desksaver 破解教程
【破解作者】 cracklover
【作者郵箱】 cracklover@126.com
【使用工具】 W32dasm ds2.7
【破解平臺】 Win9x/NT/2000/XP
【軟體名稱】 Easy Desktop Keeper
【下載地址】 http://www.softheap.com/desksaver.html
或 http://www.softheap.com/download/desksaver.zip
【軟體簡介】 此軟體是英文的,兄弟也看不太懂,意思好象是管理桌面的,幾乎囊括了桌面的所有功能設定,並且能按你老大的意思,儲存幾種不同的桌面!
【軟體大小】 1,161K
【加殼方式】 無殼
【破解宣告】 我是一隻小菜鳥,偶得一點心得,願與大家分享:)
--------------------------------------------------------------------------------
【破解內容】
根據註冊錯誤資訊提示,很容易找到如下程式碼:
:0049026C 6A00 push 00000000
:0049026E 6A00 push 00000000
:00490270 49 dec ecx
:00490271 75F9 jne 0049026C
:00490273 51 push ecx
:00490274 53 push ebx
:00490275 56 push esi
:00490276 8BF0 mov esi, eax
:00490278 33C0 xor eax, eax
:0049027A 55 push ebp
:0049027B 68E9034900 push 004903E9
:00490280 64FF30 push dword ptr fs:[eax]
:00490283 648920 mov dword ptr fs:[eax], esp
:00490286 8D55F4 lea edx, dword ptr [ebp-0C]
:00490289 8B8644030000 mov eax, dword ptr [esi+00000344]
:0049028F E8FC4DFCFF call 00455090
:00490294 8B45F4 mov eax, dword ptr [ebp-0C]
:00490297 8D55F8 lea edx, dword ptr [ebp-08]
:0049029A E8B5CDFEFF call 0047D054
:0049029F 8B55F8 mov edx, dword ptr [ebp-08]
:004902A2 B824914900 mov eax, 00499124
:004902A7 E8303FF7FF call 004041DC
:004902AC E8DBFDFFFF call 0049008C
{
:0049008C 53 push ebx
:0049008D 56 push esi
:0049008E 57 push edi
:0049008F BF24914900 mov edi, 00499124
:00490094 33F6 xor esi, esi //ESI清零!下面用到!
:00490096 33DB xor ebx, ebx
:00490098 8B07 mov eax, dword ptr [edi] //EAX指向註冊碼!
:0049009A E8A943F7FF call 00404448 //取註冊碼長度
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0049002E(C)
|
:0049009F 83F80E cmp eax, 0000000E //長度是否為14,否則OVER!
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0049002C(C)
|
:004900A2 7567 jne 0049010B
:004900A4 8B07 mov eax, dword ptr [edi] //EAX指向註冊碼!
:004900A6 803833 cmp byte ptr [eax], 33 //第一位是否為3
:004900A9 0F94C0 sete al //上面相等則設定AL為1
:004900AC 83E07F and eax, 0000007F //7F也就是二進位制的1111111
:004900AF 03F0 add esi, eax //將得到的結果加到ESI,表示一個條件滿足
:004900B1 8B07 mov eax, dword ptr [edi]
:004900B3 80780233 cmp byte ptr [eax+02], 33 //第三位是否為3
:004900B7 0F94C0 sete al
:004900BA 83E07F and eax, 0000007F
:004900BD 03F0 add esi, eax
:004900BF 8B07 mov eax, dword ptr [edi]
:004900C1 80780339 cmp byte ptr [eax+03], 39 //第四位是否為9
:004900C5 0F94C0 sete al
:004900C8 83E07F and eax, 0000007F
:004900CB 03F0 add esi, eax
:004900CD 8B07 mov eax, dword ptr [edi]
:004900CF 80780430 cmp byte ptr [eax+04], 30 //第五位是否為0
:004900D3 0F94C0 sete al
:004900D6 83E07F and eax, 0000007F
:004900D9 03F0 add esi, eax
:004900DB 8B07 mov eax, dword ptr [edi]
:004900DD 80780738 cmp byte ptr [eax+07], 38 //第八位是否為8
:004900E1 0F94C0 sete al
:004900E4 83E07F and eax, 0000007F
:004900E7 03F0 add esi, eax
:004900E9 8B07 mov eax, dword ptr [edi]
:004900EB 80780838 cmp byte ptr [eax+08], 38 //第九位是否為8
:004900EF 0F94C0 sete al
:004900F2 83E07F and eax, 0000007F
:004900F5 03F0 add esi, eax
:004900F7 8B07 mov eax, dword ptr [edi]
:004900F9 80780A32 cmp byte ptr [eax+0A], 32 //第十一位是否為2
:004900FD 0F94C0 sete al
:00490100 83E07F and eax, 0000007F
:00490103 03F0 add esi, eax
:00490105 83FE07 cmp esi, 00000007 //以上7個條件全滿足的話,ESI=7
:00490108 0F94C3 sete bl //ESI=7則設定BL為1,則註冊成功!
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004900A2(C)
|
:0049010B 8BC3 mov eax, ebx //將EBX傳入EAX,準備返回!
:0049010D 5F pop edi
:0049010E 5E pop esi
:0049010F 5B pop ebx
:00490110 C3 ret
}
:004902B1 8BD8 mov ebx, eax
:004902B3 84DB test bl, bl
:004902B5 0F84DC000000 je 00490397
此處跳往出錯框!BL為比較旗!那上面的兩個CALL肯定有問題,得追進看看,
經分析,第二個CALL有問題,將其內容列到上面。
下面的幾個字串把我著實嚇了一跳,以為又是什麼RSA防破解的呢,後來一分析,
此處的跳轉若不跳的話,後面程式怎麼執行都會經過註冊成功的地方,所以往下就不用分析了!
:004902BB C6866403000001 mov byte ptr [esi+00000364], 01
:004902C2 8D45FC lea eax, dword ptr [ebp-04]
:004902C5 50 push eax
:004902C6 8D55F0 lea edx, dword ptr [ebp-10]
* Possible StringData Ref from Code Obj ->"AC95829F829D9994ABAABF8A8BBF82838982A895"
|
:004902C9 B800044900 mov eax, 00490400
:004902CE E89D44FFFF call 00484770
:004902D3 8B45F0 mov eax, dword ptr [ebp-10]
:004902D6 50 push eax
:004902D7 8D55EC lea edx, dword ptr [ebp-14]
* Possible StringData Ref from Code Obj ->"BE828B999A8C9F88B1A0848E9F829E828B99B1A9BFA0BF"
->"BEB5"
|
:004902DA B834044900 mov eax, 00490434
:004902DF E88C44FFFF call 00484770
:004902E4 8B55EC mov edx, dword ptr [ebp-14]
:004902E7 A12C914900 mov eax, dword ptr [0049912C]
:004902EC 59 pop ecx
:004902ED E8865AFFFF call 00485D78
:004902F2 8D55E8 lea edx, dword ptr [ebp-18]
:004902F5 A124914900 mov eax, dword ptr [00499124]
:004902FA E8D543FFFF call 004846D4
:004902FF 8B45E8 mov eax, dword ptr [ebp-18]
:00490302 50 push eax
:00490303 8D55E4 lea edx, dword ptr [ebp-1C]
* Possible StringData Ref from Code Obj ->"BE9E95A99F95AFAFBC8E95BEBEBF"
|
:00490306 B870044900 mov eax, 00490470
:0049030B E86044FFFF call 00484770
:00490310 8B45E4 mov eax, dword ptr [ebp-1C]
:00490313 50 push eax
:00490314 8D45E0 lea eax, dword ptr [ebp-20]
:00490317 50 push eax
* Possible StringData Ref from Code Obj ->"BE828B999A8C9F88B1A0848E9F829E828B99B1A9BFA0BF"
->"BEB5"
|
:00490318 B834044900 mov eax, 00490434
:0049031D 5A pop edx
:0049031E E84D44FFFF call 00484770
:00490323 8B55E0 mov edx, dword ptr [ebp-20]
:00490326 A12C914900 mov eax, dword ptr [0049912C]
:0049032B 59 pop ecx
:0049032C E8EB5AFFFF call 00485E1C
:00490331 837DFC00 cmp dword ptr [ebp-04], 00000000
:00490335 7546 jne 0049037D
:00490337 E808A4F7FF call 0040A744
:0049033C 83C4F4 add esp, FFFFFFF4
:0049033F DB3C24 fstp tbyte ptr [esp]
:00490342 9B wait
:00490343 8D45DC lea eax, dword ptr [ebp-24]
:00490346 E8B59EF7FF call 0040A200
:0049034B 8B45DC mov eax, dword ptr [ebp-24]
:0049034E 50 push eax
:0049034F 8D55D8 lea edx, dword ptr [ebp-28]
* Possible StringData Ref from Code Obj ->"AC95829F829D9994ABAABF8A8BBF82838982A895"
|
:00490352 B800044900 mov eax, 00490400
:00490357 E81444FFFF call 00484770
:0049035C 8B45D8 mov eax, dword ptr [ebp-28]
:0049035F 50 push eax
:00490360 8D45D4 lea eax, dword ptr [ebp-2C]
:00490363 50 push eax
* Possible StringData Ref from Code Obj ->"BE828B999A8C9F88B1A0848E9F829E828B99B1A9BFA0BF"
->"BEB5"
|
:00490364 B834044900 mov eax, 00490434
:00490369 5A pop edx
:0049036A E80144FFFF call 00484770
:0049036F 8B55D4 mov edx, dword ptr [ebp-2C]
:00490372 A12C914900 mov eax, dword ptr [0049912C]
:00490377 59 pop ecx
:00490378 E89F5AFFFF call 00485E1C
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00490335(C)
|
:0049037D 6A40 push 00000040
* Possible StringData Ref from Code Obj ->"Information"
|
:0049037F B990044900 mov ecx, 00490490
* Possible StringData Ref from Code Obj ->"Registration has been completed "
->"successfully!"
|
:00490384 BA9C044900 mov edx, 0049049C
:00490389 A1F8744900 mov eax, dword ptr [004974F8]
:0049038E 8B00 mov eax, dword ptr [eax]
:00490390 E81B55FEFF call 004758B0
:00490395 EB22 jmp 004903B9
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004902B5(C)
|
:00490397 B824914900 mov eax, 00499124
:0049039C E8E73DF7FF call 00404188
:004903A1 6A10 push 00000010
* Possible StringData Ref from Code Obj ->"Error" //錯誤資訊框出現!
|
:004903A3 B9CC044900 mov ecx, 004904CC
* Possible StringData Ref from Code Obj ->"Registration code is invalid!"
|
:004903A8 BAD4044900 mov edx, 004904D4
:004903AD A1F8744900 mov eax, dword ptr [004974F8]
:004903B2 8B00 mov eax, dword ptr [eax]
:004903B4 E8F754FEFF call 004758B0
--------------------------------------------------------------------------------
【破解總結】
註冊碼必須為14位,其中:
並且第一、三、四、五位分別必須為3,3,9,0;
第八、九、十一位分別必須為8,8,2;其餘的隨便,補齊14位就可!
即:3X3390X88X2XXX,X可為任一字母或數字。
這應該是我等菜鳥的學習的經典破解軟體,註冊碼比對簡單,流程清晰。
--------------------------------------------------------------------------------
【版權宣告】 本文純屬技術交流, 轉載請註明作者並保持文章的完整, 謝謝!
相關文章
- IDEA破解教程2018-09-26Idea
- Navicat 破解版下載,Navicat破解教程2021-10-12
- kali暴力破解教程2015-04-05
- IntelliJ IDEA 破解教程2019-06-19IntelliJIdea
- Charles破解與抓包教程2018-10-25
- 破解無線WPA密碼 教程2012-08-15密碼
- Camtasia
Studio Version 2.1破解教程2004-11-02
- 自動精靈 2.00 破解教程2004-12-17
- WinBoost 2000 Gold 破解教程2015-11-15Go
- GoLand 2020.1.3破解教程2020-07-07GoLand
- 破解教程之手脫UPX的DLL2019-05-11
- Studio 3T for MongoDB 破解教程2019-04-29MongoDB
- Navicat Premium 16 下載與安裝破解教程(詳細教程)2022-05-07REM
- 爬蟲進階教程:極驗(GEETEST)驗證碼破解教程2018-12-24爬蟲
- SecureCRT For Mac 7.3.0破解版安裝教程、2018-11-09SecurecrtMac
- mac Charles v4.0.2詳細破解教程2016-12-18Mac
- network
spy eval 1.6破解教程【原創】2004-12-26
- Soundnailsd的破解教程(一) (9千字)2001-10-17AI
- Delphi元件破解教程(一)
(3千字)2015-11-15元件
- 是男人就上120層破解教程2015-11-15
- 黃金記憶體
V3.1 破解教程2004-12-13記憶體
- 解除安裝精靈 V4.1 破解教程2004-12-18
- crackme破解教程(續) (高手莫入) (2千字)2001-03-17
- 最新最全的史上最簡單的IDEA破解教程(破解到2100年)2019-03-14Idea
- 最新Turbo Boost Switcher Pro補丁破解版 Turbo Boost Switcher Pro破解安裝教程2023-09-25
- mac版office破解版安裝教程,office for mac2023-04-26Mac
- HoudahSpot 破解補丁最新 HoudahSpot 中文 for Mac安裝教程2024-01-15Mac
- 一臺電視盒子共享多臺電視破解方法教程2016-07-20
- IDEA2018無期限永久破解教程2019-03-15Idea
- Acrobat Pro DC 2021破解版安裝教程2021-02-28BAT
- IntelliJ IDEA 永久破解啟用教程(親測有效)2022-02-13IntelliJIdea
- 轉載一篇破解教程(LeapFTP) (10千字)2001-03-29FTP
- 一篇破解教程-----面向初學者 (15千字)2001-04-01
- Altium Designer 21.x中文版安裝破解教程2021-08-01
- Photoshop CC 2018 軟體安裝包+破解教程2023-11-01
- Android逆向之旅--瘋狂兔子無敵跑跑 內購破解教程2018-05-28Android
- 有聲有色 v3.16破解教程 (6千字)2000-10-03
- myeclipse-2017-ci-10(含安裝檔案、破解檔案、破解步驟和使用教程)2018-06-14Eclipse