问题出在 试用版只能显示前30条数据\n\n请注册正式版
这个限制我是弄了一下午到现在都没解开哦,(其实我早就注册了,但是数量一到就变成了没注册的,郁闷啊! )
壳 和 注册码 注册机 的 问题我都解决了,希望来个高手 帮下忙,我的QQ:634488807
要去 30条数据 应该修改 哪里?
005C8B57 BA 748C5C00 mov edx,脱壳-sws.005C8C74 ; no
005C8B5C E8 2FC3E3FF call 脱壳-sws.00404E90
005C8B61 0F85 80000000 jnz 脱壳-sws.005C8BE7
005C8B67 C683 10060000>mov byte ptr ds:[ebx+610],1
005C8B6E EB 77 jmp short 脱壳-sws.005C8BE7
005C8B70 8B83 D8050000 mov eax,dword ptr ds:[ebx+5D8]
005C8B76 8078 40 00 cmp byte ptr ds:[eax+40],0
005C8B7A 75 07 jnz short 脱壳-sws.005C8B83
005C8B7C B2 01 mov dl,1
005C8B7E E8 7D68E7FF call 脱壳-sws.0043F400
005C8B83 8B83 D8050000 mov eax,dword ptr ds:[ebx+5D8]
005C8B89 8078 40 00 cmp byte ptr ds:[eax+40],0
005C8B8D 74 58 je short 脱壳-sws.005C8BE7
005C8B8F 8D55 E0 lea edx,dword ptr ss:[ebp-20]
005C8B92 8B83 E8050000 mov eax,dword ptr ds:[ebx+5E8]
005C8B98 E8 2B50EAFF call 脱壳-sws.0046DBC8
005C8B9D 837D E0 00 cmp dword ptr ss:[ebp-20],0
005C8BA1 74 44 je short 脱壳-sws.005C8BE7
005C8BA3 8D55 FC lea edx,dword ptr ss:[ebp-4]
005C8BA6 8B83 E8050000 mov eax,dword ptr ds:[ebx+5E8]
005C8BAC E8 1750EAFF call 脱壳-sws.0046DBC8
005C8BB1 8D55 DC lea edx,dword ptr ss:[ebp-24]
005C8BB4 8B45 FC mov eax,dword ptr ss:[ebp-4]
005C8BB7 E8 C00AE4FF call 脱壳-sws.0040967C
005C8BBC 8B45 DC mov eax,dword ptr ss:[ebp-24]
005C8BBF BA 748C5C00 mov edx,脱壳-sws.005C8C74 ; no
005C8BC4 E8 C7C2E3FF call 脱壳-sws.00404E90
005C8BC9 75 1C jnz short 脱壳-sws.005C8BE7
005C8BCB C683 10060000>mov byte ptr ds:[ebx+610],1
005C8BD2 EB 13 jmp short 脱壳-sws.005C8BE7
005C8BD4 8B83 D8050000 mov eax,dword ptr ds:[ebx+5D8]
005C8BDA 8078 40 00 cmp byte ptr ds:[eax+40],0
005C8BDE 74 07 je short 脱壳-sws.005C8BE7
005C8BE0 33D2 xor edx,edx
005C8BE2 E8 1968E7FF call 脱壳-sws.0043F400
005C8BE7 33C0 xor eax,eax
005C8BE9 5A pop edx
005C8BEA 59 pop ecx
005C8BEB 59 pop ecx
005C8BEC 64:8910 mov dword ptr fs:[eax],edx
005C8BEF 68 298C5C00 push 脱壳-sws.005C8C29
005C8BF4 8D45 DC lea eax,dword ptr ss:[ebp-24]
005C8BF7 E8 88BEE3FF call 脱壳-sws.00404A84
005C8BFC 8D45 E0 lea eax,dword ptr ss:[ebp-20]
005C8BFF E8 80BEE3FF call 脱壳-sws.00404A84
005C8C04 8D45 E4 lea eax,dword ptr ss:[ebp-1C]
005C8C07 E8 78BEE3FF call 脱壳-sws.00404A84
005C8C0C 8D45 E8 lea eax,dword ptr ss:[ebp-18]
005C8C0F E8 70BEE3FF call 脱壳-sws.00404A84
005C8C14 8D45 EC lea eax,dword ptr ss:[ebp-14]
005C8C17 BA 05000000 mov edx,5
005C8C1C E8 87BEE3FF call 脱壳-sws.00404AA8
005C8C21 C3 retn
005C8C22 ^ E9 19B7E3FF jmp 脱壳-sws.00404340
005C8C27 ^ EB CB jmp short 脱壳-sws.005C8BF4
005C8C29 5E pop esi
005C8C2A 5B pop ebx
005C8C2B 8BE5 mov esp,ebp
005C8C2D 5D pop ebp
005C8C2E C3 retn
005C8C2F 00FF add bh,bh
005C8C31 FFFF ??? ; 未知命令
005C8C33 FF08 dec dword ptr ds:[eax]
005C8C35 0000 add byte ptr ds:[eax],al
005C8C37 00CA add dl,cl
005C8C39 D6 salc
005C8C3A BB FABAC5A3 mov ebx,A3C5BAFA
005C8C3F BA 00000000 mov edx,0
005C8C44 FFFF ??? ; 未知命令
005C8C46 FFFF ??? ; 未知命令
005C8C48 0300 add eax,dword ptr ds:[eax]
005C8C4A 0000 add byte ptr ds:[eax],al
005C8C4C 20B8 F600FFFF and byte ptr ds:[eax+FFFF00F6]>
005C8C52 FFFF ??? ; 未知命令
005C8C54 1200 adc al,byte ptr ds:[eax]
005C8C56 0000 add byte ptr ds:[eax],al
005C8C58 D2D1 rcl cl,cl
005C8C5A CB retf
005C8C5B D1B6 FEBCB6D7 sal dword ptr ds:[esi+D7B6BCFE>
005C8C61 D3CD ror ebp,cl
005C8C63 F8 clc
005C8C64 CA FDC4 retf 0C4FD
005C8C67 BF A3BA0000 mov edi,0BAA3
005C8C6C FFFF ??? ; 未知命令
005C8C6E FFFF ??? ; 未知命令
005C8C70 0200 add al,byte ptr ds:[eax]
005C8C72 0000 add byte ptr ds:[eax],al
005C8C74 4E dec esi
005C8C75 6F outs dx,dword ptr es:[edi]
005C8C76 0000 add byte ptr ds:[eax],al
005C8C78 55 push ebp
005C8C79 8BEC mov ebp,esp
005C8C7B 6A 00 push 0
005C8C7D 53 push ebx
005C8C7E 8BD8 mov ebx,eax
005C8C80 33C0 xor eax,eax
005C8C82 55 push ebp
005C8C83 68 628D5C00 push 脱壳-sws.005C8D62
005C8C88 64:FF30 push dword ptr fs:[eax]
005C8C8B 64:8920 mov dword ptr fs:[eax],esp
005C8C8E B2 01 mov dl,1
005C8C90 A1 04564400 mov eax,dword ptr ds:[445604]
005C8C95 E8 D6CAE7FF call 脱壳-sws.00445770
005C8C9A 8B15 AC355D00 mov edx,dword ptr ds:[5D35AC] ; 脱壳-sws.005DA284
005C8CA0 8902 mov dword ptr ds:[edx],eax
005C8CA2 A1 AC355D00 mov eax,dword ptr ds:[5D35AC]
005C8CA7 8B00 mov eax,dword ptr ds:[eax]
005C8CA9 BA 02000080 mov edx,80000002
005C8CAE E8 99CBE7FF call 脱壳-sws.0044584C
005C8CB3 A1 AC355D00 mov eax,dword ptr ds:[5D35AC]
005C8CB8 8B00 mov eax,dword ptr ds:[eax]
005C8CBA 33C9 xor ecx,ecx
005C8CBC BA 788D5C00 mov edx,脱壳-sws.005C8D78 ; system\controlset001\control\sysswsj
005C8CC1 E8 EECBE7FF call 脱壳-sws.004458B4
005C8CC6 33C0 xor eax,eax
005C8CC8 55 push ebp
005C8CC9 68 458D5C00 push 脱壳-sws.005C8D45
005C8CCE 64:FF30 push dword ptr fs:[eax]
005C8CD1 64:8920 mov dword ptr fs:[eax],esp
005C8CD4 8D4D FC lea ecx,dword ptr ss:[ebp-4]
005C8CD7 A1 AC355D00 mov eax,dword ptr ds:[5D35AC]
005C8CDC 8B00 mov eax,dword ptr ds:[eax]
005C8CDE BA A88D5C00 mov edx,脱壳-sws.005C8DA8 ; company
005C8CE3 E8 94CDE7FF call 脱壳-sws.00445A7C
005C8CE8 A1 AC355D00 mov eax,dword ptr ds:[5D35AC]
005C8CED 8B00 mov eax,dword ptr ds:[eax]
005C8CEF 33C9 xor ecx,ecx
005C8CF1 BA B88D5C00 mov edx,脱壳-sws.005C8DB8 ; code
005C8CF6 E8 55CDE7FF call 脱壳-sws.00445A50 ; (初始化 cpu 选择状态)
005C8CFB BA C88D5C00 mov edx,脱壳-sws.005C8DC8 ; 龙鼎手机号码搜索王[试用版]
005C8D00 8BC3 mov eax,ebx
005C8D02 E8 F14EEAFF call 脱壳-sws.0046DBF8
005C8D07 6A 40 push 40
005C8D09 B9 E48D5C00 mov ecx,脱壳-sws.005C8DE4 ; 提示
005C8D0E BA EC8D5C00 mov edx,脱壳-sws.005C8DEC ; 试用版只能显示前30条数据\n\n请注册正式版
005C8D13 A1 1C325D00 mov eax,dword ptr ds:[5D321C]
005C8D18 8B00 mov eax,dword ptr ds:[eax]
005C8D1A E8 2167ECFF call 脱壳-sws.0048F440
005C8D1F 33C0 xor eax,eax
005C8D21 5A pop edx
005C8D22 59 pop ecx
005C8D23 59 pop ecx
005C8D24 64:8910 mov dword ptr fs:[eax],edx
005C8D27 68 4C8D5C00 push 脱壳-sws.005C8D4C
005C8D2C A1 AC355D00 mov eax,dword ptr ds:[5D35AC]
005C8D31 8B00 mov eax,dword ptr ds:[eax]
005C8D33 E8 E4CAE7FF call 脱壳-sws.0044581C
005C8D38 A1 AC355D00 mov eax,dword ptr ds:[5D35AC]
005C8D3D 8B00 mov eax,dword ptr ds:[eax]
005C8D3F E8 68AEE3FF call 脱壳-sws.00403BAC
005C8D44 C3 retn
005C8D45 ^ E9 F6B5E3FF jmp 脱壳-sws.00404340
005C8D4A ^ EB E0 jmp short 脱壳-sws.005C8D2C
005C8D4C 33C0 xor eax,eax
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课