高手进来帮我看看这个易软件怎么爆(软件在我网盘)
这个是用易语言编的软件.找到字窜后不知算法怎么改...不过它是读fm5.edb文件里的注册码来确认注册的.不知能不能字窜爆..0048742B DC65 B8 FSUB QWORD PTR SS:
0048742E D9E4 FTST
00487430 DFE0 FSTSW AX
00487432 F6C4 01 TEST AH,1
00487435 74 02 JE SHORT FM5_3_du.00487439
00487437 D9E0 FCHS
00487439 DC1D 2A964000 FCOMP QWORD PTR DS:
0048743F DFE0 FSTSW AX
00487441 F6C4 41 TEST AH,41
00487444 0F85 23000000 JNZ FM5_3_du.0048746D
0048744A 68 04000080 PUSH 80000004
0048744F 6A 00 PUSH 0
00487451 68 B7884100 PUSH FM5_3_du.004188B7 ; 读fm5.edb文件里的注册码.
00487456 68 01000000 PUSH 1
0048745B BB 60050000 MOV EBX,560
00487460 E8 E8830000 CALL FM5_3_du.0048F84D
00487465 83C4 10 ADD ESP,10
00487468 E9 32100000 JMP FM5_3_du.0048849F ;跳到标有已注册的标题
0048746D 8B5D F0 MOV EBX,DWORD PTR SS:
00487470 E8 0FC8FBFF CALL FM5_3_du.00443C84
00487475 B8 07000000 MOV EAX,7
0048747A 3BC1 CMP EAX,ECX
0048747C 7C 0D JL SHORT FM5_3_du.0048748B
0048747E 68 01000000 PUSH 1
00487483 E8 CB830000 CALL FM5_3_du.0048F853
00487488 83C4 04 ADD ESP,4
0048748B C1E0 02 SHL EAX,2
0048748E 03D8 ADD EBX,EAX
00487490 895D D8 MOV DWORD PTR SS:,EBX
00487493 68 04000080 PUSH 80000004
00487498 6A 00 PUSH 0
0048749A 8B5D D8 MOV EBX,DWORD PTR SS:
0048749D 8B03 MOV EAX,DWORD PTR DS:
0048749F 85C0 TEST EAX,EAX
004874A1 75 05 JNZ SHORT FM5_3_du.004874A8
004874A3 B8 61924000 MOV EAX,FM5_3_du.00409261
004874A8 50 PUSH EAX
004874A9 68 01000000 PUSH 1
004874AE BB 64010000 MOV EBX,164
004874B3 E8 95830000 CALL FM5_3_du.0048F84D
004874B8 83C4 10 ADD ESP,10
004874BB 8945 D0 MOV DWORD PTR SS:,EAX
004874BE 8955 D4 MOV DWORD PTR SS:,EDX
004874C1 DD45 D0 FLD QWORD PTR SS:
004874C4 DC05 15CA4000 FADD QWORD PTR DS:
004874CA DD5D C8 FSTP QWORD PTR SS:
004874CD 8B5D F0 MOV EBX,DWORD PTR SS:
004874D0 E8 AFC7FBFF CALL FM5_3_du.00443C84
004874D5 B8 06000000 MOV EAX,6
004874DA 3BC1 CMP EAX,ECX
004874DC 7C 0D JL SHORT FM5_3_du.004874EB
004874DE 68 01000000 PUSH 1
004874E3 E8 6B830000 CALL FM5_3_du.0048F853
004874E8 83C4 04 ADD ESP,4
004874EB C1E0 02 SHL EAX,2
004874EE 03D8 ADD EBX,EAX
004874F0 895D C4 MOV DWORD PTR SS:,EBX
004874F3 68 01030080 PUSH 80000301
004874F8 6A 00 PUSH 0
004874FA 68 04000000 PUSH 4
004874FF 68 04000080 PUSH 80000004
00487504 6A 00 PUSH 0
00487506 8B5D C4 MOV EBX,DWORD PTR SS:
00487509 8B03 MOV EAX,DWORD PTR DS:
0048750B 85C0 TEST EAX,EAX
0048750D 75 05 JNZ SHORT FM5_3_du.00487514
0048750F B8 61924000 MOV EAX,FM5_3_du.00409261
00487514 50 PUSH EAX
00487515 68 02000000 PUSH 2
0048751A BB 34010000 MOV EBX,134
0048751F E8 29830000 CALL FM5_3_du.0048F84D
00487524 83C4 1C ADD ESP,1C
00487527 8945 C0 MOV DWORD PTR SS:,EAX
0048752A 68 04000080 PUSH 80000004
0048752F 6A 00 PUSH 0
00487531 8B45 C0 MOV EAX,DWORD PTR SS:
00487534 85C0 TEST EAX,EAX
00487536 75 05 JNZ SHORT FM5_3_du.0048753D
00487538 B8 61924000 MOV EAX,FM5_3_du.00409261
0048753D 50 PUSH EAX
0048753E 68 01000000 PUSH 1
00487543 BB 64010000 MOV EBX,164
00487548 E8 00830000 CALL FM5_3_du.0048F84D
0048754D 83C4 10 ADD ESP,10
00487550 8945 B8 MOV DWORD PTR SS:,EAX
00487553 8955 BC MOV DWORD PTR SS:,EDX
00487556 8B5D C0 MOV EBX,DWORD PTR SS:
00487559 85DB TEST EBX,EBX
0048755B 74 09 JE SHORT FM5_3_du.00487566
0048755D 53 PUSH EBX
0048755E E8 D2820000 CALL FM5_3_du.0048F835
00487563 83C4 04 ADD ESP,4
00487566 DD45 C8 FLD QWORD PTR SS:
00487569 DC65 B8 FSUB QWORD PTR SS:
0048756C DD5D B0 FSTP QWORD PTR SS:
0048756F DD45 B0 FLD QWORD PTR SS:
00487572 D9E4 FTST
00487574 DFE0 FSTSW AX
00487576 F6C4 01 TEST AH,1
00487579 74 02 JE SHORT FM5_3_du.0048757D
0048757B D9E0 FCHS
0048757D DC1D 2A964000 FCOMP QWORD PTR DS:
00487583 DFE0 FSTSW AX
00487585 F6C4 41 TEST AH,41
00487588 0F85 2D000000 JNZ FM5_3_du.004875BB
0048758E 68 01030080 PUSH 80000301
00487593 6A 00 PUSH 0
00487595 68 63000000 PUSH 63
0048759A 68 01030080 PUSH 80000301
0048759F 6A 00 PUSH 0
004875A1 68 01000000 PUSH 1
004875A6 68 02000000 PUSH 2
004875AB BB 94000000 MOV EBX,94
004875B0 E8 98820000 CALL FM5_3_du.0048F84D
004875B5 83C4 1C ADD ESP,1C
004875B8 8945 EC MOV DWORD PTR SS:,EAX
004875BB 8B5D F0 MOV EBX,DWORD PTR SS:
004875BE E8 C1C6FBFF CALL FM5_3_du.00443C84
004875C3 B8 04000000 MOV EAX,4
004875C8 3BC1 CMP EAX,ECX
004875CA 7C 0D JL SHORT FM5_3_du.004875D9
004875CC 68 01000000 PUSH 1
004875D1 E8 7D820000 CALL FM5_3_du.0048F853
004875D6 83C4 04 ADD ESP,4
004875D9 C1E0 02 SHL EAX,2
004875DC 03D8 ADD EBX,EAX
004875DE 895D D8 MOV DWORD PTR SS:,EBX
004875E1 68 01030080 PUSH 80000301
004875E6 6A 00 PUSH 0
004875E8 68 01000000 PUSH 1
004875ED 68 04000080 PUSH 80000004
004875F2 6A 00 PUSH 0
004875F4 8B5D D8 MOV EBX,DWORD PTR SS:
004875F7 8B03 MOV EAX,DWORD PTR DS:
004875F9 85C0 TEST EAX,EAX
004875FB 75 05 JNZ SHORT FM5_3_du.00487602
004875FD B8 61924000 MOV EAX,FM5_3_du.00409261
00487602 50 PUSH EAX
00487603 68 02000000 PUSH 2
00487608 BB 38010000 MOV EBX,138
0048760D E8 3B820000 CALL FM5_3_du.0048F84D
00487612 83C4 1C ADD ESP,1C
00487615 8945 D4 MOV DWORD PTR SS:,EAX
00487618 68 F5884100 PUSH FM5_3_du.004188F5 ; 9
0048761D FF75 D4 PUSH DWORD PTR SS:
00487620 E8 DAC4FBFF CALL FM5_3_du.00443AFF
00487625 83C4 08 ADD ESP,8
00487628 83F8 00 CMP EAX,0
0048762B B8 00000000 MOV EAX,0
00487630 0F94C0 SETE AL
00487633 8945 D0 MOV DWORD PTR SS:,EAX
00487636 8B5D D4 MOV EBX,DWORD PTR SS:
00487639 85DB TEST EBX,EBX
0048763B 74 09 JE SHORT FM5_3_du.00487646
0048763D 53 PUSH EBX
0048763E E8 F2810000 CALL FM5_3_du.0048F835
00487643 83C4 04 ADD ESP,4
00487646 837D D0 00 CMP DWORD PTR SS:,0
0048764A 0F84 A8030000 JE FM5_3_du.004879F8 ;改JNE或NOP都不行.
00487650 6A 00 PUSH 0
00487652 68 F7884100 PUSH FM5_3_du.004188F7 ; \r\n\r\n 注册成功,谢谢您的支持!
.
.
.
.
00488484 68 36894100 PUSH FM5_3_du.00418936 ; 数理概率程序 Fm-5.3a(正式版)
00488489 6A FF PUSH -1
0048848B 6A 08 PUSH 8
0048848D 68 00000106 PUSH 6010000
00488492 68 01000152 PUSH 52010001
00488497 E8 A5730000 CALL FM5_3_du.0048F841
0048849C 83C4 18 ADD ESP,18
0048849F 8B5D FC MOV EBX,DWORD PTR SS: ;这是上面JMP跳入的地址
004884A2 85DB TEST EBX,EBX
004884A4 74 09 JE SHORT FM5_3_du.004884AF
004884A6 53 PUSH EBX
004884A7 E8 89730000 CALL FM5_3_du.0048F835
004884AC 83C4 04 ADD ESP,4
004884AF 8B5D F8 MOV EBX,DWORD PTR SS:
004884B2 85DB TEST EBX,EBX
004884B4 74 09 JE SHORT FM5_3_du.004884BF
004884B6 53 PUSH EBX
软件在偶的网盘:
http://free.ys168.com/?anlizhaomi
[ 本帖最后由 暗里着迷 于 2007-3-31 19:26 编辑 ] /:03 拿软件来看看~~
页:
[1]