Guest User

Untitled

a guest
Sep 9th, 2020
71
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 0a3fac20 55 push ebp
  2. 0a3fac21 8bec mov ebp,esp
  3. 0a3fac23 57 push edi
  4. 0a3fac24 56 push esi
  5. 0a3fac25 53 push ebx
  6. 0a3fac26 8bf1 mov esi,ecx
  7. 0a3fac28 b9b8d47a09 mov ecx,97AD4B8h (MT: ClassLibrary1.VendorClass)
  8. 0a3fac2d e8968446f6 call 008630c8 (JitHelp: CORINFO_HELP_NEWSFAST)
  9. 0a3fac32 8bf8 mov edi,eax
  10. 0a3fac34 8bcf mov ecx,edi
  11. 0a3fac36 ff15f8d47a09 call dword ptr ds:[97AD4F8h] (ClassLibrary1.VendorClass..ctor(), mdToken: 06000001)
  12. 0a3fac3c 8b8e48010000 mov ecx,dword ptr [esi+148h]
  13. 0a3fac42 8b01 mov eax,dword ptr [ecx]
  14. 0a3fac44 8b404c mov eax,dword ptr [eax+4Ch]
  15. 0a3fac47 ff501c call dword ptr [eax+1Ch]
  16. 0a3fac4a 85c0 test eax,eax
  17. 0a3fac4c 740c je 0a3fac5a
  18.  
  19. 0a3fac4e 83780400 cmp dword ptr [eax+4],0
  20. 0a3fac52 0f94c2 sete dl
  21. 0a3fac55 0fb6d2 movzx edx,dl
  22. 0a3fac58 eb05 jmp 0a3fac5f
  23.  
  24. 0a3fac5a ba01000000 mov edx,1
  25.  
  26. 0a3fac5f 85d2 test edx,edx
  27. 0a3fac61 751d jne 0a3fac80
  28.  
  29. 0a3fac63 8b8e48010000 mov ecx,dword ptr [esi+148h]
  30. 0a3fac69 8b01 mov eax,dword ptr [ecx]
  31. 0a3fac6b 8b404c mov eax,dword ptr [eax+4Ch]
  32. 0a3fac6e ff501c call dword ptr [eax+1Ch]
  33. 0a3fac71 8b15789f6503 mov edx,dword ptr ds:[3659F78h] ("AWX610881RFFJSDJSZV")
  34. 0a3fac77 8bc8 mov ecx,eax
  35. 0a3fac79 e8cadd78fa call 04b88a48 (System.String.Equals(System.String, System.String), mdToken: 060004c2) ; <------------ Serial key check.
  36. 0a3fac7e eb02 jmp 0a3fac82
  37.  
  38. 0a3fac80 33c0 xor eax,eax
  39.  
  40. 0a3fac82 25ff000000 and eax,0FFh
  41. 0a3fac87 0f841a010000 je 0a3fada7
  42.  
  43. 0a3fac8d 8b8e54010000 mov ecx,dword ptr [esi+154h]
  44. 0a3fac93 8b01 mov eax,dword ptr [ecx]
  45. 0a3fac95 8b404c mov eax,dword ptr [eax+4Ch]
  46. 0a3fac98 ff501c call dword ptr [eax+1Ch]
  47. 0a3fac9b 85c0 test eax,eax
  48. 0a3fac9d 740c je 0a3facab
  49.  
  50. 0a3fac9f 83780400 cmp dword ptr [eax+4],0
  51. 0a3faca3 0f94c2 sete dl
  52. 0a3faca6 0fb6d2 movzx edx,dl
  53. 0a3faca9 eb05 jmp 0a3facb0
  54.  
  55. 0a3facab ba01000000 mov edx,1
  56.  
  57. 0a3facb0 85d2 test edx,edx
  58. 0a3facb2 752b jne 0a3facdf
  59.  
  60. 0a3facb4 8b8e54010000 mov ecx,dword ptr [esi+154h]
  61. 0a3facba 8b01 mov eax,dword ptr [ecx]
  62. 0a3facbc 8b404c mov eax,dword ptr [eax+4Ch]
  63. 0a3facbf ff501c call dword ptr [eax+1Ch]
  64. 0a3facc2 8bd8 mov ebx,eax
  65. 0a3facc4 ff15a0db7a09 call dword ptr ds:[97ADBA0h] (WindowsFormsApp1.Properties.Settings.get_Default(), mdToken: 0600000a)
  66. 0a3facca 8bc8 mov ecx,eax
  67. 0a3faccc 3909 cmp dword ptr [ecx],ecx
  68. 0a3facce ff15acdb7a09 call dword ptr ds:[97ADBACh] (WindowsFormsApp1.Properties.Settings.get_DBURL(), mdToken: 0600000b)
  69. 0a3facd4 8bcb mov ecx,ebx
  70. 0a3facd6 8bd0 mov edx,eax
  71. 0a3facd8 e86bdd78fa call 04b88a48 (System.String.Equals(System.String, System.String), mdToken: 060004c2) ; <------------ URL check.
  72. 0a3facdd eb02 jmp 0a3face1
  73.  
  74. 0a3facdf 33c0 xor eax,eax
  75.  
  76. 0a3face1 25ff000000 and eax,0FFh
  77. 0a3face6 0f84bb000000 je 0a3fada7
  78.  
  79. 0a3facec 8b8e64010000 mov ecx,dword ptr [esi+164h]
  80. 0a3facf2 8b01 mov eax,dword ptr [ecx]
  81. 0a3facf4 8b404c mov eax,dword ptr [eax+4Ch]
  82. 0a3facf7 ff501c call dword ptr [eax+1Ch]
  83. 0a3facfa 85c0 test eax,eax
  84. 0a3facfc 740c je 0a3fad0a
  85.  
  86. 0a3facfe 83780400 cmp dword ptr [eax+4],0
  87. 0a3fad02 0f94c2 sete dl
  88. 0a3fad05 0fb6d2 movzx edx,dl
  89. 0a3fad08 eb05 jmp 0a3fad0f
  90.  
  91. 0a3fad0a ba01000000 mov edx,1
  92.  
  93. 0a3fad0f 85d2 test edx,edx
  94. 0a3fad11 7523 jne 0a3fad36
  95.  
  96. 0a3fad13 8b8e64010000 mov ecx,dword ptr [esi+164h]
  97. 0a3fad19 8b01 mov eax,dword ptr [ecx]
  98. 0a3fad1b 8b404c mov eax,dword ptr [eax+4Ch]
  99. 0a3fad1e ff501c call dword ptr [eax+1Ch]
  100. 0a3fad21 8bd8 mov ebx,eax
  101. 0a3fad23 8bcf mov ecx,edi
  102. 0a3fad25 ff1534d47a09 call dword ptr ds:[97AD434h] (ClassLibrary1.VendorClass.get_VendorName(), mdToken: 06000002)
  103. 0a3fad2b 8bcb mov ecx,ebx
  104. 0a3fad2d 8bd0 mov edx,eax
  105. 0a3fad2f e814dd78fa call 04b88a48 (System.String.Equals(System.String, System.String), mdToken: 060004c2) ; <------------ Vendor name check.
  106. 0a3fad34 eb02 jmp 0a3fad38
  107.  
  108. 0a3fad36 33c0 xor eax,eax
  109.  
  110. 0a3fad38 25ff000000 and eax,0FFh
  111. 0a3fad3d 7468 je 0a3fada7
  112.  
  113. 0a3fad3f 8b8e6c010000 mov ecx,dword ptr [esi+16Ch]
  114. 0a3fad45 8b01 mov eax,dword ptr [ecx]
  115. 0a3fad47 8b404c mov eax,dword ptr [eax+4Ch]
  116. 0a3fad4a ff501c call dword ptr [eax+1Ch]
  117. 0a3fad4d 85c0 test eax,eax
  118. 0a3fad4f 740c je 0a3fad5d
  119.  
  120. 0a3fad51 83780400 cmp dword ptr [eax+4],0
  121. 0a3fad55 0f94c2 sete dl
  122. 0a3fad58 0fb6d2 movzx edx,dl
  123. 0a3fad5b eb05 jmp 0a3fad62
  124.  
  125. 0a3fad5d ba01000000 mov edx,1
  126.  
  127. 0a3fad62 85d2 test edx,edx
  128. 0a3fad64 7523 jne 0a3fad89
  129.  
  130. 0a3fad66 8b8e6c010000 mov ecx,dword ptr [esi+16Ch]
  131. 0a3fad6c 8b01 mov eax,dword ptr [ecx]
  132. 0a3fad6e 8b404c mov eax,dword ptr [eax+4Ch]
  133. 0a3fad71 ff501c call dword ptr [eax+1Ch]
  134. 0a3fad74 8bd8 mov ebx,eax
  135. 0a3fad76 8bcf mov ecx,edi
  136. 0a3fad78 ff154cd47a09 call dword ptr ds:[97AD44Ch] (ClassLibrary1.VendorClass.get_VendorAddress(), mdToken: 06000004)
  137. 0a3fad7e 8bcb mov ecx,ebx
  138. 0a3fad80 8bd0 mov edx,eax
  139. 0a3fad82 e8c1dc78fa call 04b88a48 (System.String.Equals(System.String, System.String), mdToken: 060004c2) ; <------------ Vendor address check.
  140. 0a3fad87 eb02 jmp 0a3fad8b
  141. 0a3fad89 33c0 xor eax,eax
  142. 0a3fad8b 25ff000000 and eax,0FFh
  143. 0a3fad90 7415 je 0a3fada7
  144.  
  145. 0a3fad92 8b8e5c010000 mov ecx,dword ptr [esi+15Ch]
  146. 0a3fad98 8b157c9f6503 mov edx,dword ptr ds:[3659F7Ch] ("Result : Good Job")
  147. 0a3fad9e 8b01 mov eax,dword ptr [ecx]
  148. 0a3fada0 8b4050 mov eax,dword ptr [eax+50h]
  149. 0a3fada3 ff10 call dword ptr [eax]
  150. 0a3fada5 eb13 jmp 0a3fadba
  151.  
  152. 0a3fada7 8b8e5c010000 mov ecx,dword ptr [esi+15Ch]
  153. 0a3fadad 8b15809f6503 mov edx,dword ptr ds:[3659F80h] ("Result : Not Correct")
  154. 0a3fadb3 8b01 mov eax,dword ptr [ecx]
  155. 0a3fadb5 8b4050 mov eax,dword ptr [eax+50h]
  156. 0a3fadb8 ff10 call dword ptr [eax]
  157.  
  158. >>> 0a3fadba 5b pop ebx
  159. 0a3fadbb 5e pop esi
  160. 0a3fadbc 5f pop edi
  161. 0a3fadbd 5d pop ebp
  162. 0a3fadbe c20400 ret 4
RAW Paste Data