Hello,
This is Kenneth Roy from China.
I am a Reverse Engineer and I hope to do this project.
I have many experiences with cracking VB programs.
VB program uses EAX, EBX, ECX registries to pass the parameters and return function, it's the most difference between VB program and C program.
I use IDA Pro, HexWorkshop to crack the software.
I'm sure I can get the algorithm calculating the code and disable this security.
Getting the algorithm means to find and analyze the assembly code of this software.
Disabling the security means to find the module for this security and jump the conditions reversely.
I can use JZ(0x74 0x15), JNZ(0x75 0x10)), NOP(0x90) codes for this.
I'll complete this job in this day.
Sincerely,
Kenneth