網路校驗――王牌超級工具組合箱 V3.4 (VB)
網路校驗――王牌超級工具組合箱 V3.4 (VB)
下載頁面: http://www.skycn.com/soft/10097.html
軟體大小: 2926 KB
軟體語言: 簡體中文
軟體類別: 國產軟體 / 共享版 / 雜類工具
應用平臺: Win9x/NT/2000/XP
加入時間: 2003-06-08 17:16:41
下載次數: 30750
推薦等級: ***
開 發 商: http://kinger.nease.net/
【軟體簡介】:《王牌超級工具組合箱》精選組合了當今電腦使用者最常用最實用的工具軟體於一身,從此您無須再東奔西跑地到處去搜尋工具軟體,或者總為重新裝機而煩惱……在《王牌超級工具組合箱》中,(1)“家庭影院”整合了VCD、CD、MP3、MIDI、Flash影院等多種媒體播放器;(2)“超級瀏覽器”更是整合了圖片瀏覽器 、多文字瀏覽器、多Web文件瀏覽器、字型瀏覽器、資源瀏覽器等;(3)“數學手冊”整合有科學計算器 、高等數學積分表、物理常數表、化學元素週期表;(4)“實用工具”中內建了電子日記、二十四節氣、電腦復讀機、懸浮式剪貼簿、自制螢幕保護程式、修改啟動畫面、五筆打字專家、修改檔案型別、IE保護器、登錄檔編輯器、密碼管理專家、本機IP地址等;(5)“通訊助理”內建了全國郵政編碼 、國內國際長途電話區號、電話撥號程式、來電顯示、錄音電話、影片電話、通訊錄、十二生肖、 手機簡訊等;(6)“時間機器”整合了萬年曆、上網計時、定時關機、 整點報時、定時提醒、生日筵會提醒等;(7) “成批執行”包括軟體成批壓縮/解壓縮、檔案成批改名、郵件群發器;(“網上搜尋九國” 能夠從十個‘搜尋引擎’中同時同步地搜尋關鍵詞的功能。
【軟體限制】:NAG、50次試用、功能限制
【作者宣告】:初學Crack,只是感興趣,沒有其它目的。失誤之處敬請諸位大俠賜教!
【破解工具】:TRW2000娃娃修改版、Ollydbg1.09、PEiD、Guw32、W32Dasm 9.0白金版
―――――――――――――――――――――――――――――――――
【過 程】:
這個東東是網路驗證,不填註冊碼,註冊後作者“會為你建立一個遠端資料庫,使你自動註冊成功”。可以說這種驗證方式是比較好的,限制了破解,沒有序號產生器了。但是我簡單試了試,發現作者並沒有最佳利用這種驗證方式,改一個返回值程式就註冊成功了,爆破後的版本連網後也沒有發現問題。
Toolsbox.exe 是 UPX 0.89.6-1.02 殼,用Guw32脫之。262K->1.53M。 VB 5.0 編寫。
序列號:892343567
試煉碼:不需要 ^O^ ^O^
―――――――――――――――――――――――――――――――――
:004CEE0D C78578FFFFFF440A4300 mov dword ptr [ebp+FFFFFF78], 00430A44
:004CEE17 C78570FFFFFF08000000 mov dword ptr [ebp+FFFFFF70], 00000008
:004CEE21 FFD3 call ebx
:004CEE23 8D4580 lea eax, dword ptr [ebp-80]
:004CEE26 8D4D90 lea ecx, dword ptr [ebp-70]
:004CEE29 50 push eax
:004CEE2A 8D55A0 lea edx, dword ptr [ebp-60]
:004CEE2D 51 push ecx
:004CEE2E 52 push edx
:004CEE2F 8D45B0 lea eax, dword ptr [ebp-50]
:004CEE32 6A01 push 00000001
:004CEE34 50 push eax
:004CEE35 FF15C0104000 call dword ptr [004010C0]
====>確認網路連線的對話
:004CEE3B 8BC8 mov ecx, eax
:004CEE3D FF1548114000 call dword ptr [00401148]
:004CEE43 8D4D80 lea ecx, dword ptr [ebp-80]
:004CEE46 8BD8 mov ebx, eax
:004CEE48 8D5590 lea edx, dword ptr [ebp-70]
:004CEE4B 51 push ecx
:004CEE4C 8D45A0 lea eax, dword ptr [ebp-60]
:004CEE4F 52 push edx
:004CEE50 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CEE53 50 push eax
:004CEE54 51 push ecx
:004CEE55 6A04 push 00000004
:004CEE57 FF1550104000 call dword ptr [00401050]
:004CEE5D 8B16 mov edx, dword ptr [esi]
:004CEE5F 83C414 add esp, 00000014
:004CEE62 6683FB02 cmp bx, 0002
:004CEE66 56 push esi
:004CEE67 7543 jne 004CEEAC
:004CEE69 FF9210030000 call dword ptr [edx+00000310]
:004CEE6F 50 push eax
:004CEE70 8D45C4 lea eax, dword ptr [ebp-3C]
:004CEE73 50 push eax
:004CEE74 FFD7 call edi
:004CEE76 8BF0 mov esi, eax
* Possible StringData Ref from Data Obj ->" ?
:004CEE78 68980A4300 push 00430A98
:004CEE7D 56 push esi
:004CEE7E 8B0E mov ecx, dword ptr [esi]
:004CEE80 FF91A4000000 call dword ptr [ecx+000000A4]
:004CEE86 85C0 test eax, eax
:004CEE88 DBE2 fclex
:004CEE8A 7D12 jge 004CEE9E
:004CEE8C 68A4000000 push 000000A4
* Possible StringData Ref from Data Obj ->"N?3f??
"
|
:004CEE91 68E4B94200 push 0042B9E4
:004CEE96 56 push esi
:004CEE97 50 push eax
:004CEE98 FF158C104000 call dword ptr [0040108C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEE8A(C)
|
:004CEE9E 8D4DC4 lea ecx, dword ptr [ebp-3C]
:004CEEA1 FF15F4124000 call dword ptr [004012F4]
:004CEEA7 E9C2090000 jmp 004CF86E
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEE67(C)
|
:004CEEAC FF9210030000 call dword ptr [edx+00000310]
:004CEEB2 50 push eax
:004CEEB3 8D45C4 lea eax, dword ptr [ebp-3C]
:004CEEB6 50 push eax
:004CEEB7 FFD7 call edi
:004CEEB9 8BD8 mov ebx, eax
:004CEEBB 68FC0A4300 push 00430AFC
:004CEEC0 53 push ebx
:004CEEC1 8B0B mov ecx, dword ptr [ebx]
:004CEEC3 FF91A4000000 call dword ptr [ecx+000000A4]
:004CEEC9 85C0 test eax, eax
:004CEECB DBE2 fclex
:004CEECD 7D12 jge 004CEEE1
:004CEECF 68A4000000 push 000000A4
* Possible StringData Ref from Data Obj ->"N?3f??
"
|
:004CEED4 68E4B94200 push 0042B9E4
:004CEED9 53 push ebx
:004CEEDA 50 push eax
:004CEEDB FF158C104000 call dword ptr [0040108C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEECD(C)
|
:004CEEE1 8D4DC4 lea ecx, dword ptr [ebp-3C]
:004CEEE4 FF15F4124000 call dword ptr [004012F4]
:004CEEEA 8B16 mov edx, dword ptr [esi]
:004CEEEC 6A0B push 0000000B
:004CEEEE 56 push esi
:004CEEEF FF92A4000000 call dword ptr [edx+000000A4]
:004CEEF5 85C0 test eax, eax
:004CEEF7 DBE2 fclex
:004CEEF9 7D12 jge 004CEF0D
:004CEEFB 68A4000000 push 000000A4
* Possible StringData Ref from Data Obj ->"`m瞼??,"
|
:004CEF00 6870B44200 push 0042B470
:004CEF05 56 push esi
:004CEF06 50 push eax
:004CEF07 FF158C104000 call dword ptr [0040108C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEEF9(C)
|
:004CEF0D 83EC10 sub esp, 00000010
:004CEF10 B908000000 mov ecx, 00000008
:004CEF15 8BDC mov ebx, esp
:004CEF17 898D70FFFFFF mov dword ptr [ebp+FFFFFF70], ecx
* Possible StringData Ref from Data Obj ->"hhttp://kinger.nease.net/use"
|
:004CEF1D B850E24200 mov eax, 0042E250
====>註冊頁面
:004CEF22 83EC10 sub esp, 00000010
:004CEF25 890B mov dword ptr [ebx], ecx
:004CEF27 8B8D74FFFFFF mov ecx, dword ptr [ebp+FFFFFF74]
:004CEF2D 898578FFFFFF mov dword ptr [ebp+FFFFFF78], eax
:004CEF33 33D2 xor edx, edx
:004CEF35 894B04 mov dword ptr [ebx+04], ecx
:004CEF38 8BCC mov ecx, esp
:004CEF3A 6A02 push 00000002
:004CEF3C 6A16 push 00000016
:004CEF3E 894308 mov dword ptr [ebx+08], eax
:004CEF41 8B857CFFFFFF mov eax, dword ptr [ebp+FFFFFF7C]
:004CEF47 56 push esi
:004CEF48 89430C mov dword ptr [ebx+0C], eax
:004CEF4B B803000000 mov eax, 00000003
:004CEF50 8901 mov dword ptr [ecx], eax
:004CEF52 8B8554FFFFFF mov eax, dword ptr [ebp+FFFFFF54]
:004CEF58 894104 mov dword ptr [ecx+04], eax
:004CEF5B 8B06 mov eax, dword ptr [esi]
:004CEF5D 895108 mov dword ptr [ecx+08], edx
:004CEF60 8B955CFFFFFF mov edx, dword ptr [ebp+FFFFFF5C]
:004CEF66 89510C mov dword ptr [ecx+0C], edx
:004CEF69 FF9020030000 call dword ptr [eax+00000320]
:004CEF6F 8D4DC4 lea ecx, dword ptr [ebp-3C]
:004CEF72 50 push eax
:004CEF73 51 push ecx
:004CEF74 FFD7 call edi
:004CEF76 8D55B0 lea edx, dword ptr [ebp-50]
:004CEF79 50 push eax
:004CEF7A 52 push edx
:004CEF7B FF156C114000 call dword ptr [0040116C]
:004CEF81 83C430 add esp, 00000030
:004CEF84 50 push eax
:004CEF85 FF1544104000 call dword ptr [00401044]
:004CEF8B 8B1DAC124000 mov ebx, dword ptr [004012AC]
:004CEF91 8BD0 mov edx, eax
:004CEF93 8D4DDC lea ecx, dword ptr [ebp-24]
:004CEF96 FFD3 call ebx
:004CEF98 8D4DC4 lea ecx, dword ptr [ebp-3C]
:004CEF9B FF15F4124000 call dword ptr [004012F4]
:004CEFA1 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CEFA4 FF1538104000 call dword ptr [00401038]
:004CEFAA 8D45DC lea eax, dword ptr [ebp-24]
:004CEFAD 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CEFB0 50 push eax
:004CEFB1 51 push ecx
:004CEFB2 E879A90000 call 004D9930
:004CEFB7 8D55B0 lea edx, dword ptr [ebp-50]
:004CEFBA 52 push edx
:004CEFBB FF1544104000 call dword ptr [00401044]
:004CEFC1 8BD0 mov edx, eax
:004CEFC3 8D4DDC lea ecx, dword ptr [ebp-24]
:004CEFC6 FFD3 call ebx
:004CEFC8 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CEFCB FF1538104000 call dword ptr [00401038]
:004CEFD1 8B06 mov eax, dword ptr [esi]
:004CEFD3 6A00 push 00000000
:004CEFD5 56 push esi
:004CEFD6 FF90A4000000 call dword ptr [eax+000000A4]
:004CEFDC 85C0 test eax, eax
:004CEFDE DBE2 fclex
:004CEFE0 7D12 jge 004CEFF4
:004CEFE2 68A4000000 push 000000A4
* Possible StringData Ref from Data Obj ->"`m瞼??,"
|
:004CEFE7 6870B44200 push 0042B470
:004CEFEC 56 push esi
:004CEFED 50 push eax
:004CEFEE FF158C104000 call dword ptr [0040108C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEFE0(C)
|
:004CEFF4 8B0E mov ecx, dword ptr [esi]
:004CEFF6 56 push esi
:004CEFF7 FF9104030000 call dword ptr [ecx+00000304]
:004CEFFD 8D55C4 lea edx, dword ptr [ebp-3C]
:004CF000 50 push eax
:004CF001 52 push edx
:004CF002 FFD7 call edi
:004CF004 8B08 mov ecx, dword ptr [eax]
:004CF006 8D55D4 lea edx, dword ptr [ebp-2C]
:004CF009 52 push edx
:004CF00A 50 push eax
:004CF00B 89853CFFFFFF mov dword ptr [ebp+FFFFFF3C], eax
:004CF011 FF91A0000000 call dword ptr [ecx+000000A0]
:004CF017 85C0 test eax, eax
:004CF019 DBE2 fclex
:004CF01B 7D18 jge 004CF035
:004CF01D 8B8D3CFFFFFF mov ecx, dword ptr [ebp+FFFFFF3C]
:004CF023 68A0000000 push 000000A0
* Possible StringData Ref from Data Obj ->"N?3f??
"
|
:004CF028 68E4B94200 push 0042B9E4
:004CF02D 51 push ecx
:004CF02E 50 push eax
:004CF02F FF158C104000 call dword ptr [0040108C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF01B(C)
|
:004CF035 8B55DC mov edx, dword ptr [ebp-24]
:004CF038 8B45D4 mov eax, dword ptr [ebp-2C]
====>EAX=892343567 機器碼
:004CF03B 6A01 push 00000001
:004CF03D 52 push edx
* Possible StringData Ref from Data Obj ->",,"
|
:004CF03E 688CE24200 push 0042E28C
:004CF043 50 push eax
:004CF044 FF156C104000 call dword ptr [0040106C]
====>連線,
:004CF04A 8BD0 mov edx, eax
====>EDX=,892343567
:004CF04C 8D4DD0 lea ecx, dword ptr [ebp-30]
:004CF04F FFD3 call ebx
:004CF051 50 push eax
* Possible StringData Ref from Data Obj ->",,"
|
:004CF052 688CE24200 push 0042E28C
:004CF057 FF156C104000 call dword ptr [0040106C]
====>連線,
:004CF05D 8BD0 mov edx, eax
====>EDX=,892343567,
:004CF05F 8D4DCC lea ecx, dword ptr [ebp-34]
:004CF062 FFD3 call ebx
:004CF064 50 push eax
:004CF065 6A00 push 00000000
:004CF067 FF1508124000 call dword ptr [00401208]
====>這裡估計就是連網校驗了!
:004CF06D 8BD8 mov ebx, eax
====>這是返回值!
:004CF06F 8D4DCC lea ecx, dword ptr [ebp-34]
:004CF072 F7DB neg ebx
:004CF074 8D55D0 lea edx, dword ptr [ebp-30]
:004CF077 51 push ecx
:004CF078 1BDB sbb ebx, ebx
:004CF07A 8D45D4 lea eax, dword ptr [ebp-2C]
:004CF07D 52 push edx
:004CF07E 43 inc ebx
:004CF07F 50 push eax
:004CF080 6A03 push 00000003
:004CF082 F7DB neg ebx
====>爆破點!
:004CF084 FF152C124000 call dword ptr [0040122C]
:004CF08A 83C410 add esp, 00000010
:004CF08D 8D4DC4 lea ecx, dword ptr [ebp-3C]
:004CF090 FF15F4124000 call dword ptr [004012F4]
:004CF096 6685DB test bx, bx
:004CF099 0F848B060000 je 004CF72A
====>不跳則OVER!
:004CF09F B90A000000 mov ecx, 0000000A
:004CF0A4 B804000280 mov eax, 80020004
:004CF0A9 894D80 mov dword ptr [ebp-80], ecx
:004CF0AC 894D90 mov dword ptr [ebp-70], ecx
:004CF0AF 894DA0 mov dword ptr [ebp-60], ecx
:004CF0B2 8D9570FFFFFF lea edx, dword ptr [ebp+FFFFFF70]
:004CF0B8 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CF0BB 894588 mov dword ptr [ebp-78], eax
:004CF0BE 894598 mov dword ptr [ebp-68], eax
:004CF0C1 8945A8 mov dword ptr [ebp-58], eax
* Possible StringData Ref from Data Obj ->"[
Nw?lQ1Y%N& & "
|
:004CF0C4 C78578FFFFFF200B4300 mov dword ptr [ebp+FFFFFF78], 00430B20
:004CF0CE C78570FFFFFF08000000 mov dword ptr [ebp+FFFFFF70], 00000008
:004CF0D8 FF1570124000 call dword ptr [00401270]
:004CF0DE 8D4D80 lea ecx, dword ptr [ebp-80]
:004CF0E1 8D5590 lea edx, dword ptr [ebp-70]
:004CF0E4 51 push ecx
:004CF0E5 8D45A0 lea eax, dword ptr [ebp-60]
:004CF0E8 52 push edx
:004CF0E9 50 push eax
:004CF0EA 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CF0ED 6A00 push 00000000
:004CF0EF 51 push ecx
:004CF0F0 FF15C0104000 call dword ptr [004010C0]
====>BAD BOY! ~@~ ~@~
…… ……省略…… ……
====>下面是寫標誌入登錄檔!
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF099(C)
|
:004CF72A A134A05000 mov eax, dword ptr [0050A034]
:004CF72F 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CF732 2DA2010000 sub eax, 000001A2
:004CF737 8D55A0 lea edx, dword ptr [ebp-60]
:004CF73A 51 push ecx
:004CF73B 52 push edx
:004CF73C 0F80AE010000 jo 004CF8F0
:004CF742 8945B8 mov dword ptr [ebp-48], eax
:004CF745 C745B003000000 mov [ebp-50], 00000003
:004CF74C FF157C124000 call dword ptr [0040127C]
:004CF752 8D45A0 lea eax, dword ptr [ebp-60]
:004CF755 8D4D90 lea ecx, dword ptr [ebp-70]
:004CF758 50 push eax
:004CF759 51 push ecx
:004CF75A FF15F0104000 call dword ptr [004010F0]
:004CF760 8D5590 lea edx, dword ptr [ebp-70]
:004CF763 52 push edx
:004CF764 FF1544104000 call dword ptr [00401044]
:004CF76A 8BD0 mov edx, eax
:004CF76C 8D4DE0 lea ecx, dword ptr [ebp-20]
:004CF76F FF15AC124000 call dword ptr [004012AC]
:004CF775 8B1D50104000 mov ebx, dword ptr [00401050]
:004CF77B 8D4590 lea eax, dword ptr [ebp-70]
:004CF77E 8D4DA0 lea ecx, dword ptr [ebp-60]
:004CF781 50 push eax
:004CF782 8D55B0 lea edx, dword ptr [ebp-50]
:004CF785 51 push ecx
:004CF786 52 push edx
:004CF787 6A03 push 00000003
:004CF789 FFD3 call ebx
:004CF78B 8B45E0 mov eax, dword ptr [ebp-20]
:004CF78E 83C410 add esp, 00000010
* Possible StringData Ref from Data Obj ->"bbgdcikjynnfexsupmhnjd8omg9984h90mjg449tblo9i6"
->"fgjk7643du09mjy756gj9jng76uhvyt87jngre47hb44f6"
->"ghjufddfgtwfsdsxyytudfb9lghrffku45fc87j5hv84sw"
->"vh745fgdfdwfjkhr2387hbkiu5rdf"
|
:004CF791 68A0A04200 push 0042A0A0
:004CF796 50 push eax
* Possible StringData Ref from Data Obj ->"ttoolstimework"
|
:004CF797 68C0E24200 push 0042E2C0
* Possible StringData Ref from Data Obj ->"ttoolbox"
|
:004CF79C 6820A24200 push 0042A220
:004CF7A1 FF1514104000 call dword ptr [00401014]
:004CF7A7 8B0E mov ecx, dword ptr [esi]
:004CF7A9 56 push esi
:004CF7AA FF9110030000 call dword ptr [ecx+00000310]
:004CF7B0 8D55C4 lea edx, dword ptr [ebp-3C]
:004CF7B3 50 push eax
:004CF7B4 52 push edx
:004CF7B5 FFD7 call edi
:004CF7B7 8BF0 mov esi, eax
* Possible StringData Ref from Data Obj ->"bRlQ[k"
|
:004CF7B9 68D80C4300 push 00430CD8
:004CF7BE 56 push esi
:004CF7BF 8B06 mov eax, dword ptr [esi]
:004CF7C1 FF90A4000000 call dword ptr [eax+000000A4]
:004CF7C7 85C0 test eax, eax
:004CF7C9 DBE2 fclex
:004CF7CB 7D12 jge 004CF7DF
:004CF7CD 68A4000000 push 000000A4
* Possible StringData Ref from Data Obj ->"N?3f??
"
|
:004CF7D2 68E4B94200 push 0042B9E4
:004CF7D7 56 push esi
:004CF7D8 50 push eax
:004CF7D9 FF158C104000 call dword ptr [0040108C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF7CB(C)
|
:004CF7DF 8D4DC4 lea ecx, dword ptr [ebp-3C]
:004CF7E2 FF15F4124000 call dword ptr [004012F4]
:004CF7E8 8B3570124000 mov esi, dword ptr [00401270]
:004CF7EE B904000280 mov ecx, 80020004
:004CF7F3 894D88 mov dword ptr [ebp-78], ecx
:004CF7F6 B80A000000 mov eax, 0000000A
:004CF7FB 894D98 mov dword ptr [ebp-68], ecx
:004CF7FE BF08000000 mov edi, 00000008
:004CF803 8D9560FFFFFF lea edx, dword ptr [ebp+FFFFFF60]
:004CF809 8D4DA0 lea ecx, dword ptr [ebp-60]
:004CF80C 894580 mov dword ptr [ebp-80], eax
:004CF80F 894590 mov dword ptr [ebp-70], eax
* Possible StringData Ref from Data Obj ->"oNlQ"
|
:004CF812 C78568FFFFFF3C0B4300 mov dword ptr [ebp+FFFFFF68], 00430B3C
:004CF81C 89BD60FFFFFF mov dword ptr [ebp+FFFFFF60], edi
:004CF822 FFD6 call esi
:004CF824 8D9570FFFFFF lea edx, dword ptr [ebp+FFFFFF70]
:004CF82A 8D4DB0 lea ecx, dword ptr [ebp-50]
* Possible StringData Ref from Data Obj ->"m`U`
lQbRe/TR
0sLr~]wQ~T"
->"{
0& & "
|
:004CF82D C78578FFFFFFEC0C4300 mov dword ptr [ebp+FFFFFF78], 00430CEC
:004CF837 89BD70FFFFFF mov dword ptr [ebp+FFFFFF70], edi
:004CF83D FFD6 call esi
:004CF83F 8D4D80 lea ecx, dword ptr [ebp-80]
:004CF842 8D5590 lea edx, dword ptr [ebp-70]
:004CF845 51 push ecx
:004CF846 8D45A0 lea eax, dword ptr [ebp-60]
:004CF849 52 push edx
:004CF84A 50 push eax
:004CF84B 8D4DB0 lea ecx, dword ptr [ebp-50]
:004CF84E 6A00 push 00000000
:004CF850 51 push ecx
:004CF851 FF15C0104000 call dword ptr [004010C0]
====>呵呵,勝利女神! ^O^ ^O^
―――――――――――――――――――――――――――――――――
【完 美 爆 破】:
004CF082 F7DB neg ebx
改為: 33DB xor ebx, ebx
―――――――――――――――――――――――――――――――――
【註冊資訊儲存】:
REGEDIT4
[HKEY_CURRENT_USERSoftwareVB and VBA Program Settings oolbox oolstimework]
"loadcounts"="6357836" ====>試用次數
"soft"="57048" ====>我的註冊標誌
"56630"="bgdcikjynnfexsupmhnjd8omg9984h90mjg449tblo9i6fgjk7643du09mjy756gj9jng76uhvyt87jngre47hb44f6ghjufddfgtwfsdsxyytudfb9lghrffku45fc87j5hv84swvh745fgdfdwfjkhr2387hbkiu5rdf"
其實試用次數還儲存在D盤下的 readfile.sys 檔案中 ^O^ ^O^
―――――――――――――――――――――――――――――――――
, _/
/| _.-~/ _ , 青春都一餉
( /~ / ~-._ |
`\ _/ ~ ) 忍把浮名
_-~~~-.) )__/;;,. _ //'
/'_, --~ ~~~- ,;;___( (.-~~~-. 換了破解輕狂
`~ _( ,_..-- ( ,;'' / ~-- /._`
/~~//' /' `~ ) /--.._, )_ `~
" `~" " `" /~'` `\~~
" " "~' ""
Cracked By 巢水工作坊――fly [OCN][FCG]
2003-06-14 02:00
相關文章
- 郵箱地址校驗方法探究2024-05-16
- 分組校驗2024-04-01
- 十四、神經網路工具箱nn2024-10-29神經網路
- 求助:EXCEL,VB,實現 CRC16 校驗2020-12-01Excel
- springMVC:校驗框架:多規則校驗,巢狀校驗,分組校驗;ssm整合技術2021-03-25SpringMVC框架巢狀SSM
- Linux Netcat 命令—超級網路工具詳解2013-04-11Linux
- 超級網管員——網路管理2017-11-17
- 提升網際網路產品開發效率的5個工具組合2014-11-03
- SpringBoot分組校驗及自定義校驗註解2020-09-26Spring Boot
- 超級網管員——網路應用2017-11-08
- 超級網管員——網路裝置2017-11-16
- 【建議使用】告別if,Java超好用引數校驗工具類2021-12-19Java
- 關於網路傳輸MD5 校驗實驗2010-04-01
- 模糊神經網路工具箱函式使用2016-02-25神經網路函式
- 網路版“瑞士軍刀”!一個多功能的網路工具箱!2024-07-25
- 校企合作 | 華南農業大學-綠盟科技網路安全聯合實驗室正式揭牌2019-07-15
- Nok2phone的註冊演算法與網路校驗解除---VB程式關鍵處的快速定位2015-11-15演算法
- RAID群組和奇偶校驗群組(轉)2007-08-10AI
- 網路拓撲例項10:MSTP+VRRP組合組網2020-12-04VR
- Mac網路監測工具箱:Network Kit X2024-01-30Mac
- MATLAB的神經網路工具箱介紹2016-09-04Matlab神經網路
- MATLAB中神經網路工具箱的使用2017-03-24Matlab神經網路
- MATLAB神經網路工具箱使用介紹2024-06-20Matlab神經網路
- 超輕量程式碼實現欄位校驗工具庫(移動端)2018-02-10
- 網路管理經驗談:初級網管的網路安全2017-11-16
- VB 螢幕融化超級惡搞程式程式碼2013-07-01
- 校企合作| 福州理工學院攜手綠盟科技共建“網路空間安全聯合實驗室”2021-12-07
- 輕量級超級 css 工具2019-11-04CSS
- 計算機網路實驗4:鏈路層分析與組網2017-12-13計算機網路
- 校園網-真實的校園網路社群2019-05-11
- MATLAB神經網路工具箱(簡單操作介紹)2018-07-27Matlab神經網路
- 全網最佳IoT命令列超級工具箱|幫你輕鬆解決百萬物聯網裝置測試和聯調2023-04-03命令列
- 網路組建大全(包括企業網、校園網、網咖和基礎知識)(轉)2007-08-11
- 適合移動端的輕量級網路2018-10-24
- MATLAB神經網路工具箱(程式碼簡單實現)2018-07-27Matlab神經網路
- 12 個組織良好的網路監控工具2015-04-03
- 中國電信第二屆世界網際網路大會網路保障組合拳揭秘2015-12-11
- 網際網路前沿追蹤:治謠組合拳 靶向更精準2015-11-06