 
- UID
- 3016
金币- 327 枚
威望- 0 点
经验- 46 点
体力- 50 点
- 出生地
- 聊城市
- 在线时间
- 10 小时
|
【文章标题】: 让程序自己显示注册码
【加壳方式】: ASPack 2.11
【保护方式】: 重起验证
【编写语言】: VB
【使用工具】: OD PEID
【操作平台】: XP sp2
【作者声明】: 只是感兴趣,没有其他目的。失误之处敬请诸位大侠赐教!
--------------------------------------------------------------------------------
【详细过程】
先用PEID 查壳 是ASPack 2.11 就用自带的插件PEID Generic unpacker脱它,再查得是VB语言编写的。用OD 载入脱壳后的
程序 超级字符串参考找到RegCodeTrue 在汇编代码中跟随 来到 向下找关键跳转
0042D0C1 . 68 C89D4000 PUSH CODE_u.00409DC8 ; UNICODE "RegCodeTrue"
0042D0C6 . 68 BC9D4000 PUSH CODE_u.00409DBC ; UNICODE "Reg"
0042D0CB . 8908 MOV DWORD PTR DS:[EAX],ECX
0042D0CD . 8B8D 1CFFFFFF MOV ECX,DWORD PTR SS:[EBP-E4]
0042D0D3 . 68 849D4000 PUSH CODE_u.00409D84 ; UNICODE "Stock-Star-Website\Code41"
0042D0D8 . 8950 04 MOV DWORD PTR DS:[EAX+4],EDX
0042D0DB . 8B95 20FFFFFF MOV EDX,DWORD PTR SS:[EBP-E0]
0042D0E1 . 8948 08 MOV DWORD PTR DS:[EAX+8],ECX
0042D0E4 . 8950 0C MOV DWORD PTR DS:[EAX+C],EDX
0042D0E7 . FF15 CCF34300 CALL DWORD PTR DS:[<&MSVBVM50.#689>] ; MSVBVM50.rtcGetSetting
0042D0ED . 8BD0 MOV EDX,EAX
0042D0EF . 8D8D 38FFFFFF LEA ECX,DWORD PTR SS:[EBP-C8]
0042D0F5 . FF15 04F44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaStrMo>; MSVBVM50.__vbaStrMove
0042D0FB . 50 PUSH EAX
0042D0FC . FF15 30F44300 CALL DWORD PTR DS:[<&MSVBVM50.#581>] ; MSVBVM50.rtcR8ValFromBstr
0042D102 . DD9D ECFEFFFF FSTP QWORD PTR SS:[EBP-114]
0042D108 . 8D95 E4FEFFFF LEA EDX,DWORD PTR SS:[EBP-11C]
0042D10E . 8D4D CC LEA ECX,DWORD PTR SS:[EBP-34]
0042D111 . C785 E4FEFFFF >MOV DWORD PTR SS:[EBP-11C],5
0042D11B . FFD6 CALL ESI
0042D11D . 8D8D 38FFFFFF LEA ECX,DWORD PTR SS:[EBP-C8]
0042D123 . FF15 28F44300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaFreeS>; MSVBVM50.__vbaFreeStr
0042D129 . 8D85 14FFFFFF LEA EAX,DWORD PTR SS:[EBP-EC]
0042D12F . 8D8D 24FFFFFF LEA ECX,DWORD PTR SS:[EBP-DC]
0042D135 . 50 PUSH EAX
0042D136 . 51 PUSH ECX
0042D137 . 6A 02 PUSH 2
0042D139 . FF15 64F24300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaFreeV>; MSVBVM50.__vbaFreeVarList
0042D13F . 83C4 0C ADD ESP,0C
0042D142 . 8D95 3CFFFFFF LEA EDX,DWORD PTR SS:[EBP-C4]
0042D148 . 8D85 6CFFFFFF LEA EAX,DWORD PTR SS:[EBP-94]
0042D14E . 8D8D 24FFFFFF LEA ECX,DWORD PTR SS:[EBP-DC]
0042D154 . 52 PUSH EDX
0042D155 . 50 PUSH EAX
0042D156 . 51 PUSH ECX
0042D157 . FF15 D4F34300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarAd>; MSVBVM50.__vbaVarAdd
0042D15D . 50 PUSH EAX
0042D15E . 8D95 6CFFFFFF LEA EDX,DWORD PTR SS:[EBP-94]
0042D164 . 8D85 14FFFFFF LEA EAX,DWORD PTR SS:[EBP-EC]
0042D16A . 52 PUSH EDX
0042D16B . 50 PUSH EAX
0042D16C . FF15 A4F24300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarXo>; MSVBVM50.__vbaVarXor
0042D172 . 8BD0 MOV EDX,EAX
0042D174 . 8D8D 4CFFFFFF LEA ECX,DWORD PTR SS:[EBP-B4]
0042D17A . FFD6 CALL ESI
0042D17C . 8D8D 24FFFFFF LEA ECX,DWORD PTR SS:[EBP-DC]
0042D182 . FF15 50F24300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaFreeV>; MSVBVM50.__vbaFreeVar
0042D188 . 8D4D CC LEA ECX,DWORD PTR SS:[EBP-34]
0042D18B . 8D95 4CFFFFFF LEA EDX,DWORD PTR SS:[EBP-B4]
0042D191 . 51 PUSH ECX
0042D192 . 52 PUSH EDX
0042D193 . FF15 0CF34300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaVarTs>; MSVBVM50.__vbaVarTstEq
0042D199 . 66:85C0 TEST AX,AX
0042D19C . 0F84 C8000000 JE CODE_u.0042D26A / /将此处NOP 掉 保存就可以在注册窗口显示注册码
0042D1A2 . 8B85 CCFEFFFF MOV EAX,DWORD PTR SS:[EBP-134]
0042D1A8 . 53 PUSH EBX
0042D1A9 . FF90 18030000 CALL DWORD PTR DS:[EAX+318]
0042D1AF . 8D8D 34FFFFFF LEA ECX,DWORD PTR SS:[EBP-CC]
0042D1B5 . 50 PUSH EAX
0042D1B6 . 51 PUSH ECX
0042D1B7 . FF15 B4F24300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaObjSe>; MSVBVM50.__vbaObjSet
0042D1BD . 8B30 MOV ESI,DWORD PTR DS:[EAX]
0042D1BF . 8985 DCFEFFFF MOV DWORD PTR SS:[EBP-124],EAX
0042D1C5 . 8D95 4CFFFFFF LEA EDX,DWORD PTR SS:[EBP-B4]
0042D1CB . 8D85 38FFFFFF LEA EAX,DWORD PTR SS:[EBP-C8]
0042D1D1 . 52 PUSH EDX
0042D1D2 . 50 PUSH EAX
0042D1D3 . FF15 74F34300 CALL DWORD PTR DS:[<&MSVBVM50.__vbaStrVa>; MSVBVM50.__vbaStrVarVal
0042D1D9 . 89B5 C4FEFFFF MOV DWORD PTR SS:[EBP-13C],ESI
0042D1DF . 8BB5 DCFEFFFF MOV ESI,DWORD PTR SS:[EBP-124]
0042D1E5 . 8B8D C4FEFFFF MOV ECX,DWORD PTR SS:[EBP-13C]
0042D1EB . 50 PUSH EAX
0042D1EC . 56 PUSH ESI
0042D1ED . FF91 A4000000 CALL DWORD PTR DS:[ECX+A4]
0042D1F3 . 3BC7 CMP EAX,EDI
0042D1F5 . 7D 12 JGE SHORT CODE_u.0042D209
0042D1F7 . 68 A4000000 PUSH 0A4
0042D1FC . 68 F4994000 PUSH CODE_u.004099F4
0042D201 . 56 PUSH ESI
0042D202 . 50 PUSH EAX
有空分析出算法,那我就非常感谢了
|
|