找到cspy.imf檔案,用W32dasm開啟可以看到如下字樣:
* Referenced by a CALL at Address:
|:10006AD3
|
:10004550 A15CE10310 mov eax,
dword ptr [1003E15C]
:10004555 85C0
test eax, eax
:10004557 742D
je 10004586
:10004559 A160E10310 mov eax,
dword ptr [1003E160]
:1000455E 85C0
test eax, eax
:10004560 751E
jne 10004580
:10004562 6A10
push 00000010 <------- 改為jmp 10004586,OK
* Possible StringData Ref from Data Obj ->"中文之星智慧狂拼試用版本"
|
:10004564 68DCE10310 push 1003E1DC
* Possible StringData Ref from Data Obj ->"中文之星智慧狂拼試用版本的使用期限已到。
如"
->"要繼續使用,請購買正式版本。
請訪問 "
->"www.cstar.com.cn
獲取詳細資訊。
"
|
:10004569 6864E10310 push 1003E164
:1000456E 6A00
push 00000000
* Reference To: USER32.MessageBoxA, Ord:0195h
|
:10004570 FF15D0350D10 Call dword ptr
[100D35D0]
:10004576 C70560E1031001000000 mov dword ptr [1003E160], 00000001
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:10004560(C)
|
:10004580 B801000000 mov eax,
00000001
:10004585 C3
ret
custer
2000.9.3