Private Sub Command1_Click()
SendMessage &H10B90, WM_SETTEXT, 0, "bjbl"
End Sub
77D18A80 user32.> $ 8BFF mov edi,edi
77D18A82 . 55 push ebp
77D18A83 . 8BEC mov ebp,esp
77D18A85 . 56 push esi
77D18A86 . FF75 08 push dword ptr ss:[ebp+8]
77D18A89 . E8 38000000 call user32.77D18AC6
77D18A8E . 8BF0 mov esi,eax
77D18A90 . 85F6 test esi,esi
77D18A92 . 74 28 je short user32.77D18ABC
77D18A94 . E8 BCFBFFFF call user32.77D18655
77D18A99 . 3BF0 cmp esi,eax
77D18A9B .^ 0F85 49FCFFFF jnz user32.77D186EA
77D18AA1 . 8B4D 0C mov ecx,dword ptr ss:[ebp+C]
77D18AA4 . 85C9 test ecx,ecx
77D18AA6 . 74 0B je short user32.77D18AB3
77D18AA8 . 64:A1 1800000>mov eax,dword ptr fs:[18]
77D18AAE . 8B40 20 mov eax,dword ptr ds:[eax+20]
77D18AB1 . 8901 mov dword ptr ds:[ecx],eax
77D18AB3 > 64:A1 1800000>mov eax,dword ptr fs:[18]
77D18AB9 . 8B40 24 mov eax,dword ptr ds:[eax+24]
77D18ABC > 5E pop esi
77D18ABD . 5D pop ebp
77D18ABE . C2 0800 retn 8
77D18A9B .^\0F85 49FCFFFF jnz user32.77D186EA
77D186EA > /8B75 0C mov esi,dword ptr ss:[ebp+C]
77D186ED . |85F6 test esi,esi
77D186EF . |74 0C je short user32.77D186FD
77D186F1 . |6A 00 push 0
77D186F3 . |FF75 08 push dword ptr ss:[ebp+8]
77D186F6 . |E8 E0FFFFFF call user32.77D186DB
77D186FB . |8906 mov dword ptr ds:[esi],eax
77D186FD > |6A 01 push 1
77D186FF . |FF75 08 push dword ptr ss:[ebp+8]
77D18702 . |E8 D4FFFFFF call user32.77D186DB
77D18707 . |E9 B0030000 jmp user32.77D18ABC
77D1870C $ |55 push ebp
77D1870D . |8BEC mov ebp,esp
77D1870F . |56 push esi
77D18710 . |57 push edi
77D18711 . |53 push ebx
77D18712 . |68 CDABBADC push DCBAABCD
77D18717 . |56 push esi
77D18718 . |FF75 18 push dword ptr ss:[ebp+18]
77D1871B . |FF75 14 push dword ptr ss:[ebp+14]
77D1871E . |FF75 10 push dword ptr ss:[ebp+10]
77D18721 . |FF75 0C push dword ptr ss:[ebp+C]
77D18724 . |64:A1 1800000>mov eax,dword ptr fs:[18]
77D1872A . |8088 B40F0000>or byte ptr ds:[eax+FB4],1
77D18731 . |FF55 08 call near dword ptr ss:[ebp+8]
77D18734 . |64:8B0D 18000>mov ecx,dword ptr fs:[18]
77D1873B . |80A1 B40F0000>and byte ptr ds:[ecx+FB4],0
77D18742 . |817C24 04 CDA>cmp dword ptr ss:[esp+4],DCBAABCD
77D1874A . |0F85 607C0200 jnz user32.77D403B0
77D18750 > |83C4 08 add esp,8
77D18753 . |5B pop ebx
77D18754 . |5F pop edi
77D18755 . |5E pop esi
77D18756 . |5D pop ebp
77D18757 . |C2 1400 retn 14
77D18731 . |FF55 08 call near dword ptr ss:[ebp+8]
References in user32:.text to constant DCBAABCD
Address Disassembly
77D186F3 push dword ptr ss:[ebp+8]
77D18712 push DCBAABCD
77D18742 cmp dword ptr ss:[esp+4],DCBAABCD
77D403B0 cmp dword ptr ss:[esp],DCBAABCD
Stack ss:[0013EA90]=06740FB0
Stack ss:[0013E464]=75F4348B (BROWSEUI.75F4348B)
Executable modules
Base Size Entry Name
07BF0000 00098000 07C852D0 Alidcp.dll
07A30000 000BC000 07AE90E0 aliedit.dll
07070000 0001D000 0707820C itrusenroll.dll
10000000 000C5000 100C2640 npAliSecCtrl.dll
070A0000 00021000 070B19AB pta.dll
00400000 00019000 00402451 IEXPLORE.EXE
[ebp+8]>=7a30000&[ebp+8]<=7AEC000
[ebp+8]>=7bf0000&[ebp+8]<=7C88000
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)