新CrackMe160之008 - Afkayas.1

与旧版002一样

使用VB Decompiler反编译可得按钮源码:

Private Sub OK_Click() '402310
  Dim var_24 As TextBox
  Dim var_B0 As TextBox
  loc_0040237A: var_C0 = CrackMe.RegSerial 'Ignore this
  loc_00402387: Set var_2C = CrackMe.RegSerial
  loc_00402394: var_B0 = var_2C
  loc_0040239A: var_C4 = CrackMe.Text1 'Ignore this
  loc_004023A7: Set var_24 = var_2C
  loc_004023B6: var_18 = Text1.Text
  loc_004023D3: call var_C4(Me, Me, Me, edi, Me, var_24)
  loc_004023ED: var_1C = Text1.Text
  loc_00402420: Len(var_1C) = Len(var_1C) * 97531             //长度*97531
  loc_00402436: Len(var_1C) = Len(var_1C) + Asc(var_18)       //结果再+第一位
  loc_0040243F: call var_4040E0(Len(var_1C))
  loc_0040244A: var_20 = var_4040E0(Len(var_1C))
  loc_00402458: Text1.Text = var_20
  loc_004024C1: var_18 = Serial.Text
  loc_004024DE: call var_C0(Me, Me)
  loc_004024F4: var_1C = Serial.Text
  loc_00402530: var_20 = "AKA-" & var_1C                      //在前面再拼接"AKA-"
  loc_0040254A: esi = (var_18 = var_20) + 1
  loc_0040258B: If (var_18 = var_20) + 1 = 0 Then GoTo loc_004025E5
  loc_004025AB: var_34 = "You Get It" & "vbCrLf" & "KeyGen It Now"
  loc_004025E3: GoTo loc_0040263B
  loc_004025E5: 'Referenced from: 0040258B
  loc_00402600: var_34 = "You Get Wrong" & "vbCrLf" & "Try Again"
  loc_0040263B: 'Referenced from: 004025E3
  loc_00402652: GoTo loc_0040269E
  loc_0040269D: Exit Sub
  loc_0040269E: 'Referenced from: 00402652
  loc_0040269E: Exit Sub
End Sub

用户名: abcde
系列号: "AKA-" & (5 * 97531 + 97) = AKA-487752

 
 
本节高手录制的视频,点击前往查看

 
 
 

使用的工具连接(工具有点多有点大,可以先下OD,其它的后面慢慢下) 点击前往下载

下面是我的OD的界面布局,我觉得这4个是最常用的界面,其它的我基本上没用到~
OD界面布局

posted @ 2024-12-09 17:15  hankerstudio  阅读(1)  评论(0)    收藏  举报