一款超级的文字编辑器破解
Ctrl+N进入Trw2000
下指令bpx createwindowex //下中断点
按X键回到桌面运行程序,这时会被Trw2000拦截到。
下指令bc * //清除断点
下指令pmodule //直接跳到程序的领空
按F10来到下面
015F:0054B240 8B45EC MOV EAX,[EBP-14]
015F:0054B243 8D4DF0 LEA ECX,[EBP-10]
015F:0054B246 BA7CB45400 MOV EDX,0054B47C
015F:0054B24B E84402F2FF CALL 0046B494
015F:0054B250 8B55F0 MOV EDX,[EBP-10]
015F:0054B253 A18CDD5400 MOV EAX,[0054DD8C]
015F:0054B258 E8DF8BEBFF CALL 00403E3C
015F:0054B25D 8B0D8CDD5400 MOV ECX,[0054DD8C]
015F:0054B263 8B09 MOV ECX,[ECX]
015F:0054B265 B201 MOV DL,01
015F:0054B267 A16CDE4600 MOV EAX,[0046DE6C]
015F:0054B26C E8EF2FF2FF CALL 0046E260
015F:0054B271 8B1538E15400 MOV EDX,[0054E138]
015F:0054B277 8902 MOV [EDX],EAX
015F:0054B279 33D2 XOR EDX,EDX
015F:0054B27B B001 MOV AL,01
015F:0054B27D E8AA73FCFF CALL 0051262C
015F:0054B282 A110E25400 MOV EAX,[0054E210]
015F:0054B287 803800 CMP BYTE [EAX],00
015F:0054B28A 751A JNZ 0054B2A6
015F:0054B28C E8077FFCFF CALL 00513198 //关键CALL
当走到这里时就会弹出试用过期的对话框。
看看那里可以跳过这里。
上面0054B28A 751A JNZ 0054B2A6 好像可以跳过它耶!!!!
重新下断点bpx 0054b287
按X键回到桌面运行程序,这时被Trw2000拦截到。
当光标走到0054B28A 751A JNZ 0054B2A6 ,
打入命令 CODE ON 记下指令码
下指令A 写入汇编代码
将 0054B28A 751A JNZ 0054B2A6
改 0054B28A 741A JZ 0054B2A6
好耶!又可以进入程序了,成功了。
015F:0054B291 84C0 TEST AL,AL
015F:0054B293 7411 JZ 0054B2A6
015F:0054B295 A138E15400 MOV EAX,[0054E138]
015F:0054B29A 8B00 MOV EAX,[EAX]
015F:0054B29C E8937FEBFF CALL 00403234
015F:0054B2A1 E8128AEBFF CALL 00403CB8
015F:0054B2A6 A1F8E25400 MOV EAX,[0054E2F8]
015F:0054B2AB 8B00 MOV EAX,[EAX]
015F:0054B2AD 66BAEDFF MOV DX,FFED
015F:0054B2B1 E8DAB3EEFF CALL 00436690
015F:0054B2B6 A110E25400 MOV EAX,[0054E210]
015F:0054B2BB 803800 CMP BYTE [EAX],00
015F:0054B2BE 740D JZ 0054B2CD
015F:0054B2C0 A180E05400 MOV EAX,[0054E080]
015F:0054B2C5 C70007000000 MOV DWORD [EAX],07
015F:0054B2CB EB5F JMP SHORT 0054B32C
015F:0054B2CD E84AF8FFFF CALL 0054AB1C
015F:0054B2D2 A1DCE05400 MOV EAX,[0054E0DC]
015F:0054B2D7 8B00 MOV EAX,[EAX]
015F:0054B2D9 BA88B45400 MOV EDX,0054B488
015F:0054B2DE E875CBEEFF CALL 00437E58
015F:0054B2E3 6A11 PUSH BYTE +11
015F:0054B2E5 E846C4EBFF CALL `USER32!GetAsyncKeyState`
015F:0054B2EA 6685C0 TEST AX,AX
015F:0054B2ED 0F9CC2 SETL DL
015F:0054B2F0 A138E15400 MOV EAX,[0054E138]
015F:0054B2F5 8B00 MOV EAX,[EAX]
015F:0054B2F7 B101 MOV CL,01
015F:0054B2F9 E8CA38F2FF CALL 0046EBC8
在NotePro.exe用Ultraedt找到
75 1A E8 07 7F FC FF 84
改成 74 1A E8 07 7F FC FF 84