《超级鼠标键盘精灵》Cracked By Dxer(附简单破文)
本帖最后由 wTiAwTiAw 于 2014-5-19 08:48 编辑简介:《超级鼠标键盘精灵》可以录制鼠标键盘的动作,并保存为脚本。您可以通过执行脚本,让它代替您的双手,并且您可以选择执行次数和执行速度,自动执行一系列鼠标键盘动作。它简单易用,只要您在电脑前用双手可以完成的动作,它都可以替您完成。它用途机器广泛,比如:您可以用它制作网络游戏练功机器人,制作聊天室的刷屏机,用它制作QQ炸弹,用它制作论坛的灌水机,用它来刷网站流量。。。。。。更多的用途需要您发挥自己的聪明才智去挖掘。
--------------------------------------------------------------------------------------------------------------首先点“记录”按钮或按(F6),开始进行记录您的鼠标键盘操作,停止记录请按“停止”或按(F7)。点“开始”或按(F8),软件会自动100%准确性模拟您刚才的鼠标键盘操作。点“保存”,您可以将记录的鼠标键盘操作保存为精灵脚本文件(*.fsj),以便以后使用。点“读取”,您可以选择以前记录的鼠标键盘操作的精灵脚本文件,然后执行该脚本。速度(%):执行鼠标键盘的速度,调的值越大速度越慢,反之。操作次数:执行记录的脚本(已经记录的鼠标键盘操作)的次数。正在执行的次数:显示的是实时状态,正在执行的操作的第几次。执行完毕后自动关机:执行完毕(如果操作次数是10次,则是10次操作都执行完毕后才关机)执行时最小化:执行记录的脚本(已经记录的鼠标键盘操作)时,窗口最小化。记录时程序最小化:当开始记录时,窗口最小化。窗体总在最上面:打勾则窗体总在其他窗体的最前面。-------------------------------------------------------------------------------------------------------------注1:当正在记录时,请按(F6)停止记录。注2:当正在执行记录的脚本(已经记录的鼠标键盘操作)时,请按(F7)停止执行。注3:您可以将一些常用的鼠标键盘操作记录下来保存为精灵脚本文件,以便以后用到的时候调用。注4:请不要将速度调的太小,否则操作会出现误差。【文章标题】: 超级鼠标键盘精灵【文章作者】: Dxer【软件名称】: 超级鼠标键盘精灵【软件大小】: 336KB【下载地址】: 自己搜索下载【加壳方式】: PECompact 2.x -> Jeremy Collake【保护方式】: 收费【编写语言】: Borland Delphi 6.0 - 7.0【使用工具】: OD【软件介绍】: 脚本制作。【作者声明】: 只是感兴趣,没有其他目的。失误之处敬请诸位大侠赐教!--------------------------------------------------------------------------------【详细过程】004B9F69 55 push ebp004B9F6A 68 13A24B00 push 004BA213004B9F6F 64:FF30 push dword ptr fs:004B9F72 64:8920 mov dword ptr fs:, esp004B9F75 C705 80EC4B00 0>mov dword ptr , 1004B9F7F B2 01 mov dl, 1004B9F81 A1 889D4300 mov eax, dword ptr 004B9F86 E8 FDFEF7FF call 00439E88004B9F8B 8945 E8 mov dword ptr , eax004B9F8E BA 02000080 mov edx, 80000002004B9F93 8B45 E8 mov eax, dword ptr 004B9F96 E8 8DFFF7FF call 00439F28004B9F9B 33C0 xor eax, eax004B9F9D 55 push ebp004B9F9E 68 73A04B00 push 004BA073004B9FA3 64:FF30 push dword ptr fs:004B9FA6 64:8920 mov dword ptr fs:, esp004B9FA9 33C9 xor ecx, ecx004B9FAB BA 28A24B00 mov edx, 004BA228 ; \software\004B9FB0 8B45 E8 mov eax, dword ptr 004B9FB3 E8 B000F8FF call 0043A068004B9FB8 84C0 test al, al004B9FBA BA 3CA24B00 mov edx, 004BA23C ; fygrec004B9FBF 8B45 E8 mov eax, dword ptr 004B9FC2 E8 5504F8FF call 0043A41C004B9FC7 84C0 test al, al004B9FC9 BA 3CA24B00 mov edx, 004BA23C ; fygrec004B9FCE 8B45 E8 mov eax, dword ptr 004B9FD1 E8 B6FFF7FF call 00439F8C004B9FD6 33C9 xor ecx, ecx004B9FD8 BA 4CA24B00 mov edx, 004BA24C ; \software\fygrec004B9FDD 8B45 E8 mov eax, dword ptr 004B9FE0 E8 8300F8FF call 0043A068004B9FE5 84C0 test al, al004B9FE7 8D4D F4 lea ecx, dword ptr 004B9FEA BA 68A24B00 mov edx, 004BA268 ; name004B9FEF 8B45 E8 mov eax, dword ptr 004B9FF2 E8 3902F8FF call 0043A230004B9FF7 8D4D F8 lea ecx, dword ptr 004B9FFA BA 78A24B00 mov edx, 004BA278 ; regcode004B9FFF 8B45 E8 mov eax, dword ptr 004BA002 E8 2902F8FF call 0043A230004BA007 8D4D F0 lea ecx, dword ptr 004BA00A BA 88A24B00 mov edx, 004BA288 ; soft004BA00F 8B45 E8 mov eax, dword ptr 004BA012 E8 1902F8FF call 0043A230 注册码位置004BA017 837D F0 00 cmp dword ptr , 0004BA01B 75 12 jnz short 004BA02F004BA01D B9 98A24B00 mov ecx, 004BA298 ; 0004BA022 BA 88A24B00 mov edx, 004BA288 ; soft004BA027 8B45 E8 mov eax, dword ptr 004BA02A E8 D501F8FF call 0043A204004BA02F 837D F0 00 cmp dword ptr , 0004BA033 74 20 je short 004BA055004BA035 8D45 E4 lea eax, dword ptr 004BA038 B9 98A24B00 mov ecx, 004BA298 ; 0004BA03D 8B55 F0 mov edx, dword ptr 004BA040 E8 0BA8F4FF call 00404850004BA045 8B4D E4 mov ecx, dword ptr 004BA048 BA 88A24B00 mov edx, 004BA288 ; soft004BA04D 8B45 E8 mov eax, dword ptr 004BA050 E8 AF01F8FF call 0043A204004BA055 8B45 E8 mov eax, dword ptr 004BA058 E8 9BFEF7FF call 00439EF8004BA05D 33C0 xor eax, eax004BA05F 5A pop edx004BA060 59 pop ecx004BA061 59 pop ecx004BA062 64:8910 mov dword ptr fs:, edx004BA065 68 7AA04B00 push 004BA07A004BA06A 8B45 E8 mov eax, dword ptr 004BA06D E8 0697F4FF call 00403778004BA072 C3 retn004BA073^ E9 A89EF4FF jmp 00403F20004BA078^ EB F0 jmp short 004BA06A004BA07A B8 A4A24B00 mov eax, 004BA2A4 ; 166004BA07F E8 F0EAF4FF call 00408B74004BA084 50 push eax004BA085 6A 01 push 1004BA087 8D45 EC lea eax, dword ptr 004BA08A 50 push eax004BA08B B9 B0A24B00 mov ecx, 004BA2B0 ; fengyungu004BA090 8B55 F4 mov edx, dword ptr 004BA093 8B45 FC mov eax, dword ptr 004BA096 E8 89EEFFFF call 004B8F24004BA09B 8B45 EC mov eax, dword ptr 004BA09E 8B55 F8 mov edx, dword ptr 004BA0A1 E8 AAA8F4FF call 00404950004BA0A6 75 1A jnz short 004BA0C2004BA0A8 8B45 FC mov eax, dword ptr 004BA0AB 8B80 64030000 mov eax, dword ptr 004BA0B1 33D2 xor edx, edx004BA0B3 E8 180AFBFF call 0046AAD0004BA0B8 E8 2BF4FFFF call 004B94E8004BA0BD E9 CA000000 jmp 004BA18C004BA0C2 8B45 F0 mov eax, dword ptr 004BA0C5 E8 3AA7F4FF call 00404804004BA0CA 83F8 13 cmp eax, 13004BA0CD 0F8E B9000000 jle 004BA18C004BA0D3 6A 40 push 40004BA0D5 B9 BCA24B00 mov ecx, 004BA2BC ; 对不起004BA0DA BA C4A24B00 mov edx, 004BA2C4 ; 试用期已到,请注册004BA0DF A1 50D14B00 mov eax, dword ptr 004BA0E4 8B00 mov eax, dword ptr 004BA0E6 E8 CD26FDFF call 0048C7B8004BA0EB 8B45 FC mov eax, dword ptr 004BA0EE 8B80 FC020000 mov eax, dword ptr 004BA0F4 33D2 xor edx, edx004BA0F6 8B08 mov ecx, dword ptr 004BA0F8 FF51 64 call dword ptr 004BA0FB 8B45 FC mov eax, dword ptr 004BA0FE 8B80 08030000 mov eax, dword ptr 004BA104 33D2 xor edx, edx004BA106 8B08 mov ecx, dword ptr 004BA108 FF51 64 call dword ptr 004BA10B 8B45 FC mov eax, dword ptr 004BA10E 8B80 0C030000 mov eax, dword ptr 004BA114 33D2 xor edx, edx004BA116 8B08 mov ecx, dword ptr 004BA118 FF51 64 call dword ptr 004BA11B 8B45 FC mov eax, dword ptr 004BA11E 8B80 F8020000 mov eax, dword ptr 004BA124 33D2 xor edx, edx004BA126 8B08 mov ecx, dword ptr 004BA128 FF51 64 call dword ptr 004BA12B 8B45 FC mov eax, dword ptr 004BA12E 8B80 10030000 mov eax, dword ptr 004BA134 33D2 xor edx, edx004BA136 8B08 mov ecx, dword ptr 004BA138 FF51 64 call dword ptr 004BA13B 8B45 FC mov eax, dword ptr 004BA13E 8B80 54030000 mov eax, dword ptr 004BA144 33D2 xor edx, edx004BA146 E8 0DB2F7FF call 00435358004BA14B 33C0 xor eax, eax004BA14D A3 80EC4B00 mov dword ptr , eax004BA152 6A 00 push 0004BA154 6A 00 push 0004BA156 8D55 DC lea edx, dword ptr 004BA159 33C0 xor eax, eax004BA15B E8 D48CF4FF call 00402E34004BA160 8B45 DC mov eax, dword ptr 004BA163 8D55 E0 lea edx, dword ptr 004BA166 E8 19EFF4FF call 00409084004BA16B 8D45 E0 lea eax, dword ptr 004BA16E BA E0A24B00 mov edx, 004BA2E0 ; reg.chm::/鼠标键盘精灵reg/reg.htm004BA173 E8 94A6F4FF call 0040480C004BA178 8B45 E0 mov eax, dword ptr 004BA17B 50 push eax004BA17C 8B45 FC mov eax, dword ptr 004BA17F E8 4873FBFF call 004714CC004BA184 50 push eax004BA185 E8 92EDFFFF call <jmp.&hhctrl.HtmlHelpA>004BA18A EB 5F jmp short 004BA1EB004BA18C E8 33F6FFFF call 004B97C4004BA191 E8 56F4FFFF call 004B95EC004BA196 E8 41F5FFFF call 004B96DC004BA19B A1 50D14B00 mov eax, dword ptr 004BA1A0 8B00 mov eax, dword ptr 004BA1A2 8B55 FC mov edx, dword ptr 004BA1A5 8990 DC000000 mov dword ptr , edx004BA1AB C780 D8000000 0>mov dword ptr , 004BA304004BA1B5 A1 74D14B00 mov eax, dword ptr 004BA1BA 8B00 mov eax, dword ptr 004BA1BC 8B55 FC mov edx, dword ptr 004BA1BF 8950 34 mov dword ptr , edx004BA1C2 C740 30 18A34B0>mov dword ptr , 004BA318004BA1C9 A1 74D14B00 mov eax, dword ptr 004BA1CE 8B00 mov eax, dword ptr 004BA1D0 8B50 28 mov edx, dword ptr 004BA1D3 8B45 FC mov eax, dword ptr 004BA1D6 8B80 04030000 mov eax, dword ptr 004BA1DC E8 8753FDFF call 0048F568004BA1E1 33D2 xor edx, edx004BA1E3 8B45 FC mov eax, dword ptr 004BA1E6 E8 2D010000 call 004BA318004BA1EB 33C0 xor eax, eax004BA1ED 5A pop edx004BA1EE 59 pop ecx004BA1EF 59 pop ecx004BA1F0 64:8910 mov dword ptr fs:, edx004BA1F3 68 1AA24B00 push 004BA21A004BA1F8 8D45 DC lea eax, dword ptr 004BA1FB BA 03000000 mov edx, 3004BA200 E8 63A3F4FF call 00404568004BA205 8D45 EC lea eax, dword ptr 004BA208 BA 04000000 mov edx, 4004BA20D E8 56A3F4FF call 00404568004BA212 C3 retn004BA213^ E9 089DF4FF jmp 00403F20004BA218^ EB DE jmp short 004BA1F8004BA21A 8BE5 mov esp, ebp004BA21C 5D pop ebp004BA21D C3 retn附一组注册信息:超级鼠标键盘精灵用户名:Dxer注册码:A68C60AB79--------------------------------------------------------------------------------【经验总结】答应了的事,就去做!无聊中……--------------------------------------------------------------------------------【版权声明】: 本文原创于Dxer,转载请注明作者并保存文章的完整,谢谢!
2014年05月08日 17:05:46
yahuan995 发表于 2014-5-10 00:20
确实看不懂,我刚下载试了下,脱了壳没破解成功,新手别笑话,重启验证,求破解详细记录,对新手很有帮助,
{:1_918:}这个你主要是看注册表信息。当满足20次。注册表位置出现20个0。试用过期,注册表位置:fygrec 你可以看下 确实看不懂,我刚下载试了下,脱了壳没破解成功,新手别笑话,重启验证,求破解详细记录,对新手很有帮助, 淡泊 发表于 2014-5-8 19:47
谢谢分享
{:301_996:}沙发坐的是很快啊 支持,虽然不用~ 哈哈这个好像还不错 总有天会用上 真是位搞技术的大牛,附上过程图片不是更加完善了。 支持楼主分享 这个真给力啊 很给力 但是没学到东西 myyounger 发表于 2014-5-9 11:47
很给力 但是没学到东西
{:301_999:}下次发仔细点。这个就不修改了
页:
[1]
2