- UID
- 65892
注册时间2010-3-1
阅读权限50
最后登录1970-1-1
感悟天道
TA的每日心情 | 慵懒 2024-12-4 10:07 |
---|
签到天数: 444 天 [LV.9]以坛为家II
|
本帖最后由 sdnyzjzx 于 2014-9-23 10:59 编辑
找了个软件柿子,供大家练手!
软件下载地址: http://www.mojosoft-software.com/full/BusinessCardsMX-setup.exe
This program will help to design and print a professional business card. The interface of the program has been designed in such a way that even a beginning user will not have problems with using the program. The process of designing is based on inserting ready for use elements accessible in the program such as figures, images and the background, and freely shifting them on the prepared project.
Another advantage of the program is the possibility of saving data about a company or people so that it can be used later while designing a business cards. BusinessCards MX uses templates which you can prepare on your own, or you can use ready models , templates of business cards accessible in it. BusinessCards MX is very easy to use business cards maker software.
There are 750 examples of business card templates in the program.
算法部分代码及注册机下载
0090C67C 55 PUSH EBP
0090C67D 8BEC MOV EBP, ESP
0090C67F 51 PUSH ECX
0090C680 B9 08000000 MOV ECX, 0x8
0090C685 6A 00 PUSH 0x0
0090C687 6A 00 PUSH 0x0
0090C689 49 DEC ECX
0090C68A ^ 75 F9 JNZ SHORT 0090C685
0090C68C 874D FC XCHG DWORD PTR SS:[EBP-0x4], ECX
0090C68F 53 PUSH EBX
0090C690 56 PUSH ESI
0090C691 57 PUSH EDI
0090C692 894D E0 MOV DWORD PTR SS:[EBP-0x20], ECX
0090C695 8955 FC MOV DWORD PTR SS:[EBP-0x4], EDX
0090C698 8945 E4 MOV DWORD PTR SS:[EBP-0x1C], EAX
0090C69B 8B45 FC MOV EAX, DWORD PTR SS:[EBP-0x4]
0090C69E E8 69B9AFFF CALL 0040800C
0090C6A3 33C0 XOR EAX, EAX
0090C6A5 55 PUSH EBP
0090C6A6 68 BBC99000 PUSH 0090C9BB
0090C6AB 64:FF30 PUSH DWORD PTR FS:[EAX]
0090C6AE 64:8920 MOV DWORD PTR FS:[EAX], ESP
0090C6B1 8B45 E0 MOV EAX, DWORD PTR SS:[EBP-0x20]
0090C6B4 E8 6FB8AFFF CALL 00407F28
0090C6B9 837D FC 00 CMP DWORD PTR SS:[EBP-0x4], 0x0 ; UNICODE "[email protected]"
0090C6BD 75 2E JNZ SHORT 0090C6ED
0090C6BF 8D45 E8 LEA EAX, DWORD PTR SS:[EBP-0x18]
0090C6C2 BA D8C99000 MOV EDX, 0090C9D8 ; User name is empty. Please set this propery before!
0090C6C7 E8 84BCAFFF CALL 00408350
0090C6CC B0 02 MOV AL, 0x2
0090C6CE 0FB715 40CA9000 MOVZX EDX, WORD PTR DS:[0x90CA40]
0090C6D5 33C9 XOR ECX, ECX
0090C6D7 51 PUSH ECX
0090C6D8 6A FF PUSH -0x1
0090C6DA 6A FF PUSH -0x1
0090C6DC 6A 00 PUSH 0x0
0090C6DE 8B4D E8 MOV ECX, DWORD PTR SS:[EBP-0x18]
0090C6E1 92 XCHG EAX, EDX
0090C6E2 91 XCHG EAX, ECX
0090C6E3 E8 7414C2FF CALL 0052DB5C
0090C6E8 E9 96020000 JMP 0090C983
0090C6ED 8D55 D0 LEA EDX, DWORD PTR SS:[EBP-0x30]
0090C6F0 8B45 FC MOV EAX, DWORD PTR SS:[EBP-0x4] ; UNICODE "[email protected]"
0090C6F3 E8 4057B1FF CALL 00421E38 ; 转大写
0090C6F8 8B55 D0 MOV EDX, DWORD PTR SS:[EBP-0x30] ; UNICODE "[email protected]"
0090C6FB 8D45 EC LEA EAX, DWORD PTR SS:[EBP-0x14]
0090C6FE B9 00000000 MOV ECX, 0x0
0090C703 E8 DCC3AFFF CALL 00408AE4
0090C708 C745 DC 0100000>MOV DWORD PTR SS:[EBP-0x24], 0x1
0090C70F C745 D8 0100000>MOV DWORD PTR SS:[EBP-0x28], 0x1
0090C716 33C0 XOR EAX, EAX
0090C718 8945 D4 MOV DWORD PTR SS:[EBP-0x2C], EAX
0090C71B 8B45 EC MOV EAX, DWORD PTR SS:[EBP-0x14] ; UNICODE "[email protected]"
0090C71E 85C0 TEST EAX, EAX
0090C720 74 05 JE SHORT 0090C727
0090C722 83E8 04 SUB EAX, 0x4
0090C725 8B00 MOV EAX, DWORD PTR DS:[EAX]
0090C727 8BF0 MOV ESI, EAX ; 上面字符串长度
0090C729 85F6 TEST ESI, ESI
0090C72B 7E 16 JLE SHORT 0090C743
0090C72D BB 01000000 MOV EBX, 0x1
0090C732 8B45 EC MOV EAX, DWORD PTR SS:[EBP-0x14]
0090C735 0FB64418 FF MOVZX EAX, BYTE PTR DS:[EAX+EBX-0x1] ; 取字符串
0090C73A F7EB IMUL EBX ; 5A*1 4C*2
0090C73C 0145 D4 ADD DWORD PTR SS:[EBP-0x2C], EAX
0090C73F 43 INC EBX
0090C740 4E DEC ESI
0090C741 ^ 75 EF JNZ SHORT 0090C732
0090C743 8B45 E4 MOV EAX, DWORD PTR SS:[EBP-0x1C] ; 54F4
0090C746 F680 A1000000 0>TEST BYTE PTR DS:[EAX+0xA1], 0x8
0090C74D 0F84 E7000000 JE 0090C83A
0090C753 8D55 F4 LEA EDX, DWORD PTR SS:[EBP-0xC]
0090C756 8B45 E4 MOV EAX, DWORD PTR SS:[EBP-0x1C]
0090C759 E8 A6040000 CALL 0090CC04
0090C75E 8B45 E4 MOV EAX, DWORD PTR SS:[EBP-0x1C]
0090C761 66:83B8 1201000>CMP WORD PTR DS:[EAX+0x112], 0x0
0090C769 74 15 JE SHORT 0090C780
0090C76B 8D4D F4 LEA ECX, DWORD PTR SS:[EBP-0xC]
0090C76E 8B5D E4 MOV EBX, DWORD PTR SS:[EBP-0x1C]
0090C771 8B55 E4 MOV EDX, DWORD PTR SS:[EBP-0x1C]
0090C774 8B83 14010000 MOV EAX, DWORD PTR DS:[EBX+0x114]
0090C77A FF93 10010000 CALL DWORD PTR DS:[EBX+0x110]
0090C780 8D45 F0 LEA EAX, DWORD PTR SS:[EBP-0x10]
0090C783 E8 A0B7AFFF CALL 00407F28
0090C788 8B45 F4 MOV EAX, DWORD PTR SS:[EBP-0xC]
0090C78B 85C0 TEST EAX, EAX
0090C78D 74 05 JE SHORT 0090C794
0090C78F 83E8 04 SUB EAX, 0x4
0090C792 8B00 MOV EAX, DWORD PTR DS:[EAX]
0090C794 8BF0 MOV ESI, EAX
0090C796 85F6 TEST ESI, ESI
0090C798 7E 2C JLE SHORT 0090C7C6
0090C79A BB 01000000 MOV EBX, 0x1
0090C79F 8B45 F4 MOV EAX, DWORD PTR SS:[EBP-0xC]
0090C7A2 0FB77C58 FE MOVZX EDI, WORD PTR DS:[EAX+EBX*2-0x2]
0090C7A7 66:83FF 2D CMP DI, 0x2D
0090C7AB 74 15 JE SHORT 0090C7C2
0090C7AD 8D45 CC LEA EAX, DWORD PTR SS:[EBP-0x34]
0090C7B0 8BD7 MOV EDX, EDI
0090C7B2 E8 ADC7AFFF CALL 00408F64
0090C7B7 8B55 CC MOV EDX, DWORD PTR SS:[EBP-0x34]
0090C7BA 8D45 F0 LEA EAX, DWORD PTR SS:[EBP-0x10]
0090C7BD E8 8EC9AFFF CALL 00409150
0090C7C2 43 INC EBX
0090C7C3 4E DEC ESI
0090C7C4 ^ 75 D9 JNZ SHORT 0090C79F
0090C7C6 8D45 F4 LEA EAX, DWORD PTR SS:[EBP-0xC]
0090C7C9 8B55 F0 MOV EDX, DWORD PTR SS:[EBP-0x10]
0090C7CC E8 7FBBAFFF CALL 00408350
0090C7D1 8B45 F4 MOV EAX, DWORD PTR SS:[EBP-0xC]
0090C7D4 85C0 TEST EAX, EAX
0090C7D6 74 05 JE SHORT 0090C7DD
0090C7D8 83E8 04 SUB EAX, 0x4
0090C7DB 8B00 MOV EAX, DWORD PTR DS:[EAX]
0090C7DD 83F8 10 CMP EAX, 0x10
0090C7E0 74 30 JE SHORT 0090C812
0090C7E2 8B45 E0 MOV EAX, DWORD PTR SS:[EBP-0x20]
0090C7E5 E8 3EB7AFFF CALL 00407F28
0090C7EA 8B45 E4 MOV EAX, DWORD PTR SS:[EBP-0x1C]
0090C7ED 66:83B8 0A01000>CMP WORD PTR DS:[EAX+0x10A], 0x0
0090C7F5 0F84 88010000 JE 0090C983
0090C7FB 8B5D E4 MOV EBX, DWORD PTR SS:[EBP-0x1C]
0090C7FE 8B55 E4 MOV EDX, DWORD PTR SS:[EBP-0x1C]
0090C801 8B83 0C010000 MOV EAX, DWORD PTR DS:[EBX+0x10C]
0090C807 FF93 08010000 CALL DWORD PTR DS:[EBX+0x108]
0090C80D E9 71010000 JMP 0090C983
0090C812 8B45 F4 MOV EAX, DWORD PTR SS:[EBP-0xC]
0090C815 85C0 TEST EAX, EAX
0090C817 74 05 JE SHORT 0090C81E
0090C819 83E8 04 SUB EAX, 0x4
0090C81C 8B00 MOV EAX, DWORD PTR DS:[EAX]
0090C81E 8BF0 MOV ESI, EAX
0090C820 85F6 TEST ESI, ESI
0090C822 7E 16 JLE SHORT 0090C83A
0090C824 BB 01000000 MOV EBX, 0x1
0090C829 8B45 F4 MOV EAX, DWORD PTR SS:[EBP-0xC]
0090C82C 0FB74458 FE MOVZX EAX, WORD PTR DS:[EAX+EBX*2-0x2]
0090C831 F7EB IMUL EBX
0090C833 0145 D4 ADD DWORD PTR SS:[EBP-0x2C], EAX
0090C836 43 INC EBX
0090C837 4E DEC ESI
0090C838 ^ 75 EF JNZ SHORT 0090C829
0090C83A BB 01000000 MOV EBX, 0x1
0090C83F 8B45 D4 MOV EAX, DWORD PTR SS:[EBP-0x2C] ; 54F4
0090C842 03C3 ADD EAX, EBX
0090C844 B9 C8000000 MOV ECX, 0xC8
0090C849 99 CDQ
0090C84A F7F9 IDIV ECX
0090C84C 8BC2 MOV EAX, EDX ; 95
0090C84E 8BD3 MOV EDX, EBX ; 1
0090C850 03D2 ADD EDX, EDX
0090C852 8B4D E4 MOV ECX, DWORD PTR SS:[EBP-0x1C]
0090C855 8B89 98000000 MOV ECX, DWORD PTR DS:[ECX+0x98] ; UNICODE "{7D5F595E-7F4B-4E1C-957D-301E74BB3BC7}"
0090C85B 0FB75451 FE MOVZX EDX, WORD PTR DS:[ECX+EDX*2-0x2]
0090C860 8B4D E4 MOV ECX, DWORD PTR SS:[EBP-0x1C]
0090C863 8B89 98000000 MOV ECX, DWORD PTR DS:[ECX+0x98]
0090C869 0FB74C59 FE MOVZX ECX, WORD PTR DS:[ECX+EBX*2-0x2]
0090C86E 66:33D1 XOR DX, CX
0090C871 8B4D EC MOV ECX, DWORD PTR SS:[EBP-0x14] ; UNICODE "[email protected]"
0090C874 8B75 DC MOV ESI, DWORD PTR SS:[EBP-0x24]
0090C877 0FB64C31 FF MOVZX ECX, BYTE PTR DS:[ECX+ESI-0x1]
0090C87C 66:33D1 XOR DX, CX
0090C87F 0FB7D2 MOVZX EDX, DX
0090C882 33C2 XOR EAX, EDX
0090C884 8D4D C8 LEA ECX, DWORD PTR SS:[EBP-0x38]
0090C887 BA 02000000 MOV EDX, 0x2
0090C88C E8 DB66B1FF CALL 00422F6C
0090C891 8B55 C8 MOV EDX, DWORD PTR SS:[EBP-0x38]
0090C894 8D45 F8 LEA EAX, DWORD PTR SS:[EBP-0x8]
0090C897 E8 B4C8AFFF CALL 00409150
0090C89C 8B45 EC MOV EAX, DWORD PTR SS:[EBP-0x14]
0090C89F 8B55 DC MOV EDX, DWORD PTR SS:[EBP-0x24]
0090C8A2 0FB64410 FF MOVZX EAX, BYTE PTR DS:[EAX+EDX-0x1]
0090C8A7 33C3 XOR EAX, EBX
0090C8A9 0145 D4 ADD DWORD PTR SS:[EBP-0x2C], EAX
0090C8AC 8B45 E4 MOV EAX, DWORD PTR SS:[EBP-0x1C]
0090C8AF F680 A1000000 0>TEST BYTE PTR DS:[EAX+0xA1], 0x8
0090C8B6 74 0D JE SHORT 0090C8C5
0090C8B8 8B45 F4 MOV EAX, DWORD PTR SS:[EBP-0xC]
0090C8BB 0FB74458 FE MOVZX EAX, WORD PTR DS:[EAX+EBX*2-0x2]
0090C8C0 33C3 XOR EAX, EBX
0090C8C2 0145 D4 ADD DWORD PTR SS:[EBP-0x2C], EAX
0090C8C5 FF45 DC INC DWORD PTR SS:[EBP-0x24]
0090C8C8 FF45 D8 INC DWORD PTR SS:[EBP-0x28]
0090C8CB 8B45 EC MOV EAX, DWORD PTR SS:[EBP-0x14]
0090C8CE 85C0 TEST EAX, EAX
0090C8D0 74 05 JE SHORT 0090C8D7
0090C8D2 83E8 04 SUB EAX, 0x4
0090C8D5 8B00 MOV EAX, DWORD PTR DS:[EAX]
0090C8D7 3B45 DC CMP EAX, DWORD PTR SS:[EBP-0x24]
0090C8DA 7D 07 JGE SHORT 0090C8E3
0090C8DC C745 DC 0100000>MOV DWORD PTR SS:[EBP-0x24], 0x1
0090C8E3 837D D8 0B CMP DWORD PTR SS:[EBP-0x28], 0xB
0090C8E7 7E 07 JLE SHORT 0090C8F0
0090C8E9 C745 D8 0100000>MOV DWORD PTR SS:[EBP-0x28], 0x1
0090C8F0 43 INC EBX
0090C8F1 83FB 0D CMP EBX, 0xD
0090C8F4 ^ 0F85 45FFFFFF JNZ 0090C83F
0090C8FA 8B45 F8 MOV EAX, DWORD PTR SS:[EBP-0x8] ; UNICODE "83674BF91CA8322A8665D227"
0090C8FD 85C0 TEST EAX, EAX
0090C8FF 74 05 JE SHORT 0090C906
0090C901 83E8 04 SUB EAX, 0x4
0090C904 8B00 MOV EAX, DWORD PTR DS:[EAX]
0090C906 83F8 18 CMP EAX, 0x18
0090C909 7E 16 JLE SHORT 0090C921
0090C90B 8D45 F8 LEA EAX, DWORD PTR SS:[EBP-0x8]
0090C90E 50 PUSH EAX
0090C90F B9 18000000 MOV ECX, 0x18
0090C914 BA 01000000 MOV EDX, 0x1
0090C919 8B45 F8 MOV EAX, DWORD PTR SS:[EBP-0x8]
0090C91C E8 57CAAFFF CALL 00409378
0090C921 8D45 C4 LEA EAX, DWORD PTR SS:[EBP-0x3C]
0090C924 50 PUSH EAX
0090C925 B9 08000000 MOV ECX, 0x8
0090C92A BA 01000000 MOV EDX, 0x1
0090C92F 8B45 F8 MOV EAX, DWORD PTR SS:[EBP-0x8]
0090C932 E8 41CAAFFF CALL 00409378
0090C937 FF75 C4 PUSH DWORD PTR SS:[EBP-0x3C] ; UNICODE "83674BF9"
0090C93A 68 50CA9000 PUSH 0090CA50 ; -
0090C93F 8D45 C0 LEA EAX, DWORD PTR SS:[EBP-0x40]
0090C942 50 PUSH EAX
0090C943 B9 08000000 MOV ECX, 0x8
0090C948 BA 09000000 MOV EDX, 0x9
0090C94D 8B45 F8 MOV EAX, DWORD PTR SS:[EBP-0x8] ; UNICODE "83674BF91CA8322A8665D227"
0090C950 E8 23CAAFFF CALL 00409378
0090C955 FF75 C0 PUSH DWORD PTR SS:[EBP-0x40] ; UNICODE "1CA8322A"
0090C958 68 50CA9000 PUSH 0090CA50 ; -
0090C95D 8D45 BC LEA EAX, DWORD PTR SS:[EBP-0x44]
0090C960 50 PUSH EAX
0090C961 B9 08000000 MOV ECX, 0x8
0090C966 BA 11000000 MOV EDX, 0x11
0090C96B 8B45 F8 MOV EAX, DWORD PTR SS:[EBP-0x8]
0090C96E E8 05CAAFFF CALL 00409378
0090C973 FF75 BC PUSH DWORD PTR SS:[EBP-0x44] ; UNICODE "8665D227"
0090C976 8B45 E0 MOV EAX, DWORD PTR SS:[EBP-0x20]
0090C979 BA 05000000 MOV EDX, 0x5
0090C97E E8 ADC8AFFF CALL 00409230
0090C983 33C0 XOR EAX, EAX
0090C985 5A POP EDX
0090C986 59 POP ECX
0090C987 59 POP ECX
0090C988 64:8910 MOV DWORD PTR FS:[EAX], EDX
0090C98B 68 C2C99000 PUSH 0090C9C2
0090C990 8D45 BC LEA EAX, DWORD PTR SS:[EBP-0x44]
0090C993 BA 06000000 MOV EDX, 0x6
0090C998 E8 EBB5AFFF CALL 00407F88
0090C99D 8D45 E8 LEA EAX, DWORD PTR SS:[EBP-0x18]
0090C9A0 E8 83B5AFFF CALL 00407F28
0090C9A5 8D45 EC LEA EAX, DWORD PTR SS:[EBP-0x14]
0090C9A8 E8 9FB5AFFF CALL 00407F4C
0090C9AD 8D45 F0 LEA EAX, DWORD PTR SS:[EBP-0x10]
0090C9B0 BA 04000000 MOV EDX, 0x4
0090C9B5 E8 CEB5AFFF CALL 00407F88
0090C9BA C3 RETN
注册文件保存在
XP: C:\Documents and Settings\Administrator\Application Data\mojosoft\BusinessCardsMX\key.txt
win7: C:\Users\Administrator\AppData\Roaming\mojosoft\BusinessCardsMX\key.txt
BusinessCardsMX注册机 V4.93.rar
(1.25 MB, 下载次数: 62)
欢迎测试注册机,有问题请反馈,谢谢!
|
评分
-
查看全部评分
|