用DeDe破解DELPHI编写程序的教程,在网上“我要”可能是第一个。其它论坛的朋友,未经本人同意请勿转载此破解教程及动画。
-----------------------------------------------------------------------
DeDe破解用DELPHI编写
程序的教程
作者:我要woyao
破解工具:DeDe.exe
教学用具:Crkme4.exe(在风飘雪下载)
做
注册机:Keymake1.63以上的版本
破解过程:用DeDe v1.05装入Crkme4,点PROCESS→OK→点工具栏DCU,在左窗口里选Unit1→在右窗口双击Button1Click,双击后停在这里:
0042DAD4 55 push ebp
0042DAD5 8BEC mov ebp, esp
0042DAD7 6A00 push $00
0042DAD9 6A00 push $00
0042DADB 53 push ebx
0042DADC 56 push esi
0042DADD 57 push edi
0042DADE 8BD8 mov ebx, eax
0042DAE0 BE5CF74200 mov esi, $0042F75C
0042DAE5 BF64F74200 mov edi, $0042F764
0042DAEA 33C0 xor eax, eax
0042DAEC 55 push ebp
0042DAED 680EDD4200 push $0042DD0E
0042DAF2 64FF30 push dword ptr fs:[eax]
0042DAF5 648920 mov fs:[eax], esp
0042DAF8 B804000000 mov eax, $00000004
0042DAFD E8AE4AFDFF call 004025B0
0042DB02 A344F74200 mov dword ptr [$42F744], eax
0042DB07 6A00 push $00
0042DB09 6A00 push $00
0042DB0B 684CF74200 push $0042F74C
0042DB10 6848F74200 push $0042F748
0042DB15 A144F74200 mov eax, dword ptr [$42F744]
0042DB1A 50 push eax
0042DB1B 6A00 push $00
0042DB1D 6A00 push $00
0042DB1F 6A00 push $00
* Reference to: kernel32.GetVolumeInformationA
|
0042DB21 E85E75FDFF call 00405084
0042DB26 A144F74200 mov eax, dword ptr [$42F744]
0042DB2B 8B00 mov eax, [eax]
0042DB2D A350F74200 mov dword ptr [$42F750], eax
0042DB32 8D55FC lea edx, [ebp-$04]
0042DB35 8B83E0010000 mov eax, [ebx+$01E0]
0042DB3B E8E8C6FEFF call 0041A228
0042DB40 837DFC00 cmp dword ptr [ebp-$04], +$00
0042DB44 751A jnz 0042DB60
0042DB46 6A00 push $00
0042DB48 668B0D1CDD4200 mov cx, word ptr [$42DD1C]
0042DB4F B202 mov dl, $02
* Possible String Reference to: "Please typ in your name !!"
|
0042DB51 B828DD4200 mov eax, $0042DD28
0042DB56 E8E5F2FFFF call 0042CE40
0042DB5B E990010000 jmp 0042DCF0
0042DB
60 8D55FC lea edx, [ebp-$04]
0042DB63 8B83E0010000 mov eax, [ebx+$01E0]
0042DB69 E8BAC6FEFF call 0041A228
0042DB6E 8B45FC mov eax, [ebp-$04]
0042DB71 E84A5CFDFF call 004037C0
0042DB76 83F806 cmp eax, +$06
0042DB79 7D1A jnl 0042DB95
0042DB7B 6A00 push $00
0042DB7D 668B0D1CDD4200 mov cx, word ptr [$42DD1C]
0042DB84 B202 mov dl, $02
* Possible String Reference to: "Type at least 6 chars for your name
| ! !"
|
0042DB86 B84CDD4200 mov eax, $0042DD4C
0042DB8B E8B0F2FFFF call 0042CE40
0042DB90 E95B010000 jmp 0042DCF0
0042DB95 8D55FC lea edx, [ebp-$04]
0042DB98 8B83E4010000 mov eax, [ebx+$01E4]
0042DB9E E885C6FEFF call 0041A228
0042DBA3 837DFC00 cmp dword ptr [ebp-$04], +$00
0042DBA7 751A jnz 0042DBC3
0042DBA9 6A00 push $00
0042DBAB 668B0D1CDD4200 mov cx,
word ptr [$42DD1C]
0042DBB2 B202 mov dl, $02
* Possible String Reference to: "Please enter your serial !"
|
0042DBB4 B87CDD4200 mov eax, $0042DD7C
0042DBB9 E882F2FFFF call 0042CE40
0042DBBE E92D010000 jmp 0042DCF0
0042DBC3 8BC7 mov eax, edi
0042DBC5 E87A59FDFF call 00403544
0042DBCA C70602000000 mov dword ptr [esi], $00000002
0042DBD0 8D55FC lea edx, [ebp-$04]
0042DBD3 8B83E0010000 mov eax, [ebx+$01E0]
0042DBD9 E84AC6FEFF call 0041A228
0042DBDE 8B45FC mov eax, [ebp-$04]
0042DBE1 8B16 mov edx, [esi]
0042DBE3 0FB64410FF movzx eax, byte ptr [eax+edx-$01]
0042DBE8 8D55F8 lea edx, [ebp-$08]
0042DBEB E88889FDFF call 00406578
0042DBF0 8B55F8