Crack main 1.04M and 1.04N

Results 1 to 10 of 10
  1. #1
    Account Upgraded | Title Enabled! chris05 is offline
    MemberRank
    Aug 2005 Join Date
    Vinhedo/SP - BrasilLocation
    501Posts

    Crack main 1.04M and 1.04N

    Crack maintest.exe 1.04M (1.04.13)

    Modifications patch 1.04L to 1.04M
    • config.ini
    • maintest.exe
    • mu.exe


    Folder Interface: many files

    Folder Local:
    • itemtest.bmd
    • skilltest.bmd


    Folder Player:
    • playertest.bmd


    Folder Monster:
    • monster133.bmd


    [color="Red"]Guide - Edit maintest.exe (1.04M)/COLOR]

    Download patch 1.04M = ftp://muonline.nefficient.co.kr/pub/...04m_TPatch.zip

    Programs: Olly and Hex Editor

    1 - In Olly, look for mu.exe and then find the offsets below:

    005F400F |. 75 69 JNZ SHORT maintest.005F407A
    005F4011 |. 68 BC947E00 PUSH maintest.007E94BC ; /Arg2 = 007E94BC
    005F4016 |. 68 70DFF507 PUSH maintest.07F5DF70 ; |Arg1 = 07F5DF70
    005F401B |. E8 F1980B00 CALL maintest.006AD911 ; \maintest.006AD911
    005F4020 |. 83C4 08 ADD ESP,8
    005F4023 |. 68 BC8E7E00 PUSH maintest.007E8EBC ; ASCII "mu.exe"
    The first offset, replacing JNZ by JMP. This will disable the Mu.exe. Save it and open the file again.

    2 - Then look for "config.ini read error" and then find the offsets below:

    005F4359 . 74 1A JE SHORT maintest.005F4375
    005F435B . 8B0D B88E7E00 MOV ECX,DWORD PTR DS:[7E8EB8] ; maintest.007E8ED0
    005F4361 . 51 PUSH ECX ; /Arg1 => 007E8ED0 ASCII "MuTest"
    005F4362 . 8B8D 34F2FFFF MOV ECX,DWORD PTR SS:[EBP-DCC] ; |
    005F4368 . E8 33200000 CALL maintest.005F63A0 ; \maintest.005F63A0
    The first offset, replacing JE by JMP. This will disable the GuameGuard. Save it and open the file again.

    3 - Look for "gg init error":
    005F43A2 . 0F85 8A000000 JNZ maintest.005F4432
    005F43A8 . 68 90957E00 PUSH maintest.007E9590 ; /Arg2 = 007E9590 ASCII "gg init error"
    005F43AD . 68 70DFF507 PUSH maintest.07F5DF70 ; |Arg1 = 07F5DF70
    005F43B2 . E8 5A950B00 CALL maintest.006AD911 ; \maintest.006AD911
    005F43B7 . 83C4 08 ADD ESP,8
    005F43BA . E8 75CFFFFF CALL maintest.005F1334
    The first offset, replacing JNZ by JMP. This will disable the GuameGuard. Save it and open the file again.

    4 - Look for ResourceGuard Error:

    0061F887 |. 74 47 JE SHORT maintest.0061F8D0
    0061F889 |. B9 401EF607 MOV ECX,maintest.07F61E40
    0061F88E |. E8 CD060300 CALL maintest.0064FF60
    0061F893 |. 8D9424 8C09000>LEA EDX,DWORD PTR SS:[ESP+98C]
    0061F89A |. 52 PUSH EDX ; /Arg3
    0061F89B |. 68 14A57E00 PUSH maintest.007EA514 ; |Arg2 = 007EA514 ASCII "> ResourceGuard Error!!(%s)
    "
    0061F8A0 |. 68 70DFF507 PUSH maintest.07F5DF70 ; |Arg1 = 07F5DF70
    0061F8A5 |. E8 67E00800 CALL maintest.006AD911 ; \maintest.006AD911
    0061F8AA |. 83C4 0C ADD ESP,0C
    The first offset, replacing JE by JMP. This will disable the ResourceGuard. Save it.

    5 - Open the main.exe with the Hex Editor. Find connect.muonline.co.kr and change by your IP server.

    8 - Save and make copies of the file renaming to main.exe. OBS.: This maintest.exe (or the main.exe renamed) reads the files *test. bmd the client.

    Version: 22758 (1.04.13)
    Serial: gkdQkdjde7dQkdl0

    ======================
    Crack maintest.exe 1.04N (1.04.13)

    Modifications patch 1.04M to 1.04N

    * config.ini
    * maintest.exe

    Guide - Edit maintest.exe (1.04N)

    Download patch 1.04N = ftp://muonline.nefficient.co.kr/pub/...04n_TPatch.zip

    Programs: Olly and Hex Editor

    1 - In Olly, look for mu.exe and then find the offsets below:

    005F400F |. 75 69 JNZ SHORT maintest.005F407A
    005F4011 |. 68 BCA47E00 PUSH maintest.007EA4BC ; /Arg2 = 007EA4BC
    005F4016 |. 68 70EFF507 PUSH maintest.07F5EF70 ; |Arg1 = 07F5EF70
    005F401B |. E8 11990B00 CALL maintest.006AD931 ; \maintest.006AD931
    005F4020 |. 83C4 08 ADD ESP,8
    005F4023 |. 68 BC9E7E00 PUSH maintest.007E9EBC ; ASCII "mu.exe"
    The first offset, replacing JNZ by JMP. This will disable the Mu.exe. Save it and open the file again.

    2 - Then look for "config.ini read error" and then find the offsets below:
    005F4359 . 74 1A JE SHORT maintest.005F4375
    005F435B . 8B0D B89E7E00 MOV ECX,DWORD PTR DS:[7E9EB8] ; maintest.007E9ED0
    005F4361 . 51 PUSH ECX ; /Arg1 => 007E9ED0 ASCII "MuTest"
    005F4362 . 8B8D 34F2FFFF MOV ECX,DWORD PTR SS:[EBP-DCC] ; |
    005F4368 . E8 33200000 CALL maintest.005F63A0 ; \maintest.005F63A0
    The first offset, replacing JE by JMP. This will disable the GuameGuard. Save it and open the file again.

    3 - Look for "gg init error":
    005F43A2 . 0F85 8A000000 JNZ maintest.005F4432
    005F43A8 . 68 90957E00 PUSH maintest.007E9590 ; /Arg2 = 007E9590 ASCII "gg init error"
    005F43AD . 68 70DFF507 PUSH maintest.07F5DF70 ; |Arg1 = 07F5DF70
    005F43B2 . E8 5A950B00 CALL maintest.006AD911 ; \maintest.006AD911
    005F43B7 . 83C4 08 ADD ESP,8
    005F43BA . E8 75CFFFFF CALL maintest.005F1334
    The first offset, replacing JNZ by JMP. This will disable the GuameGuard. Save it and open the file again.

    4 - Look for ResourceGuard Error:
    0061F8A1 |. 74 47 JE SHORT maintest.0061F8EA
    0061F8A3 |. B9 402EF607 MOV ECX,maintest.07F62E40
    0061F8A8 |. E8 D3060300 CALL maintest.0064FF80
    0061F8AD |. 8D9424 8C09000>LEA EDX,DWORD PTR SS:[ESP+98C]
    0061F8B4 |. 52 PUSH EDX ; /Arg3
    0061F8B5 |. 68 14B57E00 PUSH maintest.007EB514 ; |Arg2 = 007EB514 ASCII "> ResourceGuard Error!!(%s)"
    0061F8BA |. 68 70EFF507 PUSH maintest.07F5EF70 ; |Arg1 = 07F5EF70
    0061F8BF |. E8 6DE00800 CALL maintest.006AD931 ; \maintest.006AD931
    0061F8C4 |. 83C4 0C ADD ESP,0C
    The first offset, replacing JE by JMP. This will disable the ResourceGuard. Save it.

    5 - Open the main.exe with the Hex Editor. Find connect.muonline.co.kr and change by your IP server.

    8 - Save and make copies of the file renaming to main.exe. OBS.: This maintest.exe (or the main.exe renamed) reads the files *test. bmd the client.

    Version: 22759 (1.04.14)
    Serial: rrhT6kdhQ9q6kkrQ

    credits: chris05 - DSTeam

    Sorry my bad English.
    Last edited by chris05; 12-12-07 at 06:33 PM. Reason: Add Guide for maintest 1.04N


  2. #2
    Account Upgraded | Title Enabled! chris05 is offline
    MemberRank
    Aug 2005 Join Date
    Vinhedo/SP - BrasilLocation
    501Posts

    Re: [Guide] Crack main 1.04M and 1.04N

    Guide - Edit maintest.exe (1.04O)

    Download patch 1.04O = ftp://muonline.nefficient.co.kr/pub/...04o_TPatch.zip

    Programs: Olly and Hex Editor

    1 - In Olly, look for mu.exe and then find the offsets below:
    005F412D |. 85C0 TEST EAX,EAX
    005F412F |. 75 69 JNZ SHORT main.005F419A
    005F4131 |. 68 BCA47E00 PUSH main.007EA4BC ; /Arg2 = 007EA4BC
    005F4136 |. 68 90EFF507 PUSH main.07F5EF90 ; |Arg1 = 07F5EF90
    005F413B |. E8 919F0B00 CALL main.006AE0D1 ; \main.006AE0D1
    005F4140 |. 83C4 08 ADD ESP,8
    005F4143 |. 68 BC9E7E00 PUSH main.007E9EBC ; ASCII "mu.exe"
    The first offset, replacing JNZ by JMP. This will disable the Mu.exe. Save it and open the file again.

    2 - Then look for "config.ini read error" and then find the offsets below:
    005F4479 . 74 1A JE SHORT main.005F4495
    005F447B . 8B0D B89E7E00 MOV ECX,DWORD PTR DS:[7E9EB8] ; main.007E9ED0
    005F4481 . 51 PUSH ECX ; /Arg1 => 007E9ED0 ASCII "MuTest"
    005F4482 . 8B8D 34F2FFFF MOV ECX,DWORD PTR SS:[EBP-DCC] ; |
    005F4488 . E8 33200000 CALL main.005F64C0 ; \main.005F64C0
    The first offset, replacing JE by JMP. This will disable the GuameGuard. Save it and open the file again.

    3 - Look for "gg init error":
    005F44C2 . 0F85 8A000000 JNZ main.005F4552
    005F44C8 . 68 90A57E00 PUSH main.007EA590 ; /Arg2 = 007EA590 ASCII "gg init error"
    005F44CD . 68 90EFF507 PUSH main.07F5EF90 ; |Arg1 = 07F5EF90
    005F44D2 . E8 FA9B0B00 CALL main.006AE0D1 ; \main.006AE0D1
    005F44D7 . 83C4 08 ADD ESP,8
    The first offset, replacing JNZ by JMP. This will disable the GuameGuard. Save it and open the file again.

    4 - Look for ResourceGuard Error:
    0061FA87 |. 74 47 JE SHORT main.0061FAD0
    0061FA89 |. B9 602EF607 MOV ECX,main.07F62E60
    0061FA8E |. E8 8D0C0300 CALL main.00650720
    0061FA93 |. 8D9424 8C09000>LEA EDX,DWORD PTR SS:[ESP+98C]
    0061FA9A |. 52 PUSH EDX ; /Arg3
    0061FA9B |. 68 14B57E00 PUSH main.007EB514 ; |Arg2 = 007EB514 ASCII "> ResourceGuard Error!!(%s)"
    0061FAA0 |. 68 90EFF507 PUSH main.07F5EF90 ; |Arg1 = 07F5EF90
    0061FAA5 |. E8 27E60800 CALL main.006AE0D1 ; \main.006AE0D1
    0061FAAA |. 83C4 0C ADD ESP,0C
    The first offset, replacing JE by JMP. This will disable the ResourceGuard. Save it.

    5 - Open the main.exe with the Hex Editor. Find connect.muonline.co.kr and change by your IP server.

    8 - Save and make copies of the file renaming to main.exe. OBS.: This maintest.exe (or the main.exe renamed) reads the files *test. bmd the client.

    Version: 2275: (1.04.15)
    Serial: wkhlrldpfd1qjsse

    ==================
    NOTICE: The Mu Koreia is still testing the news of the server and, therefore, has frequently posted several patches. These patches correct problems that are being found in the testing. For us, the problems remain the same because we have yet to file server compatible with these new patches.

    credits: chris05 - DSTeam

    Sorry my bad English.

  3. #3
    Account Upgraded | Title Enabled! bauru is offline
    MemberRank
    Dec 2007 Join Date
    BulgariaLocation
    208Posts

    Re: [Guide] Crack main 1.04M and 1.04N

    10x man :)

  4. #4
    Apprentice celltabr is offline
    MemberRank
    Feb 2007 Join Date
    BrazilLocation
    22Posts

    Re: [Guide] Crack main 1.04M and 1.04N

    Omg
    Niceeeeeeeeeeeee
    10000000000000000000000000/10

  5. #5
    Valued Member EntretenimientO is offline
    MemberRank
    Jun 2008 Join Date
    PanamaLocation
    133Posts

    Re: [Guide] Crack main 1.04M and 1.04N

    I have a question , how i search this numbers (the red numbers) to search the JNZ and change to JMP.
    005F412D |. 85C0 TEST EAX,EAX
    005F412F |. 75 69 JNZ SHORT main.005F419A
    Because i dont have that version and i want to crack the main.
    I need to change 4 things right?.In all the mains if i search those numbers 75 69(first thing i need to change) , 74 1A(second) , 68 90(third) , 74 47 (four).

  6. #6
    Enthusiast LordMoRidin is offline
    MemberRank
    Sep 2007 Join Date
    36Posts

    Re: [Guide] Crack main 1.04M and 1.04N

    005F412D |. 85C0 TEST EAX,EAX
    005F412F |. 75 69 JNZ SHORT main.005F419A
    005F4131 |. 68 BCA47E00 PUSH main.007EA4BC ; /Arg2 = 007EA4BC
    005F4136 |. 68 90EFF507 PUSH main.07F5EF90 ; |Arg1 = 07F5EF90
    005F413B |. E8 919F0B00 CALL main.006AE0D1 ; \main.006AE0D1
    005F4140 |. 83C4 08 ADD ESP,8
    005F4143 |. 68 BC9E7E00 PUSH main.007E9EBC ; ASCII "mu.exe"
    Use Olly:
    RMB -> "Search for all references text strings" -> "mu.exe" -> Double click on string with mu.exe

    P.S. Read this "manual".

  7. #7
    Enthusiast pvpone is offline
    MemberRank
    Aug 2007 Join Date
    29Posts

    Re: [Guide] Crack main 1.04M and 1.04N

    i like it")

  8. #8
    Account Upgraded | Title Enabled! JoniverPH is offline
    MemberRank
    May 2006 Join Date
    PilipinasLocation
    290Posts

    Re: Crack main 1.04M and 1.04N

    chris, how to crack global mu main.exe??

  9. #9
    Account Upgraded | Title Enabled! chris05 is offline
    MemberRank
    Aug 2005 Join Date
    Vinhedo/SP - BrasilLocation
    501Posts

    Re: Crack main 1.04M and 1.04N

    JoniverPH,

    1 - Use this guide to crack Global main.exe.
    2 - Use guide to fix create char
    3 - And use the Holy guide to bypassing website

  10. #10
    Apprentice jose4090 is offline
    MemberRank
    Mar 2009 Join Date
    10Posts

    Re: Crack main 1.04M and 1.04N

    no tienen el main disponible ??



Advertisement