有一个dll文件,但是不知道怎么能够获得调用的方法。请教有现成的软件可以帮助吗?如果不能,怎么获得?函数头程序如下。不知道怎么还原成c可以调用的.h文件?
:10001000 81ECAC000000 sub esp, 000000AC
:10001006 53 push ebx
:10001007 55 push ebp
:10001008 56 push esi
:10001009 57 push edi
:1000100A 8BBC24C8000000 mov edi, dword ptr [esp+000000C8]
:10001011 8B8424C0000000 mov eax, dword ptr [esp+000000C0]
:10001018 8BF7 mov esi, edi
* Possible StringData Ref from Data Obj ->"rb"
|
:1000101A 6850F00010 push 1000F050
:1000101F 0FAFB424D0000000 imul esi, dword ptr [esp+000000D0]
:10001027 DB8424D4000000 fild dword ptr [esp+000000D4]
:1000102E D95C2418 fstp dword ptr [esp+18]
:10001032 50 push eax
:10001033 C744246800000000 mov [esp+68], 00000000
:1000103B C744245400000000 mov [esp+54], 00000000
:10001043 C705C82A0110FFFFFFFF mov dword ptr [10012AC8], FFFFFFFF
:1000104D 89742458 mov dword ptr [esp+58], esi
:10001051 E8175A0000 call 10006A6D
:10001056 8BE8 mov ebp, eax
:10001058 83C408 add esp, 00000008
:1000105B 85ED test ebp, ebp
:1000105D 0F84D3080000 je 10001936
:10001063 56 push esi
:10001064 E847590000 call 100069B0
:10001069 8BD8 mov ebx, eax
:1000106B 83C404 add esp, 00000004
:1000106E 85DB test ebx, ebx
:10001070 0F84C0080000 je 10001936
:10001076 55 push ebp
:10001077 56 push esi
:10001078 6A01 push 00000001
:1000107A 53 push ebx
:1000107B E819580000 call 10006899
:10001080 83C410 add esp, 00000010
:10001083 3BC6 cmp eax, esi
:10001085 0F85AB080000 jne 10001936
:1000108B 55 push ebp
:1000108C E88B570000 call 1000681C
:10001091 6A04 push 00000004
:10001093 56 push esi
:10001094 E8F6560000 call 1000678F
:10001099 8BE8 mov ebp, eax
:1000109B 83C40C add esp, 0000000C
:1000109E 85ED test ebp, ebp
:100010A0 896C245C mov dword ptr [esp+5C], ebp
:100010A4 0F848C080000 je 10001936
:100010AA 6A04 push 00000004
:100010AC 56 push esi
:100010AD E8DD560000 call 1000678F
:100010B2 83C408 add esp, 00000008
:100010B5 89442420 mov dword ptr [esp+20], eax
:100010B9 85C0 test eax, eax
:100010BB 0F8475080000 je 10001936
:100010C1 8D4C246C lea ecx, dword ptr [esp+6C]
:100010C5 8D542470 lea edx, dword ptr [esp+70]
:100010C9 51 push ecx
:100010CA 52 push edx
:100010CB 56 push esi
:100010CC 53 push ebx
:100010CD 55 push ebp
:100010CE E81D3B0000 call 10004BF0
:100010D3 53 push ebx
:100010D4 E86E560000 call 10006747
:100010D9 8B8424E4000000 mov eax, dword ptr [esp+000000E4]
:100010E0 50 push eax
:100010E1 57 push edi
:100010E2 68002B0110 push 10012B00
:100010E7 E8F4310000 call 100042E0
:100010EC 68C0240110 push 100124C0
:100010F1 68002B0110 push 10012B00
:100010F6 E8D5340000 call 100045D0
:100010FB 83C42C add esp, 0000002C
:100010FE C744247CF62C843D mov [esp+7C], 3D842CF6
:10001106 C7842480000000F2A926BD mov dword ptr [esp+00000080], BD26A9F2
:10001111 C78424840000003110D6BE mov dword ptr [esp+00000084], BED61031
:1000111C C784248800000031DA493F mov dword ptr [esp+00000088], 3F49DA31
:10001127 C784248C0000003110D6BE mov dword ptr [esp+0000008C], BED61031
:10001132 C7842490000000F2A926BD mov dword ptr [esp+00000090], BD26A9F2
:1000113D C7842494000000F62C843D mov dword ptr [esp+00000094], 3D842CF6
:10001148 C784249800000003F21A3D mov dword ptr [esp+00000098], 3D1AF203
:10001153 C784249C000000F45FC3BC mov dword ptr [esp+0000009C], BCC35FF4
:1000115E C78424A00000000C8FE2BD mov dword ptr [esp+000000A0], BDE28F0C
:10001169 C78424A4000000F23AC13E mov dword ptr [esp+000000A4], 3EC13AF2
:10001174 C78424A8000000764A5A3F mov dword ptr [esp+000000A8], 3F5A4A76
:1000117F C78424AC000000F23AC13E mov dword ptr [esp+000000AC], 3EC13AF2
:1000118A C78424B00000000C8FE2BD mov dword ptr [esp+000000B0], BDE28F0C
:10001195 C78424B4000000F45FC3BC mov dword ptr [esp+000000B4], BCC35FF4
:100011A0 C78424B800000003F21A3D mov dword ptr [esp+000000B8], 3D1AF203
:100011AB BE002B0110 mov esi, 10012B00
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课