文章导航PC6首页软件下载单机游戏安卓资源苹果资源

pc软件新闻网络操作系统办公工具编程服务器软件评测

安卓新闻资讯应用教程刷机教程安卓游戏攻略tv资讯深度阅读综合安卓评测

苹果ios资讯苹果手机越狱备份教程美化教程ios软件教程mac教程

单机游戏角色扮演即时战略动作射击棋牌游戏体育竞技模拟经营其它游戏游戏工具

网游cf活动dnf活动lol周免英雄lol礼包

手游最新动态手游评测手游活动新游预告手游问答

您的位置:首页精文荟萃破解文章 → 豪杰大眼睛II算法分析

豪杰大眼睛II算法分析

时间:2004/10/15 0:57:00来源:本站整理作者:蓝点我要评论(0)

 这几天比较无聊,找了个豪杰大眼睛II,发现它的注册的算法基本与豪杰超级解霸3000英雄版的算法很相似,第一组的注册码是一样的,从第二组开始的变化稍有不同,以下是它的算法的分析过程。

* Reference To: USER32.GetWindowTextA, Ord:015Eh
|
:00401CCA 8B35F8604000 mov esi, dword ptr [004060F8]
:00401CD0 8D442404 lea eax, dword ptr [esp+04]
:00401CD4 6A08 push 00000008
:00401CD6 50 push eax
:00401CD7 51 push ecx
:00401CD8 FFD6 call esi
:00401CDA A128984000 mov eax, dword ptr [00409828]
:00401CDF 8D542409 lea edx, dword ptr [esp+09]
:00401CE3 6A08 push 00000008
:00401CE5 52 push edx
:00401CE6 50 push eax
:00401CE7 FFD6 call esi
:00401CE9 8B1534984000 mov edx, dword ptr [00409834]
:00401CEF 8D4C240E lea ecx, dword ptr [esp+0E]
:00401CF3 6A08 push 00000008
:00401CF5 51 push ecx
:00401CF6 52 push edx
:00401CF7 FFD6 call esi
:00401CF9 8B0D30984000 mov ecx, dword ptr [00409830]
:00401CFF 8D442413 lea eax, dword ptr [esp+13]
:00401D03 6A08 push 00000008
:00401D05 50 push eax
:00401D06 51 push ecx
:00401D07 FFD6 call esi
:00401D09 8B1524984000 mov edx, dword ptr [00409824]
:00401D0F 6800010000 push 00000100
:00401D14 B02D mov al, 2D
:00401D16 6860994000 push 00409960
:00401D1B 52 push edx
:00401D1C 8844241E mov byte ptr [esp+1E], al
:00401D20 88442419 mov byte ptr [esp+19], al
:00401D24 88442414 mov byte ptr [esp+14], al
:00401D28 C644242300 mov [esp+23], 00
:00401D2D FFD6 call esi
:00401D2F 8D442404 lea eax, dword ptr [esp+04]
:00401D33 50 push eax
:00401D34 6860994000 push 00409960 <----经过动态跟踪,发现409960处存放的是输入的用户名
:00401D39 E842090000 call 00402680 <----进行注册码比较的关键CALL,要用F8跟入
:00401D3E F7D8 neg eax <---- 如果返回值为0,则注册失败
:00401D40 1BC0 sbb eax, eax
:00401D42 8D4C2404 lea ecx, dword ptr [esp+04]
:00401D46 F7D8 neg eax
:00401D48 51 push ecx
:00401D49 6860994000 push 00409960
:00401D4E A3689A4000 mov dword ptr [00409A68], eax<----将EAX的值写入[409A68]
:00401D53 E838000000 call 00401D90 <----此CALL将用户名与注册码写入注册表
:00401D58 8B442450 mov eax, dword ptr [esp+50]
:00401D5C 8B0D44994000 mov ecx, dword ptr [00409944]
:00401D62 83C408 add esp, 00000008
:00401D65 8D542404 lea edx, dword ptr [esp+04]
:00401D69 52 push edx
:00401D6A 68201C4000 push 00401C20
:00401D6F 50 push eax

* Possible Reference to Dialog: DialogID_0069
|
:00401D70 6A69 push 00000069
:00401D72 51 push ecx

* Reference To: USER32.DialogBoxParamA, Ord:0093h
|
:00401D73 FF15E8604000 Call dword ptr [004060E8]<----如果[409A68]为0,显示注册失败,为1时显示注册成功
:00401D79 A1689A4000 mov eax, dword ptr [00409A68]
:00401D7E 5E pop esi
:00401D7F 83C440 add esp, 00000040
:00401D82 C3 ret


---------------------按F8进入注册码比较的关键CALL----------------------
:00402680 83EC20 sub esp, 00000020
:00402683 56 push esi
:00402684 57 push edi
:00402685 B908000000 mov ecx, 00000008
:0040268A 33C0 xor eax, eax
:0040268C 8D7C2408 lea edi, dword ptr [esp+08]<----存放第一组注册码的地址,以下记为reg1
:00402690 F3 repz
:00402691 AB stosd
:00402692 8B44242C mov eax, dword ptr [esp+2C]
:00402696 50 push eax<----将用户名作为参数,压栈。
:00402697 E8A4010000 call 00402840 <----此CALL将用户名进入变换后,变为一个DWORD类型,从EAX中返回,它内部的算法与XXXX3000英雄版完全相同,这里不再详细说明,可以参考XXXX3000英雄版的分析
:0040269C 83C404 add esp, 00000004
:0040269F 89442408 mov dword ptr [esp+08], eax 将返回值存入reg1
:004026A3 33F6 xor esi, esi

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004026C8(C)
|
:004026A5 0FBE443408 movsx eax, byte ptr [esp+esi+08] 取出reg1中的一个字节。(共4字节)
:004026AA 83F841 cmp eax, 00000041
:004026AD 7C08 jl 004026B7
:004026AF 83F85A cmp eax, 0000005A
:004026B2 7F03 jg 004026B7
:004026B4 83C020 add eax, 00000020 <----这里是将大写的变为小写

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004026AD(C), :004026B2(C)
|
:004026B7 50 push eax
:004026B8 E853020000 call 00402910 <----此CALL将取出的值转换为一个字符。
:004026BD 83C404 add esp, 00000004
:004026C0 88443408 mov byte ptr [esp+esi+08], al <----将变换后的值再存入。
:004026C4 46 inc esi
:004026C5 83FE04 cmp esi, 00000004 <---四个字节是否处理完
:004026C8 7CDB jl 004026A5
:004026CA 8B7C2430 mov edi, dword ptr [esp+30]
:004026CE 8D4C2408 lea ecx, dword ptr [esp+08]
:004026D2 8BF7 mov esi, edi
:004026D4 33D2 xor edx, edx
:004026D6 2BF1 sub esi, ecx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004026FC(C)
|
:004026D8 8D4C1408 lea ecx, dword ptr [esp+edx+08]
:004026DC 0FBE040E movsx eax, byte ptr [esi+ecx]<----取出我们输入的第一组注册码的1个字节。
:004026E0 83F841 cmp eax, 00000041
:004026E3 7C08 jl 004026ED
:004026E5 83F85A cmp eax, 0000005A
:004026E8 7F03 jg 004026ED
:004026EA 83C020 add eax, 00000020 <----如果是大写则转为小写

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004026E3(C), :004026E8(C)
|
:004026ED 0FBE09 movsx ecx, byte ptr [ecx]<----取出真正注册码的1位
:004026F0 3BC1 cmp eax, ecx <----比较
:004026F2 0F8514010000 jne 0040280C
:004026F8 42 inc edx
:004026F9 83FA04 cmp edx, 00000004 <----第一组注册码共4位是否比较完毕。
:004026FC 7CDA jl 004026D8
:004026FE 8B442408 mov eax, dword ptr [esp+08]
:00402702 8D5008 lea edx, dword ptr [eax+08] 将reg1的值加上8后,作为第2组注册码
:00402705 0FAFD0 imul edx, eax
:00402708 8954240C mov dword ptr [esp+0C], edx<----此地址记为reg2 = (reg1+8)*reg1
:0040270C 33F6 xor esi, esi

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040272F(C)
|
:0040270E 8A44340C mov al, byte ptr [esp+esi+0C]<----取出第2组中的一个字节
:00402712 50 push eax
:00402713 56 push esi
:00402714 E807010000 call 00402820<----先进行一次变换
:00402719 25FF000000 and eax, 000000FF
:0040271E 50 push eax
:0040271F E8EC010000 call 00402910 <----将变换后的值再转变为字符形式
:00402724 83C40C add esp, 0000000C
:00402727 8844340C mov byte ptr [esp+esi+0C], al
:0040272B 46 inc esi
:0040272C 83FE04 cmp esi, 00000004 <----是否处理完4个字符
:0040272F 7CDD jl 0040270E
:00402731 33C9 xor ecx, ecx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00402756(C)
|
:00402733 0FBE440F05 movsx eax, byte ptr [edi+ecx+05]<----这里开始取出第2组进行比较
:00402738 83F841 cmp eax, 00000041
:0040273B 7C08 jl 00402745
:0040273D 83F85A cmp eax, 0000005A
:00402740 7F03 jg 00402745
:00402742 83C020 add eax, 00000020

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0040273B(C), :00402740(C)
|
:00402745 0FBE540C0C movsx edx, byte ptr [esp+ecx+0C]
:0040274A 3BC2 cmp eax, edx<----比较注册码
:0040274C 0F85BA000000 jne 0040280C
:00402752 41 inc ecx
:00402753 83F904 cmp ecx, 00000004
:00402756 7CDB jl 00402733
:00402758 8B44240C mov eax, dword ptr [esp+0C]
:0040275C 8B4C2408 mov ecx, dword ptr [esp+08]
:00402760 8BD0 mov edx, eax
:00402762 33D1 xor edx, ecx
:00402764 42 inc edx
:00402765 0FAFD1 imul edx, ecx
:00402768 03D0 add edx, eax
:0040276A 33F6 xor esi, esi
:0040276C 89542410 mov dword ptr [esp+10], edx<----第三组注册码 reg3 = reg2 +((reg1 ^ reg2)+1)*reg1

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00402786(C)
|
:00402770 0FBE443410 movsx eax, byte ptr [esp+esi+10]
:00402775 50 push eax
:00402776 E895010000 call 00402910<----将第三组转变为字符形式的注册码
:0040277B 83C404 add esp, 00000004
:0040277E 88443410 mov byte ptr [esp+esi+10], al
:00402782 46 inc esi
:00402783 83FE04 cmp esi, 00000004<---4个字节是否都完成了
:00402786 7CE8 jl 00402770
:00402788 33C9 xor ecx, ecx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004027A9(C)
|
:0040278A 0FBE440F0A movsx eax, byte ptr [edi+ecx+0A]<----这里开始比较第3组注册码
:0040278F 83F841 cmp eax, 00000041
:00402792 7C08 jl 0040279C
:00402794 83F85A cmp eax, 0000005A
:00402797 7F03 jg 0040279C
:00402799 83C020 add eax, 00000020

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00402792(C), :00402797(C)
|
:0040279C 0FBE540C10 movsx edx, byte ptr [esp+ecx+10]
:004027A1 3BC2 cmp eax, edx<----比较注册码
:004027A3 7567 jne 0040280C
:004027A5 41 inc ecx
:004027A6 83F904 cmp ecx, 00000004
:004027A9 7CDF jl 0040278A
:004027AB 8B4C240C mov ecx, dword ptr [esp+0C]
:004027AF 8B442408 mov eax, dword ptr [esp+08]
:004027B3 0FAFC8 imul ecx, eax
:004027B6 41 inc ecx
:004027B7 0FAF4C2410 imul ecx, dword ptr [esp+10]
:004027BC 03C8 add ecx, eax
:004027BE 33F6 xor esi, esi
:004027C0 894C2414 mov dword ptr [esp+14], ecx<----第四组注册码reg4 = reg1 +((reg2 * reg1)+1)*reg3

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004027DA(C)
|
:004027C4 0FBE543414 movsx edx, byte ptr [esp+esi+14]
:004027C9 52 push edx
:004027CA E841010000 call 00402910<----将第4组转变化字符形式的注册码
:004027CF 83C404 add esp, 00000004
:004027D2 88443414 mov byte ptr [esp+esi+14], al
:004027D6 46 inc esi
:004027D7 83FE04 cmp esi, 00000004
:004027DA 7CE8 jl 004027C4
:004027DC 33C9 xor ecx, ecx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004027FD(C)
|
:004027DE 0FBE440F0F movsx eax, byte ptr [edi+ecx+0F]<----这里开始比较第4组注册码
:004027E3 83F841 cmp eax, 00000041
:004027E6 7C08 jl 004027F0
:004027E8 83F85A cmp eax, 0000005A
:004027EB 7F03 jg 004027F0
:004027ED 83C020 add eax, 00000020

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004027E6(C), :004027EB(C)
|
:004027F0 0FBE540C14 movsx edx, byte ptr [esp+ecx+14]
:004027F5 3BC2 cmp eax, edx<----比较注册码
:004027F7 7513 jne 0040280C
:004027F9 41 inc ecx
:004027FA 83F904 cmp ecx, 00000004
:004027FD 7CDF jl 004027DE
:004027FF 5F pop edi

* Possible Reference to String Resource ID=00001: "Register Success"
|
:00402800 B801000000 mov eax, 00000001
:00402805 5E pop esi
:00402806 83C420 add esp, 00000020
:00402809 C20800 ret 0008




----------------此CALL是将EAX的值转化为一个字符形式--------------
* Referenced by a CALL at Addresses:
|:004026B8 , :0040271F , :00402776 , :004027CA
|
:00402910 8B442404 mov eax, dword ptr [esp+04]

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00402932(U), :00402943(U), :0040295E(U)
|
:00402914 83E07F and eax, 0000007F<---取低7位的值
:00402917 83F841 cmp eax, 00000041
:0040291A 7C07 jl 00402923
:0040291C 83F85A cmp eax, 0000005A
:0040291F 7F02 jg 00402923
:00402921 0C20 or al, 20<----如果是大写字母,则转为小写

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0040291A(C), :0040291F(C)
|
:00402923 83F86F cmp eax, 0000006F<----如果是字母'o',不要它
:00402926 750C jne 00402934
:00402928 B890000000 mov eax, 00000090
:0040292D 83F00E xor eax, 0000000E
:00402930 0C31 or al, 31
:00402932 EBE0 jmp 00402914

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00402926(C)
|
:00402934 83F830 cmp eax, 00000030<----如果是字母'0',也不要它
:00402937 750C jne 00402945
:00402939 B8CF000000 mov eax, 000000CF
:0040293E 83F00E xor eax, 0000000E
:00402941 0C31 or al, 31
:00402943 EBCF jmp 00402914

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00402937(C)
|
:00402945 83F861 cmp eax, 00000061 <----如果已经是小写字母了,则返回
:00402948 7C05 jl 0040294F
:0040294A 83F87A cmp eax, 0000007A
:0040294D 7E11 jle 00402960

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00402948(C)
|
:0040294F 83F831 cmp eax, 00000031<---如果已经是数学了,则返回
:00402952 7C05 jl 00402959
:00402954 83F839 cmp eax, 00000039
:00402957 7E07 jle 00402960

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00402952(C)
|
:00402959 83F00E xor eax, 0000000E<----继续变化
:0040295C 0C31 or al, 31
:0040295E EBB4 jmp 00402914

-----------------------------------------------------------
注册机的代码与XXXX3000英雄版基本相同,只需要修改以下几处即可:
reg2 = (reg1+8)*reg1
reg3 = reg2 +((reg1 ^ reg2)+1)*reg1
reg4 = reg1 +((reg2 * reg1)+1)*reg3

    
    
     
    
    
     

相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么

文章评论
发表评论

热门文章 去除winrar注册框方法

最新文章 比特币病毒怎么破解 比去除winrar注册框方法 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据

人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程