OD载入
03857000 > 60 pushad //停在这里
03857001 72 03 jb short 03857006
03857003 73 01 jnb short 03857006
03857005 EB 0B jmp short 03857012
03857007 FA cli
03857008 D3C7 rol edi, cl
0385700A 8BFA mov edi, edx
0385700C 47 inc edi
0385700D 47 inc edi
0385700E 66:8BEB mov bp, bx
03857011 87FD xchg ebp, edi
03857013 70 06 jo short 0385701B
03857015 81D7 FFFA9501 adc edi, 0195FAFF
0385701B EB 01 jmp short 0385701E
0385701D E8 F950E801 call 056DC11B
03857022 0000 add [eax], al
03857024 0077 83 add [edi-7D], dh
03857027 C40458 les eax, [eax+ebx*2]
0385702A 85EF test edi, ebp
0385702C E8 01000000 call 03857032
我F9运行
03868B1F CD 01 int 1 //停在这里 03868B21 40 inc eax
03868B22 40 inc eax
03868B23 0BC0 or eax, eax
03868B25 75 05 jnz short 03868B2C
03868B27 90 nop
03868B28 90 nop
03868B29 90 nop
03868B2A 90 nop
03868B2B 61 popad
03868B2C 33C0 xor eax, eax
03868B2E 64:8F00 pop dword ptr fs:[eax]
03868B31 58 pop eax
03868B32 60 pushad
03868B33 E8 00000000 call 03868B38
在CODE段下f2断点,SHIFT+F2运行
03867CE2 AB stos dword ptr es:[edi]//来到这里
03867CE3 FFB5 30FE4000 push dword ptr [ebp+40FE30]
03867CE9 50 push eax
03867CEA 8B85 00014100 mov eax, [ebp+410100]
03867CF0 0FB600 movzx eax, byte ptr [eax]
03867CF3 83E8 33 sub eax, 33
03867CF6 3D 99000000 cmp eax, 99
03867CFB 74 10 je short 03867D0D
03867CFD 90 nop
03867CFE 90 nop
03867CFF 90 nop
03867D00 90 nop
03867D01 58 pop eax
03867D02 FF95 00014100 call [ebp+410100]
03867D08 EB 17 jmp short 03867D21
这个是什么版本得壳啊,怎么脱,晕死
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)