* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00501832(C)
|
:0050183B 33C0 xor eax, eax
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00501839(U)
|
:0050183D 5F pop edi
:0050183E 83C460 add esp, 00000060
:00501841 3BEC cmp ebp, esp
* Reference To: MSVCRT._chkesp, Ord:00AFh
|
:00501843 E8CE8F0900 Call 0059A816
:00501848 8BE5 mov esp, ebp
:0050184A 5D pop ebp
:0050184B C3 ret
......................
***************
接下来我们来到关键的sense3狗操作函数!call [5]看看:
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00598F8B(C)
|
:00598FA5 8B8C2498000000 mov ecx, dword ptr [esp+00000098]
:00598FAC 894152 mov dword ptr [ecx+52], eax
:00598FAF 66C7415A0900 mov [ecx+5A], 0009
:00598FB5 6633C0 xor ax, ax
:00598FB8 81C494000000 add esp, 00000094
:00598FBE C3 ret
....略...
....略...
....................
我又回到原来的地方接着看:
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:005991DF(C), :005991E6(C)
|
:0059924B 6685C0 test ax, ax
:0059924E 7515 jne 00599265 ;这里可以跳去看看
:00599250 6A20 push 00000020
:00599252 55 push ebp
:00599253 66C7068A00 mov word ptr [esi], 008A
:00599258 E8B3030000 call 00599610
:0059925D 83C408 add esp, 00000008
:00599260 5F pop edi
:00599261 5E pop esi
:00599262 5D pop ebp
:00599263 5B pop ebx
:00599264 C3 ret
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0059924E(C)
|
:00599265 668B465C mov ax, word ptr [esi+5C]
:00599269 50 push eax
:0059926A 6A06 push 00000006
:0059926C 55 push ebp
:0059926D E80E040000 call 00599680
:00599272 83C40C add esp, 0000000C
:00599275 6685DB test bx, bx
:00599278 740C je 00599286
:0059927A 57 push edi
:0059927B 56 push esi
:0059927C E81F010000 call 005993A0 ;这里可以去看看call [8]
:00599281 83C408 add esp, 00000008
:00599284 EB37 jmp 005992BD
...........................
这里可以进去看看call [8]
* Referenced by a CALL at Address:
|:0059927C
|
:005993A0 8A4C2408 mov cl, byte ptr [esp+08]
:005993A4 53 push ebx
:005993A5 56 push esi
:005993A6 8B74240C mov esi, dword ptr [esp+0C]
:005993AA 8D4645 lea eax, dword ptr [esi+45]
:005993AD 8808 mov byte ptr [eax], cl
....略...
....略...
:00599405 52 push edx
:00599406 66894636 mov word ptr [esi+36], ax
:0059940A E8B1020000 call 005996C0
:0059940F 83C40C add esp, 0000000C
:00599412 66C746260300 mov [esi+26], 0003
:00599418 6A03 push 00000003
:0059941A 56 push esi
:0059941B E830FCFFFF call 00599050 ;这里可以去看看call [9]
:00599420 668B5E2A mov bx, word ptr [esi+2A] ;这里返回bx=07,是猜测的,因为下面有一句test bx,07
:00599424 83C408 add esp, 00000008
:00599427 F6C380 test bl, 80
:0059942A 7406 je 00599432 ;必须跳jmp
:0059942C 66891E mov word ptr [esi], bx
:0059942F 5E pop esi
:00599430 5B pop ebx
:00599431 C3 ret
....略...
....略...
:0059949C 66894E24 mov word ptr [esi+24], cx
:005994A0 83E00E and eax, 0000000E
:005994A3 F6C307 test bl, 07 ;==>看到就在这猜测的
:005994A6 668906 mov word ptr [esi], ax
:005994A9 7504 jne 005994AF
:005994AB 40 inc eax
:005994AC 668906 mov word ptr [esi], ax
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:005994A9(C)
|
:005994AF 5E pop esi
:005994B0 5B pop ebx
:005994B1 C3 ret
这里可以进去看看call [9]
................
* Referenced by a CALL at Addresses:
|:00599358 , :0059941B , :00599501 , :0059955E , :005995DA
|:005995E9
|
:00599050 83EC08 sub esp, 00000008
:00599053 53 push ebx
:00599054 55 push ebp
:00599055 56 push esi
:00599056 8B74241C mov esi, dword ptr [esp+1C]
:0059905A 83E603 and esi, 00000003
:0059905D 57 push edi
....略...
....略...
:00599100 52 push edx
:00599101 EB16 jmp 00599119
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:005990D8(C)
|
:00599103 8B4F52 mov ecx, dword ptr [edi+52]
:00599106 8D442414 lea eax, dword ptr [esp+14]
:0059910A 6A00 push 00000000
:0059910C 50 push eax
:0059910D 6A60 push 00000060
:0059910F 57 push edi
:00599110 6A60 push 00000060
:00599112 57 push edi
:00599113 680F002200 push 0022000F
:00599118 51 push ecx
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00599101(U)
|