• 标 题:网络校验——王牌超级工具组合箱 V3.4 (VB)
  • 作 者:fly
  • 时 间:2003-9-09 周二, 上午1:36
  • 链 接:http://bbs.pediy.com

网络校验——王牌超级工具组合箱 V3.4 (VB)
 
 
 
下载页面:  http://www.skycn.com/soft/10097.html
软件大小:  2926 KB
软件语言:  简体中文
软件类别:  国产软件 / 共享版 / 杂类工具
应用平台:  Win9x/NT/2000/XP
加入时间:  2003-06-08 17:16:41
下载次数:  30750
推荐等级:  *** 
开 发 商:  http://kinger.nease.net/

【软件简介】:《王牌超级工具组合箱》精选组合了当今电脑用户最常用最实用的工具软件于一身,从此您无须再东奔西跑地到处去搜寻工具软件,或者总为重新装机而烦恼……在《王牌超级工具组合箱》中,(1)“家庭影院”集成了VCD、CD、MP3、MIDI、Flash影院等多种媒体播放器;(2)“超级浏览器”更是集成了图片浏览器 、多文本浏览器、多Web文档浏览器、字体浏览器、资源浏览器等;(3)“数学手册”集成有科学计算器 、高等数学积分表、物理常数表、化学元素周期表;(4)“实用工具”中内置了电子日记、二十四节气、电脑复读机、悬浮式剪贴板、自制屏幕保护程序、修改启动画面、五笔打字专家、修改文件类型、IE保护器、注册表编辑器、密码管理专家、本机IP地址等;(5)“通讯助理”内置了全国邮政编码 、国内国际长途电话区号、电话拨号程序、来电显示、录音电话、视频电话、通讯录、十二生肖、 手机短信等;(6)“时间机器”集成了万年历、上网计时、定时关机、 整点报时、定时提醒、生日筵会提醒等;(7) “成批执行”包括软件成批压缩/解压缩、文件成批改名、邮件群发器;(“网上搜索九国” 能够从十个‘搜索引擎’中同时同步地搜索关键词的功能。 

【软件限制】:NAG、50次试用、功能限制

【作者声明】:初学Crack,只是感兴趣,没有其它目的。失误之处敬请诸位大侠赐教!

【破解工具】:TRW2000娃娃修改版、Ollydbg1.09、PEiD、Guw32、W32Dasm 9.0白金版

————————————————————————————————— 
【过    程】:



这个东东是网络验证,不填注册码,注册后作者“会为你建立一个远程数据库,使你自动注册成功”。可以说这种验证方式是比较好的,限制了破解,没有注册机了。但是我简单试了试,发现作者并没有最佳利用这种验证方式,改一个返回值程序就注册成功了,爆破后的版本连网后也没有发现问题。


Toolsbox.exe 是 UPX 0.89.6-1.02 壳,用Guw32脱之。262K->1.53M。 VB 5.0 编写。

序列号:892343567
试炼码:不需要    ^O^ ^O^
—————————————————————————————————


:004CEE0D C78578FFFFFF440A4300    mov dword ptr [ebp+FFFFFF78], 00430A44
:004CEE17 C78570FFFFFF08000000    mov dword ptr [ebp+FFFFFF70], 00000008
:004CEE21 FFD3                    call ebx
:004CEE23 8D4580                  lea eaxdword ptr [ebp-80]
:004CEE26 8D4D90                  lea ecxdword ptr [ebp-70]
:004CEE29 50                      push eax
:004CEE2A 8D55A0                  lea edxdword ptr [ebp-60]
:004CEE2D 51                      push ecx
:004CEE2E 52                      push edx
:004CEE2F 8D45B0                  lea eaxdword ptr [ebp-50]
:004CEE32 6A01                    push 00000001
:004CEE34 50                      push eax
:004CEE35 FF15C0104000            call dword ptr [004010C0]
                                  ====>确认网络连接的对话

:004CEE3B 8BC8                    mov ecxeax
:004CEE3D FF1548114000            call dword ptr [00401148]
:004CEE43 8D4D80                  lea ecxdword ptr [ebp-80]
:004CEE46 8BD8                    mov ebxeax
:004CEE48 8D5590                  lea edxdword ptr [ebp-70]
:004CEE4B 51                      push ecx
:004CEE4C 8D45A0                  lea eaxdword ptr [ebp-60]
:004CEE4F 52                      push edx
:004CEE50 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEE53 50                      push eax
:004CEE54 51                      push ecx
:004CEE55 6A04                    push 00000004
:004CEE57 FF1550104000            call dword ptr [00401050]
:004CEE5D 8B16                    mov edxdword ptr [esi]
:004CEE5F 83C414                  add esp, 00000014
:004CEE62 6683FB02                cmp bx, 0002
:004CEE66 56                      push esi
:004CEE67 7543                    jne 004CEEAC
:004CEE69 FF9210030000            call dword ptr [edx+00000310]
:004CEE6F 50                      push eax
:004CEE70 8D45C4                  lea eaxdword ptr [ebp-3C]
:004CEE73 50                      push eax
:004CEE74 FFD7                    call edi
:004CEE76 8BF0                    mov esieax

* Possible StringData Ref from Data Obj ->"     ?

:004CEE78 68980A4300              push 00430A98
:004CEE7D 56                      push esi
:004CEE7E 8B0E                    mov ecxdword ptr [esi]
:004CEE80 FF91A4000000            call dword ptr [ecx+000000A4]
:004CEE86 85C0                    test eaxeax
:004CEE88 DBE2                    fclex
:004CEE8A 7D12                    jge 004CEE9E
:004CEE8C 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"酦?3檉?? "
                                  |
:004CEE91 68E4B94200              push 0042B9E4
:004CEE96 56                      push esi
:004CEE97 50                      push eax
:004CEE98 FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEE8A(C)
|
:004CEE9E 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEEA1 FF15F4124000            call dword ptr [004012F4]
:004CEEA7 E9C2090000              jmp 004CF86E

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEE67(C)
|
:004CEEAC FF9210030000            call dword ptr [edx+00000310]
:004CEEB2 50                      push eax
:004CEEB3 8D45C4                  lea eaxdword ptr [ebp-3C]
:004CEEB6 50                      push eax
:004CEEB7 FFD7                    call edi
:004CEEB9 8BD8                    mov ebxeax
:004CEEBB 68FC0A4300              push 00430AFC
:004CEEC0 53                      push ebx
:004CEEC1 8B0B                    mov ecxdword ptr [ebx]
:004CEEC3 FF91A4000000            call dword ptr [ecx+000000A4]
:004CEEC9 85C0                    test eaxeax
:004CEECB DBE2                    fclex
:004CEECD 7D12                    jge 004CEEE1
:004CEECF 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"酦?3檉?? "
                                  |
:004CEED4 68E4B94200              push 0042B9E4
:004CEED9 53                      push ebx
:004CEEDA 50                      push eax
:004CEEDB FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEECD(C)
|
:004CEEE1 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEEE4 FF15F4124000            call dword ptr [004012F4]
:004CEEEA 8B16                    mov edxdword ptr [esi]
:004CEEEC 6A0B                    push 0000000B
:004CEEEE 56                      push esi
:004CEEEF FF92A4000000            call dword ptr [edx+000000A4]
:004CEEF5 85C0                    test eaxeax
:004CEEF7 DBE2                    fclex
:004CEEF9 7D12                    jge 004CEF0D
:004CEEFB 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"`m睑牂??,"
                                  |
:004CEF00 6870B44200              push 0042B470
:004CEF05 56                      push esi
:004CEF06 50                      push eax
:004CEF07 FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEEF9(C)
|
:004CEF0D 83EC10                  sub esp, 00000010
:004CEF10 B908000000              mov ecx, 00000008
:004CEF15 8BDC                    mov ebxesp
:004CEF17 898D70FFFFFF            mov dword ptr [ebp+FFFFFF70], ecx

* Possible StringData Ref from Data Obj ->"hhttp://kinger.nease.net/use"
                                  |
:004CEF1D B850E24200              mov eax, 0042E250
                                  ====>注册页面

:004CEF22 83EC10                  sub esp, 00000010
:004CEF25 890B                    mov dword ptr [ebx], ecx
:004CEF27 8B8D74FFFFFF            mov ecxdword ptr [ebp+FFFFFF74]
:004CEF2D 898578FFFFFF            mov dword ptr [ebp+FFFFFF78], eax
:004CEF33 33D2                    xor edxedx
:004CEF35 894B04                  mov dword ptr [ebx+04], ecx
:004CEF38 8BCC                    mov ecxesp
:004CEF3A 6A02                    push 00000002
:004CEF3C 6A16                    push 00000016
:004CEF3E 894308                  mov dword ptr [ebx+08], eax
:004CEF41 8B857CFFFFFF            mov eaxdword ptr [ebp+FFFFFF7C]
:004CEF47 56                      push esi
:004CEF48 89430C                  mov dword ptr [ebx+0C], eax
:004CEF4B B803000000              mov eax, 00000003
:004CEF50 8901                    mov dword ptr [ecx], eax
:004CEF52 8B8554FFFFFF            mov eaxdword ptr [ebp+FFFFFF54]
:004CEF58 894104                  mov dword ptr [ecx+04], eax
:004CEF5B 8B06                    mov eaxdword ptr [esi]
:004CEF5D 895108                  mov dword ptr [ecx+08], edx
:004CEF60 8B955CFFFFFF            mov edxdword ptr [ebp+FFFFFF5C]
:004CEF66 89510C                  mov dword ptr [ecx+0C], edx
:004CEF69 FF9020030000            call dword ptr [eax+00000320]
:004CEF6F 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEF72 50                      push eax
:004CEF73 51                      push ecx
:004CEF74 FFD7                    call edi
:004CEF76 8D55B0                  lea edxdword ptr [ebp-50]
:004CEF79 50                      push eax
:004CEF7A 52                      push edx
:004CEF7B FF156C114000            call dword ptr [0040116C]
:004CEF81 83C430                  add esp, 00000030
:004CEF84 50                      push eax
:004CEF85 FF1544104000            call dword ptr [00401044]
:004CEF8B 8B1DAC124000            mov ebxdword ptr [004012AC]
:004CEF91 8BD0                    mov edxeax
:004CEF93 8D4DDC                  lea ecxdword ptr [ebp-24]
:004CEF96 FFD3                    call ebx
:004CEF98 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CEF9B FF15F4124000            call dword ptr [004012F4]
:004CEFA1 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEFA4 FF1538104000            call dword ptr [00401038]
:004CEFAA 8D45DC                  lea eaxdword ptr [ebp-24]
:004CEFAD 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEFB0 50                      push eax
:004CEFB1 51                      push ecx
:004CEFB2 E879A90000              call 004D9930
:004CEFB7 8D55B0                  lea edxdword ptr [ebp-50]
:004CEFBA 52                      push edx
:004CEFBB FF1544104000            call dword ptr [00401044]
:004CEFC1 8BD0                    mov edxeax
:004CEFC3 8D4DDC                  lea ecxdword ptr [ebp-24]
:004CEFC6 FFD3                    call ebx
:004CEFC8 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CEFCB FF1538104000            call dword ptr [00401038]
:004CEFD1 8B06                    mov eaxdword ptr [esi]
:004CEFD3 6A00                    push 00000000
:004CEFD5 56                      push esi
:004CEFD6 FF90A4000000            call dword ptr [eax+000000A4]
:004CEFDC 85C0                    test eaxeax
:004CEFDE DBE2                    fclex
:004CEFE0 7D12                    jge 004CEFF4
:004CEFE2 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"`m睑牂??,"
                                  |
:004CEFE7 6870B44200              push 0042B470
:004CEFEC 56                      push esi
:004CEFED 50                      push eax
:004CEFEE FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CEFE0(C)
|
:004CEFF4 8B0E                    mov ecxdword ptr [esi]
:004CEFF6 56                      push esi
:004CEFF7 FF9104030000            call dword ptr [ecx+00000304]
:004CEFFD 8D55C4                  lea edxdword ptr [ebp-3C]
:004CF000 50                      push eax
:004CF001 52                      push edx
:004CF002 FFD7                    call edi
:004CF004 8B08                    mov ecxdword ptr [eax]
:004CF006 8D55D4                  lea edxdword ptr [ebp-2C]
:004CF009 52                      push edx
:004CF00A 50                      push eax
:004CF00B 89853CFFFFFF            mov dword ptr [ebp+FFFFFF3C], eax
:004CF011 FF91A0000000            call dword ptr [ecx+000000A0]
:004CF017 85C0                    test eaxeax
:004CF019 DBE2                    fclex
:004CF01B 7D18                    jge 004CF035
:004CF01D 8B8D3CFFFFFF            mov ecxdword ptr [ebp+FFFFFF3C]
:004CF023 68A0000000              push 000000A0

* Possible StringData Ref from Data Obj ->"酦?3檉?? "
                                  |
:004CF028 68E4B94200              push 0042B9E4
:004CF02D 51                      push ecx
:004CF02E 50                      push eax
:004CF02F FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF01B(C)
|
:004CF035 8B55DC                  mov edxdword ptr [ebp-24]
:004CF038 8B45D4                  mov eaxdword ptr [ebp-2C]
                                  ====>EAX=892343567          机器码

:004CF03B 6A01                    push 00000001
:004CF03D 52                      push edx

* Possible StringData Ref from Data Obj ->",,"
                                  |
:004CF03E 688CE24200              push 0042E28C
:004CF043 50                      push eax
:004CF044 FF156C104000            call dword ptr [0040106C]
                                  ====>连接,

:004CF04A 8BD0                    mov edxeax
                                  ====>EDX=,892343567

:004CF04C 8D4DD0                  lea ecxdword ptr [ebp-30]
:004CF04F FFD3                    call ebx
:004CF051 50                      push eax

* Possible StringData Ref from Data Obj ->",,"
                                  |
:004CF052 688CE24200              push 0042E28C
:004CF057 FF156C104000            call dword ptr [0040106C]
                                  ====>连接,

:004CF05D 8BD0                    mov edxeax
                                  ====>EDX=,892343567,

:004CF05F 8D4DCC                  lea ecxdword ptr [ebp-34]
:004CF062 FFD3                    call ebx
:004CF064 50                      push eax
:004CF065 6A00                    push 00000000
:004CF067 FF1508124000            call dword ptr [00401208]
                                  ====>这里估计就是连网校验了!

:004CF06D 8BD8                    mov ebxeax
                                  ====>这是返回值!

:004CF06F 8D4DCC                  lea ecxdword ptr [ebp-34]
:004CF072 F7DB                    neg ebx
:004CF074 8D55D0                  lea edxdword ptr [ebp-30]
:004CF077 51                      push ecx
:004CF078 1BDB                    sbb ebxebx
:004CF07A 8D45D4                  lea eaxdword ptr [ebp-2C]
:004CF07D 52                      push edx
:004CF07E 43                      inc ebx
:004CF07F 50                      push eax
:004CF080 6A03                    push 00000003
:004CF082 F7DB                    neg ebx
                                  ====>爆破点!


:004CF084 FF152C124000            call dword ptr [0040122C]
:004CF08A 83C410                  add esp, 00000010
:004CF08D 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CF090 FF15F4124000            call dword ptr [004012F4]
:004CF096 6685DB                  test bxbx
:004CF099 0F848B060000            je 004CF72A
                                  ====>不跳则OVER!


:004CF09F B90A000000              mov ecx, 0000000A
:004CF0A4 B804000280              mov eax, 80020004
:004CF0A9 894D80                  mov dword ptr [ebp-80], ecx
:004CF0AC 894D90                  mov dword ptr [ebp-70], ecx
:004CF0AF 894DA0                  mov dword ptr [ebp-60], ecx
:004CF0B2 8D9570FFFFFF            lea edxdword ptr [ebp+FFFFFF70]
:004CF0B8 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF0BB 894588                  mov dword ptr [ebp-78], eax
:004CF0BE 894598                  mov dword ptr [ebp-68], eax
:004CF0C1 8945A8                  mov dword ptr [ebp-58], eax

* Possible StringData Ref from Data Obj ->"鵞
Nw?鑜孮1Y%崋N& & "
                                  |
:004CF0C4 C78578FFFFFF200B4300    mov dword ptr [ebp+FFFFFF78], 00430B20
:004CF0CE C78570FFFFFF08000000    mov dword ptr [ebp+FFFFFF70], 00000008
:004CF0D8 FF1570124000            call dword ptr [00401270]
:004CF0DE 8D4D80                  lea ecxdword ptr [ebp-80]
:004CF0E1 8D5590                  lea edxdword ptr [ebp-70]
:004CF0E4 51                      push ecx
:004CF0E5 8D45A0                  lea eaxdword ptr [ebp-60]
:004CF0E8 52                      push edx
:004CF0E9 50                      push eax
:004CF0EA 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF0ED 6A00                    push 00000000
:004CF0EF 51                      push ecx
:004CF0F0 FF15C0104000            call dword ptr [004010C0]
                                  ====>BAD BOY!            ~@~ ~@~


…… ……省略…… ……


                                  ====>下面是写标志入注册表!
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF099(C)
|
:004CF72A A134A05000              mov eaxdword ptr [0050A034]
:004CF72F 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF732 2DA2010000              sub eax, 000001A2
:004CF737 8D55A0                  lea edxdword ptr [ebp-60]
:004CF73A 51                      push ecx
:004CF73B 52                      push edx
:004CF73C 0F80AE010000            jo 004CF8F0
:004CF742 8945B8                  mov dword ptr [ebp-48], eax
:004CF745 C745B003000000          mov [ebp-50], 00000003
:004CF74C FF157C124000            call dword ptr [0040127C]
:004CF752 8D45A0                  lea eaxdword ptr [ebp-60]
:004CF755 8D4D90                  lea ecxdword ptr [ebp-70]
:004CF758 50                      push eax
:004CF759 51                      push ecx
:004CF75A FF15F0104000            call dword ptr [004010F0]
:004CF760 8D5590                  lea edxdword ptr [ebp-70]
:004CF763 52                      push edx
:004CF764 FF1544104000            call dword ptr [00401044]
:004CF76A 8BD0                    mov edxeax
:004CF76C 8D4DE0                  lea ecxdword ptr [ebp-20]
:004CF76F FF15AC124000            call dword ptr [004012AC]
:004CF775 8B1D50104000            mov ebxdword ptr [00401050]
:004CF77B 8D4590                  lea eaxdword ptr [ebp-70]
:004CF77E 8D4DA0                  lea ecxdword ptr [ebp-60]
:004CF781 50                      push eax
:004CF782 8D55B0                  lea edxdword ptr [ebp-50]
:004CF785 51                      push ecx
:004CF786 52                      push edx
:004CF787 6A03                    push 00000003
:004CF789 FFD3                    call ebx
:004CF78B 8B45E0                  mov eaxdword ptr [ebp-20]
:004CF78E 83C410                  add esp, 00000010

* Possible StringData Ref from Data Obj ->"bbgdcikjynnfexsupmhnjd8omg9984h90mjg449tblo9i6"
                                        ->"fgjk7643du09mjy756gj9jng76uhvyt87jngre47hb44f6"
                                        ->"ghjufddfgtwfsdsxyytudfb9lghrffku45fc87j5hv84sw"
                                        ->"vh745fgdfdwfjkhr2387hbkiu5rdf"
                                  |
:004CF791 68A0A04200              push 0042A0A0
:004CF796 50                      push eax

* Possible StringData Ref from Data Obj ->"ttoolstimework"
                                  |
:004CF797 68C0E24200              push 0042E2C0

* Possible StringData Ref from Data Obj ->"ttoolbox"
                                  |
:004CF79C 6820A24200              push 0042A220
:004CF7A1 FF1514104000            call dword ptr [00401014]
:004CF7A7 8B0E                    mov ecxdword ptr [esi]
:004CF7A9 56                      push esi
:004CF7AA FF9110030000            call dword ptr [ecx+00000310]
:004CF7B0 8D55C4                  lea edxdword ptr [ebp-3C]
:004CF7B3 50                      push eax
:004CF7B4 52                      push edx
:004CF7B5 FFD7                    call edi
:004CF7B7 8BF0                    mov esieax

* Possible StringData Ref from Data Obj ->"b烺鑜孮孾誯"
                                  |
:004CF7B9 68D80C4300              push 00430CD8
:004CF7BE 56                      push esi
:004CF7BF 8B06                    mov eaxdword ptr [esi]
:004CF7C1 FF90A4000000            call dword ptr [eax+000000A4]
:004CF7C7 85C0                    test eaxeax
:004CF7C9 DBE2                    fclex
:004CF7CB 7D12                    jge 004CF7DF
:004CF7CD 68A4000000              push 000000A4

* Possible StringData Ref from Data Obj ->"酦?3檉?? "
                                  |
:004CF7D2 68E4B94200              push 0042B9E4
:004CF7D7 56                      push esi
:004CF7D8 50                      push eax
:004CF7D9 FF158C104000            call dword ptr [0040108C]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004CF7CB(C)
|
:004CF7DF 8D4DC4                  lea ecxdword ptr [ebp-3C]
:004CF7E2 FF15F4124000            call dword ptr [004012F4]
:004CF7E8 8B3570124000            mov esidword ptr [00401270]
:004CF7EE B904000280              mov ecx, 80020004
:004CF7F3 894D88                  mov dword ptr [ebp-78], ecx
:004CF7F6 B80A000000              mov eax, 0000000A
:004CF7FB 894D98                  mov dword ptr [ebp-68], ecx
:004CF7FE BF08000000              mov edi, 00000008
:004CF803 8D9560FFFFFF            lea edxdword ptr [ebp+FFFFFF60]
:004CF809 8D4DA0                  lea ecxdword ptr [ebp-60]
:004CF80C 894580                  mov dword ptr [ebp-80], eax
:004CF80F 894590                  mov dword ptr [ebp-70], eax

* Possible StringData Ref from Data Obj ->"o忲N鑜孮"
                                  |
:004CF812 C78568FFFFFF3C0B4300    mov dword ptr [ebp+FFFFFF68], 00430B3C
:004CF81C 89BD60FFFFFF            mov dword ptr [ebp+FFFFFF60], edi
:004CF822 FFD6                    call esi
:004CF824 8D9570FFFFFF            lea edxdword ptr [ebp+FFFFFF70]
:004CF82A 8D4DB0                  lea ecxdword ptr [ebp-50]

* Possible StringData Ref from Data Obj ->"m`淯╜ 鑜孮b烺鲖蛻癳/T≧
0媠Lr厤錧wQ膥T"
                                        ->"眥 0& & "
                                  |
:004CF82D C78578FFFFFFEC0C4300    mov dword ptr [ebp+FFFFFF78], 00430CEC
:004CF837 89BD70FFFFFF            mov dword ptr [ebp+FFFFFF70], edi
:004CF83D FFD6                    call esi
:004CF83F 8D4D80                  lea ecxdword ptr [ebp-80]
:004CF842 8D5590                  lea edxdword ptr [ebp-70]
:004CF845 51                      push ecx
:004CF846 8D45A0                  lea eaxdword ptr [ebp-60]
:004CF849 52                      push edx
:004CF84A 50                      push eax
:004CF84B 8D4DB0                  lea ecxdword ptr [ebp-50]
:004CF84E 6A00                    push 00000000
:004CF850 51                      push ecx
:004CF851 FF15C0104000            call dword ptr [004010C0]
                                  ====>呵呵,胜利女神!     ^O^ ^O^



————————————————————————————————— 
【完 美  爆 破】:


004CF082 F7DB                    neg ebx
  改为: 33DB                    xor ebxebx  
               

————————————————————————————————— 
【注册信息保存】:


REGEDIT4

[HKEY_CURRENT_USERSoftwareVB and VBA Program Settings  oolbox  oolstimework]
"loadcounts"="6357836"       ====>试用次数
"soft"="57048"               ====>我的注册标志
"56630"="bgdcikjynnfexsupmhnjd8omg9984h90mjg449tblo9i6fgjk7643du09mjy756gj9jng76uhvyt87jngre47hb44f6ghjufddfgtwfsdsxyytudfb9lghrffku45fc87j5hv84swvh745fgdfdwfjkhr2387hbkiu5rdf"


其实试用次数还保存在D盘下的 readfile.sys 文件中      ^O^ ^O^


—————————————————————————————————
    
                                
         ,     _/ 
        /| _.-~/            _     ,        青春都一饷
       ( /~   /              ~-._ |
       `\  _/                   ~ )          忍把浮名 
   _-~~~-.)  )__/;;,.          _  //'
  /'_,   --~    ~~~-  ,;;___(  (.-~~~-.        换了破解轻狂
 `~ _( ,_..-- (     ,;'' /    ~--   /._` 
  /~~//'   /' `~         ) /--.._, )_  `~
  "  `~"  "      `"      /~'`    `\~~   
                         "     "   "~'  ""

    

                    Cracked By 巢水工作坊——fly [OCN][FCG]

                           2003-06-14  02:00