用Trw2000破解,请问关键Call调用,在哪儿?虽然是个小程序,我却弄了好多天无数次都不行。该软件是用delphi编的用DeDe也难以...
请求高手的帮助,谢谢!!!
:004018BB 8D55F8 lea edx, dword ptr [ebp-08]
:004018BE 8D45F0 lea eax, dword ptr [ebp-10]
:004018C1 E822CD0400 call 0044E5E8
:004018C6 84C0 test al, al
:004018C8 7419 je 004018E3
:004018CA 6A01 push 00000001
* Possible StringData Ref from Data Obj ->"MSVBVM50.DAT"
|
:004018CC 68ED034500 push 004503ED
* Reference To: KERNEL32.WinExec, Ord:0000h
|
:004018D1 E8ECD10400 Call 0044EAC2
:004018D6 8B15DC464500 mov edx, dword ptr [004546DC]
:004018DC 8B02 mov eax, dword ptr [edx]
:004018DE E881F90100 call 00421264
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004018C8(C)
|
:004018E3 FF4B1C dec [ebx+1C]
:004018E6 8D45F0 lea eax, dword ptr [ebp-10]
:004018E9 BA02000000 mov edx, 00000002
:004018EE E825CC0400 call 0044E518
:004018F3 FF4B1C dec [ebx+1C]
:004018F6 8D45F4 lea eax, dword ptr [ebp-0C]
:004018F9 BA02000000 mov edx, 00000002
:004018FE E815CC0400 call 0044E518
:00401903 FF4B1C dec [ebx+1C]
:00401906 8D45F8 lea eax, dword ptr [ebp-08]
:00401909 BA02000000 mov edx, 00000002
:0040190E E805CC0400 call 0044E518
:00401913 66C743100800 mov [ebx+10], 0008
:00401919 8B0B mov ecx, dword ptr [ebx]
:0040191B 64890D00000000 mov dword ptr fs:[00000000], ecx
:00401922 8B45FC mov eax, dword ptr [ebp-04]
:00401925 807D9F00 cmp byte ptr [ebp-61], 00
:00401929 7405 je 00401930
:0040192B E841CF0400 call 0044E871
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401929(C)
|
:00401930 5F pop edi
:00401931 5E pop esi
:00401932 5B pop ebx
:00401933 8BE5 mov esp, ebp
:00401935 5D pop ebp
:00401936 C3 ret
:00401937 90 nop
* Referenced by a CALL at Address:
|:0040154A
|
:00401938 55 push ebp
:00401939 8BEC mov ebp, esp
:0040193B 83C4D4 add esp, FFFFFFD4
:0040193E 53 push ebx
:0040193F 8855F8 mov byte ptr [ebp-08], dl
:00401942 84D2 test dl, dl
:00401944 7E05 jle 0040194B
:00401946 E819CF0400 call 0044E864
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401944(C)
|
:0040194B 8BD9 mov ebx, ecx
:0040194D 8855D7 mov byte ptr [ebp-29], dl
:00401950 8945FC mov dword ptr [ebp-04], eax
:00401953 B8A4064500 mov eax, 004506A4
:00401958 E8EB2B0400 call 00444548
:0040195D 66C745E80800 mov [ebp-18], 0008
:00401963 8BCB mov ecx, ebx
:00401965 33D2 xor edx, edx
:00401967 8B45FC mov eax, dword ptr [ebp-04]
:0040196A E81D880100 call 0041A18C
:0040196F 8345F40E add dword ptr [ebp-0C], 0000000E
:00401973 8B55D8 mov edx, dword ptr [ebp-28]
:00401976 64891500000000 mov dword ptr fs:[00000000], edx
:0040197D 8B45FC mov eax, dword ptr [ebp-04]
:00401980 807DD700 cmp byte ptr [ebp-29], 00
:00401984 7405 je 0040198B
:00401986 E8E6CE0400 call 0044E871
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401984(C)
|
:0040198B 5B pop ebx
:0040198C 8BE5 mov esp, ebp
:0040198E 5D pop ebp
:0040198F C3 ret
:00401990 0400 add al, 00
:00401992 0000 add byte ptr [eax], al
:00401994 90 nop
:00401995 000C00 add byte ptr [eax+eax], cl
:00401998 CC int 03
:00401999 1B4000 sbb eax, dword ptr [eax+00]
:0040199C 54 push esp
:0040199D 46 inc esi
:0040199E 6F outsd
:0040199F 726D jb 00401A0E
:004019A1 3120 xor dword ptr [eax], esp
:004019A3 2A00 sub al, byte ptr [eax]
:004019A5 90 nop
:004019A6 90 nop
:004019A7 90 nop
:004019A8 0800 or byte ptr [eax], al
:004019AA 000000 BYTE 3 DUP(0)
:004019AD 0410 add al, 10
:004019AF 00B41B40000200 add byte ptr [ebx+ebx+00020040], dh
:004019B6 0000 add byte ptr [eax], al
:004019B8 54 push esp
:004019B9 52 push edx
:004019BA 65676973747279202A imul esi, gs:[bp+di+74], 2A207972
:004019C3 5B pop ebx
:004019C4 325D00 xor bl, byte ptr [ebp+00]
:004019C7 90 nop
:004019C8 A1DC464500 mov eax, dword ptr [004546DC]
:004019CD 8B00 mov eax, dword ptr [eax]
:004019CF E890F80100 call 00421264
:004019D4 C3 ret
:004019D5 90 nop
:004019D6 90 nop
:004019D7 90 nop
:004019D8 8B80D4020000 mov eax, dword ptr [eax+000002D4]
:004019DE 8B10 mov edx, dword ptr [eax]
:004019E0 FF92B0000000 call dword ptr [edx+000000B0]
:004019E6 C3 ret
:004019E7 90 nop
:004019E8 55 push ebp
:004019E9 8BEC mov ebp, esp
:004019EB 83C4C4 add esp, FFFFFFC4
:004019EE 53 push ebx
:004019EF 56 push esi
:004019F0 57 push edi
:004019F1 8BF0 mov esi, eax
:004019F3 8D7DC4 lea edi, dword ptr [ebp-3C]
:004019F6 B850064500 mov eax, 00450650
:004019FB E8482B0400 call 00444548
:00401A00 66C747100800 mov [edi+10], 0008
:00401A06 33D2 xor edx, edx
:00401A08 8955FC mov dword ptr [ebp-04], edx
:00401A0B 8D55FC lea edx, dword ptr [ebp-04]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040199F(C)
|
:00401A0E FF471C inc [edi+1C]
:00401A11 8B86D4020000 mov eax, dword ptr [esi+000002D4]
:00401A17 E898540200 call 00426EB4
:00401A1C 8D45FC lea eax, dword ptr [ebp-04]
:00401A1F E854CC0400 call 0044E678
:00401A24 E8EB5B0400 call 00447614
:00401A29 8986F0020000 mov dword ptr [esi+000002F0], eax
:00401A2F 8996F4020000 mov dword ptr [esi+000002F4], edx
:00401A35 FF4F1C dec [edi+1C]
:00401A38 8D45FC lea eax, dword ptr [ebp-04]
:00401A3B BA02000000 mov edx, 00000002
:00401A40 E8D3CA0400 call 0044E518
:00401A45 B201 mov dl, 01
:00401A47 A1247D4000 mov eax, dword ptr [00407D24]
:00401A4C E8D3630000 call 00407E24
:00401A51 8BD8 mov ebx, eax
:00401A53 BA02000080 mov edx, 80000002
:00401A58 8BC3 mov eax, ebx
:00401A5A E8A9C90400 call 0044E408
:00401A5F 66C747101400 mov [edi+10], 0014
* Possible StringData Ref from Data Obj ->"SOFTWARE\Microsoft"
|
:00401A65 BAFA034500 mov edx, 004503FA
:00401A6A 8D45F8 lea eax, dword ptr [ebp-08]
:00401A6D E89EC90400 call 0044E410
:00401A72 FF471C inc [edi+1C]
:00401A75 8B10 mov edx, dword ptr [eax]
:00401A77 B101 mov cl, 01
:00401A79 8BC3 mov eax, ebx
:00401A7B E8A8640000 call 00407F28
:00401A80 FF4F1C dec [edi+1C]
:00401A83 8D45F8 lea eax, dword ptr [ebp-08]
:00401A86 BA02000000 mov edx, 00000002
:00401A8B E888CA0400 call 0044E518
:00401A90 FFB6F4020000 push dword ptr [esi+000002F4]
:00401A96 FFB6F0020000 push dword ptr [esi+000002F0]
:00401A9C 8D45F0 lea eax, dword ptr [ebp-10]
:00401A9F E82CCA0400 call 0044E4D0
:00401AA4 FF471C inc [edi+1C]
:00401AA7 8B10 mov edx, dword ptr [eax]
:00401AA9 8D45F4 lea eax, dword ptr [ebp-0C]
:00401AAC 52 push edx
* Possible StringData Ref from Data Obj ->"Version"
|
:00401AAD BA0D044500 mov edx, 0045040D
:00401AB2 66C747102000 mov [edi+10], 0020
:00401AB8 E853C90400 call 0044E410
:00401ABD FF471C inc [edi+1C]
:00401AC0 8B10 mov edx, dword ptr [eax]
:00401AC2 8BC3 mov eax, ebx
:00401AC4 59 pop ecx
:00401AC5 E8FA650000 call 004080C4
:00401ACA FF4F1C dec [edi+1C]
:00401ACD 8D45F0 lea eax, dword ptr [ebp-10]
:00401AD0 BA02000000 mov edx, 00000002
:00401AD5 E83ECA0400 call 0044E518
:00401ADA FF4F1C dec [edi+1C]
:00401ADD 8D45F4 lea eax, dword ptr [ebp-0C]
:00401AE0 BA02000000 mov edx, 00000002
:00401AE5 E82ECA0400 call 0044E518
:00401AEA 8BF3 mov esi, ebx
:00401AEC 8975E8 mov dword ptr [ebp-18], esi
:00401AEF 85F6 test esi, esi
:00401AF1 741E je 00401B11 <<====此关键跳转je 改为jne却不行
:00401AF3 8B06 mov eax, dword ptr [esi]
:00401AF5 8945EC mov dword ptr [ebp-14], eax
:00401AF8 66C747103800 mov [edi+10], 0038
:00401AFE BA03000000 mov edx, 00000003
:00401B03 8B45E8 mov eax, dword ptr [ebp-18]
:00401B06 8B08 mov ecx, dword ptr [eax]
:00401B08 FF51FC call [ecx-04]
:00401B0B 66C747102C00 mov [edi+10], 002C
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401AF1(C)
|
:00401B11 A1DC464500 mov eax, dword ptr [004546DC]
:00401B16 6A00 push 00000000
* Possible StringData Ref from Data Obj ->"提示"
|
:00401B18 B940044500 mov ecx, 00450440
* Possible StringData Ref from Data Obj ->"请重新启动程序,注册码正确将不会出现此窗口"
|
:00401B1D BA15044500 mov edx, 00450415
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)