我正在研究破解一个带狗的程序,用W32asm无极版,查看字符串参考,找请插入软件狗,这里就这一句字符串,双击会会到相应的地址,我原本以为是一个地址,无意中发现,双击一下地址不一样,总共有9个地址,如下..晕死.这样的怎么爆办破解啊.解啊
004F3A40 1
004F3DCE 2
004F3E18 3
004F4070 4
004F4109 5
004F461B 6
004F4AB5 7
004F4D2A 8
004F4DBE 9
004F3A1B . 85C0 test eax, eax
004F3A1D 74 3C je short 004F3A5B
004F3A1F . 6A 10 push 10
004F3A21 . 8D95 88F8FFFF lea edx, dword ptr [ebp-778]
004F3A27 . A1 40045C00 mov eax, dword ptr [5C0440]
004F3A2C . 8B00 mov eax, dword ptr [eax]
004F3A2E . E8 F9DAF7FF call 0047152C
004F3A33 . 8B85 88F8FFFF mov eax, dword ptr [ebp-778]
004F3A39 . E8 8612F1FF call 00404CC4
004F3A3E . 8BC8 mov ecx, eax
004F3A40 . BA 28434F00 mov edx, 004F4328 ''请插入软件狗
004F3A45 . A1 40045C00 mov eax, dword ptr [5C0440]
004F3A4A . 8B00 mov eax, dword ptr [eax]
004F3A4C . E8 B3E0F7FF call 00471B04
004F3A51 . E8 2A0CF1FF call 00404680
004F3A56 E9 68080000 jmp 004F42C3
004F3A5B B2 01 mov dl, 1
004F3DA0 . E8 7FFBF0FF call 00403924
004F3DA5 . C3 retn
004F3DA6 .^ E9 0D03F1FF jmp 004040B8
004F3DAB .^ EB EC jmp short 004F3D99
004F3DAD > 6A 10 push 10
004F3DAF . 8D95 80F8FFFF lea edx, dword ptr [ebp-780]
004F3DB5 . A1 40045C00 mov eax, dword ptr [5C0440]
004F3DBA . 8B00 mov eax, dword ptr [eax]
004F3DBC . E8 6BD7F7FF call 0047152C
004F3DC1 . 8B85 80F8FFFF mov eax, dword ptr [ebp-780]
004F3DC7 . E8 F80EF1FF call 00404CC4
004F3DCC . 8BC8 mov ecx, eax
004F3DCE . BA 28434F00 mov edx, 004F4328 ''请插入软件狗
004F3DD3 . A1 40045C00 mov eax, dword ptr [5C0440]
004F3DD8 . 8B00 mov eax, dword ptr [eax]
004F3DDA . E8 25DDF7FF call 00471B04
004F3DDF . E8 9C08F1FF call 00404680
004F3DE4 . E8 7704F1FF call 00404260
004F3DE9 E9 D5040000 jmp 004F42C3
004F3DEE > C605 BC265D00>mov byte ptr [5D26BC], 55
004F3DF5 . EB 41 jmp short 004F3E38
004F3DF7 > 6A 10 push 10
004F3DF9 . 8D95 7CF8FFFF lea edx, dword ptr [ebp-784]
004F3DDF . E8 9C08F1FF call 00404680
004F3DE4 . E8 7704F1FF call 00404260
004F3DE9 E9 D5040000 jmp 004F42C3
004F3DEE > C605 BC265D00>mov byte ptr [5D26BC], 55
004F3DF5 . EB 41 jmp short 004F3E38
004F3DF7 > 6A 10 push 10
004F3DF9 . 8D95 7CF8FFFF lea edx, dword ptr [ebp-784]
004F3DFF . A1 40045C00 mov eax, dword ptr [5C0440]
004F3E04 . 8B00 mov eax, dword ptr [eax]
004F3E06 . E8 21D7F7FF call 0047152C
004F3E0B . 8B85 7CF8FFFF mov eax, dword ptr [ebp-784]
004F3E11 . E8 AE0EF1FF call 00404CC4
004F3E16 . 8BC8 mov ecx, eax
004F3E18 . BA 28434F00 mov edx, 004F4328 ''请插入软件狗
004F3E1D . A1 40045C00 mov eax, dword ptr [5C0440]
004F3E22 . 8B00 mov eax, dword ptr [eax]
004F3E24 . E8 DBDCF7FF call 00471B04
004F3E29 . E8 5208F1FF call 00404680
004F3E2E . E8 2D04F1FF call 00404260
004F3E33 E9 8B040000 jmp 004F42C3
004F3E38 > 33C0 xor eax, eax
004F3E3A . 8A85 B2FDFFFF mov al, byte ptr [ebp-24E]
004F3E40 . C1E0 18 shl eax, 18
004F403B . 46 inc esi
004F403C . FECA dec dl
004F403E .^ 75 E1 jnz short 004F4021
004F4040 > 8A85 B1FDFFFF mov al, byte ptr [ebp-24F]
004F4046 . 8845 E5 mov byte ptr [ebp-1B], al
004F4049 . 807D E5 20 cmp byte ptr [ebp-1B], 20
004F404D 74 41 je short 004F4090
004F404F . 6A 10 push 10
004F4051 . 8D95 78F8FFFF lea edx, dword ptr [ebp-788]
004F4057 . A1 40045C00 mov eax, dword ptr [5C0440]
004F405C . 8B00 mov eax, dword ptr [eax]
004F405E . E8 C9D4F7FF call 0047152C
004F4063 . 8B85 78F8FFFF mov eax, dword ptr [ebp-788]
004F4069 . E8 560CF1FF call 00404CC4
004F406E . 8BC8 mov ecx, eax
004F4070 . BA 28434F00 mov edx, 004F4328 ''''请插入软件狗
004F4075 . A1 40045C00 mov eax, dword ptr [5C0440]
004F407A . 8B00 mov eax, dword ptr [eax]
004F407C . E8 83DAF7FF call 00471B04
004F4081 . E8 FA05F1FF call 00404680
004F4086 . E8 D501F1FF call 00404260
004F408B E9 33020000 jmp 004F42C3
004F4090 > 8B0D ACFC5B00 mov ecx, dword ptr [5BFCAC] ; de_Camer.005BE198
004F4096 . 33DB xor ebx, ebx
004F4098 . 8A5D E5 mov bl, byte ptr [ebp-1B]
004F409B . 8BD3 mov edx, ebx
004F409D . B0 20 mov al, 20
004F409F . E8 100EF1FF call 00404EB4
还有没列出来..望高手指点一下~~~
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课