|
发表于 2019-10-6 13:34:35
|
显示全部楼层
本楼为最佳答案
 - int main()
- {
- 00F71D40 push ebp
- 00F71D41 mov ebp,esp
- 00F71D43 sub esp,0D4h
- 00F71D49 push ebx
- 00F71D4A push esi
- 00F71D4B push edi
- 00F71D4C lea edi,[ebp-0D4h]
- 00F71D52 mov ecx,35h
- 00F71D57 mov eax,0CCCCCCCCh
- 00F71D5C rep stos dword ptr es:[edi]
- 00F71D5E mov eax,dword ptr [__security_cookie (0F7A004h)]
- 00F71D63 xor eax,ebp
- 00F71D65 mov dword ptr [ebp-4],eax
- 00F71D68 mov ecx,offset _2F8C462B_main@c (0F7C003h)
- 00F71D6D call @__CheckForDebuggerJustMyCode@4 (0F71226h)
- struct Book book = {0};
- 00F71D72 xor eax,eax
- 00F71D74 mov dword ptr [book],eax
- 00F71D77 mov dword ptr [ebp-0Ch],eax
- book = input(book);
- 00F71D7A mov eax,dword ptr [ebp-0Ch]
- 00F71D7D push eax
- 00F71D7E mov ecx,dword ptr [book]
- 00F71D81 push ecx
- 00F71D82 call _input (0F713ACh)
- 00F71D87 add esp,8
- 00F71D8A mov dword ptr [book],eax
- 00F71D8D mov dword ptr [ebp-0Ch],edx
- printf("%d\n%d\n", book.a, book.b);
- 00F71D90 mov eax,dword ptr [ebp-0Ch]
- 00F71D93 push eax
- 00F71D94 mov ecx,dword ptr [book]
- 00F71D97 push ecx
- 00F71D98 push offset string "%d\n%d\n" (0F77B34h)
- 00F71D9D call _printf (0F7104Bh)
- 00F71DA2 add esp,0Ch
- return 0;
- 00F71DA5 xor eax,eax
- }
- 00F71DA7 push edx
- 00F71DA8 mov ecx,ebp
- 00F71DAA push eax
- 00F71DAB lea edx,ds:[0F71DD8h]
- 00F71DB1 call @_RTC_CheckStackVars@8 (0F7125Dh)
- 00F71DB6 pop eax
- 00F71DB7 pop edx
- 00F71DB8 pop edi
- 00F71DB9 pop esi
- 00F71DBA pop ebx
- 00F71DBB mov ecx,dword ptr [ebp-4]
- 00F71DBE xor ecx,ebp
- 00F71DC0 call @__security_check_cookie@4 (0F711F9h)
- 00F71DC5 add esp,0D4h
- 00F71DCB cmp ebp,esp
- 00F71DCD call __RTC_CheckEsp (0F71230h)
- 00F71DD2 mov esp,ebp
- 00F71DD4 pop ebp
- 00F71DD5 ret
复制代码 |
|