本来是想着用KEYMAKE来学着做注册机,就破了这个软件。可惜还是不行!只有另外再找了:《
软件:32bit Web Browser w9.37.01
下载地址:http://www.downme.com/index2.html
软件名称:32bit Web Browser w9.37.01
软件简介:是一个简单易用、快速小巧的浏览器。它使用了 IE 的内核,但速度比 IE 要快得多,是我见过的使用 IE 内核中速度最快的浏览器。它有自己的“智慧”书签,可以导入
IE 和 Netscape 的书签,带有多种搜索引擎。
操作系统:Windows 95/98/Me/NT/2000/XP 软件大小:297KB 软件分类:主页浏览
工具:trw2000
过程:
下命令:bpx hmemcpy
然后,bc *;
按 f12 ten times,then go to this address:
016F:00413748 6A51 PUSH
BYTE +51
016F:0041374A 68143A4700 PUSH DWORD 00473A14
016F:0041374F 6829040000 PUSH DWORD 0429
016F:00413754 B9A8314700 MOV ECX,004731A8
016F:00413759 E8C9FD0100 CALL 00433527
016F:0041375E A124564700 MOV EAX,[00475624]
016F:00413763 6A01 PUSH
BYTE +01
016F:00413765 68143A4700 PUSH DWORD 00473A14……取名字
016F:0041376A 50 PUSH
EAX……位数
016F:0041376B E8601A0000 CALL 004151D0
016F:00413770 8B2D04C54300 MOV EBP,[0043C504]
016F:00413776 83C40C ADD
ESP,BYTE +0C
016F:00413779 33DB XOR
EBX,EBX
016F:0041377B 83F801 CMP
EAX,BYTE +01
016F:0041377E 7465 JZ
004137E5……要跳!
016F:00413780 68EC894400 PUSH DWORD 004489EC
016F:00413785 68680E4500 PUSH DWORD 00450E68
016F:0041378A 68604B4700 PUSH DWORD 00474B60
016F:0041378F FFD5 CALL
EBP
016F:00413791 BFA4F94400 MOV EDI,0044F9A4
016F:00413796 83C9FF OR
ECX,BYTE -01
016F:00413799 33C0 XOR
EAX,EAX
016F:0041379B 881D403B4700 MOV [00473B40],BL
016F:004137A1 F2AE REPNE SCASB
016F:004137A3 F7D1 NOT
ECX
016F:004137A5 2BF9 SUB
EDI,ECX
016F:004137A7 6850F74400 PUSH DWORD 0044F750
016F:004137AC 8BD1 MOV
EDX,ECX
016F:004137AE 8BF7 MOV
ESI,EDI
016F:004137B0 BF503B4700 MOV EDI,00473B50
016F:004137B5 68143A4700 PUSH DWORD 00473A14
016F:004137BA C1E902 SHR
ECX,02
016F:004137BD F3A5 REP MOVSD
016F:004137BF 8BCA MOV
ECX,EDX
016F:004137C1 83E103 AND
ECX,BYTE +03
016F:004137C4 F3A4 REP MOVSB
016F:004137C6 E825FAFFFF CALL 004131F0
016F:004137CB A124564700 MOV EAX,[00475624]
016F:004137D0 6A01 PUSH
BYTE +01
016F:004137D2 68143A4700 PUSH DWORD 00473A14
016F:004137D7 50 PUSH
EAX
016F:004137D8 E8F3190000 CALL 004151D0
016F:004137DD 83C420 ADD
ESP,BYTE +20
016F:004137E0 83F801 CMP
EAX,BYTE +01
016F:004137E3 759B JNZ
00413780
016F:004137E5 6A51 PUSH
BYTE +51
016F:004137E7 6874534700 PUSH DWORD 00475374
016F:004137EC 682A040000 PUSH DWORD 042A
016F:004137F1 B9A8314700 MOV ECX,004731A8
016F:004137F6 E82CFD0100 CALL 00433527
016F:004137FB 8B0D24564700 MOV ECX,[00475624]……取邮件地址
016F:00413801 6A01 PUSH
BYTE +01
016F:00413803 6874534700 PUSH DWORD 00475374
016F:00413808 51 PUSH
ECX
016F:00413809 E8521A0000 CALL 00415260
016F:0041380E 83C40C ADD
ESP,BYTE +0C
016F:00413811 83F801 CMP
EAX,BYTE +01
016F:00413814 7465 JZ
0041387B……要跳!
016F:00413816 68EC894400 PUSH DWORD 004489EC
016F:0041381B 682C0E4500 PUSH DWORD 00450E2C
016F:00413820 68604B4700 PUSH DWORD 00474B60
016F:00413825 FFD5 CALL
EBP
016F:00413827 BFA4F94400 MOV EDI,0044F9A4
016F:0041382C 83C9FF OR
ECX,BYTE -01
016F:0041382F 33C0 XOR
EAX,EAX
016F:00413831 881D403B4700 MOV [00473B40],BL
016F:00413837 F2AE REPNE SCASB
016F:00413839 F7D1 NOT
ECX
016F:0041383B 2BF9 SUB
EDI,ECX
016F:0041383D 6878F84400 PUSH DWORD 0044F878
016F:00413842 8BD1 MOV
EDX,ECX
016F:00413844 8BF7 MOV
ESI,EDI
016F:00413846 BF503B4700 MOV EDI,00473B50
016F:0041384B 6874534700 PUSH DWORD 00475374
016F:00413850 C1E902 SHR
ECX,02
016F:00413853 F3A5 REP MOVSD
016F:00413855 8BCA MOV
ECX,EDX
016F:00413857 83E103 AND
ECX,BYTE +03
016F:0041385A F3A4 REP MOVSB
016F:0041385C E88FF9FFFF CALL 004131F0
016F:00413861 A124564700 MOV EAX,[00475624]
016F:00413866 6A01 PUSH
BYTE +01
016F:00413868 6874534700 PUSH DWORD 00475374
016F:0041386D 50 PUSH
EAX
016F:0041386E E8ED190000 CALL 00415260
016F:00413873 83C420 ADD
ESP,BYTE +20
016F:00413876 83F801 CMP
EAX,BYTE +01
016F:00413879 759B JNZ
00413816
016F:0041387B 53 PUSH
EBX
016F:0041387C 6A01 PUSH
BYTE +01
016F:0041387E E80DE9FFFF CALL 00412190
016F:00413883 83C408 ADD
ESP,BYTE +08
016F:00413886 B908000000 MOV ECX,08
016F:0041388B 33C0 XOR
EAX,EAX
016F:0041388D BF08524700 MOV EDI,00475208
……注册码取反
016F:00413892 F3AB REP STOSD
016F:00413894 6A20 PUSH
BYTE +20
016F:00413896 6808524700 PUSH DWORD 00475208
016F:0041389B 6828040000 PUSH DWORD 0428
016F:004138A0 B9A8314700 MOV ECX,004731A8
016F:004138A5 E87DFC0100 CALL 00433527……调用注册码
016F:004138AA B940000000 MOV ECX,40
016F:004138AF 33C0 XOR
EAX,EAX
016F:004138B1 BFE84C4700 MOV EDI,00474CE8……d
00474ce8 得注册码!
016F:004138B6 68E84C4700 PUSH DWORD 00474CE8
016F:004138BB 68EC894400 PUSH DWORD 004489EC
016F:004138C0 68143A4700 PUSH DWORD 00473A14
016F:004138C5 F3AB REP STOSD
016F:004138C7 E894EBFFFF CALL 00412460
016F:004138CC 68E84C4700 PUSH DWORD 00474CE8
016F:004138D1 E84AEBFFFF CALL 00412420
016F:004138D6 6808524700 PUSH DWORD 00475208
016F:004138DB E840EBFFFF CALL 00412420
016F:004138E0 BFE84C4700 MOV EDI,00474CE8
016F:004138E5 83C9FF OR
ECX,BYTE -01
016F:004138E8 33C0 XOR
EAX,EAX
016F:004138EA 83C414 ADD
ESP,BYTE +14
016F:004138ED F2AE REPNE SCASB
016F:004138EF F7D1 NOT
ECX
016F:004138F1 49 DEC
ECX
016F:004138F2 BFE84C4700 MOV EDI,00474CE8
016F:004138F7 BE08524700 MOV ESI,00475208
016F:004138FC 33D2 XOR
EDX,EDX
016F:004138FE F3A6 REPE CMPSB
016F:00413900 5D POP
EBP
016F:00413901 0F85B2000000 JNZ NEAR 004139B9……此处不能跳!
016F:00413907 BFE84C4700 MOV EDI,00474CE8
016F:0041390C 83C9FF OR
ECX,BYTE -01
016F:0041390F F2AE REPNE SCASB
016F:00413911 F7D1 NOT
ECX
016F:00413913 49 DEC
ECX
016F:00413914 BF08524700 MOV EDI,00475208
016F:00413919 8BD1 MOV
EDX,ECX
016F:0041391B 83C9FF OR
ECX,BYTE -01
016F:0041391E F2AE REPNE SCASB
016F:00413920 F7D1 NOT
ECX
016F:00413922 49 DEC
ECX
016F:00413923 3BCA CMP
ECX,EDX……比较注册码位数是否为12
016F:00413925 0F858E000000 JNZ NEAR 004139B9……否则跳转!
016F:0041392B BF08524700 MOV EDI,00475208
016F:00413930 83C9FF OR
ECX,BYTE -01
016F:00413933 F2AE REPNE SCASB
016F:00413935 F7D1 NOT
ECX
016F:00413937 2BF9 SUB
EDI,ECX
016F:00413939 68F0884400 PUSH DWORD 004488F0
016F:0041393E 8BC1 MOV
EAX,ECX
016F:00413940 8BF7 MOV
ESI,EDI
016F:00413942 BFBC044500 MOV EDI,004504BC
016F:00413947 68BC044500 PUSH DWORD 004504BC
016F:0041394C C1E902 SHR
ECX,02
016F:0041394F F3A5 REP MOVSD
016F:00413951 8BC8 MOV
ECX,EAX
016F:00413953 68F0F94400 PUSH DWORD 0044F9F0
016F:00413958 83E103 AND
ECX,BYTE +03
016F:0041395B 6800894400 PUSH DWORD 00448900
016F:00413960 F3A4 REP MOVSB
016F:00413962 C705345647000100+MOV DWORD [00475634],01
016F:0041396C FF1510C24300 CALL `KERNEL32!WritePrivateProfileStringA`……写注册表
016F:00413972 68EC894400 PUSH DWORD 004489EC
016F:00413977 6840FA4400 PUSH DWORD 0044FA40
016F:0041397C 68240E4500 PUSH DWORD 00450E24
016F:00413981 6810324700 PUSH DWORD 00473210……此处为注册码。
016F:00413986 E8C7C50000 CALL 0041FF52
016F:0041398B 83C410 ADD
ESP,BYTE +10
016F:0041398E B9A8314700 MOV ECX,004731A8
016F:00413993 6A40 PUSH
BYTE +40
016F:00413995 68EC894400 PUSH DWORD 004489EC
016F:0041399A 6810324700 PUSH DWORD 00473210
016F:0041399F E838EA0100 CALL 004323DC
016F:004139A4 B9A8314700 MOV ECX,004731A8
016F:004139A9 891DD8554700 MOV [004755D8],EBX
016F:004139AF E83BCE0100 CALL 004307EF
016F:004139B4 E9ED010000 JMP 00413BA6
016F:004139B9 6A0A PUSH
BYTE +0A
016F:004139BB 6808524700 PUSH DWORD 00475208
016F:004139C0 6828040000 PUSH DWORD 0428
016F:004139C5 B9A8314700 MOV ECX,004731A8
016F:004139CA E858FB0100 CALL 00433527
016F:004139CF 6808524700 PUSH DWORD 00475208
016F:004139D4 E827F6FFFF CALL 00413000
016F:004139D9 83C404 ADD
ESP,BYTE +04
016F:004139DC 3BC3 CMP
EAX,EBX
016F:004139DE A3882C4700 MOV [00472C88],EAX
016F:004139E3 0F8EA9010000 JNG NEAR 00413B92
016F:004139E9 68F0884400 PUSH DWORD 004488F0
016F:004139EE 6800080000 PUSH DWORD 0800
016F:004139F3 6810324700 PUSH DWORD 00473210
016F:004139F8 B900020000 MOV ECX,0200
016F:004139FD 33C0 XOR
EAX,EAX
016F:004139FF BF10324700 MOV EDI,00473210
016F:00413A04 68C0484500 PUSH DWORD 004548C0
016F:00413A09 6804FA4400 PUSH DWORD 0044FA04
016F:00413A0E F3AB REP STOSD
016F:00413A10 6800894400 PUSH DWORD 00448900
016F:00413A15 FF1514C24300 CALL `KERNEL32!GetPrivateProfileStringA`
016F:00413A1B 6810324700 PUSH DWORD 00473210
016F:00413A20 E8DBF5FFFF CALL 00413000
016F:00413A25 83C404 ADD
ESP,BYTE +04
016F:00413A28 85C0 TEST
EAX,EAX
016F:00413A2A 0F85A7000000 JNZ NEAR 00413AD7
016F:00413A30 BF08524700 MOV EDI,00475208
016F:00413A35 83C9FF OR
ECX,BYTE -01
016F:00413A38 F2AE REPNE SCASB
我已经破了这个公司的四个软件了。都还比较容易。是新手练习的好东西。
这次的结果:
NAME:eryl
email:eryl@263.net
reg code: 303439363D35
另附上另外三个结果:
软件:32bit Email Broadcaster v.e9.28.17 VE2.29.01
name: eryl
email: eryl@263.net
reg code: 30353A393938
软件类别:邮件处理 运行平台:Windows95/98/Me/NT/2
授权形式:共享软件
版本:e9.29.01 汉化作者:星风雪 上传日期:2001-5-8
软件评级:
一个简单易用而又强有力的电子邮件群发程序.它既可以用于商业应用也可以用于个人应用.对于那些需要发送新闻,通知,广告的人来说十分有用.您可以使用它轻松的将您的讯息发送给给地址列表中的每一个人,可以是一个人乃至成千上万个收件人.当您批量发送邮件时,不会加上额外的CC头信息和广告头信息.它也可以发送HTML格式的信件.在9.29.01版本中加入了自动插入合并域的重要新特性.
软件:Multi Clipboard m9.37.01
Multi ClipBoard m9.37.1
软件简介:Multi ClipBoard 是一个很不错的剪贴簿工具,它可以存 33 个文件或者计划,还可自行编辑按钮字串,并支持多种数据库,这样你就可以将不同的数据,放到你的计划书里。未注册的,会限功能。
操作系统:Windows 95/98/NT/2000 软件大小:253KB 软件分类:剪贴工具
name:eryl
email:eryl@263.net
reg code: 303438373935
32BIT FTP p9.36.18
name:luomin
email: eryl@263.net
reg code:303337393B36
再附上几个软件的破解:
PAC MANIA 3D V1。8
NAME:ERYL
REG CODE:15863271488901372069
软件类别:娱乐游戏
运行平台:Win9x&Me&NT&2000
授权形式:共享软件
上传日期:2001-5-2
软件评
PacMania 3D是适用于Windows操作系统的类似于大型游艺机上的Pac-Man的游戏.与以往同类游戏的最大不同在于PacMania
3D是全三维的游戏.不仅场景是巨大的三维图形,而且您自己本身也需要以三维方式进行游戏.更为吸引人的是,以往的Pac-Man类游戏都只能在一个迷宫中移动,PacMania
3D却可以让您在游戏进行过程中在多个迷宫之间穿行,从而获得不同凡响的游戏乐趣.当然这在增加了刺激性的同时,也需要您更为高超的控制技术.PacMania
3D在让您重温儿时时光的同时,为您带来了崭新的视觉体验.
WINXFILES V5。1
NAME:ERICLUOM
REG CODE:ZNEGKQTTXYWQQYC,OR PVUPUSXUSQTMYLZ
这个软件其实也很有意思的。
他的注册名要大于5,这册号为十五位。
如果不满足条件,确认后就清除输入的内容。但当你输入的注册名小于7位时,你破解得来的是假的注册码。
年后开始学VB,希望很快能做个像样的KEYGEN.
- 标 题:不厌其烦,再来一篇!包括很多哦! (13千字)
- 作 者:eryl
- 时 间:2002-1-6 22:51:36
- 链 接:http://bbs.pediy.com