E20F AND EDX,BYTE +0F
0167:004019A0 33D0 XOR EDX,EAX
0167:004019A2 8A44142C MOV AL,[ESP+EDX+2C]
0167:004019A6 88442426 MOV [ESP+26],AL 第15位注册码
0167:004019AA B8A38B2EBA MOV EAX,BA2E8BA3
0167:004019AF F7E1 MUL ECX
0167:004019B1 8BC2 MOV EAX,EDX
0167:004019B3 33D2 XOR EDX,EDX
0167:004019B5 C1E803 SHR EAX,03
0167:004019B8 F7F6 DIV ESI
0167:004019BA 8BC1 MOV EAX,ECX
0167:004019BC BE09000000 MOV ESI,09
0167:004019C1 8A54142C MOV DL,[ESP+EDX+2C]
0167:004019C5 88542427 MOV [ESP+27],DL 第16位注册码
0167:004019C9 33D2 XOR EDX,EDX
0167:004019CB F7F6 DIV ESI
0167:004019CD BE0D000000 MOV ESI,0D
0167:004019D2 8A44142C MOV AL,[ESP+EDX+2C]
0167:004019D6 BA07000000 MOV EDX,07
0167:004019DB 2BD1 SUB EDX,ECX
0167:004019DD 88442418 MOV [ESP+18],AL 第1位注册码
0167:004019E1 81F200007000 XOR EDX,00700000
0167:004019E7 C1EA14 SHR EDX,14
0167:004019EA 83E20F AND EDX,BYTE +0F
0167:004019ED 8A44142C MOV AL,[ESP+EDX+2C]
0167:004019F1 88442419 MOV [ESP+19],AL 第2位注册码
0167:004019F5 B825499224 MOV EAX,24924925
0167:004019FA F7E1 MUL ECX
0167:004019FC 8BC1 MOV EAX,ECX
0167:004019FE 2BC2 SUB EAX,EDX
0167:00401A00 D1E8 SHR EAX,1
0167:00401A02 03C2 ADD EAX,EDX
0167:00401A04 33D2 XOR EDX,EDX
0167:00401A06 C1E802 SHR EAX,02
0167:00401A09 F7F6 DIV ESI
0167:00401A0B C1E905 SHR ECX,05
0167:00401A0E B806000000 MOV EAX,06
0167:00401A13 2BC1 SUB EAX,ECX
0167:00401A15 83F007 XOR EAX,BYTE +07
0167:00401A18 83E00F AND EAX,BYTE +0F
0167:00401A1B 8A4C042C MOV CL,[ESP+EAX+2C]
0167:00401A1F 884C241B MOV [ESP+1B],CL 第4位注册码
0167:00401A23 8A54142C MOV DL,[ESP+EDX+2C]
0167:00401A27 8854241A MOV [ESP+1A],DL 第3位注册码
0167:00401A2B 8D542418 LEA EDX,[ESP+18] D EDX可见到替换后的注册码,后面就是把注册码分成4段的过程了
0167:00401A2F 52 PUSH EDX
0167:00401A30 8D4C2410 LEA ECX,[ESP+10]
0167:00401A34 E88D000000 CALL `MFC42!ord_00000219`
0167:00401A39 6A2D PUSH BYTE +2D
0167:00401A3B 6A0C PUSH BYTE +0C
0167:00401A3D 8D4C2414 LEA ECX,[ESP+14]
0167:00401A41 897C2450 MOV [ESP+50],EDI
0167:00401A45 E8C8020000 CALL `MFC42!ord_00001A7A`
0167:00401A4A 6A2D PUSH BYTE +2D
0167:00401A4C 6A08 PUSH BYTE +08
0167:00401A4E 8D4C2414 LEA ECX,[ESP+14]
0167:00401A52 E8BB020000 CALL `MFC42!ord_00001A7A`
0167:00401A57 6A2D PUSH BYTE +2D
0167:00401A59 6A04 PUSH BYTE +04
0167:00401A5B 8D4C2414 LEA ECX,[ESP+14]
0167:00401A5F E8AE020000 CALL `MFC42!ord_00001A7A`
0167:00401A64 8B742450 MOV ESI,[ESP+50]
0167:00401A68 8D44240C LEA EAX,[ESP+0C]
0167:00401A6C 50 PUSH EAX
0167:00401A6D 8BCE MOV ECX,ESI
0167:00401A6F E892020000 CALL `MFC42!ord_00000217`
0167:00401A74 897C2414 MOV [ESP+14],EDI
0167:00401A78 8D4C240C LEA ECX,[ESP+0C]
0167:00401A7C C644244800 MOV BYTE [ESP+48],00
0167:00401A81 E846000000 CALL `MFC42!ord_00000320`
0167:00401A86 8B4C2440 MOV ECX,[ESP+40]
0167:00401A8A 8BC6 MOV EAX,ESI
0167:00401A8C 5F POP EDI
0167:00401A8D 5E POP ESI
0167:00401A8E 5D POP EBP
0167:00401A8F 64890D00000000 MOV [FS:00],ECX
0167:00401A96 83C440 ADD ESP,BYTE +40


    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程