1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
00402C7C . 8975 8C mov dword ptr ss:[ebp-0x74],esi
00402C7F . 89B5 5CFFFFFF mov dword ptr ss:[ebp-0xA4],esi
00402C85 . C745 84 F01E4>mov dword ptr ss:[ebp-0x7C],blaster9.004>; Entferne diesen Nag, oder bekomme das richtige Passwort heraus !
00402C8C . 899D 7CFFFFFF mov dword ptr ss:[ebp-0x84],ebx
00402C92 . E8 95E4FFFF call <jmp.&MSVBVM50.__vbaVarCopy>
00402C97 . 6A 03 push 0x3
00402C99 . 8D95 7CFFFFFF lea edx,dword ptr ss:[ebp-0x84]
00402C9F . 5F pop edi ; 0060B6A4
00402CA0 . 8D4D DC lea ecx,dword ptr ss:[ebp-0x24]
00402CA3 . C745 84 21000>mov dword ptr ss:[ebp-0x7C],0x21
00402CAA . 89BD 7CFFFFFF mov dword ptr ss:[ebp-0x84],edi
00402CB0 . E8 71E4FFFF call <jmp.&MSVBVM50.__vbaVarMove>
00402CB5 . 8D95 7CFFFFFF lea edx,dword ptr ss:[ebp-0x84]
00402CBB . 8D4D CC lea ecx,dword ptr ss:[ebp-0x34]
00402CBE . C745 84 781F4>mov dword ptr ss:[ebp-0x7C],blaster9.004>; Nag Meldung
00402CC5 . 899D 7CFFFFFF mov dword ptr ss:[ebp-0x84],ebx
00402CCB . E8 5CE4FFFF call <jmp.&MSVBVM50.__vbaVarCopy>
00402CD0 . 6A 0A push 0xA
00402CD2 . B9 04000280 mov ecx,0x80020004
00402CD7 . 58 pop eax ; 0060B6A4
00402CD8 . 894D 94 mov dword ptr ss:[ebp-0x6C],ecx
00402CDB . 8945 8C mov dword ptr ss:[ebp-0x74],eax
00402CDE . 8945 9C mov dword ptr ss:[ebp-0x64],eax
00402CE1 . 8D45 8C lea eax,dword ptr ss:[ebp-0x74]
00402CE4 . 894D A4 mov dword ptr ss:[ebp-0x5C],ecx
00402CE7 . 50 push eax
00402CE8 . 8D45 9C lea eax,dword ptr ss:[ebp-0x64]
00402CEB . 50 push eax
00402CEC . 8D45 CC lea eax,dword ptr ss:[ebp-0x34]
00402CEF . 50 push eax
00402CF0 . 8D45 DC lea eax,dword ptr ss:[ebp-0x24]
00402CF3 . 50 push eax
00402CF4 . E8 21E4FFFF call <jmp.&MSVBVM50.__vbaI4Var>
00402CF9 . 50 push eax
00402CFA . 8D45 AC lea eax,dword ptr ss:[ebp-0x54]
00402CFD . 50 push eax
00402CFE E8 1DE4FFFF call <jmp.&MSVBVM50.#rtcMsgBox_595> ; 调用提示框
00402D03 . 8D95 5CFFFFFF lea edx,dword ptr ss:[ebp-0xA4]
00402D09 . 8D4D BC lea ecx,dword ptr ss:[ebp-0x44]
00402D0C . 8985 64FFFFFF mov dword ptr ss:[ebp-0x9C],eax
00402D12 . 89BD 5CFFFFFF mov dword ptr ss:[ebp-0xA4],edi
00402D18 . E8 09E4FFFF call <jmp.&MSVBVM50.__vbaVarMove>
00402D1D . 8D45 8C lea eax,dword ptr ss:[ebp-0x74]
00402D20 . 50 push eax
00402D21 . 8D45 9C lea eax,dword ptr ss:[ebp-0x64]
00402D24 . 50 push eax
00402D25 . 6A 02 push 0x2
00402D27 . E8 E8E3FFFF call <jmp.&MSVBVM50.__vbaFreeVarList>
00402D2C . 83C4 0C add esp,0xC
00402D2F . 8D45 BC lea eax,dword ptr ss:[ebp-0x44]
00402D32 . C745 84 01000>mov dword ptr ss:[ebp-0x7C],0x1
00402D39 . C785 7CFFFFFF>mov dword ptr ss:[ebp-0x84],0x8003
00402D43 . 50 push eax ; /var18 = NULL
00402D44 . 8D85 7CFFFFFF lea eax,dword ptr ss:[ebp-0x84] ; |
00402D4A . 50 push eax ; |var28 = NULL
00402D4B . E8 BEE3FFFF call <jmp.&MSVBVM50.__vbaVarTstEq> ; \__vbaVarTstEq
00402D50 . 66:85C0 test ax,ax
00402D53 /75 05 jnz short blaster9.00402D5A ; 选择是或否的跳转
00402D55 . |E8 AEE3FFFF call <jmp.&MSVBVM50.__vbaEnd>
00402D5A > \8975 FC mov dword ptr ss:[ebp-0x4],esi
00402D5D . 68 982D4000 push blaster9.00402D98
00402D62 . EB 13 jmp short blaster9.00402D77
00402D64 . 8D45 8C lea eax,dword ptr ss:[ebp-0x74]
|