[Software cracking] FamilyTree 8.0
[] Http://www.onlinedown.net/soft/51071.htm
[Software category] foreign software/shared edition/notebook Management
[Runtime Environment] Win9x/Me/NT/2000/XP/2003
[Protection method] UPX, Long (E-Mail), Password
[Debugging tool] OllyDBD and PEiD
[Author's statement] for beginners, Crack is just an interesting part of their spare time. If this is a mistake, please let us know.
[Software information] is a software used to establish genealogy. You can build a detailed family pedigree, add photos and autobiography, and the software interface is simple and beautiful.
I. Preparations
PEiD check: UPX 0.89.6-1.02/1.05-1.24 (Delphi) stub-> Markus & Laszlo
Skip shelling. PEiD after shelling: Borland Delphi 6.0-7.0
Enter Login (E-Mail): wzwgp@163.com Password: 12345678
DEDE location Registration button address: 005357B4
Ii. algorithm tracking
005357B4 55 PUSH EBP
005357B5 8BEC mov ebp, ESP
005357B7 B9 0D000000 mov ecx, 0D
005357BC 6A 00 PUSH 0
005357BE 6A 00 PUSH 0
005357C0 49 DEC ECX
005357C1 ^ 75 F9 jnz short tk.005357BC
005357C3 53 PUSH EBX
005357C4 56 PUSH ESI
005357C5 57 PUSH EDI
005357C6 8BF8 mov edi, EAX
005357C8 33C0 xor eax, EAX
005357CA 55 PUSH EBP
005357CB 68 955C5300 PUSH tk.00535C95
005357D0 64: FF30 push dword ptr fs: [EAX]
005357D3 64: 8920 mov dword ptr fs: [EAX], ESP
005357D6 8D55 D0 lea edx, dword ptr ss: [EBP-30]
005357D9 8B87 F0020000 mov eax, dword ptr ds: [EDI + 2F0]
005357DF E8 1464F1FF CALL tk.0044BBF8;
005357E4 8B45 D0 mov eax, dword ptr ss: [EBP-30]; [EBP-30] = E
005357E7 8D55 D4 lea edx, dword ptr ss: [EBP-2C]
005357EA E8 513 fedff call tk.00409740
005357EF 837D D4 00 cmp dword ptr ss: [EBP-2C], 0
005357F3 75 2E jnz short tk.00535823; Login (E-Mail) is input and skipped
005357F5 8B15 EC035700 mov edx, dword ptr ds: [5703EC]; tk.00575A38
005357FB 8B12 mov edx, dword ptr ds: [EDX]
005357FD A1 D4035700 mov eax, dword ptr ds: [5703D4]
00535802 8B00 mov eax, dword ptr ds: [EAX]
00535804 8B80 F4020000 mov eax, dword ptr ds: [EAX + 2F4]
0053580A E8 1964F1FF CALL tk.0044BC28
0053580F A1 D4035700 mov eax, dword ptr ds: [5703D4]
00535814 8B00 mov eax, dword ptr ds: [EAX]
00535816 8B10 mov edx, dword ptr ds: [EAX]
00535818 FF92 E8000000 call near dword ptr ds: [EDX + E8]
0053581E E9 1D040000 JMP tk.00535C40
00535823 8D55 C8 lea edx, dword ptr ss: [EBP-38]
00535826 8B87 F4020000 mov eax, dword ptr ds: [EDI + 2F4]
0053582C E8 572BF5FF CALL tk.00488388
00535831 8B45 C8 mov eax, dword ptr ss: [EBP-38]
00535834 8D55 cc lea edx, dword ptr ss: [EBP-34]
00535837 E8 043 fedff call tk.00409740
0053583C 837D CC 00 cmp dword ptr ss: [EBP-34], 0
00535840 75 2E jnz short tk.00535870; Skip if the Password has been entered
00535842 8B15 EC035700 mov edx, dword ptr ds: [5703EC]; tk.00575A38
00535848 8B12 mov edx, dword ptr ds: [EDX]
0053584A A1 D4035700 mov eax, dword ptr ds: [5703D4]
0053584F 8B00 mov eax, dword ptr ds: [EAX]
00535851 8B80 F4020000 mov eax, dword ptr ds: [EAX + 2F4]
00535857 & n