Автор: GL#0M gl00m-crk@yandex.ru
Цель: WinCAM 2000
Инструменты: W32Dasm, Hiew.
* Referenced by a (U)nconditional or (C)onditional Jump at Address: |:004019E2(U) // с этого адреса произошёл вызов | :00482840 55 push ebp ---ВЫРЕЗАНО--- * Possible Reference to Dialog: DialogID_01CF :00482876 68CF010000 push 000001CF :0048287B 8B4DF0 mov ecx, dword ptr [ebp-10] ---ВЫРЕЗАНО---
* Referenced by a CALL at Addresses: |:004AAB00 , :0050623E | :004019E2 E9590E0800 jmp 00482840 :004019E7 E9B4AD0F00 jmp 004FC7A0 ...
* Reference To: MFC42D.Ordinal:0746, Ord:0746h :004AAAEE E823BC0700 Call 00526716 :004AAAF3 83F801 cmp eax, 00000001 :004AAAF6 7539 jne 004AAB31 // если EAX <> 1 то прыгаем :004AAAF8 6A00 push 00000000 :004AAAFA 8D8D44FDFFFF lea ecx, dword ptr [ebp+FFFFFD44] :004AAB00 E8DD6EF5FF call 004019E2 // процедура вызова "Thank you..." :004AAB05 C645FC01 mov [ebp-04], 01 :004AAB09 8D8D44FDFFFF lea ecx, dword ptr [ebp+FFFFFD44] ...
* Reference To: MFC42D.Ordinal:0746, Ord:0746h :004AAAEE E823BC0700 Call 00526716 :004AAAF3 33C0 xor eax, eax // обнуление регистра EAX :004AAAF5 40 inc eax // увеличиваем EAX на еденицу :004AAAF6 90 nop // ничего не делаем :004AAAF7 90 nop // :) :004AAAF8 6A00 push 00000000 :004AAAFA 8D8D44FDFFFF lea ecx, dword ptr [ebp+FFFFFD44] :004AAB00 E8DD6EF5FF call 004019E2 :004AAB05 C645FC01 mov [ebp-04], 01 :004AAB09 8D8D44FDFFFF lea ecx, dword ptr [ebp+FFFFFD44] ...
* Referenced by a (U)nconditional or (C)onditional Jump at Address: |:00491E1C(C) :00491E77 6A10 push 00000010 :00491E79 68C4595D00 push 005D59C4 :00491E7E 68A8595D00 push 005D59A8 // здесь мы "падаем" :00491E83 8B4DFC mov ecx, dword ptr [ebp-04] ...
* Reference To: MFC42D.Ordinal:0370, Ord:0370h | :00491E0C E8454B0900 Call 00526956 :00491E11 50 push eax :00491E12 E8CB23F7FF call 004041E2 :00491E17 83C404 add esp, 00000004 :00491E1A 85C0 test eax, eax :00491E1C 7459 je 00491E77 :00491E1E 8B4DFC mov ecx, dword ptr [ebp-04] :00491E21 81C178010000 add ecx, 00000178 :00491E27 51 push ecx :00491E28 8BD4 mov edx, esp :00491E2A 8965F4 mov dword ptr [ebp-0C], esp :00491E2D 51 push ecx :00491E2E 8BCA mov ecx, edx ...
* Referenced by a CALL at Addresses: |:0049178C , :00491E12 , :004BCB76 | :004041E2 E929061000 jmp 00504810 :004041E7 E944F70300 jmp 00443930 ...
* Reference To: ADVAPI32.RegQueryValueExA, Ord:017Bh | :00491777 FF158C3C5F00 Call dword ptr [005F3C8C] :0049177D 3BF4 cmp esi, esp * Reference To: MSVCRTD._chkesp, Ord:00C8h | :0049177F E896660900 Call 00527E1A :00491784 85C0 test eax, eax :00491786 7540 jne 004917C8 :00491788 8B45F8 mov eax, dword ptr [ebp-08] :0049178B 50 push eax :0049178C E8512AF7FF call 004041E2 :00491791 83C404 add esp, 00000004 :00491794 85C0 test eax, eax :00491796 7430 je 004917C8 :00491798 8BF4 mov esi, esp :0049179A 8B4DFC mov ecx, dword ptr [ebp-04] :0049179D 51 push ecx * Reference To: ADVAPI32.RegCloseKey, Ord:015Bh | :0049179E FF15883C5F00 Call dword ptr [005F3C88] :004917A4 3BF4 cmp esi, esp ...
* Reference To: MSVCRTD._chkesp, Ord:00C8h | :0049177F E896660900 Call 00527E1A :00491784 85C0 test eax, eax :00491786 7540 jne 004917C8 :00491788 8B45F8 mov eax, dword ptr [ebp-08] :0049178B 50 push eax :0049178C E8512AF7FF call 004041E2 :00491791 83C404 add esp, 00000004 :00491794 33C0 xor eax,eax :00491796 40 inc eax :00491797 90 nop :00491798 8BF4 mov esi, esp :0049179A 8B4DFC mov ecx, dword ptr [ebp-04] :0049179D 51 push ecx ...
Материалы находятся на сайте http://cracklab.narod.ru/doc/