代码如下:
.text:10000690 push ebp
.text:10000691 mov ebp, esp
.text:10000693 push ecx
.text:10000694 push ebx
.text:10000695 push esi
.text:10000696 push edi
.text:10000697 mov [ebp+var_4], 0
.text:1000069E mov eax, dr7
.text:100006A1 cmp eax, 100010000000000000011111110000b
.text:100006A6 jnz short loc_100006CD
.text:100006A6
.text:100006A8 mov eax, cr4
.text:100006AB and eax, 11111110111b
.text:100006B0 mov cr4, eax
.text:100006B3 mov eax, 10000000000b
.text:100006B8 mov dr7, eax
.text:100006BB mov eax, 0
.text:100006C0 mov dr3, eax
.text:100006C3 mov dr2, eax
.text:100006C6 mov [ebp+var_4], 1
.text:100006C6
.text:100006CD
.text:100006CD loc_100006CD: ; CODE XREF: sub_10000690+16j
.text:100006CD pop edi
.text:100006CE pop esi
.text:100006CF pop ebx
.text:100006D0 mov esp, ebp
.text:100006D2 pop ebp
.text:100006D3 retn
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课