- Joined
- Aug 22, 2007
- Messages
- 17
- Reaction score
- 11
You must be registered to see links
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature currently requires accessing the site using the built-in Safari browser.
Execute me!
I downloaded and just show About Dialog. It write "1.01.03 ... ??S6.3??". Are you kidding?
0060692E |. 50 PUSH EAX ; /<%d>
0060692F |. 68 94777C00 PUSH GameServ.007C7794 ; |<%s> = "1.01.06"
00606934 |. 68 587A7600 PUSH GameServ.00767A58 ; |Format = "%s_%d"
00606939 |. 8D8D D8FCFFFF LEA ECX,DWORD PTR SS:[EBP-328] ; |
0060693F |. 51 PUSH ECX ; |s
00606940 |. FF15 98447400 CALL DWORD PTR DS:[<&USER32.wsprintfA>] ; \wsprintfA
00606946 |. 83C4 10 ADD ESP,10
00606949 |. 68 04907C00 PUSH GameServ.007C9004 ; ASCII "Kor"
yes, this is 1.01.06 EX702, support new wing monter ( wing2.5 ). wait data folder and otherI didnt analyze alt versions, but seems like that gs have arca event + Pentagram
Version is True
View attachment 146025Code:0060692E |. 50 PUSH EAX ; /<%d> 0060692F |. 68 94777C00 PUSH GameServ.007C7794 ; |<%s> = "1.01.06" 00606934 |. 68 587A7600 PUSH GameServ.00767A58 ; |Format = "%s_%d" 00606939 |. 8D8D D8FCFFFF LEA ECX,DWORD PTR SS:[EBP-328] ; | 0060693F |. 51 PUSH ECX ; |s 00606940 |. FF15 98447400 CALL DWORD PTR DS:[<&USER32.wsprintfA>] ; \wsprintfA 00606946 |. 83C4 10 ADD ESP,10 00606949 |. 68 04907C00 PUSH GameServ.007C9004 ; ASCII "Kor"
caothuphutho
post unpacked main and post data+dataservers =)
you mean "and i will post data+dataserver" dont you?caothuphutho
post unpacked main and post data+dataservers =)
you mean "and i will post data+dataserver" dont you?
F8运行两次 看ESP 地址:0012FFA0
内存数据 硬件访问断点 WORD方式
F9运行一次 删除所有硬件断点.
POPAD
JMP 模块入口点>
F8运行 两次 就可以看到入口了
[url]http://115.com/file/c2k3v6lr#[/url]
MainTAI.rar
MAIN未处理任何,只是破壳.
004EA780 . /75 5B JNZ SHORT TTT_.004EA7DD
004EA780 /EB 5B JMP SHORT TTT_.004EA7DD
-----------------
004EAA27 . /75 39 JNZ SHORT TTT_.004EAA62
-----------------
004EAABA . /0F85 8A000000 JNZ TTT_.004EAB4A
004EAABA /E9 8B000000 JMP TTT_.004EAB4A
004EAABF |90 NOP
-----------------
004F2EFB |. /74 23 JE SHORT TTT_.004F2F20
004F2EFB /EB 23 JMP SHORT TTT_.004F2F20
跳NP地址给大家,自已JMP,也学习下OD使用.
奇迹Ex700 main 1.3.27 TAI cracked
one friend fount it and sent to me
You must be registered to see links
Code:F8运行两次 看ESP 地址:0012FFA0 内存数据 硬件访问断点 WORD方式 F9运行一次 删除所有硬件断点. POPAD JMP 模块入口点> F8运行 两次 就可以看到入口了 [URL]http://115.com/file/c2k3v6lr#[/URL] MainTAI.rar MAIN未处理任何,只是破壳. 004EA780 . /75 5B JNZ SHORT TTT_.004EA7DD 004EA780 /EB 5B JMP SHORT TTT_.004EA7DD ----------------- 004EAA27 . /75 39 JNZ SHORT TTT_.004EAA62 ----------------- 004EAABA . /0F85 8A000000 JNZ TTT_.004EAB4A 004EAABA /E9 8B000000 JMP TTT_.004EAB4A 004EAABF |90 NOP ----------------- 004F2EFB |. /74 23 JE SHORT TTT_.004F2F20 004F2EFB /EB 23 JMP SHORT TTT_.004F2F20 跳NP地址给大家,自已JMP,也学习下OD使用.
----
i don't have download it before post and it looks like a bad crack main size is 100mb+:thumbdown:
Main 1.03.42 TAI (1.03R+) Crack (use methods crack no need unpack by tomatoes )
Download : link uploading..
infor main :
Version :22689
Serial : 44S3aT8d8XaQg2W3
IP : ctpt.myvnc.com
Port : AD75
infor Main you need hex in MainConfig.dll
Pic test Crack Main :
You must be registered to see links
p/s : i no have Data folder and other of muserver 1.01.03, someone is sharing it for everyone