-
-
[旧帖] [求助]求破解思路 0.00雪花
-
发表于: 2009-3-12 19:18 2271
-
nSPack 2.1 - 2.5 -> North Star/Liu Xing Ping [Overlay]
文件为.dll文件,怎么破解呀
用OD打开后
10001000 /$ 51 push ecx
10001001 |. 8B4C24 08 mov ecx,dword ptr ss:[esp+8]
10001005 |. 53 push ebx
10001006 |. 56 push esi
10001007 |. 33C0 xor eax,eax
10001009 |. 33D2 xor edx,edx
1000100B |. 33DB xor ebx,ebx
1000100D |. 33F6 xor esi,esi
1000100F |. 3811 cmp byte ptr ds:[ecx],dl
10001011 |. 57 push edi
10001012 |. 884424 0F mov byte ptr ss:[esp+F],al
10001016 |. 8BF9 mov edi,ecx
10001018 |. 0F84 E7000000 je HOOK.10001105
1000101E |. 8BFF mov edi,edi
10001020 |> 8A0F /mov cl,byte ptr ds:[edi]
10001022 |. 80F9 41 |cmp cl,41
10001025 |. 7C 0E |jl short HOOK.10001035
10001027 |. 80F9 5A |cmp cl,5A
1000102A |. 7F 09 |jg short HOOK.10001035
1000102C |. 80E9 41 |sub cl,41
1000102F |. 884C24 0F |mov byte ptr ss:[esp+F],cl
10001033 |. EB 4D |jmp short HOOK.10001082
10001035 |> 80F9 61 |cmp cl,61
10001038 |. 7C 0E |jl short HOOK.10001048
1000103A |. 80F9 7A |cmp cl,7A
1000103D |. 7F 09 |jg short HOOK.10001048
1000103F |. 80E9 47 |sub cl,47
10001042 |. 884C24 0F |mov byte ptr ss:[esp+F],cl
10001046 |. EB 3A |jmp short HOOK.10001082
10001048 |> 80F9 30 |cmp cl,30
1000104B |. 7C 0E |jl short HOOK.1000105B
1000104D |. 80F9 39 |cmp cl,39
10001050 |. 7F 09 |jg short HOOK.1000105B
10001052 |. 80C1 04 |add cl,4
10001055 |. 884C24 0F |mov byte ptr ss:[esp+F],cl
10001059 |. EB 27 |jmp short HOOK.10001082
1000105B |> 80F9 2B |cmp cl,2B
1000105E |. 75 07 |jnz short HOOK.10001067
10001060 |. C64424 0F 3E |mov byte ptr ss:[esp+F],3E
10001065 |. EB 1B |jmp short HOOK.10001082
10001067 |> 80F9 2F |cmp cl,2F
1000106A |. 75 07 |jnz short HOOK.10001073
1000106C |. C64424 0F 3F |mov byte ptr ss:[esp+F],3F
10001071 |. EB 0F |jmp short HOOK.10001082
10001073 |> 80F9 0D |cmp cl,0D
10001076 |. 74 41 |je short HOOK.100010B9
10001078 |. 80F9 0A |cmp cl,0A
1000107B |. 74 3C |je short HOOK.100010B9
1000107D |. 80F9 3D |cmp cl,3D
10001080 |. 74 45 |je short HOOK.100010C7
10001082 |> 0FB64C24 0F |movzx ecx,byte ptr ss:[esp+F]
10001087 |. C1E3 06 |shl ebx,6
1000108A |. 0BD9 |or ebx,ecx
1000108C |. 42 |inc edx
1000108D |. 83FA 04 |cmp edx,4
10001090 |. 75 27 |jnz short HOOK.100010B9
10001092 |. 8D56 03 |lea edx,dword ptr ds:[esi+3]
10001095 |. 52 |push edx
10001096 |. 50 |push eax
10001097 |. E8 6D550000 |call HOOK.10006609
1000109C |. 8BCB |mov ecx,ebx
1000109E |. C1F9 10 |sar ecx,10
100010A1 |. 880C06 |mov byte ptr ds:[esi+eax],cl
100010A4 |. 83C4 08 |add esp,8
100010A7 |. 46 |inc esi
100010A8 |. 8BD3 |mov edx,ebx
100010AA |. C1FA 08 |sar edx,8
100010AD |. 881406 |mov byte ptr ds:[esi+eax],dl
100010B0 |. 46 |inc esi
100010B1 |. 881C06 |mov byte ptr ds:[esi+eax],bl
100010B4 |. 46 |inc esi
100010B5 |. 33DB |xor ebx,ebx
100010B7 |. 33D2 |xor edx,edx
100010B9 |> 8A4F 01 |mov cl,byte ptr ds:[edi+1]
100010BC |. 47 |inc edi
100010BD |. 84C9 |test cl,cl
100010BF |.^ 0F85 5BFFFFFF \jnz HOOK.10001020
100010C5 |. EB 3E jmp short HOOK.10001105
100010C7 |> 83FA 03 cmp edx,3
100010CA |. 75 1F jnz short HOOK.100010EB
100010CC |. 8D4E 02 lea ecx,dword ptr ds:[esi+2]
100010CF |. 51 push ecx
100010D0 |. 50 push eax
100010D1 |. E8 33550000 call HOOK.10006609
100010D6 |. 8BD3 mov edx,ebx
100010D8 |. C1FA 0A sar edx,0A
100010DB |. 881406 mov byte ptr ds:[esi+eax],dl
100010DE |. 83C4 08 add esp,8
100010E1 |. 46 inc esi
100010E2 |. C1FB 02 sar ebx,2
100010E5 |. 881C06 mov byte ptr ds:[esi+eax],bl
100010E8 |. 46 inc esi
100010E9 |. EB 1A jmp short HOOK.10001105
100010EB |> 83FA 02 cmp edx,2
100010EE |. 75 15 jnz short HOOK.10001105
100010F0 |. 8D7E 01 lea edi,dword ptr ds:[esi+1]
100010F3 |. 57 push edi
100010F4 |. 50 push eax
100010F5 |. E8 0F550000 call HOOK.10006609
100010FA |. 83C4 08 add esp,8
100010FD |. C1FB 04 sar ebx,4
10001100 |. 881C06 mov byte ptr ds:[esi+eax],bl
10001103 |. 8BF7 mov esi,edi
10001105 |> 8D4E 01 lea ecx,dword ptr ds:[esi+1]
10001108 |. 51 push ecx
10001109 |. 50 push eax
1000110A |. E8 FA540000 call HOOK.10006609
1000110F |. 8B5424 20 mov edx,dword ptr ss:[esp+20]
10001113 |. C60406 00 mov byte ptr ds:[esi+eax],0
10001117 |. 8902 mov dword ptr ds:[edx],eax
10001119 |. 8B4424 24 mov eax,dword ptr ss:[esp+24]
1000111D |. 83C4 08 add esp,8
10001120 |. 85C0 test eax,eax
10001122 |. 74 02 je short HOOK.10001126
10001124 |. 8930 mov dword ptr ds:[eax],esi
10001126 |> 5F pop edi
10001127 |. 5E pop esi
10001128 |. 5B pop ebx
10001129 |. 59 pop ecx
1000112A \. C3 retn
1000112B CC int3
1000112C CC int3
1000112D CC int3
1000112E CC int3
1000112F CC int3
10001130 /$ 8BC1 mov eax,ecx
10001132 |. 33C9 xor ecx,ecx
10001134 |. 8BD0 mov edx,eax
10001136 |. 890A mov dword ptr ds:[edx],ecx
10001138 |. 894A 04 mov dword ptr ds:[edx+4],ecx
1000113B |. 894A 08 mov dword ptr ds:[edx+8],ecx
1000113E |. 894A 0C mov dword ptr ds:[edx+C],ecx
10001141 |. 894A 10 mov dword ptr ds:[edx+10],ecx
10001144 |. 894A 14 mov dword ptr ds:[edx+14],ecx
10001147 \. C3 retn
10001148 CC int3
10001149 CC int3
1000114A CC int3
1000114B CC int3
1000114C CC int3
1000114D CC int3
1000114E CC int3
1000114F CC int3
步入就成
00410149 |> /833D 50004200 00 /cmp dword ptr ds:[420050],0
00410150 |. |0F84 EC000000 |je LOADDLL.00410242
00410156 |. |8925 24014200 |mov dword ptr ds:[420124],esp
0041015C |. |8925 28014200 |mov dword ptr ds:[420128],esp
00410162 |. |6A 00 |push 0
00410164 |. |6A 00 |push 0
00410166 |. |6A 00 |push 0
00410168 |. |6A 00 |push 0
0041016A |. |6A 00 |push 0
0041016C |. |6A 00 |push 0
0041016E |. |6A 00 |push 0
00410170 |. |6A 00 |push 0
00410172 |. |6A 00 |push 0
00410174 |. |6A 00 |push 0
00410176 |. |6A 00 |push 0
00410178 |. |6A 00 |push 0
0041017A |. |6A 00 |push 0
0041017C |. |6A 00 |push 0
0041017E |. |6A 00 |push 0
00410180 |. |6A 00 |push 0
00410182 |. |8B0D 6C004200 |mov ecx,dword ptr ds:[42006C]
00410188 |. |E3 20 |jecxz short LOADDLL.004101AA
0041018A |. |83F9 0A |cmp ecx,0A
0041018D |. |76 0F |jbe short LOADDLL.0041019E
0041018F |. |C705 20004200 7D014200 |mov dword ptr ds:[420020],LOADDLL.0042017>; ASCII "Too many parameters"
00410199 |. |E9 EE000000 |jmp LOADDLL.0041028C
这怎么弄的?
文件为.dll文件,怎么破解呀
用OD打开后
10001000 /$ 51 push ecx
10001001 |. 8B4C24 08 mov ecx,dword ptr ss:[esp+8]
10001005 |. 53 push ebx
10001006 |. 56 push esi
10001007 |. 33C0 xor eax,eax
10001009 |. 33D2 xor edx,edx
1000100B |. 33DB xor ebx,ebx
1000100D |. 33F6 xor esi,esi
1000100F |. 3811 cmp byte ptr ds:[ecx],dl
10001011 |. 57 push edi
10001012 |. 884424 0F mov byte ptr ss:[esp+F],al
10001016 |. 8BF9 mov edi,ecx
10001018 |. 0F84 E7000000 je HOOK.10001105
1000101E |. 8BFF mov edi,edi
10001020 |> 8A0F /mov cl,byte ptr ds:[edi]
10001022 |. 80F9 41 |cmp cl,41
10001025 |. 7C 0E |jl short HOOK.10001035
10001027 |. 80F9 5A |cmp cl,5A
1000102A |. 7F 09 |jg short HOOK.10001035
1000102C |. 80E9 41 |sub cl,41
1000102F |. 884C24 0F |mov byte ptr ss:[esp+F],cl
10001033 |. EB 4D |jmp short HOOK.10001082
10001035 |> 80F9 61 |cmp cl,61
10001038 |. 7C 0E |jl short HOOK.10001048
1000103A |. 80F9 7A |cmp cl,7A
1000103D |. 7F 09 |jg short HOOK.10001048
1000103F |. 80E9 47 |sub cl,47
10001042 |. 884C24 0F |mov byte ptr ss:[esp+F],cl
10001046 |. EB 3A |jmp short HOOK.10001082
10001048 |> 80F9 30 |cmp cl,30
1000104B |. 7C 0E |jl short HOOK.1000105B
1000104D |. 80F9 39 |cmp cl,39
10001050 |. 7F 09 |jg short HOOK.1000105B
10001052 |. 80C1 04 |add cl,4
10001055 |. 884C24 0F |mov byte ptr ss:[esp+F],cl
10001059 |. EB 27 |jmp short HOOK.10001082
1000105B |> 80F9 2B |cmp cl,2B
1000105E |. 75 07 |jnz short HOOK.10001067
10001060 |. C64424 0F 3E |mov byte ptr ss:[esp+F],3E
10001065 |. EB 1B |jmp short HOOK.10001082
10001067 |> 80F9 2F |cmp cl,2F
1000106A |. 75 07 |jnz short HOOK.10001073
1000106C |. C64424 0F 3F |mov byte ptr ss:[esp+F],3F
10001071 |. EB 0F |jmp short HOOK.10001082
10001073 |> 80F9 0D |cmp cl,0D
10001076 |. 74 41 |je short HOOK.100010B9
10001078 |. 80F9 0A |cmp cl,0A
1000107B |. 74 3C |je short HOOK.100010B9
1000107D |. 80F9 3D |cmp cl,3D
10001080 |. 74 45 |je short HOOK.100010C7
10001082 |> 0FB64C24 0F |movzx ecx,byte ptr ss:[esp+F]
10001087 |. C1E3 06 |shl ebx,6
1000108A |. 0BD9 |or ebx,ecx
1000108C |. 42 |inc edx
1000108D |. 83FA 04 |cmp edx,4
10001090 |. 75 27 |jnz short HOOK.100010B9
10001092 |. 8D56 03 |lea edx,dword ptr ds:[esi+3]
10001095 |. 52 |push edx
10001096 |. 50 |push eax
10001097 |. E8 6D550000 |call HOOK.10006609
1000109C |. 8BCB |mov ecx,ebx
1000109E |. C1F9 10 |sar ecx,10
100010A1 |. 880C06 |mov byte ptr ds:[esi+eax],cl
100010A4 |. 83C4 08 |add esp,8
100010A7 |. 46 |inc esi
100010A8 |. 8BD3 |mov edx,ebx
100010AA |. C1FA 08 |sar edx,8
100010AD |. 881406 |mov byte ptr ds:[esi+eax],dl
100010B0 |. 46 |inc esi
100010B1 |. 881C06 |mov byte ptr ds:[esi+eax],bl
100010B4 |. 46 |inc esi
100010B5 |. 33DB |xor ebx,ebx
100010B7 |. 33D2 |xor edx,edx
100010B9 |> 8A4F 01 |mov cl,byte ptr ds:[edi+1]
100010BC |. 47 |inc edi
100010BD |. 84C9 |test cl,cl
100010BF |.^ 0F85 5BFFFFFF \jnz HOOK.10001020
100010C5 |. EB 3E jmp short HOOK.10001105
100010C7 |> 83FA 03 cmp edx,3
100010CA |. 75 1F jnz short HOOK.100010EB
100010CC |. 8D4E 02 lea ecx,dword ptr ds:[esi+2]
100010CF |. 51 push ecx
100010D0 |. 50 push eax
100010D1 |. E8 33550000 call HOOK.10006609
100010D6 |. 8BD3 mov edx,ebx
100010D8 |. C1FA 0A sar edx,0A
100010DB |. 881406 mov byte ptr ds:[esi+eax],dl
100010DE |. 83C4 08 add esp,8
100010E1 |. 46 inc esi
100010E2 |. C1FB 02 sar ebx,2
100010E5 |. 881C06 mov byte ptr ds:[esi+eax],bl
100010E8 |. 46 inc esi
100010E9 |. EB 1A jmp short HOOK.10001105
100010EB |> 83FA 02 cmp edx,2
100010EE |. 75 15 jnz short HOOK.10001105
100010F0 |. 8D7E 01 lea edi,dword ptr ds:[esi+1]
100010F3 |. 57 push edi
100010F4 |. 50 push eax
100010F5 |. E8 0F550000 call HOOK.10006609
100010FA |. 83C4 08 add esp,8
100010FD |. C1FB 04 sar ebx,4
10001100 |. 881C06 mov byte ptr ds:[esi+eax],bl
10001103 |. 8BF7 mov esi,edi
10001105 |> 8D4E 01 lea ecx,dword ptr ds:[esi+1]
10001108 |. 51 push ecx
10001109 |. 50 push eax
1000110A |. E8 FA540000 call HOOK.10006609
1000110F |. 8B5424 20 mov edx,dword ptr ss:[esp+20]
10001113 |. C60406 00 mov byte ptr ds:[esi+eax],0
10001117 |. 8902 mov dword ptr ds:[edx],eax
10001119 |. 8B4424 24 mov eax,dword ptr ss:[esp+24]
1000111D |. 83C4 08 add esp,8
10001120 |. 85C0 test eax,eax
10001122 |. 74 02 je short HOOK.10001126
10001124 |. 8930 mov dword ptr ds:[eax],esi
10001126 |> 5F pop edi
10001127 |. 5E pop esi
10001128 |. 5B pop ebx
10001129 |. 59 pop ecx
1000112A \. C3 retn
1000112B CC int3
1000112C CC int3
1000112D CC int3
1000112E CC int3
1000112F CC int3
10001130 /$ 8BC1 mov eax,ecx
10001132 |. 33C9 xor ecx,ecx
10001134 |. 8BD0 mov edx,eax
10001136 |. 890A mov dword ptr ds:[edx],ecx
10001138 |. 894A 04 mov dword ptr ds:[edx+4],ecx
1000113B |. 894A 08 mov dword ptr ds:[edx+8],ecx
1000113E |. 894A 0C mov dword ptr ds:[edx+C],ecx
10001141 |. 894A 10 mov dword ptr ds:[edx+10],ecx
10001144 |. 894A 14 mov dword ptr ds:[edx+14],ecx
10001147 \. C3 retn
10001148 CC int3
10001149 CC int3
1000114A CC int3
1000114B CC int3
1000114C CC int3
1000114D CC int3
1000114E CC int3
1000114F CC int3
步入就成
00410149 |> /833D 50004200 00 /cmp dword ptr ds:[420050],0
00410150 |. |0F84 EC000000 |je LOADDLL.00410242
00410156 |. |8925 24014200 |mov dword ptr ds:[420124],esp
0041015C |. |8925 28014200 |mov dword ptr ds:[420128],esp
00410162 |. |6A 00 |push 0
00410164 |. |6A 00 |push 0
00410166 |. |6A 00 |push 0
00410168 |. |6A 00 |push 0
0041016A |. |6A 00 |push 0
0041016C |. |6A 00 |push 0
0041016E |. |6A 00 |push 0
00410170 |. |6A 00 |push 0
00410172 |. |6A 00 |push 0
00410174 |. |6A 00 |push 0
00410176 |. |6A 00 |push 0
00410178 |. |6A 00 |push 0
0041017A |. |6A 00 |push 0
0041017C |. |6A 00 |push 0
0041017E |. |6A 00 |push 0
00410180 |. |6A 00 |push 0
00410182 |. |8B0D 6C004200 |mov ecx,dword ptr ds:[42006C]
00410188 |. |E3 20 |jecxz short LOADDLL.004101AA
0041018A |. |83F9 0A |cmp ecx,0A
0041018D |. |76 0F |jbe short LOADDLL.0041019E
0041018F |. |C705 20004200 7D014200 |mov dword ptr ds:[420020],LOADDLL.0042017>; ASCII "Too many parameters"
00410199 |. |E9 EE000000 |jmp LOADDLL.0041028C
这怎么弄的?
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
看原图
赞赏
雪币:
留言: