吾爱汇编

 找回密码
 立即注册

QQ登录

绑定QQ避免忘记帐号

查看: 2258|回复: 7

一个VB小软件无壳,没有输入框

[复制链接]
凌晨两点半 发表于 2017-11-21 16:38 | 显示全部楼层 |阅读模式

本站严厉禁止求脱求破行为(包含无自我分析直接求思路),如发现此类求助主题请点击“举报”,让我们共同维护优质的学习环境!


30HB
软件没有输入框,有错误提示!改掉无效。肯能是自己太差。求高手帮助。可以用其他FZ工具看反编译的源代码。无奈看不懂,求高手帮助。

软件下载地址:https://share.weiyun.com/37cfbab19b6efaebe0a3813c5c2ab25a(密码:T2QO)
Private Sub Form_Load() '406EA4
  Dim var_130 As Global
  Dim var_8C As App
  loc_00406F41: var_8C = Global.App
  loc_00406F46: var_134 = var_8C
  loc_00406F9A: var_78 = Global.Path
  loc_00406F9F: var_13C = var_78
  loc_00406FE2: var_98 = var_78 & "\Root.dll"
  loc_00407010: var_eax = Unknown_VTable_Call[eax+0000031Ch]
  loc_00407086: var_eax = Unknown_VTable_Call[eax+0000031Ch]
  loc_004070AA: var_E8 = "order1"
  loc_004070BE: var_108 = "pass"
  loc_00407109: var_eax = Unknown_VTable_Call[eax+0000031Ch]
  loc_00407130: var_E8 = "ioout1"
  loc_0040718F: var_eax = Unknown_VTable_Call[eax+0000031Ch]
  loc_004071B6: var_E8 = "key1"
  loc_00407215: var_eax = Unknown_VTable_Call[eax+0000031Ch]
  loc_00407298: var_8C = Global.App
  loc_0040729D: var_134 = var_8C
  loc_004072F1: var_78 = Global.Path
  loc_004072F6: var_13C = var_78
  loc_00407339: var_98 = var_78 & "\Options.ini"
  loc_0040735C: var_7C = Dir(var_78 & "\Options.ini", 0)
  loc_00407370: eax = (var_7C = vbNullString) + 1
  loc_00407373: var_140 = (var_7C = vbNullString) + 1
  loc_004073AB: If var_140 = 0 Then GoTo loc_00407756
  loc_00407402: var_8C = Global.App
  loc_00407407: var_134 = var_8C
  loc_0040745B: var_78 = Global.Path
  loc_00407460: var_13C = var_78
  loc_004074B7: var_7C = var_78 & "\Options.ini"
  loc_004074C5: var_eax = App.1784
  loc_00407539: var_8C = Global.App
  loc_0040753E: var_134 = var_8C
  loc_00407592: var_78 = Global.Path
  loc_00407597: var_13C = var_78
  loc_004075EE: var_7C = var_78 & "\Options.ini"
  loc_004075FC: var_eax = App.1784
  loc_00407670: var_8C = Global.App
  loc_00407675: var_134 = var_8C
  loc_004076C9: var_78 = Global.Path
  loc_004076CE: var_13C = var_78
  loc_00407725: var_7C = var_78 & "\Options.ini"
  loc_00407733: var_eax = App.1784
  loc_00407756: 'Referenced from: 004073AB
  loc_0040778E: var_F8 = "\Alluser.dll"
  loc_004077C9: var_78 = Dir(Environ("windir") &, 0)
  loc_004077DD: eax = (var_78 = vbNullString) + 1
  loc_004077E0: var_130 = (var_78 = vbNullString) + 1
  loc_00407817: If var_130 = 0 Then GoTo loc_00407A3C
  loc_00407855: var_F8 = "\Alluser.dll"
  loc_00407897: var_78 = CStr(Environ("windir") &)
  loc_004078A5: var_eax = App.1784
  loc_0040790A: var_F8 = "\Alluser.dll"
  loc_0040794C: var_78 = CStr(Environ("windir") &)
  loc_0040795A: var_eax = App.1784
  loc_004079BF: var_F8 = "\Alluser.dll"
  loc_00407A01: var_78 = CStr(Environ("windir") &)
  loc_00407A0F: var_eax = App.1784
  loc_00407A3C: 'Referenced from: 00407817
  loc_00407A8D: var_8C = Global.App
  loc_00407A92: var_134 = var_8C
  loc_00407AE6: var_78 = Global.Path
  loc_00407AEB: var_13C = var_78
  loc_00407B41: var_7C = var_78 & "\Options.ini"
  loc_00407B4F: var_eax = App.1788
  loc_00407B58: var_80 = CInt(Me)
  loc_00407B5D: var_E8 = var_80
  loc_00407B7A: ecx = var_80
  loc_00407BF1: var_8C = Global.App
  loc_00407BF6: var_134 = var_8C
  loc_00407C4A: var_78 = Global.Path
  loc_00407C4F: var_13C = var_78
  loc_00407CA5: var_7C = var_78 & "\Options.ini"
  loc_00407CB3: var_eax = App.1788
  loc_00407CC2: ecx = var_80
  loc_00407D39: var_8C = Global.App
  loc_00407D3E: var_134 = var_8C
  loc_00407D92: var_78 = Global.Path
  loc_00407D97: var_13C = var_78
  loc_00407DED: var_7C = var_78 & "\Options.ini"
  loc_00407DFB: var_eax = App.1788
  loc_00407E18: var_14C = var_80
  loc_00407E28: var_98 = var_14C
  loc_00407E60: ecx = Mid(var_14C, 7, 10)
  loc_00407EF2: var_8C = Global.App
  loc_00407EF7: var_134 = var_8C
  loc_00407F4B: var_78 = Global.Path
  loc_00407F50: var_13C = var_78
  loc_00407FA6: var_7C = var_78 & "\Options.ini"
  loc_00407FB4: var_eax = App.1788
  loc_00407FD1: var_150 = var_80
  loc_00407FE1: var_98 = var_150
  loc_00408014: var_ret_1 = CLng(Mid(var_150, 5, 2))
  loc_0040809D: var_F8 = "\Alluser.dll"
  loc_004080DE: var_78 = CStr(Environ("windir") &)
  loc_004080EC: var_eax = App.1788
  loc_004080F5: var_154 = var_7C
  loc_00408105: var_C8 = var_154
  loc_00408124: ecx = var_154
  loc_00408160: var_128 = CLng(var_54)
  loc_0040816F: var_124 = CLng(var_2C)
  loc_00408192: var_ret_4 = CStr(var_3C)
  loc_004081C1: var_ret_5 = CStr(var_74)
  loc_004081D0: var_ret_6 = "c:\"
  loc_004081D6: var_eax = GetVolumeInformation(var_ret_6, var_ret_5, 256, var_124, var_128, var_44, var_ret_4, 256)
  loc_00408205: var_2C = var_124
  loc_00408229: var_54 =
  loc_0040824D: var_64 = GetVolumeInformation(var_ret_6, var_ret_5, 256, var_124, var_128, var_44, var_ret_4, 256)
  loc_0040829C: If (var_2C < False) = 0 Then GoTo loc_004082D5
  loc_004082D0: var_2C = var_2C + 4294967296#
  loc_004082D5: 'Referenced from: 0040829C
  loc_004082D9: call __vbaR8ErrVar(var_2C, var_80)
  loc_004082F9: var_eax = Unknown_VTable_Call[eax+0000030Ch]
  loc_00408322: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_00408327: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_00408370: var_eax = Unknown_VTable_Call[eax+00000308h]
  loc_00408399: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040839E: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_004083E7: var_eax = Unknown_VTable_Call[eax+00000304h]
  loc_00408410: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_00408415: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040845E: var_eax = Unknown_VTable_Call[eax+00000300h]
  loc_00408487: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040848C: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_004084D5: var_eax = Unknown_VTable_Call[eax+000002FCh]
  loc_004084FE: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_00408503: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040854C: var_eax = Unknown_VTable_Call[eax+00000310h]
  loc_00408575: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040857A: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_004085C3: var_eax = Unknown_VTable_Call[eax+00000314h]
  loc_004085D6: var_130 = var_8C
  loc_004085EC: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_004085F1: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040864F: ecx = False
  loc_00408674: ecx = False
  loc_00408696: ecx = False
  loc_004086BB: ecx = False
  loc_004086DC: call __vbaStrR8(ecx, ecx, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+00000314h], Me, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+00000310h], Me, var_130, 00000000h)
  loc_004086E1: var_98 = __vbaStrR8(ecx, ecx, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+00000314h], Me, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+00000310h], Me, var_130, 00000000h)
  loc_00408708: var_C0 = Mid(__vbaStrR8(ecx, ecx, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+00000314h], Me, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+00000310h], Me, var_130, 00000000h), 2, 10)
  loc_00408720: var_130 = (var_C0 = Me)
  loc_0040874F: If var_130 = 0 Then GoTo loc_00408C68
  loc_00408775: ecx = False
  loc_0040878E: var_eax = Unknown_VTable_Call[eax+0000030Ch]
  loc_004087A1: var_130 = var_8C
  loc_004087B7: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_004087BC: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_0040881D: ecx = False
  loc_00408829: Me = CInt(var_130)
  loc_0040885D: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408891: var_98 = eax+00000054h & ",e,8,1"
  loc_004088BF: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408920: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408976: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_004089CC: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408A1F: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408A75: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408ACB: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408AFB: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408B1F: var_ret_7 = var_8C
  loc_00408B24: var_ret_7 = var_ret_7 - FFFFFFh
  loc_00408B2D: eax = var_ret_7 + 1
  loc_00408B30: var_130 = var_ret_7 + 1
  loc_00408B56: If var_130 = 0 Then GoTo loc_00408BAB
  loc_00408B87: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408BAB: 'Referenced from: 00408B56
  loc_00408BB7: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408BDB: var_ret_8 = var_8C
  loc_00408BE5: eax = var_ret_8 + 1
  loc_00408BE8: var_130 = var_ret_8 + 1
  loc_00408C0E: If var_130 = 0 Then GoTo loc_00408C63
  loc_00408C3F: var_eax = Unknown_VTable_Call[eax+00000318h]
  loc_00408C63: 'Referenced from: 00408C0E
  loc_00408C63: GoTo loc_00408FF4
  loc_00408C68: 'Referenced from: 0040874F
  loc_00408C71: var_E8 = eax+00000194h
  loc_00408C9B: If (Me >= eax+00000194) = 0 Then GoTo loc_00408E00
  loc_00408CE9: var_B0 =
  loc_00408D0E: var_A0 = "Data is missing"
  loc_00408D64: var_eax = Unknown_VTable_Call[eax+0000030Ch]
  loc_00408D77: var_130 = var_8C
  loc_00408D8D: var_eax = Unknown_VTable_Call[eax+0000005Ch]
  loc_00408D92: var_134 = Unknown_VTable_Call[eax+0000005Ch]
  loc_00408DF6: ecx = CInt(55555)
  loc_00408DFB: GoTo loc_00408FF4
  loc_00408E00: 'Referenced from: 00408C9B
  loc_00408E1B: Randomize(10)
  loc_00408E81: var_ret_9 = Int((Rnd(10) * 10000))
  loc_00408EA2: var_ret_A = Int((var_124 * 100))
  loc_00408F14: call __vbaStrR8(00905A4D, 00000003, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+0000030Ch], Me, Me, 00000014h, var_F0, var_EC, var_E8, var_E4, var_EC)
  loc_00408F1E: var_78 = __vbaStrR8(00905A4D, 00000003, var_130, 00000000h, var_8C, Unknown_VTable_Call[eax+0000030Ch], Me, Me, 00000014h, var_F0, var_EC, var_E8, var_E4, var_EC)
  loc_00408F2E: var_98 = var_78 & var_00405F34
  loc_00408F5E: var_C0 = "Notice:this program unauthorized"
  loc_00408F83: var_B0 = var_78 & var_00405F34 & var_2C
  loc_00408FEF: ecx = CInt(60000)
  loc_00408FF4: 'Referenced from: 00408C63
  loc_00409001: GoTo loc_0040906D
  loc_0040906C: Exit Sub
  loc_0040906D: 'Referenced from: 00409001
  loc_0040909D: Exit Sub
  loc_004090A6: var_eax = Unknown_VTable_Call[eax+00000008h]
  loc_004090B9: leaved
End Sub

评分

参与人数 1HB +1 收起 理由
禽大师 + 1

查看全部评分

吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
xiaoniao 发表于 2017-11-21 17:30 | 显示全部楼层
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
 楼主| 凌晨两点半 发表于 2017-11-21 17:33 | 显示全部楼层

xiaoniao 发表于 2017-11-21 17:30
错误 CALL NOP 掉

地址 00408F92

我试过了,只是去掉了错误提示框!软件无功能
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
xiaoniao 发表于 2017-11-21 17:38 | 显示全部楼层
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
xiaoniao 发表于 2017-11-21 17:38 | 显示全部楼层

凌晨两点半 发表于 2017-11-21 17:33
我试过了,只是去掉了错误提示框!软件无功能

什么功能你这个不是图吗,去掉错误吗?
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
 楼主| 凌晨两点半 发表于 2017-11-21 18:05 | 显示全部楼层

xiaoniao 发表于 2017-11-21 17:38
什么功能你这个不是图吗,去掉错误吗?

不是的,多等一会,有按钮出来了就.图片左下角。不出来就多打开几次试试。我搞了两天了,一点思路没有。关键无壳程序。也好难
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
xiaoniao 发表于 2017-11-22 08:47 | 显示全部楼层

凌晨两点半 发表于 2017-11-21 18:05
不是的,多等一会,有按钮出来了就.图片左下角。不出来就多打开几次试试。我搞了两天了,一点思路没有。 ...

Root22.rar (17.33 KB, 下载次数: 40)
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
 楼主| 凌晨两点半 发表于 2017-11-22 10:29 | 显示全部楼层


没有用的,大哥
吾爱汇编论坛-学破解,防破解!知进攻,懂防守!逆向分析,软件安全!52HB.COM
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

警告:本站严惩灌水回复,尊重自己从尊重他人开始!

1层
2层
3层
4层
5层
6层
7层
8层

免责声明

吾爱汇编(www.52hb.com)所讨论的技术及相关工具仅限用于研究学习,皆在提高软件产品的安全性,严禁用于不良动机。任何个人、团体、组织不得将其用于非法目的,否则,一切后果自行承担。吾爱汇编不承担任何因为技术滥用所产生的连带责任。吾爱汇编内容源于网络,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑中彻底删除。如有侵权请邮件或微信与我们联系处理。

站长邮箱:SharkHeng@sina.com
站长QQ:1140549900


QQ|RSS|手机版|小黑屋|帮助|吾爱汇编 ( 京公网安备11011502005403号 , 京ICP备20003498号-6 )|网站地图

Powered by Discuz!

吾爱汇编 www.52hb.com

快速回复 返回顶部 返回列表