-
-
[原创]softDefender破解
-
发表于:
2015-5-5 23:31
5374
-
00412A4A A1 D4D24600 mov eax, dword ptr [0x46D2D4]
00412A4F 85C0 test eax, eax
00412A51 74 4F je short 00412AA2 ;下断,修改z标志位
00412A53 68 14DD4500 push 0045DD14 ; registered to:
0040F088 897E 70 mov dword ptr [esi+0x70], edi
0040F08B C746 68 E7CB000>mov dword ptr [esi+0x68], 0xCBE7
0040F092 897E 64 mov dword ptr [esi+0x64], edi
0040F095 893D D4D24600 mov dword ptr [0x46D2D4], edi ;这里初始值
0040F09B 8BC6 mov eax, esi
0041265D 68 D0DC4500 push 0045DCD0 ; reg.dat
00412662 E8 E9760200 call 00439D50
00412667 8D4C24 64 lea ecx, dword ptr [esp+0x64]
0041266B E8 60970000 call 0041BDD0
00412670 8D4C24 60 lea ecx, dword ptr [esp+0x60]
00412674 E8 97980000 call 0041BF10
00412679 84C0 test al, al
0041267B 0F84 75030000 je 004129F6 ;这里的je不能跳 nop掉.
00412911 8D4C24 24 lea ecx, dword ptr [esp+0x24]
00412915 C68424 20020000>mov byte ptr [esp+0x220], 0xB
0041291D 895424 4C mov dword ptr [esp+0x4C], edx
00412921 E8 4A8B0000 call 0041B470 ; ? 卡住
00412926 85C0 test eax, eax
00412928 74 67 je short 00412991
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课