应用olldbg脱telock加壳之菜鸟篇
2007-01-12 20:12:47 来源:WEB开发网F9运行,SHIFT+F9进行到这时停下
0064EBA6 CD 68 INT 68 //记住此处一定不要过了,否则不好玩
0064EBA8 66:05 7B0C ADD AX,0C7B
0064EBAC 66:48 DEC AX
0064EBAE 74 55 JE SHORT cookbook.0064EC05
0064EBB0 8D85 450B0000 LEA EAX,DWORD PTR SS:[EBP+B45]
0064EBB6 894424 04 MOV DWORD PTR SS:[ESP+4],EAX
0064EBBA 64:67:8926 0000 MOV DWORD PTR FS:[0],ESP
0064EBC0 EB 1F JMP SHORT cookbook.0064EBE1
0064EBC2 CD20 8B642408 VxDCall 824648B
0064EBC8 8B6C24 08 MOV EBP,DWORD PTR SS:[ESP+8]
0064EBCC 8D85 7A0B0000 LEA EAX,DWORD PTR SS:[EBP+B7A]
0064EBD2 50 PUSH EAX
0064EBD3 EB 01 JMP SHORT cookbook.0064EBD6
0064EBD5 E8 81AD591C CALL 1CBE995B
0064EBDA 0000 ADD BYTE PTR DS:[EAX],AL
0064EBDC 88B465 CCC3EB01 MOV BYTE PTR SS:[EBP+1EBC3CC],DH
0064EBE3 EB 33 JMP SHORT cookbook.0064EC18
0064EBE5 DB ??? ; Unknown command
0064EBE6 8BC3 MOV EAX,EBX
0064EBE8 66:BE 4746 MOV SI,4647
0064EBEC 66:BF 4D4A MOV DI,4A4D
0064EBF0 CC INT3
0064EBF1 90 NOP
0064EBF2 66:81FE 4746 CMP SI,4647
0064EBF7 75 0C JNZ SHORT cookbook.0064EC05
0064EBF9 64:67:8F06 0000 POP DWORD PTR FS:[0]
0064EBFF 83C4 04 ADD ESP,4
更多精彩
赞助商链接