阅读:932回复:3
关于Advanced Registry Tracer(ART)
许多网站上下在的 art 都是限期三十天的,请问各位大虾给指点一下哪儿有破解版!
|
|
|
沙发#
发布于:2001-12-21 15:11
Tagets:
Advanced Registry Tracer 1.43 ============================= Tools: DriverStudio 2.5 release Author: sellen Contact: sellen@sina.com ================ Fri Dec 21 14:18:42 2001 :bl 00) BPX #0167:016C0569 01) BPX #016F:00496638 02) BPX #016F:004966D2 03) BPX #016F:004957C8 05) BPX #016F:00495783 :u eip l 100 0167:016C0569 6A00 PUSH 00 0167:016C056B A134666C01 MOV EAX,[016C6634] 0167:016C0570 50 PUSH EAX :d eax l 10 016F:016C04F0 5C 5C 2E 5C 4E 54 49 43-45 00 00 00 5C 5C 2E 5C \\\\.\\NTICE...\\\\.\\ ;Detect NTICE! if NTICE is active,it\'ll return eax<>-1 0167:016C0571 E85E3EFFFF CALL KERNEL32!_lopen 0167:016C0576 40 INC EAX 0167:016C0577 7510 JNZ 016C0589 0167:016C0579 6A00 PUSH 00 0167:016C057B A138666C01 MOV EAX,[016C6638] 0167:016C0580 50 PUSH EAX :d eax l 10 016F:016C04FC 5C 5C 2E 5C 53 49 43 45-00 00 00 00 55 8B EC 83 \\\\.\\SICE....U... ;Detect ICE! if ICE is active,it\'ll also return eax<>-1 0167:016C0581 E84E3EFFFF CALL KERNEL32!_lopen 0167:016C0586 40 INC EAX 0167:016C0587 7425 JZ 016C05AE 0167:016C0589 8D55E4 LEA EDX,[EBP-1C] 0167:016C058C 33C0 XOR EAX,EAX 0167:016C058E E89521FFFF CALL 016B2728 0167:016C0593 8B45E4 MOV EAX,[EBP-1C] 0167:016C0596 8D55E8 LEA EDX,[EBP-18] 0167:016C0599 E8EA45FFFF CALL 016B4B88 0167:016C059E 8B45E8 MOV EAX,[EBP-18] 0167:016C05A1 E8D22DFFFF CALL 016B3378 0167:016C05A6 8B5303 MOV EDX,[EBX+03] 0167:016C05A9 E822FAFFFF CALL 016BFFD0 ;debugger detected! 0167:016C05AE 8A1508666C01 MOV DL,[016C6608] 0167:016C05B4 8B45F8 MOV EAX,[EBP-08] 0167:016C05B7 E810F9FFFF CALL 016BFECC 0167:016C05BC 8BD8 MOV EBX,EAX 0167:016C05BE 85DB TEST EBX,EBX 0167:016C05C0 0F84F4000000 JZ 016C06BA 0167:016C05C6 8B4303 MOV EAX,[EBX+03] 0167:016C05C9 8B00 MOV EAX,[EAX] 0167:016C05CB 8945F4 MOV [EBP-0C],EAX 0167:016C05CE 8A1514666C01 MOV DL,[016C6614] 0167:016C05D4 8B45F8 MOV EAX,[EBP-08] 0167:016C05D7 E8F0F8FFFF CALL 016BFECC 0167:016C05DC 8BD8 MOV EBX,EAX 0167:016C05DE 8B4303 MOV EAX,[EBX+03] 0167:016C05E1 8B18 MOV EBX,[EAX] 0167:016C05E3 C645FF00 MOV BYTE PTR [EBP-01],00 0167:016C05E7 8B0576436B01 MOV EAX,[016B4376] 0167:016C05ED 8B00 MOV EAX,[EAX] 0167:016C05EF 8038CC CMP BYTE PTR [EAX],CC 0167:016C05F2 7504 JNZ 016C05F8 0167:016C05F4 C645FF01 MOV BYTE PTR [EBP-01],01 0167:016C05F8 807DFF00 CMP BYTE PTR [EBP-01],00 0167:016C05FC 0F85B8000000 JNZ 016C06BA 0167:016C0602 6A40 PUSH 40 0167:016C0604 8D55E8 LEA EDX,[EBP-18] 0167:016C0607 33C0 XOR EAX,EAX 0167:016C0609 E81A21FFFF CALL 016B2728 0167:016C060E 8B4DE8 MOV ECX,[EBP-18] 0167:016C0611 B201 MOV DL,01 0167:016C0613 B898696B01 MOV EAX,016B6998 0167:016C0618 E8C375FFFF CALL 016B7BE0 0167:016C061D 8945EC MOV [EBP-14],EAX 0167:016C0620 33D2 XOR EDX,EDX 0167:016C0622 55 PUSH EBP 0167:016C0623 6872066C01 PUSH 016C0672 0167:016C0628 64FF32 PUSH DWORD PTR FS:[EDX] 0167:016C062B 648922 MOV FS:[EDX],ESP 0167:016C062E 8BC3 MOV EAX,EBX 0167:016C0630 E8571FFFFF CALL 016B258C 0167:016C0635 8BF0 MOV ESI,EAX 0167:016C0637 8BD6 MOV EDX,ESI 0167:016C0639 8BCB MOV ECX,EBX 0167:016C063B 8B45EC MOV EAX,[EBP-14] 0167:016C063E 8B38 MOV EDI,[EAX] 0167:016C0640 FF17 CALL [EDI] 0167:016C0642 8B463C MOV EAX,[ESI+3C] 0167:016C0645 8BD3 MOV EDX,EBX 0167:016C0647 2BD0 SUB EDX,EAX 0167:016C0649 03C6 ADD EAX,ESI 0167:016C064B E8B4EFFFFF CALL 016BF604 0167:016C0650 8945F0 MOV [EBP-10],EAX 0167:016C0653 8BD3 MOV EDX,EBX 0167:016C0655 8BC6 MOV EAX,ESI 0167:016C0657 E8481FFFFF CALL 016B25A4 0167:016C065C 33C0 XOR EAX,EAX 0167:016C065E 5A POP EDX 0167:016C065F 59 POP ECX 0167:016C0660 59 POP ECX 0167:016C0661 648910 MOV FS:[EAX],EDX 0167:016C0664 6879066C01 PUSH 016C0679 :? eip 016C0586 0023856518 \"l? :r eax -1 :g Break due to BPX #016F:00495783 (ET=309.42 milliseconds) :u eip l 60 0167:00495783 8B45F4 MOV EAX,[EBP-0C] 0167:00495786 8B148544504B00 MOV EDX,[EAX*4+004B5044] 0167:0049578D 8B45F0 MOV EAX,[EBP-10] 0167:00495790 E89731F7FF CALL 0040892C 0167:00495795 85C0 TEST EAX,EAX 0167:00495797 7506 JNZ 0049579F 0167:00495799 C645FB01 MOV BYTE PTR [EBP-05],01 ;The check point !!we may patch here. 0167:0049579D EB0C JMP 004957AB 0167:0049579F FF45F4 INC DWORD PTR [EBP-0C] 0167:004957A2 817DF4E9030000 CMP DWORD PTR [EBP-0C],000003E9 ;All are 1000 Registrations! 0167:004957A9 75D8 JNZ 00495783 0167:004957AB 33C0 XOR EAX,EAX 0167:004957AD 5A POP EDX 0167:004957AE 59 POP ECX 0167:004957AF 59 POP ECX 0167:004957B0 648910 MOV FS:[EAX],EDX 0167:004957B3 68C8574900 PUSH 004957C8 0167:004957B8 8D45D8 LEA EAX,[EBP-28] 0167:004957BB E8ACE2F6FF CALL 00403A6C 0167:004957C0 C3 RET 0167:004957C1 E9E2DCF6FF JMP 004034A8 0167:004957C6 EBF0 JMP 004957B8 0167:004957C8 8A45FB MOV AL,[EBP-05] 0167:004957CB 8BE5 MOV ESP,EBP 0167:004957CD 5D POP EBP 0167:004957CE C3 RET :bl 00) BPX #0167:016C0569 01) BPX #016F:00496638 02) BPX #016F:004966D2 03) BPX #016F:004957C8 05) BPX #016F:00495783 :bd 3 5 :g Break due to BPX #016F:00496638 (ET=10.61 seconds) :u eip l 200 0167:00496638 8B45EC MOV EAX,[EBP-14] 0167:0049663B E8A8D6F6FF CALL 00403CE8 ;Getlength(Registration_you_inputed) 0167:00496640 83F810 CMP EAX,10 ;hehe,it must be 16 chars. 0167:00496643 0F85A6000000 JNZ 004966EF 0167:00496649 8B45EC MOV EAX,[EBP-14] 0167:0049664C E85BD8F6FF CALL 00403EAC 0167:00496651 8945F8 MOV [EBP-08],EAX 0167:00496654 8B45F8 MOV EAX,[EBP-08] 0167:00496657 E8E0F0FFFF CALL 0049573C ;Compare to right Registration,routing above. 0167:0049665C 84C0 TEST AL,AL 0167:0049665E 7478 JZ 004966D8 0167:00496660 B201 MOV DL,01 0167:00496662 A1F8D64400 MOV EAX,[0044D6F8] 0167:00496667 E83872FBFF CALL 0044D8A4 0167:0049666C 8945F0 MOV [EBP-10],EAX 0167:0049666F BA01000080 MOV EDX,80000001 0167:00496674 8B45F0 MOV EAX,[EBP-10] 0167:00496677 E8C072FBFF CALL 0044D93C 0167:0049667C B101 MOV CL,01 0167:0049667E BABC674900 MOV EDX,004967BC 0167:00496683 8B45F0 MOV EAX,[EBP-10] 0167:00496686 E80D74FBFF CALL 0044DA98 0167:0049668B 8845F7 MOV [EBP-09],AL 0167:0049668E 8D45E8 LEA EAX,[EBP-18] 0167:00496691 8B55F8 MOV EDX,[EBP-08] 0167:00496694 E887D5F6FF CALL 00403C20 0167:00496699 8B4DE8 MOV ECX,[EBP-18] 0167:0049669C BAE8674900 MOV EDX,004967E8 0167:004966A1 8B45F0 MOV EAX,[EBP-10] 0167:004966A4 E81B79FBFF CALL 0044DFC4 0167:004966A9 6A00 PUSH 00 0167:004966AB 668B0DF0674900 MOV CX,[004967F0] 0167:004966B2 B202 MOV DL,02 0167:004966B4 B8FC674900 MOV EAX,004967FC 0167:004966B9 E80EEAFBFF CALL 004550CC 0167:004966BE A124644B00 MOV EAX,[004B6424] 0167:004966C3 8B00 MOV EAX,[EAX] 0167:004966C5 E8622CFBFF CALL 0044932C 0167:004966CA A1E8604B00 MOV EAX,[004B60E8] 0167:004966CF C60001 MOV BYTE PTR [EAX],01 0167:004966D2 C645FF01 MOV BYTE PTR [EBP-01],01 0167:004966D6 EB2C JMP 00496704 0167:004966D8 6A00 PUSH 00 0167:004966DA 668B0DF0674900 MOV CX,[004967F0] 0167:004966E1 33D2 XOR EDX,EDX 0167:004966E3 B820684900 MOV EAX,00496820 0167:004966E8 E8DFE9FBFF CALL 004550CC 0167:004966ED EB15 JMP 00496704 0167:004966EF 6A00 PUSH 00 0167:004966F1 668B0DF0674900 MOV CX,[004967F0] 0167:004966F8 33D2 XOR EDX,EDX 0167:004966FA B820684900 MOV EAX,00496820 0167:004966FF E8C8E9FBFF CALL 004550CC 0167:00496704 33C0 XOR EAX,EAX 0167:00496706 5A POP EDX 0167:00496707 59 POP ECX 0167:00496708 59 POP ECX 0167:00496709 648910 MOV FS:[EAX],EDX 0167:0049670C 6826674900 PUSH 00496726 0167:00496711 8D45E8 LEA EAX,[EBP-18] 0167:00496714 BA02000000 MOV EDX,00000002 0167:00496719 E872D3F6FF CALL 00403A90 0167:0049671E C3 RET 0167:0049671F E984CDF6FF JMP 004034A8 0167:00496724 EBEB JMP 00496711 0167:00496726 8A45FF MOV AL,[EBP-01] 0167:00496729 8BE5 MOV ESP,EBP 0167:0049672B 5D POP EBP 0167:0049672C C3 RET :bl 00) BPX #0167:016C0569 01) BPX #016F:00496638 02) BPX #016F:004966D2 03) * BPX #016F:004957C8 05) * BPX #016F:00495783 |
|
|
板凳#
发布于:2001-12-28 16:45
本人是个小雏,对crack了解甚少请详解patch 写法.
|
|
|
地板#
发布于:2001-12-28 16:48
本人对crack了解甚少,请详解.
|
|
|