Description: 破解补丁
Authors: Copyright (C) 2016
Version: 1.0.0.0
Architecture: 32-bit
Operating System: Windows NT
SHA256: e1da0e01b3e3e5b25498ae13865b196e
File Size: 703.0 KB
Uploaded At: April 6, 2026, 1:08 a.m.
Views: 8
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, WriteProcessMemory
Exported Functions
- MaiSfDummyEp (Ordinal: 1, Address: 0x15a40)
- M0 (Ordinal: 2, Address: 0x25a0)
- M1 (Ordinal: 3, Address: 0x29f0)
- M10 (Ordinal: 4, Address: 0x50c0)
- M11 (Ordinal: 5, Address: 0x5510)
- M12 (Ordinal: 6, Address: 0x5960)
- M13 (Ordinal: 7, Address: 0x5db0)
- M14 (Ordinal: 8, Address: 0x6200)
- M15 (Ordinal: 9, Address: 0x6650)
- M2 (Ordinal: 10, Address: 0x2e40)
- M3 (Ordinal: 11, Address: 0x3290)
- M4 (Ordinal: 12, Address: 0x36e0)
- M5 (Ordinal: 13, Address: 0x3b30)
- M6 (Ordinal: 14, Address: 0x3f80)
- M7 (Ordinal: 15, Address: 0x43d0)
- M8 (Ordinal: 16, Address: 0x4820)
- M9 (Ordinal: 17, Address: 0x4c70)
- M_S0 (Ordinal: 18, Address: 0x6aa0)
- M_S1 (Ordinal: 19, Address: 0xa1d0)
- MaiDMFunc (Ordinal: 20, Address: 0x12770)
- MmkeSureDirectoryPathExists (Ordinal: 21, Address: 0xd2c0)
- _MmmAssociateContext@8 (Ordinal: 22, Address: 0x12750)
Imported DLLs & Functions
ADVAPI32.dll
- RegOpenKeyExA (Address: 0x1004b004)
- RegOpenKeyExW (Address: 0x1004b000)
GDI32.dll
- EnumFontFamiliesExW (Address: 0x1004b00c)
imagehlp.dll
- MakeSureDirectoryPathExists (Address: 0x1004b258)
IMM32.dll
- ImmAssociateContext (Address: 0x1004b014)
KERNEL32.dll
- AreFileApisANSI (Address: 0x1004b178)
- CloseHandle (Address: 0x1004b054)
- CompareStringW (Address: 0x1004b1e8)
- ConnectNamedPipe (Address: 0x1004b0a4)
- CreateDirectoryW (Address: 0x1004b0d0)
- CreateEventW (Address: 0x1004b140)
- CreateFileA (Address: 0x1004b040)
- CreateFileW (Address: 0x1004b044)
- CreateNamedPipeA (Address: 0x1004b0ac)
- CreatePipe (Address: 0x1004b0b8)
- CreateProcessA (Address: 0x1004b09c)
- CreateProcessW (Address: 0x1004b048)
- CreateSemaphoreW (Address: 0x1004b164)
- CreateThread (Address: 0x1004b214)
- CreateToolhelp32Snapshot (Address: 0x1004b090)
- DecodePointer (Address: 0x1004b11c)
- DeleteCriticalSection (Address: 0x1004b16c)
- DeleteFileW (Address: 0x1004b218)
- DisconnectNamedPipe (Address: 0x1004b0a8)
- EncodePointer (Address: 0x1004b118)
- EnterCriticalSection (Address: 0x1004b110)
- EnumSystemLocalesW (Address: 0x1004b1fc)
- ExitProcess (Address: 0x1004b03c)
- FatalAppExitA (Address: 0x1004b170)
- FindClose (Address: 0x1004b0cc)
- FindFirstFileW (Address: 0x1004b0c8)
- FindNextFileW (Address: 0x1004b0c4)
- FlushFileBuffers (Address: 0x1004b184)
- FreeEnvironmentStringsW (Address: 0x1004b1b0)
- FreeLibrary (Address: 0x1004b1cc)
- GetACP (Address: 0x1004b1b8)
- GetCommandLineA (Address: 0x1004b120)
- GetConsoleCP (Address: 0x1004b18c)
- GetConsoleMode (Address: 0x1004b190)
- GetCPInfo (Address: 0x1004b1c0)
- GetCurrentProcess (Address: 0x1004b144)
- GetCurrentProcessId (Address: 0x1004b060)
- GetCurrentThread (Address: 0x1004b168)
- GetCurrentThreadId (Address: 0x1004b064)
- GetDateFormatW (Address: 0x1004b1e0)
- GetEnvironmentStringsW (Address: 0x1004b1ac)
- GetFileAttributesW (Address: 0x1004b104)
- GetFileSize (Address: 0x1004b100)
- GetFileType (Address: 0x1004b198)
- GetLastError (Address: 0x1004b0f4)
- GetLocaleInfoW (Address: 0x1004b1f0)
- GetModuleFileNameA (Address: 0x1004b1a0)
- GetModuleFileNameW (Address: 0x1004b020)
- GetModuleHandleA (Address: 0x1004b084)
- GetModuleHandleExW (Address: 0x1004b174)
- GetModuleHandleW (Address: 0x1004b04c)
- GetOEMCP (Address: 0x1004b1bc)
- GetPrivateProfileStringW (Address: 0x1004b08c)
- GetProcAddress (Address: 0x1004b024)
- GetProcessHeap (Address: 0x1004b19c)
- GetStartupInfoW (Address: 0x1004b15c)
- GetStdHandle (Address: 0x1004b194)
- GetStringTypeW (Address: 0x1004b208)
- GetSystemTimeAsFileTime (Address: 0x1004b1a8)
- GetTempPathW (Address: 0x1004b0b0)
- GetThreadContext (Address: 0x1004b06c)
- GetTickCount (Address: 0x1004b160)
- GetTimeFormatW (Address: 0x1004b1e4)
- GetUserDefaultLCID (Address: 0x1004b1f8)
- HeapAlloc (Address: 0x1004b124)
- HeapCreate (Address: 0x1004b0e4)
- HeapDestroy (Address: 0x1004b12c)
- HeapFree (Address: 0x1004b130)
- HeapReAlloc (Address: 0x1004b1c4)
- HeapSize (Address: 0x1004b20c)
- InitializeCriticalSection (Address: 0x1004b0e8)
- InitializeCriticalSectionAndSpinCount (Address: 0x1004b13c)
- IsDebuggerPresent (Address: 0x1004b050)
- IsProcessorFeaturePresent (Address: 0x1004b108)
- IsValidCodePage (Address: 0x1004b1b4)
- IsValidLocale (Address: 0x1004b1f4)
- K32EnumProcessModules (Address: 0x1004b030)
- K32GetModuleFileNameExW (Address: 0x1004b034)
- LCMapStringW (Address: 0x1004b1ec)
- LeaveCriticalSection (Address: 0x1004b114)
- LoadLibraryA (Address: 0x1004b028)
- LoadLibraryExW (Address: 0x1004b1d0)
- LoadLibraryW (Address: 0x1004b02c)
- MapViewOfFile (Address: 0x1004b0f0)
- MoveFileExW (Address: 0x1004b0ec)
- MultiByteToWideChar (Address: 0x1004b17c)
- OpenFileMappingW (Address: 0x1004b078)
- OpenThread (Address: 0x1004b068)
- OutputDebugStringW (Address: 0x1004b204)
- QueryPerformanceCounter (Address: 0x1004b1a4)
- RaiseException (Address: 0x1004b128)
- ReadConsoleW (Address: 0x1004b200)
- ReadFile (Address: 0x1004b0a0)
- ReadProcessMemory (Address: 0x1004b07c)
- RemoveDirectoryW (Address: 0x1004b0c0)
- ResumeThread (Address: 0x1004b0dc)
- RtlUnwind (Address: 0x1004b10c)
- SetConsoleCtrlHandler (Address: 0x1004b1c8)
- SetEndOfFile (Address: 0x1004b0fc)
- SetFilePointer (Address: 0x1004b0f8)
- SetFilePointerEx (Address: 0x1004b1d8)
- SetHandleInformation (Address: 0x1004b0bc)
- SetLastError (Address: 0x1004b138)
- SetProcessDEPPolicy (Address: 0x1004b088)
- SetStdHandle (Address: 0x1004b1d4)
- SetThreadContext (Address: 0x1004b070)
- SetUnhandledExceptionFilter (Address: 0x1004b058)
- Sleep (Address: 0x1004b05c)
- SuspendThread (Address: 0x1004b0e0)
- TerminateProcess (Address: 0x1004b148)
- Thread32First (Address: 0x1004b094)
- Thread32Next (Address: 0x1004b098)
- TlsAlloc (Address: 0x1004b14c)
- TlsFree (Address: 0x1004b158)
- TlsGetValue (Address: 0x1004b150)
- TlsSetValue (Address: 0x1004b154)
- UnhandledExceptionFilter (Address: 0x1004b134)
- UnmapViewOfFile (Address: 0x1004b080)
- VirtualAlloc (Address: 0x1004b074)
- VirtualAllocEx (Address: 0x1004b0d8)
- VirtualFree (Address: 0x1004b210)
- VirtualProtect (Address: 0x1004b038)
- VirtualProtectEx (Address: 0x1004b0d4)
- WaitForSingleObject (Address: 0x1004b0b4)
- WideCharToMultiByte (Address: 0x1004b180)
- WriteConsoleW (Address: 0x1004b1dc)
- WriteFile (Address: 0x1004b188)
- WriteProcessMemory (Address: 0x1004b01c)
USER32.dll
- CreateWindowExA (Address: 0x1004b238)
- LoadStringA (Address: 0x1004b234)
- MessageBoxA (Address: 0x1004b224)
- MessageBoxW (Address: 0x1004b230)
- RegisterClassA (Address: 0x1004b228)
- RegisterClassExA (Address: 0x1004b220)
- wsprintfW (Address: 0x1004b22c)
VERSION.dll
- GetFileVersionInfoSizeW (Address: 0x1004b248)
- GetFileVersionInfoW (Address: 0x1004b240)
- VerQueryValueW (Address: 0x1004b244)
WS2_32.dll
- htonl (Address: 0x1004b250)