启动中华压缩6.02,点击注册 输入jiangzhif 87654321 ctrl+n激活trw2000 bpx hmemcpy g 点确定,被拦 bc* pmodule 按7次F12后 不停按F10,直到下面(1)处
0167:004F3D50 8B45F8 MOV EAX,[EBP-08] 0167:004F3D53 50 PUSH EAX 0167:004F3D54 8D55F0 LEA EDX,[EBP-10] 0167:004F3D57 8B83E0020000 MOV EAX,[EBX+02E0] 0167:004F3D5D E82EF2F3FF CALL 00432F90 0167:004F3D62 8B55F0 MOV EDX,[EBP-10] 0167:004F3D65 8D4DF4 LEA ECX,[EBP-0C] 0167:004F3D68 8BC3 MOV EAX,EBX 0167:004F3D6A E8C9010000 CALL 004F3F38 0167:004F3D6F 8B55F4 MOV EDX,[EBP-0C] 0167:004F3D72 58 POP EAX 0167:004F3D73 E8A403F1FF CALL 0040411C *****(1) 0167:004F3D78 7576 JNZ 004F3DF0 0167:004F3D7A B201 MOV DL,01
(1) d edx真注册码(AG5344) d eax假注册码(87654321)
|