網站推廣專家V1.26專業版
簡單演算法――網站推廣專家V1.26專業版
呵呵,小貓上網,若總是從網上DOWN軟體會讓我破產的,^-^
所以從《軟體王》的光碟裡找些東西來練手。唉,羨慕那些寬頻上網的哥們。
下載地址:http://www.csmarket.com/
軟體大小:1M多
【軟體簡介】:推薦你的資料到各大網站。類似《商務奇兵》。
【軟體限制】:功能限制。
【作者宣告】:初學Crack,只是感興趣,沒有其它目的。失誤之處敬請諸位大俠賜教!
【破解工具】:TRW2000娃娃修改版、FI2.5、AspackDie、W32Dasm8.93黃金版
―――――――――――――――――――――――――――――
【過
程】:
呵呵,老規矩,先執行註冊一下,看看作者給的提示。
有殼先脫殼,反彙編,TRW伺候!
―――――――――――――――――――――――――――――
一、脫殼
websumbit.exe是ASPACK
2.11殼,用AspackDie脫之,686K->25.5M,奇怪了。
當然接著反彙編了。
―――――――――――――――――――――――――――――
二、除錯
TRW裝入目標程式。
填好試煉資訊
機器碼:A21431E0-291(程式自給)
使用者名稱:fly
註冊碼:13572468
CTRL+D切入除錯介面,下BPX
HMEMCPY,F5返回程式,點“現在註冊”,攔下!
BD,暫停斷點。PMODULE,直達程式領空。F12七次,我們來到00529DBE處!
:00529DBE
8B55FC mov edx,
dword ptr [ebp-04]
====>來到這兒!
:00529DC1
B8F0755800 mov eax, 005875F0
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00529D5F(C)
|
:00529DC6
E8F19FEDFF call 00403DBC
:00529DCB
8D55F8 lea edx,
dword ptr [ebp-08]
:00529DCE 8B83E8020000
mov eax, dword ptr [ebx+000002E8]
:00529DD4 E87F85F0FF
call 00432358
:00529DD9 8B55F8
mov edx, dword ptr [ebp-08]
:00529DDC
B8F8755800 mov eax, 005875F8
:00529DE1
E8D69FEDFF call 00403DBC
:00529DE6
A12C985700 mov eax, dword ptr
[0057982C]
:00529DEB 8B15F0755800 mov
edx, dword ptr [005875F0]
:00529DF1 E8C69FEDFF
call 00403DBC
:00529DF6 FF0514765800
inc dword ptr [00587614]
:00529DFC 833D1476580003
cmp dword ptr [00587614], 00000003
:00529E03 7E0F
jle 00529E14
:00529E05
C7833402000002000000 mov dword ptr [ebx+00000234], 00000002
:00529E0F
E9A5000000 jmp 00529EB9
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00529E03(C)
|
:00529E14
A1049C5700 mov eax, dword ptr
[00579C04]
:00529E19 8B00
mov eax, dword ptr [eax]
:00529E1B E8982E0000
call 0052CCB8
====>關鍵CALL!F8進入!
:00529E20
84C0 test
al, al
:00529E22 7447
je 00529E6B
====>跳則OVER!
:00529E24
A1949B5700 mov eax, dword ptr
[00579B94]
:00529E29 C70001000000 mov
dword ptr [eax], 00000001
:00529E2F A1B0995700
mov eax, dword ptr [005799B0]
:00529E34 C70001000000
mov dword ptr [eax], 00000001
:00529E3A 8BC3
mov eax,
ebx
:00529E3C E883FEFFFF call
00529CC4
:00529E41 A1049C5700 mov
eax, dword ptr [00579C04]
:00529E46 8B00
mov eax, dword ptr [eax]
:00529E48 8B8008030000
mov eax, dword ptr [eax+00000308]
:00529E4E
33D2 xor
edx, edx
:00529E50 E8FF8CF1FF call
00442B54
:00529E55 A100765800 mov
eax, dword ptr [00587600]
:00529E5A E86DDEF2FF
call 00457CCC
====>恭喜成功!
:00529E5F
A1E8755800 mov eax, dword ptr
[005875E8]
:00529E64 E8DB38F2FF call
0044D744
:00529E69 EB4E
jmp 00529EB9
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00529E22(C)
|
:00529E6B
A1949B5700 mov eax, dword ptr
[00579B94]
:00529E70 33D2
xor edx, edx
:00529E72 8910
mov dword ptr [eax], edx
:00529E74
A1B0995700 mov eax, dword ptr
[005799B0]
:00529E79 33D2
xor edx, edx
:00529E7B 8910
mov dword ptr [eax], edx
:00529E7D
A1049C5700 mov eax, dword ptr
[00579C04]
:00529E82 8B00
mov eax, dword ptr [eax]
:00529E84 8B8008030000
mov eax, dword ptr [eax+00000308]
:00529E8A
B201 mov
dl, 01
:00529E8C E8C38CF1FF call
00442B54
:00529E91 6A10
push 00000010
:00529E93 A1A09A5700
mov eax, dword ptr [00579AA0]
:00529E98 8B00
mov eax, dword ptr [eax]
:00529E9A
8B0D10765800 mov ecx, dword ptr [00587610]
:00529EA0
8B150C765800 mov edx, dword ptr [0058760C]
:00529EA6
E82D6BF2FF call 004509D8
====>錯了!
--------------------------------------------------------
F8進入關鍵CALL:00529E1B
call 0052CCB8
*
Referenced by a CALL at Addresses:
|:00529E1B , :0052CBD7
|
:0052CCB8
55 push
ebp
:0052CCB9 8BEC
mov ebp, esp
:0052CCBB B905000000
mov ecx, 00000005
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CCC5(C)
|
:0052CCC0
6A00 push
00000000
:0052CCC2 6A00
push 00000000
:0052CCC4 49
dec ecx
:0052CCC5 75F9
jne 0052CCC0
====>上面迴圈程式碼的作用是什麼?請賜教!
:0052CCC7 53
push ebx
:0052CCC8
56 push
esi
:0052CCC9 57
push edi
:0052CCCA 33C0
xor eax, eax
:0052CCCC 55
push ebp
:0052CCCD 683BCF5200
push 0052CF3B
:0052CCD2 64FF30
push dword ptr fs:[eax]
:0052CCD5
648920 mov dword
ptr fs:[eax], esp
:0052CCD8 8D45F0
lea eax, dword ptr [ebp-10]
*
Possible StringData Ref from Code Obj ->"sef1sn8y3420dnu2ofps"
====>注意此字串!
:0052CCDB
BA54CF5200 mov edx, 0052CF54
====>sef1sn8y3420dnu2ofps入EDX
:0052CCE0
E81B71EDFF call 00403E00
:0052CCE5
8D45F4 lea eax,
dword ptr [ebp-0C]
:0052CCE8 E87B70EDFF
call 00403D68
:0052CCED 8B15309A5700
mov edx, dword ptr [00579A30]
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CC8F(C)
|
:0052CCF3
8B12 mov
edx, dword ptr [edx]
====>使用者名稱入EDX
:0052CCF5
8D45EC lea eax,
dword ptr [ebp-14]
:0052CCF8 8B0D703C1301
mov ecx, dword ptr [01133C70]
====>機器碼A21431E0-291入ECX
:0052CCFE
E83173EDFF call 00404034
:0052CD03
8B45EC mov eax,
dword ptr [ebp-14]
:0052CD06 E8DD72EDFF
call 00403FE8
:0052CD0B A1703C1301
mov eax, dword ptr [01133C70]
====>機器碼入EAX
:0052CD10 E8D372EDFF
call 00403FE8
:0052CD15 8BF0
mov esi, eax
:0052CD17 85F6
test esi, esi
====>? ESI=C,迴圈次數。
:0052CD19
0F8EB0000000 jle 0052CDCF
:0052CD1F
BB01000000 mov ebx, 00000001
====>EBX第一次是1,記數器。
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
呵呵,迴圈運算開始了!
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CDC9(C)
|
:0052CD24
8D45E8 lea eax,
dword ptr [ebp-18]
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CCB2(C)
|
:0052CD27
50 push
eax
:0052CD28 B901000000 mov
ecx, 00000001
:0052CD2D 8BD3
mov edx, ebx
:0052CD2F A1703C1301
mov eax, dword ptr [01133C70]
====>機器碼A21431E0-291入EAX
:0052CD34 E8B774EDFF
call 004041F0
:0052CD39 8B45E8
mov eax, dword ptr [ebp-18]
====>從機器碼中依次取字元
:0052CD3C
E86B74EDFF call 004041AC
:0052CD41
8BF8 mov
edi, eax
:0052CD43 A1309A5700 mov
eax, dword ptr [00579A30]
:0052CD48 8B00
mov eax, dword ptr [eax]
====>EAX=fly
:0052CD4A E89972EDFF
call 00403FE8
:0052CD4F 3BD8
cmp ebx, eax
:0052CD51 7F23
jg 0052CD76
====>此處如果使用者名稱不夠12位,
則跳到52CD76處,從程式給的字串sef1sn8y3420dnu2ofps接著取字元,
(已減去使用者名稱的位數,如:接著fly後取1sn8y3420),直至共12位為止!
:0052CD53
8D45E4 lea eax,
dword ptr [ebp-1C]
:0052CD56 50
push eax
:0052CD57 A1309A5700
mov eax, dword ptr [00579A30]
:0052CD5C 8B00
mov eax, dword ptr
[eax]
:0052CD5E B901000000 mov
ecx, 00000001
:0052CD63 8BD3
mov edx, ebx
:0052CD65 E88674EDFF
call 004041F0
:0052CD6A 8B45E4
mov eax, dword ptr [ebp-1C]
====>fly入EAX
:0052CD6D
E83A74EDFF call 004041AC
:0052CD72
8BD0 mov
edx, eax
====>fly入EDX
:0052CD74 EB1D
jmp 0052CD93
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CD51(C)
|
:0052CD76
8D45E0 lea eax,
dword ptr [ebp-20]
:0052CD79 50
push eax
:0052CD7A B901000000
mov ecx, 00000001
:0052CD7F 8BD3
mov edx, ebx
:0052CD81 8B45F0
mov eax, dword ptr
[ebp-10]
====>D EAX=sef1sn8y3420dnu2ofps
:0052CD84
E86774EDFF call 004041F0
:0052CD89
8B45E0 mov eax,
dword ptr [ebp-20]
:0052CD8C E81B74EDFF
call 004041AC
:0052CD91 8BD0
mov edx, eax
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CD74(U)
分別迴圈取機器碼和註冊名的HEX值!
:0052CD93 8A07
mov al, byte ptr [edi]
====>1、?AL=41
====>1、?AL=32
====>1、?AL=31
………… 依次取機器碼
:0052CD95
8A12 mov
dl, byte ptr [edx]
====>依次取使用者名稱。
====>1、?DL=66 即f的HEX值
====>2、?DL=6C 即l的HEX值
====>3、?DL=79
即y的HEX值
…………
……接著再從1sn8y3420取九位,共12位!
:0052CD97
3C41 cmp
al, 41
====>如果AL=41則下面不跳
:0052CD99
7502 jne
0052CD9D
:0052CD9B B066
mov al, 66
====>則把66移入AL,取代41。
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CD99(C)
|
:0052CD9D
8BF8 mov
edi, eax
:0052CD9F 81E7FF000000 and
edi, 000000FF
:0052CDA5 33C0
xor eax, eax
:0052CDA7 8AC2
mov al, dl
====>DL入AL
:0052CDA9 03F8
add edi, eax
====>1、EDI=66+66=CC
====>2、EDI=32+6C=9E
====>3、EDI=34+79=AA
…………
:0052CDAB
03FB add
edi, ebx
====>EBX是次數
====>1、EDI=CC+1=CD
====>2、EDI=9E+2=A0
====>3、EDI=AA+3=AD
…………
:0052CDAD
8D4DDC lea ecx,
dword ptr [ebp-24]
:0052CDB0 BA02000000
mov edx, 00000002
:0052CDB5 8BC7
mov eax, edi
:0052CDB7 E8ECCDEDFF
call 00409BA8
:0052CDBC 8B55DC
mov edx, dword ptr [ebp-24]
:0052CDBF
8D45F8 lea eax,
dword ptr [ebp-08]
:0052CDC2 E82972EDFF
call 00403FF0
:0052CDC7 43
inc ebx
====>EBX增1
:0052CDC8 4E
dec esi
====>ESI(12次)減1
:0052CDC9
0F8555FFFFFF jne 0052CD24
====>沒完?繼續迴圈!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CD19(C)
|
:0052CDCF
8B45F8 mov eax,
dword ptr [ebp-08]
====>迴圈後得出的字串:
CDA0AD69ABA584B16970766D
:0052CDD2
E81172EDFF call 00403FE8
:0052CDD7
8D45FC lea eax,
dword ptr [ebp-04]
:0052CDDA 8B55F8
mov edx, dword ptr [ebp-08]
:0052CDDD E81E70EDFF
call 00403E00
:0052CDE2 8B45FC
mov eax, dword ptr [ebp-04]
:0052CDE5
E8FE71EDFF call 00403FE8
:0052CDEA
8BF0 mov
esi, eax
:0052CDEC 85F6
test esi, esi
:0052CDEE 0F8EF6000000
jle 0052CEEA
:0052CDF4 BB01000000
mov ebx, 00000001
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
下面這段程式碼的作用是把上面生成的字串中的:
A替換成M、1->O(4F)、2->3、r->7、4->J、5->6、8->D、0(30H)->M、E->D
所以:CDA0AD69ABA584B16970766D->CDMMMD69MBM6DJBO697M766D
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CEE4(C)
|
:0052CDF9
8B45FC mov eax,
dword ptr [ebp-04]
:0052CDFC 807C18FF41
cmp byte ptr [eax+ebx-01], 41
:0052CE01 750D
jne 0052CE10
:0052CE03 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE06 E8AD73EDFF call
004041B8
:0052CE0B C64418FF4D mov
[eax+ebx-01], 4D
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE01(C)
|
:0052CE10
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE13 807C18FF31
cmp byte ptr [eax+ebx-01], 31
:0052CE18 750D
jne 0052CE27
:0052CE1A 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE1D E89673EDFF call
004041B8
:0052CE22 C64418FF4F mov
[eax+ebx-01], 4F
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE18(C)
|
:0052CE27
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE2A 807C18FF32
cmp byte ptr [eax+ebx-01], 32
:0052CE2F 750D
jne 0052CE3E
:0052CE31 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE34 E87F73EDFF call
004041B8
:0052CE39 C64418FF33 mov
[eax+ebx-01], 33
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE2F(C)
|
:0052CE3E
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE41 807C18FF72
cmp byte ptr [eax+ebx-01], 72
:0052CE46 750D
jne 0052CE55
:0052CE48 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE4B E86873EDFF call
004041B8
:0052CE50 C64418FF37 mov
[eax+ebx-01], 37
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE46(C)
|
:0052CE55
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE58 807C18FF34
cmp byte ptr [eax+ebx-01], 34
:0052CE5D 750D
jne 0052CE6C
:0052CE5F 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE62 E85173EDFF call
004041B8
:0052CE67 C64418FF4A mov
[eax+ebx-01], 4A
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE5D(C)
|
:0052CE6C
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE6F 807C18FF35
cmp byte ptr [eax+ebx-01], 35
:0052CE74 750D
jne 0052CE83
:0052CE76 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE79 E83A73EDFF call
004041B8
:0052CE7E C64418FF36 mov
[eax+ebx-01], 36
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE74(C)
|
:0052CE83
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE86 807C18FF38
cmp byte ptr [eax+ebx-01], 38
:0052CE8B 750D
jne 0052CE9A
:0052CE8D 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CE90 E82373EDFF call
004041B8
:0052CE95 C64418FF44 mov
[eax+ebx-01], 44
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CE8B(C)
|
:0052CE9A
8B45FC mov eax,
dword ptr [ebp-04]
:0052CE9D 807C18FF30
cmp byte ptr [eax+ebx-01], 30
:0052CEA2 750D
jne 0052CEB1
:0052CEA4 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CEA7 E80C73EDFF call
004041B8
:0052CEAC C64418FF4D mov
[eax+ebx-01], 4D
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CEA2(C)
|
:0052CEB1
8B45FC mov eax,
dword ptr [ebp-04]
:0052CEB4 807C18FF45
cmp byte ptr [eax+ebx-01], 45
:0052CEB9 750D
jne 0052CEC8
:0052CEBB 8D45FC
lea eax, dword ptr
[ebp-04]
:0052CEBE E8F572EDFF call
004041B8
:0052CEC3 C64418FF44 mov
[eax+ebx-01], 44
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CEB9(C)
|
:0052CEC8
8D45D8 lea eax,
dword ptr [ebp-28]
:0052CECB 8B55FC
mov edx, dword ptr [ebp-04]
:0052CECE 8A541AFF
mov dl, byte ptr [edx+ebx-01]
:0052CED2
E83970EDFF call 00403F10
:0052CED7
8B55D8 mov edx,
dword ptr [ebp-28]
:0052CEDA 8D45F4
lea eax, dword ptr [ebp-0C]
:0052CEDD E80E71EDFF
call 00403FF0
:0052CEE2 43
inc ebx
:0052CEE3
4E dec
esi
:0052CEE4 0F850FFFFFFF jne 0052CDF9
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
下面進行比較了!原先我以為是變數比較,呵呵,誰知還是明碼比較!
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CDEE(C)
|
:0052CEEA
A1C09A5700 mov eax, dword ptr
[00579AC0]
:0052CEEF 8B00
mov eax, dword ptr [eax]
====>D
EAX=13572468
:0052CEF1 8B55F4
mov edx, dword ptr [ebp-0C]
====>D
EDX=CDMMMD69MBM6DJBO697M766D
:0052CEF4
E8FF71EDFF call 004040F8
====>比較CALL!
:0052CEF9
7523 jne
0052CF1E
====>跳則OVER!
:0052CEFB
B301 mov
bl, 01
:0052CEFD A1B4975700 mov
eax, dword ptr [005797B4]
:0052CF02 8B15309A5700
mov edx, dword ptr [00579A30]
:0052CF08 8B12
mov edx, dword ptr [edx]
:0052CF0A
E8AD6EEDFF call 00403DBC
:0052CF0F
A144985700 mov eax, dword ptr
[00579844]
:0052CF14 8B55F4
mov edx, dword ptr [ebp-0C]
:0052CF17 E8A06EEDFF
call 00403DBC
:0052CF1C EB02
jmp 0052CF20
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CEF9(C)
|
:0052CF1E
33DB xor
ebx, ebx
* Referenced
by a (U)nconditional or (C)onditional Jump at Address:
|:0052CF1C(U)
|
:0052CF20
33C0 xor
eax, eax
:0052CF22 5A
pop edx
:0052CF23 59
pop ecx
:0052CF24 59
pop ecx
:0052CF25
648910 mov dword
ptr fs:[eax], edx
:0052CF28 6842CF5200
push 0052CF42
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0052CF40(U)
|
:0052CF2D
8D45D8 lea eax,
dword ptr [ebp-28]
:0052CF30 BA0A000000
mov edx, 0000000A
:0052CF35 E8526EEDFF
call 00403D8C
:0052CF3A C3
ret
--------------------------------------------------------
F8進入比較CALL:0052CEF4
call 004040F8
搞沒搞錯,這麼多的地方檢視此處!!!
如果想爆破只有從這裡面想辦法了,否則很難爆破完全!
*
Referenced by a CALL at Addresses:
|:00413AE3 , :00418A0F , :00419E7F
, :0041F1D1 , :004204DC
|:0042B2AE , :004313BA
, :00431445 , :00432175 , :004323B0
…… ……省 略……
……
:004040F8 53
push ebx
:004040F9
56 push
esi
:004040FA 57
push edi
:004040FB 89C6
mov esi, eax
:004040FD 89D7
mov edi, edx
:004040FF 39D0
cmp eax,
edx
====>D EAX=試煉碼
====>D EDX=真碼!!
:00404101
0F848F000000 je 00404196
:00404107
85F6 test
esi, esi
:00404109 7468
je 00404173
:0040410B 85FF
test edi, edi
:0040410D 746B
je 0040417A
:0040410F
8B46FC mov eax,
dword ptr [esi-04]
:00404112 8B57FC
mov edx, dword ptr [edi-04]
:00404115 29D0
sub eax, edx
:00404117
7702 ja 0040411B
…… ……省 略…… ……
:0040416F
01C0 add
eax, eax
:00404171 EB23
jmp 00404196
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00404109(C)
|
:00404173
8B57FC mov edx,
dword ptr [edi-04]
:00404176 29D0
sub eax, edx
:00404178 EB1C
jmp 00404196
*
Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040410D(C)
|
:0040417A
8B46FC mov eax,
dword ptr [esi-04]
:0040417D 29D0
sub eax, edx
:0040417F EB15
jmp 00404196
―――――――――――――――――――――――――――――
【KeyMake之記憶體序號產生器】:
中斷地址:52CEF4
中斷次數:1
第一位元組:E8
指令長度:5
中斷地址:4040FF
中斷次數:1
第一位元組:39
指令長度:2
記憶體方式:EDX
―――――――――――――――――――――――――――――
【註冊資訊儲存】:
[HKEY_USERS\.DEFAULT\Software\Osb\Demo]
"Name"="fly"
"Pass"="CDMMMD69MBM6DJBO697M766D"
―――――――――――――――――――――――――――――
【整
理】:
機器碼:A21431E0-291
使用者名稱:fly
註冊碼:CDMMMD69MBM6DJBO697M766D
―――――――――――――――――――――――――――――
【後
記】:
呵呵,雖然顯示“註冊成功”了,且註冊選單變灰,但是程式標題欄上的“未註冊狀態”依然存在!不知道為何?
―――――――――――――――――――――――――――――
Cracked By 巢水工作坊――fly【OCN】
2003-2-4
相關文章
- 專業引流推廣 引流推廣2019-03-08
- 網站防盜鏈專家2017-11-14網站
- 微信推廣專案2019-05-11
- 專家建議推廣資料庫加密技術2011-04-09資料庫加密
- 個人創業者運營網站之網站推廣期2013-05-13創業網站
- 幾個專業的網際網路招聘網站推薦2016-05-09網站
- 網站建設,網路推廣2011-08-25網站
- 深圳智庫網站 專業2019-05-11網站
- 如何推廣你的 Github 專案2021-07-11Github
- 谷歌推旅遊搜尋新功能 搶專業網站飯碗2016-03-11谷歌網站
- 專家訪談之:可用性專家談網站設計成功的關鍵2009-01-16網站
- 國家網信辦開展招聘網站專項整治2016-02-13網站
- 網站被百度停止推廣並提示網站存在安全風險,不宜推廣的處理方案2019-02-15網站
- 網站建設完成後必須要做的網站推廣2022-01-30網站
- CPA推廣和APP拉新創業副業專案的網推、地推、工作室充場怎麼選擇?2021-10-22APP創業
- SEO優化對企業網站推廣的作用與意義2021-11-21優化網站
- 專家建議網站漏洞要及時修復2017-07-04網站
- 10 個輕鬆推廣網站的方法2013-07-14網站
- 企業網站專業性診斷評價2020-11-24網站
- windows7家庭版,專業版,旗艦版,企業版版本區別2018-09-29Windows
- 網路安全專家成後疫情時代最受追捧專業人員2021-02-28
- win10專業工作站版金鑰2024-04-13Win10
- 網際網路如何推廣 網際網路推廣2019-04-02
- 遊戲推廣遭查處,法律專業人士:新型網路詐騙,應予以積極打擊2019-04-29遊戲
- 四位專家分享:18個網站SEO建議2013-08-24網站
- 資訊化與計算機專業網站2007-02-03計算機網站
- 網站SEO優化推廣要怎麼做?2020-12-21網站優化
- 網站推廣的100個實用方法2009-07-01網站
- 未來網站發展不在於大和廣 而在於精和專2015-10-13網站
- 有什麼低成本創業專案,直播間引流推廣平臺2021-11-03創業
- IT專家網 資料庫2007-06-01資料庫
- 網際網路怎樣推廣 網際網路如何推廣2019-04-02
- pycharm專業版破解2018-11-16PyCharm
- 分享5個爬蟲專業部落格網站2021-10-12爬蟲網站
- 遊戲網站如何做SEO優化推廣呢?2020-11-26遊戲網站優化
- 請問國外網站推廣平臺有哪些2024-10-13網站
- 創作專業wordpress網站-黃棒清-專題視訊課程2018-07-04網站
- 網際網路如何推廣 揭祕網際網路推廣方法2019-04-02