- UID
- 1132
注册时间2005-4-20
阅读权限40
最后登录1970-1-1
独步武林
TA的每日心情 | 无聊 2020-4-10 17:02 |
---|
签到天数: 5 天 [LV.2]偶尔看看I
|
【破解日期】 2007年6月2日
【破解作者】 冷血书生
【作者邮箱】 mei
【作者主页】 http:///www.126sohu.com
【使用工具】 OD
【破解平台】 Win9x/NT/2000/XP
【软件名称】 PhotoShrink 2.0
【下载地址】 http://nb.newhua.com/soft/58519.htm
【软件简介】 PhotoShrink是一个使用方便的图形优化工具,可以根据电子邮件或者网页设计的需要对图形文件进行缩放以节省存储空间。它使用简单,支持批量缩放和鼠标操作,可以调整JPG格式文件的质量。
【软件大小】 1245KB
【加壳方式】 无
【破解声明】 我是一只小菜鸟,偶得一点心得,愿与大家分享:)
--------------------------------------------------------------------------------
【破解内容】
- 00506A99 E8 02DFF3FF call photoshr.004449A0
- 00506A9E 837D FC 00 cmp dword ptr ss:[ebp-4],0 ; 是否输入EMAIL
- 00506AA2 0F84 E4000000 je photoshr.00506B8C
- 00506AA8 8D55 F4 lea edx,dword ptr ss:[ebp-C]
- 00506AAB 8B83 08030000 mov eax,dword ptr ds:[ebx+308]
- 00506AB1 E8 EADEF3FF call photoshr.004449A0
- 00506AB6 8B55 F4 mov edx,dword ptr ss:[ebp-C]
- 00506AB9 8D4D F8 lea ecx,dword ptr ss:[ebp-8]
- 00506ABC A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506AC1 8B00 mov eax,dword ptr ds:[eax]
- 00506AC3 E8 8C050000 call photoshr.00507054 ; 算法call
- 00506AC8 8B45 F8 mov eax,dword ptr ss:[ebp-8] ; 注册码
- 00506ACB 50 push eax
- 00506ACC 8D55 F0 lea edx,dword ptr ss:[ebp-10]
- 00506ACF 8B83 10030000 mov eax,dword ptr ds:[ebx+310]
- 00506AD5 E8 C6DEF3FF call photoshr.004449A0
- 00506ADA 8B55 F0 mov edx,dword ptr ss:[ebp-10]
- 00506ADD 58 pop eax
- 00506ADE E8 D9DEEFFF call photoshr.004049BC ; 经典比较
- 00506AE3 0F85 A3000000 jnz photoshr.00506B8C
- 00506AE9 8D55 EC lea edx,dword ptr ss:[ebp-14]
- 00506AEC 8B83 08030000 mov eax,dword ptr ds:[ebx+308]
- 00506AF2 E8 A9DEF3FF call photoshr.004449A0
- 00506AF7 8B55 EC mov edx,dword ptr ss:[ebp-14]
- 00506AFA A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506AFF 8B00 mov eax,dword ptr ds:[eax]
- 00506B01 05 28030000 add eax,328
- 00506B06 E8 EDDAEFFF call photoshr.004045F8
- 00506B0B 8D55 E8 lea edx,dword ptr ss:[ebp-18]
- 00506B0E 8B83 10030000 mov eax,dword ptr ds:[ebx+310]
- 00506B14 E8 87DEF3FF call photoshr.004449A0
- 00506B19 8B55 E8 mov edx,dword ptr ss:[ebp-18]
- 00506B1C A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506B21 8B00 mov eax,dword ptr ds:[eax]
- 00506B23 05 2C030000 add eax,32C
- 00506B28 E8 CBDAEFFF call photoshr.004045F8
- 00506B2D A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506B32 8B00 mov eax,dword ptr ds:[eax]
- 00506B34 C680 24030000 >mov byte ptr ds:[eax+324],1
- 00506B3B A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506B40 8B00 mov eax,dword ptr ds:[eax]
- 00506B42 E8 05060000 call photoshr.0050714C
- 00506B47 A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506B4C 8B00 mov eax,dword ptr ds:[eax]
- 00506B4E 8B80 F4020000 mov eax,dword ptr ds:[eax+2F4]
- 00506B54 33D2 xor edx,edx
- 00506B56 E8 65DDF3FF call photoshr.004448C0
- 00506B5B A1 BC185100 mov eax,dword ptr ds:[5118BC]
- 00506B60 8B00 mov eax,dword ptr ds:[eax]
- 00506B62 8B80 08030000 mov eax,dword ptr ds:[eax+308]
- 00506B68 BA 08000000 mov edx,8
- 00506B6D E8 76D5F3FF call photoshr.004440E8
- 00506B72 8BC3 mov eax,ebx
- 00506B74 E8 BB45F4FF call photoshr.0044B134
- 00506B79 BA D86B5000 mov edx,photoshr.00506BD8 ; T
- 00506B7E E8 75B5F8FF call photoshr.004920F8
- 00506B83 8BC3 mov eax,ebx
- 00506B85 E8 7EB3F5FF call photoshr.00461F08
- 00506B8A EB 11 jmp short photoshr.00506B9D
- 00506B8C 8BC3 mov eax,ebx
- 00506B8E E8 A145F4FF call photoshr.0044B134
- 00506B93 BA 286C5000 mov edx,photoshr.00506C28 ; N
- 00506B98 E8 CBB5F8FF call photoshr.00492168
- 00506B9D 33C0 xor eax,eax
- ////////////////////////////////////////////////////////////////////////////////////////////
- ////////////////////////////////////////// 进算法call //////////////////////////////////////
- ////////////////////////////////////////////////////////////////////////////////////////////
- 0050707A 837D FC 00 cmp dword ptr ss:[ebp-4],0
- 0050707E 75 09 jnz short photoshr.00507089
- 00507080 8BC6 mov eax,esi
- 00507082 E8 1DD5EFFF call photoshr.004045A4
- 00507087 EB 72 jmp short photoshr.005070FB
- 00507089 8D4D F8 lea ecx,dword ptr ss:[ebp-8]
- 0050708C BA 14000000 mov edx,14
- 00507091 B8 2C715000 mov eax,photoshr.0050712C ; How DARE you crack my software!
- 00507096 E8 0DB4F8FF call photoshr.004924A8
- 0050709B BB 01000000 mov ebx,1
- 005070A0 8B45 FC mov eax,dword ptr ss:[ebp-4]
- 005070A3 E8 D0D7EFFF call photoshr.00404878
- 005070A8 50 push eax
- 005070A9 8BC3 mov eax,ebx
- 005070AB 48 dec eax
- 005070AC 5A pop edx
- 005070AD 8BCA mov ecx,edx
- 005070AF 99 cdq
- 005070B0 F7F9 idiv ecx
- 005070B2 8B45 FC mov eax,dword ptr ss:[ebp-4]
- 005070B5 8A0410 mov al,byte ptr ds:[eax+edx] ; 取EMAIL的ASCII值
- 005070B8 8B55 F8 mov edx,dword ptr ss:[ebp-8] ; How DARE you crack m
- 005070BB 8A541A FF mov dl,byte ptr ds:[edx+ebx-1]
- 005070BF 32C2 xor al,dl
- 005070C1 25 FF000000 and eax,0FF
- 005070C6 8D55 F4 lea edx,dword ptr ss:[ebp-C]
- 005070C9 E8 A221F0FF call photoshr.00409270
- 005070CE 8B45 F4 mov eax,dword ptr ss:[ebp-C]
- 005070D1 E8 A2D7EFFF call photoshr.00404878
- 005070D6 8B55 F4 mov edx,dword ptr ss:[ebp-C]
- 005070D9 8A4402 FF mov al,byte ptr ds:[edx+eax-1]
- 005070DD 50 push eax
- 005070DE 8D45 F8 lea eax,dword ptr ss:[ebp-8]
- 005070E1 E8 E2D9EFFF call photoshr.00404AC8
- 005070E6 5A pop edx
- 005070E7 885418 FF mov byte ptr ds:[eax+ebx-1],dl
- 005070EB 43 inc ebx
- 005070EC 83FB 15 cmp ebx,15 ; 循环次数
- 005070EF ^ 75 AF jnz short photoshr.005070A0
- 005070F1 8BC6 mov eax,esi
- ////////////////////////////////////////////////////////////////////////////////////////////
- 算法小结:
- email地址与固定字符How DARE you crack my software!进行异或运算,取其结果十进制最后一个值即为注册码。
- email: [email][email protected][/email]
- code: 40067977722790005844
- --------------------------------------------------------------------------------
复制代码
【破解总结】
好久没玩,找了个简单的玩玩。
--------------------------------------------------------------------------------
【版权声明】 本文纯属技术交流, 转载请注明作者并保持文章的完整, 谢谢! |
|