1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108
| 00665090 push ebp 00665091 mov ebp,esp 00665093 sub esp,0DCh 00665099 push ebx 0066509A push esi 0066509B push edi 0066509C lea edi,[ebp-1Ch] 0066509F mov ecx,7 006650A4 mov eax,0CCCCCCCCh 006650A9 rep stos dword ptr es:[edi] 006650AB mov eax,dword ptr [__security_cookie (066A020h)] 006650B0 xor eax,ebp 006650B2 mov dword ptr [ebp-4],eax 006650B5 mov ecx,offset _FC42537F_mjc@cpp (066C008h) 006650BA call @__CheckForDebuggerJustMyCode@4 (0661307h)
006650BF mov esi,esp 006650C1 push offset string "\xc7\xeb\xca\xe4\xc8\xeb\xc1\xbd\xb8\xf6\xd5\xfb\xca\xfd\xa1\xa3" (0667BD8h) 006650C6 call dword ptr [__imp__puts (066B170h)] 006650CC add esp,4 006650CF cmp esi,esp 006650D1 call __RTC_CheckEsp (0661230h)
006650D6 push offset string "\xd5\xfb\xca\xfdx\xa3\xba" (0667B30h) 006650DB call _printf (06613ACh) 006650E0 add esp,4 006650E3 lea eax,[x] 006650E6 push eax 006650E7 push offset string "%d" (0667B38h) 006650EC call _scanf (06613A2h) 006650F1 add esp,8
006650F4 push offset string "\xd5\xfb\xca\xfdy\xa3\xba" (0667BECh) 006650F9 call _printf (06613ACh) 006650FE add esp,4 00665101 lea eax,[y] 00665104 push eax 00665105 push offset string "%d" (0667B38h) 0066510A call _scanf (06613A2h) 0066510F add esp,8
00665112 mov eax,dword ptr [x] 00665115 add eax,dword ptr [y] 00665118 push eax 00665119 push offset string "x + y = %d\n" (0667CF0h) 0066511E call _printf (06613ACh) 00665123 add esp,8
00665126 mov eax,dword ptr [x] 00665129 sub eax,dword ptr [y] 0066512C push eax 0066512D push offset string "x - y = %d\n" (0667CE0h) 00665132 call _printf (06613ACh) 00665137 add esp,8
0066513A mov eax,dword ptr [x] 0066513D imul eax,dword ptr [y] 00665141 push eax 00665142 push offset string "x * y = %d\n" (0667CFCh) 00665147 call _printf (06613ACh) 0066514C add esp,8
0066514F mov eax,dword ptr [x] 00665152 cdq 00665153 idiv eax,dword ptr [y] 00665156 push eax 00665157 push offset string "x / y = %d\n" (0667E28h) 0066515C call _printf (06613ACh) 00665161 add esp,8
00665164 mov eax,dword ptr [x] 00665167 cdq 00665168 idiv eax,dword ptr [y] 0066516B push edx 0066516C push offset string "x %% y = %d\n" (0667E34h) 00665171 call _printf (06613ACh) 00665176 add esp,8
00665179 xor eax,eax
0066517B push edx 0066517C mov ecx,ebp 0066517E push eax 0066517F lea edx,ds:[6651ACh] 00665185 call @_RTC_CheckStackVars@8 (06611D1h) 0066518A pop eax 0066518B pop edx 0066518C pop edi 0066518D pop esi 0066518E pop ebx 0066518F mov ecx,dword ptr [ebp-4] 00665192 xor ecx,ebp 00665194 call @__security_check_cookie@4 (066113Bh) 00665199 add esp,0DCh 0066519F cmp ebp,esp 006651A1 call __RTC_CheckEsp (0661230h) 006651A6 mov esp,ebp 006651A8 pop ebp 006651A9 ret
|