elite*gold: 35
Join Date: Oct 2007
Posts: 180
Received Thanks: 313
|
hi
ich habe ein programm das ich nicht hinbekomme. es ist sehr sehr neu.
das programm geht online um den schlüssel zu suchen (das teil heist UPL). doch für das muss ich einen speercod haben.... und die e-mail angeben.
nach dem sollte ich eine serial erhalten die ich in dem program eingeben kann. diese erstellt einen virtuelen server und speichert die serial.
bei jedem start wird die geprüft.
kann mir da wer weiterhelfen? ich komm nicht nach.
es handelt sich um das programm AlphaCam 2011 R1
fals einer ne herausforderung im cracken sucht.... ich hab sie für ihn. wen ihr wollt kan ich die rar dateien hochladen für euch.
PS: das spuckt virustotal aus wen ich die UPL.exe prüfe.
Additional informationShow all
MD5 : ceb088a7d40a1f072ab1d71043a5c044
SHA1 : 7ee7c112ac98c99d4db35216411e53c684149742
SHA256: 129a6d2d8e5baeb243fce58dfdbf91964a1cbd6d9ee46444c8 17298150a4985a
ssdeep: 384:l6nPV9kIpDLDsDVRoamurxZo3QYdAjNTIJLlvs0hVMThOm 6/dIDo9hxZvhJd:l6ph97ddAp
IJdnhVkhObdIsnZz
File size : 26624 bytes
First seen: 2010-11-27 00:50:27
Last seen : 2010-11-27 00:50:27
TrID:
Win64 Executable Generic (80.9%)
Win32 Executable Generic (8.0%)
Win32 Dynamic Link Library (generic) (7.1%)
Generic Win/DOS Executable (1.8%)
DOS Executable Generic (1.8%)
sigcheck:
publisher....: n/a
copyright....: Copyright (c) 1989-2007
product......: Planit License Utility
description..: Planit License Utility
original name: UPL.exe
internal name: UPL
file version.: 7, 5, 0, 103
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
PEInfo: PE structure information
[[ basic data ]]
entrypointaddress: 0x3242
timedatestamp....: 0x475FB957 (Wed Dec 12 10:35:03 2007)
machinetype......: 0x14c (I386)
[[ 4 section(s) ]]
name, viradd, virsiz, rawdsiz, ntropy, md5
.text, 0x1000, 0x29BB, 0x2A00, 6.09, 62d95438c5f3491fd9278a73f98d087e
.rdata, 0x4000, 0x13C4, 0x1400, 4.98, 0d31148af2d8a554648cf5aeedba1741
.data, 0x6000, 0x744, 0x200, 1.80, 325caf2f57208e6aa040d03397f1185a
.rsrc, 0x7000, 0x2274, 0x2400, 5.06, 5ba7374042b99a6b1f3d92c70fc2419c
[[ 6 import(s) ]]
KERNEL32.dll: GetProcAddress, CopyFileA, GetLastError, GetModuleFileNameA, GetFileAttributesA, SetFileAttributesA, CreateDirectoryA, LoadLibraryA, GetWindowsDirectoryA, lstrlenA, QueryPerformanceCounter, IsDebuggerPresent, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, FreeLibrary, Sleep, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, GetTickCount
USER32.dll: MessageBoxA
comdlg32.dll: GetOpenFileNameA, GetSaveFileNameA
ADVAPI32.dll: RegSetValueA
MSVCP80.dll: __0_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAE@PBD@Z, __0_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAE@XZ, __$_HDU_$char_traits@D@std@@V_$allocator@D@1@@std@ @YA_AV_$basic_string@DU_$char_traits@D@std@@V_$all ocator@D@2@@0@ABV10@PBD@Z, __Y_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAEAAV01@PBD@Z, __Y_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAEAAV01@ABV01@@Z, __4_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAEAAV01@PBD@Z, __4_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAEAAV01@ABV01@@Z, __1_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAE@XZ, __0_$basic_string@DU_$char_traits@D@std@@V_$alloca tor@D@2@@std@@QAE@ABV01@@Z
MSVCR80.dll: fclose, remove, __2@YAPAXI@Z, rename, __1exception@std@@UAE@XZ, __0exception@std@@QAE@ABV01@@Z, __0exception@std@@QAE@XZ, _strdup, strchr, atoi, isdigit, _splitpath, _unlock, __dllonexit, _encode_pointer, _lock, fprintf, _decode_pointer, _amsg_exit, __getmainargs, _cexit, _exit, _XcptFilter, _ismbblead, exit, _acmdln, _initterm, _initterm_e, _configthreadlocale, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _terminate@@YAXXZ, __type_info_dtor_internal_method@type_info@@QAEXXZ , _crt_debugger_hook, _except_handler4_common, _invoke_watson, _controlfp_s, _strnicmp, strstr, fgets, sprintf, _invalid_parameter_noinfo, fopen_s, _onexit, __CxxFrameHandler3, memset, __3@YAXPAX@Z, _CxxThrowException
ExifTool:
file metadata
CharacterSet: Unicode
CodeSize: 10752
EntryPoint: 0x3242
FileDescription: Planit License Utility
FileFlagsMask: 0x0017
FileOS: Win32
FileSize: 26 kB
FileSubtype: 0
FileType: Win32 EXE
FileVersion: 7, 5, 0, 103
FileVersionNumber: 7.5.0.103
ImageVersion: 0.0
InitializedDataSize: 14848
InternalName: UPL
LanguageCode: English (British)
LegalCopyright: Copyright 1989-2007
LinkerVersion: 8.0
MIMEType: application/octet-stream
MachineType: Intel 386 or later, and compatibles
OSVersion: 4.0
ObjectFileType: Executable application
OriginalFilename: UPL.exe
PEType: PE32
ProductName: Planit License Utility
ProductVersion: 7.5.0.103
ProductVersionNumber: 1.0.0.1
Subsystem: Windows GUI
SubsystemVersion: 4.0
TimeStamp: 2007:12:12 11:35:03+01:00
UninitializedDataSize: 0
und das kommt bei der Programm.exe:
Additional informationShow all
MD5 : b41bfa3a03235e5414327cfc63b11968
SHA1 : 68493c19e23f437ccc1bc1292c6ace51ed64a3f2
SHA256: dcbb1d3c15ee411d09e41bc7468f81ada26f8a8f401c677a28 cf3934da9fb588
ssdeep: 98304:ZrPdTmHqgMhqvA8+uCcoehli40VMbeX5hIQAl72HOF4e :ZRTOqzPu14Vuebm
File size : 11525632 bytes
First seen: 2010-11-27 00:37:07
Last seen : 2010-11-27 00:37:07
Magic: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
TrID:
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
sigcheck:
publisher....: Licom Systems Ltd
copyright....: Copyright (c) 1989-2007
product......: Alphacam
description..: Alphacam
original name: acam.exe
internal name: Alphacam
file version.: 9.0.0.152
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
PEiD: -
PEInfo: PE structure information
[[ basic data ]]
entrypointaddress: 0x3D5A65
timedatestamp....: 0x4AE7434F (Tue Oct 27 19:00:31 2009)
machinetype......: 0x14C (Intel I386)
[[ 5 section(s) ]]
name, viradd, virsiz, rawdsiz, ntropy, md5
.text, 0x1000, 0x3E9FEC, 0x3EA000, 6.57, 686ff5d66d91c1c90248d1157902fd8f
CONST, 0x3EB000, 0x50, 0x200, 1.42, 9d2c259028ec9a2bead2fdb719de93b6
.rdata, 0x3EC000, 0x6C9B4, 0x6CA00, 5.01, 2c91863518e6ed3392e1d934eaa459ac
.data, 0x459000, 0xC8E5C, 0x5D800, 6.5, 3417c0426f75132329c4e8356f530b03
.rsrc, 0x522000, 0x649524, 0x649600, 5.27, be2a566854fc84e66e921292e93236c8
ExifTool:
file metadata
CharacterSet: Unicode
CodeSize: 4104704
CompanyName: Licom Systems Ltd
EntryPoint: 0x3d5a65
FileDescription: Alphacam
FileFlagsMask: 0x003f
FileOS: Win32
FileSize: 11 MB
FileSubtype: 0
FileType: Win32 EXE
FileVersion: 9.0.0.152
FileVersionNumber: 9.0.0.152
ImageVersion: 0.0
InitializedDataSize: 7419904
InternalName: Alphacam
LanguageCode: English (U.S.)
LegalCopyright: Copyright 1989-2007
LinkerVersion: 9.0
MIMEType: application/octet-stream
MachineType: Intel 386 or later, and compatibles
OSVersion: 5.0
ObjectFileType: Executable application
OriginalFilename: acam.exe
PEType: PE32
ProductName: Alphacam
ProductVersion: 9.0.0.152
ProductVersionNumber: 9.0.0.152
Subsystem: Windows GUI
SubsystemVersion: 5.0
TimeStamp: 2009:10:27 20:00:31+01:00
UninitializedDataSize: 0
was empfehlt ihr mir hierzu um es zu cracken?
|