这个程序的作者开了个玩笑,而且有注册码输入机制,看下面:
00556380 /. 55 PUSH EBP
00556381 |. 8BEC MOV EBP,ESP
00556383 |. 81C4 2CFEFFFF ADD ESP,-1D4
00556389 |. 53 PUSH EBX
0055638A |. 33C9 XOR ECX,ECX
0055638C |. 898D 2CFEFFFF MOV DWORD PTR SS:[EBP-1D4],ECX
00556392 |. 894D FC MOV DWORD PTR SS:[EBP-4],ECX
00556395 |. 8BD8 MOV EBX,EAX
00556397 |. 33C0 XOR EAX,EAX
00556399 |. 55 PUSH EBP
0055639A |. 68 5C645500 PUSH Unpacked.0055645C
0055639F |. 64:FF30 PUSH DWORD PTR FS:[EAX]
005563A2 |. 64:8920 MOV DWORD PTR FS:[EAX],ESP
005563A5 |. 8D95 2CFEFFFF LEA EDX,DWORD PTR SS:[EBP-1D4]
005563AB |. 8B83 08030000 MOV EAX,DWORD PTR DS:[EBX+308]
005563B1 |. E8 4AA8F1FF CALL Unpacked.00470C00
005563B6 |. 8B85 2CFEFFFF MOV EAX,DWORD PTR SS:[EBP-1D4]
005563BC |. 8D55 FC LEA EDX,DWORD PTR SS:[EBP-4]
005563BF |. E8 7C33EBFF CALL Unpacked.00409740
005563C4 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
005563C7 |. E8 40EBEAFF CALL Unpacked.00404F0C
005563CC |. 83F8 0C CMP EAX,0C ;是12位注册码吗?
005563CF 75 60 JNZ SHORT Unpacked.00556431
005563D1 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
005563D4 |. 8078 02 6B CMP BYTE PTR DS:[EAX+2],6B ;第三位是k吗?
005563D8 |. 75 57 JNZ SHORT Unpacked.00556431
005563DA |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
005563DD |. 8078 04 6F CMP BYTE PTR DS:[EAX+4],6F ;第五位是o吗?
005563E1 |. 75 4E JNZ SHORT Unpacked.00556431
005563E3 |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
005563E6 |. 8078 08 32 CMP BYTE PTR DS:[EAX+8],32 ;第七位是2吗?
005563EA |. 75 45 JNZ SHORT Unpacked.00556431
005563EC |. 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
005563EF |. 8078 06 39 CMP BYTE PTR DS:[EAX+6],39 ;第九位是9吗?
005563F3 |. 75 3C JNZ SHORT Unpacked.00556431
005563F5 |. B8 70645500 MOV EAX,Unpacked.00556470
005563FA E8 151CEEFF CALL Unpacked.00438014
;显示“你正在进行非法破解,正在格式化硬盘,请从新启动,然后从装系统”作者真实会开玩笑
005563FF |. BA C8645500 MOV EDX,Unpacked.005564C8 ; ASCII "user.dll"
00556404 |. 8D85 30FEFFFF LEA EAX,DWORD PTR SS:[EBP-1D0]
0055640A |. E8 2DCBEAFF CALL Unpacked.00402F3C
0055640F |. 8D85 30FEFFFF LEA EAX,DWORD PTR SS:[EBP-1D0]
00556415 |. E8 B2C8EAFF CALL Unpacked.00402CCC
0055641A |. E8 31C5EAFF CALL Unpacked.00402950
0055641F |. 8D85 30FEFFFF LEA EAX,DWORD PTR SS:[EBP-1D0]
00556425 |. E8 DACBEAFF CALL Unpacked.00403004
0055642A |. E8 21C5EAFF CALL Unpacked.00402950
0055642F |. EB 0A JMP SHORT Unpacked.0055643B
00556431 |> B8 DC645500 MOV EAX,Unpacked.005564DC
00556436 |. E8 D91BEEFF CALL Unpacked.00438014 ;显示对话框“注册码错误”
0055643B |> 33C0 XOR EAX,EAX
0055643D |. 5A POP EDX
0055643E |. 59 POP ECX
0055643F |. 59 POP ECX
00556440 |. 64:8910 MOV DWORD PTR FS:[EAX],EDX
00556443 |. 68 63645500 PUSH Unpacked.00556463
00556448 |> 8D85 2CFEFFFF LEA EAX,DWORD PTR SS:[EBP-1D4]
0055644E |. E8 F9E7EAFF CALL Unpacked.00404C4C
00556453 |. 8D45 FC LEA EAX,DWORD PTR SS:[EBP-4]
00556456 |. E8 F1E7EAFF CALL Unpacked.00404C4C
0055645B \. C3 RETN
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)