https://bbs.pediy.com/thread-96427.htm按照帖子里的点修改了路径,PChunter也成功欺骗了,但是WKE64(b3aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6m8P5s2c8y4N6h3g2D9L8r3g2J5i4K6u0r3g2$3W2F1k6r3!0%4M7#2)9J5k6p5E0W2M7X3&6W2L8q4)9J5k6p5g2^5M7r3I4G2M7X3g2J5i4K6t1&6i4@1f1$3i4@1t1J5i4@1p5I4i4@1f1#2i4K6S2m8i4K6W2q4i4@1f1$3i4@1t1K6i4K6V1#2i4@1f1$3i4@1q4o6i4@1u0m8i4@1f1&6i4@1q4m8i4K6V1%4模块列表里面的变了,但是进程列表里面的没变.想问下,WKE64是从哪里获得的路径?
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课