TA的每日心情 | 奋斗 2018-7-6 21:16 |
---|
签到天数: 37 天 [LV.5]常住居民I
|
既然是装逼分析,当然是显示注册给谁,而没有什么卵用的功能,软件的破解可以在本论坛查找炮哥的分析即可。
程序的trial字符串加密了,所以找不到,我们对所有调用DrawTextW的地方下断点。
我们点击菜单里面的关于,程序会在od里面断下,我们注意od右下角堆栈位置的字符串。
当看到[esp+8]="Trial"时,中断在这里:
[Asm] 纯文本查看 复制代码 01AB1DE3 E8 A46B0D00 call <jmp.&USER32.DrawTextW>
01AB1DE8 64:8F05 00000000 pop dword ptr fs:[0]
01AB1DEF 83C4 08 add esp, 0x8
01AB1DF2 68 541EAB01 push 01AB1E54
01AB1DF7 8B45 F8 mov eax, dword ptr [ebp-0x8]
01AB1DFA E8 198CCDFF call 0178AA18
01AB1DFF B0 01 mov al, 0x1
01AB1E01 C3 retn
我们一直F8,直到下面的代码:
[Asm] 纯文本查看 复制代码 012D45EF 81C3 14040000 add ebx, 0x414
012D45F5 833B 00 cmp dword ptr [ebx], 0x0
012D45F8 74 04 je short 012D45FE
012D45FA 8B03 mov eax, dword ptr [ebx] ; Trial
012D45FC EB 05 jmp short 012D4603
012D45FE B8 CDECB901 mov eax, 01B9ECCD
012D4603 50 push eax
012D4604 66:C785 94FEFFFF 3003 mov word ptr [ebp-0x16C], 0x330
012D460D 6A 5A push 0x5A
012D460F 8D95 BCFEFFFF lea edx, dword ptr [ebp-0x144]
012D4615 52 push edx
012D4616 E8 C9F4FBFF call 01293AE4
012D461B 59 pop ecx
012D461C 50 push eax
012D461D FF85 A0FEFFFF inc dword ptr [ebp-0x160]
012D4623 E8 AC6EFEFF call 012BB4D4
012D4628 83C4 08 add esp, 0x8
012D462B 83BD BCFEFFFF 00 cmp dword ptr [ebp-0x144], 0x0
012D4632 74 08 je short 012D463C
012D4634 8B8D BCFEFFFF mov ecx, dword ptr [ebp-0x144]
012D463A EB 05 jmp short 012D4641
012D463C B9 CDECB901 mov ecx, 01B9ECCD
012D4641 51 push ecx
012D4642 8D45 F8 lea eax, dword ptr [ebp-0x8]
012D4645 50 push eax
012D4646 E8 353B8200 call 01AF8180 ; 我们在这里修改[esp+8]里面的内容
012D464B 83C4 0C add esp, 0xC
012D464E FF8D A0FEFFFF dec dword ptr [ebp-0x160]
012D4654 6A 02 push 0x2 ; 我们可以在这里修改[edx]里面的字符串
012D4656 8D95 BCFEFFFF lea edx, dword ptr [ebp-0x144] ; FF 8D A0 FE FF FF 6A 02 8D 95 BC FE FF FF 52
012D465C 52 push edx
012D465D E8 E6388200 call 01AF7F48
012D4662 83C4 08 add esp, 0x8
012D4665 8B85 80FEFFFF mov eax, dword ptr [ebp-0x180]
012D466B 8B80 E8030000 mov eax, dword ptr [eax+0x3E8]
012D4671 8B55 F8 mov edx, dword ptr [ebp-0x8]
012D4674 E8 EB316400 call 01917864 ; 这里负责DrawTextW
012D4679 8B9D 80FEFFFF mov ebx, dword ptr [ebp-0x180] ; 程序返回到这里
012D467F 81C3 18040000 add ebx, 0x418
012D4685 833B 00 cmp dword ptr [ebx], 0x0
012D4688 74 04 je short 012D468E
012D468A 8B03 mov eax, dword ptr [ebx] ; unlicensed copy
012D468C EB 05 jmp short 012D4693
012D468E B8 CDECB901 mov eax, 01B9ECCD
012D4693 50 push eax
012D4694 66:C785 94FEFFFF 3C03 mov word ptr [ebp-0x16C], 0x33C
012D469D 6A 5A push 0x5A
012D469F 8D95 B8FEFFFF lea edx, dword ptr [ebp-0x148]
012D46A5 52 push edx
012D46A6 E8 39F4FBFF call 01293AE4
012D46AB 59 pop ecx
012D46AC 50 push eax
012D46AD FF85 A0FEFFFF inc dword ptr [ebp-0x160]
012D46B3 E8 1C6EFEFF call 012BB4D4
012D46B8 83C4 08 add esp, 0x8
012D46BB 83BD B8FEFFFF 00 cmp dword ptr [ebp-0x148], 0x0
012D46C2 74 08 je short 012D46CC
012D46C4 8B8D B8FEFFFF mov ecx, dword ptr [ebp-0x148]
012D46CA EB 05 jmp short 012D46D1
012D46CC B9 CDECB901 mov ecx, 01B9ECCD
012D46D1 51 push ecx
012D46D2 8D45 F8 lea eax, dword ptr [ebp-0x8]
012D46D5 50 push eax
012D46D6 E8 A53A8200 call 01AF8180 ; 我们在这里修改[esp+8]里面的内容
012D46DB 83C4 0C add esp, 0xC
012D46DE FF8D A0FEFFFF dec dword ptr [ebp-0x160]
012D46E4 6A 02 push 0x2
012D46E6 8D95 B8FEFFFF lea edx, dword ptr [ebp-0x148] ; FF 8D A0 FE FF FF 6A 02 8D 95 B8 FE FF FF 52
012D46EC 52 push edx
012D46ED E8 56388200 call 01AF7F48
012D46F2 83C4 08 add esp, 0x8
012D46F5 8B85 80FEFFFF mov eax, dword ptr [ebp-0x180]
012D46FB 8B80 F0030000 mov eax, dword ptr [eax+0x3F0]
012D4701 8B55 F8 mov edx, dword ptr [ebp-0x8]
012D4704 E8 5B316400 call 01917864
012D4709 8B9D 80FEFFFF mov ebx, dword ptr [ebp-0x180]
012D470F 81C3 1C040000 add ebx, 0x41C
012D4715 833B 00 cmp dword ptr [ebx], 0x0 ; 这里是授权给谁
012D4718 74 04 je short 012D471E
012D471A 8B03 mov eax, dword ptr [ebx]
012D471C EB 05 jmp short 012D4723
012D471E B8 CDECB901 mov eax, 01B9ECCD
012D4723 50 push eax
012D4724 66:C785 94FEFFFF 4803 mov word ptr [ebp-0x16C], 0x348
012D472D 6A 5A push 0x5A
012D472F 8D95 B4FEFFFF lea edx, dword ptr [ebp-0x14C]
012D4735 52 push edx
012D4736 E8 A9F3FBFF call 01293AE4
012D473B 59 pop ecx
012D473C 50 push eax
012D473D FF85 A0FEFFFF inc dword ptr [ebp-0x160]
012D4743 E8 8C6DFEFF call 012BB4D4
012D4748 83C4 08 add esp, 0x8
012D474B 83BD B4FEFFFF 00 cmp dword ptr [ebp-0x14C], 0x0
012D4752 74 08 je short 012D475C
012D4754 8B8D B4FEFFFF mov ecx, dword ptr [ebp-0x14C]
012D475A EB 05 jmp short 012D4761
012D475C B9 CDECB901 mov ecx, 01B9ECCD
012D4761 51 push ecx
012D4762 8D45 F8 lea eax, dword ptr [ebp-0x8]
012D4765 50 push eax
012D4766 E8 153A8200 call 01AF8180
012D476B 83C4 0C add esp, 0xC
012D476E FF8D A0FEFFFF dec dword ptr [ebp-0x160]
012D4774 6A 02 push 0x2
012D4776 8D95 B4FEFFFF lea edx, dword ptr [ebp-0x14C] ; FF 8D A0 FE FF FF 6A 02 8D 95 B4 FE FF FF 52
012D477C 52 push edx
012D477D E8 C6378200 call 01AF7F48
012D4782 83C4 08 add esp, 0x8
012D4785 8B85 80FEFFFF mov eax, dword ptr [ebp-0x180]
012D478B 8B80 FC030000 mov eax, dword ptr [eax+0x3FC]
012D4791 8B55 F8 mov edx, dword ptr [ebp-0x8]
012D4794 E8 CB306400 call 01917864
012D4799 8B9D 80FEFFFF mov ebx, dword ptr [ebp-0x180]
012D479F 81C3 20040000 add ebx, 0x420
012D47A5 833B 00 cmp dword ptr [ebx], 0x0 ; 授权日期
012D47A8 74 04 je short 012D47AE
012D47AA 8B03 mov eax, dword ptr [ebx]
012D47AC EB 05 jmp short 012D47B3
012D47AE B8 CDECB901 mov eax, 01B9ECCD
012D47B3 50 push eax
012D47B4 66:C785 94FEFFFF 5403 mov word ptr [ebp-0x16C], 0x354
012D47BD 6A 5A push 0x5A
012D47BF 8D95 B0FEFFFF lea edx, dword ptr [ebp-0x150]
012D47C5 52 push edx
012D47C6 E8 19F3FBFF call 01293AE4
012D47CB 59 pop ecx
012D47CC 50 push eax
012D47CD FF85 A0FEFFFF inc dword ptr [ebp-0x160]
012D47D3 E8 FC6CFEFF call 012BB4D4
012D47D8 83C4 08 add esp, 0x8
012D47DB 83BD B0FEFFFF 00 cmp dword ptr [ebp-0x150], 0x0
012D47E2 74 08 je short 012D47EC
012D47E4 8B8D B0FEFFFF mov ecx, dword ptr [ebp-0x150]
012D47EA EB 05 jmp short 012D47F1
012D47EC B9 CDECB901 mov ecx, 01B9ECCD
012D47F1 51 push ecx
012D47F2 8D45 F8 lea eax, dword ptr [ebp-0x8]
012D47F5 50 push eax
012D47F6 E8 85398200 call 01AF8180
012D47FB 83C4 0C add esp, 0xC
012D47FE FF8D A0FEFFFF dec dword ptr [ebp-0x160]
012D4804 6A 02 push 0x2
012D4806 8D95 B0FEFFFF lea edx, dword ptr [ebp-0x150] ; FF 8D A0 FE FF FF 6A 02 8D 95 B0 FE FF FF 52
012D480C 52 push edx
012D480D E8 36378200 call 01AF7F48
012D4812 83C4 08 add esp, 0x8
012D4815 8B85 80FEFFFF mov eax, dword ptr [ebp-0x180]
012D481B 8B80 04040000 mov eax, dword ptr [eax+0x404]
012D4821 8B55 F8 mov edx, dword ptr [ebp-0x8]
012D4824 E8 3B306400 call 01917864
程序有了授权给谁,后面的日期会自动显示的。
|
评分
-
查看全部评分
|