加密狗软件破解复制T-GOU工作室
RSS
当前位置 : 加密狗破解 > 破解方法 >

分享一款国内最新加密狗的破解全过程

来源:未知 作者:admin 时间:2011-06-19 12:44 浏览:

深圳朝阳科技T-GOU加密狗破解团队多年来专注于加密狗复制,软件破解解密,如今已经为广大客户提供多种品牌多种型号的加密狗破解,加密狗复制加密狗解密案例!欢迎有需要加密狗复制加密狗解密,加密狗破解的的客户前来咨询洽谈!更多联系方式请点击导航联系我们!

首先,PEID 查壳,发现程序无壳,直接OD载入,停留在入口,下面贴出关键破解代码,请注意看哦。。
00601758    /75 60                 jnz short TOROEmul.006017BA
0060175A    |40                    inc eax
0060175B    |038CAB D1071501       add ecx,dword ptr ds:[ebx+ebp*4+11507D1]
00601762    |E2 5D                 loopd short TOROEmul.006017C1
00601764    |E3 61                 jecxz short TOROEmul.006017C7
00601766    |AA                    stos byte ptr es:[edi]
00601767    |F1                    int1
00601768   ^|7F E8                 jg short TOROEmul.00601752
0060176A    |BF 2801EA09           mov edi,9EA0128
0060176F    |C7                    ???                                                   ; 未知命令
00601770    |65:FB                 sti
00601772    |56                    push esi
00601773    |DECC                  fmulp st(4),st
00601775    |06                    push es
00601776   -|E9 00C8841E           jmp 1EE4DF7B
0060177B    |A5                    movs dword ptr es:[edi],dword ptr ds:[esi]
0060177C    |F7                    ???                                                   ; 未知命令
0060177D    |0B66 35               or esp,dword ptr ds:[esi+35]
00601780    |3C DC                 cmp al,0DC
00601782    |CD 81                 int 81
00601784    |6B6E EF 82            imul ebp,dword ptr ds:[esi-11],-7E
00601788    |11CA                  adc edx,ecx
0060178A    |DC86 6D00AF91         fadd qword ptr ds:[esi+91AF006D]
00601790    |66:25 1DAD            and ax,0AD1D
00601794    |0C 58                 or al,58
00601796    |05 90691A0F           add eax,0F1A6990
0060179B   ^|75 80                 jnz short TOROEmul.0060171D
0060179D    |49                    dec ecx
0060179E    |FF5D E1               call far fword ptr ss:[ebp-1F]
006017A1    |027F E7               add bh,byte ptr ds:[edi-19]
006017A4    |0D 02E963C0           or eax,C063E902
006017A9    |F3:                   prefix rep:
006017AA    |3D 2500C11F           cmp eax,1FC10025
006017AF    |084D 4F               or byte ptr ss:[ebp+4F],cl
006017B2    |A2 28F600F7           mov byte ptr ds:[F700F628],al
006017B7    |65:A9 812D222E        test eax,2E222D81
006017BD     6309                  arpl word ptr ds:[ecx],cx
006017BF     6C                    ins byte ptr es:[edi],dx
006017C0     23BE 9C009004         and edi,dword ptr ds:[esi+490009C]
006017C6     27                    daa
006017C7     4B                    dec ebx
006017C8     43                    inc ebx
006017C9     07                    pop es
006017CA     95                    xchg eax,ebp
006017CB     C5E8                  lds ebp,eax                                           ; 非法使用寄存器
006017CD     81C0 20EE5D5B         add eax,5B5DEE20
006017D3     3C 13                 cmp al,13
006017D5     5E                    pop esi
006017D6     3AA0 031AE26F         cmp ah,byte ptr ds:[eax+6FE21A03]
006017DC     97                    xchg eax,edi
006017DD     71 58                 jno short TOROEmul.00601837
006017DF     3E:822C97 68          sub byte ptr ds:[edi+edx*4],68
006017E4     1107                  adc dword ptr ds:[edi],eax
006017E6     AC                    lods byte ptr ds:[esi]
006017E7     803B 84               cmp byte ptr ds:[ebx],84
006017EA   ^ 71 C0                 jno short TOROEmul.006017AC
006017EC     77 50                 ja short TOROEmul.0060183E
006017EE     1ABD 00669405         sbb bh,byte ptr ss:[ebp+5946600]
006017F4     68 F77B0355           push 55037BF7
006017F9     0080 47CA3A46         add byte ptr ds:[eax+463ACA47],al
006017FF     28E6                  sub dh,ah
00601801     5E                    pop esi
00601802     19D2                  sbb edx,edx
00601804     0BF6                  or esi,esi
00601806     B8 5FFC0509           mov eax,905FC5F
0060180B     00EB                  add bl,ch
0060180D     8057 6D 2C            adc byte ptr ds:[edi+6D],2C
00601811     E0 4B                 loopdne short TOROEmul.0060185E
00601813     5C                    pop esp
00601814     00AA D4E5BFFD         add byte ptr ds:[edx+FDBFE5D4],ch
0060181A     47                    inc edi
0060181B     C9                    leave
0060181C     1900                  sbb dword ptr ds:[eax],eax
0060181E     7E 1D                 jle short TOROEmul.0060183D
00601820     D27D 30               sar byte ptr ss:[ebp+30],cl
00601823   ^ 73 B2                 jnb short TOROEmul.006017D7
00601825     7A 00                 jpe short TOROEmul.00601827
00601827     0280 F26AE9E2         add al,byte ptr ds:[eax+E2E96AF2]
0060182D     6B41 00 EF            imul eax,dword ptr ds:[ecx],-11
00601831     2870 C4               sub byte ptr ds:[eax-3C],dh
00601834     EA 0E316800 AA5B      jmp far 5BAA:0068310E
0060183B     1C 27                 sbb al,27
0060183D     5F                    pop edi
0060183E     4E                    dec esi
0060183F     48                    dec eax
00601840     021D C354CC43         add bl,byte ptr ds:[43CC54C3]
00601846   - E9 95D42F82           jmp 828FECE0
0060184B     B7 60                 mov bh,60
0060184D   ^ 71 DF                 jno short TOROEmul.0060182E
0060184F     C000 EF               rol byte ptr ds:[eax],0EF
00601852     04 06                 add al,6
00601854     80F7 AB               xor bh,0AB
00601857     2882 B83903D7         sub byte ptr ds:[edx+D70339B8],al
0060185D     C2 705F               retn 5F70
00601860     9A 3F98A9AD 05EE      call far EE05:ADA9983F
00601867     DA00                  fiadd dword ptr ds:[eax]
00601869     89A0 11F955CB         mov dword ptr ds:[eax+CB55F911],esp
0060186F     24 64                 and al,64
00601871     75 3C                 jnz short TOROEmul.006018AF


Tags:
最新评论共有 位网友发表了评论
发表评论
评论内容:不能超过250字,需审核,请自觉遵守互联网相关政策法规。
用户名: 密码:
匿名评论
立即注册账号