Author: wangweilll
These times have been playing CrackMe learning algorithm analysis ~, Today, I am looking for a foreign software to analyze analysis algorithms.
I am not looking for any software in our country ~~~~!!!!!!!!!!!!!
Because software writing is a great deal of effort ~~, It is not good to publish their algorithms ~~~
Let's talk about the analysis.
My username is: wangwei
The false code I entered is: 123456789
00546FC3 51 push ecx
00546FC4 53 push ebx
00546FC5 56 push esi
00546FC6 57 push edi
00546FC7 8945 FC mov dword ptr ss: [ebp-4], eax
00546FCA 33C0 xor eax, eax
00546FCC 55 push ebp
00546FCD 68 A6755400 push iovsoft _. 005475A6
00546FD2 64: FF30 push dword ptr fs: [eax]
00546FD5 64: 8920 mov dword ptr fs: [eax], esp
00546FD8 C605 90F9BE00 01 mov byte ptr ds: [BEF990], 1
00546FDF 8D95 D0FEFFFF lea edx, dword ptr ss: [ebp-130]
00546FE5 8B45 FC mov eax, dword ptr ss: [ebp-4]
00546FE8 8B80 F8020000 mov eax, dword ptr ds: [eax + 2F8]
00546316e8 E554F0FF call iovsoft _. 0044C4D8
00546FF3 8B85 D0FEFFFF mov eax, dword ptr ss: [ebp-130]; ASCII "wangwei"
00546FF9 8D55 F4 lea edx, dword ptr ss: [ebp-C]
00546FFC E8 7730 ECFF call iovsoft _. 0040A078
00547001 8D95 CCFEFFFF lea edx, dword ptr ss: [ebp-134]
00547007 8B45 F4 mov eax, dword ptr ss: [ebp-C]
0054700A E8 D530ECFF call iovsoft _. 0040A0E4
0054700F 8B95 CCFEFFFF mov edx, dword ptr ss: [ebp-134]
00547015 8D45 F4 lea eax, dword ptr ss: [ebp-C]
00547018 E8 6 FDEEBFF call iovsoft _. 00404E8C
0054701D 8D95 C8FEFFFF lea edx, dword ptr ss: [ebp-138]
00547023 8B45 FC mov eax, dword ptr ss: [ebp-4]
00547026 8B80 FC020000 mov eax, dword ptr ds: [eax + 2FC]
0054702C E8 A754F0FF call iovsoft _. 0044C4D8
00547031 8B85 C8FEFFFF mov eax, dword ptr ss: [ebp-138]; ASCII "123456789"
00547037 8D55 F0 lea edx, dword ptr ss: [ebp-10]
0054703A E8 3930 ECFF call iovsoft _. 0040A078
0054703F 8D95 C4FEFFFF lea edx, dword ptr ss: [ebp-13C]
00547045 8B45 F0 mov eax, dword ptr ss: [ebp-10]
00547048 E8 9730 ECFF call iovsoft _. 0040A0E4
0054704D 8B95 C4FEFFFF mov edx, dword ptr ss: [ebp-13C]
00547053 8D45 F0 lea eax, dword ptr ss: [ebp-10]
00547056 E8 31 DEEBFF call iovsoft _. 00404E8C
0054705B 8D95 C0FEFFFF lea edx, dword ptr ss: [ebp-140]
00547061 A1 A4F9BE00 mov eax, dword ptr ds: [BEF9A4]
00547066 E8 552 BECFF call iovsoft _. 00409BC0
0054706B 8B95 C0FEFFFF mov edx, dword ptr ss: [ebp-140]
00547071 B8 C0755400 mov eax, iovsoft _. 005475C0; ASCII "123"
00547076 E8 7DE3EBFF call iovsoft _. 004053F8
0054707B 85C0 test eax, eax
0054707D 7E 4B jle short iovsoft _. 005470CA
0054707F 837D F0 00 cmp dword ptr ss: [ebp-10], 0
00547083 0F85 8E000000 jnz iovsoft _. 00547117
00547089 6A 00 push 0
0054708B 8D8D B8FEFFFF lea ecx, dword ptr ss: [ebp-148]
00547091 BA CC755400 &