当前位置: 代码迷 >> 汇编语言 >> 大家帮忙忙看看这段汇编代码是怎么加密密码的?
  详细解决方案

大家帮忙忙看看这段汇编代码是怎么加密密码的?

热度:1404   发布时间:2013-02-26 00:00:00.0
大家帮忙忙看看这段汇编代码是如何加密密码的??
代码 如下 可能有点长 
00401190 . 6A FF push -1
00401192 . 68 D0464000 push 004046D0 ; SE 处理程序安装
00401197 . 64:A1 0000000>mov eax, dword ptr fs:[0]
0040119D . 50 push eax
0040119E . 64:8925 00000>mov dword ptr fs:[0], esp
004011A5 . 83EC 0C sub esp, 0C
004011A8 . 53 push ebx
004011A9 . 55 push ebp
004011AA . 8BE9 mov ebp, ecx
004011AC . 56 push esi
004011AD . 57 push edi
004011AE . 68 C0744000 push 004074C0
004011B3 . 8D8D AC000000 lea ecx, dword ptr [ebp+AC]
004011B9 . E8 30300000 call <jmp.&MFC42.#860_CString::operat>
004011BE . 6A 00 push 0
004011C0 . 8BCD mov ecx, ebp
004011C2 . E8 6F300000 call <jmp.&MFC42.#6334_CWnd::UpdateDa>
004011C7 . 8B4424 2C mov eax, dword ptr [esp+2C]
004011CB . 8B4D 20 mov ecx, dword ptr [ebp+20]
004011CE . 50 push eax ; /TimerID
004011CF . 51 push ecx ; |hWnd
004011D0 . FF15 F4524000 call dword ptr [<&USER32.KillTimer>] ; \KillTimer
004011D6 . 8B85 A8000000 mov eax, dword ptr [ebp+A8]
004011DC . 8D8D A8000000 lea ecx, dword ptr [ebp+A8]
004011E2 . 33D2 xor edx, edx
004011E4 . 895424 14 mov dword ptr [esp+14], edx
004011E8 . 895424 18 mov dword ptr [esp+18], edx
004011EC . 8B40 F8 mov eax, dword ptr [eax-8]
004011EF . 83F8 08 cmp eax, 8
004011F2 . 8BD8 mov ebx, eax
004011F4 . 7C 05 jl short 004011FB
004011F6 . BB 08000000 mov ebx, 8
004011FB > 50 push eax
004011FC . E8 2F300000 call <jmp.&MFC42.#2915_CString::GetBu>
00401201 . 8BCB mov ecx, ebx
00401203 . 8BF0 mov esi, eax
00401205 . 8BD1 mov edx, ecx
00401207 . 8D7C24 14 lea edi, dword ptr [esp+14]
0040120B . C1E9 02 shr ecx, 2
0040120E . F3:A5 rep movs dword ptr es:[edi], dword p>
00401210 . 8BCA mov ecx, edx
00401212 . 8D4424 14 lea eax, dword ptr [esp+14]
00401216 . 83E1 03 and ecx, 3
00401219 . 50 push eax
0040121A . F3:A4 rep movs byte ptr es:[edi], byte ptr>
0040121C . E8 2F2E0000 call 00404050
00401221 . 83C4 04 add esp, 4
00401224 . B9 02000000 mov ecx, 2
00401229 . 8D7D 60 lea edi, dword ptr [ebp+60]
0040122C . 8D7424 14 lea esi, dword ptr [esp+14]
00401230 . 33D2 xor edx, edx
00401232 . F3:A7 repe cmps dword ptr es:[edi], dword p>
00401234 . 75 0C jnz short 00401242
00401236 . 8BCD mov ecx, ebp
00401238 . E8 ED2F0000 call <jmp.&MFC42.#4853_CDialog::OnOK>
0040123D . E9 BA000000 jmp 004012FC
00401242 > 8D4C24 10 lea ecx, dword ptr [esp+10]
00401246 . E8 A92F0000 call <jmp.&MFC42.#540_CString::CStrin>
0040124B . 8D4C24 2C lea ecx, dword ptr [esp+2C]
0040124F . C74424 24 000>mov dword ptr [esp+24], 0
00401257 . E8 982F0000 call <jmp.&MFC42.#540_CString::CStrin>
0040125C . 68 38EF0000 push 0EF38
00401261 . 8D4C24 14 lea ecx, dword ptr [esp+14]
00401265 . C64424 28 01 mov byte ptr [esp+28], 1
0040126A . E8 B52F0000 call <jmp.&MFC42.#4160_CString::LoadS>
0040126F . 6A 69 push 69
00401271 . 8D4C24 30 lea ecx, dword ptr [esp+30]
  相关解决方案