Quick introduction to reverse engineering for beginners
Quick introduction to reverse engineering for beginners
Quick introduction to reverse engineering for beginners
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
.text:64405171 call dbg<br />
.text:64405176 add esp, 0Ch<br />
... or:<br />
.text:6440237A push eax<br />
.text:6440237B push offset aCclientStart_6 ; "CClient::Start: set<br />
shortcut user <strong>to</strong> ’\%"...<br />
.text:64402380 push dword ptr [edi+4]<br />
.text:64402383 call dbg<br />
.text:64402388 add esp, 0Ch<br />
It’s very useful.<br />
So let’s see contents of that nagging pop-up window function:<br />
.text:64404F4F CDwsGui__PrepareInfoWindow proc near<br />
.text:64404F4F<br />
.text:64404F4F pvParam = byte ptr -3Ch<br />
.text:64404F4F var_38 = dword ptr -38h<br />
.text:64404F4F var_34 = dword ptr -34h<br />
.text:64404F4F rc = tagRECT ptr -2Ch<br />
.text:64404F4F cy = dword ptr -1Ch<br />
.text:64404F4F h = dword ptr -18h<br />
.text:64404F4F var_14 = dword ptr -14h<br />
.text:64404F4F var_10 = dword ptr -10h<br />
.text:64404F4F var_4 = dword ptr -4<br />
.text:64404F4F<br />
.text:64404F4F push 30h<br />
.text:64404F51 mov eax, offset loc_64438E00<br />
.text:64404F56 call __EH_prolog3<br />
.text:64404F5B mov esi, ecx ; ECX is pointer <strong>to</strong> object<br />
.text:64404F5D xor ebx, ebx<br />
.text:64404F5F lea ecx, [ebp+var_14]<br />
.text:64404F62 mov [ebp+var_10], ebx<br />
; demangled name: ATL::CStringT(void)<br />
.text:64404F65 call ds:mfc90_316<br />
.text:64404F6B mov [ebp+var_4], ebx<br />
.text:64404F6E lea edi, [esi+2854h]<br />
.text:64404F74 push offset aEnvironmentInf ; "Environment in<strong>for</strong>mation:\<br />
n"<br />
.text:64404F79 mov ecx, edi<br />
; demangled name: ATL::CStringT::opera<strong>to</strong>r=(char const *)<br />
.text:64404F7B call ds:mfc90_820<br />
.text:64404F81 cmp [esi+38h], ebx<br />
.text:64404F84 mov ebx, ds:mfc90_2539<br />
.text:64404F8A jbe short loc_64404FA9<br />
.text:64404F8C push dword ptr [esi+34h]<br />
.text:64404F8F lea eax, [ebp+var_14]<br />
.text:64404F92 push offset aWorkingDirec<strong>to</strong> ; "working direc<strong>to</strong>ry: ’\%s’\<br />
n"<br />
.text:64404F97 push eax<br />
; demangled name: ATL::CStringT::Format(char const *,...)<br />
.text:64404F98 call ebx ; mfc90_2539<br />
187