【破文标题】英汉翻译王 2007破解
【破文作者】酷子(吴宗宪)
【作者邮箱】1183204@qq.com
【作者主页】1183204@qq.com
【破解工具】peid0.94+OD
【破解平台】XPsp2
【软件名称】英汉翻译王 2007
【软件大小】648KB
【原版下载】http://crc.onlinedown.net/soft/50649.htm
【保护方式】注册码
【软件简介】 一款快速高效的英汉翻译软件,不仅可以实现英汉互译,还可实现繁简互译。并伴有语音朗读功能。您在平时学习英语的过程中、上网浏览英文站点时、看英文原版书籍时、或是在做翻译工作时。你需要一个工具帮助您,从而使语言不再成为你前进的障碍,体验异彩纷呈的精神文明和文化世界,我们推荐您使用《英汉翻译王》。她将是您工作、学习、网上生活的理想小伴侣。
【破解声明】初学Crack,只是感兴趣,没有其它目的。失误之处敬请诸位大侠赐教!
------------------------------------------------------------------------
【破解过程】peid扫描没有壳,Borland Delphi 6.0-7.0编写
没有注册程序只能运行5分钟,所有功能被关闭只有帮助菜单可用
od载入
f9运行
输入信息:注册码 87654321
机器码 3FED131C
od下断bp MessageBoxA
断下来,alt+f9返回
........
0046B066 |. 55 PUSH EBP
0046B067 |. 68 E8B04600 PUSH ectk.0046B0E8
0046B06C |. 64:FF31 PUSH DWORD PTR FS:[ECX]
0046B06F |. 64:8921 MOV DWORD PTR FS:[ECX],ESP
0046B072 |. 56 PUSH ESI ; /Style
0046B073 |. 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8] ; |
0046B076 |. 50 PUSH EAX ; |Title
0046B077 |. 57 PUSH EDI ; |Text
0046B078 |. 53 PUSH EBX ; |hOwner
0046B079 |. E8 2AC5F9FF CALL <JMP.&user32.MessageBoxA> ; \MessageBoxA 返回到这里
0046B07E |. 8945 F4 MOV DWORD PTR SS:[EBP-C],EAX 向上找,没有找到跳过去的地方
0046B081 |. 33C0 XOR EAX,EAX 所以f8一直向下走,直到返回
0046B083 |. 5A POP EDX
0046B084 |. 59 POP ECX
0046B085 |. 59 POP ECX
0046B086 |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
0046B089 |. 68 EFB04600 PUSH ectk.0046B0EF
0046B08E |> 8B45 E8 MOV EAX,DWORD PTR SS:[EBP-18]
0046B091 |. 3B45 E4 CMP EAX,DWORD PTR SS:[EBP-1C]
0046B094 |. 74 38 JE SHORT ectk.0046B0CE
........
返回来到这里
00494CAC /. 55 PUSH EBP
00494CAD |. 8BEC MOV EBP,ESP
00494CAF |. B9 07000000 MOV ECX,7
00494CB4 |> 6A 00 /PUSH 0
00494CB6 |. 6A 00 |PUSH 0
00494CB8 |. 49 |DEC ECX
00494CB9 |.^ 75 F9 \JNZ SHORT ectk.00494CB4
00494CBB |. 53 PUSH EBX
00494CBC |. 8BD8 MOV EBX,EAX
00494CBE |. 33C0 XOR EAX,EAX
00494CC0 |. 55 PUSH EBP
00494CC1 |. 68 A34E4900 PUSH ectk.00494EA3
00494CC6 |. 64:FF30 PUSH DWORD PTR FS:[EAX]
00494CC9 |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
00494CCC |. 8D55 F4 LEA EDX,DWORD PTR SS:[EBP-C]
00494CCF |. 8B83 68030000 MOV EAX,DWORD PTR DS:[EBX+368]
00494CD5 |. E8 E280FBFF CALL ectk.0044CDBC
00494CDA |. 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C]
00494CDD |. 8D55 F8 LEA EDX,DWORD PTR SS:[EBP-8]
00494CE0 |. E8 0F43F7FF CALL ectk.00408FF4
00494CE5 |. 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
00494CE8 |. 50 PUSH EAX
00494CE9 |. 8D45 E8 LEA EAX,DWORD PTR SS:[EBP-18]
00494CEC |. E8 5BF9FFFF CALL ectk.0049464C
00494CF1 |. 8B45 E8 MOV EAX,DWORD PTR SS:[EBP-18]
00494CF4 |. 8D55 EC LEA EDX,DWORD PTR SS:[EBP-14]
00494CF7 |. E8 F842F7FF CALL ectk.00408FF4
00494CFC |. 8D45 EC LEA EAX,DWORD PTR SS:[EBP-14]
00494CFF |. 50 PUSH EAX
00494D00 |. 8D45 E0 LEA EAX,DWORD PTR SS:[EBP-20]
00494D03 |. E8 84F7FFFF CALL ectk.0049448C
00494D08 |. 8B45 E0 MOV EAX,DWORD PTR SS:[EBP-20]
00494D0B |. 8D55 E4 LEA EDX,DWORD PTR SS:[EBP-1C]
00494D0E |. E8 E142F7FF CALL ectk.00408FF4
00494D13 |. 8B55 E4 MOV EDX,DWORD PTR SS:[EBP-1C]
00494D16 |. 58 POP EAX
00494D17 |. E8 4C00F7FF CALL ectk.00404D68
00494D1C |. 8B45 EC MOV EAX,DWORD PTR SS:[EBP-14]
00494D1F |. 8D4D F0 LEA ECX,DWORD PTR SS:[EBP-10]
00494D22 |. BA B84E4900 MOV EDX,ectk.00494EB8 ; ASCII "t674"
00494D27 |. E8 40FAFFFF CALL ectk.0049476C
00494D2C |. 8B55 F0 MOV EDX,DWORD PTR SS:[EBP-10] *经典句式
00494D2F |. 58 POP EAX *
00494D30 |. E8 8F01F7FF CALL ectk.00404EC4 *这里是关键call
00494D35 |. 0F85 E2000000 JNZ ectk.00494E1D 跳过就错误提示,要爆破就这里不跳
00494D3B |. A1 14274A00 MOV EAX,DWORD PTR DS:[4A2714]
00494D40 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494D42 |. 8B80 AC050000 MOV EAX,DWORD PTR DS:[EAX+5AC]
00494D48 |. 33D2 XOR EDX,EDX
00494D4A |. E8 F51BFAFF CALL ectk.00436944
00494D4F |. 8D55 D8 LEA EDX,DWORD PTR SS:[EBP-28]
00494D52 |. 8B83 68030000 MOV EAX,DWORD PTR DS:[EBX+368]
00494D58 |. E8 5F80FBFF CALL ectk.0044CDBC
00494D5D |. 8B45 D8 MOV EAX,DWORD PTR SS:[EBP-28]
00494D60 |. 8D55 DC LEA EDX,DWORD PTR SS:[EBP-24]
00494D63 |. E8 8C42F7FF CALL ectk.00408FF4
00494D68 |. 8B55 DC MOV EDX,DWORD PTR SS:[EBP-24]
00494D6B |. A1 14274A00 MOV EAX,DWORD PTR DS:[4A2714]
00494D70 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494D72 |. 8B80 B0050000 MOV EAX,DWORD PTR DS:[EAX+5B0]
00494D78 |. E8 6F80FBFF CALL ectk.0044CDEC
00494D7D |. 8D55 D0 LEA EDX,DWORD PTR SS:[EBP-30]
00494D80 |. A1 6C294A00 MOV EAX,DWORD PTR DS:[4A296C]
00494D85 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494D87 |. E8 5C67FDFF CALL ectk.0046B4E8
00494D8C |. 8B45 D0 MOV EAX,DWORD PTR SS:[EBP-30]
00494D8F |. 8D55 D4 LEA EDX,DWORD PTR SS:[EBP-2C]
00494D92 |. E8 9D4BF7FF CALL ectk.00409934
00494D97 |. 8B45 D4 MOV EAX,DWORD PTR SS:[EBP-2C]
00494D9A |. 8D55 FC LEA EDX,DWORD PTR SS:[EBP-4]
00494D9D |. E8 3A3FF7FF CALL ectk.00408CDC
00494DA2 |. 8D4D CC LEA ECX,DWORD PTR SS:[EBP-34]
00494DA5 |. 33D2 XOR EDX,EDX
00494DA7 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
00494DAA |. E8 F14AF7FF CALL ectk.004098A0
00494DAF |. 8B55 CC MOV EDX,DWORD PTR SS:[EBP-34]
00494DB2 |. 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
00494DB5 |. E8 7AFDF6FF CALL ectk.00404B34
00494DBA |. A1 14274A00 MOV EAX,DWORD PTR DS:[4A2714]
00494DBF |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494DC1 |. FFB0 BC050000 PUSH DWORD PTR DS:[EAX+5BC]
00494DC7 |. 68 C84E4900 PUSH ectk.00494EC8
00494DCC |. FF75 FC PUSH DWORD PTR SS:[EBP-4]
00494DCF |. 68 D44E4900 PUSH ectk.00494ED4 ; ASCII ".dll"
00494DD4 |. 8D45 C8 LEA EAX,DWORD PTR SS:[EBP-38]
00494DD7 |. BA 04000000 MOV EDX,4
00494DDC |. E8 4F00F7FF CALL ectk.00404E30 ;写入注册信息
00494DE1 |. 8B55 C8 MOV EDX,DWORD PTR SS:[EBP-38]
00494DE4 |. A1 14274A00 MOV EAX,DWORD PTR DS:[4A2714]
00494DE9 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494DEB |. 8B80 B0050000 MOV EAX,DWORD PTR DS:[EAX+5B0]
00494DF1 |. 8B80 70020000 MOV EAX,DWORD PTR DS:[EAX+270]
00494DF7 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
00494DF9 |. FF51 74 CALL DWORD PTR DS:[ECX+74]
00494DFC |. 6A 40 PUSH 40
00494DFE |. B9 DC4E4900 MOV ECX,ectk.00494EDC
00494E03 |. BA E44E4900 MOV EDX,ectk.00494EE4
00494E08 |. A1 6C294A00 MOV EAX,DWORD PTR DS:[4A296C]
00494E0D |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494E0F |. E8 6C61FDFF CALL ectk.0046AF80 ;注册成功的call
00494E14 |. 8BC3 MOV EAX,EBX
00494E16 |. E8 FD20FDFF CALL ectk.00466F18
00494E1B |. EB 41 JMP SHORT ectk.00494E5E
00494E1D |> 6A 10 PUSH 10
00494E1F |. B9 DC4E4900 MOV ECX,ectk.00494EDC
00494E24 |. BA F84E4900 MOV EDX,ectk.00494EF8
00494E29 |. A1 6C294A00 MOV EAX,DWORD PTR DS:[4A296C]
00494E2E |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
00494E30 |. E8 4B61FDFF CALL ectk.0046AF80
00494E35 |. 33D2 XOR EDX,EDX ; ntdll.KiFastSystemCallRet
00494E37 |. 8B83 68030000 MOV EAX,DWORD PTR DS:[EBX+368] 返回来到这里,向上找
00494E3D |. E8 AA7FFBFF CALL ectk.0044CDEC
重新在00494D30处下断,注册,观察堆栈
EAX 00B2EF20 ASCII "87654321" 假码
ECX FFFFFFFE
EDX 00B1E408 ASCII "7207040570727002"头 真码
EBX 0131BFE0
ESP 0012F570
EBP 0012F5B8
ESI 00432568 ectk.00432568
EDI 0012F758
EIP 00494D30 ectk.00494D30
eax假码87654321
edx真码7207040570727002
完毕
内存注册机
中断地址:00494D30
中断次数:1
第一字节:E8
指令长度:5
内存方式-寄存器EDX
顺便说一下:注册信息写在 C:\windows\system32\ectk.dll里
------------------------------------------------------------------------
【破解总结】一个比较简单的追码,适合初学者。希望版主和前辈们指点。
------------------------------------------------------------------------
【版权声明】转载请注明出处,请注明作者并保持文章的完整, 谢谢!
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)