音樂賀卡廠4.10破解過程 (6千字)
音樂賀卡廠4.10破解過程
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00433373(C)
|
:00433387 8B857CFFFFFF mov eax, dword
ptr [ebp+FFFFFF7C]<-你輸入的假碼,我們把它改成[ebp-50](真正的註冊碼的記憶體地址),嘿嘿,讓它變成真的和真的比,不就....
:0043338D 8B4DB0
mov ecx, dword ptr [ebp-50]<-真正的註冊碼
:00433390 50
push eax
:00433391 51
push ecx
* Reference To: MSVBVM60.__vbaStrCmp, Ord:0000h
|
:00433392 FF1510114000 Call dword ptr
[00401110]
:00433398 8BD8
mov ebx, eax
:0043339A 8D8D7CFFFFFF lea ecx, dword
ptr [ebp+FFFFFF7C]
:004333A0 F7DB
neg ebx
:004333A2 1BDB
sbb ebx, ebx
:004333A4 F7DB
neg ebx
:004333A6 F7DB
neg ebx
* Reference To: MSVBVM60.__vbaFreeStr, Ord:0000h
|
:004333A8 FF159C124000 Call dword ptr
[0040129C]
:004333AE 8D8D70FFFFFF lea ecx, dword
ptr [ebp+FFFFFF70]
_____________________________________________________________________________
* Possible StringData Ref from Code Obj ->"\\reguser.mcm"
|
:004334DE 6804664100 push 00416604<-進棧
* Reference To: MSVBVM60.__vbaStrCat, Ord:0000h
|
:004334E3 FF155C104000 Call dword ptr
[0040105C]<-生成reguser.mcm檔案
:004334E9 8D9560FFFFFF lea edx, dword
ptr [ebp+FFFFFF60]
:004334EF 8D4D80
lea ecx, dword ptr [ebp-80]
:004334F2 898568FFFFFF mov dword ptr
[ebp+FFFFFF68], eax
:004334F8 C78560FFFFFF08000000 mov dword ptr [ebp+FFFFFF60], 00000008
:00433502 FFD7
call edi
:00433504 6A00
push 00000000
:00433506 8D9560FFFFFF lea edx, dword
ptr [ebp+FFFFFF60]
_____________________________________________________________________________
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004335AF(C)
|
:004335C3 83EC10
sub esp, 00000010
:004335C6 8B857CFFFFFF mov eax, dword
ptr [ebp+FFFFFF7C]<-將你的註冊名送入eax,準備寫如reguser.mcm
:004335CC 8BD4
mov edx, esp
:004335CE B908000000 mov ecx,
00000008
:004335D3 898D60FFFFFF mov dword ptr
[ebp+FFFFFF60], ecx
:004335D9 898568FFFFFF mov dword ptr
[ebp+FFFFFF68], eax
:004335DF 890A
mov dword ptr [edx], ecx
:004335E1 8B8D64FFFFFF mov ecx, dword
ptr [ebp+FFFFFF64]
:004335E7 6A01
push 00000001
* Possible StringData Ref from Code Obj ->"WWriteLine"
|
:004335E9 6840664100 push 00416640
:004335EE 894A04
mov dword ptr [edx+04], ecx
:004335F1 8D4D90
lea ecx, dword ptr [ebp-70]
:004335F4 51
push ecx
:004335F5 C7857CFFFFFF00000000 mov dword ptr [ebp+FFFFFF7C], 00000000
:004335FF 894208
mov dword ptr [edx+08], eax
:00433602 8B856CFFFFFF mov eax, dword
ptr [ebp+FFFFFF6C]
:00433608 89420C
mov dword ptr [edx+0C], eax
* Reference To: MSVBVM60.__vbaObjVar, Ord:0000h
|
:0043360B FF151C114000 Call dword ptr
[0040111C]
:00433611 50
push eax
* Reference To: MSVBVM60.__vbaLateMemCall, Ord:0000h
|
:00433612 FF1514124000 Call dword ptr
[00401214]
:00433618 83C41C
add esp, 0000001C
:0043361B 8D8D70FFFFFF lea ecx, dword
ptr [ebp+FFFFFF70]
* Reference To: MSVBVM60.__vbaFreeObj, Ord:0000h
|
:00433621 FF1598124000 Call dword ptr
[00401298]
:00433627 8D8D60FFFFFF lea ecx, dword
ptr [ebp+FFFFFF60]
* Reference To: MSVBVM60.__vbaFreeVar, Ord:0000h
|
:0043362D FF151C104000 Call dword ptr
[0040101C]
:00433633 8B17
mov edx, dword ptr [edi]
:00433635 57
push edi
:00433636 FF9204030000 call dword ptr
[edx+00000304]
:0043363C 50
push eax
:0043363D 8D8570FFFFFF lea eax, dword
ptr [ebp+FFFFFF70]
:00433643 50
push eax
:00433644 FFD3
call ebx
:00433646 8BF0
mov esi, eax
:00433648 8D957CFFFFFF lea edx, dword
ptr [ebp+FFFFFF7C]
:0043364E 52
push edx
:0043364F 56
push esi
:00433650 8B0E
mov ecx, dword ptr [esi]
:00433652 FF91A0000000 call dword ptr
[ecx+000000A0]
:00433658 85C0
test eax, eax
:0043365A DBE2
fclex
:0043365C 7D12
jge 00433670
:0043365E 68A0000000 push 000000A0
* Possible StringData Ref from Code Obj ->"N?f??"
|
:00433663 68DC644100 push 004164DC
:00433668 56
push esi
:00433669 50
push eax
* Reference To: MSVBVM60.__vbaHresultCheckObj, Ord:0000h
|
:0043366A FF156C104000 Call dword ptr
[0040106C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043365C(C)
|
:00433670 83EC10
sub esp, 00000010
:00433673 8B857CFFFFFF mov eax, dword
ptr [ebp+FFFFFF7C]<-將你的註冊碼(你輸入的假碼)送入eax,準備寫如reguser.mcm。我們把它改成[ebp-50](真正註冊碼的記憶體地址)
:00433679 8BD4
mov edx, esp
:0043367B B908000000 mov ecx,
00000008
:00433680 898D60FFFFFF mov dword ptr
[ebp+FFFFFF60], ecx
:00433686 898568FFFFFF mov dword ptr
[ebp+FFFFFF68], eax
:0043368C 890A
mov dword ptr [edx], ecx
:0043368E 8B8D64FFFFFF mov ecx, dword
ptr [ebp+FFFFFF64]
:00433694 6A01
push 00000001
* Possible StringData Ref from Code Obj ->"WWriteLine"
|
:00433696 6840664100 push 00416640
:0043369B 894A04
mov dword ptr [edx+04], ecx
:0043369E 8D4D90
lea ecx, dword ptr [ebp-70]
:004336A1 51
push ecx
:004336A2 C7857CFFFFFF00000000 mov dword ptr [ebp+FFFFFF7C], 00000000
:004336AC 894208
mov dword ptr [edx+08], eax
:004336AF 8B856CFFFFFF mov eax, dword
ptr [ebp+FFFFFF6C]
:004336B5 89420C
mov dword ptr [edx+0C], eax
總結:由於這程式有CRC校驗,所以我們用記憶體補丁(我懶^_^)
附上RPP檔案:
O=cr-ecardiy.exe:
F=ecardiy.exe:
p=433387/8b,85,7c,ff,ff,ff/8b,45,b0,90,90,90:
p=433673/8b,85,7c,ff,ff,ff/8b,45,b0,90,90,90:
$
jieao[CCG] 2001.8.11
標 題:<音樂賀卡工場4.10>註冊。 (71字)
發信人:CrackerABC[BCG]
時 間:2001-8-10 21:15:06
詳細資訊:
bpx 433390 do "d ecx"
這可是為了給外面的老婆做賀卡的時候跟的,很簡單。
相關文章
- 破解音樂賀卡廠4.04,註冊碼也可用於4.10,高手勿進 (1千字)2001-08-14
- 音樂賀卡廠2000Ver2.60破解 (1千字)2000-09-14
- 蒙泰5.0加密狗破解過程 (6千字)2001-10-11加密
- 《伊妹捕神中文版》 破解過程詳解 (6千字)2001-04-29
- 交作業了!!!!!!PECompact1.48破解過程 (6千字)2001-06-26
- OICQ HACK 1.0 破解過程 (9千字)2001-04-23
- Nullz CrackMe 1.1破解過程 (13千字)2001-09-18Null
- WebTimeSync 5.2.0 破解過程 (14千字)2001-10-05Web
- dfx V4.0破解過程 (10千字)2000-09-24
- 破解過程-----請多多指教 (2千字)2000-12-31
- 電腦字型秀破解過程 (1千字)2001-03-18
- webeasymail的簡單破解過程 (2千字)2001-08-04WebAI
- Kryptel 3.8 暴力破解過程 (18千字)2001-09-18
- PUZZLER1.20破解過程 (4千字)2002-01-26
- SuperCleaner2.30破解過程 (11千字)2002-02-04
- Password Keeper v6.3破解過程 (8千字)2002-04-12
- post NOW! 破解過程!有意思。 (1千字)2000-12-30
- 有聲有色3.33破解過程 (4千字)2001-02-09
- 專業掃雷 1.2破解過程 (4千字)2001-02-17
- fulldisk A32 破解過程!(簡單) (1千字)2001-03-20
- 具體的破解過程來也! (10千字)2001-04-21
- 密碼大師4.0破解過程 (3千字)2001-05-06密碼
- EmEditor v3.16破解過程 (9千字)2001-07-22
- 對VCDCUT 4.03的分析破解過程 (18千字)2001-08-08
- 木馬克星5.33.60破解過程
(9千字)2002-03-28
- GaitCD破解全過程(installshield) (3千字)2015-11-15AI
- KEYGENNING4NEWBIES #7破解過程+序號產生器 (6千字)2001-08-21
- 加密精靈V2.2破解過程 (9千字)2001-10-28加密
- 破解 OverNimble Localize Plus 1.04
全過程! (13千字)2015-11-15
- 我終於破解了魔裝網神了,破解過程!!,不過是用2.70破解的。 (1千字)2001-10-15
- 如何破解Bestofware SmartUI Activex 所有版本。(過程)
(5千字)2000-12-31UI
- PassWD2000破解過程~~~轉貼~~~~~~ (11千字)2001-10-10
- PowerArchiver破解過程。2015-11-15Hive
- 暴力破解3 (6千字)2001-02-18
- Registry Crawler 4.0.0.3破解 (6千字)2002-02-28
- 破解<<破解堅盾磁碟加密系統 V4.0>>的全過程 (10千字)2001-10-23加密
- supercleaner 2.0 超酷的系統清潔工具破解過程!
(3千字)2001-03-23
- Don't Panic 3.2的破解過程(俺是新手) (3千字)2001-05-15