下断MESSAGEBOX后
76D9EA71 > 8BFF mov edi,edi
76D9EA73 55 push ebp
76D9EA74 8BEC mov ebp,esp
76D9EA76 833D 749ADA76 0>cmp dword ptr ds:[0x76DA9A74],0x0
76D9EA7D 74 24 je XUSER32.76D9EAA3
76D9EA7F 64:A1 18000000 mov eax,dword ptr fs:[0x18]
76D9EA85 6A 00 push 0x0
76D9EA87 FF70 24 push dword ptr ds:[eax+0x24]
76D9EA8A 68 A49EDA76 push USER32.76DA9EA4
76D9EA8F FF15 3414D476 call dword ptr ds:[<&KERNEL32.Interlocke>; kernel32.InterlockedCompareExchange
76D9EA95 85C0 test eax,eax
76D9EA97 75 0A jnz XUSER32.76D9EAA3
76D9EA99 C705 A09EDA76 0>mov dword ptr ds:[0x76DA9EA0],0x1
76D9EAA3 6A 00 push 0x0
76D9EAA5 FF75 14 push dword ptr ss:[ebp+0x14]
76D9EAA8 FF75 10 push dword ptr ss:[ebp+0x10]
76D9EAAB FF75 0C push dword ptr ss:[ebp+0xC]
76D9EAAE FF75 08 push dword ptr ss:[ebp+0x8]
76D9EAB1 E8 73FFFFFF call USER32.MessageBoxExA
估计是代码用JMP 跳转到76D9EA71。用IDA查找76D9EA71的相关信息,估计要2个小时才能找完。OA好像也找不到76D9EA71的信息。把代码向上看了,也没有找到。如何是好
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!