飄雪動畫秀3.02註冊演算法分析! (11千字)
[作 者]:bartchen
[時 間]:2002-12-11
[軟 件]:飄雪動畫秀3.02
[軟體簡介]:用於製作GIF動畫的,還可以最佳化你現有的GIF圖片,可輸出GIF圖片並且可以支援
輸出AVI。做頭像logo特別好。
[下 載]:《軟體王》2002.12期上面的,不知道哪裡有下載。
[保護方式]:使用者名稱,註冊碼
[破解工具]:trw2000
要註冊,也不知道網上有沒有,搞定它先!!
加過殼的,姑且不理它,用trw2000下bpx hmemcpy,pmodule很容易就到了這裡。
*
Possible Reference to Dialog: DialogID_0064
|
:00431979 6A64
push 00000064
:0043197B 52
push edx
* Possible Reference to
Dialog: DialogID_0091, CONTROL_ID:0450, ""
|
:0043197C 6850040000 push
00000450
:00431981 56
push esi
:00431982 FFD7
call edi <<--獲得使用者名稱
:00431984
50
push eax
:00431985 FFD3
call ebx <<--獲得註冊碼
:00431987 8D8424C4000000
lea eax, dword ptr [esp+000000C4]
:0043198E 8D4C2460
lea ecx, dword ptr [esp+60]
:00431992 50
push eax
:00431993 51
push ecx
:00431994 E8F7FBFFFF
call 00431590 <<--有關比較的call,進去看看
:00431999 83C408
add esp, 00000008
:0043199C 85C0
test eax, eax
:0043199E 0F84AD000000
je 00431A51 <<--跳就完蛋
:004319A4 8D542410
lea edx, dword ptr [esp+10]
:004319A8 8D44240C lea
eax, dword ptr [esp+0C]
:004319AC 52
push edx
:004319AD 50
push eax
:004319AE
6A00 push
00000000
:004319B0 683F000F00
push 000F003F
:004319B5 6A00
push 00000000
:004319B7 6814ED4400
push 0044ED14
:004319BC 6A00
push 00000000
………………………………………………………………………………………………………………
* Referenced by a CALL at Addresses:
|:004316D9 , :00431994
|
:00431590 53
push ebx
:00431591
55
push ebp
:00431592 8B6C2410
mov ebp, dword ptr [esp+10]
:00431596 56
push esi
:00431597 57
push edi
:00431598 807D006D
cmp byte ptr [ebp+00], 6D
:0043159C 0F85A0000000
jne 00431642 <<--第一位是否為m?
:004315A2 807D0167
cmp byte ptr [ebp+01], 67
:004315A6 0F8596000000 jne 00431642
<<--第二位是否為g?
:004315AC 807D0233
cmp byte ptr [ebp+02], 33
:004315B0 0F858C000000
jne 00431642 <<--第三位是否為3?
:004315B6
807D0337 cmp byte ptr [ebp+03],
37
:004315BA 0F8582000000 jne 00431642
<<--第四位是否為7?
:::::
:::::
:::::
* Referenced by
a (U)nconditional or (C)onditional Jump at Address:
|:004315EC(C)
|
:004315EF 83C507
add ebp, 00000007
:004315F2 55
push ebp
:004315F3 E8D0DD0000
call 0043F3C8 <<--註冊碼換算的call,跟進去
:004315F8 8B542418 mov
edx, dword ptr [esp+18]
:004315FC 83C404
add esp, 00000004
:004315FF 8BFA
mov edi, edx
:00431601
33C9 xor
ecx, ecx
:00431603 8A12
mov dl, byte ptr [edx]
:00431605 BEDF0B0000
mov esi, 00000BDF <<--基數
:0043160A
84D2 test
dl, dl <<--是否算完?
:0043160C 7426
je 00431634
* Referenced by a (U)nconditional
or (C)onditional Jump at Address:
|:00431632(C)
|
:0043160E 0FBED2
movsx edx, dl //下面幾行是使用者的演算法
:00431611 41
inc ecx
:00431612 0FAFD1
imul edx, ecx <<--按位相乘
:00431615
03F2 add
esi, edx <<--加到esi
:00431617 81FEBE170000
cmp esi, 000017BE <<--大於則減去
:0043161D
7E06 jle
00431625
:0043161F 81EEBE170000
sub esi, 000017BE
* Referenced by a (U)nconditional or (C)onditional
Jump at Address:
|:0043161D(C)
|
:00431625 83F90A
cmp ecx, 0000000A <<--使用者名稱16位後,重複演算法
:00431628 7E02
jle 0043162C
:0043162A 33C9
xor ecx, ecx
* Referenced by a (U)nconditional
or (C)onditional Jump at Address:
|:00431628(C)
|
:0043162C 8A5701
mov dl, byte ptr [edi+01]
<<--到下一位
:0043162F 47
inc edi
:00431630 84D2
test dl, dl
:00431632 75DA
jne 0043160E
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043160C(C)
|
:00431634 3BF0
cmp esi, eax <<--比較結果是否一致
:00431636
750A jne
00431642 <<--改這裡可以爆破^_^
:00431638 5F
pop edi
:00431639 5E
pop esi
:0043163A 5D
pop ebp
:0043163B B801000000
mov eax, 00000001
:00431640 5B
pop ebx
:00431641 C3
ret
*
Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0043159C(C),
:004315A6(C), :004315B0(C), :004315BA(C), :004315DB(C)
|:00431636(C)
|
:00431642 5F
pop edi
:00431643 5E
pop esi
:00431644 5D
pop ebp
:00431645
33C0 xor
eax, eax
:00431647 5B
pop ebx
:00431648 C3
ret
………………………………………………………………………………………………………………
* Referenced by a CALL at Addresses:
|:0041120C , :00411243
, :004112BE , :0041146A , :004114A8
|:00411530 ,
:0041247C , :004124C2 , :004124E5 , :0043136F
|:004315F3
, :004355AA , :0043A7AC , :0043AB1C
|
:0043F3C8 FF742404
push [esp+04]
:0043F3CC
E86CFFFFFF call 0043F33D
<<--還得再跟進去
:0043F3D1 59
pop ecx
:0043F3D2 C3
ret
………………………………………………………………………………………………………………
* Referenced by a CALL at Addresses:
|:0043F3CC , :004465BE
, :004465EC , :00446617
|
:0043F33D 53
push ebx
:0043F33E
55
push ebp
:0043F33F 56
push esi
:0043F340 57
push edi
:0043F341 8B7C2414
mov edi, dword ptr [esp+14]
<<--跳過中間3位註冊碼
* Referenced by a (U)nconditional or (C)onditional
Jump at Address:
|:0043F371(U)
|
:0043F345 833D4CE2440001
cmp dword ptr [0044E24C], 00000001
:0043F34C
7E0F jle
0043F35D <<--正常情況就跳
:0043F34E 0FB607
movzx eax, byte ptr [edi]
:0043F351 6A08
push 00000008
:0043F353 50
push eax
:0043F354 E816230000
call 0044166F
:0043F359 59
pop ecx
:0043F35A 59
pop ecx
:0043F35B
EB0F jmp
0043F36C
* Referenced by a (U)nconditional or (C)onditional Jump at
Address:
|:0043F34C(C)
|
:0043F35D 0FB607
movzx eax, byte ptr [edi]
* Possible
StringData Ref from Data Obj ->" (((((
"
->" H"
|
:0043F360 8B0D40E04400 mov ecx,
dword ptr [0044E040]
:0043F366 8A0441
mov al, byte ptr [ecx+2*eax] <<--跟據輸入註冊碼的ascii碼換算
:0043F369 83E008
and eax, 00000008
* Referenced by a (U)nconditional or (C)onditional
Jump at Address:
|:0043F35B(U)
|
:0043F36C 85C0
test eax, eax
:0043F36E
7403 je 0043F373
<<--跳走
:0043F370 47
inc edi
:0043F371 EBD2
jmp 0043F345
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0043F36E(C)
|
:0043F373 0FB637
movzx esi, byte ptr [edi]
:0043F376 47
inc edi
:0043F377 83FE2D
cmp esi, 0000002D <<--肯定不相等
:0043F37A 8BEE
mov ebp, esi
:0043F37C 7405
je 0043F383
:0043F37E 83FE2B
cmp esi, 0000002B <<--肯定不相等
:0043F381 7504
jne 0043F387
* Referenced by a (U)nconditional or (C)onditional Jump
at Address:
|:0043F37C(C)
|
:0043F383 0FB637
movzx esi, byte ptr [edi]
:0043F386
47
inc edi
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043F381(C)
|
:0043F387 33DB
xor ebx, ebx <<--初始化
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043F3B8(U)
|
:0043F389 833D4CE2440001 cmp dword
ptr [0044E24C], 00000001
:0043F390 7E0C
jle 0043F39E <<--從程式裡看是一定要跳的
:0043F392 6A04
push 00000004
:0043F394 56
push esi
:0043F395 E8D5220000
call 0044166F
:0043F39A 59
pop ecx
:0043F39B
59
pop ecx
:0043F39C EB0B
jmp 0043F3A9
* Referenced by a (U)nconditional or (C)onditional
Jump at Address:
|:0043F390(C)
|
* Possible StringData Ref
from Data Obj ->" (((((
"
->" H"
|
:0043F39E
A140E04400 mov eax, dword ptr
[0044E040]
:0043F3A3 8A0470
mov al, byte ptr [eax+2*esi]
:0043F3A6 83E004
and eax, 00000004
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043F39C(U)
|
:0043F3A9 85C0
test eax, eax <<--和上面3個命令一起判斷註冊碼是否為數字
:0043F3AB
740D je 0043F3BA
:0043F3AD 8D049B
lea eax, dword ptr [ebx+4*ebx]
:0043F3B0 8D5C46D0
lea ebx, dword ptr [esi+2*eax-30]
:0043F3B4 0FB637
movzx esi, byte ptr [edi]
:0043F3B7 47
inc edi <<--上面幾個命令把輸入的ascii碼化為10進位制數
:0043F3B8 EBCF
jmp 0043F389
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043F3AB(C)
|
:0043F3BA 83FD2D
cmp ebp, 0000002D
:0043F3BD 8BC3
mov eax, ebx <<--結果儲存到eax
:0043F3BF 7502
jne 0043F3C3
:0043F3C1 F7D8
neg eax
* Referenced by a (U)nconditional
or (C)onditional Jump at Address:
|:0043F3BF(C)
|
:0043F3C3 5F
pop edi
:0043F3C4 5E
pop esi
:0043F3C5 5D
pop ebp
:0043F3C6 5B
pop ebx
:0043F3C7
C3
ret
終於搞定了,順便貼個c語言的序號產生器
//keygen for 飄雪動畫秀3.0.2
#include "stdio.h"
main()
{
unsigned char a[16];
int
d,i,bbbb;
int eesi=3039;
printf("This keygen is made by Bartchen\nPlease
input your name : ");
gets(a);
d=strlen(a);
printf("Your
Register code is : ");
for(i=0;i<d;i++)
{
bbbb=a[i];
eesi=eesi+bbbb*(i+1);
if(eesi>6078)
{eesi=eesi-6078;}
}
printf("mg37xxx");
printf("%ld",eesi);
printf("\nPress
Enter key to exit");
gets(a);
}
唉,天快亮了!不睡覺了,直接看“魔電”吧,要不然就掛了。
Bartchen (for everyone)
相關文章
- 〖網際營銷〗V2.4 註冊演算法分析 (11千字)2001-11-03演算法
- FolderView 1.7
註冊演算法分析 (14千字)2015-11-15View演算法
- 重新貼過註冊演算法分析 (16千字)2001-10-23演算法
- 有聲有色4.0註冊演算法 一 (11千字)2001-05-01演算法
- EffeTech HTTP Sniffer 3.2註冊演算法分析 (5千字)2002-06-24HTTP演算法
- Green Tea 2.60註冊碼演算法分析 (3千字)2000-07-17演算法
- 檔案密使2.6註冊碼分析詳解 (11千字)2001-11-30
- SuperCleaner 2.31註冊碼演算法分析 - OCG (13千字)2002-04-02演算法
- Registry Crawler 4.0註冊碼演算法分析 - OCG
(20千字)2002-04-07演算法
- UltraEdit-32
10註冊碼演算法分析 (19千字)2003-05-17演算法
- 完美解除安裝6.0註冊演算法分析 (2千字)2002-02-27演算法
- Directory Scanner v1.5 註冊演算法分析 (6千字)2015-11-15演算法
- MouseStar V3.01註冊演算法分析 (18千字)2015-11-15演算法
- **********.exe註冊碼演算法分析--高手莫笑 (31千字)2015-11-15演算法
- Cleaner 3.2註冊分析 (18千字)2001-12-09
- 註冊碼演算法 (2千字)2001-01-14演算法
- 盲打之友V2.5破解(包括註冊演算法) (11千字)2001-10-29演算法
- supercleaner註冊演算法分析2015-11-15演算法
- Screen Demo Maker
V3.0註冊演算法分析 (8千字)2002-09-10演算法
- Konvertor 3.03的註冊碼演算法模組的分析
(7千字)2015-11-15演算法
- Magic convertor 2.8註冊碼演算法分析
- OCG (9千字)2015-11-15演算法
- CoolClock V1.02註冊演算法分析 ---OCG (14千字)2015-11-15演算法
- 財智證券結算軟體2.5 破解註冊碼分析!使用ollydbg 破解註冊動畫!高手莫入! (1千字)2001-11-20動畫
- 《TxEdit 4.6》的註冊碼破解 (11千字)2001-07-28
- ClockWise 3.22e註冊碼演算法分析 - OCG (17千字)2002-04-10演算法
- GSview V4.12 for Windows註冊演算法分析 -
OCG (8千字)2015-11-15ViewWindows演算法
- EZ MP3 Recorder 1.15 註冊演算法分析 (14千字)2015-11-15演算法
- 一個區域網工具的註冊演算法分析
(5千字)2015-11-15演算法
- SpeedFlash註冊演算法分析(VB)2015-11-15演算法
- 財智老闆通3.04註冊版---註冊演算法分析2003-03-16演算法
- Instant Source 註冊演算法分析+註冊器原始碼2015-11-15演算法原始碼
- 看雪學院《註冊協議》2016-11-28協議
- S-DEMO2 註冊分析 (14千字)2002-06-25
- DreamWaver3.0註冊流程分析 (17千字)2001-09-10
- CDSpace Power+註冊演算法 (7千字)2001-07-27演算法
- 《棋隱》的註冊演算法 (19千字)2001-08-26演算法
- Diskbase 5.11的破解和註冊演算法(俺是新手) (18千字)2001-05-21演算法
- Search32-PRO
v6.05註冊演算法分析 - OCG (46千字)2002-04-07演算法