兄弟我近期应朋友要求破一软件,经过追踪,确认以下代码是进行注册码比较的,但兄弟我对于各种算法比较生疏,那位前辈给看一下,能给解读更好,或指点一下兄弟该 向那方面研究.(软件不方便提供,望各位谅解)
00426AF0 /$ 64:A1 00000000 mov eax,dword ptr fs:[0]
00426AF6 |. 6A FF push -1
00426AF8 |. 68 E8DF4D00 push Caca11.004DDFE8
00426AFD |. 50 push eax
00426AFE |. 8B4424 18 mov eax,dword ptr ss:[esp+18]
00426B02 |. 85C0 test eax,eax
00426B04 |. 64:8925 00000000 mov dword ptr fs:[0],esp
00426B0B |. 53 push ebx
00426B0C |. 55 push ebp
00426B0D |. 56 push esi
00426B0E |. 57 push edi
00426B0F |. 8BF1 mov esi,ecx
00426B11 |. 0F84 97000000 je Caca11.00426BAE
00426B17 |. 8038 00 cmp byte ptr ds:[eax],0
00426B1A |. 0F84 8E000000 je Caca11.00426BAE
00426B20 |. 50 push eax
00426B21 |. 8D4C24 2C lea ecx,dword ptr ss:[esp+2C]
00426B25 |. E8 D6E3FDFF call Caca11.00404F00
00426B2A |. 8D4424 28 lea eax,dword ptr ss:[esp+28]
00426B2E |. 50 push eax ; /Arg1
00426B2F |. 8BCE mov ecx,esi ; |
00426B31 |. C74424 1C 0000000>mov dword ptr ss:[esp+1C],0 ; |
00426B39 |. 8D7E 28 lea edi,dword ptr ds:[esi+28] ; |
00426B3C |. E8 CFFDFFFF call Caca11.00426910 ; \Caca11.00426910
00426B41 |. 50 push eax
00426B42 |. 8BCF mov ecx,edi
00426B44 |. E8 D7570300 call Caca11.0045C320
00426B49 |. 8B4424 28 mov eax,dword ptr ss:[esp+28]
00426B4D |. 83C0 F0 add eax,-10
00426B50 |. C74424 18 FFFFFFF>mov dword ptr ss:[esp+18],-1
00426B58 |. 8D48 0C lea ecx,dword ptr ds:[eax+C]
00426B5B |. 83CA FF or edx,FFFFFFFF
00426B5E |. F0:0FC111 lock xadd dword ptr ds:[ecx],edx
00426B62 |. 4A dec edx
00426B63 |. 85D2 test edx,edx
00426B65 |. 7F 08 jg short Caca11.00426B6F
00426B67 |. 8B08 mov ecx,dword ptr ds:[eax]
00426B69 |. 8B11 mov edx,dword ptr ds:[ecx]
00426B6B |. 50 push eax
00426B6C |. FF52 04 call dword ptr ds:[edx+4]
00426B6F |> 8B6C24 24 mov ebp,dword ptr ss:[esp+24]
00426B73 |. 33F6 xor esi,esi
00426B75 |. 85ED test ebp,ebp
00426B77 |. 76 1B jbe short Caca11.00426B94
00426B79 |. 8B5C24 20 mov ebx,dword ptr ss:[esp+20]
00426B7D |. 8D49 00 lea ecx,dword ptr ds:[ecx]
00426B80 |> 68 FF000000 /push 0FF
00426B85 |. 8BCF |mov ecx,edi
00426B87 |. E8 E4590300 |call Caca11.0045C570
00426B8C |. 30041E |xor byte ptr ds:[esi+ebx],al
00426B8F |. 46 |inc esi
00426B90 |. 3BF5 |cmp esi,ebp
00426B92 |.^ 72 EC \jb short Caca11.00426B80
00426B94 |> B8 01000000 mov eax,1
00426B99 |. 8B4C24 10 mov ecx,dword ptr ss:[esp+10]
00426B9D |. 64:890D 00000000 mov dword ptr fs:[0],ecx
00426BA4 |. 5F pop edi
00426BA5 |. 5E pop esi
00426BA6 |. 5D pop ebp
00426BA7 |. 5B pop ebx
00426BA8 |. 83C4 0C add esp,0C
00426BAB |. C2 0C00 retn 0C
00426BAE |> 8B4C24 10 mov ecx,dword ptr ss:[esp+10]
00426BB2 |. 5F pop edi
00426BB3 |. 5E pop esi
00426BB4 |. 5D pop ebp
00426BB5 |. 33C0 xor eax,eax
00426BB7 |. 64:890D 00000000 mov dword ptr fs:[0],ecx
00426BBE |. 5B pop ebx
00426BBF |. 83C4 0C add esp,0C
00426BC2 \. C2 0C00 retn 0C
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课