網路校驗――王牌超級工具組合箱 V3.4 (VB)

看雪資料發表於2015-11-15

網路校驗――王牌超級工具組合箱 V3.4 (VB)
 
 
 
下載頁面:  http://www.skycn.com/soft/10097.html
軟體大小:  2926 KB
軟體語言:  簡體中文
軟體類別:  國產軟體 / 共享版 / 雜類工具
應用平臺:  Win9x/NT/2000/XP
加入時間:  2003-06-08 17:16:41
下載次數:  30750
推薦等級:  *** 
開 發 商:  http://kinger.nease.net/

【軟體簡介】:《王牌超級工具組合箱》精選組合了當今電腦使用者最常用最實用的工具軟體於一身,從此您無須再東奔西跑地到處去搜尋工具軟體,或者總為重新裝機而煩惱……在《王牌超級工具組合箱》中,(1)“家庭影院”整合了VCD、CD、MP3、MIDI、Flash影院等多種媒體播放器;(2)“超級瀏覽器”更是整合了圖片瀏覽器 、多文字瀏覽器、多Web文件瀏覽器、字型瀏覽器、資源瀏覽器等;(3)“數學手冊”整合有科學計算器 、高等數學積分表、物理常數表、化學元素週期表;(4)“實用工具”中內建了電子日記、二十四節氣、電腦復讀機、懸浮式剪貼簿、自制螢幕保護程式、修改啟動畫面、五筆打字專家、修改檔案型別、IE保護器、登錄檔編輯器、密碼管理專家、本機IP地址等;(5)“通訊助理”內建了全國郵政編碼 、國內國際長途電話區號、電話撥號程式、來電顯示、錄音電話、影片電話、通訊錄、十二生肖、 手機簡訊等;(6)“時間機器”整合了萬年曆、上網計時、定時關機、 整點報時、定時提醒、生日筵會提醒等;(7) “成批執行”包括軟體成批壓縮/解壓縮、檔案成批改名、郵件群發器;(“網上搜尋九國” 能夠從十個‘搜尋引擎’中同時同步地搜尋關鍵詞的功能。 

【軟體限制】:NAG、50次試用、功能限制

【作者宣告】:初學Crack,只是感興趣,沒有其它目的。失誤之處敬請諸位大俠賜教!

【破解工具】:TRW2000娃娃修改版、Ollydbg1.09、PEiD、Guw32、W32Dasm 9.0白金版

――――――――――――――――――――――――――――――――― 
【過    程】:



這個東東是網路驗證,不填註冊碼,註冊後作者“會為你建立一個遠端資料庫,使你自動註冊成功”。可以說這種驗證方式是比較好的,限制了破解,沒有序號產生器了。但是我簡單試了試,發現作者並沒有最佳利用這種驗證方式,改一個返回值程式就註冊成功了,爆破後的版本連網後也沒有發現問題。


Toolsbox.exe 是 UPX 0.89.6-1.02 殼,用Guw32脫之。262K->1.53M。 VB 5.0 編寫。

序列號:892343567
試煉碼:不需要    ^O^ ^O^
―――――――――――――――――――――――――――――――――


:004CEE0D C78578FFFFFF440A4300    mov dword ptr [ebp+FFFFFF78], 00430A44
:004CEE17 C78570FFFFFF08000000    mov dword ptr [ebp+FFFFFF70], 00000008
:004CEE21 FFD3                    call ebx
:004CEE23 8D4580                  lea eaxdword ptr [ebp-80]
:004CEE26 8D4D90                  lea ecxdword ptr [ebp-70]
:004CEE29 50                      push eax
:004CEE2A 8D55A0                  lea edxdword ptr [ebp-60]
:004CEE2D 51                      push ecx
:004CEE2E 52                      push edx
:004CEE2F 8D45B0                  lea eaxdword ptr [ebp-50]
:004CEE32 6A01                    push 00000001
:004CEE34 50                      push eax
:004CEE35 FF15C0104000            call dword ptr [004010C0]
                                  ====>確認網路連線的對話

:004CEE3B 8BC8                    mov ecxeax
:004CEE3D FF1548114000            call dword ptr [00401148]
:004CEE43 8D4D80                  lea ecxdword ptr [ebp-80]
:004CEE46 8BD8                    mov ebxeax
:004CEE48 8D5590                  lea edxdword ptr [ebp-70]
:004CEE4B 51                      push ecx
:004CEE4C 8D45A0                  lea eaxdword ptr [ebp-60]
:004CEE4F 52                      push edx
:004CEE50 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEE53 50                      push eax
:004CEE54 51                      push ecx
:004CEE55 6A04                    push 00000004
:004CEE57 FF1550104000            call dword ptr [00401050]
:004CEE5D 8B16                    mov edxdword ptr [esi]
:004CEE5F 83C414                  add esp, 00000014
:004CEE62 6683FB02                cmp bx, 0002
:004CEE66 56                      push esi
:004CEE67 7543                    jne 004CEEAC
:004CEE69 FF9210030000            call dword ptr [edx+00000310]
:004CEE6F 50                      push eax
:004CEE70 8D45C4                  lea eaxdword ptr [ebp-3C]
:004CEE73 50                      push eax
:004CEE74 FFD7                    call edi
:004CEE76 8BF0                    mov esieax

* Possible StringData Ref from Data Obj ->"     ?

:004CEE78 68980A4300              push 00430A98
:004CEE7D 56                      push esi
:004CEE7E 8B0E                    mov ecxdword ptr [esi]
:004CEE80 FF91A4000000            call dword ptr [ecx+000000A4]
:004CEE86 85C0                    test eaxeax
:004CEE88 DBE2                    fclex
:004CEE8A 7D12                    jge 004CEE9E
:004CEE8C 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"N?3f?? "
                                  |
:004CEE91 68E4B94200              push 0042B9E4
:004CEE96 56                      push esi
:004CEE97 50                      push eax
:004CEE98 FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEE8A(C)
|
:004CEE9E 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEEA1 FF15F4124000            call dword ptr [004012F4]
:004CEEA7 E9C2090000              jmp 004CF86E

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEE67(C)
|
:004CEEAC FF9210030000            call dword ptr [edx+00000310]
:004CEEB2 50                      push eax
:004CEEB3 8D45C4                  lea eaxdword ptr [ebp-3C]
:004CEEB6 50                      push eax
:004CEEB7 FFD7                    call edi
:004CEEB9 8BD8                    mov ebxeax
:004CEEBB 68FC0A4300              push 00430AFC
:004CEEC0 53                      push ebx
:004CEEC1 8B0B                    mov ecxdword ptr [ebx]
:004CEEC3 FF91A4000000            call dword ptr [ecx+000000A4]
:004CEEC9 85C0                    test eaxeax
:004CEECB DBE2                    fclex
:004CEECD 7D12                    jge 004CEEE1
:004CEECF 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"N?3f?? "
                                  |
:004CEED4 68E4B94200              push 0042B9E4
:004CEED9 53                      push ebx
:004CEEDA 50                      push eax
:004CEEDB FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEECD(C)
|
:004CEEE1 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEEE4 FF15F4124000            call dword ptr [004012F4]
:004CEEEA 8B16                    mov edxdword ptr [esi]
:004CEEEC 6A0B                    push 0000000B
:004CEEEE 56                      push esi
:004CEEEF FF92A4000000            call dword ptr [edx+000000A4]
:004CEEF5 85C0                    test eaxeax
:004CEEF7 DBE2                    fclex
:004CEEF9 7D12                    jge 004CEF0D
:004CEEFB 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"`m瞼??,"
                                  |
:004CEF00 6870B44200              push 0042B470
:004CEF05 56                      push esi
:004CEF06 50                      push eax
:004CEF07 FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEEF9(C)
|
:004CEF0D 83EC10                  sub esp, 00000010
:004CEF10 B908000000              mov ecx, 00000008
:004CEF15 8BDC                    mov ebxesp
:004CEF17 898D70FFFFFF            mov dword ptr [ebp+FFFFFF70], ecx

* Possible StringData Ref from Data Obj ->"hhttp://kinger.nease.net/use"
                                  |
:004CEF1D B850E24200              mov eax, 0042E250
                                  ====>註冊頁面

:004CEF22 83EC10                  sub esp, 00000010
:004CEF25 890B                    mov dword ptr [ebx], ecx
:004CEF27 8B8D74FFFFFF            mov ecxdword ptr [ebp+FFFFFF74]
:004CEF2D 898578FFFFFF            mov dword ptr [ebp+FFFFFF78], eax
:004CEF33 33D2                    xor edxedx
:004CEF35 894B04                  mov dword ptr [ebx+04], ecx
:004CEF38 8BCC                    mov ecxesp
:004CEF3A 6A02                    push 00000002
:004CEF3C 6A16                    push 00000016
:004CEF3E 894308                  mov dword ptr [ebx+08], eax
:004CEF41 8B857CFFFFFF            mov eaxdword ptr [ebp+FFFFFF7C]
:004CEF47 56                      push esi
:004CEF48 89430C                  mov dword ptr [ebx+0C], eax
:004CEF4B B803000000              mov eax, 00000003
:004CEF50 8901                    mov dword ptr [ecx], eax
:004CEF52 8B8554FFFFFF            mov eaxdword ptr [ebp+FFFFFF54]
:004CEF58 894104                  mov dword ptr [ecx+04], eax
:004CEF5B 8B06                    mov eaxdword ptr [esi]
:004CEF5D 895108                  mov dword ptr [ecx+08], edx
:004CEF60 8B955CFFFFFF            mov edxdword ptr [ebp+FFFFFF5C]
:004CEF66 89510C                  mov dword ptr [ecx+0C], edx
:004CEF69 FF9020030000            call dword ptr [eax+00000320]
:004CEF6F 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEF72 50                      push eax
:004CEF73 51                      push ecx
:004CEF74 FFD7                    call edi
:004CEF76 8D55B0                  lea edxdword ptr [ebp-50]
:004CEF79 50                      push eax
:004CEF7A 52                      push edx
:004CEF7B FF156C114000            call dword ptr [0040116C]
:004CEF81 83C430                  add esp, 00000030
:004CEF84 50                      push eax
:004CEF85 FF1544104000            call dword ptr [00401044]
:004CEF8B 8B1DAC124000            mov ebxdword ptr [004012AC]
:004CEF91 8BD0                    mov edxeax
:004CEF93 8D4DDC                  lea ecxdword ptr [ebp-24]
:004CEF96 FFD3                    call ebx
:004CEF98 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEF9B FF15F4124000            call dword ptr [004012F4]
:004CEFA1 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEFA4 FF1538104000            call dword ptr [00401038]
:004CEFAA 8D45DC                  lea eaxdword ptr [ebp-24]
:004CEFAD 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEFB0 50                      push eax
:004CEFB1 51                      push ecx
:004CEFB2 E879A90000              call 004D9930
:004CEFB7 8D55B0                  lea edxdword ptr [ebp-50]
:004CEFBA 52                      push edx
:004CEFBB FF1544104000            call dword ptr [00401044]
:004CEFC1 8BD0                    mov edxeax
:004CEFC3 8D4DDC                  lea ecxdword ptr [ebp-24]
:004CEFC6 FFD3                    call ebx
:004CEFC8 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEFCB FF1538104000            call dword ptr [00401038]
:004CEFD1 8B06                    mov eaxdword ptr [esi]
:004CEFD3 6A00                    push 00000000
:004CEFD5 56                      push esi
:004CEFD6 FF90A4000000            call dword ptr [eax+000000A4]
:004CEFDC 85C0                    test eaxeax
:004CEFDE DBE2                    fclex
:004CEFE0 7D12                    jge 004CEFF4
:004CEFE2 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"`m瞼??,"
                                  |
:004CEFE7 6870B44200              push 0042B470
:004CEFEC 56                      push esi
:004CEFED 50                      push eax
:004CEFEE FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEFE0(C)
|
:004CEFF4 8B0E                    mov ecxdword ptr [esi]
:004CEFF6 56                      push esi
:004CEFF7 FF9104030000            call dword ptr [ecx+00000304]
:004CEFFD 8D55C4                  lea edxdword ptr [ebp-3C]
:004CF000 50                      push eax
:004CF001 52                      push edx
:004CF002 FFD7                    call edi
:004CF004 8B08                    mov ecxdword ptr [eax]
:004CF006 8D55D4                  lea edxdword ptr [ebp-2C]
:004CF009 52                      push edx
:004CF00A 50                      push eax
:004CF00B 89853CFFFFFF            mov dword ptr [ebp+FFFFFF3C], eax
:004CF011 FF91A0000000            call dword ptr [ecx+000000A0]
:004CF017 85C0                    test eaxeax
:004CF019 DBE2                    fclex
:004CF01B 7D18                    jge 004CF035
:004CF01D 8B8D3CFFFFFF            mov ecxdword ptr [ebp+FFFFFF3C]
:004CF023 68A0000000              push 000000A0

* Possible StringData Ref from Data Obj ->"N?3f?? "
                                  |
:004CF028 68E4B94200              push 0042B9E4
:004CF02D 51                      push ecx
:004CF02E 50                      push eax
:004CF02F FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF01B(C)
|
:004CF035 8B55DC                  mov edxdword ptr [ebp-24]
:004CF038 8B45D4                  mov eaxdword ptr [ebp-2C]
                                  ====>EAX=892343567          機器碼

:004CF03B 6A01                    push 00000001
:004CF03D 52                      push edx

* Possible StringData Ref from Data Obj ->",,"
                                  |
:004CF03E 688CE24200              push 0042E28C
:004CF043 50                      push eax
:004CF044 FF156C104000            call dword ptr [0040106C]
                                  ====>連線,

:004CF04A 8BD0                    mov edxeax
                                  ====>EDX=,892343567

:004CF04C 8D4DD0                  lea ecxdword ptr [ebp-30]
:004CF04F FFD3                    call ebx
:004CF051 50                      push eax

* Possible StringData Ref from Data Obj ->",,"
                                  |
:004CF052 688CE24200              push 0042E28C
:004CF057 FF156C104000            call dword ptr [0040106C]
                                  ====>連線,

:004CF05D 8BD0                    mov edxeax
                                  ====>EDX=,892343567,

:004CF05F 8D4DCC                  lea ecxdword ptr [ebp-34]
:004CF062 FFD3                    call ebx
:004CF064 50                      push eax
:004CF065 6A00                    push 00000000
:004CF067 FF1508124000            call dword ptr [00401208]
                                  ====>這裡估計就是連網校驗了!

:004CF06D 8BD8                    mov ebxeax
                                  ====>這是返回值!

:004CF06F 8D4DCC                  lea ecxdword ptr [ebp-34]
:004CF072 F7DB                    neg ebx
:004CF074 8D55D0                  lea edxdword ptr [ebp-30]
:004CF077 51                      push ecx
:004CF078 1BDB                    sbb ebxebx
:004CF07A 8D45D4                  lea eaxdword ptr [ebp-2C]
:004CF07D 52                      push edx
:004CF07E 43                      inc ebx
:004CF07F 50                      push eax
:004CF080 6A03                    push 00000003
:004CF082 F7DB                    neg ebx
                                  ====>爆破點!


:004CF084 FF152C124000            call dword ptr [0040122C]
:004CF08A 83C410                  add esp, 00000010
:004CF08D 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CF090 FF15F4124000            call dword ptr [004012F4]
:004CF096 6685DB                  test bxbx
:004CF099 0F848B060000            je 004CF72A
                                  ====>不跳則OVER!


:004CF09F B90A000000              mov ecx, 0000000A
:004CF0A4 B804000280              mov eax, 80020004
:004CF0A9 894D80                  mov dword ptr [ebp-80], ecx
:004CF0AC 894D90                  mov dword ptr [ebp-70], ecx
:004CF0AF 894DA0                  mov dword ptr [ebp-60], ecx
:004CF0B2 8D9570FFFFFF            lea edxdword ptr [ebp+FFFFFF70]
:004CF0B8 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF0BB 894588                  mov dword ptr [ebp-78], eax
:004CF0BE 894598                  mov dword ptr [ebp-68], eax
:004CF0C1 8945A8                  mov dword ptr [ebp-58], eax

* Possible StringData Ref from Data Obj ->"[
Nw?lQ1Y%N& & "
                                  |
:004CF0C4 C78578FFFFFF200B4300    mov dword ptr [ebp+FFFFFF78], 00430B20
:004CF0CE C78570FFFFFF08000000    mov dword ptr [ebp+FFFFFF70], 00000008
:004CF0D8 FF1570124000            call dword ptr [00401270]
:004CF0DE 8D4D80                  lea ecxdword ptr [ebp-80]
:004CF0E1 8D5590                  lea edxdword ptr [ebp-70]
:004CF0E4 51                      push ecx
:004CF0E5 8D45A0                  lea eaxdword ptr [ebp-60]
:004CF0E8 52                      push edx
:004CF0E9 50                      push eax
:004CF0EA 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF0ED 6A00                    push 00000000
:004CF0EF 51                      push ecx
:004CF0F0 FF15C0104000            call dword ptr [004010C0]
                                  ====>BAD BOY!            ~@~ ~@~


…… ……省略…… ……


                                  ====>下面是寫標誌入登錄檔!
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF099(C)
|
:004CF72A A134A05000              mov eaxdword ptr [0050A034]
:004CF72F 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF732 2DA2010000              sub eax, 000001A2
:004CF737 8D55A0                  lea edxdword ptr [ebp-60]
:004CF73A 51                      push ecx
:004CF73B 52                      push edx
:004CF73C 0F80AE010000            jo 004CF8F0
:004CF742 8945B8                  mov dword ptr [ebp-48], eax
:004CF745 C745B003000000          mov [ebp-50], 00000003
:004CF74C FF157C124000            call dword ptr [0040127C]
:004CF752 8D45A0                  lea eaxdword ptr [ebp-60]
:004CF755 8D4D90                  lea ecxdword ptr [ebp-70]
:004CF758 50                      push eax
:004CF759 51                      push ecx
:004CF75A FF15F0104000            call dword ptr [004010F0]
:004CF760 8D5590                  lea edxdword ptr [ebp-70]
:004CF763 52                      push edx
:004CF764 FF1544104000            call dword ptr [00401044]
:004CF76A 8BD0                    mov edxeax
:004CF76C 8D4DE0                  lea ecxdword ptr [ebp-20]
:004CF76F FF15AC124000            call dword ptr [004012AC]
:004CF775 8B1D50104000            mov ebxdword ptr [00401050]
:004CF77B 8D4590                  lea eaxdword ptr [ebp-70]
:004CF77E 8D4DA0                  lea ecxdword ptr [ebp-60]
:004CF781 50                      push eax
:004CF782 8D55B0                  lea edxdword ptr [ebp-50]
:004CF785 51                      push ecx
:004CF786 52                      push edx
:004CF787 6A03                    push 00000003
:004CF789 FFD3                    call ebx
:004CF78B 8B45E0                  mov eaxdword ptr [ebp-20]
:004CF78E 83C410                  add esp, 00000010

* Possible StringData Ref from Data Obj ->"bbgdcikjynnfexsupmhnjd8omg9984h90mjg449tblo9i6"
                                        ->"fgjk7643du09mjy756gj9jng76uhvyt87jngre47hb44f6"
                                        ->"ghjufddfgtwfsdsxyytudfb9lghrffku45fc87j5hv84sw"
                                        ->"vh745fgdfdwfjkhr2387hbkiu5rdf"
                                  |
:004CF791 68A0A04200              push 0042A0A0
:004CF796 50                      push eax

* Possible StringData Ref from Data Obj ->"ttoolstimework"
                                  |
:004CF797 68C0E24200              push 0042E2C0

* Possible StringData Ref from Data Obj ->"ttoolbox"
                                  |
:004CF79C 6820A24200              push 0042A220
:004CF7A1 FF1514104000            call dword ptr [00401014]
:004CF7A7 8B0E                    mov ecxdword ptr [esi]
:004CF7A9 56                      push esi
:004CF7AA FF9110030000            call dword ptr [ecx+00000310]
:004CF7B0 8D55C4                  lea edxdword ptr [ebp-3C]
:004CF7B3 50                      push eax
:004CF7B4 52                      push edx
:004CF7B5 FFD7                    call edi
:004CF7B7 8BF0                    mov esieax

* Possible StringData Ref from Data Obj ->"bRlQ[k"
                                  |
:004CF7B9 68D80C4300              push 00430CD8
:004CF7BE 56                      push esi
:004CF7BF 8B06                    mov eaxdword ptr [esi]
:004CF7C1 FF90A4000000            call dword ptr [eax+000000A4]
:004CF7C7 85C0                    test eaxeax
:004CF7C9 DBE2                    fclex
:004CF7CB 7D12                    jge 004CF7DF
:004CF7CD 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"N?3f?? "
                                  |
:004CF7D2 68E4B94200              push 0042B9E4
:004CF7D7 56                      push esi
:004CF7D8 50                      push eax
:004CF7D9 FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF7CB(C)
|
:004CF7DF 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CF7E2 FF15F4124000            call dword ptr [004012F4]
:004CF7E8 8B3570124000            mov esidword ptr [00401270]
:004CF7EE B904000280              mov ecx, 80020004
:004CF7F3 894D88                  mov dword ptr [ebp-78], ecx
:004CF7F6 B80A000000              mov eax, 0000000A
:004CF7FB 894D98                  mov dword ptr [ebp-68], ecx
:004CF7FE BF08000000              mov edi, 00000008
:004CF803 8D9560FFFFFF            lea edxdword ptr [ebp+FFFFFF60]
:004CF809 8D4DA0                  lea ecxdword ptr [ebp-60]
:004CF80C 894580                  mov dword ptr [ebp-80], eax
:004CF80F 894590                  mov dword ptr [ebp-70], eax

* Possible StringData Ref from Data Obj ->"oNlQ"
                                  |
:004CF812 C78568FFFFFF3C0B4300    mov dword ptr [ebp+FFFFFF68], 00430B3C
:004CF81C 89BD60FFFFFF            mov dword ptr [ebp+FFFFFF60], edi
:004CF822 FFD6                    call esi
:004CF824 8D9570FFFFFF            lea edxdword ptr [ebp+FFFFFF70]
:004CF82A 8D4DB0                  lea ecxdword ptr [ebp-50]

* Possible StringData Ref from Data Obj ->"m`U` lQbRe/TR
0sLr~]wQ~T"
                                        ->"{ 0& & "
                                  |
:004CF82D C78578FFFFFFEC0C4300    mov dword ptr [ebp+FFFFFF78], 00430CEC
:004CF837 89BD70FFFFFF            mov dword ptr [ebp+FFFFFF70], edi
:004CF83D FFD6                    call esi
:004CF83F 8D4D80                  lea ecxdword ptr [ebp-80]
:004CF842 8D5590                  lea edxdword ptr [ebp-70]
:004CF845 51                      push ecx
:004CF846 8D45A0                  lea eaxdword ptr [ebp-60]
:004CF849 52                      push edx
:004CF84A 50                      push eax
:004CF84B 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF84E 6A00                    push 00000000
:004CF850 51                      push ecx
:004CF851 FF15C0104000            call dword ptr [004010C0]
                                  ====>呵呵,勝利女神!     ^O^ ^O^



――――――――――――――――――――――――――――――――― 
【完 美  爆 破】:


004CF082 F7DB                    neg ebx
  改為: 33DB                    xor ebxebx  
               

――――――――――――――――――――――――――――――――― 
【註冊資訊儲存】:


REGEDIT4

[HKEY_CURRENT_USERSoftwareVB and VBA Program Settings  oolbox  oolstimework]
"loadcounts"="6357836"       ====>試用次數
"soft"="57048"               ====>我的註冊標誌
"56630"="bgdcikjynnfexsupmhnjd8omg9984h90mjg449tblo9i6fgjk7643du09mjy756gj9jng76uhvyt87jngre47hb44f6ghjufddfgtwfsdsxyytudfb9lghrffku45fc87j5hv84swvh745fgdfdwfjkhr2387hbkiu5rdf"


其實試用次數還儲存在D盤下的 readfile.sys 檔案中      ^O^ ^O^


―――――――――――――――――――――――――――――――――
    
                                
         ,     _/ 
        /| _.-~/            _     ,        青春都一餉
       ( /~   /              ~-._ |
       `\  _/                   ~ )          忍把浮名 
   _-~~~-.)  )__/;;,.          _  //'
  /'_,   --~    ~~~-  ,;;___(  (.-~~~-.        換了破解輕狂
 `~ _( ,_..-- (     ,;'' /    ~--   /._` 
  /~~//'   /' `~         ) /--.._, )_  `~
  "  `~"  "      `"      /~'`    `\~~   
                         "     "   "~'  ""

    

                    Cracked By 巢水工作坊――fly [OCN][FCG]

                           2003-06-14  02:00

相關文章