⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 p2pstockdrv1.pas

📁 飞狐全推驱动源码,内有好几个版本的源代码
💻 PAS
📖 第 1 页 / 共 2 页
字号:
00406013   8B10                   mov     edx, [eax]
00406015   FF5204                 call    dword ptr [edx+$04]
00406018   59                     pop     ecx
00406019   8B83AC030000           mov     eax, [ebx+$03AC]
0040601F   0FBF4874               movsx   ecx, word ptr [eax+$74]
00406023   8B506E                 mov     edx, [eax+$6E]
00406026   8BC1                   mov     eax, ecx
00406028   C1E003                 shl     eax, $03
0040602B   2BC1                   sub     eax, ecx
0040602D   C1E003                 shl     eax, $03
00406030   2BC1                   sub     eax, ecx
00406032   03C0                   add     eax, eax
00406034   03D0                   add     edx, eax
00406036   52                     push    edx
00406037   8B93B4030000           mov     edx, [ebx+$03B4]
0040603D   52                     push    edx

|
0040603E   E815BFFFFF             call    00401F58

* Reference to control Login1 : TSpeedButton
|
00406043   8B8348030000           mov     eax, [ebx+$0348]
00406049   83C408                 add     esp, +$08
0040604C   33D2                   xor     edx, edx
0040604E   8B08                   mov     ecx, [eax]
00406050   FF5164                 call    dword ptr [ecx+$64]
00406053   5B                     pop     ebx
00406054   C3                     ret

*)
end;

procedure TForm1.Login2Click(Sender : TObject);
begin
(*
00406058   53                     push    ebx
00406059   8BD8                   mov     ebx, eax
0040605B   8B83B4030000           mov     eax, [ebx+$03B4]
00406061   80B8F800000000         cmp     byte ptr [eax+$00F8], $00
00406068   7407                   jz      00406071
0040606A   50                     push    eax
0040606B   8B10                   mov     edx, [eax]
0040606D   FF5204                 call    dword ptr [edx+$04]
00406070   59                     pop     ecx

* Reference to control Shape1 : TShape
|
00406071   8B8B90030000           mov     ecx, [ebx+$0390]
00406077   BA00DD0000             mov     edx, $0000DD00
0040607C   8B816C010000           mov     eax, [ecx+$016C]

* Reference to : TIcon._PROC_004428BC()
|
00406082   E835C80300             call    004428BC
00406087   B201                   mov     dl, $01

* Reference to control Login1 : TSpeedButton
|
00406089   8B8348030000           mov     eax, [ebx+$0348]
0040608F   8B08                   mov     ecx, [eax]
00406091   FF5164                 call    dword ptr [ecx+$64]
00406094   5B                     pop     ebx
00406095   C3                     ret

*)
end;

procedure TForm1.Login3Click(Sender : TObject);
begin
(*

|
00405FDC   E8F7BF0400             call    00451FD8
00405FE1   C3                     ret

*)
end;

procedure TForm1.FormShow(Sender : TObject);
begin
(*
00405FE4   53                     push    ebx
00405FE5   8BD8                   mov     ebx, eax
00405FE7   6A00                   push    $00
00405FE9   6A04                   push    $04
00405FEB   8BC3                   mov     eax, ebx

|
00405FED   E80E1E0600             call    00467E00
00405FF2   50                     push    eax

* Reference to: GetWindow()
|
00405FF3   E870890800             call    0048E968
00405FF8   50                     push    eax

* Reference to: ShowWindow()
|
00405FF9   E8088B0800             call    0048EB06
00405FFE   5B                     pop     ebx
00405FFF   C3                     ret

*)
end;

procedure TForm1.Timer1Timer(Sender : TObject);
begin
(*
004060FC   53                     push    ebx
004060FD   8BD8                   mov     ebx, eax
004060FF   56                     push    esi
00406100   57                     push    edi
00406101   55                     push    ebp
00406102   83C48C                 add     esp, -$74

* Reference to control M0 : TCheckBox
|
00406105   8B8354030000           mov     eax, [ebx+$0354]
0040610B   BF404B4A00             mov     edi, $004A4B40
00406110   8B10                   mov     edx, [eax]
00406112   FF92C4000000           call    dword ptr [edx+$00C4]
00406118   84C0                   test    al, al
0040611A   7418                   jz      00406134

* Reference to control Login1 : TSpeedButton
|
0040611C   8B8348030000           mov     eax, [ebx+$0348]
00406122   8B10                   mov     edx, [eax]
00406124   FF5250                 call    dword ptr [edx+$50]
00406127   84C0                   test    al, al
00406129   7409                   jz      00406134
0040612B   33D2                   xor     edx, edx
0040612D   8BC3                   mov     eax, ebx

* Reference to : TForm1.Login1Click()
|
0040612F   E8CCFEFFFF             call    00406000
00406134   8B8BB4030000           mov     ecx, [ebx+$03B4]
0040613A   83B9A006000000         cmp     dword ptr [ecx+$06A0], +$00
00406141   0F8485020000           jz      004063CC
00406147   6A00                   push    $00

|
00406149   E8F63F0800             call    0048A144
0040614E   59                     pop     ecx
0040614F   8983E0030000           mov     [ebx+$03E0], eax
00406155   8B83B4030000           mov     eax, [ebx+$03B4]
0040615B   8B80A0060000           mov     eax, [eax+$06A0]
00406161   8983E4030000           mov     [ebx+$03E4], eax
00406167   8BF0                   mov     esi, eax
00406169   8B93E0030000           mov     edx, [ebx+$03E0]
0040616F   2BF2                   sub     esi, edx
00406171   3BC2                   cmp     eax, edx
00406173   7D06                   jnl     0040617B
00406175   8983E0030000           mov     [ebx+$03E0], eax
0040617B   8B83B4030000           mov     eax, [ebx+$03B4]
00406181   8B8BE0030000           mov     ecx, [ebx+$03E0]
00406187   89889C060000           mov     [eax+$069C], ecx
0040618D   FF05C0F14900           inc     dword ptr [$0049F1C0]
00406193   8B15C0F14900           mov     edx, [$0049F1C0]
00406199   83FA64                 cmp     edx, +$64
0040619C   7E20                   jle     004061BE
0040619E   6A00                   push    $00
004061A0   6A00                   push    $00
004061A2   6A00                   push    $00
004061A4   6850F34900             push    $0049F350
004061A9   6A00                   push    $00
004061AB   33C9                   xor     ecx, ecx
004061AD   6A02                   push    $02
004061AF   50                     push    eax
004061B0   890DC0F14900           mov     [$0049F1C0], ecx

|
004061B6   E855DEFFFF             call    00404010
004061BB   83C41C                 add     esp, +$1C
004061BE   81FE5C1C0000           cmp     esi, $00001C5C
004061C4   7D05                   jnl     004061CB
004061C6   83FEC4                 cmp     esi, -$3C
004061C9   7F10                   jnle    004061DB
004061CB   81FEDC500000           cmp     esi, $000050DC
004061D1   7D47                   jnl     0040621A
004061D3   81FE38310000           cmp     esi, $00003138
004061D9   7E3F                   jle     0040621A
004061DB   FF05C4F14900           inc     dword ptr [$0049F1C4]
004061E1   A1C4F14900             mov     eax, dword ptr [$0049F1C4]
004061E6   83F805                 cmp     eax, +$05
004061E9   7E19                   jle     00406204
004061EB   8B83B4030000           mov     eax, [ebx+$03B4]
004061F1   80B87306000000         cmp     byte ptr [eax+$0673], $00
004061F8   740A                   jz      00406204
004061FA   33D2                   xor     edx, edx
004061FC   8915C4F14900           mov     [$0049F1C4], edx
00406202   EB16                   jmp     0040621A
00406204   833DC4F149001E         cmp     dword ptr [$0049F1C4], +$1E
0040620B   7E0D                   jle     0040621A
0040620D   8B8BB4030000           mov     ecx, [ebx+$03B4]
00406213   C6817306000001         mov     byte ptr [ecx+$0673], $01
0040621A   A13C4B4A00             mov     eax, dword ptr [$004A4B3C]
0040621F   50                     push    eax

* Reference to: IsWindow()
|
00406220   E8A3870800             call    0048E9C8
00406225   85C0                   test    eax, eax
00406227   0F859F010000           jnz     004063CC
0040622D   6A00                   push    $00
0040622F   6898604000             push    $00406098

* Reference to: EnumWindows()
|
00406234   E82D860800             call    0048E866
00406239   85C0                   test    eax, eax
0040623B   0F855A010000           jnz     0040639B
00406241   54                     push    esp
00406242   8B153C4B4A00           mov     edx, [$004A4B3C]
00406248   52                     push    edx

* Reference to: GetWindowThreadProcessId()
|
00406249   E83E870800             call    0048E98C
0040624E   8B0C24                 mov     ecx, [esp]
00406251   51                     push    ecx
00406252   6A00                   push    $00
00406254   68FF0F1F00             push    $001F0FFF

* Reference to: OpenProcess()
|
00406259   E89E810800             call    0048E3FC
0040625E   8BF0                   mov     esi, eax
00406260   8937                   mov     [edi], esi
00406262   6A04                   push    $04
00406264   6800100000             push    $00001000
00406269   6800001000             push    $00100000
0040626E   6A00                   push    $00
00406270   56                     push    esi

* Reference to: VirtualAllocEx()
|
00406271   E80A820800             call    0048E480
00406276   A3444B4A00             mov     dword ptr [$004A4B44], eax
0040627B   8B07                   mov     eax, [edi]
0040627D   85C0                   test    eax, eax
0040627F   0F8447010000           jz      004063CC
00406285   6A00                   push    $00
00406287   6A04                   push    $04
00406289   8D54240C               lea     edx, [esp+$0C]
0040628D   52                     push    edx
0040628E   68B0F97500             push    $0075F9B0
00406293   50                     push    eax

* Reference to: ReadProcessMemory()
|
00406294   E875810800             call    0048E40E
00406299   6A00                   push    $00
0040629B   6A40                   push    $40
0040629D   8D4C243C               lea     ecx, [esp+$3C]
004062A1   51                     push    ecx
004062A2   8B442410               mov     eax, [esp+$10]
004062A6   50                     push    eax
004062A7   8B17                   mov     edx, [edi]
004062A9   52                     push    edx

* Reference to: ReadProcessMemory()
|
004062AA   E85F810800             call    0048E40E
004062AF   8D4C246F               lea     ecx, [esp+$6F]
004062B3   8D442464               lea     eax, [esp+$64]
004062B7   8B28                   mov     ebp, [eax]
004062B9   8B31                   mov     esi, [ecx]
004062BB   6A00                   push    $00
004062BD   6A04                   push    $04
004062BF   68484B4A00             push    $004A4B48
004062C4   56                     push    esi
004062C5   8B07                   mov     eax, [edi]
004062C7   50                     push    eax

* Reference to: ReadProcessMemory()
|
004062C8   E841810800             call    0048E40E
004062CD   0FBF15484B4A00         movsx   edx, word ptr [$004A4B48]
004062D4   8BCA                   mov     ecx, edx
004062D6   83C676                 add     esi, +$76
004062D9   C1E104                 shl     ecx, $04
004062DC   6A00                   push    $00
004062DE   03CA                   add     ecx, edx
004062E0   C1E102                 shl     ecx, $02
004062E3   51                     push    ecx

* Possible String Reference to: '

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -