xxxx软件追注册码
Peid:Microsoft Visual C++ 6.0OD载入——查找字符串找到关键位置——F9——注册
用户名:xinldy
产品序列号:111111111111111111111
00404725 .8B55 64 MOV EDX,DWORD PTR SS: 取用户名
...
00404733 .8B45 60 MOV EAX,DWORD PTR SS: 取注册码
...
...
...
004047D0 .8BCE MOV ECX,ESI
004047D2 .C78424 580500>MOV DWORD PTR SS:,0
004047DD .E8 0ED60100 CALL xxxx.00421DF0 算法
004047E2 .8B4424 28 MOV EAX,DWORD PTR SS: 真码出现
004047E6 .85C0 TEST EAX,EAX
004047E8 .75 05 JNZ SHORT xxxx.004047EF
004047EA .B8 9CA94600 MOV EAX,xxxx.0046A99C
004047EF >8B4D 60 MOV ECX,DWORD PTR SS:
004047F2 .50 PUSH EAX
004047F3 .51 PUSH ECX
004047F4 .E8 4CF80200 CALL xxxx.00434045
004047F9 .83C4 08 ADD ESP,8
004047FC .85C0 TEST EAX,EAX
004047FE .0F85 82020000 JNZ xxxx.00404A86
00404804 .8A5424 13 MOV DL,BYTE PTR SS:
00404808 .50 PUSH EAX
00404809 .8D4C24 18 LEA ECX,DWORD PTR SS:
0040480D .885424 18 MOV BYTE PTR SS:,DL
00404811 .E8 3AF0FFFF CALL xxxx.00403850
00404816 .8D7C24 44 LEA EDI,DWORD PTR SS:
0040481A .83C9 FF OR ECX,FFFFFFFF
0040481D .33C0 XOR EAX,EAX
0040481F .6A 01 PUSH 1
00404821 .F2:AE REPNE SCAS BYTE PTR ES:
00404823 .F7D1 NOT ECX
00404825 .49 DEC ECX
00404826 .8BD9 MOV EBX,ECX
00404828 .8D4C24 18 LEA ECX,DWORD PTR SS:
0040482C .53 PUSH EBX
0040482D .E8 2EF1FFFF CALL xxxx.00403960
00404832 .84C0 TEST AL,AL
00404834 .74 22 JE SHORT xxxx.00404858
00404836 .8B7C24 18 MOV EDI,DWORD PTR SS:
0040483A .8BCB MOV ECX,EBX
0040483C .8BC1 MOV EAX,ECX
0040483E .8D7424 44 LEA ESI,DWORD PTR SS:
00404842 .C1E9 02 SHR ECX,2
00404845 .F3:A5 REP MOVS DWORD PTR ES:,DWORD PTR DS>
00404847 .8BC8 MOV ECX,EAX
00404849 .53 PUSH EBX
0040484A .83E1 03 AND ECX,3
0040484D .F3:A4 REP MOVS BYTE PTR ES:,BYTE PTR DS:[>
0040484F .8D4C24 18 LEA ECX,DWORD PTR SS:
00404853 .E8 E8F0FFFF CALL xxxx.00403940
00404858 >8A4C24 13 MOV CL,BYTE PTR SS:
0040485C .6A 00 PUSH 0
0040485E .884C24 38 MOV BYTE PTR SS:,CL
00404862 .8D4C24 38 LEA ECX,DWORD PTR SS:
00404866 .C68424 500500>MOV BYTE PTR SS:,1
0040486E .E8 DDEFFFFF CALL xxxx.00403850
00404873 .BF 78F94700 MOV EDI,xxxx.0047F978 user
00404878 .83C9 FF OR ECX,FFFFFFFF
0040487B .33C0 XOR EAX,EAX
0040487D .F2:AE REPNE SCAS BYTE PTR ES:
0040487F .F7D1 NOT ECX
00404881 .49 DEC ECX
00404882 .51 PUSH ECX
00404883 .68 78F94700 PUSH xxxx.0047F978 user
00404888 .8D4C24 3C LEA ECX,DWORD PTR SS:
0040488C .E8 0FF0FFFF CALL xxxx.004038A0
00404891 .8D5424 14 LEA EDX,DWORD PTR SS:
00404895 .8D4424 34 LEA EAX,DWORD PTR SS:
00404899 .52 PUSH EDX
0040489A .8D4D 68 LEA ECX,DWORD PTR SS:
0040489D .50 PUSH EAX
0040489E .C68424 540500>MOV BYTE PTR SS:,2
004048A6 .E8 05F50000 CALL xxxx.00413DB0
004048AB .6A 01 PUSH 1
004048AD .8D4C24 38 LEA ECX,DWORD PTR SS:
004048B1 .C68424 500500>MOV BYTE PTR SS:,1
004048B9 .E8 92EFFFFF CALL xxxx.00403850
004048BE .6A 01 PUSH 1
004048C0 .8D4C24 18 LEA ECX,DWORD PTR SS:
004048C4 .C68424 500500>MOV BYTE PTR SS:,0
004048CC .E8 7FEFFFFF CALL xxxx.00403850
004048D1 .8A4C24 13 MOV CL,BYTE PTR SS:
004048D5 .6A 00 PUSH 0
004048D7 .884C24 18 MOV BYTE PTR SS:,CL
004048DB .8D4C24 18 LEA ECX,DWORD PTR SS:
004048DF .E8 6CEFFFFF CALL xxxx.00403850
004048E4 .BF 70F94700 MOV EDI,xxxx.0047F970 serial
004048E9 .83C9 FF OR ECX,FFFFFFFF
004048EC .33C0 XOR EAX,EAX
004048EE .6A 01 PUSH 1
004048F0 .F2:AE REPNE SCAS BYTE PTR ES:
004048F2 .F7D1 NOT ECX
004048F4 .49 DEC ECX
004048F5 .8BD9 MOV EBX,ECX
004048F7 .8D4C24 18 LEA ECX,DWORD PTR SS:
004048FB .53 PUSH EBX
004048FC .E8 5FF0FFFF CALL xxxx.00403960
00404901 .84C0 TEST AL,AL
00404903 .74 23 JE SHORT xxxx.00404928
00404905 .8B7C24 18 MOV EDI,DWORD PTR SS:
00404909 .8BCB MOV ECX,EBX
0040490B .8BD1 MOV EDX,ECX
0040490D .BE 70F94700 MOV ESI,xxxx.0047F970 serial
00404912 .C1E9 02 SHR ECX,2
00404915 .F3:A5 REP MOVS DWORD PTR ES:,DWORD PTR DS>
00404917 .8BCA MOV ECX,EDX
00404919 .53 PUSH EBX
0040491A .83E1 03 AND ECX,3
0040491D .F3:A4 REP MOVS BYTE PTR ES:,BYTE PTR DS:[>
0040491F .8D4C24 18 LEA ECX,DWORD PTR SS:
00404923 .E8 18F0FFFF CALL xxxx.00403940
00404928 >8D4424 24 LEA EAX,DWORD PTR SS:
0040492C .8D4C24 14 LEA ECX,DWORD PTR SS:
00404930 .50 PUSH EAX
00404931 .51 PUSH ECX
00404932 .8D4D 68 LEA ECX,DWORD PTR SS:
00404935 .C68424 540500>MOV BYTE PTR SS:,3
0040493D .E8 6EF40000 CALL xxxx.00413DB0
00404942 .6A 01 PUSH 1
00404944 .8D4C24 18 LEA ECX,DWORD PTR SS:
00404948 .C68424 500500>MOV BYTE PTR SS:,0
00404950 .E8 FBEEFFFF CALL xxxx.00403850
00404955 .6A 00 PUSH 0 ; /Arg3 = 00000000
00404957 .6A 00 PUSH 0 ; |Arg2 = 00000000
00404959 .68 60F94700 PUSH xxxx.0047F960 ; |用户注册成功!
0040495E .E8 94920500 CALL xxxx.0045DBF7 ; \xxxx.0045DBF7
00404963 .8A5424 13 MOV DL,BYTE PTR SS:
00404967 .6A 00 PUSH 0
00404969 .8D4C24 18 LEA ECX,DWORD PTR SS:
0040496D .885424 18 MOV BYTE PTR SS:,DL
00404971 .E8 DAEEFFFF CALL xxxx.00403850
00404976 .BF 4CF94700 MOV EDI,xxxx.0047F94C ;注册:用户注册成功!
0040497B .83C9 FF OR ECX,FFFFFFFF
0040497E .33C0 XOR EAX,EAX
00404980 .6A 01 PUSH 1
一个可用的注册名和序列号:
注册名:xinldy
注册序列号:5de5519c2f041f027d8d951810d2c9fe
很好破解哈,我把软件的信息用xxxx给替换了主要是不想给自己找麻烦哈!请大家原谅!!!如果那天你遇到了这个软件相信你会偷笑的哈!!!
我的u盘数据被删了我一个月的心血,郁闷呀!!!!提醒大家做好数据备份!
[ 本帖最后由 xinldy 于 2008-10-18 21:01 编辑 ] 哈哈,顶上哈,那么容易的话,我找找看 到底是啥软件?。 U盘数据删除 是可以用软件来恢复的 VC 6.0的有ASCII提示 明码比较的 应该不难 :-)
页:
[1]