Guest User

Untitled

a guest
Jul 15th, 2018
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.79 KB | None | 0 0
  1. CPU Disasm
  2. Address Hex dump Command Comments
  3. 7564AE99 |. 8BFF MOV EDI,EDI ; BOOL user32.UserClientDllInitialize(guessed hDLLInstance,CallReason,pReserved)
  4. 7564AE9B |. 55 PUSH EBP
  5. 7564AE9C |. 8BEC MOV EBP,ESP
  6. 7564AE9E |. 837D 0C 01 CMP DWORD PTR SS:[ARG.2],1
  7. 7564AEA2 |. 75 0D JNE SHORT 7564AEB1
  8. 7564AEA4 |. FF75 10 PUSH DWORD PTR SS:[ARG.3] ; /Arg3 => [ARG.3]
  9. 7564AEA7 |. 6A 01 PUSH 1 ; |Arg2 = 1
  10. 7564AEA9 |. FF75 08 PUSH DWORD PTR SS:[ARG.1] ; |Arg1 => [ARG.1]
  11. 7564AEAC |. E8 B2130000 CALL 7564C263 ; \user32.7564C263
  12. 7564AEB1 |> 5D POP EBP
Add Comment
Please, Sign In to add comment