下载地址:http://www.dayanzai.me/bb-flashback.html
===============================================
00403144 > $ /EB 10 jmp short 原版Flas.00403156
00403146 |66 db 66 ; CHAR 'f'
00403147 |62 db 62 ; CHAR 'b'
00403148 |3A db 3A ; CHAR ':'
00403149 |43 db 43 ; CHAR 'C'
0040314A |2B db 2B ; CHAR '+'
0040314B |2B db 2B ; CHAR '+'
0040314C |48 db 48 ; CHAR 'H'
0040314D |4F db 4F ; CHAR 'O'
0040314E |4F db 4F ; CHAR 'O'
0040314F |4B db 4B ; CHAR 'K'
00403150 |90 nop
00403151 |E9 db E9
00403152 . |ACB09600 dd offset 原版Flas.___CPPdebugHook
00403156 > \A1 9FB09600 mov eax, dword ptr ds:[0x96B09F]
0040315B . C1E0 02 shl eax, 0x2
0040315E . A3 A3B09600 mov dword ptr ds:[0x96B0A3], eax
00403163 . 52 push edx
00403164 . 6A 00 push 0x0 ; /pModule = NULL
00403166 . E8 FD665600 call <jmp.&KERNEL32.GetModuleHandleW> ; \GetModuleHandleW
====================================================
因为手里有原版,
bp GetModuleHandleW
21次F9
=====================================================
00403144 . /EB 10 jmp short FlashBac.00403156 这里是真实的OEP
00403146 |66 db 66 ; CHAR 'f'
00403147 |62 db 62 ; CHAR 'b'
00403148 |3A db 3A ; CHAR ':'
00403149 |43 db 43 ; CHAR 'C'
0040314A |2B db 2B ; CHAR '+'
0040314B |2B db 2B ; CHAR '+'
0040314C |48 db 48 ; CHAR 'H'
0040314D |4F db 4F ; CHAR 'O'
0040314E |4F db 4F ; CHAR 'O'
0040314F |4B db 4B ; CHAR 'K'
00403150 |90 nop
00403151 .-|E9 ACB09600 jmp FlashBac.00D6E202
00403156 > \A1 9FB09600 mov eax, dword ptr ds:[0x96B09F]
0040315B . C1E0 02 shl eax, 0x2
0040315E . A3 A3B09600 mov dword ptr ds:[0x96B0A3], eax
00403163 . 52 push edx
00403164 . 6A 00 push 0x0 ; /pModule = NULL
00403166 . E8 FD665600 call FlashBac.00969868 ; \GetModuleHandleW 总是来到这里,错过了前面的OEP
0040316B . 8BD0 mov edx, eax
0040316D . E8 36F85500 call FlashBac.009629A8
00403172 . 5A pop edx
00403173 . E8 3C715600 call FlashBac.0096A2B4 ; jmp 到 cc32120m.___CRTL_MEM_UseBorMM
俺就想研究下人家的破解方法 跟我的破解方法有何不同?高明在何处,另外看看那位同志是如何汉化的?
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课