把某软件的升级检测修改后打补丁输出了;再启动时出来了这。
原来答案很简单:
当来到这里时,慢慢向上找,或跨模块所有调用+程序领空,便能一步定位到关键代码处。
[Asm] 纯文本查看 复制代码 013FF6D1 | 8BEC | mov ebp,esp |
013FF6D3 | 83E4 F8 | and esp,FFFFFFF8 |
013FF6D6 | 81EC 3C070000 | sub esp,73C |
013FF6DC | 803D EC135C01 00 | cmp byte ptr ds:[15C13EC],0 |
013FF6E3 | 53 | push ebx |
013FF6E4 | 56 | push esi | esi:"p\f)"
013FF6E5 | 57 | push edi |
013FF6E6 | 8BD9 | mov ebx,ecx |
013FF6E8 | 0F85 EC010000 | jne patch跳过启动升级检测1_保密.13FF8DA |
013FF6EE | A0 49E15701 | mov al,byte ptr ds:[157E149] |
013FF6F3 | 3C FF | cmp al,FF |
013FF6F5 | 75 19 | jne patch跳过启动升级检测1_保密.13FF710 |
013FF6F7 | 33D2 | xor edx,edx |
013FF6F9 | B9 2CA15501 | mov ecx,patch跳过启动升级检测1_保密.155A12C | 155A12C:L"SDS"
013FF6FE | E8 0DFD72FF | call <patch跳过启动升级检测1_保密.sub_B2F410> |
013FF703 | 3D 689AC178 | cmp eax,78C19A68 |
013FF708 | 0F94C0 | sete al |
013FF70B | A2 49E15701 | mov byte ptr ds:[157E149],al |
013FF710 | 3C 01 | cmp al,1 | 改这里经测试不可以!
013FF712 | 0F84 C2010000 | je patch跳过启动升级检测1_保密.13FF8DA | 尝试在这里跳过!
013FF718 | 83CA FF | or edx,FFFFFFFF |
013FF71B | 8BCB | mov ecx,ebx |
013FF71D | E8 8E0473FF | call <patch跳过启动升级检测1_保密.sub_B2FBB0> |
013FF722 | 85C0 | test eax,eax |
013FF724 | 75 07 | jne patch跳过启动升级检测1_保密.13FF72D |
013FF726 | 5F | pop edi |
013FF727 | 5E | pop esi | esi:"p\f)"
013FF728 | 5B | pop ebx |
013FF729 | 8BE5 | mov esp,ebp |
013FF72B | 5D | pop ebp |
013FF72C | C3 | ret |
013FF72D | 8D4424 24 | lea eax,dword ptr ss:[esp+24] |
013FF731 | C74424 24 10000000 | mov dword ptr ss:[esp+24],10 |
013FF739 | 894424 4C | mov dword ptr ss:[esp+4C],eax |
013FF73D | 0F57C0 | xorps xmm0,xmm0 |
013FF740 | 8D4424 34 | lea eax,dword ptr ss:[esp+34] |
013FF744 | 66:0F134424 2C | movlpd qword ptr ss:[esp+2C],xmm0 |
013FF74A | 50 | push eax |
013FF74B | 8D4424 18 | lea eax,dword ptr ss:[esp+18] |
013FF74F | 895C24 2C | mov dword ptr ss:[esp+2C],ebx |
013FF753 | 50 | push eax |
013FF754 | 6A 00 | push 0 |
013FF756 | 66:0F134424 44 | movlpd qword ptr ss:[esp+44],xmm0 |
013FF75C | C74424 50 00000000 | mov dword ptr ss:[esp+50],0 | [esp+50]:sub_A9DB90
013FF764 | 66:0F134424 5C | movlpd qword ptr ss:[esp+5C],xmm0 |
013FF76A | C74424 64 00000000 | mov dword ptr ss:[esp+64],0 |
013FF772 | 66:0F134424 6C | movlpd qword ptr ss:[esp+6C],xmm0 |
013FF778 | C74424 40 34000000 | mov dword ptr ss:[esp+40],34 | [esp+40]:"p\f)", 34:'4'
013FF780 | C74424 4C 02000000 | mov dword ptr ss:[esp+4C],2 |
013FF788 | C74424 54 01000000 | mov dword ptr ss:[esp+54],1 | [esp+54]:sub_A9DB90
013FF790 | C74424 68 10000000 | mov dword ptr ss:[esp+68],10 | [esp+68]:&"0嫨"
013FF798 | C74424 20 6BC5AA00 | mov dword ptr ss:[esp+20],<patch跳过启动升级检测1_保密 | [esp+20]:L"燐豺"
013FF7A0 | C74424 24 44CDD011 | mov dword ptr ss:[esp+24],11D0CD44 |
013FF7A8 | C74424 28 8CC200C0 | mov dword ptr ss:[esp+28],C000C28C |
013FF7B0 | C74424 2C 4FC295EE | mov dword ptr ss:[esp+2C],EE95C24F |
013FF7B8 | FF15 704A4B01 | call dword ptr ds:[<&WinVerifyTrust>] ==>此处是数字签名校验的源头(1)修改之后启动文件被修改的提示就没了!
|