aztecx Posted December 29, 2008 Posted December 29, 2008 QQ just did this again, didn't remember I did it in the first place.Anyway i sort of did a bit more work this time and commented a bit of the code. If anyone wants to add to it and explain it a bit better it would be greatly appreciated.004043DA 66:3B75 E0 CMP SI,WORD PTR SS:[EBP-20] ; Start of the routine.004043DE 0F8F D1000000 JG CrackMe_.004044B5004043E4 8B45 E4 MOV EAX,DWORD PTR SS:[EBP-1C]004043E7 8D4D C8 LEA ECX,DWORD PTR SS:[EBP-38]004043EA 0FBFD6 MOVSX EDX,SI004043ED 8985 50FFFFFF MOV DWORD PTR SS:[EBP-B0],EAX ; Update stack with serial + next 2 characters004043F3 51 PUSH ECX004043F4 8D85 78FFFFFF LEA EAX,DWORD PTR SS:[EBP-88]004043FA 52 PUSH EDX004043FB 8D4D B8 LEA ECX,DWORD PTR SS:[EBP-48]004043FE 50 PUSH EAX004043FF 51 PUSH ECX00404400 C785 48FFFFFF 08000000 MOV DWORD PTR SS:[EBP-B8],80040440A C745 D0 01000000 MOV DWORD PTR SS:[EBP-30],100404411 C745 C8 02000000 MOV DWORD PTR SS:[EBP-38],200404418 897D 80 MOV DWORD PTR SS:[EBP-80],EDI0040441B C785 78FFFFFF 08400000 MOV DWORD PTR SS:[EBP-88],400800404425 FF15 5C104000 CALL DWORD PTR DS:[<&MSVBVM60.#632>] ; MSVBVM60.rtcMidCharVar0040442B 8D55 B8 LEA EDX,DWORD PTR SS:[EBP-48]0040442E 8D45 D8 LEA EAX,DWORD PTR SS:[EBP-28]00404431 52 PUSH EDX00404432 50 PUSH EAX00404433 FF15 AC104000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaStrVarVal>] ; MSVBVM60.__vbaStrVarVal00404439 50 PUSH EAX0040443A FF15 20104000 CALL DWORD PTR DS:[<&MSVBVM60.#516>] ; Call that starts serial generation routine.00404440 8D4D A8 LEA ECX,DWORD PTR SS:[EBP-58]00404443 8D55 98 LEA EDX,DWORD PTR SS:[EBP-68]00404446 51 PUSH ECX00404447 52 PUSH EDX00404448 66:8945 B0 MOV WORD PTR SS:[EBP-50],AX ; Replace last 2 serial characters with next 2.0040444C C745 A8 02000000 MOV DWORD PTR SS:[EBP-58],200404453 FF15 D4104000 CALL DWORD PTR DS:[<&MSVBVM60.#573>] ; MSVBVM60.rtcHexVarFromVar00404459 8D85 48FFFFFF LEA EAX,DWORD PTR SS:[EBP-B8]0040445F 8D4D 98 LEA ECX,DWORD PTR SS:[EBP-68]00404462 50 PUSH EAX00404463 8D55 88 LEA EDX,DWORD PTR SS:[EBP-78]00404466 51 PUSH ECX00404467 52 PUSH EDX00404468 FF15 B0104000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaVarCat>] ; MSVBVM60.__vbaVarCat0040446E 50 PUSH EAX0040446F FFD3 CALL EBX ; MSVBVM60.__vbaStrVarMove00404471 8BD0 MOV EDX,EAX00404473 8D4D E4 LEA ECX,DWORD PTR SS:[EBP-1C]00404476 FF15 F4104000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaStrMove>] ; MSVBVM60.__vbaStrMove0040447C 8D4D D8 LEA ECX,DWORD PTR SS:[EBP-28]0040447F FF15 0C114000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaFreeStr>] ; MSVBVM60.__vbaFreeStr00404485 8D45 88 LEA EAX,DWORD PTR SS:[EBP-78]00404488 8D4D 98 LEA ECX,DWORD PTR SS:[EBP-68]0040448B 50 PUSH EAX0040448C 8D55 A8 LEA EDX,DWORD PTR SS:[EBP-58]0040448F 51 PUSH ECX00404490 8D45 B8 LEA EAX,DWORD PTR SS:[EBP-48]00404493 52 PUSH EDX00404494 8D4D C8 LEA ECX,DWORD PTR SS:[EBP-38]00404497 50 PUSH EAX00404498 51 PUSH ECX00404499 6A 05 PUSH 50040449B FF15 18104000 CALL DWORD PTR DS:[<&MSVBVM60.__vbaFreeVarList>]; MSVBVM60.__vbaFreeVarList004044A1 B8 01000000 MOV EAX,1004044A6 83C4 18 ADD ESP,18004044A9 66:03C6 ADD AX,SI004044AC 70 79 JO SHORT CrackMe_.00404527004044AE 8BF0 MOV ESI,EAX004044B0 ^ E9 25FFFFFF JMP CrackMe_.004043DA ; Loop
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now