-
-
[求助]谁帮忙看看这个
-
发表于: 2009-4-12 19:22 3693
-
用OD
bp GetDlgItem 下断后
随便输入了几个数字 然后点注册
停在了这里
77D2436E > 8BFF MOV EDI,EDI
77D24370 55 PUSH EBP
77D24371 8BEC MOV EBP,ESP
77D24373 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
77D24376 E8 6541FFFF CALL USER32.77D184E0
77D2437B 85C0 TEST EAX,EAX
77D2437D 74 1F JE SHORT USER32.77D2439E
77D2437F 56 PUSH ESI
77D24380 FF75 0C PUSH DWORD PTR SS:[EBP+C]
77D24383 50 PUSH EAX
77D24384 E8 A9FFFFFF CALL USER32.77D24332
77D24389 85C0 TEST EAX,EAX
77D2438B 0F84 00DD0000 JE USER32.77D32091
77D24391 8B30 MOV ESI,DWORD PTR DS:[EAX]
77D24393 85F6 TEST ESI,ESI
77D24395 0F84 F8DC0000 JE USER32.77D32093
77D2439B 8BC6 MOV EAX,ESI
77D2439D 5E POP ESI
77D2439E 5D POP EBP
77D2439F C2 0800 RETN 8
77D243A2 53 PUSH EBX
77D243A3 E8 C4FAFFFF CALL USER32.77D23E6C
77D243A8 8BF0 MOV ESI,EAX
77D243AA 3BF3 CMP ESI,EBX
77D243AC 0F85 A5130200 JNZ USER32.77D45757
77D243B2 837D 10 00 CMP DWORD PTR SS:[EBP+10],0
77D243B6 56 PUSH ESI
77D243B7 74 1C JE SHORT USER32.77D243D5
77D243B9 E8 39010000 CALL USER32.77D244F7
77D243BE ^ E9 29F8FFFF JMP USER32.77D23BEC
77D243C3 50 PUSH EAX
77D243C4 FF15 9C11D177 CALL DWORD PTR DS:[<&GDI32.DeleteObject>>; GDI32.DeleteObject
77D243CA 8B06 MOV EAX,DWORD PTR DS:[ESI]
77D243CC 8360 20 00 AND DWORD PTR DS:[EAX+20],0
77D243D0 ^ E9 92FBFFFF JMP USER32.77D23F67
77D243D5 E8 28FBFFFF CALL USER32.77D23F02
77D243DA ^ E9 0DF8FFFF JMP USER32.77D23BEC
那位大侠帮我分析下 看看改怎么破这个啊?
bp GetDlgItem 下断后
随便输入了几个数字 然后点注册
停在了这里
77D2436E > 8BFF MOV EDI,EDI
77D24370 55 PUSH EBP
77D24371 8BEC MOV EBP,ESP
77D24373 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
77D24376 E8 6541FFFF CALL USER32.77D184E0
77D2437B 85C0 TEST EAX,EAX
77D2437D 74 1F JE SHORT USER32.77D2439E
77D2437F 56 PUSH ESI
77D24380 FF75 0C PUSH DWORD PTR SS:[EBP+C]
77D24383 50 PUSH EAX
77D24384 E8 A9FFFFFF CALL USER32.77D24332
77D24389 85C0 TEST EAX,EAX
77D2438B 0F84 00DD0000 JE USER32.77D32091
77D24391 8B30 MOV ESI,DWORD PTR DS:[EAX]
77D24393 85F6 TEST ESI,ESI
77D24395 0F84 F8DC0000 JE USER32.77D32093
77D2439B 8BC6 MOV EAX,ESI
77D2439D 5E POP ESI
77D2439E 5D POP EBP
77D2439F C2 0800 RETN 8
77D243A2 53 PUSH EBX
77D243A3 E8 C4FAFFFF CALL USER32.77D23E6C
77D243A8 8BF0 MOV ESI,EAX
77D243AA 3BF3 CMP ESI,EBX
77D243AC 0F85 A5130200 JNZ USER32.77D45757
77D243B2 837D 10 00 CMP DWORD PTR SS:[EBP+10],0
77D243B6 56 PUSH ESI
77D243B7 74 1C JE SHORT USER32.77D243D5
77D243B9 E8 39010000 CALL USER32.77D244F7
77D243BE ^ E9 29F8FFFF JMP USER32.77D23BEC
77D243C3 50 PUSH EAX
77D243C4 FF15 9C11D177 CALL DWORD PTR DS:[<&GDI32.DeleteObject>>; GDI32.DeleteObject
77D243CA 8B06 MOV EAX,DWORD PTR DS:[ESI]
77D243CC 8360 20 00 AND DWORD PTR DS:[EAX+20],0
77D243D0 ^ E9 92FBFFFF JMP USER32.77D23F67
77D243D5 E8 28FBFFFF CALL USER32.77D23F02
77D243DA ^ E9 0DF8FFFF JMP USER32.77D23BEC
那位大侠帮我分析下 看看改怎么破这个啊?
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
看原图
赞赏
雪币:
留言: