Source Insight4 破解
2023-4-7 11:40:36 Author: bbs.pediy.com(查看原文) 阅读量:24 收藏

005167D0     | 64:A1 00000000         | mov eax,dword ptr fs:[0]                   | eax:&"ActId"

005167D6     | 6A FF                  | push FFFFFFFF                              |

005167D8     | 68 FB365D00            | push sourceinsight4.5D36FB                 |

005167DD     | 50                     | push eax                                   | eax:&"ActId"

005167DE     | 64:8925 00000000       | mov dword ptr fs:[0],esp                   |

005167E5     | 81EC 10040000          | sub esp,410                                |

005167EB     | 53                     | push ebx                                   |

005167EC     | 56                     | push esi                                   |

005167ED     | 33DB                   | xor ebx,ebx                                |

005167EF     | 57                     | push edi                                   |

005167F0     | 8BF1                   | mov esi,ecx                                |

005167F2     | 33C0                   | xor eax,eax                                | eax:&"ActId"

005167F4     | 895C84 1C              | mov dword ptr ss:[esp+eax*4+1C],ebx        |

005167F8     | 899C84 1C020000        | mov dword ptr ss:[esp+eax*4+21C],ebx       |

005167FF     | 40                     | inc eax                                    | eax:&"ActId"

00516800     | 3D 80000000            | cmp eax,80                                 | eax:&"ActId"

00516805     | 72 ED                  | jb sourceinsight4.5167F4                   |

00516807     | 899C24 24040000        | mov dword ptr ss:[esp+424],ebx             |

0051680E     | 8D4424 1C              | lea eax,dword ptr ss:[esp+1C]              |

00516812     | 50                     | push eax                                   | eax:&"ActId"

00516813     | 8D8E 5C070000          | lea ecx,dword ptr ds:[esi+75C]             | esi+75C:"C:\\ProgramData\\Source Insight\\4.0\\si4.lic"

00516819     | 51                     | push ecx                                   |

0051681A     | E8 71E9FFFF            | call sourceinsight4.515190                 | 解释文件中数据,并保存。

0051681F     | 83C4 08                | add esp,8                                  |

00516822     | 8D5424 0C              | lea edx,dword ptr ss:[esp+C]               |

00516826     | 52                     | push edx                                   |

00516827     | 68 CCD05E00            | push sourceinsight4.5ED0CC                 | 5ED0CC:"Type"

0051682C     | 8D4C24 24              | lea ecx,dword ptr ss:[esp+24]              | [esp+24]:"ActId"

00516830     | 899E 0C060000          | mov dword ptr ds:[esi+60C],ebx             |

00516836     | E8 85DDFFFF            | call sourceinsight4.5145C0                 | 取出 Type 字段的值

0051683B     | 85C0                   | test eax,eax                               | eax:&"ActId"

0051683D     | 74 58                  | je sourceinsight4.516897                   |

0051683F     | 8B7C24 0C              | mov edi,dword ptr ss:[esp+C]               |

00516843     | 68 DCA25F00            | push sourceinsight4.5FA2DC                 | 5FA2DC:"Trial"

00516848     | 57                     | push edi                                   |

00516849     | E8 DCA50B00            | call sourceinsight4.5D0E2A                 | stricmp(["Type"], "Trial")

0051684E     | 83C4 08                | add esp,8                                  |

00516851     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516853     | 75 0C                  | jne sourceinsight4.516861                  |

00516855     | C786 0C060000 01000000 | mov dword ptr ds:[esi+60C],1               |

0051685F     | EB 36                  | jmp sourceinsight4.516897                  |

00516861     | 68 8C616000            | push sourceinsight4.60618C                 | 60618C:"Beta"

00516866     | 57                     | push edi                                   |

00516867     | E8 BEA50B00            | call sourceinsight4.5D0E2A                 |

0051686C     | 83C4 08                | add esp,8                                  |

0051686F     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516871     | 75 0C                  | jne sourceinsight4.51687F                  |

00516873     | C786 0C060000 03000000 | mov dword ptr ds:[esi+60C],3               |

0051687D     | EB 18                  | jmp sourceinsight4.516897                  |

0051687F     | 68 80616000            | push sourceinsight4.606180                 | 606180:"Standard"

00516884     | 57                     | push edi                                   |

00516885     | E8 A0A50B00            | call sourceinsight4.5D0E2A                 |

0051688A     | 83C4 08                | add esp,8                                  |

0051688D     | 85C0                   | test eax,eax                               | eax:&"ActId"

0051688F     | 75 06                  | jne sourceinsight4.516897                  |

00516891     | 899E 0C060000          | mov dword ptr ds:[esi+60C],ebx             |

00516897     | 8D4424 0C              | lea eax,dword ptr ss:[esp+C]               |

0051689B     | 50                     | push eax                                   | eax:&"ActId"

0051689C     | 68 D0656000            | push sourceinsight4.6065D0                 | 6065D0:"LicensedUser"

005168A1     | 8D4C24 24              | lea ecx,dword ptr ss:[esp+24]              | [esp+24]:"ActId"

005168A5     | E8 16DDFFFF            | call sourceinsight4.5145C0                 | 取出 ["LicensedUser"] 的值

005168AA     | 85C0                   | test eax,eax                               | eax:&"ActId"

005168AC     | 0F84 36030000          | je sourceinsight4.516BE8                   |

005168B2     | 8B4C24 0C              | mov ecx,dword ptr ss:[esp+C]               |

005168B6     | 51                     | push ecx                                   |

005168B7     | 8D96 04010000          | lea edx,dword ptr ds:[esi+104]             |

005168BD     | 52                     | push edx                                   |

005168BE     | E8 BD4E0A00            | call sourceinsight4.5BB780                 | strcpy(edx, ["LicensedUser"])

005168C3     | 83C4 08                | add esp,8                                  |

005168C6     | 8D4424 0C              | lea eax,dword ptr ss:[esp+C]               |

005168CA     | 50                     | push eax                                   | eax:&"ActId"

005168CB     | 68 C0656000            | push sourceinsight4.6065C0                 | 6065C0:"Organization"

005168D0     | 8D4C24 24              | lea ecx,dword ptr ss:[esp+24]              | [esp+24]:"ActId"

005168D4     | E8 E7DCFFFF            | call sourceinsight4.5145C0                 | 取出 ["Organization"] 的值

005168D9     | 85C0                   | test eax,eax                               | eax:&"ActId"

005168DB     | 74 14                  | je sourceinsight4.5168F1                   |

005168DD     | 8B4C24 0C              | mov ecx,dword ptr ss:[esp+C]               |

005168E1     | 51                     | push ecx                                   |

005168E2     | 8D96 04020000          | lea edx,dword ptr ds:[esi+204]             |

005168E8     | 52                     | push edx                                   |

005168E9     | E8 924E0A00            | call sourceinsight4.5BB780                 | strcpy(edx, ["Organization"])

005168EE     | 83C4 08                | add esp,8                                  |

005168F1     | 8D4424 0C              | lea eax,dword ptr ss:[esp+C]               |

005168F5     | 50                     | push eax                                   | eax:&"ActId"

005168F6     | 68 B8656000            | push sourceinsight4.6065B8                 | 6065B8:"Email"

005168FB     | 8D4C24 24              | lea ecx,dword ptr ss:[esp+24]              | [esp+24]:"ActId"

005168FF     | E8 BCDCFFFF            | call sourceinsight4.5145C0                 | 取出 ["Email"] 的值

00516904     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516906     | 74 14                  | je sourceinsight4.51691C                   |

00516908     | 8B4C24 0C              | mov ecx,dword ptr ss:[esp+C]               |

0051690C     | 51                     | push ecx                                   |

0051690D     | 8D96 04030000          | lea edx,dword ptr ds:[esi+304]             |

00516913     | 52                     | push edx                                   |

00516914     | E8 674E0A00            | call sourceinsight4.5BB780                 | strcpy(edx, ["Email"])

00516919     | 83C4 08                | add esp,8                                  |

0051691C     | 8D4424 0C              | lea eax,dword ptr ss:[esp+C]               |

00516920     | 50                     | push eax                                   | eax:&"ActId"

00516921     | 68 B0656000            | push sourceinsight4.6065B0                 | 6065B0:"Serial"

00516926     | 8D4C24 24              | lea ecx,dword ptr ss:[esp+24]              | [esp+24]:"ActId"

0051692A     | E8 91DCFFFF            | call sourceinsight4.5145C0                 | 取出 ["Serial"] 的值

0051692F     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516931     | 0F84 B1020000          | je sourceinsight4.516BE8                   |

00516937     | 8B4C24 0C              | mov ecx,dword ptr ss:[esp+C]               |

0051693B     | 55                     | push ebp                                   |

0051693C     | 51                     | push ecx                                   |

0051693D     | 8D6E 04                | lea ebp,dword ptr ds:[esi+4]               |

00516940     | 55                     | push ebp                                   |

00516941     | E8 3A4E0A00            | call sourceinsight4.5BB780                 | strcpy(edx, ["Serial"])

00516946     | 83C4 08                | add esp,8                                  |

00516949     | 8D5424 10              | lea edx,dword ptr ss:[esp+10]              |

0051694D     | 52                     | push edx                                   |

0051694E     | 68 A8656000            | push sourceinsight4.6065A8                 | 6065A8:"ActId"

00516953     | 8D4C24 28              | lea ecx,dword ptr ss:[esp+28]              | [esp+28]:"Serial"

00516957     | E8 64DCFFFF            | call sourceinsight4.5145C0                 | 取出 ["ActId"] 的值

0051695C     | 85C0                   | test eax,eax                               | eax:&"ActId"

0051695E     | 0F84 66020000          | je sourceinsight4.516BCA                   |

00516964     | 8B4424 10              | mov eax,dword ptr ss:[esp+10]              |

00516968     | 50                     | push eax                                   | eax:&"ActId"

00516969     | 8DBE 3A060000          | lea edi,dword ptr ds:[esi+63A]             |

0051696F     | 57                     | push edi                                   |

00516970     | E8 0B4E0A00            | call sourceinsight4.5BB780                 | strcpy(edx, ["ActId"])

00516975     | 68 7F1B0000            | push 1B7F                                  |

0051697A     | 6A 32                  | push 32                                    |

0051697C     | 6A 04                  | push 4                                     |

0051697E     | 68 701A6500            | push sourceinsight4.651A70                 |

00516983     | 57                     | push edi                                   |

00516984     | E8 E7CBEEFF            | call sourceinsight4.403570                 | 检查 ["ActId"] 的值

00516989     | 33C9                   | xor ecx,ecx                                |

0051698B     | 3BC3                   | cmp eax,ebx                                | eax:&"ActId"

0051698D     | 0F9FC1                 | setg cl                                    |

00516990     | 68 9C656000            | push sourceinsight4.60659C                 | 60659C:"Deferred"

00516995     | 57                     | push edi                                   |

00516996     | 8BD9                   | mov ebx,ecx                                |

00516998     | E8 8DA40B00            | call sourceinsight4.5D0E2A                 | stricmp(["ActId"], "Deferred")

0051699D     | 83C4 24                | add esp,24                                 |

005169A0     | 85C0                   | test eax,eax                               | eax:&"ActId"

005169A2     | 75 38                  | jne sourceinsight4.5169DC                  |

005169A4     | C706 02000000          | mov dword ptr ds:[esi],2                   |

005169AA     | C78424 28040000 FFFFFF | mov dword ptr ss:[esp+428],FFFFFFFF        |

005169B5     | 8D4C24 20              | lea ecx,dword ptr ss:[esp+20]              |

005169B9     | E8 22DBFFFF            | call sourceinsight4.5144E0                 | 释放掉保存的文件数据

005169BE     | B8 C8000000            | mov eax,C8                                 | eax:&"ActId"

005169C3     | 5D                     | pop ebp                                    |

005169C4     | 5F                     | pop edi                                    |

005169C5     | 5E                     | pop esi                                    |

005169C6     | 5B                     | pop ebx                                    |

005169C7     | 8B8C24 10040000        | mov ecx,dword ptr ss:[esp+410]             |

005169CE     | 64:890D 00000000       | mov dword ptr fs:[0],ecx                   |

005169D5     | 81C4 1C040000          | add esp,41C                                |

005169DB     | C3                     | ret                                        |

005169DC     | 33D2                   | xor edx,edx                                |

005169DE     | 85DB                   | test ebx,ebx                               |

005169E0     | 0F94C2                 | sete dl                                    |

005169E3     | 8D4424 14              | lea eax,dword ptr ss:[esp+14]              |

005169E7     | 8D4C24 18              | lea ecx,dword ptr ss:[esp+18]              |

005169EB     | 52                     | push edx                                   |

005169EC     | 50                     | push eax                                   | eax:&"ActId"

005169ED     | 51                     | push ecx                                   |

005169EE     | 8D5424 28              | lea edx,dword ptr ss:[esp+28]              | [esp+28]:"Serial"

005169F2     | 52                     | push edx                                   |

005169F3     | 55                     | push ebp                                   |

005169F4     | E8 A7E1FFFF            | call sourceinsight4.514BA0                 | 检查 ["Serial"]

005169F9     | 83C4 14                | add esp,14                                 |

005169FC     | 85C0                   | test eax,eax                               | eax:&"ActId"

005169FE     | 74 0C                  | je sourceinsight4.516A0C                   |

00516A00     | 8B4424 18              | mov eax,dword ptr ss:[esp+18]              |

00516A04     | 3B86 0C060000          | cmp eax,dword ptr ds:[esi+60C]             | eax:&"ActId"

00516A0A     | 74 1B                  | je sourceinsight4.516A27                   |

00516A0C     | C78424 28040000 FFFFFF | mov dword ptr ss:[esp+428],FFFFFFFF        |

00516A17     | 8D4C24 20              | lea ecx,dword ptr ss:[esp+20]              |

00516A1B     | E8 C0DAFFFF            | call sourceinsight4.5144E0                 |

00516A20     | B8 EF010000            | mov eax,1EF                                | eax:&"ActId"

00516A25     | EB 9C                  | jmp sourceinsight4.5169C3                  |

00516A27     | 0FB60D 13956500        | movzx ecx,byte ptr ds:[659513]             |

00516A2E     | 8B7C24 14              | mov edi,dword ptr ss:[esp+14]              |

00516A32     | 3BF9                   | cmp edi,ecx                                |

00516A34     | 0F85 BA000000          | jne sourceinsight4.516AF4                  |

00516A3A     | 55                     | push ebp                                   |

00516A3B     | B9 40846600            | mov ecx,sourceinsight4.668440              |

00516A40     | E8 CB6FF4FF            | call sourceinsight4.45DA10                 |

00516A45     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516A47     | 74 1E                  | je sourceinsight4.516A67                   |

00516A49     | C78424 28040000 FFFFFF | mov dword ptr ss:[esp+428],FFFFFFFF        |

00516A54     | 8D4C24 20              | lea ecx,dword ptr ss:[esp+20]              |

00516A58     | E8 83DAFFFF            | call sourceinsight4.5144E0                 |

00516A5D     | B8 CC010000            | mov eax,1CC                                | eax:&"ActId"

00516A62     | E9 5CFFFFFF            | jmp sourceinsight4.5169C3                  |

00516A67     | 85DB                   | test ebx,ebx                               |

00516A69     | 75 37                  | jne sourceinsight4.516AA2                  |

00516A6B     | 8D5424 10              | lea edx,dword ptr ss:[esp+10]              |

00516A6F     | 52                     | push edx                                   |

00516A70     | 68 94656000            | push sourceinsight4.606594                 | 606594:"HWID"

00516A75     | 8D4C24 28              | lea ecx,dword ptr ss:[esp+28]              | [esp+28]:"Serial"

00516A79     | C706 01000000          | mov dword ptr ds:[esi],1                   |

00516A7F     | E8 3CDBFFFF            | call sourceinsight4.5145C0                 |

00516A84     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516A86     | 0F84 3E010000          | je sourceinsight4.516BCA                   |

00516A8C     | 8B4424 10              | mov eax,dword ptr ss:[esp+10]              |

00516A90     | 50                     | push eax                                   | eax:&"ActId"

00516A91     | 8D8E 28060000          | lea ecx,dword ptr ds:[esi+628]             |

00516A97     | 51                     | push ecx                                   |

00516A98     | E8 E34C0A00            | call sourceinsight4.5BB780                 |

00516A9D     | 83C4 08                | add esp,8                                  |

00516AA0     | EB 06                  | jmp sourceinsight4.516AA8                  |

00516AA2     | C706 03000000          | mov dword ptr ds:[esi],3                   |

00516AA8     | 8D5424 10              | lea edx,dword ptr ss:[esp+10]              |

00516AAC     | 52                     | push edx                                   |

00516AAD     | 68 10AC5D00            | push sourceinsight4.5DAC10                 | 5DAC10:"Version"

00516AB2     | 8D4C24 28              | lea ecx,dword ptr ss:[esp+28]              | [esp+28]:"Serial"

00516AB6     | E8 05DBFFFF            | call sourceinsight4.5145C0                 | 取出 ["Version"] 的值

00516ABB     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516ABD     | 0F84 07010000          | je sourceinsight4.516BCA                   |

00516AC3     | 8B4424 10              | mov eax,dword ptr ss:[esp+10]              |

00516AC7     | 8A00                   | mov al,byte ptr ds:[eax]                   | eax:&"ActId"

00516AC9     | 3C 30                  | cmp al,30                                  | 30:'0'

00516ACB     | 0F8C F9000000          | jl sourceinsight4.516BCA                   |

00516AD1     | 3C 39                  | cmp al,39                                  | 39:'9'

00516AD3     | 0F8F F1000000          | jg sourceinsight4.516BCA                   |

00516AD9     | 0FBEC0                 | movsx eax,al                               | eax:&"ActId"

00516ADC     | 83C0 D0                | add eax,FFFFFFD0                           | eax:&"ActId"

00516ADF     | 8986 04060000          | mov dword ptr ds:[esi+604],eax             | eax:&"ActId"

00516AE5     | 0FB60D 13956500        | movzx ecx,byte ptr ds:[659513]             |

00516AEC     | 3BC1                   | cmp eax,ecx                                | eax:&"ActId"

00516AEE     | 75 04                  | jne sourceinsight4.516AF4                  |

00516AF0     | 3BC7                   | cmp eax,edi                                | eax:&"ActId"

00516AF2     | 74 1E                  | je sourceinsight4.516B12                   |

00516AF4     | C78424 28040000 FFFFFF | mov dword ptr ss:[esp+428],FFFFFFFF        |

00516AFF     | 8D4C24 20              | lea ecx,dword ptr ss:[esp+20]              |

00516B03     | E8 D8D9FFFF            | call sourceinsight4.5144E0                 |

00516B08     | B8 EA010000            | mov eax,1EA                                | eax:&"ActId"

00516B0D     | E9 B1FEFFFF            | jmp sourceinsight4.5169C3                  |

00516B12     | 8D5424 10              | lea edx,dword ptr ss:[esp+10]              |

00516B16     | 33DB                   | xor ebx,ebx                                |

00516B18     | 52                     | push edx                                   |

00516B19     | 68 88656000            | push sourceinsight4.606588                 | 606588:"Expiration"

00516B1E     | 8D4C24 28              | lea ecx,dword ptr ss:[esp+28]              | [esp+28]:"Serial"

00516B22     | 899E 18060000          | mov dword ptr ds:[esi+618],ebx             |

00516B28     | 899E 14060000          | mov dword ptr ds:[esi+614],ebx             |

00516B2E     | 899E 10060000          | mov dword ptr ds:[esi+610],ebx             |

00516B34     | E8 87DAFFFF            | call sourceinsight4.5145C0                 | 取出 ["Expiration"] 的值

00516B39     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516B3B     | 74 1F                  | je sourceinsight4.516B5C                   |

00516B3D     | 8B4424 10              | mov eax,dword ptr ss:[esp+10]              |

00516B41     | 50                     | push eax                                   | eax:&"ActId"

00516B42     | 8D8E 10060000          | lea ecx,dword ptr ds:[esi+610]             |

00516B48     | E8 E394F3FF            | call sourceinsight4.450030                 |

00516B4D     | 8D8E 10060000          | lea ecx,dword ptr ds:[esi+610]             |

00516B53     | E8 8881F3FF            | call sourceinsight4.44ECE0                 |

00516B58     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516B5A     | 74 50                  | je sourceinsight4.516BAC                   |

00516B5C     | 8D4C24 10              | lea ecx,dword ptr ss:[esp+10]              |

00516B60     | 51                     | push ecx                                   |

00516B61     | 68 D8A65E00            | push sourceinsight4.5EA6D8                 | 5EA6D8:"Date"

00516B66     | 8D4C24 28              | lea ecx,dword ptr ss:[esp+28]              | [esp+28]:"Serial"

00516B6A     | 899E 24060000          | mov dword ptr ds:[esi+624],ebx             |

00516B70     | 899E 20060000          | mov dword ptr ds:[esi+620],ebx             |

00516B76     | 899E 1C060000          | mov dword ptr ds:[esi+61C],ebx             |

00516B7C     | E8 3FDAFFFF            | call sourceinsight4.5145C0                 | 取出 ["Date"] 的值

00516B81     | 85C0                   | test eax,eax                               | eax:&"ActId"

00516B83     | 0F84 21FEFFFF          | je sourceinsight4.5169AA                   |

00516B89     | 8B5424 10              | mov edx,dword ptr ss:[esp+10]              |

00516B8D     | 52                     | push edx                                   |

00516B8E     | 8D8E 1C060000          | lea ecx,dword ptr ds:[esi+61C]             |

00516B94     | E8 9794F3FF            | call sourceinsight4.450030                 | 检查日期的有效性

00516B99     | 8D8E 1C060000          | lea ecx,dword ptr ds:[esi+61C]             |

00516B9F     | E8 3C81F3FF            | call sourceinsight4.44ECE0                 |

00516BA4     | 85C0                   | test eax,eax                               | 检查年、月、日的有效性

00516BA6     | 0F85 FEFDFFFF          | jne sourceinsight4.5169AA                  |

00516BAC     | C78424 28040000 FFFFFF | mov dword ptr ss:[esp+428],FFFFFFFF        |

00516BB7     | 8D4C24 20              | lea ecx,dword ptr ss:[esp+20]              |

00516BBB     | E8 20D9FFFF            | call sourceinsight4.5144E0                 |

00516BC0     | B8 E3010000            | mov eax,1E3                                | eax:&"ActId"

00516BC5     | E9 F9FDFFFF            | jmp sourceinsight4.5169C3                  |

00516BCA     | C78424 28040000 FFFFFF | mov dword ptr ss:[esp+428],FFFFFFFF        |

00516BD5     | 8D4C24 20              | lea ecx,dword ptr ss:[esp+20]              |

00516BD9     | E8 02D9FFFF            | call sourceinsight4.5144E0                 |

00516BDE     | B8 D5010000            | mov eax,1D5                                | eax:&"ActId"

00516BE3     | E9 DBFDFFFF            | jmp sourceinsight4.5169C3                  |

00516BE8     | C78424 24040000 FFFFFF | mov dword ptr ss:[esp+424],FFFFFFFF        |

00516BF3     | 8D4C24 1C              | lea ecx,dword ptr ss:[esp+1C]              |

00516BF7     | E8 E4D8FFFF            | call sourceinsight4.5144E0                 |

00516BFC     | 8B8C24 1C040000        | mov ecx,dword ptr ss:[esp+41C]             |

00516C03     | 5F                     | pop edi                                    |

00516C04     | 5E                     | pop esi                                    |

00516C05     | B8 D5010000            | mov eax,1D5                                | eax:&"ActId"

00516C0A     | 5B                     | pop ebx                                    |

00516C0B     | 64:890D 00000000       | mov dword ptr fs:[0],ecx                   |

00516C12     | 81C4 1C040000          | add esp,41C                                |

00516C18     | C3                     | ret                                        |


文章来源: https://bbs.pediy.com/thread-276774.htm
如有侵权请联系:admin#unsafe.sh