[Asm] 纯文本查看 复制代码
<$.2157627>
pushad
call @L00000001
@L00000001:
pop ebp
sub ebp, $$1D5762D
call @L00000003
@L00000002:
mov ebp, -0x1
retn
@L00000003:
pop eax
mov dword ptr [eax+0x1], ebp
mov ebx, dword ptr ds:[ebp+$$1D74040]
lea esi, dword ptr ds:[ebp+$$1D74098]
call @L00000004
add byte ptr [eax], al
add byte ptr [eax], al
@L00000004:
push 0x40
push 0x50
push ebx
call dword ptr [esi]
call @L00000005
pushad
pushfd
call @L00000002
push esi
push eax
lea esi, dword ptr ds:[ebp+$$1D74098]
call @L00000006
xchg dword ptr [esi], eax
pop eax
pop esi
jmp @L00000013
@L00000005:
pop ebp
xchg dword ptr [esi], ebp
call @L00000007
@L00000006:
mov eax, -0x1
retn
@L00000007:
pop eax
mov dword ptr [eax+0x1], ebp
call @L00000010
@L00000008:
call @L00000009
nop
nop
nop
nop
nop
@L00000009:
jmp short @L00000011
@L00000010:
pop edi
add edi, 0x5
mov esi, ebx
mov ecx, 0x5
rep movs byte ptr es:[edi], byte ptr [esi]
sub esi, 0x5
mov byte ptr [esi], 0xE9
call @L00000012
call $$21576C5
add bl, byte ptr [eax-0x2]
or byte ptr [esi+eax+0x33], dh
rol byte ptr [eax-0x3E], 0x4
add byte ptr [edi+0x56], dl
push ecx
push ebp
jmp short @L00000008
@L00000011:
pop esi
call @L00000002
mov eax, dword ptr ds:[ebp+$$1D74040]
mov edi, eax
mov ecx, 0x5
rep movs byte ptr es:[edi], byte ptr [esi]
pop ebp
pop ecx
pop esi
pop edi
push eax
mov dword ptr ds:[ebp-0x10], 0x5E14EAB1
mov dword ptr ds:[ebp-0x18], 0xBAD9CFA0
mov dword ptr ds:[ebp-0x1C], 0x7205CE03
mov dword ptr ds:[ebp-0x20], 0xFF0DCBBB
mov dword ptr ds:[ebp-0x24], 0x1F45A77D
pop eax
jmp eax
@L00000012:
pop eax
sub eax, 0x5
sub eax, esi
mov dword ptr [esi+0x1], eax
popad
jmp $$212293F
@L00000013:
lea edi, dword ptr [eax+0x1BEE4]
mov byte ptr [edi], 0xE9
lea ebx, dword ptr [@L00000017]
sub ebx, edi
lea ebx, dword ptr [ebx-0x5]
mov dword ptr [edi+0x1], ebx
lea edi, dword ptr [eax+0x8DDB]
mov word ptr [edi], 0xE990
lea ebx, dword ptr [@L00000014]
sub ebx, edi
lea ebx, dword ptr [ebx-0x6]
mov dword ptr [edi+0x2], ebx
inc edi
lea ebx, dword ptr [@L00000016]
mov eax, ebx
sub edi, eax
mov dword ptr [eax+0x1], edi
popfd
popad
call @L00000006
jmp eax
@L00000014:
mov eax, dword ptr ds:[esp-0x8]
mov eax, dword ptr [eax]
cmp eax, 0x35373537
jnz short @L00000015
mov eax, 0xB884F32F
jmp short @L00000016
@L00000015:
cmp eax, 0x38323438
jnz short @L00000016
mov eax, 0xF71C7D43
jmp short @L00000016
@L00000016:
jmp @L00000017
@L00000017:
cmp dword ptr [eax], 0x4850000E
je short @L00000018
retn
@L00000018:
pushad
lea edi, dword ptr [eax+0x3A]
lea esi, dword ptr [@L00000019]
mov ecx, 0x4F
rep movs byte ptr es:[edi], byte ptr [esi]
lea edi, dword ptr [eax+0x8F]
lea esi, dword ptr [@L00000020]
mov ecx, 0x50
rep movs byte ptr es:[edi], byte ptr [esi]
popad
retn
@L00000019:
cmp dword ptr [ebx+esi], esi
cmp dword ptr [eax], esi
xor dword ptr [ebx], esi
cmp byte ptr [eax], dh
sub al, 0x35
cmp byte ptr [0x33393832], dh
xor eax, 0x37393030
cmp byte ptr [0x30313333], dh
xor al, 0x32
cmp dword ptr [esi], esi
xor dword ptr [ecx], esi
xor bh, byte ptr [eax]
aaa
xor eax, 0x31363135
xor al, 0x36
sub al, 0x36
cmp dword ptr [edi], esi
cmp byte ptr ss:[esi], dh
cmp dword ptr [ebx], esi
xor esi, dword ptr [edi+esi]
xor dword ptr [ecx], edi
xor dword ptr [ebx], esi
xor dh, byte ptr [ebx]
xor eax, 0x35333039
xor bh, byte ptr [ecx]
xor al, 0x38
xor bh, byte ptr [ecx]
cmp dword ptr [0x373537], esi
@L00000020:
xor dh, byte ptr [ecx]
xor dh, byte ptr [edi]
xor byte ptr [eax], bh
cmp byte ptr [esi], dh
xor dh, byte ptr [eax]
sub al, 0x32
cmp byte ptr [eax], bh
cmp byte ptr [edi], dh
aaa
xor byte ptr [esi], dh
xor bh, byte ptr [eax]
xor eax, 0x35383933
xor al, 0x39
xor al, 0x34
xor byte ptr [eax], bh
xor eax, 0x37343639
xor al, 0x33
xor bh, byte ptr ss:[ecx]
xor eax, 0x332C3738
xor eax, 0x35333936
xor esi, dword ptr [ebx]
cmp dword ptr [ebx], esi
xor esi, dword ptr [edi]
aaa
xor eax, 0x38333538
cmp dword ptr [ebx], esi
aaa
cmp byte ptr [eax], bh
xor byte ptr [ecx], dh
xor dh, byte ptr [edx]
xor eax, 0x32383434
xor al, 0x38
add byte ptr [eax], al