23.03.2013 Views

Quick introduction to reverse engineering for beginners

Quick introduction to reverse engineering for beginners

Quick introduction to reverse engineering for beginners

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

.text:64405171 call dbg<br />

.text:64405176 add esp, 0Ch<br />

... or:<br />

.text:6440237A push eax<br />

.text:6440237B push offset aCclientStart_6 ; "CClient::Start: set<br />

shortcut user <strong>to</strong> ’\%"...<br />

.text:64402380 push dword ptr [edi+4]<br />

.text:64402383 call dbg<br />

.text:64402388 add esp, 0Ch<br />

It’s very useful.<br />

So let’s see contents of that nagging pop-up window function:<br />

.text:64404F4F CDwsGui__PrepareInfoWindow proc near<br />

.text:64404F4F<br />

.text:64404F4F pvParam = byte ptr -3Ch<br />

.text:64404F4F var_38 = dword ptr -38h<br />

.text:64404F4F var_34 = dword ptr -34h<br />

.text:64404F4F rc = tagRECT ptr -2Ch<br />

.text:64404F4F cy = dword ptr -1Ch<br />

.text:64404F4F h = dword ptr -18h<br />

.text:64404F4F var_14 = dword ptr -14h<br />

.text:64404F4F var_10 = dword ptr -10h<br />

.text:64404F4F var_4 = dword ptr -4<br />

.text:64404F4F<br />

.text:64404F4F push 30h<br />

.text:64404F51 mov eax, offset loc_64438E00<br />

.text:64404F56 call __EH_prolog3<br />

.text:64404F5B mov esi, ecx ; ECX is pointer <strong>to</strong> object<br />

.text:64404F5D xor ebx, ebx<br />

.text:64404F5F lea ecx, [ebp+var_14]<br />

.text:64404F62 mov [ebp+var_10], ebx<br />

; demangled name: ATL::CStringT(void)<br />

.text:64404F65 call ds:mfc90_316<br />

.text:64404F6B mov [ebp+var_4], ebx<br />

.text:64404F6E lea edi, [esi+2854h]<br />

.text:64404F74 push offset aEnvironmentInf ; "Environment in<strong>for</strong>mation:\<br />

n"<br />

.text:64404F79 mov ecx, edi<br />

; demangled name: ATL::CStringT::opera<strong>to</strong>r=(char const *)<br />

.text:64404F7B call ds:mfc90_820<br />

.text:64404F81 cmp [esi+38h], ebx<br />

.text:64404F84 mov ebx, ds:mfc90_2539<br />

.text:64404F8A jbe short loc_64404FA9<br />

.text:64404F8C push dword ptr [esi+34h]<br />

.text:64404F8F lea eax, [ebp+var_14]<br />

.text:64404F92 push offset aWorkingDirec<strong>to</strong> ; "working direc<strong>to</strong>ry: ’\%s’\<br />

n"<br />

.text:64404F97 push eax<br />

; demangled name: ATL::CStringT::Format(char const *,...)<br />

.text:64404F98 call ebx ; mfc90_2539<br />

187

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!