0060D61A 6A 74 push 74
0060D61C 68 C05E6300 push 00635EC0
0060D621 E8 E2030000 call 0060DA08
0060D626 D5 E8 aad 0E8
0060D628 78 48 js short 0060D672
0060D62A 46 inc esi
0060D62B 0F1240 4C movlps xmm0, qword ptr [eax+4C]
0060D62F - E9 30477966 jmp 66DA1D64
0060D634 FA cli
0060D635 E8 F79D3BC8 call C89C7431
0060D63A E2 43 loopd short 0060D67F
0060D63C EA 99B72F01 CFE>jmp far EDCF:012FB799
0060D643 02CD add cl, ch
0060D645 CB retf
0060D646 E3 1F jecxz short 0060D667
0060D648 0FB741 18 movzx eax, word ptr [ecx+18]
0060D64C 3D 0B010000 cmp eax, 10B
0060D651 74 1F je short 0060D672
0060D653 3D 0B020000 cmp eax, 20B
0060D658 74 05 je short 0060D65F
0060D65A 895D E4 mov dword ptr [ebp-1C], ebx
0060D65D EB 27 jmp short 0060D686
0060D65F 83B9 84000000 0>cmp dword ptr [ecx+84], 0E
0060D666 ^ 76 F2 jbe short 0060D65A
0060D668 33C0 xor eax, eax
0060D66A 3999 F8000000 cmp dword ptr [ecx+F8], ebx
0060D670 EB 0E jmp short 0060D680
0060D672 8379 74 0E cmp dword ptr [ecx+74], 0E
0060D676 ^ 76 E2 jbe short 0060D65A
0060D678 33C0 xor eax, eax
0060D67A 3999 E8000000 cmp dword ptr [ecx+E8], ebx
0060D680 0F95C0 setne al
0060D683 8945 E4 mov dword ptr [ebp-1C], eax
0060D686 895D FC mov dword ptr [ebp-4], ebx
0060D689 6A 02 push 2
0060D68B 90 nop
0060D68C E8 7C3BD57B call MSVCR71.__set_app_type
0060D691 59 pop ecx
0060D692 830D A8506900 F>or dword ptr [6950A8], FFFFFFFF
0060D699 830D AC506900 F>or dword ptr [6950AC], FFFFFFFF
0060D6A0 90 nop
0060D6A1 E8 843BD57B call MSVCR71.__p__fmode
0060D6A6 8B0D A0506900 mov ecx, dword ptr [6950A0]
0060D6AC 8908 mov dword ptr [eax], ecx
0060D6AE 90 nop
0060D6AF E8 7C3BD57B call MSVCR71.__p__commode
OEP代码被偷了 前3行补上了
0060D61A 6A 74 push 74
0060D61C 68 C05E6300 push 00635EC0
0060D621 E8 E2030000 call 0060DA08
后面几行不知道怎么补了
有没有各种编译语言入口代码的介绍啊?
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)