⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 forms.pas

📁 传奇3delphi代码 请自己看吧 包括地图
💻 PAS
📖 第 1 页 / 共 3 页
字号:
    procedure _PROC_0044B08C(Sender : TObject);
    procedure _PROC_0044B434(Sender : TObject);
    procedure _PROC_0044B4C4(Sender : TObject);
    procedure _PROC_0044B4EC(Sender : TObject);
    procedure _PROC_0044B514(Sender : TObject);
    procedure _PROC_0044B525(Sender : TObject);
    procedure Forms.Initialization(Sender : TObject);
    procedure Forms.Finalization(Sender : TObject);
  private
    { Private declarations }
  public
    { Public declarations }
  end ;

var
  Application: TApplication;

{This file is generated by DeDe Ver 3.50.04 Copyright (c) 1999-2002 DaFixer}

implementation

{$R *.DFM}

procedure TApplication._PROC_004418D8(Sender : TObject);
begin
(*

* Reference to Application
|
004418D8   A1D0375000             mov     eax, dword ptr [$005037D0]

* Reference to field Application.OFFS_0024
|
004418DD   8B4024                 mov     eax, [eax+$24]
004418E0   85C0                   test    eax, eax
004418E2   7408                   jz      004418EC
004418E4   6A00                   push    $00
004418E6   50                     push    eax

* Reference to: user32.ShowOwnedPopups()
|
004418E7   E8246AFCFF             call    00408310
004418EC   33D2                   xor     edx, edx

* Reference to Application
|
004418EE   A1D0375000             mov     eax, dword ptr [$005037D0]

* Reference to : TApplication._PROC_0044A898()
|
004418F3   E8A08F0000             call    0044A898

* Reference to Application
|
004418F8   A1D0375000             mov     eax, dword ptr [$005037D0]

* Reference to: Classes.Proc_004173FC
|
004418FD   E8FA5AFDFF             call    004173FC

* Reference to Application
|
00441902   A1D0375000             mov     eax, dword ptr [$005037D0]

* Reference to: Classes.Proc_004173A4
|
00441907   E8985AFDFF             call    004173A4
0044190C   C3                     ret

*)
end;

procedure TApplication._PROC_00441910(Sender : TObject);
begin
(*
00441910   55                     push    ebp
00441911   8BEC                   mov     ebp, esp
00441913   53                     push    ebx
00441914   8B5D08                 mov     ebx, [ebp+$08]
00441917   3B1DB4095000           cmp     ebx, [$005009B4]
0044191D   7436                   jz      00441955
0044191F   53                     push    ebx

* Reference to: user32.IsWindowVisible()
|
00441920   E85368FCFF             call    00408178
00441925   85C0                   test    eax, eax
00441927   742C                   jz      00441955
00441929   53                     push    ebx

* Reference to: user32.IsWindowEnabled()
|
0044192A   E84168FCFF             call    00408170
0044192F   85C0                   test    eax, eax
00441931   7422                   jz      00441955
00441933   B808000000             mov     eax, $00000008

* Reference to: System.Proc_00402800
|
00441938   E8C30EFCFF             call    00402800
0044193D   8B15C0095000           mov     edx, [$005009C0]
00441943   8910                   mov     [eax], edx
00441945   895804                 mov     [eax+$04], ebx
00441948   A3C0095000             mov     dword ptr [$005009C0], eax
0044194D   6A00                   push    $00
0044194F   53                     push    ebx

* Reference to: user32.EnableWindow()
|
00441950   E83366FCFF             call    00407F88
00441955   83C8FF                 or      eax, -$01
00441958   5B                     pop     ebx
00441959   5D                     pop     ebp
0044195A   C20800                 ret     $0008

*)
end;

procedure TApplication._PROC_00441960(Sender : TObject);
begin
(*
00441960   55                     push    ebp
00441961   8BEC                   mov     ebp, esp
00441963   83C4F4                 add     esp, -$0C
00441966   53                     push    ebx
00441967   56                     push    esi
00441968   57                     push    edi
00441969   33D2                   xor     edx, edx
0044196B   8955FC                 mov     [ebp-$04], edx
0044196E   8B15B4095000           mov     edx, [$005009B4]
00441974   8955F8                 mov     [ebp-$08], edx
00441977   8B15C0095000           mov     edx, [$005009C0]
0044197D   8955F4                 mov     [ebp-$0C], edx
00441980   A3B4095000             mov     dword ptr [$005009B4], eax
00441985   33C0                   xor     eax, eax
00441987   A3C0095000             mov     dword ptr [$005009C0], eax
0044198C   33C0                   xor     eax, eax
0044198E   55                     push    ebp
0044198F   68031A4400             push    $00441A03

***** TRY
|
00441994   64FF30                 push    dword ptr fs:[eax]
00441997   648920                 mov     fs:[eax], esp
0044199A   33C0                   xor     eax, eax
0044199C   55                     push    ebp
0044199D   68CC194400             push    $004419CC

***** TRY
|
004419A2   64FF30                 push    dword ptr fs:[eax]
004419A5   648920                 mov     fs:[eax], esp
004419A8   6A00                   push    $00
004419AA   6810194400             push    $00441910

* Reference to: kernel32.GetCurrentThreadId()
|
004419AF   E8E460FCFF             call    00407A98
004419B4   50                     push    eax

* Reference to: user32.EnumThreadWindows()
|
004419B5   E8DE65FCFF             call    00407F98
004419BA   A1C0095000             mov     eax, dword ptr [$005009C0]
004419BF   8945FC                 mov     [ebp-$04], eax
004419C2   33C0                   xor     eax, eax
004419C4   5A                     pop     edx
004419C5   59                     pop     ecx
004419C6   59                     pop     ecx
004419C7   648910                 mov     fs:[eax], edx
004419CA   EB19                   jmp     004419E5

* Reference to: System.Proc_004033D8
|
004419CC   E9071AFCFF             jmp     004033D8
004419D1   A1C0095000             mov     eax, dword ptr [$005009C0]

* Reference to : TApplication._PROC_00441A14()
|
004419D6   E839000000             call    00441A14

* Reference to: System.Proc_004037A0
|
004419DB   E8C01DFCFF             call    004037A0

* Reference to: System.Proc_004037F4
|
004419E0   E80F1EFCFF             call    004037F4

****** END
|
004419E5   33C0                   xor     eax, eax
004419E7   5A                     pop     edx
004419E8   59                     pop     ecx
004419E9   59                     pop     ecx
004419EA   648910                 mov     fs:[eax], edx

****** FINALLY
|
004419ED   680A1A4400             push    $00441A0A
004419F2   8B45F4                 mov     eax, [ebp-$0C]
004419F5   A3C0095000             mov     dword ptr [$005009C0], eax
004419FA   8B45F8                 mov     eax, [ebp-$08]
004419FD   A3B4095000             mov     dword ptr [$005009B4], eax
00441A02   C3                     ret


* Reference to: System.Proc_0040368C
|
00441A03   E9841CFCFF             jmp     0040368C
00441A08   EBE8                   jmp     004419F2

****** END
|
* Reference to Application
|
00441A0A   8B45FC                 mov     eax, [ebp-$04]
00441A0D   5F                     pop     edi
00441A0E   5E                     pop     esi
00441A0F   5B                     pop     ebx
00441A10   8BE5                   mov     esp, ebp
00441A12   5D                     pop     ebp
00441A13   C3                     ret

*)
end;

procedure TApplication._PROC_00441A14(Sender : TObject);
begin
(*
00441A14   53                     push    ebx
00441A15   56                     push    esi
00441A16   8BF0                   mov     esi, eax
00441A18   85F6                   test    esi, esi
00441A1A   742C                   jz      00441A48
00441A1C   8BDE                   mov     ebx, esi

* Reference to field TApplication.OFFS_0004
|
00441A1E   8B4304                 mov     eax, [ebx+$04]
00441A21   50                     push    eax

* Reference to: user32.IsWindow()
|
00441A22   E84167FCFF             call    00408168
00441A27   85C0                   test    eax, eax
00441A29   740B                   jz      00441A36
00441A2B   6AFF                   push    $FF

* Reference to field TApplication.OFFS_0004
|
00441A2D   8B4304                 mov     eax, [ebx+$04]
00441A30   50                     push    eax

* Reference to: user32.EnableWindow()
|
00441A31   E85265FCFF             call    00407F88
00441A36   8B33                   mov     esi, [ebx]
00441A38   BA08000000             mov     edx, $00000008
00441A3D   8BC3                   mov     eax, ebx

* Reference to: System.Proc_00402818
|
00441A3F   E8D40DFCFF             call    00402818
00441A44   85F6                   test    esi, esi
00441A46   75D4                   jnz     00441A1C
00441A48   5E                     pop     esi
00441A49   5B                     pop     ebx
00441A4A   C3                     ret

*)
end;

procedure TApplication._PROC_00441A4C(Sender : TObject);
begin
(*
00441A4C   55                     push    ebp
00441A4D   8BEC                   mov     ebp, esp
00441A4F   53                     push    ebx
00441A50   8B5D08                 mov     ebx, [ebp+$08]
00441A53   3B1DB4095000           cmp     ebx, [$005009B4]
00441A59   744A                   jz      00441AA5

* Reference to Application
|
00441A5B   A1D0375000             mov     eax, dword ptr [$005037D0]

* Reference to field Application.OFFS_0024
|
00441A60   3B5824                 cmp     ebx, [eax+$24]
00441A63   7440                   jz      00441AA5
00441A65   53                     push    ebx

* Reference to: user32.IsWindowVisible()
|
00441A66   E80D67FCFF             call    00408178
00441A6B   85C0                   test    eax, eax
00441A6D   7436                   jz      00441AA5
00441A6F   53                     push    ebx

* Reference to: user32.IsWindowEnabled()
|
00441A70   E8FB66FCFF             call    00408170
00441A75   85C0                   test    eax, eax
00441A77   742C                   jz      00441AA5
00441A79   6AEC                   push    $EC
00441A7B   53                     push    ebx

* Reference to: user32.GetWindowLongA()
|
00441A7C   E87766FCFF             call    004080F8
00441A81   A808                   test    al, $08
00441A83   7511                   jnz     00441A96
00441A85   833DB809500000         cmp     dword ptr [$005009B8], +$00
00441A8C   7517                   jnz     00441AA5
00441A8E   891DB8095000           mov     [$005009B8], ebx
00441A94   EB0F                   jmp     00441AA5
00441A96   833DBC09500000         cmp     dword ptr [$005009BC], +$00
00441A9D   7506                   jnz     00441AA5
00441A9F   891DBC095000           mov     [$005009BC], ebx
00441AA5   83C8FF                 or      eax, -$01
00441AA8   5B                     pop     ebx
00441AA9   5D                     pop     ebp
00441AAA   C20800                 ret     $0008

*)
end;

procedure TApplication._PROC_00441AB0(Sender : TObject);
begin
(*
00441AB0   A3B4095000             mov     dword ptr [$005009B4], eax
00441AB5   33C0                   xor     eax, eax
00441AB7   A3B8095000             mov     dword ptr [$005009B8], eax
00441ABC   33C0                   xor     eax, eax
00441ABE   A3BC095000             mov     dword ptr [$005009BC], eax
00441AC3   6A00                   push    $00
00441AC5   684C1A4400             push    $00441A4C

* Reference to: kernel32.GetCurrentThreadId()
|
00441ACA   E8C95FFCFF             call    00407A98
00441ACF   50                     push    eax

* Reference to: user32.EnumThreadWindows()
|
00441AD0   E8C364FCFF             call    00407F98
00441AD5   833DB809500000         cmp     dword ptr [$005009B8], +$00

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -