输入假码后在.ecode段下断
00436FCD 55 push ebp ; (initial cpu selection) 断在这里,下面没跳
00436FCE 8BEC mov ebp, esp
00436FD0 6A 00 push 0
00436FD2 6A 00 push 0
00436FD4 6A 00 push 0
00436FD6 68 01030080 push 80000301
00436FDB 6A 00 push 0
00436FDD 68 00000000 push 0
00436FE2 68 04000080 push 80000004
00436FE7 6A 00 push 0
00436FE9 68 B4BA4000 push 0040BAB4 ; 注册码错误
00436FEE 68 03000000 push 3
00436FF3 BB 00030000 mov ebx, 300
00436FF8 E8 B9030000 call 004373B6 这里call向一个jump
004373B6 - FF25 89254100 jmp dword ptr [412589] ; krnln.100290E1
到了krnln模块,应该是易语言的库吧,
100290E1 A1 A8EB0E10 mov eax, dword ptr [100EEBA8]
100290E6 0318 add ebx, dword ptr [eax]
100290E8 8D4424 08 lea eax, dword ptr [esp+8]
100290EC 83EC 0C sub esp, 0C
100290EF 50 push eax
100290F0 FF7424 14 push dword ptr [esp+14]
100290F4 33C0 xor eax, eax
100290F6 894424 08 mov dword ptr [esp+8], eax
100290FA 894424 0C mov dword ptr [esp+C], eax
100290FE 894424 10 mov dword ptr [esp+10], eax
10029102 8D5424 08 lea edx, dword ptr [esp+8]
10029106 52 push edx
10029107 FF13 call dword ptr [ebx] 提示注册码错误!
10029109 8B4424 0C mov eax, dword ptr [esp+C]
1002910D 8B5424 10 mov edx, dword ptr [esp+10]
10029111 8B4C24 14 mov ecx, dword ptr [esp+14]
10029115 83C4 18 add esp, 18
10029118 C3 retn
原程序里怎么找关键跳(call)啊?
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!