申请标题:申请会员ID:qq504714639
1、申 请 I D:qq504714639
2、个人邮箱:504714639@qq.com
3、破解excel批量处理工具BatchXls
百度一下:BatchXls 3.8
百度一下:VB Decompiler Pro
百度一下:OllyICE
BatchXls 3.8安装
一路下一步
打开VB Decompiler Pro 查看原代码,这里只能看VB程序原代码
Private Sub txtProperty_KeyPress(KeyAscii As Integer) '486FC0
Dim var_1C As App
Dim var_20 As CommandButton
loc_0048701A: setnz cl
loc_00487022: setnz dl
loc_00487039: setnz dl
loc_00487050: setnz dl
loc_00487061: If edx = 0 Then GoTo loc_004872ED
loc_0048706E: If var_48F024 <> 0 Then GoTo loc_004871DE (改这个地址)
loc_00487099: var_1C = Global.App
loc_004870BD: var_18 = Global.Title
loc_004870EB: var_38 = var_18
loc_0048710C: var_30 = "非注册用户不能进行修改,请使用正式版本!"
loc_004871B5: var_eax = frmReg.Show var_64
loc_004871D9: GoTo loc_004872ED
loc_004871DE: 'Referenced from: 0048706E
loc_00487202: var_eax = Unknown_VTable_Call
loc_00487237: var_eax = frmReg.CmdReg.ZOrder var_94
loc_00487267: var_A8 = var_94
loc_0048727D: If var_A8 = 0 Then GoTo loc_004872ED
loc_004872A3: var_eax = Unknown_VTable_Call
loc_004872C0: var_eax = frmReg.CmdReg.Move ebx, var_1C, var_20, var_20
loc_004872ED: 'Referenced from: 00487061
loc_004872F5: GoTo loc_0048732C
loc_0048732B: Exit Sub
loc_0048732C: 'Referenced from: 004872F5
End Sub
Private Sub CmdReg_Click() '489C60
Dim var_20 As TextBox
Dim Unknown_VTable_Call As TextBox
Dim var_28 As TextBox
Dim var_24 As CommandButton
loc_00489CE2: var_18 = txtRegCode.Text
loc_00489D0F: var_1C = var_18
loc_00489D15: var_eax = call Proc_1_2_4892C0(var_1C, var_20, Me)
loc_00489D1D: var_A4 = call Proc_1_2_4892C0(var_1C, var_20, Me)
loc_00489D3A: If var_A4 <> 0 Then GoTo loc_0048A2AF (修改这个地址)
loc_00489D69: var_18 = txtRegCode.Text
loc_00489D98: ecx = var_18
loc_00489DCD: var_48 = "用户注册成功"
loc_00489DF9: var_1C = "注册成功!" & "vbCrLf" & "vbCrLf"
loc_00489E03: var_30 = var_1C & "感谢您使用并注册支持本软件。"
loc_00489E6E: var_18 = txtRegCode.Text
loc_00489E9F: SaveSetting("BatchXLS", "REGCODE", "REGCODE", var_18)
loc_00489EE1: var_eax = Unknown_VTable_Call
loc_00489F20: var_48 = "Register"
loc_00489F31: var_eax = Unknown_VTable_Call
loc_00489F53: 0 = var_28.BackColor
loc_00489FAF: var_eax = Unknown_VTable_Call
loc_00489FC3: var_28.Locked = False
loc_0048A015: var_eax = Unknown_VTable_Call
loc_0048A029: var_28.Locked = False
loc_0048A085: var_eax = Unknown_VTable_Call
loc_0048A0A3: var_eax = CmdReg.Move 0, var_20, 0, var_24
loc_0048A109: var_eax = Unknown_VTable_Call
loc_0048A127: var_eax = CmdReg.Move 0, var_0048F010, 1, var_24
loc_0048A18D: var_eax = Unknown_VTable_Call
loc_0048A1AB: var_eax = CmdReg.Move 0, var_20, 2, var_24
loc_0048A211: var_eax = Unknown_VTable_Call
loc_0048A22F: var_eax = CmdReg.Move 0, var_0048F010, 5, var_24
loc_0048A285: Set var_20 = Me
loc_0048A28D: var_eax = Global.Unload var_20
loc_0048A2AA: GoTo loc_0048A46A
loc_0048A2AF: 'Referenced from: 00489D3A
loc_0048A2D9: var_48 = "注册失败"
loc_0048A2F6: call (var_20, Unknown_VTable_Call, var_0048F010, var_20, Unknown_VTable_Call, var_0048F010)
loc_0048A305: call
loc_0048A312: var_30 = 0 & "感谢您使用并注册本软件。请检查输入是否正确。"
loc_0048A36D: call ebx(var_20, var_48, Me)
loc_0048A374: var_eax = txtRegCode.SetFocus
loc_0048A3A9: var_eax = ebx(var_20, var_48, Me)
loc_0048A3B2: txtRegCode.SelStart = 0
loc_0048A3E7: var_eax = ebx(var_20, var_48, Me)
loc_0048A3F9: var_eax = ebx(var_20, var_48, Me)
loc_0048A404: var_18 = txtRegCode.Text
loc_0048A430: txtRegCode.SelLength = Len(var_18)
loc_0048A46A: 'Referenced from: 0048A2AA
loc_0048A476: GoTo loc_0048A4B8
loc_0048A4B7: Exit Sub
loc_0048A4B8: 'Referenced from: 0048A476
End Sub
我们现在运行OllyICE打开BatchXls
分别查找0048706E 00489D3A
0048706E . /0F85 6A010000 jnz 004871DE (JNZ改成JZ)
00487074 . |391D 14F64800 cmp dword ptr , ebx
0048707A . |75 10 jnz short 0048708C
0048707C . |68 14F64800 push 0048F614
00487081 . |68 ECA34100 push 0041A3EC
00487086 . |FF15 B4114000 call dword ptr [<&MSVBVM60.__vbaNew2>>;MSVBVM60.__vbaNew2
0048708C > |8B35 14F64800 mov esi, dword ptr
00487092 . |8D4D E4 lea ecx, dword ptr
00487095 . |51 push ecx
00487096 . |56 push esi
00487097 . |8B06 mov eax, dword ptr
00487099 . |FF50 14 call dword ptr
0048709C . |3BC3 cmp eax, ebx
0048709E . |DBE2 fclex
004870A0 . |7D 0F jge short 004870B1
00489D3A /0F85 6F050000 jnz 0048A2AF (JNZ改成JZ)
00489D40 . |8B45 08 mov eax, dword ptr
00489D43 . |66:C705 24F04>mov word ptr , 0FFFF
00489D4C . |50 push eax
00489D4D . |8B08 mov ecx, dword ptr
00489D4F . |FF91 FC020000 call dword ptr
00489D55 . |8D55 E0 lea edx, dword ptr
00489D58 . |50 push eax
00489D59 . |52 push edx
00489D5A . |FFD3 call ebx
00489D5C . |8B08 mov ecx, dword ptr
00489D5E . |8D55 E8 lea edx, dword ptr
00489D61 . |52 push edx
00489D62 . |50 push eax
00489D63 . |8985 64FFFFFF mov dword ptr , eax
00489D69 . |FF91 A0000000 call dword ptr
00489D6F . |3BC7 cmp eax, edi
00489D71 . |DBE2 fclex
00489D73 . |7D 18 jge short 00489D8D
这样就修改完成了
接下来运行程序
抱歉,未能达到申请要求,申请不通过,可以关注论坛官方微信(吾爱破解论坛),等待开放注册通知。
ps:爆破过程太简单了,分析下算法看看吧。 这个一般都会,来点有技术性的,肯定可以过。 {:301_998:}虽然我不会破解,但是看着太简单了。,估计过不了 继续努力楼主 二楼哪里都见到你 邀请码这么便宜楼主还是买吧 ...........这要是能过 我就笑了 直接买一个就好了
页:
[1]
2