Total Commander 8.0 public beta 10 (x64) Crack Log

最后把代码贴一下,以免那天忘了,嘎嘎。

.text:000000000069386B loc_69386B:                             ; CODE XREF: sub_68D760+12E2j
.text:000000000069386B                                         ; sub_68D760+139Dj ...
.text:000000000069386B movsxd  rdx, cs:dword_9FF4D0
.text:0000000000693872 sub     rdx, 23B9h
.text:0000000000693879 test    rdx, rdx
.text:000000000069387C jz      short loc_693893
.text:000000000069387E mov     cs:qword_9ACA00, 0
.text:0000000000693889 mov     ecx, 1
.text:000000000069388E call    sub_4127A0                      ; 退出进程
.text:0000000000693893 ; ---------------------------------------------------------------------------
.text:0000000000693893
.text:0000000000693893 loc_693893:                             ; CODE XREF: sub_68D760+611Cj
.text:0000000000693893 movsxd  rdx, cs:dword_9FF4D0
.text:000000000069389A sub     rdx, 23B8h
.text:00000000006938A1 cmp     rdx, 1
.text:00000000006938A5 jz      short loc_6938CC
.text:00000000006938A7 mov     rcx, [rbp+var_18]
.text:00000000006938AB call    sub_7A38E0
.text:00000000006938B0 mov     rcx, rax                        ; hWnd
.text:00000000006938B3 lea     r8, aTc                         ; "TC"
.text:00000000006938BA lea     rdx, aUsingCracksIsU            ; "Using Cracks is unfair!\r\nPlease get the"...
.text:00000000006938C1 mov     r9d, 10h                        ; uType
.text:00000000006938C7 call    MessageBoxA                     ; 使用破解是不对滴,错误提示
.text:00000000006938CC
.text:00000000006938CC loc_6938CC:                             ; CODE XREF: sub_68D760+6145j
.text:00000000006938CC call    sub_8347E0


.text:00000000005B5EF3 loc_5B5EF3:                             ; CODE XREF: sub_5B5530+83Bj
.text:00000000005B5EF3                                         ; sub_5B5530+9BAj
.text:00000000005B5EF3 cmp     [rbp+var_1190], 0
.text:00000000005B5EFA jz      loc_5B6215			 ; 关键跳转nop
.text:00000000005B5F00 lea     rcx, [rbp+var_8E]
.text:00000000005B5F07 mov     dl, 7Ch
.text:00000000005B5F09 call    sub_422B70
.text:00000000005B5F0E mov     dl, 7Ch
.text:00000000005B5F10 mov     rcx, 0
.text:00000000005B5F1A call    sub_422B70
.text:00000000005B5F1F mov     rdx, rax
.text:00000000005B5F22 mov     [rbp+var_C0], rdx
.text:00000000005B5F29 lea     rdx, [rbp+var_8E]
.text:00000000005B5F30 lea     rcx, [rbp+var_10F0]
.text:00000000005B5F37 mov     r8d, 3FFh
.text:00000000005B5F3D call    sub_42A3B0
.text:00000000005B5F42 mov     rdx, cs:qword_B08210
.text:00000000005B5F49 test    rdx, rdx
.text:00000000005B5F4C jz      short loc_5B5F68
.text:00000000005B5F4E mov     rdx, cs:qword_B08210
.text:00000000005B5F55 mov     rcx, [rdx+7C0h]
.text:00000000005B5F5C lea     rdx, [rbp+var_10F0]
.text:00000000005B5F63 call    sub_8B4990
.text:00000000005B5F68
.text:00000000005B5F68 loc_5B5F68:                             ; CODE XREF: sub_5B5530+A1Cj
.text:00000000005B5F68 lea     rdx, [rbp+var_8E]
.text:00000000005B5F6F lea     rcx, [rbp+var_8F0]
.text:00000000005B5F76 mov     r8d, 103h
.text:00000000005B5F7C call    sub_42AFA0
.text:00000000005B5F81 lea     rdx, [rbp+var_8E]
.text:00000000005B5F88 mov     rcx, cs:qword_B02C30
.text:00000000005B5F8F call    sub_450D20
.text:00000000005B5F94 mov     rdx, [rbp+var_C0]
.text:00000000005B5F9B test    rdx, rdx
.text:00000000005B5F9E jnz     short loc_5B5FB6
.text:00000000005B5FA0 lea     rcx, [rbp+var_8E]
.text:00000000005B5FA7 call    sub_450E90
.text:00000000005B5FAC mov     rdx, rax
.text:00000000005B5FAF mov     [rbp+var_C0], rdx
.text:00000000005B5FB6
.text:00000000005B5FB6 loc_5B5FB6:                             ; CODE XREF: sub_5B5530+A6Ej
.text:00000000005B5FB6 mov     dl, 7Ch
.text:00000000005B5FB8 mov     rcx, 0
.text:00000000005B5FC2 call    sub_422B70
.text:00000000005B5FC7 mov     rdx, rax
.text:00000000005B5FCA mov     [rbp+var_C8], rdx
.text:00000000005B5FD1 mov     rdx, [rbp+var_C8]
.text:00000000005B5FD8 test    rdx, rdx
.text:00000000005B5FDB jnz     short loc_5B5FF3
.text:00000000005B5FDD lea     rcx, [rbp+var_8E]
.text:00000000005B5FE4 call    sub_450E90
.text:00000000005B5FE9 mov     rdx, rax
.text:00000000005B5FEC mov     [rbp+var_C8], rdx
.text:00000000005B5FF3
.text:00000000005B5FF3 loc_5B5FF3:                             ; CODE XREF: sub_5B5530+AABj
.text:00000000005B5FF3 lea     rcx, [rbp+var_6E8]
.text:00000000005B5FFA mov     rdx, [rbp+var_C0]
.text:00000000005B6001 call    sub_450D20
.text:00000000005B6006 lea     rcx, [rbp+var_6E8]
.text:00000000005B600D lea     rdx, unk_9FF7A1
.text:00000000005B6014 call    sub_4513A0
.text:00000000005B6019 lea     rcx, [rbp+var_6E8]
.text:00000000005B6020 mov     rdx, [rbp+var_C8]
.text:00000000005B6027 call    sub_4513A0
.text:00000000005B602C mov     dl, [rbp+var_91]
.text:00000000005B6032 test    dl, dl
.text:00000000005B6034 jz      short loc_5B60AC
.text:00000000005B6036 lea     rcx, [rbp+var_6E8]
.text:00000000005B603D lea     rdx, unk_9FF7A8
.text:00000000005B6044 call    sub_4513A0
.text:00000000005B6049 lea     rcx, [rbp+var_6E8]
.text:00000000005B6050 call    sub_450E90
.text:00000000005B6055 mov     rdx, rax
.text:00000000005B6058 mov     [rbp+var_C0], rdx
.text:00000000005B605F mov     rcx, [rbp+var_C0]
.text:00000000005B6066 mov     dl, [rbp+var_91]
.text:00000000005B606C mov     [rcx], dl
.text:00000000005B606E mov     rdx, [rbp+var_C0]
.text:00000000005B6075 mov     cl, [rbp+var_90]
.text:00000000005B607B mov     [rdx+1], cl
.text:00000000005B607E mov     rdx, [rbp+var_C0]
.text:00000000005B6085 mov     cl, [rbp+var_8F]
.text:00000000005B608B mov     [rdx+2], cl
.text:00000000005B608E mov     rdx, [rbp+var_C0]
.text:00000000005B6095 mov     byte ptr [rdx+3], 0
.text:00000000005B6099 lea     rcx, [rbp+var_6E8]
.text:00000000005B60A0 lea     rdx, unk_9FF7B1
.text:00000000005B60A7 call    sub_4513A0
.text:00000000005B60AC
.text:00000000005B60AC loc_5B60AC:                             ; CODE XREF: sub_5B5530+B04j
.text:00000000005B60AC lea     rcx, [rbp+var_6E8]
.text:00000000005B60B3 lea     rdx, unk_9FF7B8
.text:00000000005B60BA call    sub_4513A0
.text:00000000005B60BF movzx   edx, [rbp+var_98]
.text:00000000005B60C6 shl     rdx, 10h
.text:00000000005B60CA movzx   ecx, [rbp+var_97]
.text:00000000005B60D1 add     rdx, rcx
.text:00000000005B60D4 mov     [rbp+var_1178], edx
.text:00000000005B60DA lea     rcx, [rbp+var_1700]
.text:00000000005B60E1 call    sub_409950
.text:00000000005B60E6 mov     [rbp+var_1700], 0
.text:00000000005B60F1 mov     ecx, [rbp+var_1178]
.text:00000000005B60F7 call    sub_448A00
.text:00000000005B60FC mov     rdx, rax
.text:00000000005B60FF mov     [rbp+var_1700], rdx
.text:00000000005B6106 mov     rbx, [rbp+var_1700]
.text:00000000005B610D lea     rcx, [rbp+var_6E8]
.text:00000000005B6114 call    sub_450E90
.text:00000000005B6119 mov     rcx, rax
.text:00000000005B611C mov     rdx, rbx
.text:00000000005B611F call    sub_451690
.text:00000000005B6124 lea     rcx, [rbp+var_6E8]
.text:00000000005B612B lea     rdx, unk_9FF7A1
.text:00000000005B6132 call    sub_4513A0
.text:00000000005B6137 movzx   edx, [rbp+var_95]
.text:00000000005B613E cmp     rdx, 1
.text:00000000005B6142 jnz     short loc_5B6159
.text:00000000005B6144 lea     rcx, [rbp+var_6E8]
.text:00000000005B614B lea     rdx, aSingleUserLice            ; "Single user licence"
.text:00000000005B6152 call    sub_4513A0
.text:00000000005B6157 jmp     short loc_5B61B7
.text:00000000005B6159 ; ---------------------------------------------------------------------------
.text:00000000005B6159
.text:00000000005B6159 loc_5B6159:                             ; CODE XREF: sub_5B5530+C12j
.text:00000000005B6159 lea     rcx, [rbp+var_1700]
.text:00000000005B6160 call    sub_409950
.text:00000000005B6165 mov     [rbp+var_1700], 0
.text:00000000005B6170 movzx   ecx, [rbp+var_95]
.text:00000000005B6177 call    sub_448A00
.text:00000000005B617C mov     rdx, rax
.text:00000000005B617F mov     [rbp+var_1700], rdx
.text:00000000005B6186 mov     rbx, [rbp+var_1700]
.text:00000000005B618D lea     rcx, [rbp+var_6E8]
.text:00000000005B6194 call    sub_450E90
.text:00000000005B6199 mov     rcx, rax
.text:00000000005B619C mov     rdx, rbx
.text:00000000005B619F call    sub_451690
.text:00000000005B61A4 lea     rcx, [rbp+var_6E8]
.text:00000000005B61AB lea     rdx, aUserLicence               ; " User licence"
.text:00000000005B61B2 call    sub_4513A0
.text:00000000005B61B7
.text:00000000005B61B7 loc_5B61B7:                             ; CODE XREF: sub_5B5530+C27j
.text:00000000005B61B7 lea     rdx, [rbp+var_6E8]
.text:00000000005B61BE mov     rcx, cs:qword_B02C40
.text:00000000005B61C5 mov     r8, 104h
.text:00000000005B61CF call    sub_451100
.text:00000000005B61D4 lea     rdx, [rbp+var_6E8]
.text:00000000005B61DB lea     rcx, [rbp+var_10F0]
.text:00000000005B61E2 mov     r8d, 3FFh
.text:00000000005B61E8 call    sub_42A3B0
.text:00000000005B61ED mov     rdx, cs:qword_B08210
.text:00000000005B61F4 test    rdx, rdx
.text:00000000005B61F7 jz      short loc_5B6254
.text:00000000005B61F9 mov     rdx, cs:qword_B08210
.text:00000000005B6200 mov     rcx, [rdx+7C8h]
.text:00000000005B6207 lea     rdx, [rbp+var_10F0]
.text:00000000005B620E call    sub_8B4990
.text:00000000005B6213 jmp     short loc_5B6254
.text:00000000005B6215 ; ---------------------------------------------------------------------------
.text:00000000005B6215
.text:00000000005B6215 loc_5B6215:                             ; CODE XREF: sub_5B5530+9CAj
.text:00000000005B6215 lea     rcx, [rbp+var_8F0]
.text:00000000005B621C mov     rdx, cs:qword_B029A0
.text:00000000005B6223 mov     r8d, 103h
.text:00000000005B6229 call    sub_42AF40
.text:00000000005B622E mov     rdx, cs:qword_B08210
.text:00000000005B6235 test    rdx, rdx
.text:00000000005B6238 jz      short loc_5B6254
.text:00000000005B623A mov     rdx, cs:qword_B08210
.text:00000000005B6241 mov     rcx, [rdx+7C0h]
.text:00000000005B6248 mov     rdx, cs:qword_B029A0
.text:00000000005B624F call    sub_8B4990
.text:00000000005B6254
.text:00000000005B6254 loc_5B6254:                             ; CODE XREF: sub_5B5530+CC7j
.text:00000000005B6254                                         ; sub_5B5530+CE3j ...
.text:00000000005B6254 mov     cs:dword_B0D7A0, 0FFFFFFFFh
.text:00000000005B625E lea     rcx, [rbp+var_8F0]
.text:00000000005B6265 call    sub_42AA80
.text:00000000005B626A mov     edx, eax
.text:00000000005B626C movsxd  rdx, edx
.text:00000000005B626F dec     rdx
.text:00000000005B6272 mov     [rbp+var_1180], 0
.text:00000000005B627C cmp     edx, [rbp+var_1180]
.text:00000000005B6282 jl      short loc_5B62C1
.text:00000000005B6284 dec     [rbp+var_1180]
.text:00000000005B628A db      66h, 66h
.text:00000000005B628A xchg    ax, ax
.text:00000000005B628E xchg    ax, ax
.text:00000000005B6290
.text:00000000005B6290 loc_5B6290:                             ; CODE XREF: sub_5B5530+D8Fj
.text:00000000005B6290 inc     [rbp+var_1180]
.text:00000000005B6296 movsxd  rcx, [rbp+var_1180]
.text:00000000005B629D shl     rcx, 1
.text:00000000005B62A0 movzx   ecx, [rbp+rcx+var_8F0]
.text:00000000005B62A8 movsxd  rbx, [rbp+var_1180]
.text:00000000005B62AF imul    rcx, rbx
.text:00000000005B62B3 add     cs:dword_B0D7A0, ecx
.text:00000000005B62B9 cmp     edx, [rbp+var_1180]
.text:00000000005B62BF jg      short loc_5B6290
.text:00000000005B62C1
.text:00000000005B62C1 loc_5B62C1:                             ; CODE XREF: sub_5B5530+D52j
.text:00000000005B62C1 lea     rcx, [rbp+var_8F0]
.text:00000000005B62C8 call    sub_42A9A0
.text:00000000005B62CD mov     rdx, rax
.text:00000000005B62D0 mov     cs:lpString, rdx
.text:00000000005B62D7 cmp     [rbp+var_1190], 0
.text:00000000005B62DE jz      loc_5B6413
.text:00000000005B62E4 lea     rcx, [rbp+var_D8]
.text:00000000005B62EB mov     r8d, 0Fh
.text:00000000005B62F1 mov     edx, 8800h
.text:00000000005B62F6 call    sub_5B50F0
.text:00000000005B62FB lea     rdx, unk_A99068
.text:00000000005B6302 mov     r8, 0
.text:00000000005B630C mov     rcx, 0
.text:00000000005B6316 lea     rbx, unk_A99068
.text:00000000005B631D call    qword ptr [rbx+188h]
.text:00000000005B6323 mov     rdx, rax
.text:00000000005B6326 mov     [rbp+var_B8], rdx
.text:00000000005B632D lea     rdx, [rbp+var_148]
.text:00000000005B6334 mov     rcx, [rbp+var_B8]
.text:00000000005B633B mov     [rcx+50h], rdx
.text:00000000005B633F lea     rcx, [rbp+var_4D8]
.text:00000000005B6346 mov     rdx, [rbp+var_B8]
.text:00000000005B634D mov     [rdx+58h], rcx
.text:00000000005B6351 mov     rdx, [rbp+var_B8]
.text:00000000005B6358 mov     dword ptr [rdx+60h], 70h
.text:00000000005B635F mov     rcx, [rbp+var_B8]
.text:00000000005B6366 call    sub_84BAD0
.text:00000000005B636B mov     rcx, [rbp+var_B8]
.text:00000000005B6372 mov     edx, 0
.text:00000000005B6377 call    sub_84D6C0
.text:00000000005B637C mov     rcx, [rbp+var_B8]
.text:00000000005B6383 call    sub_84D830
.text:00000000005B6388 mov     rcx, [rbp+var_B8]
.text:00000000005B638F call    sub_40F260
.text:00000000005B6394 lea     r8, [rbp+var_D8]
.text:00000000005B639B mov     bl, 1
.text:00000000005B639D lea     rcx, [rbp+var_14F8]
.text:00000000005B63A4 mov     r9, 0Fh
.text:00000000005B63AE mov     rdx, 0FFh
.text:00000000005B63B8 mov     [rsp+1770h+var_1750], bl
.text:00000000005B63BC call    sub_405D60
.text:00000000005B63C1 lea     rbx, [rbp+var_14F8]
.text:00000000005B63C8 mov     sil, 1
.text:00000000005B63CB lea     r8, [rbp+var_4D8]
.text:00000000005B63D2 lea     rcx, [rbp+var_15F8]
.text:00000000005B63D9 mov     r9, 0Fh
.text:00000000005B63E3 mov     rdx, 0FFh
.text:00000000005B63ED mov     [rsp+1770h+var_1750], sil
.text:00000000005B63F2 call    sub_405D60
.text:00000000005B63F7 lea     rcx, [rbp+var_15F8]
.text:00000000005B63FE mov     rdx, rbx
.text:00000000005B6401 call    sub_405C70
.text:00000000005B6406 mov     edx, eax
.text:00000000005B6408 test    edx, edx
.text:00000000005B640A jz      short loc_5B6413
.text:00000000005B640C mov     [rbp+var_1190], 0
.text:00000000005B6413
.text:00000000005B6413 loc_5B6413:                             ; CODE XREF: sub_5B5530+DAEj
.text:00000000005B6413                                         ; sub_5B5530+EDAj
.text:00000000005B6413 mov     rcx, [rbp+var_10]
.text:00000000005B6417 call    sub_40F260
.text:00000000005B641C mov     rcx, [rbp+var_18]
.text:00000000005B6420 call    sub_40F260
.text:00000000005B6425 mov     rcx, [rbp+var_20]
.text:00000000005B6429 call    sub_40F260
.text:00000000005B642E mov     dl, [rbp+var_1190]
.text:00000000005B6434 mov     cs:byte_B0D7B0, dl              ; 正版标志
.text:00000000005B643A movsxd  rdx, cs:dword_B0D7A0
.text:00000000005B6441 neg     rdx
.text:00000000005B6444 imul    rdx, 25h
.text:00000000005B6448 mov     cs:dword_B0D7A0, edx
.text:00000000005B644E mov     rcx, [rbp+var_28]
.text:00000000005B6452 call    sub_40F260
.text:00000000005B6457 mov     rcx, [rbp+var_30]
.text:00000000005B645B call    sub_40F260
.text:00000000005B6460 mov     rcx, [rbp+var_38]
.text:00000000005B6464 call    sub_40F260
.text:00000000005B6469 mov     rcx, [rbp+var_40]
.text:00000000005B646D call    sub_40F260

Abs 0x437FF9    Break 出现主窗口      
Abs 0x460800    Break            
Abs 0x481050    Break            
Abs 0x4821D0    Break  跳过splash窗口
Abs 0x49C288    Break 弹出按钮选择窗口   
Abs 0x517550    Break 校验文件修改     
Abs 0x517638    Break 跳转到文件被破坏   
Abs 0x517937    Break 提示文件被破坏    
Abs 0x5B5981    Break            
Abs 0x5B5EFA    Break 关键跳转nop    
Abs 0x5B640A    Break            
Abs 0x5B6434    Break 正版标志       
Abs 0x66B69C    Break 跳过设置窗口标题   
Abs 0x6733EB    Break 设置窗口标题     
Abs 0x67845E    Break            
Abs 0x6784B9    Break            
Abs 0x69387C    Break            
Abs 0x69388E    Break 退出进程       
Abs 0x6938A5    Break            
Abs 0x6938BA    Break            
Abs 0x7E80D0    Break            
☆版权☆

* 网站名称:obaby@mars
* 网址:https://h4ck.org.cn/
* 个性:https://oba.by/
* 本文标题: 《Total Commander 8.0 public beta 10 (x64) Crack Log》
* 本文链接:https://h4ck.org.cn/2011/12/3452
* 短链接:https://oba.by/?p=3452
* 转载文章请标明文章来源,原文标题以及原文链接。请遵从 《署名-非商业性使用-相同方式共享 2.5 中国大陆 (CC BY-NC-SA 2.5 CN) 》许可协议。


猜你喜欢:

2 comments

  1. Level 1
    Firefox 15 Firefox 15 Windows 7 Windows 7 cn上海市 电信

    问个问题哈:我的8.0里面按F3查看好多文件都是乱码诶。怎么解决呢?

发表回复

您的电子邮箱地址不会被公开。 必填项已用 * 标注