献给所有爱好破解的初学者的Crackme - by 破解爱好者
一个教久前的Crackme,看雪论坛上找的,大家玩玩,就当练手! 恭喜你! 飘过,丢个注册机;
;不懂算法的keygen模版,欢迎随便修改
;
.386
.model flat,stdcall
option casemap:none
include \masm32\include\windows.inc
include \masm32\include\kernel32.inc
include \masm32\include\user32.inc
include \masm32\include\comctl32.inc
includelib \masm32\lib\user32.lib
includelib \masm32\lib\kernel32.lib
includelib \masm32\lib\comctl32.lib
dlgproc proto :DWORD,:DWORD,:DWORD,:DWORD
.const
.data
szName db 020h dup (0)
szSerial db 020h dup (0)
len dd 0
.data?
hInstance dd ?
.code
start:
invoke GetModuleHandle,NULL
mov hInstance,eax
invoke DialogBoxParam,eax,101,NULL,offset dlgproc,0
invoke ExitProcess,NULL
dlgproc proc hWnd:DWORD,wMsg:DWORD,wParam:DWORD,lParam:DWORD
moveax,wMsg
.ifeax == WM_CLOSE
invokeEndDialog,hWnd,NULL
.elseifeax == WM_INITDIALOG
invoke LoadIcon,hInstance,1
invoke SendMessage,hWnd,WM_SETICON,0,eax
.elseifeax == WM_COMMAND
moveax,wParam
.ifeax == 1002
invokeGetDlgItemText,hWnd,1000,addr szName,11h
mov len,eax
xor ecx,ecx
.while ecx<len
movsx edx,byte ptr ds:
inc ecx
mov eax,ecx
imul eax,eax,8
xor edx,eax
mov eax,len
sub eax,ecx
mov byte ptr ds:,dl
.endw
mov byte ptr ds:,0h
invoke SetDlgItemText,hWnd,1001,addr szSerial
.endif
.else
moveax,FALSE
ret
.endif
moveax,TRUE
ret
dlgproc endp
end start 原帖由 不懂算法 于 2007-3-2 04:13 发表
飘过,丢个注册机
;
;不懂算法的keygen模版,欢迎随便修改
;
.386
.model flat,stdcall
option casemap:none
include \masm32\include\windows.inc
include \masm32\include\kernel32.inc
include...
强烈建议 不懂算法 换个名字!~
不懂算法 :=NOT 不懂算法 ; 玩了玩,还不错,很简单的 玩了玩,还不错,可是不简单啊……
一爆就OK
00403100 . /0F84 10010000 je 00403216 一爆就OK="XUHW",你成功了!欢迎你踏入了破解殿堂!/:04 /:04 /:04 /:04 /:04 下下来玩下 不知是不是加了壳的呢??我用PEID查好象没壳 但是OD打开后怎么找不到错误提示的地方呢?
页:
[1]
2