00401E60 55 push ebp
00401E61 8BEC mov ebp, esp
00401E63 6A00 push $00
00401E65 6A00 push $00
00401E67 6A00 push $00
00401E69 53 push ebx
00401E6A 8BD8 mov ebx, eax
00401E6C 33C0 xor eax, eax
00401E6E 55 push ebp
00401E6F 68D41E4000 push $00401ED4
***** TRY
|
00401E74 64FF30 push dword ptr fs:[eax]
00401E77 648920 mov fs:[eax], esp
00401E7A 8D55F4 lea edx, [ebp-$0C]
* Reference to control edtContent : TEdit
|
00401E7D 8B83FC020000 mov eax, [ebx+$02FC]
* Reference to: vcl70.@Controls@TControl@GetText$qqrv()
|
00401E83 E8D0F5FFFF call 00401458
00401E88 8B45F4 mov eax, [ebp-$0C]
00401E8B 8D55F8 lea edx, [ebp-$08]
* Reference to: rtl70.@Sysutils@Trim$qqrx17System@AnsiString()
|
00401E8E E885F4FFFF call 00401318
00401E93 8B55F8 mov edx, [ebp-$08]
00401E96 8D4DFC lea ecx, [ebp-$04]
* Possible String Reference to: 'espublic'
|
00401E99 B8E81E4000 mov eax, $00401EE8
* Reference to: EsComp.@Esshare@EsEncrypt$qqr17System@AnsiStringt1()
|
00401E9E E89DFAFFFF call 00401940
00401EA3 8B55FC mov edx, [ebp-$04]
* Reference to control edtCryptograph : TEdit
|
00401EA6 8B8304030000 mov eax, [ebx+$0304]
* Reference to: vcl70.@Controls@TControl@SetText$qqrx17System@AnsiString()
|
00401EAC E8AFF5FFFF call 00401460
00401EB1 33C0 xor eax, eax
00401EB3 5A pop edx
00401EB4 59 pop ecx
00401EB5 59 pop ecx
00401EB6 648910 mov fs:[eax], edx
****** FINALLY
|
00401EB9 68DB1E4000 push $00401EDB
00401EBE 8D45F4 lea eax, [ebp-$0C]
* Reference to: rtl70.@System@@LStrClr$qqrpv()
|
00401EC1 E872F1FFFF call 00401038
00401EC6 8D45F8 lea eax, [ebp-$08]
00401EC9 BA02000000 mov edx, $00000002
* Reference to: rtl70.@System@@LStrArrayClr$qqrpvi()
|
00401ECE E86DF1FFFF call 00401040
00401ED3 C3 ret
* Reference to: rtl70.@System@@HandleFinally$qqrv()
|
00401ED4 E947F1FFFF jmp 00401020
00401ED9 EBE3 jmp 00401EBE
****** END
|
00401EDB 5B pop ebx
00401EDC 8BE5 mov esp, ebp
00401EDE 5D pop ebp
00401EDF C3 ret
[培训]内核驱动高级班,冲击BAT一流互联网大厂工
作,每周日13:00-18:00直播授课