Description: 破解补丁

Authors: Copyright (C) 2016

Version: 1.0.0.0

Architecture: 32-bit

Operating System: Windows NT

SHA256: e1da0e01b3e3e5b25498ae13865b196e

File Size: 703.0 KB

Uploaded At: April 6, 2026, 1:08 a.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, WriteProcessMemory

Exported Functions

  • MaiSfDummyEp (Ordinal: 1, Address: 0x15a40)
  • M0 (Ordinal: 2, Address: 0x25a0)
  • M1 (Ordinal: 3, Address: 0x29f0)
  • M10 (Ordinal: 4, Address: 0x50c0)
  • M11 (Ordinal: 5, Address: 0x5510)
  • M12 (Ordinal: 6, Address: 0x5960)
  • M13 (Ordinal: 7, Address: 0x5db0)
  • M14 (Ordinal: 8, Address: 0x6200)
  • M15 (Ordinal: 9, Address: 0x6650)
  • M2 (Ordinal: 10, Address: 0x2e40)
  • M3 (Ordinal: 11, Address: 0x3290)
  • M4 (Ordinal: 12, Address: 0x36e0)
  • M5 (Ordinal: 13, Address: 0x3b30)
  • M6 (Ordinal: 14, Address: 0x3f80)
  • M7 (Ordinal: 15, Address: 0x43d0)
  • M8 (Ordinal: 16, Address: 0x4820)
  • M9 (Ordinal: 17, Address: 0x4c70)
  • M_S0 (Ordinal: 18, Address: 0x6aa0)
  • M_S1 (Ordinal: 19, Address: 0xa1d0)
  • MaiDMFunc (Ordinal: 20, Address: 0x12770)
  • MmkeSureDirectoryPathExists (Ordinal: 21, Address: 0xd2c0)
  • _MmmAssociateContext@8 (Ordinal: 22, Address: 0x12750)

Imported DLLs & Functions

ADVAPI32.dll
  • RegOpenKeyExA (Address: 0x1004b004)
  • RegOpenKeyExW (Address: 0x1004b000)
GDI32.dll
  • EnumFontFamiliesExW (Address: 0x1004b00c)
imagehlp.dll
  • MakeSureDirectoryPathExists (Address: 0x1004b258)
IMM32.dll
  • ImmAssociateContext (Address: 0x1004b014)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x1004b178)
  • CloseHandle (Address: 0x1004b054)
  • CompareStringW (Address: 0x1004b1e8)
  • ConnectNamedPipe (Address: 0x1004b0a4)
  • CreateDirectoryW (Address: 0x1004b0d0)
  • CreateEventW (Address: 0x1004b140)
  • CreateFileA (Address: 0x1004b040)
  • CreateFileW (Address: 0x1004b044)
  • CreateNamedPipeA (Address: 0x1004b0ac)
  • CreatePipe (Address: 0x1004b0b8)
  • CreateProcessA (Address: 0x1004b09c)
  • CreateProcessW (Address: 0x1004b048)
  • CreateSemaphoreW (Address: 0x1004b164)
  • CreateThread (Address: 0x1004b214)
  • CreateToolhelp32Snapshot (Address: 0x1004b090)
  • DecodePointer (Address: 0x1004b11c)
  • DeleteCriticalSection (Address: 0x1004b16c)
  • DeleteFileW (Address: 0x1004b218)
  • DisconnectNamedPipe (Address: 0x1004b0a8)
  • EncodePointer (Address: 0x1004b118)
  • EnterCriticalSection (Address: 0x1004b110)
  • EnumSystemLocalesW (Address: 0x1004b1fc)
  • ExitProcess (Address: 0x1004b03c)
  • FatalAppExitA (Address: 0x1004b170)
  • FindClose (Address: 0x1004b0cc)
  • FindFirstFileW (Address: 0x1004b0c8)
  • FindNextFileW (Address: 0x1004b0c4)
  • FlushFileBuffers (Address: 0x1004b184)
  • FreeEnvironmentStringsW (Address: 0x1004b1b0)
  • FreeLibrary (Address: 0x1004b1cc)
  • GetACP (Address: 0x1004b1b8)
  • GetCommandLineA (Address: 0x1004b120)
  • GetConsoleCP (Address: 0x1004b18c)
  • GetConsoleMode (Address: 0x1004b190)
  • GetCPInfo (Address: 0x1004b1c0)
  • GetCurrentProcess (Address: 0x1004b144)
  • GetCurrentProcessId (Address: 0x1004b060)
  • GetCurrentThread (Address: 0x1004b168)
  • GetCurrentThreadId (Address: 0x1004b064)
  • GetDateFormatW (Address: 0x1004b1e0)
  • GetEnvironmentStringsW (Address: 0x1004b1ac)
  • GetFileAttributesW (Address: 0x1004b104)
  • GetFileSize (Address: 0x1004b100)
  • GetFileType (Address: 0x1004b198)
  • GetLastError (Address: 0x1004b0f4)
  • GetLocaleInfoW (Address: 0x1004b1f0)
  • GetModuleFileNameA (Address: 0x1004b1a0)
  • GetModuleFileNameW (Address: 0x1004b020)
  • GetModuleHandleA (Address: 0x1004b084)
  • GetModuleHandleExW (Address: 0x1004b174)
  • GetModuleHandleW (Address: 0x1004b04c)
  • GetOEMCP (Address: 0x1004b1bc)
  • GetPrivateProfileStringW (Address: 0x1004b08c)
  • GetProcAddress (Address: 0x1004b024)
  • GetProcessHeap (Address: 0x1004b19c)
  • GetStartupInfoW (Address: 0x1004b15c)
  • GetStdHandle (Address: 0x1004b194)
  • GetStringTypeW (Address: 0x1004b208)
  • GetSystemTimeAsFileTime (Address: 0x1004b1a8)
  • GetTempPathW (Address: 0x1004b0b0)
  • GetThreadContext (Address: 0x1004b06c)
  • GetTickCount (Address: 0x1004b160)
  • GetTimeFormatW (Address: 0x1004b1e4)
  • GetUserDefaultLCID (Address: 0x1004b1f8)
  • HeapAlloc (Address: 0x1004b124)
  • HeapCreate (Address: 0x1004b0e4)
  • HeapDestroy (Address: 0x1004b12c)
  • HeapFree (Address: 0x1004b130)
  • HeapReAlloc (Address: 0x1004b1c4)
  • HeapSize (Address: 0x1004b20c)
  • InitializeCriticalSection (Address: 0x1004b0e8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1004b13c)
  • IsDebuggerPresent (Address: 0x1004b050)
  • IsProcessorFeaturePresent (Address: 0x1004b108)
  • IsValidCodePage (Address: 0x1004b1b4)
  • IsValidLocale (Address: 0x1004b1f4)
  • K32EnumProcessModules (Address: 0x1004b030)
  • K32GetModuleFileNameExW (Address: 0x1004b034)
  • LCMapStringW (Address: 0x1004b1ec)
  • LeaveCriticalSection (Address: 0x1004b114)
  • LoadLibraryA (Address: 0x1004b028)
  • LoadLibraryExW (Address: 0x1004b1d0)
  • LoadLibraryW (Address: 0x1004b02c)
  • MapViewOfFile (Address: 0x1004b0f0)
  • MoveFileExW (Address: 0x1004b0ec)
  • MultiByteToWideChar (Address: 0x1004b17c)
  • OpenFileMappingW (Address: 0x1004b078)
  • OpenThread (Address: 0x1004b068)
  • OutputDebugStringW (Address: 0x1004b204)
  • QueryPerformanceCounter (Address: 0x1004b1a4)
  • RaiseException (Address: 0x1004b128)
  • ReadConsoleW (Address: 0x1004b200)
  • ReadFile (Address: 0x1004b0a0)
  • ReadProcessMemory (Address: 0x1004b07c)
  • RemoveDirectoryW (Address: 0x1004b0c0)
  • ResumeThread (Address: 0x1004b0dc)
  • RtlUnwind (Address: 0x1004b10c)
  • SetConsoleCtrlHandler (Address: 0x1004b1c8)
  • SetEndOfFile (Address: 0x1004b0fc)
  • SetFilePointer (Address: 0x1004b0f8)
  • SetFilePointerEx (Address: 0x1004b1d8)
  • SetHandleInformation (Address: 0x1004b0bc)
  • SetLastError (Address: 0x1004b138)
  • SetProcessDEPPolicy (Address: 0x1004b088)
  • SetStdHandle (Address: 0x1004b1d4)
  • SetThreadContext (Address: 0x1004b070)
  • SetUnhandledExceptionFilter (Address: 0x1004b058)
  • Sleep (Address: 0x1004b05c)
  • SuspendThread (Address: 0x1004b0e0)
  • TerminateProcess (Address: 0x1004b148)
  • Thread32First (Address: 0x1004b094)
  • Thread32Next (Address: 0x1004b098)
  • TlsAlloc (Address: 0x1004b14c)
  • TlsFree (Address: 0x1004b158)
  • TlsGetValue (Address: 0x1004b150)
  • TlsSetValue (Address: 0x1004b154)
  • UnhandledExceptionFilter (Address: 0x1004b134)
  • UnmapViewOfFile (Address: 0x1004b080)
  • VirtualAlloc (Address: 0x1004b074)
  • VirtualAllocEx (Address: 0x1004b0d8)
  • VirtualFree (Address: 0x1004b210)
  • VirtualProtect (Address: 0x1004b038)
  • VirtualProtectEx (Address: 0x1004b0d4)
  • WaitForSingleObject (Address: 0x1004b0b4)
  • WideCharToMultiByte (Address: 0x1004b180)
  • WriteConsoleW (Address: 0x1004b1dc)
  • WriteFile (Address: 0x1004b188)
  • WriteProcessMemory (Address: 0x1004b01c)
USER32.dll
  • CreateWindowExA (Address: 0x1004b238)
  • LoadStringA (Address: 0x1004b234)
  • MessageBoxA (Address: 0x1004b224)
  • MessageBoxW (Address: 0x1004b230)
  • RegisterClassA (Address: 0x1004b228)
  • RegisterClassExA (Address: 0x1004b220)
  • wsprintfW (Address: 0x1004b22c)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x1004b248)
  • GetFileVersionInfoW (Address: 0x1004b240)
  • VerQueryValueW (Address: 0x1004b244)
WS2_32.dll
  • htonl (Address: 0x1004b250)