软件名称 CHMUnpacker 软件版本 1.3
软件类别 帮助软件 授权形式 共享
应用平台 WIN9X/WINNT/WIN2K/WINXP
汉化作者 星风雪 上传日期 2002-3-8
http://www.hanzify.org/download.asp?SOFT_ID=4228&SITE=1
目标:完成注册
工具:ultraedit, pw32dasm8.93
难度: 容易 破文作者:zyw[BCG]
--------------------------------------------------------------
软件介绍
CHMUnpacker [CHM解包器]是一个可以帮助您从CHM文件导出文件的CHM工具.
CHMUnpacker [CHM解包器]能够从已编译的Windows帮助文件(*.chm)导出任何类型
的文件.您可以像处理ZIP文件一样处理CHM,您可以运行CHM中的文件或像WinZip一样
展开它.您可以通过简单的双击文件查看HTML文本或图片.像ZIP文件一样使用CHM文件,
您想知道这是怎样的一种体验吗? 此版本是真正的1.3的汉化版本.
用pw32dasm8.93反编CHMUnpacker.exe
........
* Possible Reference to Dialog: DialogID_008F, CONTROL_ID:03F1, ""
|
:00405A79 68F1030000 push 000003F1
:00405A7E E8D0CC0100 call 00422753
:00405A83 8D4C2408 lea ecx, dword ptr [esp+08]
:00405A87 51 push ecx
* Possible Reference to Dialog: DialogID_0067, CONTROL_ID:03E9, "/>:屣/(&S)"
|
:00405A88 68E9030000 push 000003E9
:00405A8D 8BCE mov ecx, esi
:00405A8F E8BFCC0100 call 00422753
:00405A94 8B54240C mov edx, dword ptr [esp+0C]
:00405A98 6850CA4400 push 0044CA50
:00405A9D 52 push edx
:00405A9E E883910000 call 0040EC26
:00405AA3 83C408 add esp, 00000008
:00405AA6 85C0 test eax, eax
:00405AA8 750C jne 00405AB6
:00405AAA 53 push ebx
:00405AAB 53 push ebx
* Possible StringData Ref from Data Obj ->"用户姓名是空白的!"
|
:00405AAC 6854A64400 push 0044A654
:00405AB1 E93B010000 jmp 00405BF1
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405AA8(C)
|
:00405AB6 8B442408 mov eax, dword ptr [esp+08]
:00405ABA 6850CA4400 push 0044CA50
:00405ABF 50 push eax
:00405AC0 E861910000 call 0040EC26
:00405AC5 83C408 add esp, 00000008
:00405AC8 85C0 test eax, eax
:00405ACA 750C jne 00405AD8
:00405ACC 53 push ebx
:00405ACD 53 push ebx
* Possible StringData Ref from Data Obj ->"注册密钥是空白的!"
|
:00405ACE 683CA64400 push 0044A63C
:00405AD3 E919010000 jmp 00405BF1
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405ACA(C)
|
* Possible StringData Ref from Data Obj ->" "
|
:00405AD8 6838A64400 push 0044A638
:00405ADD 8D4C240C lea ecx, dword ptr [esp+0C]
:00405AE1 E8EC6F0100 call 0041CAD2
* Possible StringData Ref from Data Obj ->" "
|
:00405AE6 6838A64400 push 0044A638
:00405AEB 8D4C240C lea ecx, dword ptr [esp+0C]
:00405AEF E83F6F0100 call 0041CA33
:00405AF4 8B442408 mov eax, dword ptr [esp+08]
:00405AF8 8378F810 cmp dword ptr [eax-08], 00000010
:00405AFC 740C je 00405B0A
:00405AFE 53 push ebx
:00405AFF 53 push ebx
* Possible StringData Ref from Data Obj ->"注册密钥是错误的!"
|
:00405B00 6820A64400 push 0044A620
:00405B05 E9E7000000 jmp 00405BF1
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405AFC(C)
|
* Possible StringData Ref from Data Obj ->"eLRYdMs7IhHiObJg"
|
:00405B0A 680CA64400 push 0044A60C
:00405B0F 50 push eax
:00405B10 E811910000 call 0040EC26
:00405B15 83C408 add esp, 00000008
:00405B18 85C0 test eax, eax
:00405B1A 0F84CA000000 je 00405BEA
:00405B20 8B4C2408 mov ecx, dword ptr [esp+08]
* Possible StringData Ref from Data Obj ->"FkZQYRjGoBNcgJVU"
|
:00405B24 68F8A54400 push 0044A5F8
:00405B29 51 push ecx
:00405B2A E8F7900000 call 0040EC26
:00405B2F 83C408 add esp, 00000008
:00405B32 85C0 test eax, eax
:00405B34 0F84B0000000 je 00405BEA
:00405B3A 8D542410 lea edx, dword ptr [esp+10]
:00405B3E 57 push edi
:00405B3F 52 push edx
* Possible StringData Ref from Data Obj ->"Software\YBSoft\CHMUnpacker"
|
:00405B40 68DCA54400 push 0044A5DC
:00405B45 6802000080 push 80000002
* Reference To: ADVAPI32.RegCreateKeyA, Ord:015Eh
|
:00405B4A FF1518B04300 Call dword ptr [0043B018]
:00405B50 8B44240C mov eax, dword ptr [esp+0C]
:00405B54 8D4C240C lea ecx, dword ptr [esp+0C]
:00405B58 8B40F8 mov eax, dword ptr [eax-08]
:00405B5B 50 push eax
:00405B5C 6A01 push 00000001
:00405B5E E85DA10100 call 0041FCC0
:00405B63 8B4C2418 mov ecx, dword ptr [esp+18]
* Reference To: ADVAPI32.RegSetValueExA, Ord:0186h
|
:00405B67 8B3D14B04300 mov edi, dword ptr [0043B014]
:00405B6D 50 push eax
:00405B6E 6A01 push 00000001
:00405B70 53 push ebx
* Possible StringData Ref from Data Obj ->"版本"
|
:00405B71 68D0A24400 push 0044A2D0
:00405B76 51 push ecx
:00405B77 FFD7 call edi
:00405B79 8B542410 mov edx, dword ptr [esp+10]
:00405B7D 8D4C2410 lea ecx, dword ptr [esp+10]
:00405B81 8B42F8 mov eax, dword ptr [edx-08]
:00405B84 50 push eax
:00405B85 6A01 push 00000001
:00405B87 E834A10100 call 0041FCC0
:00405B8C 50 push eax
:00405B8D 8B44241C mov eax, dword ptr [esp+1C]
:00405B91 6A01 push 00000001
:00405B93 53 push ebx
* Possible StringData Ref from Data Obj ->"用户"
|
:00405B94 68D4A54400 push 0044A5D4
:00405B99 50 push eax
:00405B9A FFD7 call edi
:00405B9C 8B4C2414 mov ecx, dword ptr [esp+14]
:00405BA0 51 push ecx
* Reference To: ADVAPI32.RegCloseKey, Ord:015Bh
|
:00405BA1 FF1508B04300 Call dword ptr [0043B008]
:00405BA7 8BCE mov ecx, esi
:00405BA9 E8D1AA0100 call 0042067F
:00405BAE 53 push ebx
:00405BAF 53 push ebx
* Possible StringData Ref from Data Obj ->"感谢您注册它.
CHMUnpacker将在您再次使用它时检?
->"樽⒉岽?"
|
:00405BB0 6878A54400 push 0044A578
:00405BB5 E8C73B0200 call 00429781
:00405BBA 8D4C240C lea ecx, dword ptr [esp+0C]
:00405BBE 885C2420 mov byte ptr [esp+20], bl
:00405BC2 E8C99C0100 call 0041F890
:00405BC7 8D4C2410 lea ecx, dword ptr [esp+10]
:00405BCB C7442420FFFFFFFF mov [esp+20], FFFFFFFF
:00405BD3 E8B89C0100 call 0041F890
:00405BD8 5F pop edi
:00405BD9 5E pop esi
:00405BDA 5B pop ebx
:00405BDB 8B4C240C mov ecx, dword ptr [esp+0C]
:00405BDF 64890D00000000 mov dword ptr fs:[00000000], ecx
:00405BE6 83C418 add esp, 00000018
:00405BE9 C3 ret
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00405B1A(C), :00405B34(C)
|
:00405BEA 53 push ebx
:00405BEB 53 push ebx
* Possible StringData Ref from Data Obj ->"对不起,这是一个被破解的注册代码!"
|
:00405BEC 6854A54400 push 0044A554
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00405AB1(U), :00405AD3(U), :00405B05(U)
|
:00405BF1 E88B3B0200 call 00429781
:00405BF6 8D4C2408 lea ecx, dword ptr [esp+08]
:00405BFA 885C241C mov byte ptr [esp+1C], bl
:00405BFE E88D9C0100 call 0041F890
:00405C03 8D4C240C lea ecx, dword ptr [esp+0C]
:00405C07 C744241CFFFFFFFF mov [esp+1C], FFFFFFFF
:00405C0F E87C9C0100 call 0041F890
:00405C14 8B4C2414 mov ecx, dword ptr [esp+14]
:00405C18 5E pop esi
:00405C19 5B pop ebx
:00405C1A 64890D00000000 mov dword ptr fs:[00000000], ecx
:00405C21 83C418 add esp, 00000018
:00405C24 C3 ret
.........
* Referenced by a CALL at Address:
|:0040232D
|
:00405C30 81EC0C010000 sub esp, 0000010C
:00405C36 8D442404 lea eax, dword ptr [esp+04]
:00405C3A 56 push esi
:00405C3B 50 push eax
* Possible StringData Ref from Data Obj ->"SOFTWARE\YBSoft\CHMUnpacker"
|
:00405C3C 68D8A24400 push 0044A2D8
:00405C41 6802000080 push 80000002
:00405C46 C744241000000000 mov [esp+10], 00000000
* Reference To: ADVAPI32.RegOpenKeyA, Ord:0171h
|
:00405C4E FF1510B04300 Call dword ptr [0043B010]
:00405C54 85C0 test eax, eax
:00405C56 741D je 00405C75
:00405C58 8BB42414010000 mov esi, dword ptr [esp+00000114]
* Possible StringData Ref from Data Obj ->"未注册"
|
:00405C5F 6868A64400 push 0044A668
:00405C64 8BCE mov ecx, esi
:00405C66 E8939C0100 call 0041F8FE
:00405C6B 8BC6 mov eax, esi
:00405C6D 5E pop esi
:00405C6E 81C40C010000 add esp, 0000010C
:00405C74 C3 ret
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00405C56(C)
|
:00405C75 8D4C2404 lea ecx, dword ptr [esp+04]
:00405C79 8D542410 lea edx, dword ptr [esp+10]
:00405C7D 51 push ecx
:00405C7E 8B4C240C mov ecx, dword ptr [esp+0C]
:00405C82 8D442410 lea eax, dword ptr [esp+10]
:00405C86 52 push edx
:00405C87 50 push eax
:00405C88 6A00 push 00000000
* Possible StringData Ref from Data Obj ->"用户"
|
:00405C8A 68D4A54400 push 0044A5D4
:00405C8F 51 push ecx
:00405C90 C744241CFF000000 mov [esp+1C], 000000FF
* Reference To: ADVAPI32.RegQueryValueExA, Ord:017Bh
|
:00405C98 FF150CB04300 Call dword ptr [0043B00C]
:00405C9E 85C0 test eax, eax
:00405CA0 741D je 00405CBF
:00405CA2 8BB42414010000 mov esi, dword ptr [esp+00000114]
* Possible StringData Ref from Data Obj ->"未注册"
|
:00405CA9 6868A64400 push 0044A668
:00405CAE 8BCE mov ecx, esi
:00405CB0 E8499C0100 call 0041F8FE
:00405CB5 8BC6 mov eax, esi
:00405CB7 5E pop esi
:00405CB8 81C40C010000 add esp, 0000010C
:00405CBE C3 ret
.......
* Reference To: ADVAPI32.RegQueryValueExA, Ord:017Bh
|
:00405D8A 8B350CB04300 mov esi, dword ptr [0043B00C]
:00405D90 8D54240C lea edx, dword ptr [esp+0C]
:00405D94 8D442410 lea eax, dword ptr [esp+10]
:00405D98 52 push edx
:00405D99 8B542408 mov edx, dword ptr [esp+08]
:00405D9D 8D4C2418 lea ecx, dword ptr [esp+18]
:00405DA1 50 push eax
:00405DA2 51 push ecx
:00405DA3 6A00 push 00000000
.......
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00405E05(C), :00405E0F(C)
|
:00405E9A 8B4C2404 mov ecx, dword ptr [esp+04]
:00405E9E 51 push ecx
* Reference To: ADVAPI32.RegCloseKey, Ord:015Bh
|
:00405E9F FF1508B04300 Call dword ptr [0043B008]
:00405EA5 6A00 push 00000000
:00405EA7 6A00 push 00000000
* Possible StringData Ref from Data Obj ->"您的系统时间是错误的,请不要在使用本软件时更改?
->"南低呈奔?
"
|
:00405EA9 6888A64400 push 0044A688
:00405EAE E8CE380200 call 00429781
:00405EB3 83C8FF or eax, FFFFFFFF
-----------------------------------------------------------------
在00405B05------00405B24处可以看到有2个字符串 "eLRYdMs7IhHiObJg"
"FkZQYRjGoBNcgJVU"
在00405BEC处有一个字符串调用
Possible StringData Ref from Data Obj ->"对不起,这是一个被破解的注册代码!"
那么这两个就是黑名单码了,用ultraedit打开CHMUnpacker.exe (先备份原文件),
查找 eLRYdMs7IhHiObJg 或者 FkZQYRjGoBNcgJVU 随便改一下,存盘退出,再用任一个
黑名单码注册(用户名随便),成功!!!改用原备份文件运行,没有出错,收工。
zyw[BCG]
Beginner's Cracking Group
2002.03.23 20:19
相关视频
相关阅读 Windows错误代码大全 Windows错误代码查询激活windows有什么用Mac QQ和Windows QQ聊天记录怎么合并 Mac QQ和Windows QQ聊天记录Windows 10自动更新怎么关闭 如何关闭Windows 10自动更新windows 10 rs4快速预览版17017下载错误问题Win10秋季创意者更新16291更新了什么 win10 16291更新内容windows10秋季创意者更新时间 windows10秋季创意者更新内容kb3150513补丁更新了什么 Windows 10补丁kb3150513是什么
热门文章 去除winrar注册框方法
最新文章
比特币病毒怎么破解 比去除winrar注册框方法
华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)通过Access破解MSSQL获得数据
人气排行 华为无线路由器HG522-C破解教程(附超级密码JEB格式文件京东电子书下载和阅读限制破解教UltraISO注册码全集(最新)qq相册密码破解方法去除winrar注册框方法(适应任何版本)怎么用手机破解收费游戏华为无线猫HG522破解如何给软件脱壳基础教程
查看所有0条评论>>