|
[原创]CHMEditor.v1.2.Build.051.Full.Cracked
setup_demo.exe啊 |
|
|
|
|
|
|
|
|
|
[原创]RAD2010 update4/5 crack
DelphiDistillerv1845 才是正道 |
|
|
|
|
|
[转帖]Exeinfo Pe v.0.0.2.6 ( 555signatures ) 29.1.2010
能说下这个和PEID的区别吗 |
|
|
|
[转帖]Emurasoft.EmEditor.Professional.v9.08.Retail.Incl.Keymaker-ZWT
EMEDITOR 9.15 最易补丁法 0043AAC8 /$ 55 PUSH EBP 0043AAC9 |. 8BEC MOV EBP,ESP 0043AACB |. 83E4 F8 AND ESP,FFFFFFF8 0043AACE |. 81EC FC0D0000 SUB ESP,0DFC 0043AAD4 |. 53 PUSH EBX 0043AAD5 |. 56 PUSH ESI 0043AAD6 |. 57 PUSH EDI 0043AAD7 |. 8D4424 38 LEA EAX,DWORD PTR SS:[ESP+38] 0043AADB |. 50 PUSH EAX 0043AADC |. 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0043AADF |. FF70 04 PUSH DWORD PTR DS:[EAX+4] 0043AAE2 |. E8 89F30100 CALL emeditor.00459E70 //里面是读注册表,注册码比较之类,此行下面再走会定时联网检测,直接不让下面的走就行 0043AAE7 |. 33DB XOR EBX,EBX //直接跳到 43AFE4 ,堆栈清除,返回 0043AAE9 |. 894424 14 MOV DWORD PTR SS:[ESP+14],EAX 0043AAED |. 385D 0C CMP BYTE PTR SS:[EBP+C],BL 0043AAF0 |. 75 04 JNZ SHORT emeditor.0043AAF6 0043AAF2 |. 6A 78 PUSH 78 ................................ 0043AFDE |> \FF15 50A74800 CALL DWORD PTR DS:[<&USER32.PostMessageW>; \PostMessageW 0043AFE4 |> 5F POP EDI //到这 0043AFE5 |. 5E POP ESI 0043AFE6 |. 5B POP EBX 0043AFE7 |. 8BE5 MOV ESP,EBP 0043AFE9 |. 5D POP EBP 0043AFEA \. C2 0C00 RETN 0C |
|
[转帖]Emurasoft.EmEditor.Professional.v9.08.Retail.Incl.Keymaker-ZWT
哈哈 事实证明 FFF的TrapZero 兄这回比较大意,根本没怎么测 他的补丁只修改的是 00058F5B: 55 33 00058F5C: 8D C0 00058F5D: 6C 40 00058F5E: 24 C3 IDA看源程序的这段是 signed int __stdcall sub_459B5B(HWND hWnd, int a2) { wchar_t *v2; // eax@1 char v3; // zf@25 wchar_t *v4; // eax@33 signed int v6; // [sp-4h] [bp-A60h]@9 wchar_t Str; // [sp+Ch] [bp-A50h]@1 char v9; // [sp+290h] [bp-7CCh]@36 const WCHAR String1; // [sp+490h] [bp-5CCh]@36 const WCHAR WideCharStr; // [sp+7B4h] [bp-2A8h]@36 const WCHAR String2; // [sp+A38h] [bp-24h]@1 wchar_t v13; // [sp+A7Ch] [bp+20h]@1 __int16 v14; // [sp+A9Ch] [bp+40h]@34 __int16 v15; // [sp+AB0h] [bp+54h]@1 __int16 v16; // [sp+AB2h] [bp+56h]@18 __int16 v17; // [sp+AB4h] [bp+58h]@20 wchar_t *Context; // [sp+ABCh] [bp+60h]@1 int v19; // [sp+AC0h] [bp+64h]@1 int v20; // [sp+AC4h] [bp+68h]@1 sub_401674(2147483646); v19 = 0; Context = 0; v15 = 0; LOWORD(v20) = 0; v13 = 0; String2 = 0; v2 = wcstok_s(&Str, L":", &Context); if ( !v2 ) return 2; while ( *v2 ) { if ( !v19 ) { v6 = 2147483646; goto LABEL_15; } if ( v19 == 1 ) { v6 = 2147483646; goto LABEL_15; } if ( v19 == 2 ) { v6 = 2147483646; goto LABEL_15; } if ( v19 == 3 ) { v6 = 2147483646; goto LABEL_15; } if ( v19 == 4 ) { v6 = 2147483646; goto LABEL_15; } if ( v19 == 5 ) { v6 = 2147483646; LABEL_15: sub_401674(v6); } v2 = wcstok_s(0, L":", &Context); ++v19; if ( !v2 ) break; } if ( v15 == 118 ) { if ( v16 != 57 ) return 4; if ( !v17 && (_WORD)v20 && (unsigned __int16)(v20 - 97) <= 0x19u && (unsigned __int16)(HIWORD(v20) - 97) <= 0x19u ) { if ( (_WORD)v20 == 99 ) { v3 = HIWORD(v20) == 110; goto LABEL_26; } if ( (_WORD)v20 == 106 ) { v3 = HIWORD(v20) == 112; goto LABEL_26; } if ( (_WORD)v20 == 114 ) { v3 = HIWORD(v20) == 117; LABEL_26: if ( v3 ) return 3; } if ( v13 ) { v4 = wcschr(&v13, 0x7Eu); if ( v4 ) return 3; if ( v14 && String2 != (_WORD)v4 ) { sub_401674(2147483646); sub_401674(2147483646); sub_4015C3(&WideCharStr, L":v9:"); sub_4015C3(&WideCharStr, &v9); sub_4015C3(&WideCharStr, L":"); sub_4015C3(&WideCharStr, &v20); sub_4015C3(&WideCharStr, L":"); sub_4015C3(&WideCharStr, &v13); sub_4015C3(&WideCharStr, L":"); sub_4015C3(&WideCharStr, &v14); if ( sub_4599BD(hWnd, (int)&String1, &WideCharStr) == 5 ) return 5; if ( !lstrcmpW(&String1, &String2) ) { *(_WORD *)a2 = 0; sub_40159B(&v20); sub_4015C3(a2, L":"); sub_4015C3(a2, &v13); sub_4015C3(a2, L":"); sub_4015C3(a2, &v14); sub_4015C3(a2, L"::"); sub_4015C3(a2, &String1); return 1; } } } } } return 2; } 这样改后是 sub_459B5B proc near xor eax, eax inc eax retn sub_459B5B endp 即 signed int __cdecl sub_459B5B() { return 1; } 就把这里返回个值是没用嘀 还是要联网检测,然后马上报错喽 我的补丁是 0003A082: 0F E9 0003A083: 84 4D 0003A084: 4C 02 0003A085: 02 00 0003A087: 00 90 0003A2D8: 74 E9 0003A2D9: 0D 07 0003A2DA: 38 01 0003A2DB: 5D 00 0003A2DC: 0C 00 0003A311: 0F E9 0003A312: 84 CE 0003A313: CD 00 0003A316: 00 90 SO 还是用我的得了 ^_^ |
|
[转帖]Emurasoft.EmEditor.Professional.v9.08.Retail.Incl.Keymaker-ZWT
LS的是补丁+注册表 不止crack only 写入了 TrapZero / FiGHTiNG FoR FuN DUP 做的应该 我上面那个包括了EM中文包,注册机,补丁 嘿嘿 |
|
[下载]Torchsoft.Registry.Workshop.v4.2.4.Incl.Patch.and.Keymaker-ZWT
小弟不才,问下 ZWT是什么 国内还是国外的组织? GOOGLE 貌似没有搜到 还有个问题 中国不是有CCG吗 以前WINDOWS 优化大师的注册机是CCG娃娃出的吧 现在CCG怎么都没出东西了? |
|
[转帖]Emurasoft.EmEditor.Professional.v9.08.Retail.Incl.Keymaker-ZWT
呃,那个PATCH 是我做的。。。。 |
|
|
|
[转帖]Emurasoft.EmEditor.Professional.v9.08.Retail.Incl.Keymaker-ZWT
EmEditor Professional Retail v9.15 x86: http://www.multiupload.com/H9WYK4S005 patch程序在此 |
|
[原创]Breakpoint Manager添加注释导入/导出
WIN7 OD载入停止响应 |
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值