![]() |
#2
diycai2021-09-14 15:59
00007FBF099AF1E9 mov rcx, rdx
00007FBF099AF1EC mov rax, rdi 00007FBF099AF1EF xor edx, edx 00007FBF099AF1F1 div rcx 00007FBF099AF1F4 xor eax, eax 00007FBF099AF1F6 test rsi, rsi 00007FBF099AF1F9 jz short locret_7FBF099AF22D 00007FBF099AF1FB test sil, 1 00007FBF099AF1FF jz short loc_7FBF099AF214 00007FBF099AF201 add rax, rdx 00007FBF099AF204 mov rdi, rax 00007FBF099AF207 jb short loc_7FBF099AF20E 00007FBF099AF209 cmp rcx, rax 00007FBF099AF20C ja short loc_7FBF099AF214 00007FBF099AF20E mov rax, rdi 00007FBF099AF211 sub rax, rcx 00007FBF099AF214 lea r8, [rdx+rdx] 00007FBF099AF218 cmp r8, rdx 00007FBF099AF21B jb short loc_7FBF099AF222 00007FBF099AF21D cmp r8, rcx 00007FBF099AF220 jb short loc_7FBF099AF225 00007FBF099AF222 sub r8, rcx 00007FBF099AF225 shr rsi, 1 00007FBF099AF228 mov rdx, r8 00007FBF099AF22B jmp short loc_7FBF099AF1F6 00007FBF099AF22D retn 00007FBF099AF22E push rbx 00007FBF099AF22F mov r10, rsi 00007FBF099AF232 mov rbx, rdx 00007FBF099AF235 mov r11d, 1 00007FBF099AF23B push rcx 00007FBF099AF23C test r10, r10 00007FBF099AF23F jz short loc_7FBF099AF270 00007FBF099AF241 test r10b, 1 00007FBF099AF245 jz short loc_7FBF099AF25D 00007FBF099AF247 mov rsi, r11 00007FBF099AF24A mov rdx, rbx 00007FBF099AF24D mov [rsp+10h+var_10], rdi 00007FBF099AF251 call start 00007FBF099AF256 mov rdi, [rsp+10h+var_10] 00007FBF099AF25A mov r11, rax 00007FBF099AF25D mov rsi, rdi 00007FBF099AF260 mov rdx, rbx 00007FBF099AF263 call start 00007FBF099AF268 mov rdi, rax 00007FBF099AF26B shr r10, 1 00007FBF099AF26E jmp short loc_7FBF099AF23C 00007FBF099AF270 mov rax, r11 00007FBF099AF273 pop rdx 00007FBF099AF274 pop rbx 00007FBF099AF275 retn 来逆向一下,经验丰富的应该经常遇到上面的代码。 |
本人精通汇编语言、Java、C/C++、Objective-C、Swift,熟悉反编译、脱壳、抓包、拦截、算法破解等,对逆向工程有浓厚兴趣,熟练使用 Linux、Git,有10年以上实际开发经验,暂时只能远程工作,请联系QQ号:4141717(长期在线)