-
-
[旧帖] [原创]小软件破解 0.00雪花
-
发表于: 2010-9-13 16:56 1425
-
1今天给大家介绍一个大家也许常用的软件 sqlyog
2首先查壳。发现居然没壳,看了下是个vc++的。
3od载入如图:
是个中文提示,于是我就查找字符串,发现啥都没有
于是我就尝试不输入,发现是个英文提示,呵呵,字符串 查找,发现了”please enter name“。如图:
很好,于是找到了该反汇编窗口:
于是我往下看,找到了关键成功注册代码的提示:
0044E06E |. 8B56 04 MOV EDX,DWORD PTR DS:[ESI+4]
0044E071 |. 50 PUSH EAX
0044E072 |. 68 48CC6800 PUSH SQLyog.0068CC48 ; please enter your name0044E077 |. 52 PUSH EDX
0044E078 |. E8 C3E80B00 CALL SQLyog.0050C940
0044E07D |. 83C4 10 ADD ESP,10
0044E080 |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E084 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E08B |. E8 10FF1200 CALL SQLyog.0057DFA0
0044E090 |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E094 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E09F |. E8 FCFE1200 CALL SQLyog.0057DFA0
0044E0A4 |. 83C8 FF OR EAX,FFFFFFFF
0044E0A7 |. E9 28010000 JMP SQLyog.0044E1D4
0044E0AC |> 8D4424 48 LEA EAX,DWORD PTR SS:[ESP+48]
0044E0B0 |. 50 PUSH EAX
0044E0B1 |. E8 B07B2100 CALL SQLyog.00665C66
0044E0B6 |. 83C4 04 ADD ESP,4
0044E0B9 |. 85C0 TEST EAX,EAX
0044E0BB 75 52 JNZ SHORT SQLyog.0044E10F
0044E0BD |. 8B0D A8848800 MOV ECX,DWORD PTR DS:[8884A8]
0044E0C3 |. 6A 40 PUSH 40
0044E0C5 |. 53 PUSH EBX
0044E0C6 |. 81C1 8C020000 ADD ECX,28C
0044E0CC |. E8 BF001300 CALL SQLyog.0057E190
0044E0D1 |. 8B4E 04 MOV ECX,DWORD PTR DS:[ESI+4]
0044E0D4 |. 50 PUSH EAX
0044E0D5 |. 68 C04F6900 PUSH SQLyog.00694FC0 ; please enter your registration code0044E0DA |. 51 PUSH ECX
0044E0DB |. E8 60E80B00 CALL SQLyog.0050C940
0044E0E0 |. 83C4 10 ADD ESP,10
0044E0E3 |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E0E7 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E0EE |. E8 ADFE1200 CALL SQLyog.0057DFA0
0044E0F3 |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E0F7 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E102 |. E8 99FE1200 CALL SQLyog.0057DFA0
0044E107 |. 83C8 FF OR EAX,FFFFFFFF
0044E10A |. E9 C5000000 JMP SQLyog.0044E1D4
0044E10F |> 8D9424 480100>LEA EDX,DWORD PTR SS:[ESP+148]
0044E116 |. 52 PUSH EDX
0044E117 |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
0044E11B |. E8 E0101300 CALL SQLyog.0057F200
0044E120 |. 53 PUSH EBX
0044E121 |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
0044E125 |. E8 D6021300 CALL SQLyog.0057E400
0044E12A |. 53 PUSH EBX
0044E12B |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
0044E12F |. E8 6C031300 CALL SQLyog.0057E4A0
0044E134 |. 8D4424 48 LEA EAX,DWORD PTR SS:[ESP+48]
0044E138 |. 50 PUSH EAX
0044E139 |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E13D |. E8 BE101300 CALL SQLyog.0057F200
0044E142 |. 53 PUSH EBX
0044E143 |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E147 |. E8 B4021300 CALL SQLyog.0057E400
0044E14C |. 53 PUSH EBX
0044E14D |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E151 |. E8 4A031300 CALL SQLyog.0057E4A0
0044E156 |. 53 PUSH EBX
0044E157 |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E15B |. E8 30001300 CALL SQLyog.0057E190
0044E160 |. 50 PUSH EAX
0044E161 |. 8BCE MOV ECX,ESI
0044E163 |. E8 68F9FFFF CALL SQLyog.0044DAD0
0044E168 |. 8BF8 MOV EDI,EAX
0044E16A |. 83FF 05 CMP EDI,5
0044E16D |. 75 28 JNZ SHORT SQLyog.0044E197
0044E16F |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E173 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E17A |. E8 21FE1200 CALL SQLyog.0057DFA0
0044E17F |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E183 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E18E |. E8 0DFE1200 CALL SQLyog.0057DFA0
0044E193 |. 33C0 XOR EAX,EAX
0044E195 |. EB 3D JMP SHORT SQLyog.0044E1D4
0044E197 |> 57 PUSH EDI
0044E198 |. 8BCE MOV ECX,ESI
0044E19A |. E8 D1F8FFFF CALL SQLyog.0044DA70
0044E19F |. 57 PUSH EDI ; /Arg2
0044E1A0 |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14] ; |
0044E1A4 |. 51 PUSH ECX ; |Arg1
0044E1A5 |. 8BCE MOV ECX,ESI ; |
0044E1A7 |. E8 94F9FFFF CALL SQLyog.0044DB40 ; \SQLyog.0044DB40
0044E1AC |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E1B0 |. 8BF0 MOV ESI,EAX
0044E1B2 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E1B9 |. E8 E2FD1200 CALL SQLyog.0057DFA0
0044E1BE |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E1C2 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E1CD |. E8 CEFD1200 CALL SQLyog.0057DFA0
0044E1D2 |. 8BC6 MOV EAX,ESI
0044E1D4 |> 8B8C24 540300>MOV ECX,DWORD PTR SS:[ESP+354]
0044E1DB |. 64:890D 00000>MOV DWORD PTR FS:[0],ECX
0044E1E2 |. 8B8C24 4C0300>MOV ECX,DWORD PTR SS:[ESP+34C]
0044E1E9 |. E8 12762100 CALL SQLyog.00665800
0044E1EE |. 5F POP EDI
0044E1EF |. 5E POP ESI
0044E1F0 |. 5B POP EBX
0044E1F1 |. 8BE5 MOV ESP,EBP
0044E1F3 |. 5D POP EBP
0044E1F4 \. C3 RETN
0044E1F5 CC INT3
0044E1F6 CC INT3
0044E1F7 CC INT3
0044E1F8 CC INT3
0044E1F9 CC INT3
0044E1FA CC INT3
0044E1FB CC INT3
0044E1FC CC INT3
0044E1FD CC INT3
0044E1FE CC INT3
0044E1FF CC INT3
0044E200 . 56 PUSH ESI
0044E201 . 8B7424 08 MOV ESI,DWORD PTR SS:[ESP+8]
0044E205 . 57 PUSH EDI
0044E206 . 6A EB PUSH -15 ; /Index = GWL_USERDATA
0044E208 . 56 PUSH ESI ; |hWnd
0044E209 . FF15 0C866800 CALL DWORD PTR DS:[<&USER32.GetWindowLon>; \GetWindowLongW
0044E20F . 8BF8 MOV EDI,EAX
0044E211 . 8B4424 10 MOV EAX,DWORD PTR SS:[ESP+10]
0044E215 . 3D 38010000 CMP EAX,138 ; Switch (cases 110..43E)
0044E21A . 77 5F JA SHORT SQLyog.0044E27B
0044E21C . 74 47 JE SHORT SQLyog.0044E265
0044E21E . 2D 10010000 SUB EAX,110
0044E223 . 74 1B JE SHORT SQLyog.0044E240
0044E225 . 48 DEC EAX
0044E226 . 0F85 88000000 JNZ SQLyog.0044E2B4
0044E22C . 8B4424 14 MOV EAX,DWORD PTR SS:[ESP+14] ; Case 111 (WM_COMMAND) of switch 0044E215
0044E230 . 50 PUSH EAX ; /Arg2
0044E231 . 56 PUSH ESI ; |Arg1
0044E232 . 8BCF MOV ECX,EDI ; |
0044E234 . E8 87FCFFFF CALL SQLyog.0044DEC0 ; \SQLyog.0044DEC0
0044E239 . 5F POP EDI
0044E23A . 33C0 XOR EAX,EAX
0044E23C . 5E POP ESI
0044E23D . C2 1000 RETN 10
0044E240 > 8B4C24 18 MOV ECX,DWORD PTR SS:[ESP+18] ; Case 110 (WM_INITDIALOG) of switch 0044E215
0044E244 . 51 PUSH ECX ; /NewValue
0044E245 . 6A EB PUSH -15 ; |Index = GWL_USERDATA
0044E247 . 56 PUSH ESI ; |hWnd
0044E248 . FF15 4C866800 CALL DWORD PTR DS:[<&USER32.SetWindowLon>; \SetWindowLongW
0044E24E . 6A 00 PUSH 0 ; /lParam = 0
0044E250 . 6A 00 PUSH 0 ; |wParam = 0
0044E252 . 68 3E040000 PUSH 43E ; |Message = MSG(43E)
0044E257 . 56 PUSH ESI ; |hWnd
0044E258 . FF15 68866800 CALL DWORD PTR DS:[<&USER32.PostMessageW>; \PostMessageW
0044E25E . 5F POP EDI
0044E25F . 33C0 XOR EAX,EAX
0044E261 . 5E POP ESI
0044E262 . C2 1000 RETN 10
0044E265 > 8B5424 18 MOV EDX,DWORD PTR SS:[ESP+18] ; Case 138 (WM_CTLCOLORSTATIC) of switch 0044E215
0044E269 . 8B4424 14 MOV EAX,DWORD PTR SS:[ESP+14]
0044E26D . 52 PUSH EDX
0044E26E . 50 PUSH EAX
0044E26F . 8BCF MOV ECX,EDI
0044E271 . E8 AAFBFFFF CALL SQLyog.0044DE20
0044E276 . 5F POP EDI
0044E277 . 5E POP ESI
0044E278 . C2 1000 RETN 10
0044E27B > 3D 3E040000 CMP EAX,43E
0044E280 . 75 32 JNZ SHORT SQLyog.0044E2B4
0044E282 . 53 PUSH EBX ; Case 43E (WM_USER+3E) of switch 0044E215
0044E283 . 8B1D 38866800 MOV EBX,DWORD PTR DS:[<&USER32.GetDlgIte>; USER32.GetDlgItem
0044E289 . 55 PUSH EBP
0044E28A . 68 50DF4400 PUSH SQLyog.0044DF50 ; /NewValue = 44DF50
0044E28F . 6A FC PUSH -4 ; |Index = GWL_WNDPROC
0044E291 . 68 EE050000 PUSH 5EE ; |/ControlID = 5EE (1518.)
0044E296 . 56 PUSH ESI ; ||hWnd
0044E297 . FFD3 CALL EBX ; |\GetDlgItem
0044E299 . 8B2D 4C866800 MOV EBP,DWORD PTR DS:[<&USER32.SetWindow>; |USER32.SetWindowLongW
0044E29F . 50 PUSH EAX ; |hWnd
0044E2A0 . FFD5 CALL EBP ; \SetWindowLongW
0044E2A2 . 57 PUSH EDI ; /NewValue
0044E2A3 . 6A EB PUSH -15 ; |Index = GWL_USERDATA
0044E2A5 . 68 EE050000 PUSH 5EE ; |/ControlID = 5EE (1518.)
0044E2AA . 56 PUSH ESI ; ||hWnd
0044E2AB . 8907 MOV DWORD PTR DS:[EDI],EAX ; ||
0044E2AD . FFD3 CALL EBX ; |\GetDlgItem
0044E2AF . 50 PUSH EAX ; |hWnd
0044E2B0 . FFD5 CALL EBP ; \SetWindowLongW
0044E2B2 . 5D POP EBP
0044E2B3 . 5B POP EBX
0044E2B4 > 5F POP EDI ; Default case of switch 0044E215
0044E2B5 . 33C0 XOR EAX,EAX
0044E2B7 . 5E POP ESI
0044E2B8 . C2 1000 RETN 10
0044E2BB CC INT3
0044E2BC CC INT3
0044E2BD CC INT3
0044E2BE CC INT3
0044E2BF CC INT3
0044E2C0 /$ 8B4424 04 MOV EAX,DWORD PTR SS:[ESP+4]
0044E2C4 |. 51 PUSH ECX ; /lParam
0044E2C5 |. 8B0D A8848800 MOV ECX,DWORD PTR DS:[8884A8] ; |
0044E2CB |. 8B91 BC020000 MOV EDX,DWORD PTR DS:[ECX+2BC] ; |
0044E2D1 |. 68 00E24400 PUSH SQLyog.0044E200 ; |DlgProc = SQLyog.0044E200
0044E2D6 |. 50 PUSH EAX ; |hOwner
0044E2D7 |. 68 8D030000 PUSH 38D ; |pTemplate = 38D
0044E2DC |. 52 PUSH EDX ; |hInst
0044E2DD |. FF15 08866800 CALL DWORD PTR DS:[<&USER32.DialogBoxPar>; \DialogBoxParamW
0044E2E3 \. C2 0400 RETN 4
0044E2E6 CC INT3
0044E2E7 CC INT3
0044E2E8 CC INT3
0044E2E9 CC INT3
0044E2EA CC INT3
0044E2EB CC INT3
0044E2EC CC INT3
0044E2ED CC INT3
0044E2EE CC INT3
0044E2EF CC INT3
0044E2F0 /$ 6A FF PUSH -1
0044E2F2 |. 68 10CB6700 PUSH SQLyog.0067CB10 ; SE 处理程序安装
0044E2F7 |. 64:A1 0000000>MOV EAX,DWORD PTR FS:[0]
0044E2FD |. 50 PUSH EAX ; (初始 cpu 选择)
0044E2FE |. 64:8925 00000>MOV DWORD PTR FS:[0],ESP ; (初始 cpu 选择)
0044E305 |. 83EC 24 SUB ESP,24
0044E308 |. 56 PUSH ESI
0044E309 |. 8BF1 MOV ESI,ECX ; (初始 cpu 选择)
0044E30B |. 57 PUSH EDI
0044E30C |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E310 |. E8 9B071300 CALL SQLyog.0057EAB0
0044E315 |. C74424 34 000>MOV DWORD PTR SS:[ESP+34],0
0044E31D |. C74424 0C 000>MOV DWORD PTR SS:[ESP+C],0
0044E325 |. 8B7C24 40 MOV EDI,DWORD PTR SS:[ESP+40]
0044E329 |. 0FB7C7 MOVZX EAX,DI
0044E32C |. 83E8 02 SUB EAX,2 ; Switch (cases 2..417)
0044E32F |. C64424 34 01 MOV BYTE PTR SS:[ESP+34],1
0044E334 |. 0F84 A3000000 JE SQLyog.0044E3DD
0044E33A |. 2D 15040000 SUB EAX,415
0044E33F 0F85 A7000000 JNZ SQLyog.0044E3EC
0044E345 |. 8BCE MOV ECX,ESI ; Case 417 of switch 0044E32C
0044E347 |. E8 54FCFFFF CALL SQLyog.0044DFA0
0044E34C |. 83F8 01 CMP EAX,1
0044E34F 75 78 JNZ SHORT SQLyog.0044E3C9
0044E351 |. 8B0D A8848800 MOV ECX,DWORD PTR DS:[8884A8]
0044E357 |. 8B46 18 MOV EAX,DWORD PTR DS:[ESI+18]
0044E35A |. 81C1 38030000 ADD ECX,338
0044E360 |. 83F8 01 CMP EAX,1
0044E363 75 12 JNZ SHORT SQLyog.0044E377
0044E365 |. E8 F6851400 CALL SQLyog.00596960
0044E36A |. 50 PUSH EAX
0044E36B |. 68 68506900 PUSH SQLyog.00695068 ; thank you for registering sqlyog %s - mysql gui.\n\nplease restart sqlyog to enable all settings
0044E370 |. 8D4424 18 LEA EAX,DWORD PTR SS:[ESP+18]
0044E374 |. 50 PUSH EAX
0044E375 |. EB 10 JMP SHORT SQLyog.0044E387
0044E377 |> E8 E4851400 CALL SQLyog.00596960
0044E37C |. 50 PUSH EAX
0044E37D |. 68 30506900 PUSH SQLyog.00695030 ; thank you for registering sqlyog %s - mysql gui.0044E382 |. 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18]
0044E386 |. 51 PUSH ECX
0044E387 |> E8 84091300 CALL SQLyog.0057ED10
0044E38C |. 83C4 0C ADD ESP,0C
0044E38F |. 6A 40 PUSH 40
0044E391 |. 68 08506900 PUSH SQLyog.00695008 ; sqlyog - mysql gui
0044E396 |. 6A 00 PUSH 0
0044E398 |. 8D4C24 1C LEA ECX,DWORD PTR SS:[ESP+1C]
0044E39C |. E8 EFFD1200 CALL SQLyog.0057E190
0044E3A1 |. 8B7424 44 MOV ESI,DWORD PTR SS:[ESP+44]
0044E3A5 |. 50 PUSH EAX
0044E3A6 |. 56 PUSH ESI
0044E3A7 |. E8 94E50B00 CALL SQLyog.0050C940
0044E3AC |. 8B15 A8848800 MOV EDX,DWORD PTR DS:[8884A8]
0044E3B2 |. 6A 01 PUSH 1
0044E3B4 |. 56 PUSH ESI
0044E3B5 |. C782 64010000>MOV DWORD PTR DS:[EDX+164],0
0044E3BF |. E8 0C980B00 CALL SQLyog.00507BD0
0044E3C4 |. 83C4 18 ADD ESP,18
0044E3C7 EB 23 JMP SHORT SQLyog.0044E3EC
0044E3C9 |> 85C0 TEST EAX,EAX
0044E3CB 75 1F JNZ SHORT SQLyog.0044E3EC
0044E3CD |. 8B4424 3C MOV EAX,DWORD PTR SS:[ESP+3C]
0044E3D1 |. 50 PUSH EAX
0044E3D2 |. 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C]
0044E3D6 |. E8 E5FEFFFF CALL SQLyog.0044E2C0
0044E3DB |. EB 0F JMP SHORT SQLyog.0044E3EC
0044E3DD |> 8B4C24 3C MOV ECX,DWORD PTR SS:[ESP+3C] ; Case 2 of switch 0044E32C
0044E3E1 |. 6A 00 PUSH 0
0044E3E3 |. 51 PUSH ECX
0044E3E4 |. E8 E7970B00 CALL SQLyog.00507BD0
0044E3E9 |. 83C4 08 ADD ESP,8
0044E3EC |> 8BD7 MOV EDX,EDI ; Default case of switch 0044E32C
0044E3EE |. C1EA 10 SHR EDX,10
0044E3F1 |. 85D2 TEST EDX,EDX
0044E3F3 |. 75 1C JNZ SHORT SQLyog.0044E411
0044E3F5 |. 66:81FF 6004 CMP DI,460
0044E3FA |. 75 15 JNZ SHORT SQLyog.0044E411
0044E3FC |. 6A 01 PUSH 1 ; /IsShown = 1
0044E3FE |. 52 PUSH EDX ; |DefDir
0044E3FF |. 52 PUSH EDX ; |Parameters
0044E400 |. 68 304F6900 PUSH SQLyog.00694F30 ; |http://www.webyog.com/en/buy.php
0044E405 |. 68 80D26800 PUSH SQLyog.0068D280 ; |open
0044E40A |. 52 PUSH EDX ; |hWnd
0044E40B |. FF15 30846800 CALL DWORD PTR DS:[<&SHELL32.ShellExecut>; \ShellExecuteW
0044E411 |> 8B4424 0C MOV EAX,DWORD PTR SS:[ESP+C]
0044E415 |. 85C0 TEST EAX,EAX
0044E417 |. 5F POP EDI
0044E418 |. 5E POP ESI
0044E419 |. 74 07 JE SHORT SQLyog.0044E422
0044E41B |. 50 PUSH EAX ; /hObject
0044E41C |. FF15 D4806800 CALL DWORD PTR DS:[<&GDI32.DeleteObject>>; \DeleteObject
0044E422 |> 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8]
0044E426 |. C74424 2C FFF>MOV DWORD PTR SS:[ESP+2C],-1
0044E42E |. E8 6DFB1200 CALL SQLyog.0057DFA0
0044E433 |. 8B4C24 24 MOV ECX,DWORD PTR SS:[ESP+24]
0044E437 |. 64:890D 00000>MOV DWORD PTR FS:[0],ECX
0044E43E |. 83C4 30 ADD ESP,30
呵呵,大家就知道怎么破解了把,直接把关键跳nop掉就行了,另外改注册代码是会循环进行的,也没怎么研究,而且该软件是重启验证的额,至今未找到关键文件或注册表代码,大家也来看看,能不能很完整的破解这个东西把
sqlyog下载地址:http://www.e666.cn/download.asp?id=9489&dp=1&fid=33
2首先查壳。发现居然没壳,看了下是个vc++的。
3od载入如图:
是个中文提示,于是我就查找字符串,发现啥都没有
于是我就尝试不输入,发现是个英文提示,呵呵,字符串 查找,发现了”please enter name“。如图:
很好,于是找到了该反汇编窗口:
于是我往下看,找到了关键成功注册代码的提示:
0044E06E |. 8B56 04 MOV EDX,DWORD PTR DS:[ESI+4]
0044E071 |. 50 PUSH EAX
0044E072 |. 68 48CC6800 PUSH SQLyog.0068CC48 ; please enter your name0044E077 |. 52 PUSH EDX
0044E078 |. E8 C3E80B00 CALL SQLyog.0050C940
0044E07D |. 83C4 10 ADD ESP,10
0044E080 |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E084 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E08B |. E8 10FF1200 CALL SQLyog.0057DFA0
0044E090 |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E094 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E09F |. E8 FCFE1200 CALL SQLyog.0057DFA0
0044E0A4 |. 83C8 FF OR EAX,FFFFFFFF
0044E0A7 |. E9 28010000 JMP SQLyog.0044E1D4
0044E0AC |> 8D4424 48 LEA EAX,DWORD PTR SS:[ESP+48]
0044E0B0 |. 50 PUSH EAX
0044E0B1 |. E8 B07B2100 CALL SQLyog.00665C66
0044E0B6 |. 83C4 04 ADD ESP,4
0044E0B9 |. 85C0 TEST EAX,EAX
0044E0BB 75 52 JNZ SHORT SQLyog.0044E10F
0044E0BD |. 8B0D A8848800 MOV ECX,DWORD PTR DS:[8884A8]
0044E0C3 |. 6A 40 PUSH 40
0044E0C5 |. 53 PUSH EBX
0044E0C6 |. 81C1 8C020000 ADD ECX,28C
0044E0CC |. E8 BF001300 CALL SQLyog.0057E190
0044E0D1 |. 8B4E 04 MOV ECX,DWORD PTR DS:[ESI+4]
0044E0D4 |. 50 PUSH EAX
0044E0D5 |. 68 C04F6900 PUSH SQLyog.00694FC0 ; please enter your registration code0044E0DA |. 51 PUSH ECX
0044E0DB |. E8 60E80B00 CALL SQLyog.0050C940
0044E0E0 |. 83C4 10 ADD ESP,10
0044E0E3 |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E0E7 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E0EE |. E8 ADFE1200 CALL SQLyog.0057DFA0
0044E0F3 |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E0F7 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E102 |. E8 99FE1200 CALL SQLyog.0057DFA0
0044E107 |. 83C8 FF OR EAX,FFFFFFFF
0044E10A |. E9 C5000000 JMP SQLyog.0044E1D4
0044E10F |> 8D9424 480100>LEA EDX,DWORD PTR SS:[ESP+148]
0044E116 |. 52 PUSH EDX
0044E117 |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
0044E11B |. E8 E0101300 CALL SQLyog.0057F200
0044E120 |. 53 PUSH EBX
0044E121 |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
0044E125 |. E8 D6021300 CALL SQLyog.0057E400
0044E12A |. 53 PUSH EBX
0044E12B |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]
0044E12F |. E8 6C031300 CALL SQLyog.0057E4A0
0044E134 |. 8D4424 48 LEA EAX,DWORD PTR SS:[ESP+48]
0044E138 |. 50 PUSH EAX
0044E139 |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E13D |. E8 BE101300 CALL SQLyog.0057F200
0044E142 |. 53 PUSH EBX
0044E143 |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E147 |. E8 B4021300 CALL SQLyog.0057E400
0044E14C |. 53 PUSH EBX
0044E14D |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E151 |. E8 4A031300 CALL SQLyog.0057E4A0
0044E156 |. 53 PUSH EBX
0044E157 |. 8D4C24 30 LEA ECX,DWORD PTR SS:[ESP+30]
0044E15B |. E8 30001300 CALL SQLyog.0057E190
0044E160 |. 50 PUSH EAX
0044E161 |. 8BCE MOV ECX,ESI
0044E163 |. E8 68F9FFFF CALL SQLyog.0044DAD0
0044E168 |. 8BF8 MOV EDI,EAX
0044E16A |. 83FF 05 CMP EDI,5
0044E16D |. 75 28 JNZ SHORT SQLyog.0044E197
0044E16F |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E173 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E17A |. E8 21FE1200 CALL SQLyog.0057DFA0
0044E17F |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E183 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E18E |. E8 0DFE1200 CALL SQLyog.0057DFA0
0044E193 |. 33C0 XOR EAX,EAX
0044E195 |. EB 3D JMP SHORT SQLyog.0044E1D4
0044E197 |> 57 PUSH EDI
0044E198 |. 8BCE MOV ECX,ESI
0044E19A |. E8 D1F8FFFF CALL SQLyog.0044DA70
0044E19F |. 57 PUSH EDI ; /Arg2
0044E1A0 |. 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14] ; |
0044E1A4 |. 51 PUSH ECX ; |Arg1
0044E1A5 |. 8BCE MOV ECX,ESI ; |
0044E1A7 |. E8 94F9FFFF CALL SQLyog.0044DB40 ; \SQLyog.0044DB40
0044E1AC |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0044E1B0 |. 8BF0 MOV ESI,EAX
0044E1B2 |. 889C24 5C0300>MOV BYTE PTR SS:[ESP+35C],BL
0044E1B9 |. E8 E2FD1200 CALL SQLyog.0057DFA0
0044E1BE |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E1C2 |. C78424 5C0300>MOV DWORD PTR SS:[ESP+35C],-1
0044E1CD |. E8 CEFD1200 CALL SQLyog.0057DFA0
0044E1D2 |. 8BC6 MOV EAX,ESI
0044E1D4 |> 8B8C24 540300>MOV ECX,DWORD PTR SS:[ESP+354]
0044E1DB |. 64:890D 00000>MOV DWORD PTR FS:[0],ECX
0044E1E2 |. 8B8C24 4C0300>MOV ECX,DWORD PTR SS:[ESP+34C]
0044E1E9 |. E8 12762100 CALL SQLyog.00665800
0044E1EE |. 5F POP EDI
0044E1EF |. 5E POP ESI
0044E1F0 |. 5B POP EBX
0044E1F1 |. 8BE5 MOV ESP,EBP
0044E1F3 |. 5D POP EBP
0044E1F4 \. C3 RETN
0044E1F5 CC INT3
0044E1F6 CC INT3
0044E1F7 CC INT3
0044E1F8 CC INT3
0044E1F9 CC INT3
0044E1FA CC INT3
0044E1FB CC INT3
0044E1FC CC INT3
0044E1FD CC INT3
0044E1FE CC INT3
0044E1FF CC INT3
0044E200 . 56 PUSH ESI
0044E201 . 8B7424 08 MOV ESI,DWORD PTR SS:[ESP+8]
0044E205 . 57 PUSH EDI
0044E206 . 6A EB PUSH -15 ; /Index = GWL_USERDATA
0044E208 . 56 PUSH ESI ; |hWnd
0044E209 . FF15 0C866800 CALL DWORD PTR DS:[<&USER32.GetWindowLon>; \GetWindowLongW
0044E20F . 8BF8 MOV EDI,EAX
0044E211 . 8B4424 10 MOV EAX,DWORD PTR SS:[ESP+10]
0044E215 . 3D 38010000 CMP EAX,138 ; Switch (cases 110..43E)
0044E21A . 77 5F JA SHORT SQLyog.0044E27B
0044E21C . 74 47 JE SHORT SQLyog.0044E265
0044E21E . 2D 10010000 SUB EAX,110
0044E223 . 74 1B JE SHORT SQLyog.0044E240
0044E225 . 48 DEC EAX
0044E226 . 0F85 88000000 JNZ SQLyog.0044E2B4
0044E22C . 8B4424 14 MOV EAX,DWORD PTR SS:[ESP+14] ; Case 111 (WM_COMMAND) of switch 0044E215
0044E230 . 50 PUSH EAX ; /Arg2
0044E231 . 56 PUSH ESI ; |Arg1
0044E232 . 8BCF MOV ECX,EDI ; |
0044E234 . E8 87FCFFFF CALL SQLyog.0044DEC0 ; \SQLyog.0044DEC0
0044E239 . 5F POP EDI
0044E23A . 33C0 XOR EAX,EAX
0044E23C . 5E POP ESI
0044E23D . C2 1000 RETN 10
0044E240 > 8B4C24 18 MOV ECX,DWORD PTR SS:[ESP+18] ; Case 110 (WM_INITDIALOG) of switch 0044E215
0044E244 . 51 PUSH ECX ; /NewValue
0044E245 . 6A EB PUSH -15 ; |Index = GWL_USERDATA
0044E247 . 56 PUSH ESI ; |hWnd
0044E248 . FF15 4C866800 CALL DWORD PTR DS:[<&USER32.SetWindowLon>; \SetWindowLongW
0044E24E . 6A 00 PUSH 0 ; /lParam = 0
0044E250 . 6A 00 PUSH 0 ; |wParam = 0
0044E252 . 68 3E040000 PUSH 43E ; |Message = MSG(43E)
0044E257 . 56 PUSH ESI ; |hWnd
0044E258 . FF15 68866800 CALL DWORD PTR DS:[<&USER32.PostMessageW>; \PostMessageW
0044E25E . 5F POP EDI
0044E25F . 33C0 XOR EAX,EAX
0044E261 . 5E POP ESI
0044E262 . C2 1000 RETN 10
0044E265 > 8B5424 18 MOV EDX,DWORD PTR SS:[ESP+18] ; Case 138 (WM_CTLCOLORSTATIC) of switch 0044E215
0044E269 . 8B4424 14 MOV EAX,DWORD PTR SS:[ESP+14]
0044E26D . 52 PUSH EDX
0044E26E . 50 PUSH EAX
0044E26F . 8BCF MOV ECX,EDI
0044E271 . E8 AAFBFFFF CALL SQLyog.0044DE20
0044E276 . 5F POP EDI
0044E277 . 5E POP ESI
0044E278 . C2 1000 RETN 10
0044E27B > 3D 3E040000 CMP EAX,43E
0044E280 . 75 32 JNZ SHORT SQLyog.0044E2B4
0044E282 . 53 PUSH EBX ; Case 43E (WM_USER+3E) of switch 0044E215
0044E283 . 8B1D 38866800 MOV EBX,DWORD PTR DS:[<&USER32.GetDlgIte>; USER32.GetDlgItem
0044E289 . 55 PUSH EBP
0044E28A . 68 50DF4400 PUSH SQLyog.0044DF50 ; /NewValue = 44DF50
0044E28F . 6A FC PUSH -4 ; |Index = GWL_WNDPROC
0044E291 . 68 EE050000 PUSH 5EE ; |/ControlID = 5EE (1518.)
0044E296 . 56 PUSH ESI ; ||hWnd
0044E297 . FFD3 CALL EBX ; |\GetDlgItem
0044E299 . 8B2D 4C866800 MOV EBP,DWORD PTR DS:[<&USER32.SetWindow>; |USER32.SetWindowLongW
0044E29F . 50 PUSH EAX ; |hWnd
0044E2A0 . FFD5 CALL EBP ; \SetWindowLongW
0044E2A2 . 57 PUSH EDI ; /NewValue
0044E2A3 . 6A EB PUSH -15 ; |Index = GWL_USERDATA
0044E2A5 . 68 EE050000 PUSH 5EE ; |/ControlID = 5EE (1518.)
0044E2AA . 56 PUSH ESI ; ||hWnd
0044E2AB . 8907 MOV DWORD PTR DS:[EDI],EAX ; ||
0044E2AD . FFD3 CALL EBX ; |\GetDlgItem
0044E2AF . 50 PUSH EAX ; |hWnd
0044E2B0 . FFD5 CALL EBP ; \SetWindowLongW
0044E2B2 . 5D POP EBP
0044E2B3 . 5B POP EBX
0044E2B4 > 5F POP EDI ; Default case of switch 0044E215
0044E2B5 . 33C0 XOR EAX,EAX
0044E2B7 . 5E POP ESI
0044E2B8 . C2 1000 RETN 10
0044E2BB CC INT3
0044E2BC CC INT3
0044E2BD CC INT3
0044E2BE CC INT3
0044E2BF CC INT3
0044E2C0 /$ 8B4424 04 MOV EAX,DWORD PTR SS:[ESP+4]
0044E2C4 |. 51 PUSH ECX ; /lParam
0044E2C5 |. 8B0D A8848800 MOV ECX,DWORD PTR DS:[8884A8] ; |
0044E2CB |. 8B91 BC020000 MOV EDX,DWORD PTR DS:[ECX+2BC] ; |
0044E2D1 |. 68 00E24400 PUSH SQLyog.0044E200 ; |DlgProc = SQLyog.0044E200
0044E2D6 |. 50 PUSH EAX ; |hOwner
0044E2D7 |. 68 8D030000 PUSH 38D ; |pTemplate = 38D
0044E2DC |. 52 PUSH EDX ; |hInst
0044E2DD |. FF15 08866800 CALL DWORD PTR DS:[<&USER32.DialogBoxPar>; \DialogBoxParamW
0044E2E3 \. C2 0400 RETN 4
0044E2E6 CC INT3
0044E2E7 CC INT3
0044E2E8 CC INT3
0044E2E9 CC INT3
0044E2EA CC INT3
0044E2EB CC INT3
0044E2EC CC INT3
0044E2ED CC INT3
0044E2EE CC INT3
0044E2EF CC INT3
0044E2F0 /$ 6A FF PUSH -1
0044E2F2 |. 68 10CB6700 PUSH SQLyog.0067CB10 ; SE 处理程序安装
0044E2F7 |. 64:A1 0000000>MOV EAX,DWORD PTR FS:[0]
0044E2FD |. 50 PUSH EAX ; (初始 cpu 选择)
0044E2FE |. 64:8925 00000>MOV DWORD PTR FS:[0],ESP ; (初始 cpu 选择)
0044E305 |. 83EC 24 SUB ESP,24
0044E308 |. 56 PUSH ESI
0044E309 |. 8BF1 MOV ESI,ECX ; (初始 cpu 选择)
0044E30B |. 57 PUSH EDI
0044E30C |. 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0044E310 |. E8 9B071300 CALL SQLyog.0057EAB0
0044E315 |. C74424 34 000>MOV DWORD PTR SS:[ESP+34],0
0044E31D |. C74424 0C 000>MOV DWORD PTR SS:[ESP+C],0
0044E325 |. 8B7C24 40 MOV EDI,DWORD PTR SS:[ESP+40]
0044E329 |. 0FB7C7 MOVZX EAX,DI
0044E32C |. 83E8 02 SUB EAX,2 ; Switch (cases 2..417)
0044E32F |. C64424 34 01 MOV BYTE PTR SS:[ESP+34],1
0044E334 |. 0F84 A3000000 JE SQLyog.0044E3DD
0044E33A |. 2D 15040000 SUB EAX,415
0044E33F 0F85 A7000000 JNZ SQLyog.0044E3EC
0044E345 |. 8BCE MOV ECX,ESI ; Case 417 of switch 0044E32C
0044E347 |. E8 54FCFFFF CALL SQLyog.0044DFA0
0044E34C |. 83F8 01 CMP EAX,1
0044E34F 75 78 JNZ SHORT SQLyog.0044E3C9
0044E351 |. 8B0D A8848800 MOV ECX,DWORD PTR DS:[8884A8]
0044E357 |. 8B46 18 MOV EAX,DWORD PTR DS:[ESI+18]
0044E35A |. 81C1 38030000 ADD ECX,338
0044E360 |. 83F8 01 CMP EAX,1
0044E363 75 12 JNZ SHORT SQLyog.0044E377
0044E365 |. E8 F6851400 CALL SQLyog.00596960
0044E36A |. 50 PUSH EAX
0044E36B |. 68 68506900 PUSH SQLyog.00695068 ; thank you for registering sqlyog %s - mysql gui.\n\nplease restart sqlyog to enable all settings
0044E370 |. 8D4424 18 LEA EAX,DWORD PTR SS:[ESP+18]
0044E374 |. 50 PUSH EAX
0044E375 |. EB 10 JMP SHORT SQLyog.0044E387
0044E377 |> E8 E4851400 CALL SQLyog.00596960
0044E37C |. 50 PUSH EAX
0044E37D |. 68 30506900 PUSH SQLyog.00695030 ; thank you for registering sqlyog %s - mysql gui.0044E382 |. 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18]
0044E386 |. 51 PUSH ECX
0044E387 |> E8 84091300 CALL SQLyog.0057ED10
0044E38C |. 83C4 0C ADD ESP,0C
0044E38F |. 6A 40 PUSH 40
0044E391 |. 68 08506900 PUSH SQLyog.00695008 ; sqlyog - mysql gui
0044E396 |. 6A 00 PUSH 0
0044E398 |. 8D4C24 1C LEA ECX,DWORD PTR SS:[ESP+1C]
0044E39C |. E8 EFFD1200 CALL SQLyog.0057E190
0044E3A1 |. 8B7424 44 MOV ESI,DWORD PTR SS:[ESP+44]
0044E3A5 |. 50 PUSH EAX
0044E3A6 |. 56 PUSH ESI
0044E3A7 |. E8 94E50B00 CALL SQLyog.0050C940
0044E3AC |. 8B15 A8848800 MOV EDX,DWORD PTR DS:[8884A8]
0044E3B2 |. 6A 01 PUSH 1
0044E3B4 |. 56 PUSH ESI
0044E3B5 |. C782 64010000>MOV DWORD PTR DS:[EDX+164],0
0044E3BF |. E8 0C980B00 CALL SQLyog.00507BD0
0044E3C4 |. 83C4 18 ADD ESP,18
0044E3C7 EB 23 JMP SHORT SQLyog.0044E3EC
0044E3C9 |> 85C0 TEST EAX,EAX
0044E3CB 75 1F JNZ SHORT SQLyog.0044E3EC
0044E3CD |. 8B4424 3C MOV EAX,DWORD PTR SS:[ESP+3C]
0044E3D1 |. 50 PUSH EAX
0044E3D2 |. 8D4C24 0C LEA ECX,DWORD PTR SS:[ESP+C]
0044E3D6 |. E8 E5FEFFFF CALL SQLyog.0044E2C0
0044E3DB |. EB 0F JMP SHORT SQLyog.0044E3EC
0044E3DD |> 8B4C24 3C MOV ECX,DWORD PTR SS:[ESP+3C] ; Case 2 of switch 0044E32C
0044E3E1 |. 6A 00 PUSH 0
0044E3E3 |. 51 PUSH ECX
0044E3E4 |. E8 E7970B00 CALL SQLyog.00507BD0
0044E3E9 |. 83C4 08 ADD ESP,8
0044E3EC |> 8BD7 MOV EDX,EDI ; Default case of switch 0044E32C
0044E3EE |. C1EA 10 SHR EDX,10
0044E3F1 |. 85D2 TEST EDX,EDX
0044E3F3 |. 75 1C JNZ SHORT SQLyog.0044E411
0044E3F5 |. 66:81FF 6004 CMP DI,460
0044E3FA |. 75 15 JNZ SHORT SQLyog.0044E411
0044E3FC |. 6A 01 PUSH 1 ; /IsShown = 1
0044E3FE |. 52 PUSH EDX ; |DefDir
0044E3FF |. 52 PUSH EDX ; |Parameters
0044E400 |. 68 304F6900 PUSH SQLyog.00694F30 ; |http://www.webyog.com/en/buy.php
0044E405 |. 68 80D26800 PUSH SQLyog.0068D280 ; |open
0044E40A |. 52 PUSH EDX ; |hWnd
0044E40B |. FF15 30846800 CALL DWORD PTR DS:[<&SHELL32.ShellExecut>; \ShellExecuteW
0044E411 |> 8B4424 0C MOV EAX,DWORD PTR SS:[ESP+C]
0044E415 |. 85C0 TEST EAX,EAX
0044E417 |. 5F POP EDI
0044E418 |. 5E POP ESI
0044E419 |. 74 07 JE SHORT SQLyog.0044E422
0044E41B |. 50 PUSH EAX ; /hObject
0044E41C |. FF15 D4806800 CALL DWORD PTR DS:[<&GDI32.DeleteObject>>; \DeleteObject
0044E422 |> 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8]
0044E426 |. C74424 2C FFF>MOV DWORD PTR SS:[ESP+2C],-1
0044E42E |. E8 6DFB1200 CALL SQLyog.0057DFA0
0044E433 |. 8B4C24 24 MOV ECX,DWORD PTR SS:[ESP+24]
0044E437 |. 64:890D 00000>MOV DWORD PTR FS:[0],ECX
0044E43E |. 83C4 30 ADD ESP,30
呵呵,大家就知道怎么破解了把,直接把关键跳nop掉就行了,另外改注册代码是会循环进行的,也没怎么研究,而且该软件是重启验证的额,至今未找到关键文件或注册表代码,大家也来看看,能不能很完整的破解这个东西把
sqlyog下载地址:http://www.e666.cn/download.asp?id=9489&dp=1&fid=33
[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法
赞赏
谁下载
kanxue
email123
黑狗
glucose
surge
lium
lingyu
winting
btlfe
冬哥
pdkralbb
soychino
taxiqi
zenix
exile
釜森
amtekup
xuliwen
王晓松
siryzh
BestHacker
JohnsonGuo
junyuqin
路过人间
剑灵游侠
aikeke
sessiondiy
jgt
mji
网海拾贝
moonife
kumkums
teste
xxsbwpc
viplight
CamelLu
mmxmmxmmx
坐墙头
阳光不秀
daveilee
zhonggw
tokiii
深夜寂静
叶飘
小桃红
iloveqqp
Yaly
西风X
ylsh
王刚wanxg
我是sld
maoxuechun
RogerWood
xbibid
浮羽
whitefirer
woyuwoxing
雨耕山
aait
迷雾流浪
zuoshaobo
whaterzb
bakorbak
qxjlk
天天心悦
xjjzhj
一剑飚血
xuying
woshpzh
dafanxu
房建彬
dujinshan
starabbit
VVvih
gaminglife
ludabiao
xjpzy
unknownace
woshimuye
asetbug
jywire
chuqiping
帆云
gaozhong
ysby
windowsa
t真三
谁下载
kanxue
email123
黑狗
glucose
surge
lium
lingyu
winting
btlfe
冬哥
pdkralbb
soychino
taxiqi
zenix
exile
釜森
amtekup
xuliwen
王晓松
siryzh
BestHacker
JohnsonGuo
junyuqin
路过人间
剑灵游侠
aikeke
sessiondiy
jgt
mji
网海拾贝
moonife
kumkums
teste
xxsbwpc
viplight
CamelLu
mmxmmxmmx
坐墙头
阳光不秀
daveilee
zhonggw
tokiii
深夜寂静
叶飘
小桃红
iloveqqp
Yaly
西风X
ylsh
王刚wanxg
我是sld
maoxuechun
RogerWood
xbibid
浮羽
whitefirer
woyuwoxing
雨耕山
aait
迷雾流浪
zuoshaobo
whaterzb
bakorbak
qxjlk
天天心悦
xjjzhj
一剑飚血
xuying
woshpzh
dafanxu
房建彬
dujinshan
starabbit
VVvih
gaminglife
ludabiao
xjpzy
unknownace
woshimuye
asetbug
jywire
chuqiping
帆云
gaozhong
ysby
windowsa
t真三
谁下载
kanxue
email123
黑狗
glucose
surge
lium
lingyu
winting
btlfe
冬哥
pdkralbb
soychino
taxiqi
zenix
exile
釜森
amtekup
xuliwen
王晓松
siryzh
BestHacker
JohnsonGuo
junyuqin
路过人间
剑灵游侠
aikeke
sessiondiy
jgt
mji
网海拾贝
moonife
kumkums
teste
xxsbwpc
viplight
CamelLu
mmxmmxmmx
坐墙头
阳光不秀
daveilee
zhonggw
tokiii
深夜寂静
叶飘
小桃红
iloveqqp
Yaly
西风X
ylsh
王刚wanxg
我是sld
maoxuechun
RogerWood
xbibid
浮羽
whitefirer
woyuwoxing
雨耕山
aait
迷雾流浪
zuoshaobo
whaterzb
bakorbak
qxjlk
天天心悦
xjjzhj
一剑飚血
xuying
woshpzh
dafanxu
房建彬
dujinshan
starabbit
VVvih
gaminglife
ludabiao
xjpzy
unknownace
woshimuye
asetbug
jywire
chuqiping
帆云
gaozhong
ysby
windowsa
t真三
谁下载
kanxue
email123
黑狗
glucose
surge
lium
lingyu
winting
btlfe
冬哥
pdkralbb
soychino
taxiqi
zenix
exile
釜森
amtekup
xuliwen
王晓松
siryzh
BestHacker
JohnsonGuo
junyuqin
路过人间
剑灵游侠
aikeke
sessiondiy
jgt
mji
网海拾贝
moonife
kumkums
teste
xxsbwpc
viplight
CamelLu
mmxmmxmmx
坐墙头
阳光不秀
daveilee
zhonggw
tokiii
深夜寂静
叶飘
小桃红
iloveqqp
Yaly
西风X
ylsh
王刚wanxg
我是sld
maoxuechun
RogerWood
xbibid
浮羽
whitefirer
woyuwoxing
雨耕山
aait
迷雾流浪
zuoshaobo
whaterzb
bakorbak
qxjlk
天天心悦
xjjzhj
一剑飚血
xuying
woshpzh
dafanxu
房建彬
dujinshan
starabbit
VVvih
gaminglife
ludabiao
xjpzy
unknownace
woshimuye
asetbug
jywire
chuqiping
帆云
gaozhong
ysby
windowsa
t真三
看原图
赞赏
雪币:
留言: