- UID
- 2329473
- 主题
- 0
- 阅读权限
- 20
- 帖子
- 33
- 精华
- 0
- 积分
- 17
- 金钱
- 112
- 荣誉
- 0
- 人气
- 0
- 在线时间
- 12 小时
- 评议
- 0
- 帖子
- 33
- 精华
- 0
- 积分
- 17
- 金钱
- 112
- 荣誉
- 0
- 人气
- 0
- 评议
- 0
|
太长了只能放一小段上来,先看看吧
+++++++++++++++++++++++++ 汇编代码列表+++++++++++++++++++
//************************ 代码开始 .text ***************
Program Entry Point = 0045372D (E:\游戏\SANGO7\SG7.exe File Offset:000B852D)
:00401000 B9E8A74800 mov ecx, 0048A7E8
:00401005 E8ADD20000 call 0040E2B7
:0040100A 33C0 xor eax, eax
:0040100C A3F8854700 mov dword ptr [004785F8], eax
:00401011 A3F4854700 mov dword ptr [004785F4], eax
:00401016 A3E0854700 mov dword ptr [004785E0], eax
:0040101B A3DC854700 mov dword ptr [004785DC], eax
:00401020 A3D8854700 mov dword ptr [004785D8], eax
:00401025 A3F0854700 mov dword ptr [004785F0], eax
:0040102A A3EC854700 mov dword ptr [004785EC], eax
:0040102F A3E8854700 mov dword ptr [004785E8], eax
:00401034 A3E4854700 mov dword ptr [004785E4], eax
:00401039 A2BE854700 mov byte ptr [004785BE], al
:0040103E A2FEA94800 mov byte ptr [0048A9FE], al
:00401043 A2E4A74800 mov byte ptr [0048A7E4], al
:00401048 A2C0854700 mov byte ptr [004785C0], al
:0040104D A2BD854700 mov byte ptr [004785BD], al
:00401052 A2BC854700 mov byte ptr [004785BC], al
:00401057 A2BB854700 mov byte ptr [004785BB], al
:0040105C A2BA854700 mov byte ptr [004785BA], al
:00401061 A2B9854700 mov byte ptr [004785B9], al
:00401066 A2B8854700 mov byte ptr [004785B8], al
:0040106B A3D4A74800 mov dword ptr [0048A7D4], eax
:00401070 C705E0A7480003000000 mov dword ptr [0048A7E0], 00000003
:0040107A C605BF85470001 mov byte ptr [004785BF], 01
:00401081 B8D0A74800 mov eax, 0048A7D0
:00401086 C3 ret
* Referenced by a CALL at Address:
|:004019FA
|
:00401087 55 push ebp
:00401088 8BEC mov ebp, esp
:0040108A 81EC28040000 sub esp, 00000428
:00401090 57 push edi
:00401091 8D85E4FDFFFF lea eax, dword ptr [ebp+FFFFFDE4]
:00401097 50 push eax
:00401098 BF04010000 mov edi, 00000104
:0040109D 57 push edi
:0040109E C645FE00 mov [ebp-02], 00
:004010A2 C645FF00 mov [ebp-01], 00
* Reference To: KERNEL32.GetCurrentDirectoryW, Ord:0000h
|
:004010A6 FF1514634600 Call dword ptr [00466314]
:004010AC FF7508 push [ebp+08]
:004010AF E845030000 call 004013F9
:004010B4 E8D5D10000 call 0040E28E
:004010B9 85C0 test eax, eax
:004010BB 7419 je 004010D6
:004010BD 6A10 push 00000010
:004010BF 6886AD4600 push 0046AD86
:004010C4 6888AD4600 push 0046AD88
:004010C9 6A00 push 00000000
* Reference To: USER32.MessageBoxA, Ord:0000h
|
:004010CB FF1550664600 Call dword ptr [00466650]
:004010D1 E9DA010000 jmp 004012B0
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004010BB(C)
|
:004010D6 833DE0A7480000 cmp dword ptr [0048A7E0], 00000000
:004010DD 53 push ebx
:004010DE 56 push esi
:004010DF BBF4A74800 mov ebx, 0048A7F4
:004010E4 7520 jne 00401106
:004010E6 6AFF push FFFFFFFF
:004010E8 FF35E8A74800 push dword ptr [0048A7E8]
:004010EE BE98C84800 mov esi, 0048C898
:004010F3 6A01 push 00000001
:004010F5 E8CE530000 call 004064C8
:004010FA A0BC854700 mov al, byte ptr [004785BC]
:004010FF A29AC84800 mov byte ptr [0048C89A], al
:00401104 EB4E jmp 00401154
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004010E4(C)
|
:00401106 8D45FE lea eax, dword ptr [ebp-02]
:00401109 50 push eax
:0040110A 68E0A74800 push 0048A7E0
:0040110F 8BF3 mov esi, ebx
:00401111 B898C84800 mov eax, 0048C898
:00401116 E8075A0000 call 00406B22
:0040111B 84C0 test al, al
:0040111D 750F jne 0040112E
:0040111F C705D485470001000000 mov dword ptr [004785D4], 00000001
:00401129 E973010000 jmp 004012A1
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040111D(C)
|
:0040112E A098C84800 mov al, byte ptr [0048C898]
:00401133 A2E4A74800 mov byte ptr [0048A7E4], al
:00401138 A099C84800 mov al, byte ptr [0048C899]
:0040113D 68DCA74800 push 0048A7DC
:00401142 8845FF mov byte ptr [ebp-01], al
:00401145 8D85D8FBFFFF lea eax, dword ptr [ebp+FFFFFBD8]
:0040114B 50 push eax
:0040114C 57 push edi
:0040114D 53 push ebx
* Reference To: KERNEL32.GetFullPathNameW, Ord:0000h
|
:0040114E FF150C634600 Call dword ptr [0046630C]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401104(U)
|
:00401154 FF35E0A74800 push dword ptr [0048A7E0]
:0040115A 53 push ebx
:0040115B E86B810100 call 004192CB
:00401160 85C0 test eax, eax
:00401162 7426 je 0040118A
:00401164 BF98C84800 mov edi, 0048C898
:00401169 E826550000 call 00406694
:0040116E 8D85E4FDFFFF lea eax, dword ptr [ebp+FFFFFDE4]
:00401174 50 push eax
* Reference To: KERNEL32.SetCurrentDirectoryW, Ord:0000h
|
:00401175 FF1510634600 Call dword ptr [00466310]
:0040117B C705D485470001000000 mov dword ptr [004785D4], 00000001
:00401185 E924010000 jmp 004012AE
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401162(C)
|
:0040118A 807DFF01 cmp byte ptr [ebp-01], 01
:0040118E 0F85A8000000 jne 0040123C
:00401194 803DB5A7480001 cmp byte ptr [0048A7B5], 01
:0040119B 0F859B000000 jne 0040123C
:004011A1 E8D2C70000 call 0040D978
:004011A6 84C0 test al, al
:004011A8 0F858E000000 jne 0040123C
:004011AE 57 push edi
:004011AF 8D85D8FBFFFF lea eax, dword ptr [ebp+FFFFFBD8]
:004011B5 50 push eax
:004011B6 6A00 push 00000000
* Reference To: KERNEL32.GetModuleFileNameW, Ord:0000h
|
:004011B8 FF1508634600 Call dword ptr [00466308]
:004011BE 807DFE00 cmp byte ptr [ebp-02], 00
:004011C2 7451 je 00401215
:004011C4 BFF0AD4600 mov edi, 0046ADF0
:004011C9 57 push edi
:004011CA 8D75F0 lea esi, dword ptr [ebp-10]
:004011CD E811D10000 call 0040E2E3
:004011D2 53 push ebx
:004011D3 8BC6 mov eax, esi
:004011D5 E804D30000 call 0040E4DE
:004011DA 57 push edi
:004011DB 8BC6 mov eax, esi
:004011DD E8FCD20000 call 0040E4DE
:004011E2 6A01 push 00000001
:004011E4 8D85E4FDFFFF lea eax, dword ptr [ebp+FFFFFDE4]
:004011EA 50 push eax
:004011EB FF75F0 push [ebp-10]
:004011EE 8D85D8FBFFFF lea eax, dword ptr [ebp+FFFFFBD8]
:004011F4 50 push eax
:004011F5 68F4AD4600 push 0046ADF4
* Reference To: USER32.GetForegroundWindow, Ord:0000h
|
:004011FA FF15F4654600 Call dword ptr [004665F4]
:00401200 50 push eax
* Reference To: SHELL32.ShellExecuteW, Ord:0000h
|
:00401201 FF1514644600 Call dword ptr [00466414]
:00401207 FF75F0 push [ebp-10]
:0040120A E837D10400 call 0044E346
:0040120F 59 pop ecx
:00401210 E982000000 jmp 00401297
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004011C2(C)
|
:00401215 6A01 push 00000001
:00401217 8D85E4FDFFFF lea eax, dword ptr [ebp+FFFFFDE4]
:0040121D 50 push eax
:0040121E FF7508 push [ebp+08]
:00401221 8D85D8FBFFFF lea eax, dword ptr [ebp+FFFFFBD8]
:00401227 50 push eax
:00401228 68F4AD4600 push 0046ADF4
* Reference To: USER32.GetForegroundWindow, Ord:0000h
|
:0040122D FF15F4654600 Call dword ptr [004665F4]
:00401233 50 push eax
* Reference To: SHELL32.ShellExecuteW, Ord:0000h
|
:00401234 FF1514644600 Call dword ptr [00466414]
:0040123A EB5B jmp 00401297
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0040118E(C), :0040119B(C), :004011A8(C)
|
:0040123C E874000000 call 004012B5
:00401241 E842010000 call 00401388
:00401246 803DE4A7480000 cmp byte ptr [0048A7E4], 00
:0040124D 750A jne 00401259
:0040124F BF40B24800 mov edi, 0048B240
:00401254 E8D68C0000 call 00409F2F
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040124D(C)
|
:00401259 6A01 push 00000001
:0040125B B800AA4800 mov eax, 0048AA00
:00401260 E8C8810100 call 0041942D
:00401265 803DE4A7480000 cmp byte ptr [0048A7E4], 00
:0040126C 7529 jne 00401297
:0040126E BF64C04800 mov edi, 0048C064
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401295(C)
|
:00401273 8B37 mov esi, dword ptr [edi]
:00401275 85F6 test esi, esi
:00401277 7413 je 0040128C
:00401279 FF7608 push [esi+08]
:0040127C E8C5D00400 call 0044E346
:00401281 56 push esi
:00401282 E8BFD00400 call 0044E346
:00401287 832700 and dword ptr [edi], 00000000
:0040128A 59 pop ecx
:0040128B 59 pop ecx
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401277(C)
|
:0040128C 83C704 add edi, 00000004
:0040128F 81FF80C84800 cmp edi, 0048C880
:00401295 7CDC jl 00401273
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00401210(U), :0040123A(U), :0040126C(C)
|
:00401297 BF98C84800 mov edi, 0048C898
:0040129C E8F3530000 call 00406694
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401129(U)
|
:004012A1 8D85E4FDFFFF lea eax, dword ptr [ebp+FFFFFDE4]
:004012A7 50 push eax
* Reference To: KERNEL32.SetCurrentDirectoryW, Ord:0000h
|
:004012A8 FF1510634600 Call dword ptr [00466310]
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00401185(U)
|
:004012AE 5E pop esi
:004012AF 5B pop ebx
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004010D1(U)
|
:004012B0 5F pop edi
:004012B1 C9 leave
:004012B2 C20400 ret 0004
* Referenced by a CALL at Address:
|:0040123C
|
:004012B5 55 push ebp
:004012B6 8BEC mov ebp, esp
:004012B8 83EC34 sub esp, 00000034
:004012BB 53 push ebx
:004012BC 56 push esi
:004012BD 57 push edi
:004012BE 6A0F push 0000000F
* Reference To: USER32.GetSysColorBrush, Ord:0000h
|
:004012C0 FF15F0654600 Call dword ptr [004665F0]
:004012C6 68007F0000 push 00007F00
:004012CB 33DB xor ebx, ebx
:004012CD 53 push ebx
:004012CE 8BF8 mov edi, eax
* Reference To: USER32.LoadCursorW, Ord:0000h
|
:004012D0 FF15EC654600 Call dword ptr [004665EC]
* Reference To: USER32.LoadIconW, Ord:0000h
|
:004012D6 8B35E8654600 mov esi, dword ptr [004665E8]
* Possible Reference to String Resource ID=00161: ""If" ?舺 "
|
:004012DC 68A1000000 push 000000A1
:004012E1 FF3500864700 push dword ptr [00478600]
:004012E7 8945FC mov dword ptr [ebp-04], eax
:004012EA FFD6 call esi
* Possible Reference to String Resource ID=00164: "
龏"
|
:004012EC 68A4000000 push 000000A4
:004012F1 FF3500864700 push dword ptr [00478600]
:004012F7 A3D0A74800 mov dword ptr [0048A7D0], eax
:004012FC FFD6 call esi
:004012FE 381DB1A74800 cmp byte ptr [0048A7B1], bl
:00401304 A3D8A74800 mov dword ptr [0048A7D8], eax
:00401309 750D jne 00401318
:0040130B 381DBFA74800 cmp byte ptr [0048A7BF], bl
:00401311 7505 jne 00401318
:00401313 6A04 push 00000004
:00401315 58 pop eax
:00401316 EB03 jmp 0040131B |
|