Target: | WinZip Key 2.1.0 |
Author: | Passware |
Protection: | Crippled, Packed by UPX |
Tools used |
- SoftICE 4.0 |
Level |
(X) Beginner (X) Intermediate ( ) Advanced ( ) Expert |
:004037E9 E86C0C0100 CALL 0041445ANow the check must be done BEFORE the MessageBox appears, so very probably it's a 'few' instructions further in the code:
:0040373F 40 INC EAX :00403740 8B16 MOV EDX,[ESI] :00403742 89821C010000 MOV [EDX+0000011C],EAX :00403748 E978010000 JMP 004038C5 :0040374D 83FB02 CMP EBX,02 :00403750 0F8EAE000000 JLE 00403804 :00403756 FF36 PUSH DWORD PTR [ESI] :00403758 E889210100 CALL 004158E6 :0040375D 59 POP ECX :0040375E 6830614200 PUSH 00426130 :00403763 E8D82D0100 CALL 00416540 :00403768 59 POP ECX :00403769 50 PUSH EAX :0040376A 68AD674200 PUSH 004267AD :0040376F 6A00 PUSH 00 :00403771 8D4DD4 LEA ECX,[EBP-2C] :00403774 51 PUSH ECX :00403775 E8A42A0100 CALL 0041621E :0040377A 83C410 ADD ESP,10 :0040377D 50 PUSH EAX :0040377E FF36 PUSH DWORD PTR [ESI] :00403780 E833230100 CALL 00415AB8 :00403785 83C408 ADD ESP,08 :00403788 6A02 PUSH 02 :0040378A 8D45D4 LEA EAX,[EBP-2C] :0040378D 50 PUSH EAX :0040378E E8462B0100 CALL 004162D9 :00403793 83C408 ADD ESP,08 :00403796 6823270000 PUSH 00002723 :0040379B FF36 PUSH DWORD PTR [ESI] :0040379D 8D55D0 LEA EDX,[EBP-30] :004037A0 52 PUSH EDX :004037A1 8B0E MOV ECX,[ESI] :004037A3 8B01 MOV EAX,[ECX] :004037A5 FF5004 CALL [EAX+04] :004037A8 83C40C ADD ESP,0C :004037AB 8D55D0 LEA EDX,[EBP-30] :004037AE 52 PUSH EDX :004037AF FF36 PUSH DWORD PTR [ESI] :004037B1 E802230100 CALL 00415AB8 :004037B6 83C408 ADD ESP,08 :004037B9 6A02 PUSH 02 :004037BB 8D4DD0 LEA ECX,[EBP-30] :004037BE 51 PUSH ECX :004037BF E8152B0100 CALL 004162D9 :004037C4 83C408 ADD ESP,08 :004037C7 6823270000 PUSH 00002723 :004037CC FF36 PUSH DWORD PTR [ESI] :004037CE 8D45CC LEA EAX,[EBP-34] :004037D1 50 PUSH EAX :004037D2 8B16 MOV EDX,[ESI] :004037D4 8B0A MOV ECX,[EDX] :004037D6 FF5104 CALL [ECX+04] :004037D9 83C40C ADD ESP,0C :004037DC 8D45CC LEA EAX,[EBP-34] :004037DF 50 PUSH EAX :004037E0 E85B2D0100 CALL 00416540 :004037E5 59 POP ECX :004037E6 50 PUSH EAX :004037E7 FF36 PUSH DWORD PTR [ESI] :004037E9 E86C0C0100 CALL 0041445AThat was too easy. Now to patch it you have to manually unpack it (which I suggest to do) or letting ProcDump do the work for you (do this ONLY after having manually unpacked a UPX packed target at least once).