抓图如下:0061FE7B . C745 B4 01000>mov dword ptr [ebp-4C], 1
0061FE82 . C745 AC 02000>mov dword ptr [ebp-54], 2
0061FE89 . C785 34FFFFFF>mov dword ptr [ebp-CC], MzLotto.0066A>
0061FE93 . C785 2CFFFFFF>mov dword ptr [ebp-D4], 4008
0061FE9D . 8D45 AC lea eax, dword ptr [ebp-54]
0061FEA0 . 50 push eax
0061FEA1 . 0FBF45 E8 movsx eax, word ptr [ebp-18]
0061FEA5 . 50 push eax
0061FEA6 . 8D85 2CFFFFFF lea eax, dword ptr [ebp-D4]
0061FEAC . 50 push eax
0061FEAD . 8D45 9C lea eax, dword ptr [ebp-64]
0061FEB0 . 50 push eax
0061FEB1 . E8 086FDEFF call <MzLotto.rtcMidCharVar> ; jmp 到 MSVBVM60.rtcMidCharVar
0061FEB6 . 8D45 9C lea eax, dword ptr [ebp-64]
0061FEB9 . 50 push eax
0061FEBA . 8D45 CC lea eax, dword ptr [ebp-34]
0061FEBD . 50 push eax
0061FEBE . E8 D16EDEFF call <MzLotto.__vbaStrVarVal> ; 返回十进制
0061FEC3 . 50 push eax
0061FEC4 . E8 AD6EDEFF call <MzLotto.rtcAnsiValueBstr> ; jmp 到 MSVBVM60.rtcAnsiValueBstr
0061FEC9 . 66:8945 DC mov word ptr [ebp-24], ax
0061FECD . 8D4D CC lea ecx, dword ptr [ebp-34]
最后的两个函数是什么含义?
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课