admin 管理员组文章数量: 1184232
* Reference To: USER32.GetDlgItemTextA, Ord:00FDh
|
:78054201 FF15DC720578 Call dword ptr [780572DC]
:78054207 85FF test edi, edi
--由此出来
:78054209 751B jne 78054226
:7805420B 8D45FC lea eax, dword ptr [ebp-04]
:7805420E 8D8D78FFFFFF lea ecx, dword ptr [ebp+FFFFFF78]
:78054214 50 push eax
:78054215 51 push ecx
* Reference To: MPR.WNetVerifyPasswordA, Ord:004Eh
|
:78054216 E87F020000 Call 7805449A
:7805421B 85C0 test eax, eax
:7805421D 7440 je 7805425F
:7805421F B801000000 mov eax, 00000001
:78054224 EB79 jmp 7805429F
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:78054209(C)
|
:78054226 8D8574FEFFFF lea eax, dword ptr [ebp+FFFFFE74]
:7805422C 8D8D78FFFFFF lea ecx, dword ptr [ebp+FFFFFF78]
:78054232 50 push eax
:78054233 51 push ecx
* Reference To: KERNEL32.lstrlenA, Ord:02E7h
|
:78054234 FF1558720578 Call dword ptr [78057258]
:7805423A 50 push eax
:7805423B 8D8D78FFFFFF lea ecx, dword ptr [ebp+FFFFFF78]
:78054241 51 push ecx
:78054242 E89A010000 call 780543E1
:78054247 57 push edi
里是加密后你输入的假密码
:78054248 8D8D74FEFFFF lea ecx, dword ptr [ebp+FFFFFE74]
:7805424E 51 push ecx
里是加密后的密文
* Reference To: KERNEL32.lstrcmpiA, Ord:02DEh
|
:7805424F FF1554720578 Call dword ptr [78057254]
:78054255 83F801 cmp eax, 00000001
:78054258 1BC0 sbb eax, eax
:7805425A F7D8 neg eax
:7805425C 8945FC mov dword ptr [ebp-04], eax
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:7805421D(C)
|
:7805425F 33FF xor edi, edi
:78054261 B801000000 mov eax, 00000001
:78054266 397DFC cmp dword ptr [ebp-04], edi
:78054269 7534 jne 7805429F
关键跳跃的地方***********
版权声明:本文标题:屏保密码全攻略_ireader锁屏密码忘记 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.roclinux.cn/b/1773874564a3566710.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论