当前位置:常青藤软件吧文章资讯技术文章
日期:2010-04-07 20:59:12  来源:本站整理

CITECT.V7破解方法

修改Client.dll文件

100079C7 ----> b800000000


* Referenced by a CALL at Addresses:
|:100760FD   , :1007FEB2   , :1008085B   , :10080BB5   , :10080BC5  
|:10080BCE   , :10080C06   , :10080C32   , :10080C3F   , :100812A4  
|:100812E7   , :10081426   , :10081432   , :1008143F   , :1008144C  
|:10081459   , :10081466   , :10081473   , :10081480   , :1008148D  
|:100814FA   , :1008160C   , :1008162C   , :10081640   , :10081674  
|:1008185D   , :100818B5   , :100818C4   , :100818D0   , :100818DD  
|:100818EA   , :100818F7   , :10081904   , :10081911   , :1008191E  
|:1008198B   , :10081998   , :100854ED   , :100CC26D   , :10113364  
|

Exported fn(): GetLicenceSupport - Ord:007Fh
:100B1E27 55                      push ebp
:100B1E28 8BEC                    mov ebp, esp
:100B1E2A 6A00                    push 00000000
:100B1E2C 6A00                    push 00000000
:100B1E2E FF7508                  push [ebp+08]
:100B1E31 E8D1FCFFFF              call 100B1B07 ----> FIND THIS CALL

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:100B1E17(C)
|
:100B1E36 83C40C                  add esp, 0000000C
:100B1E39 5D                      pop ebp
:100B1E3A C3                      ret

* Referenced by a CALL at Addresses:
|:100B1E31   , :100B1E46  
|

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:100B1E54(U)---------------------------------------------------------------------------->FIND THIS

:100B1B07 55                      push ebp
:100B1B08 8BEC                    mov ebp, esp
:100B1B0A 81EC040D0000            sub esp, 00000D04
:100B1B10 A1A8061A10              mov eax, dword ptr [101A06A8]
:100B1B15 33C5                    xor eax, ebp
:100B1B17 8945FC                  mov dword ptr [ebp-04], eax
:100B1B1A 8B450C                  mov eax, dword ptr [ebp+0C]
:100B1B1D 53                      push ebx
:100B1B1E 56                      push esi
:100B1B1F 33DB                    xor ebx, ebx
:100B1B21 68FF070000              push 000007FF
:100B1B26 898504F3FFFF            mov dword ptr [ebp+FFFFF304], eax
:100B1B2C 8D85FDF7FFFF            lea eax, dword ptr [ebp+FFFFF7FD]
:100B1B32 53                      push ebx
:100B1B33 50                      push eax
:100B1B34 33F6                    xor esi, esi
:100B1B36 889DFCF7FFFF            mov byte ptr [ebp+FFFFF7FC], bl

* Referenced by a CALL at Addresses:
|:1007FE78   , :100814A3------------------------------------>find this {REPLACE ALL PROCEDURE B800000000}  
|
:100B1E50 55                      push ebp
:100B1E51 8BEC                    mov ebp, esp
:100B1E53 5D                      pop ebp
:100B1E54 E9AEFCFFFF              jmp 100B1B07

Tags:

作者:佚名
关于本站 | 网站帮助 | 广告合作 | 下载声明 | 友情连接 | 网站地图
cqt8.com 版权所有 冀ICP备09015712号