- Joined
- Aug 22, 2007
- Messages
- 17
- Reaction score
- 11
You must be registered to see links
Join our community of MMO enthusiasts and game developers! By registering, you'll gain access to discussions on the latest developments in MMO server files and collaborate with like-minded individuals. Join us today and unlock the potential of MMO server development!
Join Today!Execute me!
I downloaded and just show About Dialog. It write "1.01.03 ... ??S6.3??". Are you kidding?
0060692E |. 50 PUSH EAX ; /<%d>
0060692F |. 68 94777C00 PUSH GameServ.007C7794 ; |<%s> = "1.01.06"
00606934 |. 68 587A7600 PUSH GameServ.00767A58 ; |Format = "%s_%d"
00606939 |. 8D8D D8FCFFFF LEA ECX,DWORD PTR SS:[EBP-328] ; |
0060693F |. 51 PUSH ECX ; |s
00606940 |. FF15 98447400 CALL DWORD PTR DS:[<&USER32.wsprintfA>] ; \wsprintfA
00606946 |. 83C4 10 ADD ESP,10
00606949 |. 68 04907C00 PUSH GameServ.007C9004 ; ASCII "Kor"
yes, this is 1.01.06 EX702, support new wing monter ( wing2.5 ). wait data folder and otherI didnt analyze alt versions, but seems like that gs have arca event + Pentagram
Version is True
View attachment 146025Code:0060692E |. 50 PUSH EAX ; /<%d> 0060692F |. 68 94777C00 PUSH GameServ.007C7794 ; |<%s> = "1.01.06" 00606934 |. 68 587A7600 PUSH GameServ.00767A58 ; |Format = "%s_%d" 00606939 |. 8D8D D8FCFFFF LEA ECX,DWORD PTR SS:[EBP-328] ; | 0060693F |. 51 PUSH ECX ; |s 00606940 |. FF15 98447400 CALL DWORD PTR DS:[<&USER32.wsprintfA>] ; \wsprintfA 00606946 |. 83C4 10 ADD ESP,10 00606949 |. 68 04907C00 PUSH GameServ.007C9004 ; ASCII "Kor"
caothuphutho
post unpacked main and post data+dataservers =)
you mean "and i will post data+dataserver" dont you?caothuphutho
post unpacked main and post data+dataservers =)
you mean "and i will post data+dataserver" dont you?
F8运行两次 看ESP 地址:0012FFA0
内存数据 硬件访问断点 WORD方式
F9运行一次 删除所有硬件断点.
POPAD
JMP 模块入口点>
F8运行 两次 就可以看到入口了
[url]http://115.com/file/c2k3v6lr#[/url]
MainTAI.rar
MAIN未处理任何,只是破壳.
004EA780 . /75 5B JNZ SHORT TTT_.004EA7DD
004EA780 /EB 5B JMP SHORT TTT_.004EA7DD
-----------------
004EAA27 . /75 39 JNZ SHORT TTT_.004EAA62
-----------------
004EAABA . /0F85 8A000000 JNZ TTT_.004EAB4A
004EAABA /E9 8B000000 JMP TTT_.004EAB4A
004EAABF |90 NOP
-----------------
004F2EFB |. /74 23 JE SHORT TTT_.004F2F20
004F2EFB /EB 23 JMP SHORT TTT_.004F2F20
跳NP地址给大家,自已JMP,也学习下OD使用.
奇迹Ex700 main 1.3.27 TAI cracked
one friend fount it and sent to me
You must be registered to see links
Code:F8运行两次 看ESP 地址:0012FFA0 内存数据 硬件访问断点 WORD方式 F9运行一次 删除所有硬件断点. POPAD JMP 模块入口点> F8运行 两次 就可以看到入口了 [URL]http://115.com/file/c2k3v6lr#[/URL] MainTAI.rar MAIN未处理任何,只是破壳. 004EA780 . /75 5B JNZ SHORT TTT_.004EA7DD 004EA780 /EB 5B JMP SHORT TTT_.004EA7DD ----------------- 004EAA27 . /75 39 JNZ SHORT TTT_.004EAA62 ----------------- 004EAABA . /0F85 8A000000 JNZ TTT_.004EAB4A 004EAABA /E9 8B000000 JMP TTT_.004EAB4A 004EAABF |90 NOP ----------------- 004F2EFB |. /74 23 JE SHORT TTT_.004F2F20 004F2EFB /EB 23 JMP SHORT TTT_.004F2F20 跳NP地址给大家,自已JMP,也学习下OD使用.
----
i don't have download it before post and it looks like a bad crack main size is 100mb+:thumbdown:
Main 1.03.42 TAI (1.03R+) Crack (use methods crack no need unpack by tomatoes )
Download : link uploading..
infor main :
Version :22689
Serial : 44S3aT8d8XaQg2W3
IP : ctpt.myvnc.com
Port : AD75
infor Main you need hex in MainConfig.dll
Pic test Crack Main :
You must be registered to see links
p/s : i no have Data folder and other of muserver 1.01.03, someone is sharing it for everyone