能力值:
( LV9,RANK:260 )
|
-
-
2 楼
可以考虑使用虚似机,如果还有安装文件的话..进行快照...
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
胡思乱想:
是不是检查Process啊,如果有这个Process的话就不Run.
试试在od中暴力破解。
|
能力值:
( LV6,RANK:90 )
|
-
-
4 楼
OD跟一下吧,查找窗口、创建互斥量等都能达到防止双开目的。
|
能力值:
( LV2,RANK:10 )
|
-
-
5 楼
谢谢大家的帮忙!!!!!!!!!!
0087FD0C > 55 PUSH EBP
0087FD0D 8BEC MOV EBP,ESP
0087FD0F 83C4 F4 ADD ESP,-0C
0087FD12 B8 9CE88700 MOV EAX,wms.0087E89C
0087FD17 E8 5487B8FF CALL wms.00408470
0087FD1C A1 58CD8800 MOV EAX,DWORD PTR DS:[88CD58]
0087FD21 C600 2E MOV BYTE PTR DS:[EAX],2E
0087FD24 A1 C0CB8800 MOV EAX,DWORD PTR DS:[88CBC0]
0087FD29 BA ECFE8700 MOV EDX,wms.0087FEEC ; ASCII "yyyy-mm-dd"
0087FD2E E8 2543B8FF CALL wms.00404058
0087FD33 A1 CCC58800 MOV EAX,DWORD PTR DS:[88C5CC]
0087FD38 BA ECFE8700 MOV EDX,wms.0087FEEC ; ASCII "yyyy-mm-dd"
0087FD3D E8 1643B8FF CALL wms.00404058
0087FD42 A1 38C38800 MOV EAX,DWORD PTR DS:[88C338]
0087FD47 BA 00FF8700 MOV EDX,wms.0087FF00 ; ASCII "hh:mm:ss"
0087FD4C E8 0743B8FF CALL wms.00404058
0087FD51 A1 1CC98800 MOV EAX,DWORD PTR DS:[88C91C]
0087FD56 BA 00FF8700 MOV EDX,wms.0087FF00 ; ASCII "hh:mm:ss"
0087FD5B E8 F842B8FF CALL wms.00404058
0087FD60 A1 BCC48800 MOV EAX,DWORD PTR DS:[88C4BC]
0087FD65 C600 2D MOV BYTE PTR DS:[EAX],2D
0087FD68 A1 ECC18800 MOV EAX,DWORD PTR DS:[88C1EC]
0087FD6D C600 3A MOV BYTE PTR DS:[EAX],3A
0087FD70 A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FD75 BA 14FF8700 MOV EDX,wms.0087FF14
0087FD7A E8 D942B8FF CALL wms.00404058
0087FD7F A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FD84 83C0 04 ADD EAX,4
0087FD87 BA 20FF8700 MOV EDX,wms.0087FF20
0087FD8C E8 C742B8FF CALL wms.00404058
0087FD91 A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FD96 83C0 08 ADD EAX,8
0087FD99 BA 2CFF8700 MOV EDX,wms.0087FF2C
0087FD9E E8 B542B8FF CALL wms.00404058
0087FDA3 A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FDA8 83C0 0C ADD EAX,0C
0087FDAB BA 38FF8700 MOV EDX,wms.0087FF38
0087FDB0 E8 A342B8FF CALL wms.00404058
0087FDB5 A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FDBA 83C0 10 ADD EAX,10
0087FDBD BA 44FF8700 MOV EDX,wms.0087FF44
0087FDC2 E8 9142B8FF CALL wms.00404058
0087FDC7 A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FDCC 83C0 14 ADD EAX,14
0087FDCF BA 50FF8700 MOV EDX,wms.0087FF50
0087FDD4 E8 7F42B8FF CALL wms.00404058
0087FDD9 A1 64C58800 MOV EAX,DWORD PTR DS:[88C564]
0087FDDE 83C0 18 ADD EAX,18
0087FDE1 BA 5CFF8700 MOV EDX,wms.0087FF5C
0087FDE6 E8 6D42B8FF CALL wms.00404058
0087FDEB 6A 00 PUSH 0
0087FDED 68 60FF8700 PUSH wms.0087FF60 ; ASCII "Wms2008"
************************************************
0087FDF2 E8 AD8FB8FF CALL <JMP.&user32.FindWindowA>
0087FDF7 A3 18ED8800 MOV DWORD PTR DS:[88ED18],EAX
0087FDFC 833D 18ED8800 0>CMP DWORD PTR DS:[88ED18],0
0087FE03 76 19 JBE SHORT wms.0087FE1E
核心代码找到,爆之~~~~~~ JBE 换成 JMP
************************************************
0087FE05 6A 00 PUSH 0
0087FE07 6A 00 PUSH 0
0087FE09 68 00140000 PUSH 1400
0087FE0E A1 18ED8800 MOV EAX,DWORD PTR DS:[88ED18]
0087FE13 50 PUSH EAX
0087FE14 E8 5B92B8FF CALL <JMP.&user32.PostMessageA>
0087FE19 E9 C1000000 JMP wms.0087FEDF
0087FE1E B2 01 MOV DL,1
0087FE20 A1 F4E95400 MOV EAX,DWORD PTR DS:[54E9F4]
0087FE25 E8 8233B8FF CALL wms.004031AC
|
能力值:
( LV2,RANK:10 )
|
-
-
6 楼
防止又开的方式也就那么几种吧
|