sbb文件|请问java通过远程连接不通过linux命令用java代码操作linux上文件该怎么做

|

① 文件后缀名为.sbb的文件怎么打开,用什么软件打开

必须用从税务局购买的税收申报软件才能打开~

② 汇编 文件读写。。。

文件读写操作,有些繁琐。但是,也很规范。TEST.TXT,就是文件名,存放在你的程序所在的文件夹。需要定义一个缓冲区。把你要存入的东西,先写入缓冲区。再利用中断调用,把缓冲区,写入文件。读出文件,也是读入到这个缓冲区。

③ 后缀名为.sbb的文件是什么文件啊要怎样打开

纳税报表必须用从税务局购买的税收申报软件才能打开~

④ 求大海战2的衣阿华的SPR文件!

This is my updated list… Hope its all ok… Sorry for my bad english xDHarbor Sprites— F0 – FF1 – FF2 – NDD3 – UK O-Class4 – US Fletcher5 – KM Z16 – US Gearing7 – IJN Akitsuki8 – US Atlanta9 – KM Koenigsberg10 – IJN Myoko11 – KM Admiral Hipper12 – KM Z3113 – US Juneau II14 – US Oakland15 – IJN Kagero16 – IJN Agano17 – UK Dido18 – UK Edinburgh19 – UK Tribal20 – KM Deutschland21 – US Bogue22 – IJN Fubuki23 – UK County24 – US Northampton25 – KM Scharnhorst26 – IJN Simakaze27 – US Portland28 – IJN Hosho29 – IJN Kuma30 – US New Orleans31 – IJN Kongo32 – KM Z4633 – KM Z5234 – US Somers35 – Mogami (CL)36 – IJN Mogami 1944 (CV)37 – UK Revenge38 – IJN Kitakami39 – UK Sirius40 – US Nevada41 – UK Nelson42 – KM D38/4043 – KM M-Project44 – NDD45 – US Brooklyn46 – UK Collossus47 – UK Independence48 – IJN Ryujo49 – UK Renown50 – FF51 – FF52 – UK Attacker53 – US Cleveland54 – UK Queen Elizabeth55 – UK York56 – US Pennsylvania 193057 – US Pennsylvania 194358 – IJN Fuso59 – KM P-Project60 – UK Surrey61 – US Baltimore62 – KM O-Project I63 – IJN Oyodo64 – US Alaska65 – IJN Ise 193766 – UK Courageous67 – US Tennessee 194168 – IJN Ise 1943 (CV)69 – US Tennessee 194570 – UK Hood71 – US New Mexico72 – KM Prinz Eugen73 – IJN Nagato75 – KM Gneisenau74 – US Guam76 – UK King George V77 – UK Prince of Wales78 – UK Repulse79 – UK Q Class or Tribal ???80 – IJN Hiryu81 – KM Graf Zeppelin II82 – US Yorktown83 – APA84 ***Does not exist***85 – US North Carolina86 – IJN Junyo87 – US Colorado88 – UK Illustrious89 – IJN Unryu90 – IJN Akagi 192791 – IJN Taiho92 – UK Vanguard93 – UK Ark Royal94 – NDD295 – US South Dakota96 – IJN Kaga 192897 – IJN Kaga 193598 – IJN Agaki 193899 – KM Bismarck100 – IJN Shokaku101 – UK Lion I102 – IJN Yamato103 ***Does not exist***104 – US Essex105 – US Iowa106 – KM H39 Project107 – KM O-Project II108 – KM Graf Zeppelin109 – IJN Tsukikei110 – US DDX111 – UK L-Class112 – IJN Tatsuda113 – KM Z99114 – US Lexington115 – KM Europa116 – UK Lion II117 – US Montana118 – KM H44 Class119 – IJN Super Yamato120 – UK Malta Project121 – IJN Shinano122 – US Texas123 – UK Tiger124 – IJN Dhonburi125 – KM Bayern126 – US Pensacola127 – UK Furious128 – IJN Asama129 – KM Moltke130 – US Omaha131 – KM Emden132 – IJN Yubari133 – UK Emerald134 – UK Rental Rodney (Nelson)135 – IJN Rental Mutsu (Nagato)136 – KM Rental Tirpitz (BSM)137 – US Rental Massachusetts (SoDak)138 – UK PBB Dunkerque139 – IJN PBB B65 Project140 – KM PBB Andrea Doria141 – US PBB Sevastopol142 – UK EBB Dreadnought143 – US EBB New York144 – IJN EBB Mikasa145 – KM EBB Nassau146 – Turtle Ship————SBB————-147 – US Nebraska148 – UK Q. Victoria149 – IJN Amagi150 – KM Kaiser151 – Midway152 – DeGrasse—————————-153 ***Does not exist***154 – SS UK O CLass155 – SS US H Class156 – SS IJN Vickers L3157 – SS KM Type II158 ***Does not exist***159 ***Does not exist***160 – SS IJN Junsen161 – SS KM Type VIIa162 – SS US Barracuda163 – SS UK P TYPE164 – SS IJN KAIDAI165 – SS KM type VIIc166 – Ticonderoga167 – Implacable168 – Zuikaku169 – Hindenburgh————MNs————-170 – Chacal171 – L'Adroit172 – Le Fantasque173 – Mogador174 – Pluton175 – Duguay Trouin176 – Janne D'arc177 – Emile Bertin178 – La Galissoniere179 – Suffern180 – Algerie181 – Duqusene182 – Provence 1913183 – Courbet184 – Normandie185 – Lyon186 – Provence187 – Courbet remodel188 – Strasbourgh189 – Richelieu190 – Alsace191 – Dixmude192 – Bearn193 – Joffre194 – Arromanches195 – SS1 Frances196 – Requim197 – Redoutable————SS4s————-198 – Cachalot199 – Rover200 – HEI Type201 – VIIc FLAK202 – ArgonauteInBattle Sprites— NS1 – FF22 – NDD3 – UK O-Class4 – US Fletcher5 – KM Z16 – US Gearing7 – IJN Akitsuki8 – US Atlanta9 – KM Koenigsberg10 – IJN Myoko11 – KM Hipper12 – US Juneau II13 – US Oakland14 – IJN Kagero15 – IJN Agano16 – UK Dido17 – UK Edinburgh18 – UK Tribal19 – KM Z3120 – KM Deutschland21 – US Bogue22 – IJN Fubuki23 – UK County24 – US Northampton25 – KM Scharnhorst26 – IJN Simakaze27 – US Portland28 – IJN Hosho29 – IJN Kuma30 – US New Orleans31 – IJN Kongo32 – US Somers33 – IJN Mogami CLCA34 – IJN Mogami 1944 (CV)35 – UK Revenge36 – IJN Kitakami37 – US Sirius38 – US Nevada39 – UK Nelson40 – KM D38/D4041 – KM M-Project42 – NDD43 – US Brooklyn44 – UK Collossus45 – US Independence46 – IJN Ryujo47 – UK Renown48 – FF49 – FF50 – KM Seydlitz51 – US Cleveland52 – UK Queen Elizabeth53 – UK York54 – US Pennsylvania 193055 – US Pennsylvania 194356 – IJN Fuso57 – KM P-Project I/II58 – UK Surrey59 – US Baltimore60 – KM O-Project I61 – IJN Oyodo62 – US Alaska63 – IJN Ise 193764 – UK Courageous65 – US Tennessee 194166 – IJN Ise 1943 (CV)67 – US Tennessee 194568 – UK Hood69 – US New Mexico70 – KM Prinz Eugen71 – IJN Nagato72 – US Guam73 – KM Gneisenau74 – UK King George V75 – UK Prince of Wales76 – UK Repulse77 – UK Q-Class78 – IJN Hiryu79 – KM Graf Zeppelin I80 – US Yorktown81 – APA82 ***NO EXISTE***83 – US North Carolina84 – IJN Junyo85 – US Colorado86 – UK Illustrious87 – IJN Unryu88 – IJN Akagi 192789 – IJN Taiho90 – UK Vanguard91 – UK Ark Royal92 – NDD293 – US South Dakota94 – IJN Kaga 192895 – IJN Kaga 193596 ***NO EXISTE***97 – KM Bismarck98 – IJN Shokaku99 – UK Lion I100 – IJN Yamato101 – Torpedo Boat102 – US Essex—————————BB4103 – US Iowa104 – KM H39 Project105 – KM O-Project II106 – KM Graf Zeppelin II—————————//BB4107 – IJN Tsukikei108 – US DDX109 – UK L-Class110 – IJN Tatsuda111 – KM Z99—————————BB/CV5112 – US Lexington113 – KM Europa114 – UK Lion II115 – US Montana116 – KM H44 Class117 – IJN Super Yamato118 – UK Malta Project119 – IJN Shinano—————————PCL120 – US Texas121 – UK Tiger122 – IJN Dhonburi123 – KM Bayern—————————PCA124 – US Pensacola125 – UK Furious126 – IJN Asama127 – KM Moltke—————————ECL128 – US Omaha129 – KM Emden130 – IJN Yubari131 – UK Emerald—————————Rental132 – UK Rodney (Nelson)133 – IJN Mutsu (Nagato)134 – KM Tirpitz (BSM)135 – US Massachusetts (SoDak)—————————PBB136 – UK Dunkerque137 – IJN B65 Project138 – KM Andrea Doria139 – US Sevastopol—————————EBB140 – UK EBB Dreadnought141 – US EBB New York142 – IJN EBB Mikasa143 – KM EBB Nassau144 – Turtle Ship————SBB————-145 – US Nebraska146 – UK Q. Victoria147 – IJN Amagi148 – KM Kaiser149 – Midway150 – DeGrasse—————————-151 ***NO EXISTE***152 – SS UK O CLass153 – SS US H Class154 – SS IJN Vickers L3155 – SS KM Type II156 – SS US S Class157 – SS UK Oberon158 – SS IJN Junsen159 – SS KM Type VIIa160 – SS US Barracuda161 – SS UK P TYPE162 – SS IJN KAIDAI163 – SS KM type VIIc164 – Ticonderoga165 – Implacable166 – Zuikaku167 – Hindenburgh————MNs————-168 – Chacal169 – L'Adroit170 – Le Fantasque171 – Mogador172 – Pluton173 – Duguay Trouin174 – Janne D'arc175 – Emile Bertin176 – La Galissoniere177 – Suffern178 – Algerie179 – Duqusene180 – Provence 1913181 – Courbet182 – Normandie183 – Lyon184 – Provence185 – Courbet remodel186 – Strasbourgh187 – Richelieu188 – Alsace189 – Dixmude190 – Bearn191 – Joffre192 – Arromanches193 – SS1 Frances194 – Requim195 – Redoutable————SS4s————-196 – Cachalot197 – Rover198 – HEI Type199 – VIIc FLAK200 – Argonaute255 – Empty999 – Empty这是所有船只对应的SPR文件数字的关系。我从BNF上面粘贴过来的

⑤ 生化危机缺少文件sbb_2a.wav,r316S00.mpg,求分享

随便拿一个MPG格式的电影文件,名称转换成确实的文件即可!笨方法,立竿见影。

⑥ 下载完战国BASARA解压后出来个iso的压缩文件名字是cvnsbbh把它放进PSP里还是如何弄

放在ISO文件夹里,名字不要用中文

⑦ 为什么我的磁盘里面有两个“回收站”其中一个是中文,另一个是“Recycled”且图标一样

不正常的,一个是病毒,回收站我还没看过有中文的,但要确定,你可以看一下两个文件夹属性哪个是装系统的时间,哪个是装系统后的时间,时间在后的应该是病毒的,删了它。看一下其它盘是不是也是这样,照样删。

⑧ 请问java通过远程连接,不通过linux命令,用java代码操作linux上文件,该怎么做

可以通抄过ssh链接袭linux,可以使用下面的这个包:https://www.eldos.com/sbb/lp-ssh-java.php?referer1=google&referer2=adwords_lp_ssh_java&gclid=COz8hKLOo8ACFdd5vQodHrYArA

⑨ 优化大师文件加密算法是什么来的。谢谢

Windows优化大师 加密算法015F:004C5A0B CMP DWORD [EBP-04],BYTE +00 015F:004C5A0F JZ 004C5A25 015F:004C5A11 LEA EDX,[EBP-08] 015F:004C5A14 MOV EAX,[EBX+02DC] 015F:004C5A1A CALL 0042F6E8 015F:004C5A1F CMP DWORD [EBP-08],BYTE +00 015F:004C5A23 JNZ 004C5A42 015F:004C5A25 PUSH BYTE +10 015F:004C5A27 MOV ECX,004C5B98 015F:004C5A2C MOV EDX,004C5BA8 015F:004C5A31 MOV EAX,[004F9DB0] 015F:004C5A36 MOV EAX,[EAX] 015F:004C5A38 CALL 0044BD40 015F:004C5A3D JMP 004C5B6E 015F:004C5A42 LEA EDX,[EBP-04] 015F:004C5A45 MOV EAX,[EBX+02D8] 015F:004C5A4B CALL 0042F6E8 015F:004C5A50 MOV EAX,[EBP-04] 015F:004C5A53 CALL 004C5908 015F:004C5A58 CDQ 输入的第一注册码 015F:004C5A59 PUSH EDX 015F:004C5A5A PUSH EAX 015F:004C5A5B LEA EDX,[EBP-04] 015F:004C5A5E MOV EAX,[EBX+02DC] 015F:004C5A64 CALL 0042F6E8 015F:004C5A69 MOV EAX,[EBP-04] 015F:004C5A6C CALL 004C5908 015F:004C5A71 CDQ 输入的第二注册码 015F:004C5A72 PUSH EDX 015F:004C5A73 PUSH EAX 015F:004C5A74 LEA EDX,[EBP-04] 015F:004C5A77 MOV EAX,[EBX+02D4] 015F:004C5A7D CALL 0042F6E8 015F:004C5A82 MOV EAX,[EBP-04] 015F:004C5A85 CALL 00404074 015F:004C5A8A CALL `OCTODLL!Registed` 检测注册码 015F:004C5A8F CMP EAX,BYTE +14 015F:004C5A92 JZ 004C5AB1 相等则转到4c5ab1 015F:004C5A94 PUSH BYTE +10 015F:004C5A96 MOV ECX,004C5B98 015F:004C5A9B MOV EDX,004C5BC4 015F:004C5AA0 MOV EAX,[004F9DB0] 015F:004C5AA5 MOV EAX,[EAX] 015F:004C5AA7 CALL 0044BD40 跳出失败对话框,Game Over. 015F:004C5AAC JMP 004C5B6E 015F:004C5AB1 MOV DL,01 015F:004C5AB3 MOV EAX,[004528A8] 015F:004C5AB8 CALL 004529E8 015F:004C5ABD MOV ESI,EAX 015F:004C5ABF MOV EDX,80000002 015F:004C5AC4 MOV EAX,ESI 015F:004C5AC6 CALL 00452A80 015F:004C5ACB MOV CL,01 015F:004C5ACD MOV EDX,004C5BF0 015F:004C5AD2 MOV EAX,ESI 015F:004C5AD4 CALL 00452BDC 015F:004C5AD9 LEA EDX,[EBP-04] 015F:004C5ADC MOV EAX,[EBX+02D8] 015F:004C5AE2 CALL 0042F6E8 015F:004C5AE7 MOV ECX,[EBP-04] 015F:004C5AEA MOV EDX,004C5C08 015F:004C5AEF MOV EAX,ESI 015F:004C5AF1 CALL 0045312C 015F:004C5AF6 LEA EDX,[EBP-04] 015F:004C5AF9 MOV EAX,[EBX+02DC] 015F:004C5AFF CALL 0042F6E8 015F:004C5B04 MOV ECX,[EBP-04] 015F:004C5B07 MOV EDX,004C5C1C 015F:004C5B0C MOV EAX,ESI 015F:004C5B0E CALL 0045312C 015F:004C5B13 MOV EAX,ESI 015F:004C5B15 CALL 00452A50 015F:004C5B1A MOV EAX,ESI 015F:004C5B1C CALL 00402FC4 015F:004C5B21 PUSH BYTE +40 015F:004C5B23 MOV ECX,004C5B98 015F:004C5B28 MOV EDX,004C5C28 015F:004C5B2D MOV EAX,[004F9DB0] 015F:004C5B32 MOV EAX,[EAX] 015F:004C5B34 CALL 0044BD40 跳出注册成功对话框. 015F:004C5B39 MOV EAX,[004F9F4C] 015F:004C5B3E MOV EAX,[EAX] 015F:004C5B40 MOV EAX,[EAX+073C] 015F:004C5B46 MOV EDX,004C5C5C 015F:004C5B4B CALL 0042F718 015F:004C5B50 MOV EAX,[004F9F4C] 015F:004C5B55 MOV EAX,[EAX] 015F:004C5B57 MOV EAX,[EAX+0468] 015F:004C5B5D XOR EDX,EDX 015F:004C5B5F CALL 0042F5D8 015F:004C5B64 MOV EAX,[004FBDDC] 015F:004C5B69 CALL 00448A34 015F:004C5B6E XOR EAX,EAX 015F:004C5B70 POP EDX 015F:004C5B71 POP ECX 015F:004C5B72 POP ECX 015F:004C5B73 MOV [FS:EAX],EDX 015F:004C5B76 PUSH DWORD 004C5B90 015F:004C5B7B LEA EAX,[EBP-08] 015F:004C5B7E MOV EDX,02 015F:004C5B83 CALL 00403C58未完继续注册涉及三个数:申请码、注册码第一部分和注册码第二部分,但参与计算的申请码并非它本身,而是在显示的申请码后插入“1234567”,然后取前8个数进行计算,我机器上的申请码是162445,故参与计算的是“16244512”,注册码分别用12345678和34567890,计算使用的注册码也非它本身,它会把你输入是注册码"12345678"认为十六进制数"12345678",十进制就是305419896,在内存中存为“78563412”第二部分也同样,当然注册码中可以有A~F的字母,但必须是大写。先看大致流程: 0167:00544272 MOV EAX,[EDI+ESI*4] 0167:00544275 MOV [EBP-1C],EAX 0167:00544278 MOV EAX,[EDI+ESI*4+04] 0167:0054427C MOV [EBP-18],EAX 0167:0054427F MOV EDX,EBX 0167:00544281 LEA EAX,[EBP-1C] 0167:00544284 CALL 00544170 <–根据申请码计算得数1 0167:00544289 MOV EAX,[EBX] 0167:0054428B MOV [EBX+08],EAX 0167:0054428E MOV EAX,[EBX+04] 0167:00544291 MOV [EBX+0C],EAX 0167:00544294 MOV EAX,[EBP-1C] 0167:00544297 MOV [EBX],EAX 0167:00544299 MOV EAX,[EBP-18] 0167:0054429C MOV [EBX+04],EAX 0167:0054429F ADD ESI,BYTE +02 0167:005442A2 MOV EAX,[EBP-04] 0167:005442A5 CALL 00542F74 0167:005442AA TEST EAX,EAX 0167:005442AC JNS 005442B1 0167:005442AE ADD EAX,BYTE +03 0167:005442B1 SAR EAX,02 0167:005442B4 CMP ESI,EAX 0167:005442B6 JC 00544272 0167:005442B8 MOV EAX,[EBP-10] 0167:005442BB XOR EDX,EDX 0167:005442BD PUSH EDX 0167:005442BE PUSH EAX 0167:005442BF PUSH DWORD [005450D0] 0167:005442C5 PUSH DWORD [005450CC] 0167:005442CB PUSH DWORD [005450D8] 0167:005442D1 PUSH DWORD [005450D4] 根据注册码第一部分计算, 0167:005442D7 CALL 005440B8 〈–结果放入EAX,设为数2 0167:005442DC SUB EAX,BYTE +02 〈–数2减2 0167:005442DF MOV [EBP-24],EAX 〈–放入内存 0167:005442E2 MOV EAX,[EBP-0C] 0167:005442E5 XOR EDX,EDX 0167:005442E7 PUSH EDX 0167:005442E8 PUSH EAX 0167:005442E9 PUSH DWORD [005450D0] 0167:005442EF PUSH DWORD [005450CC] 0167:005442F5 PUSH DWORD [005450D8] 0167:005442FB PUSH DWORD [005450D4] 根据注册码第二部分计算, 0167:00544301 CALL 005440B8 〈–结果放入EAX,设为数3 0167:00544306 SUB EAX,BYTE +02 〈–数3减2 0167:00544309 MOV [EBP-20],EAX 〈–放入内存 0167:0054430C SHL DWORD [EBP-24],02 〈–数2左移2位 0167:00544310 LEA ECX,[EBP-24] 0167:00544313 MOV EAX,[ECX] 〈–取出数2 0167:00544315 MOV EDX,[ECX+04] 〈–取出数3 0167:00544318 SHRD EAX,EDX,02 〈–数2、数3联合移位,数2改变,数3不变 0167:0054431C SHR EDX,02 〈–数3右移2位 0167:0054431F MOV [ECX],EAX 〈–数2放入内存 0167:00544321 MOV [ECX+04],EDX 〈–数3放入内存 0167:00544324 MOV EAX,[EBP-24] 0167:00544327 CMP EAX,[EBP-1C] <–数2与数1如相同则跳转 0167:0054432A JZ 00544330 正确应跳 0167:0054432C XOR EBX,EBX 0167:0054432E JMP SHORT 00544341 〈–如到这句,注册失败 0167:00544330 MOV AX,[EBP-20] 〈–取数3的低16位放入AX, 0167:00544334 AND AX,FFFF 以后验证,正确应为0014 0167:00544338 MOV EDX,[EBP-08] 0167:0054433B MOV [EDX],AX 0167:0054433E OR EBX,BYTE -01 0167:00544341 XOR EAX,EAX 0167:00544343 POP EDX 0167:00544344 POP ECX 0167:00544345 POP ECX 0167:00544346 MOV [FS:EAX],EDX 0167:00544349 PUSH DWORD 00544366 0167:0054434E LEA EAX,[EBP-14] 0167:00544351 CALL 00542E5C 0167:00544356 LEA EAX,[EBP-04] 0167:00544359 CALL 00542E5C 0167:0054435E RET 具体看申请码的计算: 0167:00544170 PUSH EBX 0167:00544171 PUSH ESI 0167:00544172 PUSH EDI 0167:00544173 PUSH ECX 0167:00544174 MOV [ESP],EAX 0167:00544177 MOV EAX,20 <–设定循环次数 0167:0054417C MOV ECX,[ESP] 0167:0054417F MOV ECX,[ECX] <–申请码前4位放入ecx 0167:00544181 MOV EBX,[ESP] 0167:00544184 MOV EBX,[EBX+04] <–申请码后4位放入ebx 0167:00544187 XOR ESI,ESI 0167:00544189 DEC EAX 0167:0054418A ADD ESI,[005450C8]<–esi加常数9e3779b9 0167:00544190 MOV EDI,EBX 0167:00544192 SHL EDI,04 0167:00544195 ADD ECX,EDI 0167:00544197 MOV EDI,[EDX] <–将"You "的ASC码放入edi, 0167:00544199 XOR EDI,EBX 注意高低位及空格 0167:0054419B ADD ECX,EDI 0167:0054419D MOV EDI,EBX 0167:0054419F SHR EDI,05 0167:005441A2 XOR EDI,ESI 0167:005441A4 ADD ECX,EDI 0167:005441A6 ADD ECX,[EDX+04] <–将"are "的ASC码放入ecx, 0167:005441A9 MOV EDI,ECX 0167:005441AB SHL EDI,04 0167:005441AE ADD EBX,EDI 0167:005441B0 MOV EDI,[EDX+08] <–将"big "的ASC码放入edi, 0167:005441B3 XOR EDI,ECX 0167:005441B5 ADD EBX,EDI 0167:005441B7 MOV EDI,ECX 0167:005441B9 SHR EDI,05 0167:005441BC XOR EDI,ESI 0167:005441BE ADD EBX,EDI 0167:005441C0 ADD EBX,[EDX+0C]<–将ebx加上"pig "的ASC码, 0167:005441C3 TEST EAX,EAX 0167:005441C5 JA 00544189 <–回到上面循环 0167:005441C7 MOV EAX,[ESP] 0167:005441CA MOV [EAX],ECX <–ecx的值即为算得的数1 0167:005441CC MOV EAX,[ESP] 0167:005441CF MOV [EAX+04],EBX 0167:005441D2 POP EDX 0167:005441D3 POP EDI 0167:005441D4 POP ESI 0167:005441D5 POP EBX 0167:005441D6 RET 上面这些移来移去实在不明白什么意思,但用C语言或VC来写,还是很容易的, 注册码的计算过程就复杂多了 两个注册码的计算完全一样,看第一个: 计算中涉及到内存中的几个数如下 在内存地址 77f600处有 xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx<–数4,初始为01000000,即十进制数1 xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx<–数5,初始为E3A0AA69,即十进制数1772789987 xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx<–注册码第一部分,初始为78563412,设为数6 计算过程: 0167:005440CE PUSH BYTE +00 0167:005440D0 PUSH BYTE +02 0167:005440D2 MOV EAX,[EBP+10] 0167:005440D5 MOV EDX,[EBP+14] 0167:005440D8 CALL 00543B6D <–判断内存中一数7为奇为偶, 0167:005440DD CMP EDX,BYTE +00 为奇则跳转至0054411B, 0167:005440E0 JNZ 0054411B 数7初始值为994323192 0167:005440E2 CMP EAX,BYTE +00 0167:005440E5 JNZ 0054411B 0167:005440E7 PUSH BYTE +00 0167:005440E9 PUSH BYTE +02 0167:005440EB MOV EAX,[EBP+10] 0167:005440EE MOV EDX,[EBP+14] 0167:005440F1 CALL 00543A7A <–如数7为偶则除2,结果放回原处 0167:005440F6 MOV [EBP+10],EAX 0167:005440F9 MOV [EBP+14],EDX 0167:005440FC PUSH DWORD [EBP+1C] 0167:005440FF PUSH DWORD [EBP+18] 0167:0054 PUSH DWORD [EBP+1C] 0167:00544105 PUSH DWORD [EBP+18] 0167:00544108 PUSH DWORD [EBP+0C] 0167:0054410B PUSH DWORD [EBP+08] 0167:0054410E CALL 00544060 \ 0167:00544113 MOV [EBP+18],EAX <–数6先平方,再除数5,余数放回数6处 0167:00544116 MOV [EBP+1C],EDX / 0167:00544119 JMP SHORT 0054414A 0167:0054411B MOV EAX,[EBP+10] \ 0167:0054411E MOV EDX,[EBP+14] \ 0167:00544121 SUB EAX,BYTE +01 \ 0167:00544124 SBB EDX,BYTE +00 /<–数7减1,变为偶数 0167:00544127 MOV [EBP+10],EAX / 0167:0054412A MOV [EBP+14],EDX / 0167:0054412D PUSH DWORD [EBP+1C] 0167:00544130 PUSH DWORD [EBP+18] 0167:00544133 PUSH DWORD [EBP-04] 0167:00544136 PUSH DWORD [EBP-08] 0167:00544139 PUSH DWORD [EBP+0C] 0167:0054413C PUSH DWORD [EBP+08] 0167:0054413F CALL 00544060 \ 0167:00544144 MOV [EBP-08],EAX <–数6乘数4除数5,余数放回数4 0167:00544147 MOV [EBP-04],EDX / 0167:0054414A CMP DWORD [EBP+14],BYTE +00 0167:0054414E JNZ 0054415C 0167:00544150 CMP DWORD [EBP+10],BYTE +00 0167:00544154 JA NEAR 005440CE 0167:0054415A JMP SHORT 00544162 <–当数7减小为0时到此处跳出返回, 0167:0054415C JG NEAR 005440CE 并将数4的最后值作为返回值数2 0167:00544162 MOV EAX,[EBP-08] 0167:00544165 MOV EDX,[EBP-04] 0167:00544168 POP ECX 0167:00544169 POP ECX 0167:0054416A POP EBP 0167:0054416B RET 注册码第二部分地运算过程完全相同,不再赘述。


赞 (0)