好友
阅读权限40
听众
最后登录1970-1-1
|
本帖最后由 冥界3大法王 于 2017-2-4 16:20 编辑
6C01D7B2 8B35 6044036C MOV ESI,DWORD PTR DS:[<&USER32.GetDl>; USER32.GetDlgItemTextW
6C01D7B8 6A 1E PUSH 0x1E
6C01D7BA 50 PUSH EAX
6C01D7BB 68 43060000 PUSH 0x643
6C01D7C0 57 PUSH EDI
6C01D7C1 FFD6 CALL NEAR ESI
6C01D7C3 33C0 XOR EAX,EAX
6C01D7C5 895C24 10 MOV DWORD PTR SS:[ESP+0x10],EBX
6C01D7C9 66:894424 54 MOV WORD PTR SS:[ESP+0x54],AX
6C01D7CE A1 EC47056C MOV EAX,DWORD PTR DS:[0x6C0547EC]
6C01D7D3 85C0 TEST EAX,EAX
6C01D7D5 75 1C JNZ SHORT EMEDDLGS.6C01D7F3
6C01D7D7 6A 28 PUSH 0x28
6C01D7D9 8D4424 58 LEA EAX,DWORD PTR SS:[ESP+0x58]
6C01D7DD 50 PUSH EAX
6C01D7DE 68 F3030000 PUSH 0x3F3
6C01D7E3 57 PUSH EDI
6C01D7E4 FFD6 CALL NEAR ESI
6C01D7E6 8D4424 54 LEA EAX,DWORD PTR SS:[ESP+0x54]
6C01D7EA 894424 10 MOV DWORD PTR SS:[ESP+0x10],EAX ; 看到 我们输入的用户名
6C01D7EE A1 EC47056C MOV EAX,DWORD PTR DS:[0x6C0547EC]
6C01D7F3 66:8B4C24 18 MOV CX,WORD PTR SS:[ESP+0x18]
6C01D7F8 66:85C9 TEST CX,CX
6C01D7FB ^ 0F84 63FFFFFF JE EMEDDLGS.6C01D764
6C01D801 6A 4D PUSH 0x4D
6C01D803 5E POP ESI
6C01D804 66:3BCE CMP CX,SI
6C01D807 75 1A JNZ SHORT EMEDDLGS.6C01D823
6C01D809 85C0 TEST EAX,EAX
6C01D80B 75 16 JNZ SHORT EMEDDLGS.6C01D823
6C01D80D 51 PUSH ECX
6C01D80E 6A 34 PUSH 0x34
6C01D810 51 PUSH ECX
6C01D811 53 PUSH EBX
6C01D812 BA 78040000 MOV EDX,0x478
6C01D817 8BCF MOV ECX,EDI
6C01D819 E8 6699FDFF CALL EMEDDLGS.6BFF7184
6C01D81E ^ E9 41FFFFFF JMP EMEDDLGS.6C01D764
6C01D823 83C8 FF OR EAX,0xFFFFFFFF
6C01D826 66:3BCE CMP CX,SI
6C01D829 6A 0E PUSH 0xE
6C01D82B 5A POP EDX
6C01D82C 0F44D0 CMOVE EDX,EAX ; 此处传入假的 注册码
6C01D82F 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+0x18]
6C01D833 E8 71210000 CALL EMEDDLGS.6C01F9A9
6C01D838 33ED XOR EBP,EBP
6C01D83A 8BF0 MOV ESI,EAX
6C01D83C 45 INC EBP
6C01D83D 897424 14 MOV DWORD PTR SS:[ESP+0x14],ESI
6C01D841 6A 06 PUSH 0x6
6C01D843 58 POP EAX
6C01D844 3BF5 CMP ESI,EBP
6C01D846 0F84 A3010000 JE EMEDDLGS.6C01D9EF
6C01D84C 3BF0 CMP ESI,EAX
6C01D84E 0F84 9B010000 JE EMEDDLGS.6C01D9EF
6C01D854 83FE 03 CMP ESI,0x3
6C01D857 0F84 92010000 JE EMEDDLGS.6C01D9EF
6C01D85D 83FE 05 CMP ESI,0x5
6C01D860 75 16 JNZ SHORT EMEDDLGS.6C01D878
6C01D862 51 PUSH ECX
6C01D863 6A 10 PUSH 0x10
6C01D865 51 PUSH ECX
6C01D866 53 PUSH EBX
6C01D867 BA E3000000 MOV EDX,0xE3
6C01D86C 8BCF MOV ECX,EDI
6C01D86E E8 1199FDFF CALL EMEDDLGS.6BFF7184
6C01D873 E9 3A010000 JMP EMEDDLGS.6C01D9B2
6C01D878 8B35 A443036C MOV ESI,DWORD PTR DS:[<&SHLWAPI.StrC>; SHLWAPI.StrCmpNW
6C01D87E 8D4424 18 LEA EAX,DWORD PTR SS:[ESP+0x18]
6C01D882 6A 02 PUSH 0x2
6C01D884 68 BC20046C PUSH EMEDDLGS.6C0420BC ; UNICODE "17"
6C01D889 50 PUSH EAX
6C01D88A FFD6 CALL NEAR ESI
6C01D88C 85C0 TEST EAX,EAX
6C01D88E 75 07 JNZ SHORT EMEDDLGS.6C01D897 ; 默认不会跳走!如果实现则是标准版!
6C01D890 BE C420046C MOV ESI,EMEDDLGS.6C0420C4 ; UNICODE "EmEditor Standard"
6C01D895 EB 78 JMP SHORT EMEDDLGS.6C01D90F
6C01D897 6A 02 PUSH 0x2
6C01D899 68 E820046C PUSH EMEDDLGS.6C0420E8 ; UNICODE "18"
6C01D89E 8D4424 20 LEA EAX,DWORD PTR SS:[ESP+0x20]
6C01D8A2 50 PUSH EAX
6C01D8A3 FFD6 CALL NEAR ESI
6C01D8A5 85C0 TEST EAX,EAX
6C01D8A7 75 07 JNZ SHORT EMEDDLGS.6C01D8B0
6C01D8A9 BE 9021046C MOV ESI,EMEDDLGS.6C042190 ; UNICODE "EmEditor Professional v8"
6C01D8AE EB 5F JMP SHORT EMEDDLGS.6C01D90F
6C01D8B0 6A 02 PUSH 0x2
6C01D8B2 68 C421046C PUSH EMEDDLGS.6C0421C4 ; UNICODE "v9"
6C01D8B7 8D4424 20 LEA EAX,DWORD PTR SS:[ESP+0x20]
6C01D8BB 50 PUSH EAX
6C01D8BC FFD6 CALL NEAR ESI
6C01D8BE 85C0 TEST EAX,EAX
6C01D8C0 75 07 JNZ SHORT EMEDDLGS.6C01D8C9
6C01D8C2 BE CC21046C MOV ESI,EMEDDLGS.6C0421CC ; UNICODE "EmEditor Professional v9"
6C01D8C7 EB 46 JMP SHORT EMEDDLGS.6C01D90F
6C01D8C9 55 PUSH EBP
6C01D8CA 68 C0F5036C PUSH EMEDDLGS.6C03F5C0
6C01D8CF 8D4424 20 LEA EAX,DWORD PTR SS:[ESP+0x20]
6C01D8D3 50 PUSH EAX
6C01D8D4 FFD6 CALL NEAR ESI
6C01D8D6 85C0 TEST EAX,EAX
6C01D8D8 75 07 JNZ SHORT EMEDDLGS.6C01D8E1
6C01D8DA BE 0022046C MOV ESI,EMEDDLGS.6C042200 ; UNICODE "EmEditor Professional v10/11"
6C01D8DF EB 2E JMP SHORT EMEDDLGS.6C01D90F
6C01D8E1 55 PUSH EBP
6C01D8E2 68 449F036C PUSH EMEDDLGS.6C039F44
6C01D8E7 8D4424 20 LEA EAX,DWORD PTR SS:[ESP+0x20]
6C01D8EB 50 PUSH EAX
6C01D8EC FFD6 CALL NEAR ESI
6C01D8EE 85C0 TEST EAX,EAX
6C01D8F0 75 07 JNZ SHORT EMEDDLGS.6C01D8F9
6C01D8F2 BE 1421046C MOV ESI,EMEDDLGS.6C042114 ; UNICODE "EmEditor Professional v12"
6C01D8F7 EB 16 JMP SHORT EMEDDLGS.6C01D90F
6C01D8F9 55 PUSH EBP
6C01D8FA 68 B4DF036C PUSH EMEDDLGS.6C03DFB4
6C01D8FF 8D4424 20 LEA EAX,DWORD PTR SS:[ESP+0x20]
6C01D903 50 PUSH EAX
6C01D904 FFD6 CALL NEAR ESI
6C01D906 85C0 TEST EAX,EAX
6C01D908 75 7A JNZ SHORT EMEDDLGS.6C01D984
6C01D90A BE 4821046C MOV ESI,EMEDDLGS.6C042148 ; UNICODE "EmEditor Professional v13"
6C01D90F 68 2C010000 PUSH 0x12C
6C01D914 8D8424 A8000000 LEA EAX,DWORD PTR SS:[ESP+0xA8]
6C01D91B 50 PUSH EAX
6C01D91C 68 70040000 PUSH 0x470
6C01D921 FF35 DC2E056C PUSH DWORD PTR DS:[0x6C052EDC] ; emedloc.60630000
6C01D927 FF15 3C45036C CALL NEAR DWORD PTR DS:[<&USER32.Load>; USER32.LoadStringW
6C01D92D 56 PUSH ESI
6C01D92E 8D8424 A8000000 LEA EAX,DWORD PTR SS:[ESP+0xA8]
6C01D935 BE 4A010000 MOV ESI,0x14A
6C01D93A 50 PUSH EAX
6C01D93B 8D8424 04030000 LEA EAX,DWORD PTR SS:[ESP+0x304]
6C01D942 56 PUSH ESI
6C01D943 50 PUSH EAX
6C01D944 E8 995DFDFF CALL EMEDDLGS.6BFF36E2
6C01D949 83C4 0C ADD ESP,0xC
6C01D94C 8D9424 00030000 LEA EDX,DWORD PTR SS:[ESP+0x300]
6C01D953 6A 34 PUSH 0x34
6C01D955 51 PUSH ECX
6C01D956 53 PUSH EBX
6C01D957 8BCF MOV ECX,EDI
6C01D959 E8 2698FDFF CALL EMEDDLGS.6BFF7184
6C01D95E 6A 06 PUSH 0x6
6C01D960 59 POP ECX
6C01D961 3BC1 CMP EAX,ECX
6C01D963 75 3B JNZ SHORT EMEDDLGS.6C01D9A0
6C01D963 /75 3B JNZ SHORT EMEDDLGS.6C01D9A0 ; 貌似这里能跳过!
6C01D965 |8BD6 MOV EDX,ESI
6C01D967 |8D8C24 FC020000 LEA ECX,DWORD PTR SS:[ESP+0x2FC]
6C01D96E |E8 5D8CFDFF CALL EMEDDLGS.6BFF65D0
6C01D973 |51 PUSH ECX
6C01D974 |8D9424 00030000 LEA EDX,DWORD PTR SS:[ESP+0x300]
6C01D97B |8BCF MOV ECX,EDI
6C01D97D |E8 E757FFFF CALL EMEDDLGS.6C013169 ; 这个call的作用就是没花钱,提醒你的网址
6C01D982 |EB 1C JMP SHORT EMEDDLGS.6C01D9A0
6C01D984 |837C24 14 02 CMP DWORD PTR SS:[ESP+0x14],0x2
6C01D989 |BA 71040000 MOV EDX,0x471
6C01D98E |51 PUSH ECX
6C01D98F |6A 30 PUSH 0x30
6C01D991 |51 PUSH ECX
6C01D992 |8D42 E3 LEA EAX,DWORD PTR DS:[EDX-0x1D]
6C01D995 |8BCF MOV ECX,EDI
6C01D997 |53 PUSH EBX
6C01D998 |0F44D0 CMOVE EDX,EAX
6C01D99B |E8 E497FDFF CALL EMEDDLGS.6BFF7184 ; 错误的注册码
00E4B6C6 |. 57 PUSH EDI ; /Count => 100 (256.)
00E4B6C7 |. 50 PUSH EAX ; |Buffer
00E4B6C8 |. 68 AD000000 PUSH 0xAD ; |RsrcID = AD (173.)
00E4B6CD |. FF35 90A6F000 PUSH DWORD PTR DS:[0xF0A690] ; |hInst = 60630000
00E4B6D3 |. FF15 B8E6ED00 CALL NEAR DWORD PTR DS:[<&USER32.Load>; \LoadStringW
00E4B6D9 |. 68 E09AEF00 PUSH EmEditor.00EF9AE0 ; crack-keygen-serial/ 这是啥?
很明显,注册机 序列号 破解器的检测,让你有码时 也会失效 或过期!
经过几轮测试发现直接改毒复发,创伤大,伤口难以痊愈!
不好,不好,我们直接用以前注册码
Name:AppNee.com
Key: DEAZV-27TFM-BL52D-PVN9L-ADULD
由于我们知道
HKEY_CURRENT_USER\Software\EmSoft\Regist
这个保存在注册表中的,所以我们直接搜索 注册表键值Regist
我们会得到 7处调用!全部下断!
我们点关于被断下,超级可疑,修改吧!马上提示注册成功!
我们再来看这里 升级检测!所以NOP掉最好
最后欣赏吧~~
千万别高兴,后边有后招~~
最后暗桩 也除了,完美搞定~~ |
免费评分
-
查看全部评分
|