能力值:
( LV9,RANK:140 )
|
-
-
2 楼
好象黑鹰的破解教程里有这样一篇!!111
|
能力值:
( LV3,RANK:20 )
|
-
-
3 楼
黑鹰的是脱 ASProtect 1.23 RC1 -> Alexey Solodovnikov
贴下他的文字吧,视频去网上找好了
ASProtect 1.23 RC1 -> Alexey Solodovnikov
没有注册的时候有试用提示!
1、OD载入之后忽略除了内存访问之外的所有异常,隐藏OD!Shift+F9,注意堆栈!
0012FF54 018032F0
0012FF58 01811810 ASCII "6uob9ACQoUA=" //硬盘指纹
当第2次出现硬盘指纹的时候,在00401000下F2断点,Shift+F9!
00480650 55 push ebp
00480651 8BEC mov ebp,esp
00480653 8B45 08 mov eax,dword ptr ss:[ebp+8]
00480656 A3 EC7E4800 mov dword ptr ds:[487EEC],eax //487EEC就是保存注册名的位置
0048065B 5D pop ebp
0048065C C2 0400 retn 4
继续Shift+F9运行来到最后一次异常!
01802CD1 3100 xor dword ptr ds:[eax],eax //最后一次异常
01802CD3 64:8F05 0000000>pop dword ptr fs:[0]
01802CDA 58 pop eax
01802CDB 833D 7C6D8001 0>cmp dword ptr ds:[1806D7C],0
01802CE2 74 14 je short 01802CF8
01802CE4 6A 0C push 0C
01802CE6 B9 7C6D8001 mov ecx,1806D7C
01802CEB 8D45 F8 lea eax,dword ptr ss:[ebp-8]
01802CEE BA 04000000 mov edx,4
01802CF3 E8 54E1FFFF call 01800E4C
01802CF8 FF75 FC push dword ptr ss:[ebp-4]
01802CFB FF75 F8 push dword ptr ss:[ebp-8]
01802CFE 8B45 F4 mov eax,dword ptr ss:[ebp-C]
01802D01 8338 00 cmp dword ptr ds:[eax],0
01802D04 74 02 je short 01802D08
01802D06 FF30 push dword ptr ds:[eax]
01802D08 FF75 F0 push dword ptr ss:[ebp-10]
01802D0B FF75 EC push dword ptr ss:[ebp-14]
01802D0E C3 retn //F2下断,Shift+F9运行,注意堆栈
0012FF5C 018148AC
0012FF60 00400000 ASCII "MZP"
0012FF64 C9F5F162
0012FF68 0012FFA4 //要的就是0012FF68
hr 0012FF68,F9运行
01815082 03C3 add eax,ebx ; emailcas.00400000 //来到这里,F8
01815084 894424 1C mov dword ptr ss:[esp+1C],eax
01815088 61 popad
01815089 FFE0 jmp eax //跳到OEP
00486718 55 push ebp //OEP
00486719 8BEC mov ebp,esp
0048671B 83C4 F4 add esp,-0C
0048671E B8 18654800 mov eax,emailcas.00486518
00486723 E8 5401F8FF call emailcas.0040687C
00486728 A1 BC814800 mov eax,dword ptr ds:[4881BC]
0048672D 8B00 mov eax,dword ptr ds:[eax]
以下就是脱壳修复了,见动画操作!
最后是以自己的名字注册了!
还记得487EEC就是保存注册名的位置
载入脱壳后修复的文件
命令行DD 487EEC
00487EEC 017F3861
00487EF0 0000001E
00487EF4 0000001E
修改成
00487EEC 00488FE0 ASCII "Crack By 3800CC"
00487EF0 FFFFFFFF
00487EF4 FFFFFFFF
**************
找块空地
00488FE0 63617243
00488FE4 7942206B
00488FE8 C8FDC820
00488FEC 00D0D0CB shell32.00D0D0C
|
能力值:
( LV3,RANK:36 )
|
-
-
4 楼
00401000 > 68 01606700 push CaiGou.00676001
00401005 E8 01000000 call CaiGou.0040100B
0040100A C3 retn
0040100B C3 retn
0040100C 84C3 test bl,al
0040100E 89C3 mov ebx,eax
00401010 319419 6C042BA8 xor dword ptr ds:[ecx+ebx+A82B046C],edx
00401017 A1 25BEAE14 mov eax,dword ptr ds:[14AEBE25]
0040101C FC cld
0040101D 9A 8CC7ACF6 4F2>call far 204F:F6ACC78C
00401024 3C 8C cmp al,8C
00401026 D28F 53DC89A3 ror byte ptr ds:[edi+A389DC53],cl
0040102C 56 push esi
0040102D C14E 60 C8 ror dword ptr ds:[esi+60],0C8
00401031 131C06 adc ebx,dword ptr ds:[esi+eax]
00401034 40 inc eax
00401035 0130 add dword ptr ds:[eax],esi
00401037 27 daa
00401038 5C pop esp
00401039 8222 58 and byte ptr ds:[edx],58
0040103C - 66:74 9B je short 00000FDA
0040103F 25 3C0EC4CF and eax,CFC40E3C
00401044 92 xchg eax,edx
00401045 F9 stc
00401046 3D DE2E5F14 cmp eax,145F2EDE
0040104B 92 xchg eax,edx
0040104C 08EC or ah,ch
0040104E 3F aas
0040104F 1853 42 sbb byte ptr ds:[ebx+42],dl
00401052 F8 clc
00401053 EE out dx,al
00401054 - EB A8 jmp short CaiGou.00400FFE
00401056 207F AE and byte ptr ds:[edi-52],bh
00401059 8419 test byte ptr ds:[ecx],bl
0040105B 05 2F11B4A0 add eax,A0B4112F
00401060 A0 8FDE9958 mov al,byte ptr ds:[5899DE8F]
00401065 96 xchg eax,esi
00401066 5B pop ebx
00401067 2D CF30CEB9 sub eax,B9CE30CF
0040106C 0848 AD or byte ptr ds:[eax-53],cl
0040106F B4 CB mov ah,0CB
00401071 8F ??? ; 未知命令
00401072 AB stos dword ptr es:[edi]
00401073 B0 E6 mov al,0E6
00401075 78 45 js short CaiGou.004010BC
00401077 66:D4 3B aam 3B
0040107A B2 82 mov dl,82
0040107C 19B1 B91F1E21 sbb dword ptr ds:[ecx+211E1FB9],esi
00401082 6D ins dword ptr es:[edi],dx
00401083 2F das
00401084 F793 3AA2E298 not dword ptr ds:[ebx+98E2A23A]
0040108A 8D38 lea edi,dword ptr ds:[eax]
0040108C BF FF8FA28B mov edi,8BA28FFF
00401091 43 inc ebx
00401092 1D A80B5553 sbb eax,53550BA8
00401097 5D pop ebp
他的那些我看过,,可是和我的这个不一样..我这个开始是上面的样子的.....怎么跑都是死循环.也没他说的硬盘指纹..跑Shift+f9,,,,,,4次程序就跑了
|