- UID
- 38475
注册时间2007-12-1
阅读权限10
最后登录1970-1-1
周游历练
该用户从未签到
|
楼主 |
发表于 2008-1-24 00:36:53
|
显示全部楼层
补下断点那一步
OD载入软件运行后,ctrl+n
找到UpdateWindow,回车,右键,在每个命令中设置断点。
关闭程序主窗体。OD断下。
向上找
0043A290 sub esp,10 ; 来到这里
0043A293 push ebx
0043A294 push ebp
0043A295 push esi
0043A296 xor ebx,ebx
0043A298 push edi
0043A299 inc ebx
0043A29A xor edi,edi
0043A29C test byte ptr ss:[esp+24],4
0043A2A1 mov esi,ecx
0043A2A3 mov dword ptr ss:[esp+14],ebx
0043A2A7 mov dword ptr ss:[esp+10],edi
0043A2AB je short BpmAnaly.0043A2B9
0043A2AD call BpmAnaly.0043CA91
0043A2B2 test eax,10000000
0043A2B7 je short BpmAnaly.0043A2BB
0043A2B9 xor ebx,ebx
0043A2BB push dword ptr ds:[esi+1C] ; /hWnd
0043A2BE call dword ptr ds:[<&USER32.GetParent>] ; \GetParent
0043A2C4 or dword ptr ds:[esi+38],18
0043A2C8 mov dword ptr ss:[esp+1C],eax
0043A2CC call BpmAnaly.0043802B
0043A2D1 mov ebp,dword ptr ds:[<&USER32.UpdateWi>; USER32.UpdateWindow
请看数据窗口
Local Call from 00437C2D
右键,前往 Call 来自 00437C2D
00437C10 /74 52 je short BpmAnaly.00437C64 ; jmp跳开call
00437C12 . |F646 38 10 test byte ptr ds:[esi+38],10
00437C16 . |74 1A je short BpmAnaly.00437C32
00437C18 . |6A 04 push 4
00437C1A . |5F pop edi
00437C1B . |8BCE mov ecx,esi
00437C1D . |E8 6F4E0000 call BpmAnaly.0043CA91
00437C22 . |F6C4 01 test ah,1
00437C25 . |74 03 je short BpmAnaly.00437C2A
00437C27 . |6A 05 push 5
00437C29 . |5F pop edi
00437C2A > |57 push edi ; /Arg1
00437C2B . |8BCE mov ecx,esi ; |
00437C2D . |E8 5E260000 call BpmAnaly.0043A290 ; \BpmAnaly.0043A290 |
|