admin 发表于 2022-12-28 23:21:26

找CALL 找基址 传奇M 控件点击 CALL 核心代码





00007FF6A36E3AA0 | 48:895C24 08 | mov qword ptr ss:, rbx |
00007FF6A36E3AA5 | 4C:894424 18 | mov qword ptr ss:, r8 |
00007FF6A36E3AAA | 48:895424 10 | mov qword ptr ss:, rdx |
00007FF6A36E3AAF | 55 | push rbp |
00007FF6A36E3AB0 | 56 | push rsi |
00007FF6A36E3AB1 | 57 | push rdi |
00007FF6A36E3AB2 | 41:54 | push r12 |
00007FF6A36E3AB4 | 41:55 | push r13 |
00007FF6A36E3AB6 | 41:56 | push r14 |
00007FF6A36E3AB8 | 41:57 | push r15 |
00007FF6A36E3ABA | 48:8BEC | mov rbp, rsp |
00007FF6A36E3ABD | 48:83EC 70 | sub rsp, 70 |
00007FF6A36E3AC1 | 49:8BF0 | mov rsi, r8 |
00007FF6A36E3AC4 | 4C:8BEA | mov r13, rdx |
00007FF6A36E3AC7 | 48:8BF9 | mov rdi, rcx |
00007FF6A36E3ACA | 49:8B08 | mov rcx, qword ptr ds: |
00007FF6A36E3ACD | 48:85C9 | test rcx, rcx |
00007FF6A36E3AD0 | 0F84 13040000 | je mirmg-win64-shipping.7FF6A36E3EE9 |
00007FF6A36E3AD6 | 45:84C9 | test r9b, r9b |
00007FF6A36E3AD9 | 0F84 0A040000 | je mirmg-win64-shipping.7FF6A36E3EE9 |
00007FF6A36E3ADF | 48:8B01 | mov rax, qword ptr ds: |
00007FF6A36E3AE2 | FF50 40 | call qword ptr ds: |
00007FF6A36E3AE5 | 44:8BF0 | mov r14d, eax |
00007FF6A36E3AE8 | 8D88 38FFFFFF | lea ecx, qword ptr ds: |
00007FF6A36E3AEE | 81F9 C7000000 | cmp ecx, C7 |
00007FF6A36E3AF4 | 0F87 39030000 | ja mirmg-win64-shipping.7FF6A36E3E33 |



**** Hidden Message *****



kenyang0219 发表于 2023-2-6 02:22:07

学习下!!!

575516558 发表于 2023-2-15 11:04:12

笑口常开,好彩自然来。

空白1007 发表于 2023-10-20 17:01:09

学习一下!!!!!!!!
页: [1]
查看完整版本: 找CALL 找基址 传奇M 控件点击 CALL 核心代码