咱知道它是两个字符串进入后出来一串数字
如 aaa + b123 =1235657
那个给解译一下,谢谢 ,最好做一个VB,delphi相同的代码,再次谢谢
00371D8C > 55 push ebp
00371D8D 8BEC mov ebp, esp
00371D8F 6A 00 push 0
00371D91 53 push ebx
00371D92 56 push esi
00371D93 57 push edi
00371D94 8B45 0C mov eax, dword ptr [ebp+C]
00371D97 E8 ECF2FFFF call <jmp.&Vcl50.System::LStrAddRef>
00371D9C 8B45 10 mov eax, dword ptr [ebp+10]
00371D9F E8 E4F2FFFF call <jmp.&Vcl50.System::LStrAddRef>
00371DA4 33C0 xor eax, eax
00371DA6 55 push ebp
00371DA7 68 8A1E3700 push 00371E8A
00371DAC 64:FF30 push dword ptr fs:[eax]
00371DAF 64:8920 mov dword ptr fs:[eax], esp
00371DB2 BB 15CD5B07 mov ebx, 75BCD15
00371DB7 8B45 0C mov eax, dword ptr [ebp+C]
00371DBA E8 A9F2FFFF call <jmp.&Vcl50.System::LStrLen>
00371DBF 8BC8 mov ecx, eax
00371DC1 85C9 test ecx, ecx
00371DC3 7E 2C jle short 00371DF1
00371DC5 BE 01000000 mov esi, 1
00371DCA 8B45 0C mov eax, dword ptr [ebp+C]
00371DCD 0FB64430 FF movzx eax, byte ptr [eax+esi-1] ;get a char of input string
00371DD2 BF 0D000000 mov edi, 0D
00371DD7 33D2 xor edx, edx
00371DD9 F7F7 div edi
00371DDB 8BFA mov edi, edx
00371DDD 47 inc edi
00371DDE 8BC3 mov eax, ebx
00371DE0 F7EF imul edi
00371DE2 BB 7F969800 mov ebx, 98967F
00371DE7 99 cdq
00371DE8 F7FB idiv ebx
00371DEA 42 inc edx
00371DEB 8BDA mov ebx, edx
00371DED 46 inc esi
00371DEE 49 dec ecx
00371DEF ^ 75 D9 jnz short 00371DCA
00371DF1 8BC3 mov eax, ebx
00371DF3 B9 4A77E605 mov ecx, 5E6774A
00371DF8 99 cdq
00371DF9 F7F9 idiv ecx
00371DFB 83C2 63 add edx, 63
00371DFE 8BDA mov ebx, edx
00371E00 8B45 10 mov eax, dword ptr [ebp+10]
00371E03 E8 60F2FFFF call <jmp.&Vcl50.System::LStrLen>
00371E08 8BC8 mov ecx, eax
00371E0A 85C9 test ecx, ecx
00371E0C 7E 2D jle short 00371E3B
00371E0E BE 01000000 mov esi, 1
00371E13 8B45 10 mov eax, dword ptr [ebp+10]
00371E16 0FB64430 FF movzx eax, byte ptr [eax+esi-1]
00371E1B BF 11000000 mov edi, 11
00371E20 33D2 xor edx, edx
00371E22 F7F7 div edi
00371E24 8BFA mov edi, edx
00371E26 47 inc edi
00371E27 8BC3 mov eax, ebx
00371E29 BB 3FB49600 mov ebx, 96B43F
00371E2E 99 cdq
00371E2F F7FB idiv ebx
00371E31 42 inc edx
00371E32 0FAFD7 imul edx, edi
00371E35 8BDA mov ebx, edx
00371E37 46 inc esi
00371E38 49 dec ecx
00371E39 ^ 75 D8 jnz short 00371E13
00371E3B 8D55 FC lea edx, dword ptr [ebp-4]
00371E3E 8D83 00E1F505 lea eax, dword ptr [ebx+5F5E100]
00371E44 E8 4FF4FFFF call <jmp.&Vcl50.Sysutils::IntToStr>
00371E49 8B45 08 mov eax, dword ptr [ebp+8]
00371E4C 50 push eax
00371E4D 8B45 FC mov eax, dword ptr [ebp-4] ; 它计算的结果
00371E50 E8 13F2FFFF call <jmp.&Vcl50.System::LStrLen>
00371E55 8BD0 mov edx, eax
00371E57 83EA 07 sub edx, 7
00371E5A B9 08000000 mov ecx, 8
00371E5F 8B45 FC mov eax, dword ptr [ebp-4]
00371E62 E8 29F2FFFF call <jmp.&Vcl50.System::LStrCopy>
00371E67 33C0 xor eax, eax
00371E69 5A pop edx
00371E6A 59 pop ecx
00371E6B 59 pop ecx
00371E6C 64:8910 mov dword ptr fs:[eax], edx
00371E6F 68 911E3700 push 00371E91
00371E74 8D45 FC lea eax, dword ptr [ebp-4]
00371E77 E8 C4F1FFFF call <jmp.&Vcl50.System::LStrClr>
00371E7C 8D45 0C lea eax, dword ptr [ebp+C]
00371E7F BA 02000000 mov edx, 2
00371E84 E8 BFF1FFFF call <jmp.&Vcl50.System::LStrArrayClr>
00371E89 C3 retn
00371E8A ^ E9 89F1FFFF jmp <jmp.&Vcl50.System::HandleFinall>
00371E8F ^ EB E3 jmp short 00371E74
00371E91 5F pop edi
00371E92 5E pop esi
00371E93 5B pop ebx
00371E94 59 pop ecx
00371E95 5D pop ebp
00371E96 C2 0C00 retn 0C
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课