能力值:
( LV2,RANK:10 )
|
-
-
76 楼
hiE
51A5-B2ED-9D87-34E8-E531-94B8-008F-5B3A
|
能力值:
( LV2,RANK:10 )
|
-
-
77 楼
004017E5 . 3805 26AA4000 cmp byte ptr [40AA26], al
004017EB . 75 68 jnz short 00401855
004017ED . E8 4EFEFFFF call 00401640
004017F2 . A1 B0AA4000 mov eax, dword ptr [40AAB0]
004017F7 . 8B0D 5CAB4000 mov ecx, dword ptr [40AB5C]
004017FD . 3BC1 cmp eax, ecx
004017FF 74 31 je short 00401832
00401801 . 8B0D 00AA4000 mov ecx, dword ptr [40AA00]
00401807 . 6A 10 push 10 ; /Style = MB_OK|MB_ICONHAND|MB_APPLMODAL
00401809 . 68 D8804000 push 004080D8 ; |Title = "Sorry"
0040180E . 68 BC804000 push 004080BC ; |Text = "Try again,never give up!"
00401813 . 51 push ecx ; |hOwner => NULL
00401814 . FF15 D0704000 call dword ptr [<&USER32.MessageBoxA>>; \MessageBoxA
0040181A . A1 68AA4000 mov eax, dword ptr [40AA68]
0040181F . 6A 01 push 1
00401821 . 50 push eax
00401822 . EB 53 jmp short 00401877
00401824 > 6A 10 push 10
00401826 . 68 24814000 push 00408124 ; ASCII "Error"
0040182B . 68 94804000 push 00408094 ; ASCII "The Name contains invalid ASCII char!"
00401830 . EB 2F jmp short 00401861
00401832 > 8B15 00AA4000 mov edx, dword ptr [40AA00]
-------
004017EB . /75 68 jnz short 00401855
爆破JNZ-JE
要注册码就是在附近CALL里面.
|
能力值:
( LV2,RANK:10 )
|
-
-
78 楼
占个位。。。。。
|
能力值:
( LV2,RANK:10 )
|
-
-
79 楼
很不错的技术,论坛真是人才辈出呀
|
能力值:
( LV2,RANK:10 )
|
-
-
80 楼
这样的啊?
|
能力值:
( LV2,RANK:10 )
|
-
-
81 楼
看看。是谁破解的
|
能力值:
( LV7,RANK:100 )
|
-
-
82 楼
pandascu
CF2E-D4AF-8A4F-C4E8-EBCD-D7C0-E2B0-335C
|
能力值:
( LV4,RANK:50 )
|
-
-
83 楼
NAME: zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzU
SERIAL: 1111-2222-3333-4444-5555-6666-7777-8888
|
|
|