- UID
- 75374
注册时间2014-5-1
阅读权限30
最后登录1970-1-1
龙战于野
TA的每日心情 | 开心 2024-12-17 07:25 |
---|
签到天数: 445 天 [LV.9]以坛为家II
|
本帖最后由 qwe456 于 2017-5-6 20:08 编辑
此网站注册码算法格式基本一样,都是第几位加第几位等于多少,然后判断某几位等于多少。我贴出两款软件,其余自行分析。
下载地址: http://www.verypdf.com/app/pdf-password-remover/index.html
注册码算法:注册码位二十位,第一位加第二位等于13,第十九位加第二十位等于13,第六位加第十四位等于11,第十三位为6,第十五位为大写字母P,第十六位为大写字母R,其他位为字母或
数字。比如:58aaa4aaaaaa67PRaa49
0040431D 83EC 18 sub esp,0x18
00404320 53 push ebx
00404321 56 push esi
00404322 57 push edi
00404323 8D4D 08 lea ecx,dword ptr ss:[ebp+0x8]
00404326 FF75 08 push dword ptr ss:[ebp+0x8]
00404329 E8 C7E00900 call winDecry.004A23F5
0040432E 33DB xor ebx,ebx
00404330 6A 20 push 0x20
00404332 8D4D 08 lea ecx,dword ptr ss:[ebp+0x8]
00404335 895D FC mov dword ptr ss:[ebp-0x4],ebx
00404338 E8 66530900 call winDecry.004996A3
0040433D 8B75 08 mov esi,dword ptr ss:[ebp+0x8]
00404340 56 push esi
00404341 E8 AABF0700 call winDecry.004802F0
00404346 83F8 14 cmp eax,0x14 ; 检测注册码是否为20位
00404349 59 pop ecx
0040434A 74 07 je short winDecry.00404353
0040434C 33F6 xor esi,esi
0040434E E9 B1000000 jmp winDecry.00404404
00404353 8A06 mov al,byte ptr ds:[esi] ; 取注册码第1位
00404355 885D DD mov byte ptr ss:[ebp-0x23],bl
00404358 8845 DC mov byte ptr ss:[ebp-0x24],al
0040435B 8A46 01 mov al,byte ptr ds:[esi+0x1] ; 取注册码第2位
0040435E 8845 E8 mov byte ptr ss:[ebp-0x18],al
00404361 8D45 E8 lea eax,dword ptr ss:[ebp-0x18]
00404364 50 push eax
00404365 885D E9 mov byte ptr ss:[ebp-0x17],bl
00404368 E8 D3CC0700 call winDecry.00481040
0040436D 8BF8 mov edi,eax
0040436F 8D45 DC lea eax,dword ptr ss:[ebp-0x24]
00404372 50 push eax
00404373 E8 C8CC0700 call winDecry.00481040
00404378 03F8 add edi,eax ; 第1位加第2位
0040437A 59 pop ecx
0040437B 83FF 0D cmp edi,0xD ; 比较是否等于13
0040437E 59 pop ecx
0040437F ^ 75 CB jnz short winDecry.0040434C
00404381 8A46 12 mov al,byte ptr ds:[esi+0x12] ; 取注册码第19位
00404384 885D DD mov byte ptr ss:[ebp-0x23],bl
00404387 8845 DC mov byte ptr ss:[ebp-0x24],al
0040438A 8A46 13 mov al,byte ptr ds:[esi+0x13] ; 取注册码第20位
0040438D 8845 E8 mov byte ptr ss:[ebp-0x18],al
00404390 8D45 E8 lea eax,dword ptr ss:[ebp-0x18]
00404393 50 push eax
00404394 885D E9 mov byte ptr ss:[ebp-0x17],bl
00404397 E8 A4CC0700 call winDecry.00481040
0040439C 8BF8 mov edi,eax
0040439E 8D45 DC lea eax,dword ptr ss:[ebp-0x24]
004043A1 50 push eax
004043A2 E8 99CC0700 call winDecry.00481040
004043A7 03F8 add edi,eax ; 第19位加第20位
004043A9 59 pop ecx
004043AA 83FF 0D cmp edi,0xD ; 比较是否等于13
004043AD 59 pop ecx
004043AE ^ 75 9C jnz short winDecry.0040434C
004043B0 8A46 05 mov al,byte ptr ds:[esi+0x5] ; 取注册码第6位
004043B3 885D DD mov byte ptr ss:[ebp-0x23],bl
004043B6 8845 DC mov byte ptr ss:[ebp-0x24],al
004043B9 8A46 0D mov al,byte ptr ds:[esi+0xD] ; 取注册码第14位
004043BC 8845 E8 mov byte ptr ss:[ebp-0x18],al
004043BF 8D45 E8 lea eax,dword ptr ss:[ebp-0x18]
004043C2 50 push eax
004043C3 885D E9 mov byte ptr ss:[ebp-0x17],bl
004043C6 E8 75CC0700 call winDecry.00481040
004043CB 8BF8 mov edi,eax
004043CD 8D45 DC lea eax,dword ptr ss:[ebp-0x24]
004043D0 50 push eax
004043D1 E8 6ACC0700 call winDecry.00481040 ; 第6位加第14位
004043D6 03F8 add edi,eax
004043D8 59 pop ecx
004043D9 83FF 0B cmp edi,0xB ; 比较是否等于11
004043DC 59 pop ecx
004043DD ^ 0F85 69FFFFFF jnz winDecry.0040434C
004043E3 807E 0C 36 cmp byte ptr ds:[esi+0xC],0x36 ; 比较等13位是否等于6
004043E7 ^ 0F85 5FFFFFFF jnz winDecry.0040434C
004043ED 807E 0E 50 cmp byte ptr ds:[esi+0xE],0x50 ; 比较等15位是否等于大写字母P
004043F1 ^ 0F85 55FFFFFF jnz winDecry.0040434C
004043F7 807E 0F 52 cmp byte ptr ds:[esi+0xF],0x52 ; 比较等16位是否等于大写字母R
004043FB ^ 0F85 4BFFFFFF jnz winDecry.0040434C
00404401 6A 01 push 0x1
00404403 5E pop esi
00404404 834D FC FF or dword ptr ss:[ebp-0x4],-0x1
00404408 8D4D 08 lea ecx,dword ptr ss:[ebp+0x8]
0040440B E8 77DF0900 call winDecry.004A2387
00404410 8B4D F4 mov ecx,dword ptr ss:[ebp-0xC] ; ntdll.7C930460
00404413 8BC6 mov eax,esi
00404415 5F pop edi
00404416 5E pop esi
00404417 5B pop ebx
00404418 64:890D 0000000>mov dword ptr fs:[0],ecx
0040441F C9 leave
还有pdf2word 大家自己分析下载地址:http://www.verypdf.com/app/pdf-to-word/index.html
00405F5F 90 nop
00405F60 83EC 18 sub esp,0x18
00405F63 83C9 FF or ecx,-0x1
00405F66 33C0 xor eax,eax
00405F68 53 push ebx
00405F69 56 push esi ; pdf2word.007F61F0
00405F6A 8B7424 24 mov esi,dword ptr ss:[esp+0x24] ; pdf2word.004066CB
00405F6E 57 push edi ; pdf2word.007F6201
00405F6F 8BFE mov edi,esi ; pdf2word.007F61F0
00405F71 F2:AE repne scas byte ptr es:[edi]
00405F73 F7D1 not ecx
00405F75 49 dec ecx
00405F76 83F9 14 cmp ecx,0x14
00405F79 74 07 je short pdf2word.00405F82
00405F7B 5F pop edi ; pdf2word.007F62B8
00405F7C 5E pop esi ; pdf2word.007F62B8
00405F7D 5B pop ebx ; pdf2word.007F62B8
00405F7E 83C4 18 add esp,0x18
00405F81 C3 retn
00405F82 8A06 mov al,byte ptr ds:[esi]
00405F84 8A4E 01 mov cl,byte ptr ds:[esi+0x1]
00405F87 8D5424 0C lea edx,dword ptr ss:[esp+0xC]
00405F8B 32DB xor bl,bl
00405F8D 52 push edx
00405F8E 884424 1C mov byte ptr ss:[esp+0x1C],al
00405F92 885C24 1D mov byte ptr ss:[esp+0x1D],bl
00405F96 884C24 10 mov byte ptr ss:[esp+0x10],cl
00405F9A 885C24 11 mov byte ptr ss:[esp+0x11],bl
00405F9E E8 B4A61800 call pdf2word.00590657
00405FA3 8BF8 mov edi,eax
00405FA5 8D4424 1C lea eax,dword ptr ss:[esp+0x1C]
00405FA9 50 push eax
00405FAA E8 A8A61800 call pdf2word.00590657
00405FAF 03F8 add edi,eax
00405FB1 83C4 08 add esp,0x8
00405FB4 83FF 0B cmp edi,0xB
00405FB7 74 09 je short pdf2word.00405FC2
00405FB9 5F pop edi ; pdf2word.007F62B8
00405FBA 5E pop esi ; pdf2word.007F62B8
00405FBB 33C0 xor eax,eax
00405FBD 5B pop ebx ; pdf2word.007F62B8
00405FBE 83C4 18 add esp,0x18
00405FC1 C3 retn
00405FC2 8A4E 12 mov cl,byte ptr ds:[esi+0x12]
00405FC5 8A56 13 mov dl,byte ptr ds:[esi+0x13]
00405FC8 8D4424 0C lea eax,dword ptr ss:[esp+0xC]
00405FCC 884C24 18 mov byte ptr ss:[esp+0x18],cl
00405FD0 50 push eax
00405FD1 885C24 1D mov byte ptr ss:[esp+0x1D],bl
00405FD5 885424 10 mov byte ptr ss:[esp+0x10],dl
00405FD9 885C24 11 mov byte ptr ss:[esp+0x11],bl
00405FDD E8 75A61800 call pdf2word.00590657
00405FE2 8D4C24 1C lea ecx,dword ptr ss:[esp+0x1C]
00405FE6 8BF8 mov edi,eax
00405FE8 51 push ecx
00405FE9 E8 69A61800 call pdf2word.00590657
00405FEE 03F8 add edi,eax
00405FF0 83C4 08 add esp,0x8
00405FF3 83FF 0D cmp edi,0xD
00405FF6 74 09 je short pdf2word.00406001
00405FF8 5F pop edi ; pdf2word.007F62B8
00405FF9 5E pop esi ; pdf2word.007F62B8
00405FFA 33C0 xor eax,eax
00405FFC 5B pop ebx ; pdf2word.007F62B8
00405FFD 83C4 18 add esp,0x18
00406000 C3 retn
00406001 8A56 05 mov dl,byte ptr ds:[esi+0x5]
00406004 8A46 0D mov al,byte ptr ds:[esi+0xD]
00406007 8D4C24 0C lea ecx,dword ptr ss:[esp+0xC]
0040600B 885424 18 mov byte ptr ss:[esp+0x18],dl
0040600F 51 push ecx
00406010 885C24 1D mov byte ptr ss:[esp+0x1D],bl
00406014 884424 10 mov byte ptr ss:[esp+0x10],al
00406018 885C24 11 mov byte ptr ss:[esp+0x11],bl
0040601C E8 36A61800 call pdf2word.00590657
00406021 8D5424 1C lea edx,dword ptr ss:[esp+0x1C]
00406025 8BF8 mov edi,eax
00406027 52 push edx
00406028 E8 2AA61800 call pdf2word.00590657
0040602D 03F8 add edi,eax
0040602F 83C4 08 add esp,0x8
00406032 83FF 09 cmp edi,0x9
00406035 74 09 je short pdf2word.00406040
00406037 5F pop edi ; pdf2word.007F62B8
00406038 5E pop esi ; pdf2word.007F62B8
00406039 33C0 xor eax,eax
0040603B 5B pop ebx ; pdf2word.007F62B8
0040603C 83C4 18 add esp,0x18
0040603F C3 retn
00406040 807E 0C 56 cmp byte ptr ds:[esi+0xC],0x56
00406044 74 09 je short pdf2word.0040604F
00406046 5F pop edi ; pdf2word.007F62B8
00406047 5E pop esi ; pdf2word.007F62B8
00406048 33C0 xor eax,eax
0040604A 5B pop ebx ; pdf2word.007F62B8
0040604B 83C4 18 add esp,0x18
0040604E C3 retn
0040604F 807E 0E 33 cmp byte ptr ds:[esi+0xE],0x33
00406053 74 09 je short pdf2word.0040605E
00406055 5F pop edi ; pdf2word.007F62B8
00406056 5E pop esi ; pdf2word.007F62B8
00406057 33C0 xor eax,eax
00406059 5B pop ebx ; pdf2word.007F62B8
0040605A 83C4 18 add esp,0x18
|
评分
-
查看全部评分
|