拷貝王KingCopy 2.5 Beta (簡單) (6千字)
拷貝王KingCopy 2.5 Beta (簡單)
軟體名稱: KingCopy 2.5 Beta(879KB)
執行平臺: Win9x/Me/NT/2000
軟體簡介: KingCopy是一款優越的應用於檔案複製、備份、修復的實用工具。具有速度快、人工智慧度高特點,結合到資源管理器的右鍵選單,能大大地簡化平常的檔案複製操作。具有較高的檔案讀取及糾錯能力,能讀取軟盤上損壞的檔案,並能對損壞的檔案進行修復,恢復重要的資料。具有的檔案斷點續拷。
這是一VB5程式,在winice.dat裝載:EXP=c:\windows\system\msvbvm50.dll。
破解工具:SoftICE4.05
破解時間:2001.6.1
輸入註冊名:[CCG]
輸入註冊碼:12324567890
bpx hmemcpy
..................
0167:00463BBA PUSH ECX
0167:00463BBB CALL [MSVBVM50!rtcTrimBstr]
0167:00463BC1 MOV EDX,EAX
0167:00463BC3 LEA ECX,[EBP-1C]
0167:00463BC6 CALL [MSVBVM50!__vbaStrMove]
0167:00463BCC LEA ECX,[EBP-24]
0167:00463BCF CALL [MSVBVM50!__vbaFreeStr]
0167:00463BD5 LEA ECX,[EBP-34]
0167:00463BD8 CALL [MSVBVM50!__vbaFreeObj]
0167:00463BDE MOV EDX,[EBP+08]
0167:00463BE1 MOV EBX,[ESI+00000304]
0167:00463BE7 PUSH EDX
0167:00463BE8 CALL EBX
0167:00463BEA PUSH EAX
0167:00463BEB LEA EAX,[EBP-34]
0167:00463BEE PUSH EAX
0167:00463BEF CALL [MSVBVM50!__vbaObjSet]
0167:00463BF5 MOV ESI,EAX
0167:00463BF7 LEA EDX,[EBP-24]
0167:00463BFA PUSH EDX
0167:00463BFB PUSH ESI
0167:00463BFC MOV ECX,[ESI]
0167:00463BFE CALL [ECX+000000A0]
0167:00463C04 TEST EAX,EAX
0167:00463C06 JGE 00463C1A
0167:00463C08 PUSH 000000A0
0167:00463C0D PUSH 004110A4
0167:00463C12 PUSH ESI
0167:00463C13 PUSH EAX
0167:00463C14 CALL [MSVBVM50!__vbaHresultCheckObj]
0167:00463C1A MOV EAX,[EBP-24]
0167:00463C1D PUSH EAX
0167:00463C1E CALL [MSVBVM50!rtcTrimBstr]
0167:00463C24 MOV EDX,EAX
0167:00463C26 LEA ECX,[EBP-20]
0167:00463C29 CALL [MSVBVM50!__vbaStrMove]
0167:00463C2F LEA ECX,[EBP-24]
0167:00463C32 CALL [MSVBVM50!__vbaFreeStr]
0167:00463C38 LEA ECX,[EBP-34]
0167:00463C3B CALL [MSVBVM50!__vbaFreeObj]
0167:00463C41 MOV ECX,[EBP-1C]
0167:00463C44 MOV ESI,[MSVBVM50!__vbaStrCmp]
0167:00463C4A PUSH ECX
0167:00463C4B PUSH 0040BDFC
0167:00463C50 CALL ESI
檢測是否輸入了註冊名。
0167:00463C52 TEST EAX,EAX
0167:00463C54 JNZ 00463CEC
0167:00463C5A MOV EBX,[MSVBVM50!__vbaVarDup]
0167:00463C60 MOV ECX,80020004
0167:00463C65 MOV [EBP-70],ECX
0167:00463C68 MOV EAX,0000000A
0167:00463C6D MOV [EBP-60],ECX
0167:00463C70 MOV ESI,00000008
0167:00463C75 LEA EDX,[EBP-0098]
...................
...................
0167:00463CEC MOV ECX,[EBP-20]
0167:00463CEF PUSH ECX
0167:00463CF0 PUSH 0040BDFC
0167:00463CF5 CALL ESI
檢測是否輸入了註冊碼。
0167:00463CF7 TEST EAX,EAX
0167:00463CF9 JNZ 00463DCA
0167:00463CFF MOV EDI,[MSVBVM50!__vbaVarDup]
0167:00463D05 MOV ECX,80020004
0167:00463D0A MOV [EBP-70],ECX
0167:00463D0D MOV EAX,0000000A
0167:00463D12 MOV [EBP-60],ECX
.............
...............
EAX=00481B50 EBX=799BC350 ECX=006AEA20 EDX=0048001C
ESI=798CF8F6
EDI=799BC358 EBP=006AEA34 ESP=006AE954 EIP=00463DD3
o d I s Z a P c
CS=0167 DS=016F SS=016F ES=016F FS=0F5F GS=0000
==================================================byte==============PROT========
016F:00481B50 4B 00 43 00 32 00 35 00-2D 00 37 00 44 00 34 00 K.C.2.5.-.7.D.4.
016F:00481B60 33 00 34 00 34 00 37 00-37 00 37 00 00 00 46 00 3.4.4.7.7.7...F.
016F:00481B70 2A 00 64 00 33 00 35 00-00 00 00 00 28 00 00 A0 *.d.3.5.....(...
016F:00481B80 90 A6 F4 7F F4 D4 48 00-04 00 00 00 20 00 00 00 .....H.....
...
==========================================================================ROT32
0167:00463DC5 JMP 0046446B
0167:00463DCA MOV ECX,[EBP-1C] <=D
ECX,輸入的註冊名。
0167:00463DCD PUSH ECX
0167:00463DCE CALL 0042F910
<=註冊碼運算核心
0167:00463DD3 MOV EDX,EAX
<=D EAX,可以看到正確的註冊碼。
0167:00463DD5 LEA ECX,[EBP-24]
0167:00463DD8 CALL [MSVBVM50!__vbaStrMove]
0167:00463DDE MOV EDX,[EBP-20]
0167:00463DE1 PUSH EAX
0167:00463DE2 PUSH EDX
0167:00463DE3 CALL ESI
0167:00463DE5 MOV EBX,[MSVBVM50!__vbaFreeStr]
0167:00463DEB MOV ESI,EAX
0167:00463DED NEG ESI
0167:00463DEF SBB ESI,ESI
0167:00463DF1 LEA ECX,[EBP-24]
0167:00463DF4 INC ESI
0167:00463DF5 NEG ESI
0167:00463DF7 CALL EBX
0167:00463DF9 TEST SI,SI
0167:00463DFC JZ 004642E0
0167:00463E02 MOV EAX,[EBP-18]
0167:00463E05 TEST EAX,EAX
====================================KINGCOPY!.text+00062DC5====================
:pagein n xia1.txt
PAGEIN address
Kingcopy
走到0167:00463DD3 就可以看見正確的註冊碼。
整理一下:
註冊名:[CCG]
註冊碼:KC25-7D4344777
China
Cracking Group
2001.06.20
相關文章
- KingCopy 2.5 Beta2015-11-15GC
- javaScript深拷貝和淺拷貝簡單梳理2022-04-26JavaScript
- python深拷貝和淺拷貝之簡單分析2018-08-26Python
- 龍叔python-直接賦值,深拷貝,淺拷貝的簡單解析2021-01-04Python賦值
- Java NIO原理及簡單拷貝實列2019-04-19Java
- 深拷貝和淺拷貝的簡要詳解2020-12-18
- 跨網路拷貝檔案的簡單實踐2014-11-27
- vue深拷貝淺拷貝2018-01-16Vue
- python 指標拷貝,淺拷貝和深拷貝2020-03-09Python指標
- 一文搞懂Java引用拷貝、淺拷貝、深拷貝2020-12-18Java
- jquery之物件拷貝深拷貝淺拷貝案例講解2020-10-25jQuery物件
- C++拷貝建構函式(深拷貝,淺拷貝)2018-05-28C++函式
- js關於物件直接量的拷貝簡單介紹2017-03-31JS物件
- iOS深拷貝和淺拷貝2019-10-09iOS
- JS深拷貝與淺拷貝2019-10-21JS
- Java深拷貝和淺拷貝2019-03-25Java
- 物件深拷貝和淺拷貝2019-03-04物件
- javascript 淺拷貝VS深拷貝2018-08-11JavaScript
- JavaScript 深度拷貝和淺拷貝2018-09-26JavaScript
- JavaScript深拷貝和淺拷貝2019-01-23JavaScript
- js 淺拷貝和深拷貝2018-07-18JS
- js 深拷貝和淺拷貝2022-03-30JS
- JavaScript淺拷貝和深拷貝2020-12-30JavaScript
- js深拷貝和淺拷貝2017-04-12JS
- js 深拷貝 vs 淺拷貝2017-09-03JS
- 淺談深拷貝與淺拷貝?深拷貝幾種方法。2019-10-17
- C++淺拷貝和深拷貝2020-04-06C++
- 深拷貝、淺拷貝與Cloneable介面2020-05-01
- 賦值、淺拷貝與深拷貝2019-03-26賦值
- 實現物件淺拷貝、深拷貝2019-07-20物件
- Python淺拷貝與深拷貝2019-02-16Python
- go slice深拷貝和淺拷貝2021-07-18Go
- JavaScript之深拷貝和淺拷貝2018-11-15JavaScript
- js的深拷貝和淺拷貝2018-12-28JS
- 聊聊物件深拷貝和淺拷貝2018-12-29物件
- ECMAScript-淺拷貝和深拷貝2020-10-23
- python深拷貝與淺拷貝2020-11-08Python
- js之淺拷貝和深拷貝2021-10-10JS