severson pisze:Życzę dalszych sukcesów w "disaseemblowaniu" programów w Pythonie.
phoenix windows binary (MD5 SUM: c726f05af3252ac2236201d10448953f)
Kod: Zaznacz cały
.text:00402886 _pre_cpp_init:
.text:00402886 push offset byte_402C6A
.text:0040288B call sub_402C2D
.text:00402890 mov eax, dword_405A88
.text:00402895 mov dword ptr [esp], offset dword_405A78
.text:0040289C push dword_405A84
.text:004028A2 mov dword_405A78, eax
.text:004028A7 push offset envp
.text:004028AC push offset argv
.text:004028B1 push offset argc
.text:004028B6 call ds:__getmainargs
.text:004028BC add esp, 14h
.text:004028BF mov dword_405A74, eax
.text:004028C4 test eax, eax
.text:004028C6 jge short locret_4028D0
.text:004028C8 push 8
.text:004028CA call _amsg_exit
Kod: Zaznacz cały
.data:0040502C ; char Type[]
.data:0040502C Type db 'PYTHONSCRIPT',0 ; DATA XREF: sub_401150+6o
.data:00405039 align 4
.data:0040503C ; char aCouldNotLocate[]
.data:0040503C aCouldNotLocate db 'Could not locate script resource:',0
Zasada wciaz ta sama co w SL3.
15 znakow (00-09), + "00" + IMEI + "00".