今天没事做在玩了哈游戏――就在网上找加速器~~
嘿嘿~~找了个叫长天游戏加速器~~我晕还要注册,只给用一天!
那就来crack了~~~~
ASPack 2.12 -的壳。。工具搞定!
=======================
:00481267 A1CC2C4A00 mov eax, dword ptr [004A2CCC]
:0048126C 8B00 mov eax, dword ptr [eax]
:0048126E 8B4058 mov eax, dword ptr [eax+58]
:00481271 E85A14FFFF call 004726D0
:00481276 84C0 test al, al
:00481278 7422 je 0048129C //不用看了吧~~改~
:0048127A 8B8308030000 mov eax, dword ptr [ebx+00000308]
:00481280 8B4068 mov eax, dword ptr [eax+68]
:00481283 33D2 xor edx, edx
:00481285 E8863EFAFF call 00425110
* Possible StringData Ref from Code Obj ->"已经注册!"
|
:0048128A BA54134800 mov edx, 00481354
:0048128F 8B8308030000 mov eax, dword ptr [ebx+00000308]
:00481295 E8C6E5FCFF call 0044F860
:0048129A EB23 jmp 004812BF
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00481278(C)
|
:0048129C 8B8308030000 mov eax, dword ptr [ebx+00000308]
:004812A2 8B4068 mov eax, dword ptr [eax+68]
:004812A5 BA0000FF00 mov edx, 00FF0000
:004812AA E8613EFAFF call 00425110
* Possible StringData Ref from Code Obj ->"未注册,请注册!"
|
:004812AF BA68134800 mov edx, 00481368
:004812B4 8B8308030000 mov eax, dword ptr [ebx+00000308]
:004812BA E8A1E5FCFF call 0044F860
======================
:0049FC43 A1CC2C4A00 mov eax, dword ptr [004A2CCC]
:0049FC48 8B00 mov eax, dword ptr [eax]
:0049FC4A 8B4058 mov eax, dword ptr [eax+58]
:0049FC4D E87E2AFDFF call 004726D0
:0049FC52 84C0 test al, al
:0049FC54 7422 je 0049FC78 //这也改~~~~
:0049FC56 8B8304030000 mov eax, dword ptr [ebx+00000304]
:0049FC5C 8B4068 mov eax, dword ptr [eax+68]
:0049FC5F 33D2 xor edx, edx
:0049FC61 E8AA54F8FF call 00425110
* Possible StringData Ref from Code Obj ->"已经注册!"
|
:0049FC66 BAE0FC4900 mov edx, 0049FCE0
:0049FC6B 8B8304030000 mov eax, dword ptr [ebx+00000304]
:0049FC71 E8EAFBFAFF call 0044F860
:0049FC76 EB23 jmp 0049FC9B
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0049FC54(C)
|
:0049FC78 8B8304030000 mov eax, dword ptr [ebx+00000304]
:0049FC7E 8B4068 mov eax, dword ptr [eax+68]
:0049FC81 BA0000FF00 mov edx, 00FF0000
:0049FC86 E88554F8FF call 00425110
* Possible StringData Ref from Code Obj ->"未注册只能使用1天,请注册!"
|
:0049FC8B BAF4FC4900 mov edx, 0049FCF4
:0049FC90 8B8304030000 mov eax, dword ptr [ebx+00000304]
:0049FC96 E8C5FBFAFF call 0044F860
=========================
:00481053 6864114800 push 00481164
:00481058 64FF30 push dword ptr fs:[eax]
:0048105B 648920 mov dword ptr fs:[eax], esp
:0048105E A1CC2C4A00 mov eax, dword ptr [004A2CCC]
:00481063 8B00 mov eax, dword ptr [eax]
:00481065 8B4058 mov eax, dword ptr [eax+58]
:00481068 E86316FFFF call 004726D0
:0048106D 84C0 test al, al
:0048106F 741D je 0048108E //这一改就完工了~~
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00481029(C)
|
:00481071 6A40 push 00000040
:00481073 B970114800 mov ecx, 00481170
* Possible StringData Ref from Code Obj ->"软件已经注册!"
|
:00481078 BA7C114800 mov edx, 0048117C
:0048107D A1B82B4A00 mov eax, dword ptr [004A2BB8]
:00481082 8B00 mov eax, dword ptr [eax]
:00481084 E86FE9FEFF call 0046F9F8
:00481089 E9B3000000 jmp 00481141
============================
现在爆破完了~~~我们来找一下算法~可是我分析了半天也不有分析透~
现在好像明白但是又不大明白~~
请高手指点~~~THS`~~
软件原版下载地址:
bc0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6e0f1I4z5s2y4X3i4K6u0W2j5$3&6Q4x3V1k6K6L8$3k6@1i4K6u0r3f1%4m8W2k6h3c8g2M7q4)9J5k6i4u0S2M7R3`.`.
爆破后的文件地址:
7c6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6e0f1I4z5s2y4X3i4K6u0W2j5$3&6Q4x3V1k6K6L8$3k6@1i4K6u0r3N6h3&6H3j5h3y4C8k6h3c8Q4x3X3g2J5j5i4t1`.
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课