📄 crack31.txt
字号:
00412C1C: 83C604 add esi,00000004
00412C1F: 83E904 sub ecx,00000004
00412C22: 75DF jnz 00412C03
00412C24: 61 popad
00412C25: C3 ret
---------------------显示NAG窗口------------------------
00412C26: B865B74000 mov eax,0040B765
00412C2B: 03C5 add eax,ebp <--413418
*************************************
欢迎你使用幻影 1.5 beta2,
幻影v1.5是共享软件,如果你喜欢它,希望你注册。
E-mail : ding-boy@netease.com
Homepage : http://fsdb.yeah.net
**************************************
00412C2D: 50 push eax
00412C2E: FF95C0BC4000 call dword ptr [ebp+0040BCC0] <--ShowTryWindow
00412C34: C3 ret
---------------------------
----------------查寻注册键,找到则进行还原并且返回1,否则返回0-----------
00412C35: 60 pushad
00412C36: 66C7855EB140000000 mov word ptr [ebp+0040B15E],0000 <--412E11
00412C3F: B848B14000 mov eax,0040B148
00412C44: 03C5 add eax,ebp <--412DFB
00412C46: BB40B14000 mov ebx,0040B140
00412C4B: 03DD add ebx,ebp <--412DF3
00412C4D: B91EB14000 mov ecx,0040B11E
00412C52: 03CD add ecx,ebp <--412DD1
*********************
wrifile\shell\open\command\config
**********************
00412C54: 50 push eax
00412C55: 53 push ebx
00412C56: 683F001F00 push 001F003F
00412C5B: 6A00 push 00000000
00412C5D: 6A00 push 00000000
00412C5F: 6A00 push 00000000
00412C61: 6A00 push 00000000
00412C63: 51 push ecx
00412C64: 6800000080 push 80000000
00412C69: FF9576BC4000 call dword ptr [ebp+0040BC76] <--RegCreateKeyA
00412C6F: 663D0000 cmp ax,0000
00412C73: 7566 jnz 00412CDB
00412C75: BE1AB14000 mov esi,0040B11A
00412C7A: 03F5 add esi,ebp <--412DCD
00412C7C: BF16B14000 mov edi,0040B116
00412C81: 03FD add edi,ebp <--
00412C83: B860B14000 mov eax,0040B160
00412C88: 03C5 add eax,ebp <--412E13
00412C8A: BB50B14000 mov ebx,0040B150
00412C8F: 03DD add ebx,ebp <--412E03
********************
91 80 88 80 B8 80 99 80 EE 82
********************
00412C91: 8B8D40B14000 mov ecx,dword ptr [ebp+0040B140]
00412C97: 56 push esi <--412DCD "="
00412C98: 50 push eax <--412E13
00412C99: 57 push edi
00412C9A: 6A00 push 00000000
00412C9C: 53 push ebx
00412C9D: 51 push ecx
00412C9E: FF957EBC4000 call dword ptr [ebp+0040BC7E] <--RegQueryValueEx
00412CA4: 663D0000 cmp ax,0000
00412CA8: 7531 jnz 00412CDB
00412CAA: 66C7855EB140000100 mov word ptr [ebp+0040B15E],0001 <--412E11
00412CB3: 668B8567B44000 mov ax,word ptr [ebp+0040B467] <--41311A
********************
EE 82
********************
00412CBA: 8AE0 mov ah,al
00412CBC: BE60B14000 mov esi,0040B160
00412CC1: 03F5 add esi,ebp <--412DE13
************-------------------关键的还原-------------*************
00412CC3: B93D000000 mov ecx,0000003D
00412CC8: 51 push ecx
00412CC9: 8A06 mov al,byte ptr [esi]
00412CCB: 3C00 cmp al,00
00412CCD: 7402 jz 00412CD1
00412CCF: 32C4 xor al,ah
00412CD1: B104 mov cl,04
00412CD3: D2C8 ror al,cl
00412CD5: 8806 mov byte ptr [esi],al
00412CD7: 46 inc esi
00412CD8: 59 pop ecx
00412CD9: E2ED loop 00412CC8
***************-----------------------------------*******************
00412CDB: 8B8540B14000 mov eax,dword ptr [ebp+0040B140]
00412CE1: 50 push eax
00412CE2: FF957ABC4000 call dword ptr [ebp+0040BC7A] <--RegCloseKeyA
00412CE8: 61 popad
00412CE9: 668B855EB14000 mov ax,word ptr [ebp+0040B15E]
00412CF0: C3 ret
----------------------------------------------------------------
-------------------------保存注册信息到注册表--------------------------------
00412CF1: 60 pushad
00412CF2: 66C7855EB140000000 mov word ptr [ebp+0040B15E],0000
00412CFB: B848B14000 mov eax,0040B148
00412D00: 03C5 add eax,ebp
00412D02: BB40B14000 mov ebx,0040B140
00412D07: 03DD add ebx,ebp
00412D09: B91EB14000 mov ecx,0040B11E
00412D0E: 03CD add ecx,ebp <--412DD1
00412D10: 50 push eax
00412D11: 53 push ebx
00412D12: 683F001F00 push 001F003F
00412D17: 6A00 push 00000000
00412D19: 6A00 push 00000000
00412D1B: 6A00 push 00000000
00412D1D: 6A00 push 00000000
00412D1F: 51 push ecx <--412DD1
*****************
wrifile\shell\open\command\config
**************************
00412D20: 6800000080 push 80000000
00412D25: FF9576BC4000 call dword ptr [ebp+0040BC76] <--RegCreateKeyA
00412D2B: 663D0000 cmp ax,0000
00412D2F: 755A jnz 00412D8B
00412D31: 668B8567B44000 mov ax,word ptr [ebp+0040B467] <--41311A
********************
EE 82
********************
00412D38: 8AE0 mov ah,al
00412D3A: BE60B14000 mov esi,0040B160
00412D3F: 03F5 add esi,ebp
00412D41: B93D000000 mov ecx,0000003D
00412D46: 51 push ecx
00412D47: 8A06 mov al,byte ptr [esi]
00412D49: B104 mov cl,04
00412D4B: D2C0 rol al,cl
00412D4D: 3C00 cmp al,00
00412D4F: 7402 jz 00412D53
00412D51: 32C4 xor al,ah
00412D53: 8806 mov byte ptr [esi],al
00412D55: 46 inc esi
00412D56: 59 pop ecx
00412D57: E2ED loop 00412D46
00412D59: B860B14000 mov eax,0040B160
00412D5E: 03C5 add eax,ebp <--412DE13
00412D60: BB50B14000 mov ebx,0040B150
00412D65: 03DD add ebx,ebp <--412DE03
********************
91 80 88 80 B8 80 99 80 EE 82
********************
00412D67: 8B8D40B14000 mov ecx,dword ptr [ebp+0040B140]
00412D6D: 6A3D push 0000003D
00412D6F: 50 push eax
00412D70: 6A03 push 00000003
00412D72: 6A00 push 00000000
00412D74: 53 push ebx
00412D75: 51 push ecx
00412D76: FF9582BC4000 call dword ptr [ebp+0040BC82] <--RegSetValueExA
00412D7C: 663D0000 cmp ax,0000
00412D80: 7509 jnz 00412D8B
00412D82: 66C7855EB140000100 mov word ptr [ebp+0040B15E],0001
00412D8B: 8B8540B14000 mov eax,dword ptr [ebp+0040B140]
00412D91: 50 push eax
00412D92: FF957ABC4000 call dword ptr [ebp+0040BC7A] <--RegCloseKeyA
00412D98: 668B8567B44000 mov ax,word ptr [ebp+0040B467] <--41311A
********************
EE 82
********************
00412D9F: 8AE0 mov ah,al
00412DA1: BE60B14000 mov esi,0040B160
00412DA6: 03F5 add esi,ebp <--412DE13
00412DA8: B93D000000 mov ecx,0000003D
00412DAD: 51 push ecx
00412DAE: 8A06 mov al,byte ptr [esi]
00412DB0: 3C00 cmp al,00
00412DB2: 7402 jz 00412DB6
00412DB4: 32C4 xor al,ah
00412DB6: B104 mov cl,04
00412DB8: D2C8 ror al,cl
00412DBA: 8806 mov byte ptr [esi],al
00412DBC: 46 inc esi
00412DBD: 59 pop ecx
00412DBE: E2ED loop 00412DAD
00412DC0: 61 popad
00412DC1: 668B855EB14000 mov ax,word ptr [ebp+0040B15E]
00412DC8: C3 ret
**************************************************************
-------------------------------非代码区----------------------------
00412DC9: 0300 add eax,dword ptr [eax]
00412DCB: 0000 add byte ptr [eax],al
00412DCD: 3D00000077 cmp eax,77000000
00412DD2: 7269 jb 00412E3D
00412DD4: 66696C655C7368 imul bp,word ptr [ebp+5C],6873
00412DDB: 656C insb es:[edi],dx
00412DDD: 6C insb es:[edi],dx
00412DDE: 5C pop esp
00412DDF: 6F outsd dx,ds:[esi]
00412DE0: 7065 jo 00412E47
00412DE2: 6E outsb dx,ds:[esi]
00412DE3: 5C pop esp
00412DE4: 636F6D arpl word ptr [edi+6D],bp
00412DE7: 6D insd es:[edi],dx
00412DE8: 61 popad
00412DE9: 6E outsb dx,ds:[esi]
00412DEA: 645C pop esp
00412DEC: 636F6E arpl word ptr [edi+6E],bp
00412DEF: 666967000000 imul sp,word ptr [edi],0000
00412DF5: 0000 add byte ptr [eax],al
00412DF7: 0000 add byte ptr [eax],al
00412DF9: 0000 add byte ptr [eax],al
00412DFB: 0000 add byte ptr [eax],al
00412DFD: 0000 add byte ptr [eax],al
00412DFF: 0000 add byte ptr [eax],al
00412E01: 0000 add byte ptr [eax],al
00412E03: 91 xchg eax,ecx
00412E04: 808880B8809980 or byte ptr [eax-667F4780],80
00412E0B: EE out dx,al
00412E0C: 820000 add byte ptr [eax],00
00412E0F: 0000 add byte ptr [eax],al
00412E11: 0000 add byte ptr [eax],al
00412E13: 0000 add byte ptr [eax],al
00412E15: 0000 add byte ptr [eax],al
00412E17: 0000 add byte ptr [eax],al
00412E19: 0000 add byte ptr [eax],al
00412E1B: 0000 add byte ptr [eax],al
00412E1D: 0000 add byte ptr [eax],al
00412E1F: 0000 add byte ptr [eax],al
00412E21: 0000 add byte ptr [eax],al
00412E23: 0000 add byte ptr [eax]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -