古今大戰80分破解:
作者:王靜
下載地址:http://www.wj2000.50megs.com
破解工具:softice
輸入:
序列號:123456
註冊碼:78787878
用bpx hmemcpy作斷點,中斷後清除斷點,再按12次F12,就到下面:
:004557BD E8B690FCFF call 0041E878
:004557C2 8B45F8
mov eax, dword ptr [ebp-08] //來到這裡
:004557C5 E8B218FBFF call 0040707C
:004557CA 8BD8
mov ebx, eax
:004557CC 33C0
xor eax, eax
:004557CE 5A
pop edx
:004557CF 59
pop ecx
:004557D0 59
pop ecx
:004557D1 648910
mov dword ptr fs:[eax], edx
:004557D4 EB14
jmp 004557EA
:004557D6 E961DBFAFF jmp 0040333C
:004557DB E800DEFAFF call 004035E0
:004557E0 E9AB000000 jmp 00455890
:004557E5 E8F6DDFAFF call 004035E0
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004557D4(U)
|
:004557EA 81FB48890100 cmp ebx, 00018948
:004557F0 7C14
jl 00455806
:004557F2 81FB52890100 cmp ebx, 00018952
:004557F8 7F0C
jg 00455806
:004557FA 8D55FC
lea edx, dword ptr [ebp-04]
:004557FD 8BC3
mov eax, ebx
:004557FF E890FBFFFF call 00455394
:00455804 EB0A
jmp 00455810
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004557F0(C), :004557F8(C)
|
:00455806 8D55FC
lea edx, dword ptr [ebp-04]
:00455809 8BC3
mov eax, ebx
:0045580B E804FCFFFF call 00455414
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00455804(U)
|
:00455810 8D55F8
lea edx, dword ptr [ebp-08]
:00455813 8B86F0010000 mov eax, dword
ptr [esi+000001F0]
:00455819 E85A90FCFF call 0041E878
:0045581E 8B45F8
mov eax, dword ptr [ebp-08]
:00455821 8B55FC
mov edx, dword ptr [ebp-04]
:00455824 E87BE6FAFF call 00403EA4
//關鍵的call追入
:00455829 7554
jne 0045587F
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00455824(U)
|
00403EA4
push ebx
00403EA5
push esi
00403EA6
push edi
00403EA7
mov esi,eax
00403EA9
mov edi,edx
00403EAB
cmp eax,edx //下d eax 可以看到假註冊碼:78787878 下d edx 可以看到真的註冊碼:QGBOFWCUOEERC
00403EAD
jz 00403F42
(文:zhaocuo)
歡迎光臨我的破解小站:網遊世界
http://59596.126.com
E-mail:xcdm@163.com
我的QQ : 44357921 (不是破解愛好者不要 Q 我哦!)