Registry Crawler 4.0.0.3破解
Crack by fwnl
版本:Registry Crawler4.0.0.3 炎之川汉化版
软件说明:Registry Crawler 是强大的用户和开发者快速定位并配置注册表的工具软
件。一个强大的搜索引擎允许你基于搜索标准查找注册信息。允许你单击超链
接显示条目。支持书签功能,可在注册表中的任何键中添加书签并直接从系统
托盘读取。此特征允许你访问你经常存取的注册键而无需手工打开 REGEDIT。
每天需要操作注册表的用户会发现 Registry Crawler 是一个节约时间的工具。
官方主页: http://www.4dev.com
汉化补丁: http://www.hanzify.org/skipli/chinese/
HAC-RCrawler4003-Fire.zip (460k)
破解工具:TRW2000
trw2000载入程序后,填入注册码(用户名不能少于8位),Ctrl+N然后 bpx hmemcpy. f12数下来到
:0040B040 E8ABFCFFFF call 0040ACF0
//关键,F8进入
:0040B045 85C0
test eax, eax
:0040B047 0F849D000000 je 0040B0EA
//一定不能跳
* Possible StringData Ref from Data Obj ->"Software\4Developers\RCrawler"
|
//进入40b040这个call后
* Referenced by a CALL at Addresses:
|:0040AAF3 , :0040B040
|
:0040ACF0 83EC24
sub esp, 00000024
:0040ACF3 83C9FF
or ecx, FFFFFFFF
:0040ACF6 33C0
xor eax, eax
:0040ACF8 55
push ebp
:0040ACF9 57
push edi
* Possible Reference to Dialog:
|
:0040ACFA BF10E54500 mov edi,
0045E510
:0040ACFF F2
repnz
:0040AD00 AE
scasb
:0040AD01 F7D1
not ecx
:0040AD03 49
dec ecx
:0040AD04 8BE9
mov ebp, ecx
:0040AD06 83FD08
cmp ebp, 00000008 //用户名不能小于8
:0040AD09 7D06
jge 0040AD11
:0040AD0B 5F
pop edi
:0040AD0C 5D
pop ebp
:0040AD0D 83C424
add esp, 00000024
:0040AD10 C3
ret
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040AD09(C)
|
:0040AD11 53
push ebx
:0040AD12 56
push esi
:0040AD13 6810E54500 push 0045E510
:0040AD18 E845D00100 call 00427D62
:0040AD1D B907000000 mov ecx,
00000007
:0040AD22 33C0
xor eax, eax
:0040AD24 8D7C2419 lea
edi, dword ptr [esp+19]
:0040AD28 C644241800 mov [esp+18],
00
:0040AD2D F3
repz
:0040AD2E AB
stosd
:0040AD2F 66AB
stosw
:0040AD31 83C404
add esp, 00000004
:0040AD34 AA
stosb
:0040AD35 8D442414 lea
eax, dword ptr [esp+14]
* Possible Reference to Dialog:
|
:0040AD39 68E48B4500 push 00458BE4
:0040AD3E 50
push eax
* Reference To: KERNEL32.lstrcpyA, Ord:0302h
|
:0040AD3F FF155C834400 Call dword ptr
[0044835C]
:0040AD45 33DB
xor ebx, ebx
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040ADFA(C)
|
* Possible StringData Ref from Data Obj ->"0123456789"
|
:0040AD47 8B35FC8A4500 mov esi, dword
ptr [00458AFC]
:0040AD4D 83C9FF
or ecx, FFFFFFFF
:0040AD50 8BFE
mov edi, esi
:0040AD52 33C0
xor eax, eax
:0040AD54 F2
repnz
:0040AD55 AE
scasb
:0040AD56 F7D1
not ecx
:0040AD58 49
dec ecx
:0040AD59 8BC3
mov eax, ebx
:0040AD5B 33D2
xor edx, edx
:0040AD5D 8BFE
mov edi, esi
:0040AD5F F7F1
div ecx
:0040AD61 8BC3
mov eax, ebx
:0040AD63 6A01
push 00000001
:0040AD65 0FBE0C32 movsx
ecx, byte ptr [edx+esi]
:0040AD69 33D2
xor edx, edx
:0040AD6B F7F5
div ebp
:0040AD6D 0FBE8210E54500 movsx eax, byte ptr
[edx+0045E510]
:0040AD74 8BD0
mov edx, eax
:0040AD76 C1E205
shl edx, 05
:0040AD79 03D0
add edx, eax
:0040AD7B 8D0450
lea eax, dword ptr [eax+2*edx]
:0040AD7E 03C8
add ecx, eax
:0040AD80 8BC3
mov eax, ebx
:0040AD82 0FAFC3
imul eax, ebx
:0040AD85 0FAFC3
imul eax, ebx
:0040AD88 0FAFC5
imul eax, ebp
:0040AD8B 8D1480
lea edx, dword ptr [eax+4*eax]
:0040AD8E 8D0450
lea eax, dword ptr [eax+2*edx]
:0040AD91 03C8
add ecx, eax
:0040AD93 33C0
xor eax, eax
:0040AD95 8BD1
mov edx, ecx
:0040AD97 83C9FF
or ecx, FFFFFFFF
:0040AD9A F2
repnz
:0040AD9B AE
scasb
:0040AD9C F7D1
not ecx
:0040AD9E 8BC2
mov eax, edx
:0040ADA0 49
dec ecx
:0040ADA1 33D2
xor edx, edx
:0040ADA3 F7F1
div ecx
:0040ADA5 8D442418 lea
eax, dword ptr [esp+18]
:0040ADA9 03D6
add edx, esi
:0040ADAB 52
push edx
:0040ADAC 50
push eax
:0040ADAD E82EEB0000 call 004198E0
:0040ADB2 83C40C
add esp, 0000000C
:0040ADB5 85DB
test ebx, ebx
:0040ADB7 743D
je 0040ADF6 //上面是一个循环,bpx 0040ADB7 按9下F5 d eax 就
可见真注册码了
:0040ADB9 8BC3
mov eax, ebx
:0040ADBB 33D2
xor edx, edx
:0040ADBD B903000000 mov ecx,
00000003
:0040ADC2 F7F1
div ecx
:0040ADC4 85D2
test edx, edx
:0040ADC6 752E
jne 0040ADF6
name: fwnlfwnl sn: 8267-2043-862-56
******
***
fwnl
***
**
2002.2.28
******** **** ** *** ****** **
长沙
** *** * ** ** **
**
*** ******* *** **
***
** ** ** ** ***
****
***
- 标 题:Registry Crawler 4.0.0.3破解 (6千字)
- 作 者:fwnl
- 时 间:2002-2-28 12:02:49
- 链 接:http://bbs.pediy.com