Apparently they use some sort of hardware identification (mac address, HDD serial number, etc...). Or they also could create some file at the time of installation.
What are the possible ways to force the application think that this is a COMPLETELY different computer? Can you suggest some software that would track the requests to the OS and spoof the response? Or maybe a suitable virtualization software?
I would really appreciate any help and I'm ready to offer a compensation for this work.
Please contact me at e-mail: firstname.lastname@example.org