⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 crack31.txt

📁 为所有对破解感兴趣的朋友准备的礼物。希望大家能够喜欢。
💻 TXT
📖 第 1 页 / 共 5 页
字号:
 00412C1C: 83C604                    add esi,00000004 

 00412C1F: 83E904                    sub ecx,00000004 

 00412C22: 75DF                      jnz 00412C03 

 00412C24: 61                        popad  

 00412C25: C3                        ret 





 ---------------------显示NAG窗口------------------------

 00412C26: B865B74000                mov eax,0040B765 

 00412C2B: 03C5                      add eax,ebp					<--413418

 *************************************

                  欢迎你使用幻影 1.5 beta2,



   幻影v1.5是共享软件,如果你喜欢它,希望你注册。 



                  



                   E-mail   : ding-boy@netease.com 

                   Homepage : http://fsdb.yeah.net             



**************************************

 00412C2D: 50                        push eax 

 00412C2E: FF95C0BC4000              call dword ptr [ebp+0040BCC0]	<--ShowTryWindow

 00412C34: C3                        ret 

---------------------------



 ----------------查寻注册键,找到则进行还原并且返回1,否则返回0-----------

 00412C35: 60                        pushad  

 00412C36: 66C7855EB140000000        mov word ptr [ebp+0040B15E],0000	<--412E11

 00412C3F: B848B14000                mov eax,0040B148 

 00412C44: 03C5                      add eax,ebp						<--412DFB

 00412C46: BB40B14000                mov ebx,0040B140 

 00412C4B: 03DD                      add ebx,ebp						<--412DF3

 00412C4D: B91EB14000                mov ecx,0040B11E 

 00412C52: 03CD                      add ecx,ebp						<--412DD1

 *********************

 wrifile\shell\open\command\config

**********************

 00412C54: 50                        push eax 

 00412C55: 53                        push ebx 

 00412C56: 683F001F00                push 001F003F 

 00412C5B: 6A00                      push 00000000 

 00412C5D: 6A00                      push 00000000 

 00412C5F: 6A00                      push 00000000 

 00412C61: 6A00                      push 00000000 

 00412C63: 51                        push ecx 

 00412C64: 6800000080                push 80000000 

 00412C69: FF9576BC4000              call dword ptr [ebp+0040BC76]		<--RegCreateKeyA

 00412C6F: 663D0000                  cmp ax,0000 

 00412C73: 7566                      jnz 00412CDB 



 00412C75: BE1AB14000                mov esi,0040B11A					

 00412C7A: 03F5                      add esi,ebp						<--412DCD

 00412C7C: BF16B14000                mov edi,0040B116 

 00412C81: 03FD                      add edi,ebp						<--

 00412C83: B860B14000                mov eax,0040B160 

 00412C88: 03C5                      add eax,ebp						<--412E13

 00412C8A: BB50B14000                mov ebx,0040B150 

 00412C8F: 03DD                      add ebx,ebp						<--412E03

 ********************

	91 80 88 80 B8 80 99 80 EE 82

 ********************

 00412C91: 8B8D40B14000              mov ecx,dword ptr [ebp+0040B140] 

 00412C97: 56                        push esi							<--412DCD "="

 00412C98: 50                        push eax							<--412E13 

 00412C99: 57                        push edi 

 00412C9A: 6A00                      push 00000000 

 00412C9C: 53                        push ebx 

 00412C9D: 51                        push ecx 

 00412C9E: FF957EBC4000              call dword ptr [ebp+0040BC7E]		<--RegQueryValueEx

 00412CA4: 663D0000                  cmp ax,0000 

 00412CA8: 7531                      jnz 00412CDB 

 00412CAA: 66C7855EB140000100        mov word ptr [ebp+0040B15E],0001	<--412E11

 00412CB3: 668B8567B44000            mov ax,word ptr [ebp+0040B467]		<--41311A

 ********************

	EE 82

 ********************

 00412CBA: 8AE0                      mov ah,al 

 00412CBC: BE60B14000                mov esi,0040B160 

 00412CC1: 03F5                      add esi,ebp						<--412DE13

 ************-------------------关键的还原-------------*************

 00412CC3: B93D000000                mov ecx,0000003D 

 00412CC8: 51                        push ecx 

 00412CC9: 8A06                      mov al,byte ptr [esi] 

 00412CCB: 3C00                      cmp al,00 

 00412CCD: 7402                      jz 00412CD1 

 00412CCF: 32C4                      xor al,ah 

 00412CD1: B104                      mov cl,04 

 00412CD3: D2C8                      ror al,cl 

 00412CD5: 8806                      mov byte ptr [esi],al 

 00412CD7: 46                        inc esi 

 00412CD8: 59                        pop ecx 

 00412CD9: E2ED                      loop 00412CC8 

***************-----------------------------------*******************

 00412CDB: 8B8540B14000              mov eax,dword ptr [ebp+0040B140] 

 00412CE1: 50                        push eax 

 00412CE2: FF957ABC4000              call dword ptr [ebp+0040BC7A]		<--RegCloseKeyA

 00412CE8: 61                        popad  

 00412CE9: 668B855EB14000            mov ax,word ptr [ebp+0040B15E] 

 00412CF0: C3                        ret 

----------------------------------------------------------------



-------------------------保存注册信息到注册表--------------------------------

 00412CF1: 60                        pushad  

 00412CF2: 66C7855EB140000000        mov word ptr [ebp+0040B15E],0000 

 00412CFB: B848B14000                mov eax,0040B148 

 00412D00: 03C5                      add eax,ebp 

 00412D02: BB40B14000                mov ebx,0040B140 

 00412D07: 03DD                      add ebx,ebp 

 00412D09: B91EB14000                mov ecx,0040B11E 

 00412D0E: 03CD                      add ecx,ebp						<--412DD1

 00412D10: 50                        push eax 

 00412D11: 53                        push ebx 

 00412D12: 683F001F00                push 001F003F 

 00412D17: 6A00                      push 00000000 

 00412D19: 6A00                      push 00000000 

 00412D1B: 6A00                      push 00000000 

 00412D1D: 6A00                      push 00000000 

 00412D1F: 51                        push ecx							<--412DD1

 *****************

 wrifile\shell\open\command\config

**************************

 00412D20: 6800000080                push 80000000 

 00412D25: FF9576BC4000              call dword ptr [ebp+0040BC76]		<--RegCreateKeyA

 00412D2B: 663D0000                  cmp ax,0000 

 00412D2F: 755A                      jnz 00412D8B 

 00412D31: 668B8567B44000            mov ax,word ptr [ebp+0040B467]		<--41311A

 ********************

	EE 82

 ********************

 00412D38: 8AE0                      mov ah,al 

 00412D3A: BE60B14000                mov esi,0040B160 

 00412D3F: 03F5                      add esi,ebp 

 00412D41: B93D000000                mov ecx,0000003D 

 00412D46: 51                        push ecx 

 00412D47: 8A06                      mov al,byte ptr [esi] 

 00412D49: B104                      mov cl,04 

 00412D4B: D2C0                      rol al,cl 

 00412D4D: 3C00                      cmp al,00 

 00412D4F: 7402                      jz 00412D53 

 00412D51: 32C4                      xor al,ah 

 00412D53: 8806                      mov byte ptr [esi],al 

 00412D55: 46                        inc esi 

 00412D56: 59                        pop ecx 

 00412D57: E2ED                      loop 00412D46 



 00412D59: B860B14000                mov eax,0040B160					

 00412D5E: 03C5                      add eax,ebp						<--412DE13

 00412D60: BB50B14000                mov ebx,0040B150 

 00412D65: 03DD                      add ebx,ebp						<--412DE03

 ********************

	91 80 88 80 B8 80 99 80 EE 82

 ********************

 00412D67: 8B8D40B14000              mov ecx,dword ptr [ebp+0040B140] 

 00412D6D: 6A3D                      push 0000003D 

 00412D6F: 50                        push eax 

 00412D70: 6A03                      push 00000003 

 00412D72: 6A00                      push 00000000 

 00412D74: 53                        push ebx 

 00412D75: 51                        push ecx 

 00412D76: FF9582BC4000              call dword ptr [ebp+0040BC82]		<--RegSetValueExA

 00412D7C: 663D0000                  cmp ax,0000 

 00412D80: 7509                      jnz 00412D8B 

 00412D82: 66C7855EB140000100        mov word ptr [ebp+0040B15E],0001 



 00412D8B: 8B8540B14000              mov eax,dword ptr [ebp+0040B140] 

 00412D91: 50                        push eax 

 00412D92: FF957ABC4000              call dword ptr [ebp+0040BC7A]		<--RegCloseKeyA

 00412D98: 668B8567B44000            mov ax,word ptr [ebp+0040B467]		<--41311A

 ********************

	EE 82

 ********************

 00412D9F: 8AE0                      mov ah,al 

 00412DA1: BE60B14000                mov esi,0040B160 

 00412DA6: 03F5                      add esi,ebp						<--412DE13

 00412DA8: B93D000000                mov ecx,0000003D 

 00412DAD: 51                        push ecx 

 00412DAE: 8A06                      mov al,byte ptr [esi] 

 00412DB0: 3C00                      cmp al,00 

 00412DB2: 7402                      jz 00412DB6 

 00412DB4: 32C4                      xor al,ah 

 00412DB6: B104                      mov cl,04 

 00412DB8: D2C8                      ror al,cl 

 00412DBA: 8806                      mov byte ptr [esi],al 

 00412DBC: 46                        inc esi 

 00412DBD: 59                        pop ecx 

 00412DBE: E2ED                      loop 00412DAD 

 00412DC0: 61                        popad  

 00412DC1: 668B855EB14000            mov ax,word ptr [ebp+0040B15E] 

 00412DC8: C3                        ret 

**************************************************************



-------------------------------非代码区----------------------------

 00412DC9: 0300                      add eax,dword ptr [eax] 

 00412DCB: 0000                      add byte ptr [eax],al 

 00412DCD: 3D00000077                cmp eax,77000000 

 00412DD2: 7269                      jb 00412E3D 

 00412DD4: 66696C655C7368            imul bp,word ptr [ebp+5C],6873 

 00412DDB: 656C                      insb es:[edi],dx 

 00412DDD: 6C                        insb es:[edi],dx 

 00412DDE: 5C                        pop esp 

 00412DDF: 6F                        outsd dx,ds:[esi] 

 00412DE0: 7065                      jo 00412E47 

 00412DE2: 6E                        outsb dx,ds:[esi] 

 00412DE3: 5C                        pop esp 

 00412DE4: 636F6D                    arpl word ptr [edi+6D],bp 

 00412DE7: 6D                        insd es:[edi],dx 

 00412DE8: 61                        popad  

 00412DE9: 6E                        outsb dx,ds:[esi] 

 00412DEA: 645C                      pop esp 

 00412DEC: 636F6E                    arpl word ptr [edi+6E],bp 

 00412DEF: 666967000000              imul sp,word ptr [edi],0000 

 00412DF5: 0000                      add byte ptr [eax],al 

 00412DF7: 0000                      add byte ptr [eax],al 

 00412DF9: 0000                      add byte ptr [eax],al 

 00412DFB: 0000                      add byte ptr [eax],al 

 00412DFD: 0000                      add byte ptr [eax],al 

 00412DFF: 0000                      add byte ptr [eax],al 

 00412E01: 0000                      add byte ptr [eax],al 

 00412E03: 91                        xchg eax,ecx 

 00412E04: 808880B8809980            or byte ptr [eax-667F4780],80 

 00412E0B: EE                        out dx,al 

 00412E0C: 820000                    add byte ptr [eax],00 

 00412E0F: 0000                      add byte ptr [eax],al 

 00412E11: 0000                      add byte ptr [eax],al 

 00412E13: 0000                      add byte ptr [eax],al 

 00412E15: 0000                      add byte ptr [eax],al 

 00412E17: 0000                      add byte ptr [eax],al 

 00412E19: 0000                      add byte ptr [eax],al 

 00412E1B: 0000                      add byte ptr [eax],al 

 00412E1D: 0000                      add byte ptr [eax],al 

 00412E1F: 0000                      add byte ptr [eax],al 

 00412E21: 0000                      add byte ptr [eax],al 

 00412E23: 0000                      add byte ptr [eax]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -