Ad safe 3.5.1.910强暴修改手记:
本帖最后由 冥界3大法王 于 2014-10-22 11:28 编辑软件功能看图也知道了,地球人都知道了就不说费话了,呵呵~~
这个窗口启动很讨厌,每次还得手工点一下。
折跃门和上集回顾在这里:
http://www.52pojie.cn/thread-253510-1-1.html
↓老版本软件在下面↓;
http://www.52pojie.cn/thread-298121-1-1.html
若用常规思路,一般能来到如下地方:
01286813|.FF15 54713601 call dword ptr ds:[<&DuiLib.DuiLib::C>;DuiLib.DuiLib::CPaintManagerUI::GetInstance
01286819|.50 push eax ; |hInst = 0061076F
0128681A|.FF15 30793601 call dword ptr ds:[<&USER32.LoadImage>; \LoadImageW
01286820|.8D4C24 0C lea ecx, dword ptr ss:
01286824|.51 push ecx
01286825|.B9 0C163701 mov ecx, ADSafe.0137160C ;ADSafe 净网大师
0128682A|.8986 FF020000 mov dword ptr ds:, eax
01286830|.E8 3BDAFEFF call ADSafe.01274270
01286835|.8B5424 0C mov edx, dword ptr ss:
01286839|.52 push edx ; /String2 = "婍?"
==========================================
0127227F|.B9 70F93601 mov ecx, ADSafe.0136F970 ;first_use
=============================================
01286825|.B9 0C163701 mov ecx, ADSafe.0137160C ;ADSafe 净网大师
=============================================
01272473|.6A 01 push 0x1
01272475 6A 00 push 0x1 ; 这次是这里,改成 push 0x0程序就自身找不到回家的窗口了。
01272477|.8BCE mov ecx, esi
01272479|.FF15 68723601 call dword ptr ds:[<&DuiLib.DuiLib::C>;DuiLib.DuiLib::CWindowWnd::ShowWindow
0127247F|>E8 7C88FFFF call ADSafe.0126AD00
01272484|.84C0 test al, al
01272486|.8D4C24 34 lea ecx, dword ptr ss:
0127248A|.B8 08F63601 mov eax, ADSafe.0136F608
0127248F|.74 1A je XADSafe.012724AB
01272491|.E8 FAA7FFFF call ADSafe.0126CC90
01272496|.833D 086A3B01>cmp dword ptr ds:, 0x0
0127249D|.74 29 je XADSafe.012724C8
0127249F|.8D4424 34 lea eax, dword ptr ss:
012724A3|.50 push eax
012724A4|.68 EA030000 push 0x3EA
012724A9|.EB 18 jmp XADSafe.012724C3
012724AB|>E8 E0A7FFFF call ADSafe.0126CC90
012724B0|.833D 086A3B01>cmp dword ptr ds:, 0x0
012724B7|.74 0F je XADSafe.012724C8
012724B9|.8D4C24 34 lea ecx, dword ptr ss:
012724BD|.51 push ecx
012724BE|.68 EB030000 push 0x3EB
012724C3|>E8 D8E20300 call ADSafe.012B07A0
012724C8|>8D7424 34 lea esi, dword ptr ss:
012724CC|.E8 2FA8FFFF call ADSafe.0126CD00
012724D1|.FF15 64723601 call dword ptr ds:[<&DuiLib.DuiLib::C>;F12,Ctrl+K,过程调用可以直达这里!!!
01287FD3|.B9 0C163701 mov ecx, ADSafe.0137160C ;ADSafe 净网大师
01288070|.B9 70F93601 mov ecx, ADSafe.0136F970 ;first_use
012880CE|.BF 70F93601 mov edi, ADSafe.0136F970 ;first_use
所以,得用高级战术:
F9之后,F12,Alt+K
之后代码 就前后对上了,
01272475 6A 00 push 0x1 ; 这次是这里,改成 push 0x0程序就自身找不到回家的窗口了。
鄙视伸手一族就不提供成品了,还是自己试试找找感觉吧~~{:301_975:}
大牛作品占楼欣赏 纯支持 迷迷糊糊看不懂·····{:301_991:}
页:
[1]