- UID
- 47441
注册时间2008-2-28
阅读权限40
最后登录1970-1-1
独步武林
TA的每日心情 | 开心 2021-9-9 20:17 |
---|
签到天数: 53 天 [LV.5]常住居民I
|
本帖最后由 cdygr 于 2017-11-27 18:11 编辑
调拭到的代码如下:第一次:011373AD 3BC6 cmp eax,esi
011373AF 74 12 je XEasyCont.011373C3
011373B1 0FB68B 58020000 movzx ecx,byte ptr ds:[ebx+0x258]
011373B8 898B 0C010000 mov dword ptr ds:[ebx+0x10C],ecx
011373BE E9 18030000 jmp EasyCont.011376DB
011373C3 8D5424 18 lea edx,dword ptr ss:[esp+0x18]
011373C7 52 push edx
011373C8 8D8B 0C010000 lea ecx,dword ptr ds:[ebx+0x10C]
011373CE 8D9424 98130000 lea edx,dword ptr ss:[esp+0x1398]
011373D5 E8 96CCFEFF call EasyCont.01124070
011373DA 83C4 04 add esp,0x4
011373DD 84C0 test al,al
011373DF 0F85 AE010000 jnz EasyCont.01137593 ; 需要改的地方是这儿,jnz改为jn
011373E5 8D8424 74010000 lea eax,dword ptr ss:[esp+0x174]
011373EC 50 push eax
011373ED E8 6E000200 call EasyCont.01157460
011373F2 8D8C24 74010000 lea ecx,dword ptr ss:[esp+0x174]
011373F9 C68424 381C0000>mov byte ptr ss:[esp+0x1C38],0xE
01137401 FF15 0C9D2701 call dword ptr ds:[<&mfc100u.#3627>] ; mfc100u.#3627
01137407 83F8 01 cmp eax,0x1
0113740A 75 19 jnz XEasyCont.01137425
0113740C 8D8C24 74010000 lea ecx,dword ptr ss:[esp+0x174]
01137413 C68424 381C0000>mov byte ptr ss:[esp+0x1C38],0xC
0113741B E8 50010200 call EasyCont.01157570
不能直接改文件,不然没法运行了。所以想 做一个啥劫持补丁或者其它啥的,可前面的地址老是变化,同一台电脑每次运行OD都不一样:
第二次
000F73BE /E9 18030000 jmp EasyCont.000F76DB
000F73C3 |8D5424 18 lea edx,dword ptr ss:[esp+0x18]
000F73C7 |52 push edx
000F73C8 |8D8B 0C010000 lea ecx,dword ptr ds:[ebx+0x10C]
000F73CE |8D9424 98130000 lea edx,dword ptr ss:[esp+0x1398]
000F73D5 |E8 96CCFEFF call EasyCont.000E4070
000F73DA |83C4 04 add esp,0x4
000F73DD |84C0 test al,al
000F73DF |0F85 AE010000 jnz EasyCont.000F7593 ; 需要改的地方是这儿,jnz改为jn
000F73E5 |8D8424 74010000 lea eax,dword ptr ss:[esp+0x174]
000F73EC |50 push eax
000F73ED |E8 6E000200 call EasyCont.00117460
000F73F2 |8D8C24 74010000 lea ecx,dword ptr ss:[esp+0x174]
000F73F9 |C68424 381C0000>mov byte ptr ss:[esp+0x1C38],0xE
000F7401 |FF15 0C9D2300 call dword ptr ds:[<&mfc100u.#3627>] ; mfc100u.#3627
000F7407 |83F8 01 cmp eax,0x1
000F740A |75 19 jnz XEasyCont.000F7425
000F740C |8D8C24 74010000 lea ecx,dword ptr ss:[esp+0x174]
000F7413 |C68424 381C0000>mov byte ptr ss:[esp+0x1C38],0xC
000F741B |E8 50010200 call EasyCont.00117570
第三次看到的:(又变了,还是同一台电脑)
000473DF /0F85 AE010000 jnz EasyCont.00047593 ; 改跳转即可
000473E5 |8D8424 74010000 lea eax,dword ptr ss:[esp+0x174]
000473EC |50 push eax
000473ED |E8 6E000200 call EasyCont.00067460
000473F2 |8D8C24 74010000 lea ecx,dword ptr ss:[esp+0x174]
000473F9 |C68424 381C0000>mov byte ptr ss:[esp+0x1C38],0xE
00047401 |FF15 0C9D1800 call dword ptr ds:[<&mfc100u.#3627>] ; mfc100u.#3627
00047407 |83F8 01 cmp eax,0x1
0004740A |75 19 jnz XEasyCont.00047425
0004740C |8D8C24 74010000 lea ecx,dword ptr ss:[esp+0x174]
00047413 |C68424 381C0000>mov byte ptr ss:[esp+0x1C38],0xC
0004741B |E8 50010200 call EasyCont.00067570
烦请高手帮忙给做一个补丁,谢谢。
|
|