第五章里KeyFile保护的实例的不解

来源:互联网 发布:艾瑞数据网站排名 编辑:程序博客网 时间:2024/05/16 12:01
重新运行程序,PacMe将打开KwazyWeb.bit文件,读取数据进行计算比较。代码如下:  
004016E8.6A00push0;/pOverlapped=NULL  
004016EA.6848344000push00403448;|pBytesRead=PacMe.00403448  
004016EF.6A01push1;|BytesToRead=1  
004016F1.68FA344000push004034FA;|Buffer=PacMe.004034FA  
004016F6.FF3544344000pushdwordptr[403444];|hFile=NULL  
004016FC.E811010000call<jmp.&KERNEL32.ReadFile>;\ReadFile  
==============================  
od中加载,怎么找到地址004016E8处的代码的?求过程!  
我试了下对check按钮下消息断点,转到的代码处是【地址:0040129A】  
00401275|>/6A00/push0;/MsgFilterMax=0  
00401277|.|6A00|push0;|MsgFilterMin=0  
00401279|.|6A00|push0;|hWnd=NULL  
0040127B|.|8D45B4|leaeax,dwordptr[ebp-4C];|  
0040127E|.|50|pusheax;|pMsg  
0040127F|.|E80A050000|call<jmp.&USER32.GetMessageA>;\GetMessageA  
00401284|.|0BC0|oreax,eax  
00401286|.|7414|jeshort0040129C  
00401288|.|8D45B4|leaeax,dwordptr[ebp-4C]  
0040128B|.|50|pusheax;/pMsg  
0040128C|.|E857050000|call<jmp.&USER32.TranslateMessage>;\TranslateMessage  
00401291|.|8D45B4|leaeax,dwordptr[ebp-4C]  
00401294|.|50|pusheax;/pMsg  
00401295|.|E8E8040000|call<jmp.&USER32.DispatchMessageA>;\DispatchMessageA  
0040129A|.^\EBD9\jmpshort00401275  
==================================================
求转到4016e8地址处代码的过程!  
0 0
原创粉丝点击