文章导航PC6首页软件下载单机游戏安卓资源苹果资源

pc软件新闻网络操作系统办公工具编程服务器软件评测

安卓新闻资讯应用教程刷机教程安卓游戏攻略tv资讯深度阅读综合安卓评测

苹果ios资讯苹果手机越狱备份教程美化教程ios软件教程mac教程

单机游戏角色扮演即时战略动作射击棋牌游戏体育竞技模拟经营其它游戏游戏工具

网游cf活动dnf活动lol周免英雄lol礼包

手游最新动态手游评测手游活动新游预告手游问答

您的位置:首页精文荟萃破解文章 → 美萍反黄专家2.0注册码破解

美萍反黄专家2.0注册码破解

时间:2004/10/15 0:49:00来源:本站整理作者:蓝点我要评论(0)

 

美萍反黄专家2.0注册码破解
:0046FA81 B978FF4600              mov ecx, 0046FF78
:0046FA86 8B15E0794700            mov edx, dword ptr [004779E0]
:0046FA8C E8AF43F9FF              call 00403E40
:0046FA91 8B55D4                  mov edx, dword ptr [ebp-2C]
:0046FA94 8B839C030000            mov eax, dword ptr [ebx+0000039C]
:0046FA9A 8B8008020000            mov eax, dword ptr [eax+00000208]
:0046FAA0 8B08                    mov ecx, dword ptr [eax]
:0046FAA2 FF5158                  call [ecx+58]
:0046FAA5 8D55D0                  lea edx, dword ptr [ebp-30]
:0046FAA8 A1E8794700              mov eax, dword ptr [004779E8]
:0046FAAD E87AD1FFFF              call 0046CC2C
:0046FAB2 8B55D0                  mov edx, dword ptr [ebp-30]
:0046FAB5 A1EC794700              mov eax, dword ptr [004779EC]
:0046FABA E84544F9FF              call 00403F04                            -->这个CALL有点可疑,进入
:0046FABF 750A                    jne 0046FACB
:0046FAC1 C705F45E470001000000    mov dword ptr [00475EF4], 00000001        -->让475EF4为1

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046FABF(C)
|
:0046FACB A1E8794700              mov eax, dword ptr [004779E8]
:0046FAD0 E8B7C0FFFF              call 0046BB8C
:0046FAD5 48                      dec eax
:0046FAD6 7507                    jne 0046FADF
:0046FAD8 33C0                    xor eax, eax
:0046FADA A3F45E4700              mov dword ptr [00475EF4], eax

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046FAD6(C)
|
:0046FADF 833DF45E470000          cmp dword ptr [00475EF4], 00000000
:0046FAE6 0F8504010000            jne 0046FBF0                              -->跳往已注册版本
:0046FAEC E81BCFFFFF              call 0046CA0C
:0046FAF1 A3F85E4700              mov dword ptr [00475EF8], eax

* Possible StringData Ref from Code Obj ->"未注册版本只能使用30天,现在还剩"
                                  |
:0046FAF6 688CFF4600              push 0046FF8C
:0046FAFB 8D55C8                  lea edx, dword ptr [ebp-38]
:0046FAFE A1FC5E4700              mov eax, dword ptr [00475EFC]
:0046FB03 2B05F85E4700            sub eax, dword ptr [00475EF8]
:0046FB09 40                      inc eax
:0046FB0A E8D98CF9FF              call 004087E8
:0046FB0F FF75C8                  push [ebp-38]
:0046FB12 68B8FF4600              push 0046FFB8
:0046FB17 8D45CC                  lea eax, dword ptr [ebp-34]
:0046FB1A BA03000000              mov edx, 00000003
:0046FB1F E89043F9FF              call 00403EB4
:0046FB24 8B55CC                  mov edx, dword ptr [ebp-34]
:0046FB27 8B83D4030000            mov eax, dword ptr [ebx+000003D4]
:0046FB2D E832FEFBFF              call 0042F964
:0046FB32 8B15F85E4700            mov edx, dword ptr [00475EF8]
:0046FB38 8B83CC030000            mov eax, dword ptr [ebx+000003CC]
:0046FB3E E89DB1FEFF              call 0045ACE0
:0046FB43 A1FC5E4700              mov eax, dword ptr [00475EFC]
:0046FB48 83E80F                  sub eax, 0000000F
:0046FB4B 3B05F85E4700            cmp eax, dword ptr [00475EF8]
:0046FB51 7D50                    jge 0046FBA3
:0046FB53 6A40                    push 00000040

* Possible StringData Ref from Code Obj ->"注册信息"
                                  |
:0046FB55 68BCFF4600              push 0046FFBC

* Possible StringData Ref from Code Obj ->"软件试用期还剩"
                                  |
:0046FB5A 68D0FF4600              push 0046FFD0
:0046FB5F 8D55C0                  lea edx, dword ptr [ebp-40]
:0046FB62 A1FC5E4700              mov eax, dword ptr [00475EFC]
:0046FB67 40                      inc eax
:0046FB68 2B05F85E4700            sub eax, dword ptr [00475EF8]
:0046FB6E E8758CF9FF              call 004087E8
:0046FB73 FF75C0                  push [ebp-40]
:0046FB76 68B8FF4600              push 0046FFB8

* Possible StringData Ref from Code Obj ->",请赶快向美萍公司注册(0371-8749676)"
                                  |
:0046FB7B 68E8FF4600              push 0046FFE8
:0046FB80 8D45C4                  lea eax, dword ptr [ebp-3C]
:0046FB83 BA04000000              mov edx, 00000004
:0046FB88 E82743F9FF              call 00403EB4
:0046FB8D 8B45C4                  mov eax, dword ptr [ebp-3C]
:0046FB90 E82344F9FF              call 00403FB8
:0046FB95 50                      push eax
:0046FB96 8BC3                    mov eax, ebx
:0046FB98 E86F5EFCFF              call 00435A0C
:0046FB9D 50                      push eax

* Reference To: user32.MessageBoxA, Ord:0000h
                                  |
:0046FB9E E89D75F9FF              Call 00407140

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046FB51(C)
|
:0046FBA3 A1F85E4700              mov eax, dword ptr [00475EF8]
:0046FBA8 3B05FC5E4700            cmp eax, dword ptr [00475EFC]
:0046FBAE 7E40                    jle 0046FBF0

* Reference To: killporn.DllUnregisterServer, Ord:0000h
                                  |
:0046FBB0 E83BF2FFFF              Call 0046EDF0
:0046FBB5 BA04000000              mov edx, 00000004
:0046FBBA 8B83D0020000            mov eax, dword ptr [ebx+000002D0]
:0046FBC0 E8E3A3FBFF              call 00429FA8
:0046FBC5 8B83D0020000            mov eax, dword ptr [ebx+000002D0]
:0046FBCB E89CA3FBFF              call 00429F6C
:0046FBD0 8BD0                    mov edx, eax
:0046FBD2 8D4DBC                  lea ecx, dword ptr [ebp-44]
:0046FBD5 8BB3D8020000            mov esi, dword ptr [ebx+000002D8]
:0046FBDB 8B86FC010000            mov eax, dword ptr [esi+000001FC]
:0046FBE1 8B38                    mov edi, dword ptr [eax]
:0046FBE3 FF570C                  call [edi+0C]
:0046FBE6 8B55BC                  mov edx, dword ptr [ebp-44]
:0046FBE9 8BC6                    mov eax, esi
:0046FBEB E87436FEFF              call 00453264

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046FAE6(C), :0046FBAE(C)
|
:0046FBF0 833DF45E470001          cmp dword ptr [00475EF4], 00000001
:0046FBF7 0F8573010000            jne 0046FD70

* Possible StringData Ref from Code Obj ->"已注册版本"
                                  |
:0046FBFD BA14004700              mov edx, 00470014
:0046FC02 8B83A0030000            mov eax, dword ptr [ebx+000003A0]
:0046FC08 E857FDFBFF              call 0042F964
:0046FC0D 33D2                    xor edx, edx
:0046FC0F 8B83CC030000            mov eax, dword ptr [ebx+000003CC]
:0046FC15 E832FCFBFF              call 0042F84C
:0046FC1A 33D2                    xor edx, edx
:0046FC1C 8B83D4030000            mov eax, dword ptr [ebx+000003D4]
:0046FC22 E825FCFBFF              call 0042F84C
:0046FC27 8D45B8                  lea eax, dword ptr [ebp-48]
:0046FC2A E851CBFFFF              call 0046C780
:0046FC2F 8B55B8                  mov edx, dword ptr [ebp-48]

--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------

:00403F04 53                      push ebx
:00403F05 56                      push esi
:00403F06 57                      push edi
:00403F07 89C6                    mov esi, eax
:00403F09 89D7                    mov edi, edx
:00403F0B 39D0                    cmp eax, edx                            -->EDX为正确注册码
:00403F0D 0F848F000000            je 00403FA2
:00403F13 85F6                    test esi, esi
:00403F15 7468                    je 00403F7F
:00403F17 85FF                    test edi, edi
:00403F19 746B                    je 00403F86
:00403F1B 8B46FC                  mov eax, dword ptr [esi-04]
:00403F1E 8B57FC                  mov edx, dword ptr [edi-04]
:00403F21 29D0                    sub eax, edx
:00403F23 7702                    ja 00403F27
:00403F25 01C2                    add edx, eax



好像此软件序列号必须为8位
以下是CRACKCODE2000的注册器
[Options]
CommandLine=shield.exe
Mode=2
First_Break_Address=46FABA
First_Break_Address_Code=E8
First_Break_Address_Code_Lenth=5
Second_Break_Address=403F0B
Second_Break_Address_Code_Lenth=2
Save_Code_Address=EDX





    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程