0049072D 56 push esi
0049072E 57 push edi
0049072F 8965 E8 mov dword ptr [ebp-18], esp
00490732 FF15 48834D00 call dword ptr [4D8348] ; kernel32.GetVersion
00490738 33D2 xor edx, edx
0049073A 8AD4 mov dl, ah
0049073C 8915 30198400 mov dword ptr [841930], edx
00490742 8BC8 mov ecx, eax
00490744 81E1 FF000000 and ecx, 0FF
0049074A 890D 2C198400 mov dword ptr [84192C], ecx
00490750 C1E1 08 shl ecx, 8
00490753 03CA add ecx, edx
00490755 890D 28198400 mov dword ptr [841928], ecx
0049075B C1E8 10 shr eax, 10
0049075E A3 24198400 mov dword ptr [841924], eax
00490763 6A 01 push 1
00490765 E8 0B510000 call 00495875
0049076A 59 pop ecx
0049076B 85C0 test eax, eax
0049076D 75 08 jnz short 00490777
0049076F 6A 1C push 1C
00490771 E8 C3000000 call 00490839
00490776 59 pop ecx
00490777 E8 D0370000 call 00493F4C
0049077C 85C0 test eax, eax
0049077E 75 08 jnz short 00490788
00490780 6A 10 push 10
00490782 E8 B2000000 call 00490839
00490787 59 pop ecx
00490788 33F6 xor esi, esi
0049078A 8975 FC mov dword ptr [ebp-4], esi
0049078D E8 4E690000 call 004970E0
00490792 FF15 48824D00 call dword ptr [4D8248] ; kernel32.GetCommandLineA
00490798 A3 28308400 mov dword ptr [843028], eax
0049079D E8 70820000 call 00498A12
004907A2 A3 E8188400 mov dword ptr [8418E8], eax
004907A7 E8 19800000 call 004987C5
004907AC E8 5B7F0000 call 0049870C
004907B1 E8 0D1F0000 call 004926C3
004907B6 8975 D0 mov dword ptr [ebp-30], esi
004907B9 8D45 A4 lea eax, dword ptr [ebp-5C]
004907BC 50 push eax
004907BD FF15 4C824D00 call dword ptr [4D824C] ; kernel32.GetStartupInfoA
004907C3 E8 EC7E0000 call 004986B4
004907C8 8945 9C mov dword ptr [ebp-64], eax
004907CB F645 D0 01 test byte ptr [ebp-30], 1
004907CF 74 06 je short 004907D7
004907D1 0FB745 D4 movzx eax, word ptr [ebp-2C]
004907D5 EB 03 jmp short 004907DA
004907D7 6A 0A push 0A
004907D9 58 pop eax
004907DA 50 push eax
004907DB FF75 9C push dword ptr [ebp-64]
004907DE 56 push esi
004907DF 56 push esi
004907E0 FF15 04844D00 call dword ptr [4D8404] ; kernel32.GetModuleHandleA
004907E6 50 push eax
004907E7 E8 3BF80000 call 004A0027
004907EC 8945 A0 mov dword ptr [ebp-60], eax
004907EF 50 push eax
004907F0 E8 FB1E0000 call 004926F0
004907F5 8B45 EC mov eax, dword ptr [ebp-14]
004907F8 8B08 mov ecx, dword ptr [eax]
004907FA 8B09 mov ecx, dword ptr [ecx]
004907FC 894D 98 mov dword ptr [ebp-68], ecx
004907FF 50 push eax
00490800 51 push ecx
00490801 E8 367D0000 call 0049853C
00490806 59 pop ecx
00490807 59 pop ecx
00490808 C3 retn
00490809 8B65 E8 mov esp, dword ptr [ebp-18]
0049080C FF75 98 push dword ptr [ebp-68]
0049080F E8 ED1E0000 call 00492701
00490814 833D F0188400 0>cmp dword ptr [8418F0], 1
0049081B 75 05 jnz short 00490822
0049081D E8 22830000 call 00498B44
00490822 FF7424 04 push dword ptr [esp+4]
00490826 E8 52830000 call 00498B7D
0049082B 68 FF000000 push 0FF
00490830 FF15 A0845400 call dword ptr [5484A0] ; TLCC.00492701
00490836 59 pop ecx
00490837 59 pop ecx
00490838 C3 retn
00490839 833D F0188400 0>cmp dword ptr [8418F0], 1
00490840 75 05 jnz short 00490847
00490842 E8 FD820000 call 00498B44
00490847 FF7424 04 push dword ptr [esp+4]
0049084B E8 2D830000 call 00498B7D
00490850 59 pop ecx
00490851 68 FF000000 push 0FF
00490856 FF15 44824D00 call dword ptr [4D8244] ; kernel32.ExitProcess
0049085C C3 retn
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课