交作業了!!!!!!PECompact1.48破解過程 (6千字)
pecompact1.48破解過程
用trw2000載入下bpx 41a000後用suspend開啟peditor---tasks---dump(full)
再把入口點改為41a000,脫殼完成
用W32Dasm開啟pecompact.exe
* Possible StringData Ref from Code Obj ->"About PECompact"
|
:00404DA7 688ACA4000 push 0040CA8A
:00404DAC FF7508
push [ebp+08]
:00404DAF E852500000 call 00409E06
:00404DB4 A1F0E14000 mov eax,
dword ptr [0040E1F0]
:00404DB9 83F800
cmp eax, 00000000
:00404DBC 7F23
jg 00404DE1------>>改為jmp 00404DE1
* Possible StringData Ref from Code Obj ->"YOUR TRIAL PERIOD HAS ENDED!"
|
:00404DBE 68E4EF4000 push 0040EFE4
:00404DC3 6870040000 push 00000470
:00404DC8 FF7508
push [ebp+08]
:00404DCB E848500000 call 00409E18
* Possible StringData Ref from Code Obj ->"Exit"
|
:00404DD0 6801F04000 push 0040F001
:00404DD5 6A01
push 00000001
:00404DD7 FF7508
push [ebp+08]
:00404DDA E839500000 call 00409E18
:00404DDF EB25
jmp 00404E06
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00404DBC(C)
|
:00404DE1 50
push eax
* Possible StringData Ref from Code Obj ->"You have %d days remaining of "
->"your trial."
|
:00404DE2 68BAEF4000 push 0040EFBA
:00404DE7 6856EF4000 push 0040EF56
:00404DEC E863500000 call 00409E54
:00404DF1 83C40C
add esp, 0000000C
:00404DF4 6856EF4000 push 0040EF56
:00404DF9 6870040000 push 00000470
:00404DFE FF7508
push [ebp+08]
:00404E01 E812500000 call 00409E18
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00404DDF(U)
|
* Possible StringData Ref from Code Obj ->"
Licensed for 14-day evaluation. "
->"Registration
is required for continued "
->"use."
|
:00404E06 6839DA4000 push 0040DA39
:00404E0B 680C040000 push 0000040C
:00404E10 FF7508
push [ebp+08]
:00404E13 E800500000 call 00409E18
* Possible StringData Ref from Code Obj ->"PECompact v1.48, ?999-2001 by "
->"Jeremy Collake"
|
:00404E18 680BDA4000 push 0040DA0B
:00404E1D 6853040000 push 00000453
:00404E22 FF7508
push [ebp+08]
:00404E25 E8EE4F0000 call 00409E18
* Possible StringData Ref from Code Obj ->"Unregistered!"
|
:00404E2A 689ACA4000 push 0040CA9A
:00404E2F 6834040000 push 00000434
:00404E34 FF7508
push [ebp+08]
:00404E37 E8DC4F0000 call 00409E18
:00404E3C 33C0
xor eax, eax
:00404E3E 5E
pop esi
:00404E3F 5F
pop edi
:00404E40 5B
pop ebx
:00404E41 C9
leave
:00404E42 C21000
ret 0010
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00404D6F(C)
|
:00404E45 837D0C10 cmp
dword ptr [ebp+0C], 00000010
:00404E49 7443
je 00404E8E
:00404E4B 817D0C11010000 cmp dword ptr [ebp+0C],
00000111
:00404E52 7531
jne 00404E85
:00404E54 837D1001 cmp
dword ptr [ebp+10], 00000001
:00404E58 7434
je 00404E8E
:00404E5A 817D1010040000 cmp dword ptr [ebp+10],
00000410
:00404E61 7522
jne 00404E85
:00404E63 6A00
push 00000000
:00404E65 6A00
push 00000000
:00404E67 6A00
push 00000000
* Possible StringData Ref from Code Obj ->"http://www.collakesoftware.com"
|
:00404E69 68A7D84000 push 0040D8A7
:00404E6E 6A00
push 00000000
:00404E70 FF3563E14000 push dword ptr
[0040E163]
:00404E76 E863500000 call 00409EDE
:00404E7B 33C0
xor eax, eax
:00404E7D 40
inc eax
:00404E7E 5E
pop esi
:00404E7F 5F
pop edi
:00404E80 5B
pop ebx
:00404E81 C9
leave
:00404E82 C21000
ret 0010
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00404E52(C), :00404E61(C)
|
:00404E85 33C0
xor eax, eax
:00404E87 5E
pop esi
:00404E88 5F
pop edi
:00404E89 5B
pop ebx
:00404E8A C9
leave
:00404E8B C21000
ret 0010
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00404E49(C), :00404E58(C)
|
:00404E8E 833DF0E1400000 cmp dword ptr [0040E1F0],
00000000
:00404E95 7F07
jg 00404E9E------>>改為jmp 00404E9E
:00404E97 6A00
push 00000000
:00404E99 E8544E0000 call 00409CF2
時間破解完成,但在壓縮時會跳出About視窗,幹掉他!!!!
* Possible Ref to Menu: MenuID_0066, Item: "About"
|
:00401093 68429C0000 push 00009C42
:00401098 FF3563E14000 push dword ptr
[0040E163]
:0040109E E8E2520000 call 00406385------>>改為5個nop
:004010A3 E87D160000 call 00402725
:004010A8 6A42
push 00000042
:004010AA E8B7160000 call 00402766
:004010AF 6838DC4000 push 0040DC38
:004010B4 E82A1E0000 call 00402EE3
:004010B9 C7055CF54000A6F04000 mov dword ptr [0040F55C], 0040F0A6
:004010C3 6896DA4000 push 0040DA96
:004010C8 FF355CF54000 push dword ptr
[0040F55C]
:004010CE E8F8530000 call 004064CB
:004010D3 A3F9F54000 mov dword
ptr [0040F5F9], eax
:004010D8 6A00
push 00000000
:004010DA 684F040000 push 0000044F
:004010DF FF3563E14000 push dword ptr
[0040E163]
:004010E5 E82E8D0000 call 00409E18
破解到此完成!!!!
交作業了!!!!!
conanxu[BCG]
conanxu@eastday.com
相關文章
- 買了課程大半年,今天終於可以交作業了,因為明天要上戰場了。2020-06-30
- 作業系統啟動的過程2024-06-27作業系統
- docker作業系統的攢建過程2019-05-20Docker作業系統
- 總結與思考 :OOP課程PTA作業4 - 62024-06-07OOP
- 面試就業過程的記錄了2024-08-29面試就業
- myeclipse2017破解過程以及遇到的破解失敗的問題2018-09-13Eclipse
- 學習UbuntuLinux作業系統過程和經驗2020-10-23UbuntuLinux作業系統
- 企業展廳設計製作的過程分析2023-02-03
- 凱撒密碼加解密過程與破解原理2024-07-10密碼解密
- 關於安裝VMware以及Linux作業系統過程2021-03-01Linux作業系統
- 解決一億小學生作業難題《作業瘋了》6月14日上架2019-06-14
- 團隊作業62024-05-15
- 結對作業62024-06-11
- 暑假作業來襲!《作業瘋了》6月14日Steam發售2019-05-24
- 【轉】交換機開發(二)—— 三層交換機報文轉發過程2018-10-07
- 【作業系統2】作業系統啟動過程與異常/中斷,系統呼叫2020-11-28作業系統
- 記錄一次Flink作業異常的排查過程2020-06-17
- 中興ZXV10B860AV2.1-A破解過程2019-02-02
- [譯] 製作 Vue 3 的過程2020-05-28Vue
- 自己動手從零寫桌面作業系統GrapeOS系列教程——6.電腦啟動過程介紹2023-02-28作業系統
- 9月6日作業2024-09-06
- iNeuOS工業網際網路作業系統,順利從NetCore3.1升級到Net6的過程彙報2022-02-23作業系統NetCore
- (交作業啦!!!)html5學習筆記?2022-03-15HTML筆記
- PTA4-6次作業2024-06-09
- OOP4-6次作業2024-06-09OOP
- 讀懂作業系統(x64)之堆疊幀(過程呼叫)2020-05-19作業系統
- 讀懂作業系統(x86)之堆疊幀(過程呼叫)2020-05-18作業系統
- 所見即所得 HTML 編輯器 Froala Editor 3.1.1 破解過程2020-05-25HTML
- 淺談Linux作業系統的Swap交換區2020-09-29Linux作業系統
- ucore作業系統學習(六) ucore lab6執行緒排程器2020-12-09作業系統執行緒
- 軟體工程課程小作業2020-10-01軟體工程
- 豐田“看板”經歷了哪些過程?2022-07-21
- 在製作遊戲的過程中,我都解決和改進了哪些問題2019-08-09遊戲
- c# 三步遞交模式呼叫同一個儲存過程2019-08-14C#模式儲存過程
- SPI通訊協議 的移位暫存器資料交換過程2020-10-26協議
- oracle排程程式作業dbms_scheduler2018-08-20Oracle
- oracle使用DBMS_SCHEDULER排程作業2018-08-20Oracle
- 資料庫課程作業筆記2019-04-24資料庫筆記
- Java畢設期末作業原始碼62020-11-11Java原始碼