阅读:2056回复:7
能分析一下这个函数的功能吗
:00402622 B900020000 ---> mov ecx, 00000200
:00402627 33C0 xor eax, eax :00402629 BF803F4A00 mov edi, 004A3F80 :0040262E 8B15C4F24700 mov edx, dword ptr [0047F2C4] :00402634 F3 repz :00402635 AB stosd :00402636 B900010000 mov ecx, 00000100 :0040263B BF80474A00 mov edi, 004A4780 ~~~~~~~~~~~~~~~~~ :00402640 F3 repz :00402641 AB stosd :00402642 B900010000 mov ecx, 00000100 :00402647 BF60394A00 mov edi, 004A3960 :0040264C F3 repz :0040264D AB stosd :0040264E 8B0DCCF64700 mov ecx, dword ptr [0047F6CC] :00402654 5F pop edi :00402655 5E pop esi :00402656 5D pop ebp :00402657 8911 mov dword ptr [ecx], edx :00402659 A1D0F64700 mov eax, dword ptr [0047F6D0] :0040265E 8B0DF4F14700 mov ecx, dword ptr [0047F1F4] :00402664 5B pop ebx :00402665 8908 mov dword ptr [eax], ecx :00402667 8B15D4F64700 mov edx, dword ptr [0047F6D4] :0040266D A1F8F14700 mov eax, dword ptr [0047F1F8] :00402672 8902 mov dword ptr [edx], eax :00402674 8B0DD8F64700 mov ecx, dword ptr [0047F6D8] :0040267A 8B15ECF14700 mov edx, dword ptr [0047F1EC] :00402680 8911 mov dword ptr [ecx], edx :00402682 A1DCF64700 mov eax, dword ptr [0047F6DC] :00402687 8B0DF0F14700 mov ecx, dword ptr [0047F1F0] :0040268D 8908 mov dword ptr [eax], ecx :0040268F B801000000 mov eax, 00000001 ~~~~~~~~~~~~~~ :00402694 83C42C add esp, 0000002C :00402697 C3 ret |
|
沙发#
发布于:2004-07-20 15:18
没有CONTEXT,谁能知道???
|
|
|
板凳#
发布于:2004-12-14 22:29
就复制一个地址的东西到另一个地址
|
|
地板#
发布于:2005-01-26 12:57
汇编呀
|
|
地下室#
发布于:2005-02-02 11:25
汇编呀 当然是汇编,汇编也要上下文信息 |
|
|
5楼#
发布于:2005-02-23 23:08
这是反汇编过来的吗?貌似把内存的某段某偏移量东西 复印到另一地方.不过好象 反汇编过来的东西只做参考不是很对呀.
曾经把mbr 引导扇区的东西反汇编过来就读不懂.呵呵!要反汇编再看明白是很难的,就是汇编写的东西要读懂也要狂吐血 ! |
|
6楼#
发布于:2005-02-24 14:00
:00402622 B900020000 ---> mov ecx, 00000200
:00402627 33C0 xor eax, eax :00402629 BF803F4A00 mov edi, 004A3F80 :0040262E 8B15C4F24700 mov edx, dword ptr [0047F2C4] :00402634 F3 repz :00402635 AB stosd 这段应该是把edx:edi处开始的200H的清零吧 |
|
7楼#
发布于:2005-02-24 14:07
:00402694 83C42C add esp, 0000002C
:00402697 C3 ret 清除堆栈,这个应该是stdcall调用约定还是pascal,忘了, 估计这个一个函数吧,那几个pop出来的就是调用前压入的参数,好像可能是什么地址 |
|