⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 addon.s

📁 M8手机图片查看器
💻 S
📖 第 1 页 / 共 3 页
字号:
  00178	e50b3060	 str         r3, [r11, #-0x60]
  0017c	e3a03000	 mov         r3, #0
  00180	e24b206c	 sub         r2, r11, #0x6C
  00184	e1a01005	 mov         r1, r5
  00188	e24b003c	 sub         r0, r11, #0x3C
  0018c	e58d6000	 str         r6, [sp]
  00190	e1a0e00f	 mov         lr, pc
  00194	e12fff14	 bx          r4

; 279  :     ReleaseDC(0, desktopDC);

  00198	e59f308c	 ldr         r3, [pc, #0x8C]
  0019c	e1a01005	 mov         r1, r5
  001a0	e3a00000	 mov         r0, #0
  001a4	e1a0e00f	 mov         lr, pc
  001a8	e12fff13	 bx          r3

; 280  : }

  001ac	e59f3074	 ldr         r3, [pc, #0x74]
  001b0	e24b003c	 sub         r0, r11, #0x3C
  001b4		 |$M106581|
  001b4	e1a0e00f	 mov         lr, pc
  001b8	e12fff13	 bx          r3
  001bc	e24bd018	 sub         sp, r11, #0x18
  001c0	e89da870	 ldmia       sp, {r4 - r6, r11, sp, pc}
  001c4		 |$M106585|
  001c4		 |__unwind$106570|
  001c4	e52de004	 str         lr, [sp, #-4]!
  001c8	e24dd004	 sub         sp, sp, #4
  001cc		 |$M106588|
  001cc	e24b003c	 sub         r0, r11, #0x3C
  001d0	e59f3050	 ldr         r3, [pc, #0x50]
  001d4		 |$M106582|
  001d4	e1a0e00f	 mov         lr, pc
  001d8	e12fff13	 bx          r3
  001dc	e28dd004	 add         sp, sp, #4
  001e0	e8bd8000	 ldmia       sp!, {pc}
  001e4		 |$M106589|
  001e4		 |__unwind$106571|
  001e4	e52de004	 str         lr, [sp, #-4]!
  001e8	e24dd004	 sub         sp, sp, #4
  001ec		 |$M106591|
  001ec	e24b004c	 sub         r0, r11, #0x4C
  001f0	e59f302c	 ldr         r3, [pc, #0x2C]
  001f4	e1a0e00f	 mov         lr, pc
  001f8	e12fff13	 bx          r3
  001fc	e28dd004	 add         sp, sp, #4
  00200	e8bd8000	 ldmia       sp!, {pc}
  00204		 |$M106592|
  00204		 |__unwind$106572|
  00204	e52de004	 str         lr, [sp, #-4]!
  00208	e24dd004	 sub         sp, sp, #4
  0020c		 |$M106594|
  0020c	e24b005c	 sub         r0, r11, #0x5C
  00210	e59f300c	 ldr         r3, [pc, #0xC]
  00214	e1a0e00f	 mov         lr, pc
  00218	e12fff13	 bx          r3
  0021c	e28dd004	 add         sp, sp, #4
  00220	e8bd8000	 ldmia       sp!, {pc}
  00224		 |$LN22@DrawSplash|
  00224		 |$LN23@DrawSplash|
  00224	00000000	 DCD         |??1CMzStringW@@UAA@XZ|
  00228		 |$LN24@DrawSplash|
  00228	00000000	 DCD         |??1ImagingHelper@@UAA@XZ|
  0022c		 |$LN25@DrawSplash|
  0022c	00000000	 DCD         |ReleaseDC|
  00230		 |$LN26@DrawSplash|
  00230	00000000	 DCD         |?Draw@ImagingHelper@@QAAXPAUHDC__@@PAUtagRECT@@_N2@Z|
  00234		 |$LN27@DrawSplash|
  00234	00000000	 DCD         |?GetImageHeight@ImagingHelper@@QAAHXZ|
  00238		 |$LN28@DrawSplash|
  00238	00000000	 DCD         |?GetImageWidth@ImagingHelper@@QAAHXZ|
  0023c		 |$LN29@DrawSplash|
  0023c	00000000	 DCD         |?MzGetWorkArea@@YA?AUtagRECT@@XZ|
  00240		 |$LN30@DrawSplash|
  00240	00000000	 DCD         |GetDC|
  00244		 |$LN31@DrawSplash|
  00244	00000000	 DCD         |?LoadImageW@ImagingHelper@@QAAHPB_W_N11@Z|
  00248		 |$LN32@DrawSplash|
  00248	00000000	 DCD         |??BCMzStringW@@QBAPB_WXZ|
  0024c		 |$LN33@DrawSplash|
  0024c	00000000	 DCD         |??HCMzStringW@@QAA?AV0@PB_W@Z|
  00250		 |$LN34@DrawSplash|
  00250	00000000	 DCD         |$SG-99|
  00254		 |$LN35@DrawSplash|
  00254	00000000	 DCD         |?GetStartDir@@YA?AVCMzStringW@@XZ|
  00258		 |$LN36@DrawSplash|
  00258	00000000	 DCD         |??0ImagingHelper@@QAA@XZ|
  0025c		 |$M106595|

			 ENDP  ; |?DrawSplashOnWorld@@YAXXZ|, DrawSplashOnWorld

	EXPORT	|__$ArrayPad$| [ DATA ]
	EXPORT	|?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z| ; GuessMIMEType

  00020			 AREA	 |.pdata|, PDATA
|$T106640| DCD	|$LN19@GuessMIMET|
	DCD	0xc0005e04
|$T106643| DCD	|__unwind$106617|
	DCD	0x40000701
|$T106646| DCD	|__unwind$106618|
	DCD	0x40001401

  011a4			 AREA	 |.rdata|, DATA, READONLY
|__unwindtable$?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z| DCD 0xffffffff
	DCD	|__unwind$106617|
	DCD	0x0
	DCD	|__unwind$106618|
	DCD	0xffffffff
	DCD	|__unwind$106618|
|__ehfuncinfo$?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z| DCD 0x19930522
	DCD	0x3
	DCD	|__unwindtable$?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z|
	DCD	0x0
	DCD	0x0
	DCD	0x4
	DCD	|$T106636|
	DCD	0x0
	DCD	0x1
	DCD	0xffffffe4
|$T106636| DCD	|$M106632|
	DCD	0x0
	DCD	|$M106633|
	DCD	0x2
	DCD	|$M106634|
	DCD	0xffffffff
	DCD	|$M106635|
	DCD	0x0
; Function compile flags: /Ogtpy

  0025c			 AREA	 |.text|, CODE, ARM

  0025c	00000000	 DCD         |__GSHandlerCheck_EH|
  00260	00000000	 DCD         |__ehfuncinfo$?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z|

  00264		 |?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z| PROC ; GuessMIMEType

; 236  : TImageType GuessMIMEType(LPWSTR filename) {

  00264		 |$LN19@GuessMIMET|
  00264	e1a0c00d	 mov         r12, sp
  00268	e92d5870	 stmdb       sp!, {r4 - r6, r11, r12, lr}
  0026c	e28db018	 add         r11, sp, #0x18
  00270	e24dd01c	 sub         sp, sp, #0x1C
  00274		 |$M106637|
  00274	e59f31c8	 ldr         r3, [pc, #0x1C8]
  00278	e5933000	 ldr         r3, [r3]
  0027c	e50b301c	 str         r3, [r11, #-0x1C]

; 237  :     TImageType Result = itUnknown;
; 238  : 
; 239  :     QFile inputfile(QString::fromUtf16((ushort*)filename));

  00280	e59f31b8	 ldr         r3, [pc, #0x1B8]
  00284	e3e05000	 mvn         r5, #0
  00288	e1a01000	 mov         r1, r0
  0028c	e5933000	 ldr         r3, [r3]
  00290	e1a02005	 mov         r2, r5
  00294	e24b0028	 sub         r0, r11, #0x28
  00298	e1a0e00f	 mov         lr, pc
  0029c	e12fff13	 bx          r3
  002a0	e1a01000	 mov         r1, r0
  002a4	e59f3190	 ldr         r3, [pc, #0x190]
  002a8	e24b0034	 sub         r0, r11, #0x34
  002ac	e5933000	 ldr         r3, [r3]
  002b0		 |$M106632|
  002b0	e1a0e00f	 mov         lr, pc
  002b4	e12fff13	 bx          r3
  002b8	e59f3158	 ldr         r3, [pc, #0x158]
  002bc	e24b0028	 sub         r0, r11, #0x28
  002c0	e5933000	 ldr         r3, [r3]
  002c4		 |$M106633|
  002c4	e1a0e00f	 mov         lr, pc
  002c8	e12fff13	 bx          r3

; 240  :     inputfile.open(QIODevice::ReadOnly);

  002cc	e59f3164	 ldr         r3, [pc, #0x164]
  002d0	e3a02001	 mov         r2, #1
  002d4	e24b102c	 sub         r1, r11, #0x2C
  002d8	e5933000	 ldr         r3, [r3]
  002dc	e24b0034	 sub         r0, r11, #0x34
  002e0	e50b202c	 str         r2, [r11, #-0x2C]
  002e4	e1a0e00f	 mov         lr, pc
  002e8	e12fff13	 bx          r3

; 241  :     byte headerbuf[5] = {0};
; 242  : 
; 243  :     inputfile.read(LPSTR(&headerbuf[0]), sizeof headerbuf);

  002ec	e59f3140	 ldr         r3, [pc, #0x140]
  002f0	e3a06000	 mov         r6, #0
  002f4	e54b6023	 strb        r6, [r11, #-0x23]
  002f8	e5934000	 ldr         r4, [r3]
  002fc	e3a02000	 mov         r2, #0
  00300	e54b6022	 strb        r6, [r11, #-0x22]
  00304	e54b6021	 strb        r6, [r11, #-0x21]
  00308	e54b2024	 strb        r2, [r11, #-0x24]
  0030c	e3a03000	 mov         r3, #0
  00310	e54b6020	 strb        r6, [r11, #-0x20]
  00314	e3a02005	 mov         r2, #5
  00318	e24b1024	 sub         r1, r11, #0x24
  0031c	e24b0034	 sub         r0, r11, #0x34
  00320	e1a0e00f	 mov         lr, pc
  00324	e12fff14	 bx          r4

; 244  : 
; 245  :     if (*PDWORD(&headerbuf[0]) == 0x00424949 || *PDWORD(&headerbuf[0]) == 0x42004D4D) {

  00328	e59f3100	 ldr         r3, [pc, #0x100]
  0032c	e51b2024	 ldr         r2, [r11, #-0x24]
  00330	e1520003	 cmp         r2, r3
  00334	0a000002	 beq         |$LN5@GuessMIMET|
  00338	e59f30ec	 ldr         r3, [pc, #0xEC]
  0033c	e1520003	 cmp         r2, r3
  00340	1a000000	 bne         |$LN6@GuessMIMET|
  00344		 |$LN5@GuessMIMET|

; 246  :         // II4200, MM0042
; 247  :         Result = itTarga;

  00344	e3a05000	 mov         r5, #0
  00348		 |$LN6@GuessMIMET|

; 248  :     }
; 249  :     if (*PWORD(&headerbuf[0]) == 0x4D42) {

  00348	e15b12b4	 ldrh        r1, [r11, #-0x24]
  0034c	e3a03c4d	 mov         r3, #0x4D, 24
  00350	e3833042	 orr         r3, r3, #0x42
  00354	e1510003	 cmp         r1, r3

; 250  :         // BM
; 251  :         Result = itBitmap;

  00358	e3a03b36	 mov         r3, #0x36, 22

; 252  :     }
; 253  :     if (*PWORD(&headerbuf[0]) == 0xD8FF) {

  0035c	e38330ff	 orr         r3, r3, #0xFF
  00360	03a05001	 moveq       r5, #1
  00364	e1510003	 cmp         r1, r3

; 254  :         // JFIF Magic
; 255  :         Result = itJPEG;
; 256  :     }
; 257  :     if (*PDWORD(&headerbuf[0]) == 0x38464947 && headerbuf[4] == 0x39) {

  00368	e59f30b8	 ldr         r3, [pc, #0xB8]
  0036c	03a05003	 moveq       r5, #3
  00370	e1520003	 cmp         r2, r3
  00374	1a000004	 bne         |$LN2@GuessMIMET|
  00378	e55b3020	 ldrb        r3, [r11, #-0x20]
  0037c	e3530039	 cmp         r3, #0x39
  00380	1a000004	 bne         |$LN1@GuessMIMET|

; 258  :         // GIF89 Magic
; 259  :         Result = itGif;

  00384	e3a05004	 mov         r5, #4

; 260  :     }
; 261  :     if (*PDWORD(&headerbuf[0]) == 0x474E5089) {

  00388	ea000002	 b           |$LN1@GuessMIMET|
  0038c		 |$LN2@GuessMIMET|
  0038c	e59f3090	 ldr         r3, [pc, #0x90]
  00390	e1520003	 cmp         r2, r3

; 262  :         // JFIF Magic
; 263  :         Result = itPNG;

  00394	03a05002	 moveq       r5, #2
  00398		 |$LN1@GuessMIMET|

; 264  :     }
; 265  :     inputfile.close();

  00398	e59f3080	 ldr         r3, [pc, #0x80]
  0039c	e24b0034	 sub         r0, r11, #0x34
  003a0	e5933000	 ldr         r3, [r3]
  003a4	e1a0e00f	 mov         lr, pc
  003a8	e12fff13	 bx          r3

; 266  :     return Result;

  003ac	e59f3060	 ldr         r3, [pc, #0x60]
  003b0	e24b0034	 sub         r0, r11, #0x34
  003b4	e5933000	 ldr         r3, [r3]
  003b8		 |$M106634|
  003b8	e1a0e00f	 mov         lr, pc
  003bc	e12fff13	 bx          r3
  003c0	e51b001c	 ldr         r0, [r11, #-0x1C]
  003c4	e59f3050	 ldr         r3, [pc, #0x50]
  003c8	e1a0e00f	 mov         lr, pc
  003cc	e12fff13	 bx          r3

; 267  : }

  003d0	e1a00005	 mov         r0, r5
  003d4	e24bd018	 sub         sp, r11, #0x18
  003d8	e89da870	 ldmia       sp, {r4 - r6, r11, sp, pc}
  003dc		 |$M106638|
  003dc		 |__unwind$106617|
  003dc	e52de004	 str         lr, [sp, #-4]!
  003e0		 |$M106641|
  003e0	e24b0028	 sub         r0, r11, #0x28
  003e4	e59f302c	 ldr         r3, [pc, #0x2C]
  003e8	e5933000	 ldr         r3, [r3]
  003ec		 |$M106635|
  003ec	e1a0e00f	 mov         lr, pc
  003f0	e12fff13	 bx          r3
  003f4	e8bd8000	 ldmia       sp!, {pc}
  003f8		 |$M106642|
  003f8		 |__unwind$106618|
  003f8	e52de004	 str         lr, [sp, #-4]!
  003fc		 |$M106644|
  003fc	e24b0034	 sub         r0, r11, #0x34
  00400	e59f300c	 ldr         r3, [pc, #0xC]
  00404	e5933000	 ldr         r3, [r3]
  00408	e1a0e00f	 mov         lr, pc
  0040c	e12fff13	 bx          r3
  00410	e8bd8000	 ldmia       sp!, {pc}
  00414		 |$LN24@GuessMIMET|
  00414		 |$LN25@GuessMIMET|
  00414	00000000	 DCD         |__imp_??1QFile@@UAA@XZ|
  00418		 |$LN26@GuessMIMET|
  00418	00000000	 DCD         |__imp_??1QString@@QAA@XZ|
  0041c		 |$LN27@GuessMIMET|
  0041c	00000000	 DCD         |__security_check_cookie|
  00420		 |$LN28@GuessMIMET|
  00420	00000000	 DCD         |__imp_?close@QFile@@UAAXXZ|
  00424		 |$LN29@GuessMIMET|
  00424	474e5089	 DCD         0x474e5089
  00428		 |$LN30@GuessMIMET|
  00428	38464947	 DCD         0x38464947
  0042c		 |$LN31@GuessMIMET|
  0042c	42004d4d	 DCD         0x42004d4d
  00430		 |$LN32@GuessMIMET|
  00430	00424949	 DCD         0x424949
  00434		 |$LN33@GuessMIMET|
  00434	00000000	 DCD         |__imp_?read@QIODevice@@QAA_JPAD_J@Z|
  00438		 |$LN34@GuessMIMET|
  00438	00000000	 DCD         |__imp_?open@QFile@@UAA_NV?$QFlags@W4OpenModeFlag@QIODevice@@@@@Z|
  0043c		 |$LN35@GuessMIMET|
  0043c	00000000	 DCD         |__imp_??0QFile@@QAA@ABVQString@@@Z|
  00440		 |$LN36@GuessMIMET|
  00440	00000000	 DCD         |__imp_?fromUtf16@QString@@SA?AV1@PBGH@Z|
  00444		 |$LN37@GuessMIMET|
  00444	00000000	 DCD         |__security_cookie|
  00448		 |$M106645|

			 ENDP  ; |?GuessMIMEType@@YA?AW4TImageType@@PA_W@Z|, GuessMIMEType

	EXPORT	|?GetFreePhysMemory@@YAHXZ|		; GetFreePhysMemory

  00038			 AREA	 |.pdata|, PDATA
|$T106667| DCD	|$LN5@GetFreePhy|
	DCD	0x40000c02
; Function compile flags: /Ogtpy

  00448			 AREA	 |.text|, CODE, ARM

  00448		 |?GetFreePhysMemory@@YAHXZ| PROC	; GetFreePhysMemory

; 57   : int GetFreePhysMemory() {

  00448		 |$LN5@GetFreePhy|
  00448	e52de004	 str         lr, [sp, #-4]!
  0044c	e24dd020	 sub         sp, sp, #0x20
  00450		 |$M106664|

; 58   :     MEMORYSTATUS ms;
; 59   :     ms.dwLength = sizeof (MEMORYSTATUS);
; 60   :     GlobalMemoryStatus(&ms);

  00450	e3a02020	 mov         r2, #0x20
  00454	e59f3018	 ldr         r3, [pc, #0x18]
  00458	e58d2000	 str         r2, [sp]
  0045c	e28d0000	 add         r0, sp, #0
  00460	e1a0e00f	 mov         lr, pc
  00464	e12fff13	 bx          r3

; 61   :     return ms.dwAvailPhys;

  00468	e59d000c	 ldr         r0, [sp, #0xC]

; 62   : }

  0046c	e28dd020	 add         sp, sp, #0x20
  00470	e49df004	 ldr         pc, [sp], #4
  00474		 |$LN6@GetFreePhy|
  00474		 |$LN7@GetFreePhy|
  00474	00000000	 DCD         |GlobalMemoryStatus|
  00478		 |$M106665|

			 ENDP  ; |?GetFreePhysMemory@@YAHXZ|, GetFreePhysMemory

	EXPORT	|?NormalizeGrayScaleQImage@@YAXAAVQImage@@@Z| ; NormalizeGrayScaleQImage

  00040			 AREA	 |.pdata|, PDATA
|$T106687| DCD	|$LN13@NormalizeG|
	DCD	0xc0004804
|$T106690| DCD	|__unwind$106671|
	DCD	0x40000d01

  01204			 AREA	 |.rdata|, DATA, READONLY
|__unwindtable$?NormalizeGrayScaleQImage@@YAXAAVQImage@@@Z| DCD 0xffffffff
	DCD	|__unwind$106671|
|__ehfuncinfo$?NormalizeGrayScaleQImage@@YAXAAVQImage@@@Z| DCD 0x19930522
	DCD	0x1
	DCD	|__unwindtable$?NormalizeGrayScaleQImage@@YAXAAVQImage@@@Z|
	DCD	0x0
	DCD	0x0
	DCD	0x3
	DCD	|$T106683|
	DCD	0x0
	DCD	0x1

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -