菜鸟级CM!
要求:1)不要破爆;
2)追出属于自己的注册码;
3)写个注册机;
[ 本帖最后由 莱沙 于 2008-12-12 14:51 编辑 ] 抢个沙发。
放学再玩:loveliness:
-----------------------------斌少专用分割线-----------------------------
哎,在学校上网。就带了个OD。。电脑卡死~~~
先爆个吧 回家追码:Q :Q :Q
-----------------------------斌少专用分割线-----------------------------
哈哈 放学咯。。
追出来了
hkbinshao
HA90KBN
晚上试试写注册机
[ 本帖最后由 qq513701092 于 2008-12-12 17:29 编辑 ] 沙发没了1!!~
闷死了!~ :lol :lol :lol
SqunSqun
QU80QUS 004168B1 55 PUSH EBP ; /// 算法
004168B2 8BEC MOV EBP,ESP
004168B4 81EC 50000000 SUB ESP,50
004168BA C745 FC 0000000>MOV DWORD PTR SS:,0
004168C1 C745 F8 0000000>MOV DWORD PTR SS:,0
004168C8 6A FF PUSH -1
004168CA 6A 08 PUSH 8
004168CC 68 02000116 PUSH 16010002
004168D1 68 01000152 PUSH 52010001
004168D6 E8 8C040000 CALL Keygen3.00416D67 ; /// 读取我们输入的用户名-SqunSqun
004168DB 83C4 10 ADD ESP,10
004168DE 8945 F4 MOV DWORD PTR SS:,EAX
004168E1 68 04000080 PUSH 80000004
004168E6 6A 00 PUSH 0
004168E8 8B45 F4 MOV EAX,DWORD PTR SS:
004168EB 85C0 TEST EAX,EAX
004168ED 75 05 JNZ SHORT Keygen3.004168F4
004168EF B8 CB904000 MOV EAX,Keygen3.004090CB
004168F4 50 PUSH EAX
004168F5 68 01000000 PUSH 1
004168FA BB 30010000 MOV EBX,130
004168FF E8 5D040000 CALL Keygen3.00416D61 ; /// 读取用户名的位数。
00416904 83C4 10 ADD ESP,10
00416907 8945 F0 MOV DWORD PTR SS:,EAX
0041690A 8B5D F4 MOV EBX,DWORD PTR SS:
0041690D 85DB TEST EBX,EBX
0041690F 74 09 JE SHORT Keygen3.0041691A
00416911 53 PUSH EBX ; EBX=001927E0, (ASCII "SqunSqun")
00416912 E8 44040000 CALL Keygen3.00416D5B
00416917 83C4 04 ADD ESP,4
0041691A 8B45 F0 MOV EAX,DWORD PTR SS: ; /// 把用户名位数赋值给eax==8
0041691D 8945 FC MOV DWORD PTR SS:,EAX
00416920 837D FC 08 CMP DWORD PTR SS:,8 ; /// 用户名位数跟8比较。大于等于则跳。
00416924 0F8D 41000000 JGE Keygen3.0041696B ; /// 我们输入的是8位。所以跳转实现。
0041692A 68 02000080 PUSH 80000002
0041692F 6A 00 PUSH 0
00416931 68 01000000 PUSH 1
00416936 68 01000100 PUSH 10001
0041693B 68 00000106 PUSH 6010000
00416940 68 01000152 PUSH 52010001
00416945 68 01000100 PUSH 10001
0041694A 68 21000106 PUSH 6010021
0041694F 68 22000152 PUSH 52010022
00416954 68 03000000 PUSH 3
00416959 BB 20030000 MOV EBX,320
0041695E E8 FE030000 CALL Keygen3.00416D61
00416963 83C4 28 ADD ESP,28
00416966 E9 45030000 JMP Keygen3.00416CB0
0041696B DB45 FC FILD DWORD PTR SS:
0041696E DD5D F0 FSTP QWORD PTR SS:
00416971 DD45 F0 FLD QWORD PTR SS:
00416974 DC25 CC904000 FSUB QWORD PTR DS:
0041697A DD5D E8 FSTP QWORD PTR SS:
0041697D 6A FF PUSH -1
0041697F 6A 08 PUSH 8
00416981 68 02000116 PUSH 16010002
00416986 68 01000152 PUSH 52010001
0041698B E8 D7030000 CALL Keygen3.00416D67 ; /// 用户名SqunSqun
00416990 83C4 10 ADD ESP,10
00416993 8945 E4 MOV DWORD PTR SS:,EAX ; /// EAX==SqunSqun
00416996 68 01030080 PUSH 80000301
0041699B 6A 00 PUSH 0
0041699D 68 02000000 PUSH 2
004169A2 DD45 E8 FLD QWORD PTR SS:
004169A5 E8 7CFDFFFF CALL Keygen3.00416726
004169AA 68 01030080 PUSH 80000301
004169AF 6A 00 PUSH 0
004169B1 50 PUSH EAX
004169B2 68 04000080 PUSH 80000004
004169B7 6A 00 PUSH 0
004169B9 8B45 E4 MOV EAX,DWORD PTR SS: ; /// 把用户名给EAX==SqunSqun
004169BC 85C0 TEST EAX,EAX
004169BE 75 05 JNZ SHORT Keygen3.004169C5
004169C0 B8 CB904000 MOV EAX,Keygen3.004090CB
004169C5 50 PUSH EAX
004169C6 68 03000000 PUSH 3
004169CB BB 3C010000 MOV EBX,13C ; /// EBX=13C
004169D0 E8 8C030000 CALL Keygen3.00416D61 ; /// F7取qu
004169D5 83C4 28 ADD ESP,28
004169D8 8945 E0 MOV DWORD PTR SS:,EAX
004169DB 8B5D E4 MOV EBX,DWORD PTR SS:
004169DE 85DB TEST EBX,EBX
004169E0 74 09 JE SHORT Keygen3.004169EB
004169E2 53 PUSH EBX ; /// EBX入栈==SqunSqun
004169E3 E8 73030000 CALL Keygen3.00416D5B
004169E8 83C4 04 ADD ESP,4
004169EB DB45 FC FILD DWORD PTR SS:
004169EE DD5D D8 FSTP QWORD PTR SS:
004169F1 DD45 D8 FLD QWORD PTR SS:
004169F4 DC0D D4904000 FMUL QWORD PTR DS:
004169FA DD5D D0 FSTP QWORD PTR SS:
004169FD 68 01060080 PUSH 80000601
00416A02 FF75 D4 PUSH DWORD PTR SS:
00416A05 FF75 D0 PUSH DWORD PTR SS:
00416A08 68 01000000 PUSH 1
00416A0D BB 68010000 MOV EBX,168 ; EBX==168
00416A12 E8 4A030000 CALL Keygen3.00416D61 ; /// F7eax==80
00416A17 83C4 10 ADD ESP,10
00416A1A 8945 CC MOV DWORD PTR SS:,EAX
00416A1D 68 01030080 PUSH 80000301
00416A22 6A 00 PUSH 0
00416A24 68 02000000 PUSH 2
00416A29 68 04000080 PUSH 80000004
00416A2E 6A 00 PUSH 0
00416A30 8B45 CC MOV EAX,DWORD PTR SS:
00416A33 85C0 TEST EAX,EAX
00416A35 75 05 JNZ SHORT Keygen3.00416A3C
00416A37 B8 CB904000 MOV EAX,Keygen3.004090CB
00416A3C 50 PUSH EAX
00416A3D 68 02000000 PUSH 2
00416A42 BB 34010000 MOV EBX,134
00416A47 E8 15030000 CALL Keygen3.00416D61
00416A4C 83C4 1C ADD ESP,1C
00416A4F 8945 C8 MOV DWORD PTR SS:,EAX
00416A52 8B5D CC MOV EBX,DWORD PTR SS:
00416A55 85DB TEST EBX,EBX
00416A57 74 09 JE SHORT Keygen3.00416A62
00416A59 53 PUSH EBX
00416A5A E8 FC020000 CALL Keygen3.00416D5B
00416A5F 83C4 04 ADD ESP,4
00416A62 6A FF PUSH -1
00416A64 6A 08 PUSH 8
00416A66 68 02000116 PUSH 16010002
00416A6B 68 01000152 PUSH 52010001
00416A70 E8 F2020000 CALL Keygen3.00416D67
00416A75 83C4 10 ADD ESP,10
00416A78 8945 C4 MOV DWORD PTR SS:,EAX
00416A7B 68 01030080 PUSH 80000301
00416A80 6A 00 PUSH 0
00416A82 68 02000000 PUSH 2
00416A87 68 01030080 PUSH 80000301
00416A8C 6A 00 PUSH 0
00416A8E 68 02000000 PUSH 2
00416A93 68 04000080 PUSH 80000004
00416A98 6A 00 PUSH 0
00416A9A 8B45 C4 MOV EAX,DWORD PTR SS:
00416A9D 85C0 TEST EAX,EAX
00416A9F 75 05 JNZ SHORT Keygen3.00416AA6
00416AA1 B8 CB904000 MOV EAX,Keygen3.004090CB
00416AA6 50 PUSH EAX
00416AA7 68 03000000 PUSH 3
00416AAC BB 3C010000 MOV EBX,13C
00416AB1 E8 AB020000 CALL Keygen3.00416D61 ; EAX==qu
00416AB6 83C4 28 ADD ESP,28
00416AB9 8945 C0 MOV DWORD PTR SS:,EAX
00416ABC 8B5D C4 MOV EBX,DWORD PTR SS:
00416ABF 85DB TEST EBX,EBX
00416AC1 74 09 JE SHORT Keygen3.00416ACC
00416AC3 53 PUSH EBX
00416AC4 E8 92020000 CALL Keygen3.00416D5B
00416AC9 83C4 04 ADD ESP,4
00416ACC 6A FF PUSH -1
00416ACE 6A 08 PUSH 8
00416AD0 68 02000116 PUSH 16010002
00416AD5 68 01000152 PUSH 52010001
00416ADA E8 88020000 CALL Keygen3.00416D67
00416ADF 83C4 10 ADD ESP,10
00416AE2 8945 BC MOV DWORD PTR SS:,EAX
00416AE5 68 01030080 PUSH 80000301
00416AEA 6A 00 PUSH 0
00416AEC 68 01000000 PUSH 1
00416AF1 68 01030080 PUSH 80000301
00416AF6 6A 00 PUSH 0
00416AF8 68 05000000 PUSH 5
00416AFD 68 04000080 PUSH 80000004
00416B02 6A 00 PUSH 0
00416B04 8B45 BC MOV EAX,DWORD PTR SS:
00416B07 85C0 TEST EAX,EAX
00416B09 75 05 JNZ SHORT Keygen3.00416B10
00416B0B B8 CB904000 MOV EAX,Keygen3.004090CB
00416B10 50 PUSH EAX
00416B11 68 03000000 PUSH 3
00416B16 BB 3C010000 MOV EBX,13C
00416B1B E8 41020000 CALL Keygen3.00416D61
00416B20 83C4 28 ADD ESP,28
00416B23 8945 B8 MOV DWORD PTR SS:,EAX
00416B26 8B5D BC MOV EBX,DWORD PTR SS:
00416B29 85DB TEST EBX,EBX
00416B2B 74 09 JE SHORT Keygen3.00416B36
00416B2D 53 PUSH EBX
00416B2E E8 28020000 CALL Keygen3.00416D5B
00416B33 83C4 04 ADD ESP,4
00416B36 FF75 B8 PUSH DWORD PTR SS:
00416B39 FF75 C0 PUSH DWORD PTR SS:
00416B3C FF75 C8 PUSH DWORD PTR SS:
00416B3F FF75 E0 PUSH DWORD PTR SS:
00416B42 B9 04000000 MOV ECX,4
00416B47 E8 6CFCFFFF CALL Keygen3.004167B8 ; EAX==qu80quS
00416B4C 83C4 10 ADD ESP,10
00416B4F 8945 B4 MOV DWORD PTR SS:,EAX
00416B52 8B5D E0 MOV EBX,DWORD PTR SS:
00416B55 85DB TEST EBX,EBX
00416B57 74 09 JE SHORT Keygen3.00416B62
00416B59 53 PUSH EBX
00416B5A E8 FC010000 CALL Keygen3.00416D5B
00416B5F 83C4 04 ADD ESP,4
00416B62 8B5D C8 MOV EBX,DWORD PTR SS:
00416B65 85DB TEST EBX,EBX
00416B67 74 09 JE SHORT Keygen3.00416B72
00416B69 53 PUSH EBX
00416B6A E8 EC010000 CALL Keygen3.00416D5B
00416B6F 83C4 04 ADD ESP,4
00416B72 8B5D C0 MOV EBX,DWORD PTR SS:
00416B75 85DB TEST EBX,EBX
00416B77 74 09 JE SHORT Keygen3.00416B82
00416B79 53 PUSH EBX
00416B7A E8 DC010000 CALL Keygen3.00416D5B
00416B7F 83C4 04 ADD ESP,4
00416B82 8B5D B8 MOV EBX,DWORD PTR SS:
00416B85 85DB TEST EBX,EBX
00416B87 74 09 JE SHORT Keygen3.00416B92
00416B89 53 PUSH EBX
00416B8A E8 CC010000 CALL Keygen3.00416D5B
00416B8F 83C4 04 ADD ESP,4
00416B92 68 04000080 PUSH 80000004
00416B97 6A 00 PUSH 0
00416B99 8B45 B4 MOV EAX,DWORD PTR SS:
00416B9C 85C0 TEST EAX,EAX
00416B9E 75 05 JNZ SHORT Keygen3.00416BA5
00416BA0 B8 CB904000 MOV EAX,Keygen3.004090CB
00416BA5 50 PUSH EAX
00416BA6 68 01000000 PUSH 1
00416BAB BB 50010000 MOV EBX,150
00416BB0 E8 AC010000 CALL Keygen3.00416D61 ; /// 把qu80quS都转为大写QU80QUS
00416BB5 83C4 10 ADD ESP,10
00416BB8 8945 B0 MOV DWORD PTR SS:,EAX
00416BBB 8B5D B4 MOV EBX,DWORD PTR SS:
00416BBE 85DB TEST EBX,EBX
00416BC0 74 09 JE SHORT Keygen3.00416BCB
00416BC2 53 PUSH EBX
00416BC3 E8 93010000 CALL Keygen3.00416D5B
00416BC8 83C4 04 ADD ESP,4
00416BCB 8B45 B0 MOV EAX,DWORD PTR SS:
00416BCE 50 PUSH EAX
00416BCF 8B5D F8 MOV EBX,DWORD PTR SS:
00416BD2 85DB TEST EBX,EBX
00416BD4 74 09 JE SHORT Keygen3.00416BDF
00416BD6 53 PUSH EBX
00416BD7 E8 7F010000 CALL Keygen3.00416D5B
00416BDC 83C4 04 ADD ESP,4
00416BDF 58 POP EAX ; 00191268
00416BE0 8945 F8 MOV DWORD PTR SS:,EAX
00416BE3 6A FF PUSH -1
00416BE5 6A 08 PUSH 8
00416BE7 68 03000116 PUSH 16010003
00416BEC 68 01000152 PUSH 52010001
00416BF1 E8 71010000 CALL Keygen3.00416D67 ; /// EAX==假码
00416BF6 83C4 10 ADD ESP,10
00416BF9 8945 F4 MOV DWORD PTR SS:,EAX
00416BFC 8B45 F8 MOV EAX,DWORD PTR SS:
00416BFF 50 PUSH EAX
00416C00 FF75 F4 PUSH DWORD PTR SS:
00416C03 E8 0CFCFFFF CALL Keygen3.00416814
00416C08 83C4 08 ADD ESP,8
00416C0B 83F8 00 CMP EAX,0
00416C0E B8 00000000 MOV EAX,0
00416C13 0F94C0 SETE AL
00416C16 8945 F0 MOV DWORD PTR SS:,EAX
00416C19 8B5D F4 MOV EBX,DWORD PTR SS:
00416C1C 85DB TEST EBX,EBX
00416C1E 74 09 JE SHORT Keygen3.00416C29
00416C20 53 PUSH EBX
00416C21 E8 35010000 CALL Keygen3.00416D5B ; /// 关键call
00416C26 83C4 04 ADD ESP,4
00416C29 837D F0 00 CMP DWORD PTR SS:,0
00416C2D 0F84 41000000 JE Keygen3.00416C74 ; /// 关键跳转。
00416C33 68 02000080 PUSH 80000002
00416C38 6A 00 PUSH 0
00416C3A 68 01000000 PUSH 1
00416C3F 68 01000100 PUSH 10001
00416C44 68 00000106 PUSH 6010000
00416C49 68 01000152 PUSH 52010001
00416C4E 68 01000100 PUSH 10001
00416C53 68 24000106 PUSH 6010024
00416C58 68 25000152 PUSH 52010025
00416C5D 68 03000000 PUSH 3
00416C62 BB 20030000 MOV EBX,320 楼上的分析相当不错!不过不知你有否似曾相识的感觉啊!最好就是写多个注册机练练手呢!:lol :lol :lol crack by estelle
LL16RAK 迟到了明码比较 注册码7位
第一位为用户名倒数第3位
第二位为用户名倒数第2位
第三位第四位为用户名长度乘10取高两位
第五位为用户名第2位
第六位为用户名第3位
第七位为用户名第5位
字母转大写
猜的。。。。
用户名:hjdkasjhdjskajsha
密码:SH17JDA 哎~好多人都玩过了!今天回家太晚了!没玩到。。。。
再凑个热闹吧。
用户名:killerzeno
注册码:EN10ILE
页:
[1]
2