最近在破解一个小软件 看样子是本地验证的 而且没有弹出错误窗口的
发现跳转全都是向下跳的 不知道该如何下手
上来求救~~
脱过ASPack 2.12 -> Alexey Solodovnikov
Borland Delphi 6.0 - 7.0 编写
内容如下
0046E000 832D B4254700 0>sub dword ptr [4725B4], 1
0046E007 0F83 87000000 jnb 0046E094
0046E00D E8 564AF9FF call 00402A68
0046E012 C605 08F04600 0>mov byte ptr [46F008], 2
0046E019 C705 14204700 F>mov dword ptr [472014], <jmp.&kernel>
0046E023 C705 18204700 0>mov dword ptr [472018], <jmp.&kernel>
0046E02D C605 4A204700 0>mov byte ptr [47204A], 2
0046E034 C705 00204700 5>mov dword ptr [472000], 00405554
0046E03E E8 ED55F9FF call 00403630
0046E043 84C0 test al, al
0046E045 74 05 je short 0046E04C
0046E047 E8 1456F9FF call 00403660
0046E04C E8 D356F9FF call 00403724
0046E051 66:C705 5020470>mov word ptr [472050], 0D7B0
0046E05A 66:C705 1C22470>mov word ptr [47221C], 0D7B0
0046E063 66:C705 E823470>mov word ptr [4723E8], 0D7B0
0046E06C E8 E331F9FF call <jmp.&kernel32.GetCommandLineA>
0046E071 A3 3C204700 mov dword ptr [47203C], eax
0046E076 E8 9132F9FF call 0040130C
0046E07B A3 38204700 mov dword ptr [472038], eax
0046E080 E8 D382F9FF call <jmp.&kernel32.GetACP>
0046E085 A3 B8254700 mov dword ptr [4725B8], eax
0046E08A E8 7532F9FF call <jmp.&kernel32.GetCurrentThreadI>
0046E08F A3 30204700 mov dword ptr [472030], eax
0046E094 C3 retn
0046E095 8D40 00 lea eax, dword ptr [eax]
0046E098 832D FC474700 0>sub dword ptr [4747FC], 1
0046E09F 73 07 jnb short 0046E0A8
0046E0A1 33C0 xor eax, eax
0046E0A3 A3 00484700 mov dword ptr [474800], eax
0046E0A8 C3 retn
0046E0A9 8D40 00 lea eax, dword ptr [eax]
0046E0AC 55 push ebp
0046E0AD 8BEC mov ebp, esp
0046E0AF 33C0 xor eax, eax
0046E0B1 55 push ebp
0046E0B2 68 1EE14600 push 0046E11E
0046E0B7 64:FF30 push dword ptr fs:[eax]
0046E0BA 64:8920 mov dword ptr fs:[eax], esp
0046E0BD 832D 14494700 0>sub dword ptr [474914], 1
0046E0C4 73 4A jnb short 0046E110
0046E0C6 B8 0CD84000 mov eax, 0040D80C
0046E0CB E8 5463F9FF call 00404424
0046E0D0 B8 F8D84000 mov eax, 0040D8F8 ; (
0046E0D5 E8 7263F9FF call 0040444C
0046E0DA 803D F1474700 0>cmp byte ptr [4747F1], 0
0046E0E1 74 0F je short 0046E0F2
0046E0E3 B8 18F84600 mov eax, 0046F818
0046E0E8 BA 30E14600 mov edx, 0046E130 ; 0x
0046E0ED E8 E665F9FF call 004046D8
0046E0F2 E8 B1E1F9FF call 0040C2A8
0046E0F7 B8 4CCF4000 mov eax, 0040CF4C
0046E0FC E8 BF7BF9FF call 00405CC0
0046E101 E8 A6E2F9FF call 0040C3AC
0046E106 E8 19F1F9FF call 0040D224
0046E10B E8 70EAF9FF call 0040CB80
0046E110 33C0 xor eax, eax
0046E112 5A pop edx
0046E113 59 pop ecx
0046E114 59 pop ecx
0046E115 64:8910 mov dword ptr fs:[eax], edx
0046E118 68 25E14600 push 0046E125
0046E11D C3 retn
0046E11E - E9 C95EF9FF jmp 00403FEC
0046E123 ^ EB F8 jmp short 0046E11D
0046E125 5D pop ebp
0046E126 C3 retn
0046E127 00FF add bh, bh
0046E129 FFFF ??? ; Unknown command
0046E12B FF02 inc dword ptr [edx]
0046E12D 0000 add byte ptr [eax], al
0046E12F 0030 add byte ptr [eax], dh
0046E131 78 00 js short 0046E133
0046E133 0083 2D7C5247 add byte ptr [ebx+47527C2D], al
0046E139 0001 add byte ptr [ecx], al
0046E13B 73 05 jnb short 0046E142
0046E13D E8 D6FFF9FF call 0040E118
0046E142 C3 retn
0046E143 90 nop
0046E144 55 push ebp
0046E145 8BEC mov ebp, esp
0046E147 33C0 xor eax, eax
0046E149 55 push ebp
0046E14A 68 E5E14600 push 0046E1E5
0046E14F 64:FF30 push dword ptr fs:[eax]
0046E152 64:8920 mov dword ptr fs:[eax], esp
0046E155 832D A0524700 0>sub dword ptr [4752A0], 1
0046E15C 73 79 jnb short 0046E1D7
0046E15E B8 80524700 mov eax, 00475280 ; \n
0046E163 E8 8427FAFF call 004108EC
0046E168 B8 F4EE4000 mov eax, 0040EEF4 ; Entry address
0046E16D A3 90524700 mov dword ptr [475290], eax
0046E172 B8 1CEB4000 mov eax, 0040EB1C ; Entry address
0046E177 A3 94524700 mov dword ptr [475294], eax
0046E17C BA 2CEA4000 mov edx, 0040EA2C ; Entry address
0046E181 8915 98524700 mov dword ptr [475298], edx
0046E187 A3 9C524700 mov dword ptr [47529C], eax
0046E18C B8 F4F14000 mov eax, 0040F1F4 ; Entry address
0046E191 8B15 84124700 mov edx, dword ptr [471284] ; meike2.0046F00C
0046E197 8902 mov dword ptr [edx], eax
0046E199 B8 E0054100 mov eax, 004105E0
0046E19E 8B15 A4104700 mov edx, dword ptr [4710A4] ; meike2.0046F010
0046E1A4 8902 mov dword ptr [edx], eax
0046E1A6 B8 08F54000 mov eax, 0040F508 ; Entry address
0046E1AB 8B15 F0124700 mov edx, dword ptr [4712F0] ; meike2.0046F014
0046E1B1 8902 mov dword ptr [edx], eax
0046E1B3 B8 3CF84000 mov eax, 0040F83C ; Entry address
0046E1B8 8B15 10144700 mov edx, dword ptr [471410] ; meike2.0046F018
0046E1BE 8902 mov dword ptr [edx], eax
0046E1C0 B8 5CFF4000 mov eax, 0040FF5C ; Entry address
0046E1C5 8B15 0C134700 mov edx, dword ptr [47130C] ; meike2.0046F01C
0046E1CB 8902 mov dword ptr [edx], eax
0046E1CD 68 A8524700 push 004752A8
0046E1D2 E8 4D85F9FF call <jmp.&kernel32.InitializeCritica>
0046E1D7 33C0 xor eax, eax
0046E1D9 5A pop edx
0046E1DA 59 pop ecx
0046E1DB 59 pop ecx
0046E1DC 64:8910 mov dword ptr fs:[eax], edx
0046E1DF 68 ECE14600 push 0046E1EC
0046E1E4 C3 retn
0046E1E5 - E9 025EF9FF jmp 00403FEC
0046E1EA ^ EB F8 jmp short 0046E1E4
0046E1EC 5D pop ebp
0046E1ED C3 retn
0046E1EE 8BC0 mov eax, eax
0046E1F0 832D C0524700 0>sub dword ptr [4752C0], 1
0046E1F7 C3 retn
0046E1F8 55 push ebp
0046E1F9 8BEC mov ebp, esp
0046E1FB 33C0 xor eax, eax
0046E1FD 55 push ebp
0046E1FE 68 81E24600 push 0046E281
0046E203 64:FF30 push dword ptr fs:[eax]
0046E206 64:8920 mov dword ptr fs:[eax], esp
0046E209 832D D0524700 0>sub dword ptr [4752D0], 1
0046E210 73 61 jnb short 0046E273
0046E212 E8 29BCFAFF call 00419E40
0046E217 B8 1CB14100 mov eax, 0041B11C
0046E21C E8 8F7AF9FF call 00405CB0
0046E221 B2 01 mov dl, 1
0046E223 A1 847F4000 mov eax, dword ptr [407F84]
0046E228 E8 BBF1F9FF call 0040D3E8
0046E22D 8BD0 mov edx, eax
0046E22F 85D2 test edx, edx
0046E231 74 03 je short 0046E236
0046E233 83EA D4 sub edx, -2C
0046E236 B8 C4524700 mov eax, 004752C4
0046E23B E8 F87BF9FF call 00405E38
0046E240 B2 01 mov dl, 1
0046E242 A1 8C2E4100 mov eax, dword ptr [412E8C]
0046E247 E8 B850FAFF call 00413304
0046E24C A3 D8524700 mov dword ptr [4752D8], eax
0046E251 B2 01 mov dl, 1
0046E253 A1 E01E4100 mov eax, dword ptr [411EE0]
0046E258 E8 E361FAFF call 00414440
0046E25D A3 D4524700 mov dword ptr [4752D4], eax
0046E262 B2 01 mov dl, 1
0046E264 A1 E01E4100 mov eax, dword ptr [411EE0]
0046E269 E8 D261FAFF call 00414440
0046E26E A3 E0524700 mov dword ptr [4752E0], eax
0046E273 33C0 xor eax, eax
0046E275 5A pop edx
0046E276 59 pop ecx
0046E277 59 pop ecx
0046E278 64:8910 mov dword ptr fs:[eax], edx
0046E27B 68 88E24600 push 0046E288
0046E280 C3 retn
0046E281 - E9 665DF9FF jmp 00403FEC
0046E286 ^ EB F8 jmp short 0046E280
0046E288 5D pop ebp
0046E289 C3 retn
0046E28A 8BC0 mov eax, eax
0046E28C 832D 04534700 0>sub dword ptr [475304], 1
0046E293 C3 retn
0046E294 832D 2C534700 0>sub dword ptr [47532C], 1
0046E29B 73 05 jnb short 0046E2A2
0046E29D E8 42EBFAFF call 0041CDE4
0046E2A2 C3 retn
0046E2A3 90 nop
0046E2A4 832D 40534700 0>sub dword ptr [475340], 1
0046E2AB C3 retn
0046E2AC 832D 44534700 0>sub dword ptr [475344], 1
0046E2B3 C3 retn
0046E2B4 832D 4C534700 0>sub dword ptr [47534C], 1
0046E2BB 0F83 ED000000 jnb 0046E3AE
0046E2C1 E8 CA7FFBFF call 00426290
0046E2C6 68 64534700 push 00475364
0046E2CB E8 5484F9FF call <jmp.&kernel32.InitializeCritica>
0046E2D0 68 7C534700 push 0047537C
0046E2D5 E8 4A84F9FF call <jmp.&kernel32.InitializeCritica>
0046E2DA 6A 07 push 7
0046E2DC E8 1B86F9FF call <jmp.&GDI32.GetStockObject>
0046E2E1 A3 54534700 mov dword ptr [475354], eax
0046E2E6 6A 05 push 5
0046E2E8 E8 0F86F9FF call <jmp.&GDI32.GetStockObject>
0046E2ED A3 58534700 mov dword ptr [475358], eax
0046E2F2 6A 0D push 0D
0046E2F4 E8 0386F9FF call <jmp.&GDI32.GetStockObject>
0046E2F9 A3 5C534700 mov dword ptr [47535C], eax
0046E2FE 68 007F0000 push 7F00
0046E303 6A 00 push 0
0046E305 E8 5A8AF9FF call <jmp.&USER32.LoadIconA>
0046E30A A3 60534700 mov dword ptr [475360], eax
0046E30F E8 F87FFBFF call 0042630C
0046E314 66:B9 3000 mov cx, 30
0046E318 B2 01 mov dl, 1
0046E31A A1 E8E64100 mov eax, dword ptr [41E6E8]
0046E31F E8 AC04FBFF call 0041E7D0
0046E324 A3 94534700 mov dword ptr [475394], eax
0046E329 66:B9 1000 mov cx, 10
0046E32D B2 01 mov dl, 1
0046E32F A1 E8E64100 mov eax, dword ptr [41E6E8]
0046E334 E8 9704FBFF call 0041E7D0
0046E339 A3 98534700 mov dword ptr [475398], eax
0046E33E 66:B9 1000 mov cx, 10
0046E342 B2 01 mov dl, 1
0046E344 A1 50E74100 mov eax, dword ptr [41E750]
0046E349 E8 8204FBFF call 0041E7D0
0046E34E A3 9C534700 mov dword ptr [47539C], eax
0046E353 B2 01 mov dl, 1
0046E355 A1 8C644200 mov eax, dword ptr [42648C]
0046E35A E8 8981FBFF call 004264E8
0046E35F A3 A4534700 mov dword ptr [4753A4], eax
0046E364 B2 01 mov dl, 1
0046E366 A1 E01E4100 mov eax, dword ptr [411EE0]
0046E36B E8 D060FAFF call 00414440
0046E370 A3 D0FD4600 mov dword ptr [46FDD0], eax
0046E375 B2 01 mov dl, 1
0046E377 A1 E01E4100 mov eax, dword ptr [411EE0]
0046E37C E8 BF60FAFF call 00414440
0046E381 A3 A0534700 mov dword ptr [4753A0], eax
0046E386 B9 54F04100 mov ecx, 0041F054
0046E38B BA 64F04100 mov edx, 0041F064
0046E390 A1 80D74100 mov eax, dword ptr [41D780]
0046E395 E8 4E58FAFF call 00413BE8
0046E39A B9 5CF24100 mov ecx, 0041F25C
0046E39F BA 6CF24100 mov edx, 0041F26C
0046E3A4 A1 B0D84100 mov eax, dword ptr [41D8B0]
0046E3A9 E8 3A58FAFF call 00413BE8
0046E3AE C3 retn
0046E3AF 90 nop
0046E3B0 832D 64544700 0>sub dword ptr [475464], 1
0046E3B7 73 11 jnb short 0046E3CA
0046E3B9 B2 01 mov dl, 1
0046E3BB A1 08694200 mov eax, dword ptr [426908]
0046E3C0 E8 B385FBFF call 00426978
0046E3C5 A3 70544700 mov dword ptr [475470], eax
0046E3CA C3 retn
0046E3CB 90 nop
0046E3CC 832D 74544700 0>sub dword ptr [475474], 1
0046E3D3 C3 retn
0046E3D4 832D 78544700 0>sub dword ptr [475478], 1
0046E3DB 73 75 jnb short 0046E452
0046E3DD E8 5680F9FF call 00406438
0046E3E2 33D2 xor edx, edx
0046E3E4 8990 10000000 mov dword ptr [eax+10], edx
0046E3EA E8 4980F9FF call 00406438
0046E3EF 33D2 xor edx, edx
0046E3F1 8990 14000000 mov dword ptr [eax+14], edx
0046E3F7 E8 3C80F9FF call 00406438
0046E3FC 33D2 xor edx, edx
0046E3FE 8990 18000000 mov dword ptr [eax+18], edx
0046E404 E8 2F80F9FF call 00406438
0046E409 33D2 xor edx, edx
0046E40B 8990 1C000000 mov dword ptr [eax+1C], edx
0046E411 E8 2280F9FF call 00406438
0046E416 33D2 xor edx, edx
0046E418 8990 20000000 mov dword ptr [eax+20], edx
0046E41E E8 1580F9FF call 00406438
0046E423 33D2 xor edx, edx
0046E425 8990 24000000 mov dword ptr [eax+24], edx
0046E42B E8 0880F9FF call 00406438
0046E430 33D2 xor edx, edx
0046E432 8990 28000000 mov dword ptr [eax+28], edx
0046E438 E8 FB7FF9FF call 00406438
0046E43D 33D2 xor edx, edx
0046E43F 8990 2C000000 mov dword ptr [eax+2C], edx
0046E445 E8 EE7FF9FF call 00406438
0046E44A 33D2 xor edx, edx
0046E44C 8990 30000000 mov dword ptr [eax+30], edx
0046E452 C3 retn
0046E453 90 nop
0046E454 832D 80544700 0>sub dword ptr [475480], 1
0046E45B 73 29 jnb short 0046E486
0046E45D A1 506C4300 mov eax, dword ptr [436C50]
0046E462 E8 F555FAFF call 00413A5C
0046E467 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E46D A1 30D44200 mov eax, dword ptr [42D430]
0046E472 E8 3156FAFF call 00413AA8
0046E477 68 88E44600 push 0046E488 ; taskbarcreated
0046E47C E8 6389F9FF call <jmp.&USER32.RegisterClipboardFo>
0046E481 A3 7C544700 mov dword ptr [47547C], eax
0046E486 C3 retn
0046E487 005461 73 add byte ptr [ecx+73], dl
0046E48B 6B62 61 72 imul esp, dword ptr [edx+61], 72
0046E48F 43 inc ebx
0046E490 72 65 jb short 0046E4F7
0046E492 61 popad
0046E493 74 65 je short 0046E4FA
0046E495 64:0000 add byte ptr fs:[eax], al
0046E498 832D 84544700 0>sub dword ptr [475484], 1
0046E49F 73 33 jnb short 0046E4D4
0046E4A1 B8 A8DC4200 mov eax, 0042DCA8
0046E4A6 E8 A15FF9FF call 0040444C
0046E4AB E8 5CF7FBFF call 0042DC0C
0046E4B0 A1 506C4300 mov eax, dword ptr [436C50]
0046E4B5 E8 A255FAFF call 00413A5C
0046E4BA A1 506C4300 mov eax, dword ptr [436C50]
0046E4BF E8 3856FAFF call 00413AFC
0046E4C4 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E4CA A1 48D74200 mov eax, dword ptr [42D748]
0046E4CF E8 D455FAFF call 00413AA8
0046E4D4 C3 retn
0046E4D5 8D40 00 lea eax, dword ptr [eax]
0046E4D8 832D 94544700 0>sub dword ptr [475494], 1
0046E4DF 73 27 jnb short 0046E508
0046E4E1 68 0CE54600 push 0046E50C ; delphi picture
0046E4E6 E8 F188F9FF call <jmp.&USER32.RegisterClipboardFo>
0046E4EB 66:A3 90544700 mov word ptr [475490], ax
0046E4F1 68 1CE54600 push 0046E51C ; delphi component
0046E4F6 E8 E188F9FF call <jmp.&USER32.RegisterClipboardFo>
0046E4FB 66:A3 92544700 mov word ptr [475492], ax
0046E501 33C0 xor eax, eax
0046E503 A3 98544700 mov dword ptr [475498], eax
0046E508 C3 retn
0046E509 0000 add byte ptr [eax], al
0046E50B 004465 6C add byte ptr [ebp+6C], al
0046E50F 70 68 jo short 0046E579
0046E511 6920 50696374 imul esp, dword ptr [eax], 74636950
0046E517 75 72 jnz short 0046E58B
0046E519 65:0000 add byte ptr gs:[eax], al
0046E51C 44 inc esp
0046E51D 65:6C ins byte ptr es:[edi], dx
0046E51F 70 68 jo short 0046E589
0046E521 6920 436F6D70 imul esp, dword ptr [eax], 706D6F43
0046E527 6F outs dx, dword ptr es:[edi]
0046E528 6E outs dx, byte ptr es:[edi]
0046E529 65:6E outs dx, byte ptr es:[edi]
0046E52B 74 00 je short 0046E52D
0046E52D 0000 add byte ptr [eax], al
0046E52F 0083 2DBC5447 add byte ptr [ebx+4754BC2D], al
0046E535 0001 add byte ptr [ecx], al
0046E537 73 05 jnb short 0046E53E
0046E539 E8 46FAFBFF call 0042DF84
0046E53E C3 retn
0046E53F 90 nop
0046E540 832D D0544700 0>sub dword ptr [4754D0], 1
0046E547 C3 retn
0046E548 832D E0544700 0>sub dword ptr [4754E0], 1
0046E54F 73 7B jnb short 0046E5CC
0046E551 B8 8C564300 mov eax, 0043568C
0046E556 E8 C95EF9FF call 00404424
0046E55B A1 506C4300 mov eax, dword ptr [436C50]
0046E560 E8 F754FAFF call 00413A5C
0046E565 A1 506C4300 mov eax, dword ptr [436C50]
0046E56A E8 8D55FAFF call 00413AFC
0046E56F 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E575 A1 98F04200 mov eax, dword ptr [42F098]
0046E57A E8 2955FAFF call 00413AA8
0046E57F 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E585 A1 BCF44200 mov eax, dword ptr [42F4BC]
0046E58A E8 1955FAFF call 00413AA8
0046E58F A1 98F04200 mov eax, dword ptr [42F098]
0046E594 E8 0754FAFF call 004139A0
0046E599 B2 01 mov dl, 1
0046E59B A1 381F4100 mov eax, dword ptr [411F38]
0046E5A0 E8 8352F9FF call 00403828
0046E5A5 A3 E4544700 mov dword ptr [4754E4], eax
0046E5AA B2 01 mov dl, 1
0046E5AC A1 40FB4200 mov eax, dword ptr [42FB40]
0046E5B1 E8 7252F9FF call 00403828
0046E5B6 A3 D8544700 mov dword ptr [4754D8], eax
0046E5BB B2 01 mov dl, 1
0046E5BD A1 ACFB4200 mov eax, dword ptr [42FBAC]
0046E5C2 E8 91CFFAFF call 0041B558
0046E5C7 A3 DC544700 mov dword ptr [4754DC], eax
0046E5CC C3 retn
0046E5CD 8D40 00 lea eax, dword ptr [eax]
0046E5D0 55 push ebp
0046E5D1 8BEC mov ebp, esp
0046E5D3 33C0 xor eax, eax
0046E5D5 55 push ebp
0046E5D6 68 56E64600 push 0046E656
0046E5DB 64:FF30 push dword ptr fs:[eax]
0046E5DE 64:8920 mov dword ptr fs:[eax], esp
0046E5E1 832D F8544700 0>sub dword ptr [4754F8], 1
0046E5E8 73 5E jnb short 0046E648
0046E5EA E8 0D81F9FF call <jmp.&kernel32.GetVersion>
0046E5EF 25 FF000000 and eax, 0FF
0046E5F4 66:83F8 04 cmp ax, 4
0046E5F8 0F9305 F4544700 setnb byte ptr [4754F4]
0046E5FF E8 2CA4FDFF call 00448A30
0046E604 A1 506C4300 mov eax, dword ptr [436C50]
0046E609 E8 4E54FAFF call 00413A5C
0046E60E A1 506C4300 mov eax, dword ptr [436C50]
0046E613 E8 E454FAFF call 00413AFC
0046E618 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E61E A1 C8904400 mov eax, dword ptr [4490C8]
0046E623 E8 8054FAFF call 00413AA8
0046E628 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E62E A1 04A74400 mov eax, dword ptr [44A704]
0046E633 E8 7054FAFF call 00413AA8
0046E638 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E63E A1 28A84400 mov eax, dword ptr [44A828]
0046E643 E8 6054FAFF call 00413AA8
0046E648 33C0 xor eax, eax
0046E64A 5A pop edx
0046E64B 59 pop ecx
0046E64C 59 pop ecx
0046E64D 64:8910 mov dword ptr fs:[eax], edx
0046E650 68 5DE64600 push 0046E65D
0046E655 C3 retn
0046E656 - E9 9159F9FF jmp 00403FEC
0046E65B ^ EB F8 jmp short 0046E655
0046E65D 5D pop ebp
0046E65E C3 retn
0046E65F 90 nop
0046E660 832D 78554700 0>sub dword ptr [475578], 1
0046E667 73 20 jnb short 0046E689
0046E669 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E66F A1 28A84400 mov eax, dword ptr [44A828]
0046E674 E8 2F54FAFF call 00413AA8
0046E679 8B15 506C4300 mov edx, dword ptr [436C50] ; meike2.00436C9C
0046E67F A1 04A74400 mov eax, dword ptr [44A704]
0046E684 E8 1F54FAFF call 00413AA8
0046E689 C3 retn
0046E68A 8BC0 mov eax, eax
0046E68C 832D 84554700 0>sub dword ptr [475584], 1
0046E693 73 2F jnb short 0046E6C4
0046E695 B8 2C994500 mov eax, 0045992C
0046E69A E8 AD5DF9FF call 0040444C
0046E69F E8 A0B1FEFF call 00459844
0046E6A4 68 C8E64600 push 0046E6C8 ; taskbarcreated
0046E6A9 E8 3687F9FF call <jmp.&USER32.RegisterClipboardFo>
0046E6AE A3 88554700 mov dword ptr [475588], eax
0046E6B3 B8 88DD4400 mov eax, 0044DD88
0046E6B8 E8 5756FAFF call 00413D14
0046E6BD 33C0 xor eax, eax
0046E6BF A3 9C554700 mov dword ptr [47559C], eax
0046E6C4 C3 retn
0046E6C5 0000 add byte ptr [eax], al
0046E6C7 005461 73 add byte ptr [ecx+73], dl
0046E6CB 6B62 61 72 imul esp, dword ptr [edx+61], 72
0046E6CF 43 inc ebx
0046E6D0 72 65 jb short 0046E737
0046E6D2 61 popad
0046E6D3 74 65 je short 0046E73A
0046E6D5 64:0000 add byte ptr fs:[eax], al
0046E6D8 55 push ebp
0046E6D9 8BEC mov ebp, esp
0046E6DB 6A 00 push 0
0046E6DD 6A 00 push 0
0046E6DF 33C0 xor eax, eax
0046E6E1 55 push ebp
0046E6E2 68 60E74600 push 0046E760
0046E6E7 64:FF30 push dword ptr fs:[eax]
0046E6EA 64:8920 mov dword ptr fs:[eax], esp
0046E6ED 832D A0554700 0>sub dword ptr [4755A0], 1
0046E6F4 73 4F jnb short 0046E745
0046E6F6 E8 B5C8FEFF call 0045AFB0
0046E6FB A1 0C9A4500 mov eax, dword ptr [459A0C]
0046E700 50 push eax
0046E701 8D55 FC lea edx, dword ptr [ebp-4]
0046E704 A1 9C104700 mov eax, dword ptr [47109C]
0046E709 E8 F27BF9FF call 00406300
0046E70E 8B4D FC mov ecx, dword ptr [ebp-4]
0046E711 BA 74E74600 mov edx, 0046E774 ; jpeg
0046E716 A1 00E24100 mov eax, dword ptr [41E200]
0046E71B E8 603DFBFF call 00422480
0046E720 A1 0C9A4500 mov eax, dword ptr [459A0C]
0046E725 50 push eax
0046E726 8D55 F8 lea edx, dword ptr [ebp-8]
0046E729 A1 9C104700 mov eax, dword ptr [47109C]
0046E72E E8 CD7BF9FF call 00406300
0046E733 8B4D F8 mov ecx, dword ptr [ebp-8]
0046E736 BA 84E74600 mov edx, 0046E784 ; jpg
0046E73B A1 00E24100 mov eax, dword ptr [41E200]
0046E740 E8 3B3DFBFF call 00422480
0046E745 33C0 xor eax, eax
0046E747 5A pop edx
0046E748 59 pop ecx
0046E749 59 pop ecx
0046E74A 64:8910 mov dword ptr fs:[eax], edx
0046E74D 68 67E74600 push 0046E767 ; ASCII "YY]?
0046E752 8D45 F8 lea eax, dword ptr [ebp-8]
0046E755 BA 02000000 mov edx, 2
0046E75A E8 495FF9FF call 004046A8
0046E75F C3 retn
0046E760 - E9 8758F9FF jmp 00403FEC
0046E765 ^ EB EB jmp short 0046E752
0046E767 59 pop ecx
0046E768 59 pop ecx
0046E769 5D pop ebp
0046E76A C3 retn
0046E76B 00FF add bh, bh
0046E76D FFFF ??? ; Unknown command
0046E76F FF0400 inc dword ptr [eax+eax]
0046E772 0000 add byte ptr [eax], al
0046E774 6A 70 push 70
0046E776 65:67:0000 add byte ptr gs:[bx+si], al
0046E77A 0000 add byte ptr [eax], al
0046E77C FFFF ??? ; Unknown command
0046E77E FFFF ??? ; Unknown command
0046E780 0300 add eax, dword ptr [eax]
0046E782 0000 add byte ptr [eax], al
0046E784 6A 70 push 70
0046E786 67:0055 8B add byte ptr [di+FF8B], dl
0046E78A EC in al, dx
0046E78B 83C4 F0 add esp, -10
0046E78E B8 44D54600 mov eax, 0046D544 ; 7
0046E793 E8 EC7CF9FF call 00406484
0046E798 A1 EC124700 mov eax, dword ptr [4712EC]
0046E79D 8B00 mov eax, dword ptr [eax]
0046E79F E8 0099FEFF call 004580A4
0046E7A4 A1 EC124700 mov eax, dword ptr [4712EC]
0046E7A9 8B00 mov eax, dword ptr [eax]
0046E7AB 33D2 xor edx, edx
0046E7AD E8 8A93FEFF call 00457B3C
0046E7B2 8B0D D8134700 mov ecx, dword ptr [4713D8] ; meike2.004755A4
0046E7B8 A1 EC124700 mov eax, dword ptr [4712EC]
0046E7BD 8B00 mov eax, dword ptr [eax]
0046E7BF 8B15 04CD4600 mov edx, dword ptr [46CD04] ; meike2.0046CD50
0046E7C5 E8 F298FEFF call 004580BC ; (initial cpu selection)
0046E7CA A1 EC124700 mov eax, dword ptr [4712EC]
0046E7CF 8B00 mov eax, dword ptr [eax]
0046E7D1 E8 6699FEFF call 0045813C
0046E7D6 E8 B55DF9FF call 00404590
0046E7DB 90 nop
0046E7DC 0000 add byte ptr [eax], al
0046E7DE 0000 add byte ptr [eax], al
0046E7E0 0000 add byte ptr [eax], al
0046E7E2 0000 add byte ptr [eax], al
请问各位大人 该如何修改
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)