正常的C++6如下:
00432EE2 \. C3 RETN
00432EE3 >/$ 55 PUSH EBP
00432EE4 |. 8BEC MOV EBP,ESP
00432EE6 |. 6A FF PUSH -1
00432EE8 |. 68 38634700 PUSH pro.00476338
00432EED |. 68 9C5D4300 PUSH pro.00435D9C ; SE 处理程序安装
00432EF2 |. 64:A1 0000000>MOV EAX,DWORD PTR FS:[0]
00432EF8 |. 50 PUSH EAX
00432EF9 |. 64:8925 00000>MOV DWORD PTR FS:[0],ESP
00432F00 |. 83EC 58 SUB ESP,58
00432F03 |. 53 PUSH EBX
00432F04 |. 56 PUSH ESI
00432F05 |. 57 PUSH EDI
00432F06 |. 8965 E8 MOV DWORD PTR SS:[EBP-18],ESP
00432F09 |. FF15 64D34600 CALL DWORD PTR DS:[<&KERNEL32.GetVersion>; kernel32.GetVersion
00432F0F |. 33D2 XOR EDX,EDX
00432F11 |. 8AD4 MOV DL,AH
00432F13 |. 8915 80394900 MOV DWORD PTR DS:[493980],EDX
00432F19 |. 8BC8 MOV ECX,EAX
00432F1B |. 81E1 FF000000 AND ECX,0FF
00432F21 |. 890D 7C394900 MOV DWORD PTR DS:[49397C],ECX
00432F27 |. C1E1 08 SHL ECX,8
00432F2A |. 03CA ADD ECX,EDX
00432F2C |. 890D 78394900 MOV DWORD PTR DS:[493978],ECX
00432F32 |. C1E8 10 SHR EAX,10
00432F35 |. A3 74394900 MOV DWORD PTR DS:[493974],EAX
00432F3A |. 6A 01 PUSH 1
00432F3C |. E8 883B0000 CALL pro.00436AC9
我用脚本脱后~发现被偷窃代码了
但情况却是这样
00438A98 8AD4 mov dl,ah
00438A9A 8915 D0F29400 mov dword ptr ds:[94F2D0],edx
00438AA0 8BC8 mov ecx,eax
00438AA2 81E1 FF000000 and ecx,0FF
00438AA8 890D CCF29400 mov dword ptr ds:[94F2CC],ecx
00438AAE C1E1 08 shl ecx,8
00438AB1 03CA add ecx,edx
00438AB3 890D C8F29400 mov dword ptr ds:[94F2C8],ecx
00438AB9 C1E8 10 shr eax,10
00438ABC A3 C4F29400 mov dword ptr ds:[94F2C4],eax
00438AC1 6A 01 push 1
00438AC3 E8 894C0000 call qq软件.0043D751
对比正常的应该代码在00438A98 8AD4 mov dl,ah之上
可是如果一滚动的话00438A98 8AD4 mov dl,ah这个就消失了看下面的代码~在第2,3行中间,这样的话我就无法把上面的代码复制上去了~该怎么办???
00438A96 C3 retn
00438A97 D38A D48915D0 ror dword ptr ds:[edx+D01589D4],c>
00438A9D F2: prefix repne:
00438A9E 94 xchg eax,esp
00438A9F 008B C881E1FF add byte ptr ds:[ebx+FFE181C8],cl
00438AA5 0000 add byte ptr ds:[eax],al
00438AA7 0089 0DCCF294 add byte ptr ds:[ecx+94F2CC0D],cl
00438AAD 00C1 add cl,al
00438AAF E1 08 loopde short qq软件.00438AB9
00438AB1 03CA add ecx,edx
00438AB3 890D C8F29400 mov dword ptr ds:[94F2C8],ecx
00438AB9 C1E8 10 shr eax,10
00438ABC A3 C4F29400 mov dword ptr ds:[94F2C4],eax
00438AC1 6A 01 push 1
00438AC3 E8 894C0000 call qq软件.0043D751
00438AC8 59 pop ecx
00438AC9 85C0 test eax,eax
00438ACB 75 08 jnz short qq软件.00438AD5
00438ACD 6A 1C push 1C
00438ACF E8 C3000000 call qq软件.00438B97
[培训]科锐逆向工程师培训第53期2025年7月8日开班!