加入收藏  |  设为首页  |  联系我们
网站首页 公司概况 公司文化 新闻动态 加密狗展示 工作坏境 招贤纳士 精诚合作 在线留言
精诚合作
精诚合作
使用指南
 
地    址:广东省深圳市地王大厦38层8801号。
客服QQ1:4642967
客服QQ2:5915307
手    机:13528540969(刘先生)
邮    箱:4642967@qq.com
网    址:/a/
精诚合作 当前位置:首页 >> 精诚合作 >> 使用指南

|3D软件加密狗破解

发表时间:2018-05-12    来源:不详    浏览次数:22

程序载入后停留在
004254E1 >  55                push ebp
004254E2    8BEC              mov ebp,esp
004254E4    6A FF             push -1
004254E6    68 E0D44200       push 智能3D.0042D4E0
004254EB    68 F2564200       push <jmp.&MSVCRT._except_handler3>
004254F0    64:A1 00000000    mov eax,dword ptr fs:[0]
004254F6    50                push eax
004254F7    64:8925 00000000  mov dword ptr fs:[0],esp
004254FE    83EC 68           sub esp,68
00425501    53                push ebx
00425502    56                push esi
00425503    57                push edi
00425504    8965 E8           mov dword ptr ss:[ebp-18],esp
00425507    33DB              xor ebx,ebx
00425509    895D FC           mov dword ptr ss:[ebp-4],ebx
0042550C    6A 02             push 2
0042550E    FF15 30984200     call dword ptr ds:[<&MSVCRT.__set_app_type>]     ; msvcrt.__set_app_type
00425514    59                pop ecx
00425515    830D 0C144400 FF  or dword ptr ds:[44140C],FFFFFFFF
0042551C    830D 10144400 FF  or dword ptr ds:[441410],FFFFFFFF
00425523    FF15 34984200     call dword ptr ds:[<&MSVCRT.__p__fmode>]         ; msvcrt.__p__fmode
00425529    8B0D 840D4400     mov ecx,dword ptr ds:[440D84]
0042552F    8908              mov dword ptr ds:[eax],ecx
00425531    FF15 98984200     call dword ptr ds:[<&MSVCRT.__p__commode>]       ; msvcrt.__p__commode
00425537    8B0D 800D4400     mov ecx,dword ptr ds:[440D80]
0042553D    8908              mov dword ptr ds:[eax],ecx
0042553F    A1 94984200       mov eax,dword ptr ds:[<&MSVCRT._adjust_fdiv>]
00425544    8B00              mov eax,dword ptr ds:[eax]
00425546    A3 08144400       mov dword ptr ds:[441408],eax
0042554B    E8 D5010000       call 智能3D.00425725
00425550    391D 20EB4300     cmp dword ptr ds:[43EB20],ebx
00425556    75 0C             jnz short 智能3D.00425564
00425558    68 22574200       push 智能3D.00425722
0042555D    FF15 90984200     call dword ptr ds:[<&MSVCRT.__setusermatherr>]   ; msvcrt.__setusermatherr
00425563    59                pop ecx
00425564    E8 A7010000       call 智能3D.00425710
00425569    68 1C204300       push 智能3D.0043201C
0042556E    68 18204300       push 智能3D.00432018
00425573    E8 92010000       call <jmp.&MSVCRT._initterm>
00425578    A1 7C0D4400       mov eax,dword ptr ds:[440D7C]
0042557D    8945 94           mov dword ptr ss:[ebp-6C],eax
00425580    8D45 94           lea eax,dword ptr ss:[ebp-6C]
00425583    50                push eax
00425584    FF35 780D4400     push dword ptr ds:[440D78]
0042558A    8D45 9C           lea eax,dword ptr ss:[ebp-64]
0042558D    50                push eax
0042558E    8D45 90           lea eax,dword ptr ss:[ebp-70]               读取加密狗数据

00425591    50                push eax
00425592    8D45 A0           lea eax,dword ptr ss:[ebp-60]
00425595    50                push eax
00425596    FF15 88984200     call dword ptr ds:[<&MSVCRT.__getmainargs>]      ; msvcrt.__getmainargs
0042559C    68 14204300       push 智能3D.00432014
004255A1    68 00204300       push 智能3D.00432000
004255A6    E8 5F010000       call <jmp.&MSVCRT._initterm>
004255AB    83C4 24           add esp,24
004255AE    A1 84984200       mov eax,dword ptr ds:[<&MSVCRT._acmdln>]
004255B3    8B30              mov esi,dword ptr ds:[eax]
004255B5    8975 8C           mov dword ptr ss:[ebp-74],esi
004255B8    803E 22           cmp byte ptr ds:[esi],22
004255BB    75 3A             jnz short 智能3D.004255F7
004255BD    46                inc esi
004255BE    8975 8C           mov dword ptr ss:[ebp-74],esi
004255C1    8A06              mov al,byte ptr ds:[esi]
004255C3    3AC3              cmp al,bl
004255C5    74 04             je short 智能3D.004255CB
004255C7    3C 22             cmp al,22
004255C9  ^ 75 F2             jnz short 智能3D.004255BD
004255CB    803E 22           cmp byte ptr ds:[esi],22
004255CE    75 04             jnz short 智能3D.004255D4
004255D0    46                inc esi
004255D1    8975 8C           mov dword ptr ss:[ebp-74],esi
004255D4    8A06              mov al,byte ptr ds:[esi]
004255D6    3AC3              cmp al,bl
004255D8    74 04             je short 智能3D.004255DE
004255DA    3C 20             cmp al,20
004255DC  ^ 76 F2             jbe short 智能3D.004255D0
004255DE    895D D0           mov dword ptr ss:[ebp-30],ebx
004255E1    8D45 A4           lea eax,dword ptr ss:[ebp-5C]
004255E4    50                push eax
004255E5    FF15 38914200     call dword ptr ds:[<&KERNEL32.GetStartupInfoA>]  ; kernel32.GetStartupInfoA
004255EB    F645 D0 01        test byte ptr ss:[ebp-30],1
004255EF    74 11             je short 智能3D.00425602                      读取加密狗数据
004255F1    0FB745 D4         movzx eax,word ptr ss:[ebp-2C]
004255F5    EB 0E             jmp short 智能3D.00425605
004255F7    803E 20           cmp byte ptr ds:[esi],20
004255FA  ^ 76 D8             jbe short 智能3D.004255D4
004255FC    46                inc esi
004255FD    8975 8C           mov dword ptr ss:[ebp-74],esi
00425600  ^ EB F5             jmp short 智能3D.004255F7
00425602    6A 0A             push 0A
00425604    58                pop eax
00425605    50                push eax
00425606    56                push esi
00425607    53                push ebx
00425608    53                push ebx
00425609    FF15 A4904200     call dword ptr ds:[<&KERNEL32.GetModuleHandleA>] ; kernel32.GetModuleHandleA
0042560F    50                push eax
00425610    E8 1B010000       call 智能3D.00425730
00425615    8945 98           mov dword ptr ss:[ebp-68],eax
00425618    50                push eax
00425619    FF15 80984200     call dword ptr ds:[<&MSVCRT.exit>]               ; msvcrt.exit
0042561F    8B45 EC           mov eax,dword ptr ss:[ebp-14]
00425622    8B08              mov ecx,dword ptr ds:[eax]
00425624    8B09              mov ecx,dword ptr ds:[ecx]
00425626    894D 88           mov dword ptr ss:[ebp-78],ecx
00425629    50                push eax
0042562A    51                push ecx
0042562B    E8 D4000000       call <jmp.&MSVCRT._XcptFilter>
00425630    59                pop ecx                                                            读取加密狗数据

00425631    59                pop ecx
00425632    C3                retn
00425633    8B65 E8           mov esp,dword ptr ss:[ebp-18]
00425636    FF75 88           push dword ptr ss:[ebp-78]
00425639    FF15 78984200     call dword ptr ds:[<&MSVCRT._exit>]              ; msvcrt._exit
0042563F    CC                int3
00425640    53                push ebx
经过反复跟踪,发现检测加密狗的位置在下面
0040FD50    55                push ebp
0040FD51    56                push esi
0040FD52    894C24 24         mov dword ptr ss:[esp+24],ecx
0040FD56    57                push edi
0040FD57    33DB              xor ebx,ebx
0040FD59    B9 07000000       mov ecx,7
0040FD5E    33C0              xor eax,eax
0040FD60    8D7C24 34         lea edi,dword ptr ss:[esp+34]
0040FD64    895C24 30         mov dword ptr ss:[esp+30],ebx
0040FD68    F3:AB             rep stos dword ptr es:[edi]
0040FD6A    8D4424 10         lea eax,dword ptr ss:[esp+10]
0040FD6E    8D4C24 30         lea ecx,dword ptr ss:[esp+30]
0040FD72    50                push eax
0040FD73    51                push ecx
0040FD74    68 12040920       push 20090412
0040FD79    881D 08EC4300     mov byte ptr ds:[43EC08],bl
0040FD7F    895C24 1C         mov dword ptr ss:[esp+1C],ebx
0040FD83    E8 881A0100       call 智能3D.00421810   //检测加密锁,的CALL ,要破解加密锁跟进此CALL

0040FD88    83C4 0C           add esp,0C
0040FD8B    85C0              test eax,eax
0040FD8D    74 07             je short 智能3D.0040FD96
0040FD8F    B8 01000000       mov eax,1
0040FD94    EB 2C             jmp short 智能3D.0040FDC2
0040FD96    8B5424 30         mov edx,dword ptr ss:[esp+30]
0040FD9A    68 A8274300       push 智能3D.004327A8                               ; b744c9a40cdfa9d2935827569c265dc1  //加密锁密钥
0040FD9F    52                push edx
0040FDA0    E8 8B1A0100       call 智能3D.00421830   //检测加密锁,的CALL ,要破解加密锁跟进此CALL
0040FDA5    83C4 08           add esp,8
0040FDA8    85C0              test eax,eax
0040FDAA    74 07             je short 智能3D.0040FDB3
0040FDAC    B8 02000000       mov eax,2
0040FDB1    EB 0F             jmp short 智能3D.0040FDC2
0040FDB3    8B4424 30         mov eax,dword ptr ss:[esp+30]
0040FDB7    50                push eax
0040FDB8    E8 F31A0100       call 智能3D.004218B0     //检测加密锁,的CALL ,要破解加密锁跟进此CALL
0040FDBD    83C4 04           add esp,4
0040FDC0    33C0              xor eax,eax
0040FDC2    3BC3              cmp eax,ebx
0040FDC4    A3 0CEC4300       mov dword ptr ds:[43EC0C],eax
0040FDC9    74 13             je short 智能3D.0040FDDE   //修改此处就可以达到简单破解加密锁的目的,但是还是部分功能没有实现
0040FDCB    53                push ebx
0040FDCC    53                push ebx
0040FDCD    68 3C284300       push 智能3D.0043283C                               ; 请插上加密狗!
0040FDD2    E8 0F4F0100       call <jmp.&MFC42.#1200>
0040FDD7    33C0              xor eax,eax
0040FDD9    E9 58050000       jmp 智能3D.00410336
0040FDDE    BD 01000000       mov ebp,1
0040FDE3    895C24 60         mov dword ptr ss:[esp+60],ebx
0040FDE7    C705 14EC4300 26B>mov dword ptr ds:[43EC14],2BB26
0040FDF1    66:892D 1AEC4300  mov word ptr ds:[43EC1A],bp
0040FDF8    33F6              xor esi,esi
0040FDFA    8D4E 02           lea ecx,dword ptr ds:[esi+2]
0040FDFD    33C0              xor eax,eax
0040FDFF    66:890D 18EC4300  mov word ptr ds:[43EC18],cx
其他的加密锁破解方法其实也类似,只要耐心的分析算法,一般的加密锁都是可以破解的。


新疆时时彩走势图开奖关闭窗口】 【打印本页】 【收藏页面
Copyright (c) 2013 - 2016 加密狗破解网 Inc. All Rights Reserved 备案号:粤ICP备08125688号 版权所有:加密狗破解网
湖北11选5 北京快乐8和值 北京赛车官网 重庆时时彩开奖号码 北京赛车pk10代理网址
黑龙江快乐十分走势图 河北快三基本走势图遗漏分布 时时彩有人赚钱吗 二八杠游戏网 海南环岛赛彩票