史萊姆論壇

史萊姆論壇 (http://forum.slime.com.tw/)
-   Hacker/Cracker 及加解密技術文件 (http://forum.slime.com.tw/f132.html)
-   -   螢幕錄像專家破解思法 (http://forum.slime.com.tw/thread180993.html)

psac 2006-07-24 03:32 PM

螢幕錄像專家破解思法
 
螢幕錄像專家破解思法

主程序沒有加殼

用 OD 載入,停在了軟體的入口
00437D20 /. 55 push ebp
00437D21 |. 8BEC mov ebp,esp
00437D23 |. 81C4 CCFEFFFF add esp,-134
00437D29 |. 53 push ebx
00437D2A |. 8995 44FFFFFF mov dword ptr ss:[ebp-BC],edx
00437D30 |. 8985 48FFFFFF mov dword ptr ss:[ebp-B8],eax
00437D36 |. B8 FCBA5000 mov eax,屏錄專家.0050BAFC
00437D3B |. E8 60440A00 call <屏錄專家.@__InitExceptBlockLDTC>
00437D40 |. 66:C785 5CFFFFFF 0800 mov word ptr ss:[ebp-A4],8
00437D49 |. 8D45 FC lea eax,dword ptr ss:[ebp-4]
00437D4C |. E8 BF9BFCFF call <屏錄專家.unknown_libname_37>
00437D51 |. 8BD0 mov edx,eax
00437D53 |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
00437D59 |. 8B8D 48FFFFFF mov ecx,dword ptr ss:[ebp-B8]
00437D5F |. 8B81 E4020000 mov eax,dword ptr ds:[ecx+2E4]
00437D65 |. E8 1E860500 call <屏錄專家.@TControl@GetText$qqrv> ;取註冊碼
00437D6A |. 8D55 FC lea edx,dword ptr ss:[ebp-4] ;**edx->註冊碼

00437D6D |. FF32 push dword ptr ds:[edx]
00437D6F |. 8D45 F8 lea eax,dword ptr ss:[ebp-8]
00437D72 |. E8 999BFCFF call <屏錄專家.unknown_libname_37>
00437D77 |. 8BD0 mov edx,eax
00437D79 |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
00437D7F |. 8B8D 48FFFFFF mov ecx,dword ptr ss:[ebp-B8]
00437D85 |. 8B81 DC020000 mov eax,dword ptr ds:[ecx+2DC]
00437D8B |. E8 F8850500 call <屏錄專家.@TControl@GetText$qqrv> ;取註冊名
00437D90 |. 8D55 F8 lea edx,dword ptr ss:[ebp-8] ;**edx->註冊名

00437D93 |. FF32 push dword ptr ds:[edx]
00437D95 |. FFB5 48FFFFFF push dword ptr ss:[ebp-B8]
00437D9B |. E8 180C0000 call <屏錄專家.old_ver> ;關於老版本
00437DA0 |. 83C4 0C add esp,0C
00437DA3 |. 3C 01 cmp al,1
00437DA5 |. 0F94C1 sete cl
00437DA8 |. 83E1 01 and ecx,1
00437DAB |. 51 push ecx
00437DAC |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
00437DB2 |. 8D45 F8 lea eax,dword ptr ss:[ebp-8]
00437DB5 |. BA 02000000 mov edx,2
00437DBA |. E8 11F70A00 call <屏錄專家.@System@AnsiString@$bdtr$qqrv>
00437DBF |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
00437DC5 |. 8D45 FC lea eax,dword ptr ss:[ebp-4]
00437DC8 |. BA 02000000 mov edx,2
00437DCD |. E8 FEF60A00 call <屏錄專家.@System@AnsiString@$bdtr$qqrv>
00437DD2 |. 59 pop ecx
00437DD3 |. 84C9 test cl,cl
00437DD5 |. 74 48 je short 屏錄專家.00437E1F ;不是老版本

00437DD7 |. 66:C785 5CFFFFFF 1400 mov word ptr ss:[ebp-A4],14 ;註冊碼是老版本
00437DE0 |. BA DCB75000 mov edx,屏錄專家.0050B7DC
00437DE5 |. 8D45 F4 lea eax,dword ptr ss:[ebp-C]
00437DE8 |. E8 ABF40A00 call <屏錄專家.sub_4E7298>
00437DED |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
00437DF3 |. 8B00 mov eax,dword ptr ds:[eax]
00437DF5 |. E8 46310500 call <屏錄專家.@Dialogs@ShowMessage$qqrx17System@AnsiString>
00437DFA |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
00437E00 |. 8D45 F4 lea eax,dword ptr ss:[ebp-C]
00437E03 |. BA 02000000 mov edx,2
00437E08 |. E8 C3F60A00 call <屏錄專家.@System@AnsiString@$bdtr$qqrv>
00437E0D |. 8B8D 4CFFFFFF mov ecx,dword ptr ss:[ebp-B4]
00437E13 |. 64:890D 00000000 mov dword ptr fs:[0],ecx
00437E1A |. E9 7E0B0000 jmp 屏錄專家.0043899D ;返回

不是老版本:
00437E1F |> 6A 14 push 14
00437E21 |. 6A 00 push 0
00437E23 |. 8D85 00FFFFFF lea eax,dword ptr ss:[ebp-100]
00437E29 |. 50 push eax
00437E2A |. E8 A13F0A00 call <屏錄專家._memset>
00437E2F |. 83C4 0C add esp,0C
00437E32 |. 33D2 xor edx,edx
00437E34 |. 8995 40FFFFFF mov dword ptr ss:[ebp-C0],edx
00437E3A |. 6A 14 push 14
00437E3C |. 6A 00 push 0
00437E3E |. 8D8D 18FFFFFF lea ecx,dword ptr ss:[ebp-E8]
00437E44 |. 51 push ecx
00437E45 |. E8 863F0A00 call <屏錄專家._memset>
00437E4A |. 83C4 0C add esp,0C
00437E4D |. 6A 14 push 14
00437E4F |. 6A 00 push 0
00437E51 |. 8D85 E8FEFFFF lea eax,dword ptr ss:[ebp-118]
00437E57 |. 50 push eax
00437E58 |. E8 733F0A00 call <屏錄專家._memset>
00437E5D |. 83C4 0C add esp,0C
00437E60 |. 66:C785 5CFFFFFF 2000 mov word ptr ss:[ebp-A4],20
00437E69 |. 8D45 F0 lea eax,dword ptr ss:[ebp-10]
00437E6C |. E8 9F9AFCFF call <屏錄專家.unknown_libname_37>
00437E71 |. 8BD0 mov edx,eax
00437E73 |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
00437E79 |. 8B8D 48FFFFFF mov ecx,dword ptr ss:[ebp-B8]
00437E7F |. 8B81 DC020000 mov eax,dword ptr ds:[ecx+2DC]
00437E85 |. E8 FE840500 call <屏錄專家.@TControl@GetText$qqrv> ;取註冊名
00437E8A |. 8D45 F0 lea eax,dword ptr ss:[ebp-10]
**eax->取註冊名
00437E8D |. E8 46DEFCFF call <屏錄專家.@System@AnsiString@c_str$xqqrv>
00437E92 |. 50 push eax
00437E93 |. 8D95 E8FEFFFF lea edx,dword ptr ss:[ebp-118]
00437E99 |. 52 push edx
00437E9A |. E8 5D400A00 call <屏錄專家._strcpy> ;copy 註冊名
00437E9F |. 83C4 08 add esp,8
00437EA2 |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
00437EA8 |. 8D45 F0 lea eax,dword ptr ss:[ebp-10]
00437EAB |. BA 02000000 mov edx,2
00437EB0 |. E8 1BF60A00 call <屏錄專家.@System@AnsiString@$bdtr$qqrv>
00437EB5 |. 66:C785 5CFFFFFF 2C00 mov word ptr ss:[ebp-A4],2C
00437EBE |. 8D45 EC lea eax,dword ptr ss:[ebp-14]
00437EC1 |. E8 4A9AFCFF call <屏錄專家.unknown_libname_37>
00437EC6 |. 8BD0 mov edx,eax
00437EC8 |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
00437ECE |. 8B8D 48FFFFFF mov ecx,dword ptr ss:[ebp-B8]
00437ED4 |. 8B81 F0020000 mov eax,dword ptr ds:[ecx+2F0]
00437EDA |. E8 A9840500 call <屏錄專家.@TControl@GetText$qqrv> ;取機器碼
00437EDF |. 8D45 EC lea eax,dword ptr ss:[ebp-14]
;**eax->機器碼
00437EE2 |. E8 F1DDFCFF call <屏錄專家.@System@AnsiString@c_str$xqqrv>
00437EE7 |. 50 push eax
00437EE8 |. 8D95 00FFFFFF lea edx,dword ptr ss:[ebp-100]
00437EEE |. 52 push edx
00437EEF |. E8 08400A00 call <屏錄專家._strcpy> ;copy 機器碼
00437EF4 |. 83C4 08 add esp,8
00437EF7 |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
00437EFD |. 8D45 EC lea eax,dword ptr ss:[ebp-14]
00437F00 |. BA 02000000 mov edx,2
00437F05 |. E8 C6F50A00 call <屏錄專家.@System@AnsiString@$bdtr$qqrv>
00437F0A |. 33C9 xor ecx,ecx
00437F0C |. 898D 3CFFFFFF mov dword ptr ss:[ebp-C4],ecx



;**********************************************************************************************
00437F12 |> 8B85 3CFFFFFF /mov eax,dword ptr ss:[ebp-C4]
00437F18 |. 8A9405 E8FEFFFF |mov dl,byte ptr ss:[ebp+eax-118] ;[ebp+eax-118]=註冊名
00437F1F |. 8B8D 3CFFFFFF |mov ecx,dword ptr ss:[ebp-C4]
00437F25 |. 32940D 00FFFFFF |xor dl,byte ptr ss:[ebp+ecx-100] ;[ebp+ecx-100h]=機器碼
00437F2C |. 8B85 3CFFFFFF |mov eax,dword ptr ss:[ebp-C4]
00437F32 |. 889405 18FFFFFF |mov byte ptr ss:[ebp+eax-E8],dl
00437F39 |. 8B95 3CFFFFFF |mov edx,dword ptr ss:[ebp-C4]
00437F3F |. 0FBE8C15 18FFFFFF |movsx ecx,byte ptr ss:[ebp+edx-E8]
00437F47 |. 898D CCFEFFFF |mov dword ptr ss:[ebp-134],ecx
00437F4D |. DB85 CCFEFFFF |fild dword ptr ss:[ebp-134]
00437F53 |. 83C4 F8 |add esp,-8
00437F56 |. DD1C24 |fstp qword ptr ss:[esp]
00437F59 |. E8 02840A00 |call <屏錄專家._fabs> ;st=|[ebp-134h]|
00437F5E |. 83C4 08 |add esp,8
00437F61 |. DB85 3CFFFFFF |fild dword ptr ss:[ebp-C4] ;st=[ebp-0C4h]
00437F67 |. DEC9 |fmulp st(1),st ; st=|[ebp-134h]|*[ebp-0C4h]
00437F69 |. DB85 40FFFFFF |fild dword ptr ss:[ebp-C0] ;st=[ebp-0C0h]
00437F6F |. DEC1 |faddp st(1),st ; st=|[ebp-134h]|*[ebp-0C4h]+[ebp-0C0h]
00437F71 |. E8 12840A00 |call <屏錄專家.@_ftol$qv> ; eax=st
00437F76 |. 8985 40FFFFFF |mov dword ptr ss:[ebp-C0],eax
00437F7C |. FF85 3CFFFFFF |inc dword ptr ss:[ebp-C4]
00437F82 |. 83BD 3CFFFFFF 14 |cmp dword ptr ss:[ebp-C4],14 ;20位
00437F89 |.^ 7C 87 \jl short 屏錄專家.00437F12

;假設這段程序輸出為temp_H
static char n[14]="123"//註冊名
static char m[14]="38289378"//機器碼
int count;
int temp_H;

temp_H=0;
for count=0 to 14h do
{
temp_H=|n[count] xor m[count]|*count+temp_H
}



;************************************************************************************************
00437F8B |. 8185 40FFFFFF 39300000 add dword ptr ss:[ebp-C0],3039
00437F95 |. FFB5 40FFFFFF push dword ptr ss:[ebp-C0]
00437F9B |. 68 57B85000 push 屏錄專家.0050B857
00437FA0 |. 8D95 18FFFFFF lea edx,dword ptr ss:[ebp-E8]
00437FA6 |. 52 push edx
00437FA7 |. E8 F8690A00 call <屏錄專家._sprintf> ;把temp_H轉為十進制temp_D
(十六進)temp_H------->(十進制)temp_D
;**********************************************************************************************
00437FAC |. 83C4 0C add esp,0C
00437FAF |. 66:C785 5CFFFFFF 3800 mov word ptr ss:[ebp-A4],38
00437FB8 |. 8D45 E8 lea eax,dword ptr ss:[ebp-18]
00437FBB |. E8 5099FCFF call <屏錄專家.unknown_libname_37>
00437FC0 |. 8BD0 mov edx,eax
00437FC2 |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
00437FC8 |. 8B8D 48FFFFFF mov ecx,dword ptr ss:[ebp-B8]
00437FCE |. 8B81 E4020000 mov eax,dword ptr ds:[ecx+2E4]
00437FD4 |. E8 AF830500 call <屏錄專家.@TControl@GetText$qqrv> ;取註冊碼
00437FD9 |. 8D45 E8 lea eax,dword ptr ss:[ebp-18]
;**EAX-> 註冊碼
00437FDC |. E8 F7DCFCFF call <屏錄專家.@System@AnsiString@c_str$xqqrv>
00437FE1 |. 50 push eax
00437FE2 |. 8D95 D0FEFFFF lea edx,dword ptr ss:[ebp-130]
00437FE8 |. 52 push edx
00437FE9 |. E8 0E3F0A00 call <屏錄專家._strcpy> ;COPY 取註冊碼

00437FEE |. 83C4 08 add esp,8
00437FF1 |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
00437FF7 |. 8D45 E8 lea eax,dword ptr ss:[ebp-18]
00437FFA |. BA 02000000 mov edx,2
00437FFF |. E8 CCF40A00 call <屏錄專家.@System@AnsiString@$bdtr$qqrv>
00438004 |. 33C9 xor ecx,ecx
00438006 |. 898D 3CFFFFFF mov dword ptr ss:[ebp-C4],ecx
0043800C |> 8B85 3CFFFFFF /mov eax,dword ptr ss:[ebp-C4]
00438012 |. 0FBE9405 18FFFFFF |movsx edx,byte ptr ss:[ebp+eax-E8];[ebp+eax-0E8h]=temp_D
0043801A |. 8B8D 3CFFFFFF |mov ecx,dword ptr ss:[ebp-C4]
00438020 |. 0FBE840D D0FEFFFF |movsx eax,byte ptr ss:[ebp+ecx-130];[ebp+ecx-130]=註冊碼
00438028 |. 83C0 EC |add eax,-14
0043802B |. 3BD0 |cmp edx,eax
0043802D |. 75 5D |jnz short 屏錄專家.0043808C
| |
0043802F |. 83BD 3CFFFFFF 03 |cmp dword ptr ss:[ebp-C4],3;是不是第5位
00438036 |. 75 45 |jnz short 屏錄專家.0043807D;不是第5位
| |
00438038 |. 8B95 40FFFFFF |mov edx,dword ptr ss:[ebp-C0];[ebp-C0]=temp_H
0043803E |. 81C2 444D0000 |add edx,4D44
00438044 |. 8995 CCFEFFFF |mov dword ptr ss:[ebp-134],edx
0043804A |. DB85 CCFEFFFF |fild dword ptr ss:[ebp-134]
00438050 |. DC0D A4894300 |fmul qword ptr ds:[4389A4] ;3.14
00438056 |. DB2D AC894300 |fld tbyte ptr ds:[4389AC] ;1.59489633173843711e-1
0043805C |. DEC9 |fmulp st(1),st
0043805E |. E8 25830A00 |call <屏錄專家.@_ftol$qv> ;eax=st
00438063 |. 8985 40FFFFFF |mov dword ptr ss:[ebp-C0],eax
00438069 |. 8B85 40FFFFFF |mov eax,dword ptr ss:[ebp-C0]
0043806F |. B9 A0860100 |mov ecx,186A0
00438074 |. 99 |cdq
00438075 |. F7F9 |idiv ecx
00438077 |. 8995 40FFFFFF |mov dword ptr ss:[ebp-C0],edx ;edx:餘數
| |
0043807D |> FF85 3CFFFFFF |inc dword ptr ss:[ebp-C4]
00438083 |. 83BD 3CFFFFFF 05 |cmp dword ptr ss:[ebp-C4],5 ;loop 5 次
0043808A |.^ 7C 80 \jl short 屏錄專家.0043800C
0043808C |> 83BD 3CFFFFFF 05 cmp dword ptr ss:[ebp-C4],5 ;是不是第5位
00438093 |. 0F8C AD080000 jl 屏錄專家.00438946 ;小於5失敗

以下檢查第5位:
00438099 |. 8B85 40FFFFFF mov eax,dword ptr ss:[ebp-C0]
0043809F |. B9 0A000000 mov ecx,0A
004380A4 |. 99 cdq
004380A5 |. F7F9 idiv ecx
004380A7 |. 8B85 3CFFFFFF mov eax,dword ptr ss:[ebp-C4]
004380AD |. 0FBE8C05 D0FEFFFF movsx ecx,byte ptr ss:[ebp+eax-130];[ebp+eax-130]=第5位註冊碼
004380B5 |. 83C1 BF add ecx,-41
004380B8 |. 2BCA sub ecx,edx ;edx通過對temp_H計算得到
004380BA |. 898D 38FFFFFF mov dword ptr ss:[ebp-C8],ecx
004380C0 |. 83BD 38FFFFFF 00 cmp dword ptr ss:[ebp-C8],0
004380C7 |. 74 0D je short 屏錄專家.004380D6 ;成功
004380C9 |. 83BD 38FFFFFF 05 cmp dword ptr ss:[ebp-C8],5
004380D0 |. 0F85 25080000 jnz 屏錄專家.004388FB ;失敗

static char s[14]="xxxxxx"//註冊碼
int count
int buffer

for count=0 to 5 do
{ cmp temp_D[count],(s[count]-14)
jnz fail
if count=3 do {
buffer=mod(((temp_H+4d44h)*3.14*1.59489633173843711e-1)/186a0h)
}
}

buffer=s[count]-41-mod(buffer/0ah)
if buffer=0 or buffer=5 jmp succeed

fail:
succeed:

;******************************************************************************************

成功:
004380D6 |> 66:C785 5CFFFFFF 4400 mov word ptr ss:[ebp-A4],44
004380DF |. BA 5AB85000 mov edx,屏錄專家.0050B85A
004380E4 |. 8D45 E4 lea eax,dword ptr ss:[ebp-1C]
004380E7 |. E8 ACF10A00 call <屏錄專家.sub_4E7298>
004380EC |. FF85 68FFFFFF inc dword ptr ss:[ebp-98]
004380F2 |. 8B00 mov eax,dword ptr ds:[eax]
004380F4 |. E8 472E0500 call <屏錄專家.@Dialogs@ShowMessage$qqrx17System@AnsiString>
004380F9 |. FF8D 68FFFFFF dec dword ptr ss:[ebp-98]
004380FF |. 8D45 E4 lea eax,dword ptr ss:[ebp-1C]
00438102 |. BA 02000000 mov edx,2

不建議爆破,因為通過註冊後他會把註冊明肯註冊碼儲存在pmlxzj.dll文件裡,再次起動時會再檢查,

C:\windows\pmlxzj.dll

我的機器碼為"38289378",輸入註冊名為「123"
下斷點在:
0043800C |> 8B85 3CFFFFFF /mov eax,dword ptr ss:[ebp-C4]
00438012 |. 0FBE9405 18FFFFFF |movsx edx,byte ptr ss:[ebp+eax-E8];[ebp+eax-0E8h]=temp_D
可見[ebp+eax-E8]指向"31 33 36 33 30 00"
可得:
31h+14h=45h->"E"
33h+14h=49h->"G"
36h+14h=4Ah->"K"
33h+14h=49h->"G"
30h+14h=44h->"D"
"EGKGD"為前5位註冊碼
再下斷點在:
004380AD |. 0FBE8C05 D0FEFFFF movsx ecx,byte ptr ss:[ebp+eax-130];[ebp+eax-130]=第5位註冊碼
004380B5 |. 83C1 BF add ecx,-41
004380B8 |. 2BCA sub ecx,edx
可得到edx=1
所以第5位註冊碼為:1+41h=44h->"B" 或1+41h+5=49h->"G" 我的註冊碼為"EGKGDB"或"EGKGDG"

但是,一般用後面的比較好~ ,因為後面的支持未來版本,
此外,我們用這種方法註冊後,我們做出來的所有東西除了.exe 得錄像之外都沒有問題了,關鍵還在
play.dat 裡面的算法,是這 6位註冊碼後面的東西,因為我沒有偵錯,所以用 空格填充的話,我們的

自訂版權
出不來的,即使出來了也不能改字體,字號~ 所以我們還要分析一下 play.dat 裡面的構造~

00402DF1 |. 66:C785 18FFF>mov word ptr ss:[ebp-E8], 44
00402DFA |> 8D95 FCFEFFFF lea edx, dword ptr ss:[ebp-104]
00402E00 |. B9 04000000 mov ecx, 4
00402E05 |. 8B85 04FFFFFF mov eax, dword ptr ss:[ebp-FC]
00402E0B |. 8B80 78140000 mov eax, dword ptr ds:[eax+1478]
00402E11 |. 8B18 mov ebx, dword ptr ds:[eax]
00402E13 |. FF53 04 call dword ptr ds:[ebx+4]
00402E16 |> 8B85 04FFFFFF mov eax, dword ptr ss:[ebp-FC]
00402E1C |. 80B8 54140000>cmp byte ptr ds:[eax+1454], 0 上面是分析 註冊碼的,比較後,
00402E23 |. 0F85 88000000 jnz 復件_Pla.00402EB1 ------------- 這裡要跳,所以改成 jmp play.00402EB1
00402E29 |. 66:C785 18FFF>mov word ptr ss:[ebp-E8], 5C
00402E32 |. BA 4A244800 mov edx, 復件_Pla.0048244A
00402E37 |. 8D45 8C lea eax, dword ptr ss:[ebp-74]

00407086 . E8 016E0100 call 復件_Pla.0041DE8C
0040708B . 8B8D 68FFFFFF mov ecx, dword ptr ss:[ebp-98]
00407091 . 8981 70140000 mov dword ptr ds:[ecx+1470], eax
00407097 . 8B85 68FFFFFF mov eax, dword ptr ss:[ebp-98]
0040709D . 80B8 54140000>cmp byte ptr ds:[eax+1454], 0 上面又是分析 註冊碼的,比較後
004070A4 . 0F85 42010000 jnz 復件_Pla.004071EC ------------ 這裡也要跳,改成 jnz play.004071EC
004070AA . 8B95 68FFFFFF mov edx, dword ptr ss:[ebp-98]
004070B0 . 8B82 70140000 mov eax, dword ptr ds:[edx+1470]
004070B6 . BA 14000000 mov edx, 14
004070BB . E8 40720100 call 復件_Pla.0041E300
004070C0 . 8D85 27FFFFFF lea eax, dword ptr ss:[ebp-D9]
004070C6 . E8 99A6FFFF call 復件_Pla.00401764
004070CB . 33D2 xor edx, edx
004070CD . E8 26200000 call 復件_Pla.004090F8
004070D2 . 8A10 mov dl, byte ptr ds:[eax]
004070D4 . 8B85 68FFFFFF mov eax, dword ptr ss:[ebp-98]
004070DA . 8B80 70140000 mov eax, dword ptr ds:[eax+1470]
004070E0 . E8 47720100 call 復件_Pla.0041E32C
004070E5 . 66:C785 7CFFF>mov word ptr ss:[ebp-84], 0C8
004070EE . BA DB244800 mov edx, 復件_Pla.004824DB
004070F3 . 8D45 B4 lea eax, dword ptr ss:[ebp-4C]
004070F6 . E8 19670600 call 復件_Pla.0046D814
004070FB . FF45 88 inc dword ptr ss:[ebp-78]
004070FE . 8B10 mov edx, dword ptr ds:[eax]
00407100 . 8B8D 68FFFFFF mov ecx, dword ptr ss:[ebp-98]
00407106 . 8B81 70140000 mov eax, dword ptr ds:[ecx+1470]
0040710C . E8 77710100 call 復件_Pla.0041E288
00407111 . FF4D 88 dec dword ptr ss:[ebp-78]
00407114 . 8D45 B4 lea eax, dword ptr ss:[ebp-4C]
00407117 . BA 02000000 mov edx, 2
0040711C . E8 AB670600 call 復件_Pla.0046D8CC
00407121 . 8B8D 68FFFFFF mov ecx, dword ptr ss:[ebp-98]
00407127 . 8B81 70140000 mov eax, dword ptr ds:[ecx+1470]
0040712D . BA FF000000 mov edx, 0FF
00407132 . E8 296F0100 call 復件_Pla.0041E060
00407137 . 8B8D 68FFFFFF mov ecx, dword ptr ss:[ebp-98]
0040713D . 8B81 60140000 mov eax, dword ptr ds:[ecx+1460]
00407143 . E8 BCC20100 call 復件_Pla.00423404
00407148 . 83C0 0C add eax, 0C
0040714B . 8985 20FFFFFF mov dword ptr ss:[ebp-E0], eax
00407151 . 8B95 68FFFFFF mov edx, dword ptr ss:[ebp-98]
00407157 . 8B92 70140000 mov edx, dword ptr ds:[edx+1470]
0040715D . 8B85 20FFFFFF mov eax, dword ptr ss:[ebp-E0]
00407163 . 8B00 mov eax, dword ptr ds:[eax]
00407165 . 8B08 mov ecx, dword ptr ds:[eax]
00407167 . FF51 08 call dword ptr ds:[ecx+8]
0040716A . 66:C785 7CFFF>mov word ptr ss:[ebp-84], 0D4
00407173 . BA E0244800 mov edx, 復件_Pla.004824E0
00407178 . 8D45 B0 lea eax, dword ptr ss:[ebp-50]

說了這麼多,相信朋友們都應該知道 天狼星 這個 變態 的註冊碼
校驗方式了吧~ 利用上面的 主程序 註冊碼 計算方式,做出來個
偽註冊機,因為算出來的註冊碼,只能用在主程序上面,做出來的
.EXE 的錄像 還是有 未註冊的 標誌,所以我覺得爆了他比較不錯,
一個原因是 去掉了 未註冊的標誌,還有一個原因就是 如果 把
PLAY.DAT 裡面的 未註冊用空格覆蓋,我們的 自訂 訊息就不可以
改字體,字號,顏色等等~~~

轉載自校園黑客聯盟


所有時間均為台北時間。現在的時間是 07:49 PM

Powered by vBulletin® 版本 3.6.8
版權所有 ©2000 - 2024, Jelsoft Enterprises Ltd.

『服務條款』

* 有問題不知道該怎麼解決嗎?請聯絡本站的系統管理員 *


SEO by vBSEO 3.6.1