WEB开发网
开发学院网络安全黑客技术 用crackcode2000做出中国压缩chinazip7.0版的注册... 阅读

用crackcode2000做出中国压缩chinazip7.0版的注册机

 2007-01-13 20:16:19 来源:WEB开发网   
核心提示:>1.用language 2000 V4.5查文件是否加壳,查出是aspack加的壳,用crackcode2000做出中国压缩chinazip7.0版的注册机,用unaspack.exe脱壳成功,>2.用W32DASM反汇编一下

>1.用language 2000 V4.5查文件是否加壳,查出是aspack加的壳,用unaspack.exe脱壳成功。

>2.用W32DASM反汇编一下,找到"软件注册成功,谢谢您的支持!"如下:

>

>* Referenced by a (U)nconditional or (C)onditional Jump at Address:
>|:004F4D30(C)
>|
>:004F4DA6 8BD8 mov ebx, eax
>:004F4DA8 33C0 xor eax, eax
>:004F4DAA 55 push ebp
>:004F4DAB 68944E4F00 push 004F4E94
>:004F4DB0 64FF30 push dword ptr fs:[eax]
>:004F4DB3 648920 mov dword ptr fs:[eax], esp
>:004F4DB6 8D55F8 lea edx, dword ptr [ebp-08]
>:004F4DB9 8B83E4020000 mov eax, dword ptr [ebx+000002E4]
>:004F4DBF E860E1F3FF call 00432F24
>:004F4DC4 8B45F8 mov eax, dword ptr [ebp-08]
>:004F4DC7 50 push eax
>:004F4DC8 8D55F0 lea edx, dword ptr [ebp-10]
>:004F4DCB 8B83E0020000 mov eax, dword ptr [ebx+000002E0]
>:004F4DD1 E84EE1F3FF call 00432F24
>:004F4DD6 8B55F0 mov edx, dword ptr [ebp-10]
>:004F4DD9 8D4DF4 lea ecx, dword ptr [ebp-0C]
>:004F4DDC 8BC3 mov eax, ebx
>:004F4DDE E8C9010000 call 004F4FAC
>:004F4DE3 8B55F4 mov edx, dword ptr [ebp-0C]
>:004F4DE6 58 pop eax
>:004F4DE7 E830F3F0FF call 0040411C **关键call***
>:004F4DEC 7576 jne 004F4E64 **这里跳至"注册码不正确,无法注册!"
>:004F4DEE B201 mov dl, 01
>:004F4DF0 A158254500 mov eax, dword ptr [00452558]
>
>..........................
>........
>
>* Possible StringData Ref from Code Obj ->"软件注册成功,谢谢您的支持!"
> |
>:004F4E2C B8004F4F00 mov eax, 004F4F00
>:004F4E31 E8563DF6FF call 00458B8C
>:004F4E36 A16C305000 mov eax, dword ptr [0050306C]
>:004F4E3B 8B00 mov eax, dword ptr [eax]
>
>* Possible StringData Ref from Code Obj ->"中华压缩(ChinaZip)—注册版"
> |
>:004F4E3D BA244F4F00 mov edx, 004F4F24
>:004F4E42 E80DE1F3FF call 00432F54
>:004F4E47 33C0 xor eax, eax
>:004F4E49 5A pop edx
>:004F4E4A 59 pop ecx
>:004F4E4B 59 pop ecx
>:004F4E4C 648910 mov dword ptr fs:[eax], edx
>:004F4E4F 686E4E4F00 push 004F4E6E
>
>* Referenced by a (U)nconditional or (C)onditional Jump at Address:
>|:004F4E62(U)
>|
>:004F4E54 8B45FC mov eax, dword ptr [ebp-04]
>:004F4E57 E868E2F0FF call 004030C4
>:004F4E5C C3 ret
>
>
>:004F4E5D E9C2E9F0FF jmp 00403824
>:004F4E62 EBF0 jmp 004F4E54
>
>* Referenced by a (U)nconditional or (C)onditional Jump at Address:
>|:004F4DEC(C)
>|
>
>* Possible StringData Ref from Code Obj ->"注册码不正确,无法注册!"
> |
>:004F4E64 B8484F4F00 mov eax, 004F4F4
8

1 2  下一页

Tags:crackcode 做出 中国

编辑录入:爽爽 [复制链接] [打 印]
赞助商链接