[C++] 纯文本查看 复制代码
[b]程序构架: 机器码无效 注册码无效 坑人无敌
[/b]
00401EB0 55 push ebp
00401EB1 8BEC mov ebp,esp
00401EB3 81EC 1C000000 sub esp,1C
00401EB9 833D 48244B00 0>cmp dword ptr ds:[4B2448],0 //No1 坑:默认为0 不管输入什么 直接失败 解决[4b2448]==1
00401EC0 0F84 0F010000 je 一个小程.00401FD5
00401EC6 8B1D 44244B00 mov ebx,dword ptr ds:[4B2444]
00401ECC E8 94F1FFFF call 一个小程.00401065 //No2 坑: char str1[]={"加密的注册失败","加密的注册成功"} call 取数组成员数() 不用说 返回2
00401ED1 53 push ebx //push 数组指针 push 数组个数 问 为什么ecx==个数呢 答:内部运算 是ecx做i++
00401ED2 51 push ecx
00401ED3 DB05 50244B00 fild dword ptr ds:[4B2450]
00401ED9 DD5D F8 fstp qword ptr ss:[ebp-8]
00401EDC DD45 F8 fld qword ptr ss:[ebp-8]
00401EDF DC05 5AAE4800 fadd qword ptr ds:[48AE5A]
00401EE5 DD5D F0 fstp qword ptr ss:[ebp-10]
00401EE8 DD45 F0 fld qword ptr ss:[ebp-10]
00401EEB E8 B0FDFFFF call 一个小程.00401CA0
00401EF0 48 dec eax
00401EF1 79 0D jns short 一个小程.00401F00
00401EF3 68 04000000 push 4
00401EF8 E8 FB010000 call 一个小程.004020F8
00401EFD 83C4 04 add esp,4
00401F00 59 pop ecx
00401F01 5B pop ebx
00401F02 3BC1 cmp eax,ecx
00401F04 7C 0D jl short 一个小程.00401F13 //易官方的默认取数组 都会加上的 防止越界[0] 易数组默认为1
00401F06 68 01000000 push 1
00401F0B E8 E8010000 call 一个小程.004020F8
00401F10 83C4 04 add esp,4
00401F13 C1E0 02 shl eax,2
00401F16 03D8 add ebx,eax //No3 到这里 让他注册成功 吧 eax改成4 为什么:吧数组2给他 [数组首地址+4]==数组2 让他去弹出成功信息框 ; //
00401F18 895D EC mov dword ptr ss:[ebp-14],ebx
00401F1B 68 05000080 push 80000005
00401F20 6A 00 push 0
00401F22 8B5D EC mov ebx,dword ptr ss:[ebp-14]
00401F25 8B03 mov eax,dword ptr ds:[ebx]
00401F27 85C0 test eax,eax
00401F29 75 05 jnz short 一个小程.00401F30
00401F2B B8 23AD4800 mov eax,一个小程.0048AD23
00401F30 50 push eax
00401F31 68 01000000 push 1
00401F36 B8 01000000 mov eax,1
00401F3B BB D02A4600 mov ebx,一个小程.00462AD0
00401F40 E8 AD010000 call 一个小程.004020F2
00401F45 83C4 10 add esp,10
00401F48 8945 E8 mov dword ptr ss:[ebp-18],eax
00401F4B 68 05000080 push 80000005
00401F50 6A 00 push 0
00401F52 8B45 E8 mov eax,dword ptr ss:[ebp-18]
00401F55 85C0 test eax,eax
00401F57 75 05 jnz short 一个小程.00401F5E
00401F59 B8 23AD4800 mov eax,一个小程.0048AD23
00401F5E 50 push eax
00401F5F 68 01000000 push 1
00401F64 BB 702A4000 mov ebx,一个小程.00402A70
00401F69 E8 7E010000 call 一个小程.004020EC
00401F6E 83C4 10 add esp,10
00401F71 8945 E4 mov dword ptr ss:[ebp-1C],eax
00401F74 8B5D E8 mov ebx,dword ptr ss:[ebp-18]
00401F77 85DB test ebx,ebx
00401F79 74 09 je short 一个小程.00401F84
00401F7B 53 push ebx
00401F7C E8 5F010000 call 一个小程.004020E0
00401F81 83C4 04 add esp,4
00401F84 BB 06000000 mov ebx,6
00401F89 E8 1AFFFFFF call 一个小程.00401EA8
00401F8E 68 01030080 push 80000301
00401F93 6A 00 push 0
00401F95 68 00000000 push 0
00401F9A 68 04000080 push 80000004
00401F9F 6A 00 push 0
00401FA1 8B45 E4 mov eax,dword ptr ss:[ebp-1C]
00401FA4 85C0 test eax,eax
00401FA6 75 05 jnz short 一个小程.00401FAD
00401FA8 B8 22AD4800 mov eax,一个小程.0048AD22
00401FAD 50 push eax
00401FAE 68 04000000 push 4
00401FB3 BB 80324000 mov ebx,一个小程.00403280
00401FB8 E8 2F010000 call 一个小程.004020EC
00401FBD 83C4 34 add esp,34
00401FC0 8B5D E4 mov ebx,dword ptr ss:[ebp-1C]
00401FC3 85DB test ebx,ebx
00401FC5 74 09 je short 一个小程.00401FD0
00401FC7 53 push ebx
00401FC8 E8 13010000 call 一个小程.004020E0
00401FCD 83C4 04 add esp,4
00401FD0 E9 34000000 jmp 一个小程.00402009
00401FD5 BB 06000000 mov ebx,6
00401FDA E8 C9FEFFFF call 一个小程.00401EA8
00401FDF 68 01030080 push 80000301
00401FE4 6A 00 push 0
00401FE6 68 00000000 push 0
00401FEB 68 04000080 push 80000004
00401FF0 6A 00 push 0
00401FF2 68 85AE4800 push 一个小程.0048AE85
00401FF7 68 04000000 push 4
00401FFC BB 80324000 mov ebx,一个小程.00403280
00402001 E8 E6000000 call 一个小程.004020EC
00402006 83C4 34 add esp,34
00402009 8BE5 mov esp,ebp
0040200B 5D pop ebp
0040200C C3 retn