新CrackMe160之008 - Afkayas.1
与旧版002一样
使用VB Decompiler反编译可得按钮源码:
Private Sub OK_Click() '402310
Dim var_24 As TextBox
Dim var_B0 As TextBox
loc_0040237A: var_C0 = CrackMe.RegSerial 'Ignore this
loc_00402387: Set var_2C = CrackMe.RegSerial
loc_00402394: var_B0 = var_2C
loc_0040239A: var_C4 = CrackMe.Text1 'Ignore this
loc_004023A7: Set var_24 = var_2C
loc_004023B6: var_18 = Text1.Text
loc_004023D3: call var_C4(Me, Me, Me, edi, Me, var_24)
loc_004023ED: var_1C = Text1.Text
loc_00402420: Len(var_1C) = Len(var_1C) * 97531 //长度*97531
loc_00402436: Len(var_1C) = Len(var_1C) + Asc(var_18) //结果再+第一位
loc_0040243F: call var_4040E0(Len(var_1C))
loc_0040244A: var_20 = var_4040E0(Len(var_1C))
loc_00402458: Text1.Text = var_20
loc_004024C1: var_18 = Serial.Text
loc_004024DE: call var_C0(Me, Me)
loc_004024F4: var_1C = Serial.Text
loc_00402530: var_20 = "AKA-" & var_1C //在前面再拼接"AKA-"
loc_0040254A: esi = (var_18 = var_20) + 1
loc_0040258B: If (var_18 = var_20) + 1 = 0 Then GoTo loc_004025E5
loc_004025AB: var_34 = "You Get It" & "vbCrLf" & "KeyGen It Now"
loc_004025E3: GoTo loc_0040263B
loc_004025E5: 'Referenced from: 0040258B
loc_00402600: var_34 = "You Get Wrong" & "vbCrLf" & "Try Again"
loc_0040263B: 'Referenced from: 004025E3
loc_00402652: GoTo loc_0040269E
loc_0040269D: Exit Sub
loc_0040269E: 'Referenced from: 00402652
loc_0040269E: Exit Sub
End Sub
用户名: abcde
系列号: "AKA-" & (5 * 97531 + 97) = AKA-487752
使用的工具连接(工具有点多有点大,可以先下OD,其它的后面慢慢下) 点击前往下载
下面是我的OD的界面布局,我觉得这4个是最常用的界面,其它的我基本上没用到~