Angel_Ka
Full Member | | | | |
: Exception in [W:\FarLce\Far.exe] FAR itself. ============================================================== System information: Windows NT, version 10.0.10240 ============================================================== FAR.EXE information: Version info: 3.0.4665 File size: 4357632 bytes Time stamp: 09.05.2016 04:03:59 Hdr checksum: 0x00436DE4 (computed: 0x00436DE4) ============================================================== Exception C0000005 "ACCESS_VIOLATION" at 012AD2C0 has 0001007F flags. Attempt to READ at address 6F8D3508 EBP: 00F6EDD8 EIP: 012AD2C0 ESP: 00F6EDB8 CS: 00000023 SS: 0000002B Flags: 00210202 EDI: 00000002 ESI: 00F6EE9C EBX: 825C5D90 EDX: 6F8D350A ECX: 6F8D3508 EAX: 00000000 GS: 0000002B FS: 00000053 ES: 0000002B DS: 0000002B Cw: 0000027F Sw: 00000020 Tw: 0000FFFF EOf: 66D81304 Es: 00000000 DOf: 31339E00 Ds: 00000000 Cr0: 00000000 dr0: 00000000 dr1: 00000000 dr2: 00000000 dr3: 00000000 dr6: 00000000 dr7: 00000000 ============================================================== Addr[ 1]: 012AD2C0 Mod:01130000 lMod:01130000 "Far.exe"+0017C6C0 at ".text"+0017C2C0: "__thiscall FileListItem::FileListItem(PluginPanelItem const &)" + 00000210 Addr[ 2]: 012B2141 Mod:01130000 lMod:01130000 "Far.exe"+00181541 at ".text"+00181141: "__thiscall FileList::UpdatePlugin(int, int)" + 00000501 Addr[ 3]: 012AF844 Mod:01130000 lMod:01130000 "Far.exe"+0017EC44 at ".text"+0017E844: "virtual __thiscall FileList::Update(int)" + 00000114 Addr[ 4]: 012B2EB8 Mod:01130000 lMod:01130000 "Far.exe"+001822B8 at ".text"+00181EB8: "virtual __thiscall FileList::DisplayObject(void)" + 00000028 Addr[ 5]: 01341497 Mod:01130000 lMod:01130000 "Far.exe"+00210897 at ".text"+00210497: "virtual __thiscall Panel::Show(void)" + 00000127 Addr[ 6]: 01375FAF Mod:01130000 lMod:01130000 "Far.exe"+002453AF at ".text"+00244FAF: "__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *)" + 000005BF Addr[ 7]: 01315381 Mod:01130000 lMod:01130000 "Far.exe"+001E4781 at ".text"+001E4381: "__thiscall KeyMacro::GetKey(void)" + 00000251 Addr[ 8]: 0130AE2A Mod:01130000 lMod:01130000 "Far.exe"+001DA22A at ".text"+001D9E2A: "__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)" + 000000BA Addr[ 9]: 0130AC64 Mod:01130000 lMod:01130000 "Far.exe"+001DA064 at ".text"+001D9C64: "__cdecl GetInputRecord(_INPUT_RECORD *, bool, bool, bool)" + 00000024 Addr[10]: 0132CA59 Mod:01130000 lMod:01130000 "Far.exe"+001FBE59 at ".text"+001FBA59: "__thiscall Manager::ProcessMainLoop(void)" + 00000089 Addr[11]: 0132C9BE Mod:01130000 lMod:01130000 "Far.exe"+001FBDBE at ".text"+001FB9BE: "__thiscall Manager::EnterMainLoop(void)" + 0000003E Addr[12]: 0132768C Mod:01130000 lMod:01130000 "Far.exe"+001F6A8C at ".text"+001F668C: "__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::alloc" + 0000069C Addr[13]: 01329E2A Mod:01130000 lMod:01130000 "Far.exe"+001F922A at ".text"+001F8E2A: "__cdecl mainImpl(range<wchar_t * *> const &)" + 00000EDA Addr[14]: 0132A28A Mod:01130000 lMod:01130000 "Far.exe"+001F968A at ".text"+001F928A: "_wmain" + 000000FA Addr[15]: 013DD2C8 Mod:01130000 lMod:01130000 "Far.exe"+002AC6C8 at ".text"+002AC2C8: "__cdecl __scrt_common_main_seh(void)" + 000000FF Addr[16]: 74153744 Mod:74140000 lMod:74140000 "KERNEL32.DLL"+00012B44 at ".text"+00012744 Addr[17]: 77039E54 Mod:76FE0000 lMod:76FE0000 "ntdll.dll"+00059254 at ".text"+00058E54 Addr[18]: 77039E1F Mod:76FE0000 lMod:76FE0000 "ntdll.dll"+0005921F at ".text"+00058E1F Stack details: Addr[ 1]: 012AD2C0 Mod:01130000 lMod:01130000 "Far.exe"+0017C6C0 at ".text"+0017C2C0: "__thiscall FileListItem::FileListItem(PluginPanelItem const &)" + 00000210 Stack: 1) 825C5D90 = 10 6A ED D5 7F A9 CE 01 10 6A ED D5 7F A9 CE 01 .j..j. 2) C7CEADB1 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 3) 03F1F280 = 3C 5D 48 01 01 00 00 00 02 00 00 00 00 00 00 00 <]H............. 4) 07FEFF88 = E0 5D 48 01 1C 28 6A 01 10 28 6A 01 05 00 00 00 ]H..(j..(j..... 5) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 7FFF0020 = 30 EE BE E3 42 39 D0 01 10 F3 C5 E3 42 39 D0 01 0B9..B9. 9) 001BEF88 = 38 BD D5 09 FF FF FF FF 00 00 00 00 00 00 00 00 8............. 10) 000567B1 = 01 D4 09 FB FF FF FF 00 00 00 00 00 00 00 00 00 ............... -012AD280 89 04 B9 mov [ecx+edi*4], eax -012AD283 33 C9 xor ecx, ecx -012AD285 8B 46 4C mov eax, [esi+4Ch] -012AD288 8B 04 B8 mov eax, [eax+edi*4] -012AD28B 66 89 08 mov [eax], cx -012AD28E 47 inc edi -012AD28F 3B 7B 44 cmp edi, [ebx+44h] -012AD292 0F 82 78 FF FF FF jb -82h ;012AD210 Far.exe::__thiscall FileListItem::FileListItem(PluginPanelItem const &)+160h -012AD298 BF 02 00 00 00 mov edi, 2 -012AD29D C7 46 54 00 00 00 00 mov dword ptr [esi+54h], 0 -012AD2A4 C7 46 58 10 27 00 00 mov dword ptr [esi+58h], 2710h -012AD2AB 8B 43 60 mov eax, [ebx+60h] -012AD2AE 89 46 5C mov [esi+5Ch], eax -012AD2B1 8B 4B 38 mov ecx, [ebx+38h] -012AD2B4 85 C9 test ecx, ecx -012AD2B6 74 57 je +59h ;012AD30F Far.exe::__thiscall FileListItem::FileListItem(PluginPanelItem const &)+25Fh -012AD2B8 8D 51 02 lea edx, [ecx+2] -012AD2BB EB 03 jmp 12AD2C0h ;+5 Far.exe::__thiscall FileListItem::FileListItem(PluginPanelItem const &)+210h -012AD2BD 8D 49 00 lea ecx, [ecx+0] >012AD2C0 66 8B 01 mov ax, [ecx] +012AD2C3 83 C1 02 add ecx, 2 ;2 "...." +012AD2C6 66 85 C0 test ax, ax +012AD2C9 75 F5 jne -9 ;012AD2C0 Far.exe::__thiscall FileListItem::FileListItem(PluginPanelItem const &)+210h +012AD2CB 2B CA sub ecx, edx +012AD2CD D1 F9 sar ecx, 1 +012AD2CF 8D 41 01 lea eax, [ecx+1] +012AD2D2 33 C9 xor ecx, ecx +012AD2D4 F7 E7 mul di +012AD2D6 0F 90 C1 seto cx +012AD2D9 F7 D9 neg ecx +012AD2DB 0B C8 or ecx, eax +012AD2DD 51 push ecx +012AD2DE E8 28 FE 12 00 call 13DD10Bh ;+12FE2Dh Far.exe::__cdecl operator new[](unsigned int) +012AD2E3 8B 53 38 mov edx, [ebx+38h] +012AD2E6 83 C4 04 add esp, 4 ;4 "...." +012AD2E9 8B F8 mov edi, eax +012AD2EB EB 03 jmp 12AD2F0h ;+5 Far.exe::__thiscall FileListItem::FileListItem(PluginPanelItem const &)+240h +012AD2ED 8D 49 00 lea ecx, [ecx+0] +012AD2F0 0F B7 0A movzx ecx, [edx] +012AD2F3 8D 52 02 lea edx, [edx+2] +012AD2F6 66 89 0F mov [edi], cx +012AD2F9 8D 7F 02 lea edi, [edi+2] +012AD2FC 66 85 C9 test cx, cx Addr[ 2]: 012B2141 Mod:01130000 lMod:01130000 "Far.exe"+00181541 at ".text"+00181141: "__thiscall FileList::UpdatePlugin(int, int)" + 00000501 Stack: 1) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 3) C7CEB279 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 4) 07FEFF88 = E0 5D 48 01 1C 28 6A 01 10 28 6A 01 05 00 00 00 ]H..(j..(j..... 5) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 016A281C = A0 5F 48 01 00 00 00 00 00 00 00 00 05 00 00 00 _H............. 8) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 01409DF8 = 8B 54 24 08 8D 42 0C 8B 4A F0 33 C8 E8 6B 2A FD T$.B.J3k*. 10) 00F6F048 = 74 F0 F6 00 58 1D 44 01 FF FF FF FF 80 F0 F6 00 t.X.D...... -012B2101 08 FE or dh, bh -012B2103 FF 84 C0 0F 84 5A 01 inc dword ptr [eax+eax*8+15A840Fh] -012B210A 00 00 add [eax], al -012B210C A1 74 0B 4F 01 mov eax, [14F0B74h] ;+23EA68h Far.exe::global * Global -012B2111 8B 88 FC 00 00 00 mov ecx, [eax+0FCh] -012B2117 8D 49 5C lea ecx, [ecx+5Ch] -012B211A E8 D1 57 F0 FF call 11B78F0h ;-0FA82Ah Far.exe::__cdecl any_cast<bool>(any &) -012B211F 8B 8D 38 FE FF FF mov ecx, [ebp-1C8h] -012B2125 8A 00 mov al, [eax] -012B2127 84 C0 test al, al -012B2129 75 0A jne +0Ch ;012B2135 Far.exe::__thiscall FileList::UpdatePlugin(int, int)+4F5h -012B212B F6 41 58 06 test byte ptr [ecx+58h], 6 ;6 "...." -012B212F 0F 85 37 01 00 00 jnz +13Dh ;012B226C Far.exe::__thiscall FileList::UpdatePlugin(int, int)+62Ch -012B2135 51 push ecx -012B2136 8D 8D B0 FE FF FF lea ecx, [ebp-150h] -012B213C E8 6F AF FF FF call 12AD0B0h ;-508Ch Far.exe::__thiscall FileListItem::FileListItem(PluginPanelItem const &) >012B2141 C6 45 FC 04 mov byte ptr [ebp-4], 4 +012B2145 8B 85 18 FE FF FF mov eax, [ebp-1E8h] +012B214B 89 85 04 FF FF FF mov [ebp-0FCh], eax +012B2151 8B 86 80 02 00 00 mov eax, [esi+280h] +012B2157 83 E0 02 and eax, 2 ;2 "...." +012B215A 83 C8 00 or eax, 0 ;0 "...." +012B215D 74 07 je +9 ;012B2166 Far.exe::__thiscall FileList::UpdatePlugin(int, int)+526h +012B215F B8 10 27 00 00 mov eax, 2710h +012B2164 EB 1A jmp 12B2180h ;+1Ch Far.exe::__thiscall FileList::UpdatePlugin(int, int)+540h +012B2166 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+23EA0Eh Far.exe::global * Global +012B216B 8D 8D B0 FE FF FF lea ecx, [ebp-150h] +012B2171 51 push ecx +012B2172 8B 80 28 01 00 00 mov eax, [eax+128h] +012B2178 8B 48 6C mov ecx, [eax+6Ch] +012B217B E8 60 13 04 00 call 12F34E0h ;+41365h Far.exe::__thiscall HighlightFiles::GetGroup(FileListItem const *) Addr[ 3]: 012AF844 Mod:01130000 lMod:01130000 "Far.exe"+0017EC44 at ".text"+0017E844: "virtual __thiscall FileList::Update(int)" + 00000114 Stack: 1) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 07FEFF88 = E0 5D 48 01 1C 28 6A 01 10 28 6A 01 05 00 00 00 ]H..(j..(j..... 3) 0138F5AA = 8B 06 8B CE FF 50 14 8B 4D F4 64 89 0D 00 00 00 ..P.Md.... 4) C7CEB209 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 5) 03F1F280 = 3C 5D 48 01 01 00 00 00 02 00 00 00 00 00 00 00 <]H............. 6) 07FEFF88 = E0 5D 48 01 1C 28 6A 01 10 28 6A 01 05 00 00 00 ]H..(j..(j..... 7) 07FEFF88 = E0 5D 48 01 1C 28 6A 01 10 28 6A 01 05 00 00 00 ]H..(j..(j..... 8) 00F6F074 = 4C F1 F6 00 F8 79 42 01 FF FF FF FF 58 F1 F6 00 L.yB.....X. 9) 01441D58 = 8B 54 24 08 8D 42 0C 8B 4A F0 33 C8 E8 0B AB F9 T$.B.J3. 10) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ -012AF804 08 02 or [edx], al -012AF806 C6 45 F3 00 mov byte ptr [ebp-0Dh], 0 -012AF80A 75 04 jne +6 ;012AF810 Far.exe::virtual __thiscall FileList::Update(int)+0E0h -012AF80C C6 45 F3 01 mov byte ptr [ebp-0Dh], 1 -012AF810 C7 45 FC FF FF FF FF mov dword ptr [ebp-4], -1 -012AF817 F6 C3 01 test bl, 1 ;1 "...." -012AF81A 74 0E je +10h ;012AF82A Far.exe::virtual __thiscall FileList::Update(int)+0FAh -012AF81C 83 E3 FE and ebx, -2 ;-2 "...." -012AF81F 8D 4D E4 lea ecx, [ebp-1Ch] -012AF822 89 5D EC mov [ebp-14h], ebx -012AF825 E8 16 68 F0 FF call 11B6040h ;-0F97E5h Far.exe::__thiscall std::shared_ptr<HMenu>::~shared_ptr<HMenu>(void) -012AF82A 80 7D F3 00 cmp byte ptr [ebp-0Dh], 0 ;0 "...." -012AF82E 74 14 je +16h ;012AF844 Far.exe::virtual __thiscall FileList::Update(int)+114h -012AF830 8B 4D 08 mov ecx, [ebp+8] -012AF833 8B C1 mov eax, ecx -012AF835 83 E0 04 and eax, 4 ;4 "...." -012AF838 83 E1 01 and ecx, 1 ;1 "...." -012AF83B 50 push eax -012AF83C 51 push ecx -012AF83D 8B CE mov ecx, esi -012AF83F E8 FC 23 00 00 call 12B1C40h ;+2401h Far.exe::__thiscall FileList::UpdatePlugin(int, int) >012AF844 8B CE mov ecx, esi +012AF846 E8 85 FC FF FF call 12AF4D0h ;-376h Far.exe::__thiscall FileList::ProcessPluginCommand(void) +012AF84B EB 1A jmp 12AF867h ;+1Ch Far.exe::virtual __thiscall FileList::Update(int)+137h +012AF84D 8B 4D 08 mov ecx, [ebp+8] +012AF850 8B C1 mov eax, ecx +012AF852 83 E0 08 and eax, 8 ;8 "...." +012AF855 50 push eax +012AF856 8B C1 mov eax, ecx +012AF858 83 E1 01 and ecx, 1 ;1 "...." +012AF85B 83 E0 04 and eax, 4 ;4 "...." +012AF85E 50 push eax +012AF85F 51 push ecx +012AF860 8B CE mov ecx, esi +012AF862 E8 A9 03 00 00 call 12AFC10h ;+3AEh Far.exe::__thiscall FileList::ReadFileNames(int, int, int) +012AF867 E8 A4 9B 13 00 call 13E9410h ;+139BA9h Far.exe::_clock +012AF86C 89 86 28 02 00 00 mov [esi+228h], eax +012AF872 8B 4D F4 mov ecx, [ebp-0Ch] +012AF875 64 89 0D 00 00 00 00 mov fs:[0],ecx +012AF87C 59 pop ecx +012AF87D 5E pop esi +012AF87E 5B pop ebx +012AF87F 8B E5 mov esp, ebp +012AF881 5D pop ebp Addr[ 4]: 012B2EB8 Mod:01130000 lMod:01130000 "Far.exe"+001822B8 at ".text"+00181EB8: "virtual __thiscall FileList::DisplayObject(void)" + 00000028 Stack: 1) C7CEB2DD = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 00F6F1B8 = 01 00 00 00 00 00 00 00 C8 F1 F6 00 68 E8 A0 05 .........h. 3) 05BE75F0 = C1 01 D8 09 68 E8 A0 05 60 48 EF 4F 00 1A 00 8C ..h.`HO... 4) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 5) 03F1F290 = E0 5D 48 01 1C 28 6A 01 10 28 6A 01 05 00 00 00 ]H..(j..(j..... 6) 03F1F280 = 3C 5D 48 01 01 00 00 00 02 00 00 00 00 00 00 00 <]H............. 7) 00F6F14C = FC F1 F6 00 D8 F2 43 01 FF FF FF FF 08 F2 F6 00 ..C....... 8) 014279F8 = 8B 54 24 08 8D 42 0C 8B 4A E8 33 C8 E8 6B 4E FB T$.B.J3kN. 9) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 00F6F158 = 08 F2 F6 00 81 53 31 01 E8 F1 F6 00 B8 F1 F6 00 ..S1... -012B2E78 0F 95 C0 setnz ax -012B2E7B 2B C8 sub ecx, eax -012B2E7D 0F BF 46 16 movsx eax, [esi+16h] -012B2E81 2B C8 sub ecx, eax -012B2E83 49 dec ecx -012B2E84 89 8E 2C 02 00 00 mov [esi+22Ch], ecx -012B2E8A 5E pop esi -012B2E8B 5B pop ebx -012B2E8C C3 ret -012B2E8D db CCh dup (3) ; ;; Far.exe::virtual __thiscall FileList::DisplayObject(void) ; -012B2E90 56 push esi -012B2E91 8B F1 mov esi, ecx -012B2E93 E8 98 FF FF FF call 12B2E30h ;-63h Far.exe::__thiscall FileList::UpdateHeight(void) -012B2E98 83 BE 50 02 00 00 00 cmp dword ptr [esi+250h], 0 ;0 "...." -012B2E9F 74 17 je +19h ;012B2EB8 Far.exe::virtual __thiscall FileList::DisplayObject(void)+28h -012B2EA1 FF B6 54 02 00 00 push dword ptr [esi+254h] -012B2EA7 8B CE mov ecx, esi -012B2EA9 C7 86 50 02 00 00 00 00 00 00mov dword ptr [esi+250h], 0 -012B2EB3 E8 78 C8 FF FF call 12AF730h ;-3783h Far.exe::virtual __thiscall FileList::Update(int) >012B2EB8 8B CE mov ecx, esi +012B2EBA E8 11 C6 FF FF call 12AF4D0h ;-39EAh Far.exe::__thiscall FileList::ProcessPluginCommand(void) +012B2EBF 6A 00 push 0 +012B2EC1 8B CE mov ecx, esi +012B2EC3 E8 08 00 00 00 call 12B2ED0h ;+0Dh Far.exe::__thiscall FileList::ShowFileList(int) +012B2EC8 5E pop esi +012B2EC9 C3 ret +012B2ECA db CCh dup (6) ; ;; Far.exe::__thiscall FileList::ShowFileList(int) ; +012B2ED0 55 push ebp +012B2ED1 8B EC mov ebp, esp +012B2ED3 6A FF push -1 +012B2ED5 68 33 97 42 01 push 1429733h ;+17685Eh Far.exe::__ehhandler$?ShowFileList@FileList@@AAEXH@Z 006f9733 f +012B2EDA 64 A1 00 00 00 00 mov eax, fs:[0] +012B2EE0 50 push eax +012B2EE1 81 EC B4 00 00 00 sub esp, 0B4h ;180 "..." +012B2EE7 A1 10 C0 4D 01 mov eax, [14DC010h] ;+229129h Far.exe::___security_cookie +012B2EEC 33 C5 xor eax, ebp +012B2EEE 89 45 F0 mov [ebp-10h], eax +012B2EF1 53 push ebx +012B2EF2 56 push esi +012B2EF3 57 push edi +012B2EF4 50 push eax +012B2EF5 8D 45 F4 lea eax, [ebp-0Ch] Addr[ 5]: 01341497 Mod:01130000 lMod:01130000 "Far.exe"+00210897 at ".text"+00210497: "virtual __thiscall Panel::Show(void)" + 00000127 Stack: 1) C7CEB305 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 09D36E20 = 00 00 00 00 07 00 00 00 00 00 00 00 C9 00 00 00 ............... 3) 03D7A768 = 70 93 6A 01 78 93 6A 01 78 93 6A 01 00 00 80 3F pj.xj.xj...? 4) 7562D0E0 = 8B FF 55 8B EC 83 EC 10 83 7D 08 00 57 0F 84 3D .U.}..W.= 5) 00F6F0F8 = 78 FF FE 07 74 F0 F6 00 01 00 00 00 08 00 00 00 x...t......... 6) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 03D7A768 = 70 93 6A 01 78 93 6A 01 78 93 6A 01 00 00 80 3F pj.xj.xj...? 10) 05A66160 = 10 61 A6 05 78 AE D1 03 C8 EF BB 4E 84 20 7F 4B .a.x.N K -01341457 00 00 add [eax], al -01341459 59 pop ecx -0134145A 5F pop edi -0134145B 5E pop esi -0134145C 5B pop ebx -0134145D 8B E5 mov esp, ebp -0134145F 5D pop ebp -01341460 C3 ret -01341461 C7 45 FC FF FF FF FF mov dword ptr [ebp-4], -1 -01341468 8B 7D F0 mov edi, [ebp-10h] -0134146B 85 FF test edi, edi -0134146D 74 21 je +23h ;01341490 Far.exe::virtual __thiscall Panel::Show(void)+120h -0134146F 83 CB FF or ebx, -1 ;-1 "...." -01341472 8B C3 mov eax, ebx -01341474 F0 lock -01341475 0F C1 47 04 xadd [edi+4], eax -01341479 75 15 jne +17h ;01341490 Far.exe::virtual __thiscall Panel::Show(void)+120h -0134147B 8B 07 mov eax, [edi] -0134147D 8B CF mov ecx, edi -0134147F FF 10 call dword ptr [eax] -01341481 F0 lock -01341482 0F C1 5F 08 xadd [edi+8], ebx -01341486 4B dec ebx -01341487 75 07 jne +9 ;01341490 Far.exe::virtual __thiscall Panel::Show(void)+120h -01341489 8B 07 mov eax, [edi] -0134148B 8B CF mov ecx, edi -0134148D FF 50 04 call dword ptr [eax+4] -01341490 8B CE mov ecx, esi -01341492 E8 79 E0 04 00 call 138F510h ;+4E07Eh Far.exe::virtual __thiscall ScreenObject::Show(void) >01341497 8B CE mov ecx, esi +01341499 E8 F2 01 00 00 call 1341690h ;+1F7h Far.exe::__thiscall Panel::ShowScreensCount(void) +0134149E 8B 4D F4 mov ecx, [ebp-0Ch] +013414A1 64 89 0D 00 00 00 00 mov fs:[0],ecx +013414A8 59 pop ecx +013414A9 5F pop edi +013414AA 5E pop esi +013414AB 5B pop ebx +013414AC 8B E5 mov esp, ebp +013414AE 5D pop ebp +013414AF C3 ret ; ;; Far.exe::virtual __thiscall Panel::ShowConsoleTitle(void) ; +013414B0 56 push esi +013414B1 8B F1 mov esi, ecx +013414B3 8B 06 mov eax, [esi] +013414B5 8B 80 DC 00 00 00 mov eax, [eax+0DCh] +013414BB FF D0 call eax +013414BD 84 C0 test al, al +013414BF 74 0E je +10h ;013414CF Far.exe::virtual __thiscall Panel::ShowConsoleTitle(void)+1Fh +013414C1 8D 8E C8 00 00 00 lea ecx, [esi+0C8h] +013414C7 32 D2 xor dl, dl +013414C9 5E pop esi +013414CA E9 81 A6 EC FF jmp 120BB50h ;-13597Ah Far.exe::__cdecl ConsoleTitle::SetFarTitle(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, bool) +013414CF 5E pop esi +013414D0 C3 ret +013414D1 db CCh dup (6) Addr[ 6]: 01375FAF Mod:01130000 lMod:01130000 "Far.exe"+002453AF at ".text"+00244FAF: "__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *)" + 000005BF Stack: 1) 00F6F1E8 = 75 EA 11 8E 03 03 74 43 AC 60 D1 E3 8F 86 54 49 u...tC`㏆TI 2) 00F6F1B8 = 01 00 00 00 00 00 00 00 C8 F1 F6 00 68 E8 A0 05 .........h. 3) C7CEB055 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 4) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 5) 00F6F398 = 01 00 00 00 00 00 00 00 ED B1 CE C7 F8 F4 F6 00 ......... 6) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 00000004 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 013F76C4 = 85 C0 75 18 56 E8 87 E6 FE FF 8B F0 FF 15 2C B2 u.V...., 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ -01375F6F 5C pop esp -01375F70 C0 48 01 E8 ror byte ptr [eax+1], -18h -01375F74 B8 05 E4 FF C6 mov eax, -39001BFBh -01375F79 45 inc ebp -01375F7A FC cld -01375F7B 0A 8D 55 C0 8B 4D or cl, [ebp+4D8BC055h] -01375F81 9C pushfd -01375F82 6A 01 push 1 -01375F84 52 push edx -01375F85 56 push esi -01375F86 8B 01 mov eax, [ecx] -01375F88 FF 90 8C 00 00 00 call dword ptr [eax+8Ch] -01375F8E C6 45 FC 09 mov byte ptr [ebp-4], 9 -01375F92 8D 4D C0 lea ecx, [ebp-40h] -01375F95 E8 C6 71 E3 FF call 11AD160h ;-1C8E35h Far.exe::__thiscall std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>>::~basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>>(void) -01375F9A 8B 4D 9C mov ecx, [ebp-64h] -01375F9D 6A 00 push 0 -01375F9F 8B 01 mov eax, [ecx] -01375FA1 FF 90 E4 00 00 00 call dword ptr [eax+0E4h] -01375FA7 8B 4D 9C mov ecx, [ebp-64h] -01375FAA 8B 01 mov eax, [ecx] -01375FAC FF 50 10 call dword ptr [eax+10h] >01375FAF C6 45 FC 03 mov byte ptr [ebp-4], 3 +01375FB3 8D 4D 9C lea ecx, [ebp-64h] +01375FB6 E8 85 00 E4 FF call 11B6040h ;-1BFF76h Far.exe::__thiscall std::shared_ptr<HMenu>::~shared_ptr<HMenu>(void) +01375FBB EB 03 jmp 1375FC0h ;+5 Far.exe::__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *)+5D0h +01375FBD 8A 5D BE mov bl, [ebp-42h] +01375FC0 8B 4F 0C mov ecx, [edi+0Ch] +01375FC3 8B 01 mov eax, [ecx] +01375FC5 8B 80 90 00 00 00 mov eax, [eax+90h] +01375FCB FF D0 call eax +01375FCD 84 C0 test al, al +01375FCF 74 41 je +43h ;01376012 Far.exe::__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *)+622h +01375FD1 84 DB test bl, bl +01375FD3 74 3D je +3Fh ;01376012 Far.exe::__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *)+622h +01375FD5 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+17AB9Fh Far.exe::global * Global +01375FDA 8B 88 1C 01 00 00 mov ecx, [eax+11Ch] +01375FE0 E8 8B 86 FB FF call 132E670h ;-47970h Far.exe::__thiscall Manager::GetCurrentEditor(void)const +01375FE5 85 C0 test eax, eax +01375FE7 74 29 je +2Bh ;01376012 Far.exe::__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *)+622h +01375FE9 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+17AB8Bh Far.exe::global * Global Addr[ 7]: 01315381 Mod:01130000 lMod:01130000 "Far.exe"+001E4781 at ".text"+001E4381: "__thiscall KeyMacro::GetKey(void)" + 00000251 Stack: 1) C7CEB0A5 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 3) 00F6F398 = 01 00 00 00 00 00 00 00 ED B1 CE C7 F8 F4 F6 00 ......... 4) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 5) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 7) 00F6F280 = 00 00 00 00 00 00 00 00 DC F2 F6 00 29 80 40 01 .........)@. 8) 03F1F600 = 00 D9 48 01 1C 28 6A 01 10 28 6A 01 04 00 00 00 .H..(j..(j..... 9) 03F1F5F0 = 34 B3 47 01 00 00 00 00 00 00 00 00 00 00 00 00 4G............. 10) 0032539A = 00 00 FF FF FF FF 00 00 00 00 FF FF FF FF 00 00 ................ -01315341 51 push ecx -01315342 8D 4D E0 lea ecx, [ebp-20h] -01315345 51 push ecx -01315346 8B 80 28 01 00 00 mov eax, [eax+128h] -0131534C 8B 48 70 mov ecx, [eax+70h] -0131534F E8 9C 06 06 00 call 13759F0h ;+606A1h Far.exe::__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *) -01315354 85 C0 test eax, eax -01315356 74 29 je +2Bh ;01315381 Far.exe::__thiscall KeyMacro::GetKey(void)+251h -01315358 B1 01 mov cl, 1 -0131535A E8 D1 EC FF FF call 1314030h ;-132Ah Far.exe::__cdecl SetMacroValue(bool) -0131535F A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1DB815h Far.exe::global * Global -01315364 8D 4D B0 lea ecx, [ebp-50h] -01315367 81 65 B0 FF FF FF EF and dword ptr [ebp-50h], -10000001h ;-268435457 "...." -0131536E 51 push ecx -0131536F 8D 4D E0 lea ecx, [ebp-20h] -01315372 8B 80 28 01 00 00 mov eax, [eax+128h] -01315378 51 push ecx -01315379 8B 48 70 mov ecx, [eax+70h] -0131537C E8 6F 06 06 00 call 13759F0h ;+60674h Far.exe::__thiscall PluginManager::CallPluginItem(_GUID const &, PluginManager::CallPluginInfo *) >01315381 C7 45 94 00 00 00 00 mov dword ptr [ebp-6Ch], 0 +01315388 C7 45 98 00 00 00 00 mov dword ptr [ebp-68h], 0 +0131538F C7 45 FC 01 00 00 00 mov dword ptr [ebp-4], 1 +01315396 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1DB7DEh Far.exe::global * Global +0131539B 8B 88 1C 01 00 00 mov ecx, [eax+11Ch] +013153A1 8B 01 mov eax, [ecx] +013153A3 85 C0 test eax, eax +013153A5 74 12 je +14h ;013153B9 Far.exe::__thiscall KeyMacro::GetKey(void)+289h +013153A7 8A 40 44 mov al, [eax+44h] +013153AA 84 C0 test al, al +013153AC 75 0B jne +0Dh ;013153B9 Far.exe::__thiscall KeyMacro::GetKey(void)+289h +013153AE 68 10 DF 32 01 push 132DF10h ;+18B62h Far.exe::__thiscall Manager::RefreshCommit(std::shared_ptr<window> const &) +013153B3 51 push ecx +013153B4 E8 A7 62 01 00 call 132B660h ;+162ACh Far.exe::__thiscall Manager::PushWindow(std::shared_ptr<window> const &, void (__thiscall Manager::*)(std::shared_ptr<window> const &)) +013153B9 C7 45 FC FF FF FF FF mov dword ptr [ebp-4], -1 Addr[ 8]: 0130AE2A Mod:01130000 lMod:01130000 "Far.exe"+001DA22A at ".text"+001D9E2A: "__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)" + 000000BA Stack: 1) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 00000001 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 3) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 4) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 5) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 6) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 8) 0132D7AE = C7 45 FC FF FF FF FF 8B 75 E8 85 F6 74 21 83 CF E.....ut! 9) C7CEB109 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ -0130ADEA 8A 45 86 mov al, [ebp-7Ah] -0130ADED 84 C0 test al, al -0130ADEF 0F 85 38 01 00 00 jnz +13Eh ;0130AF2D Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+1BDh -0130ADF5 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1E5D7Fh Far.exe::global * Global -0130ADFA 8B 80 28 01 00 00 mov eax, [eax+128h] -0130AE00 85 C0 test eax, eax -0130AE02 0F 84 25 01 00 00 jz +12Bh ;0130AF2D Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+1BDh -0130AE08 39 98 80 00 00 00 cmp [eax+80h], ebx -0130AE0E 0F 84 19 01 00 00 jz +11Fh ;0130AF2D Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+1BDh -0130AE14 E8 67 A8 00 00 call 1315680h ;+0A86Ch Far.exe::static __cdecl KeyMacro::RunStartMacro(void) -0130AE19 8B 0D 74 0B 4F 01 mov ecx, [14F0B74h] ;+1E5D5Bh Far.exe::global * Global -0130AE1F 8B 89 28 01 00 00 mov ecx, [ecx+128h] -0130AE25 E8 06 A3 00 00 call 1315130h ;+0A30Bh Far.exe::__thiscall KeyMacro::GetKey(void) >0130AE2A 8B F8 mov edi, eax +0130AE2C 85 FF test edi, edi +0130AE2E 0F 84 E4 00 00 00 jz +0EAh ;0130AF18 Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+1A8h +0130AE34 8D 8F F1 FF FD FF lea ecx, [edi-2000Fh] +0130AE3A 83 F9 04 cmp ecx, 4 ;4 "...." +0130AE3D 77 37 ja +39h ;0130AE76 Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+106h +0130AE3F E8 BC FD FF FF call 130AC00h ;-23Fh Far.exe::__cdecl KeyMsClick2ButtonState(unsigned long, unsigned long &) +0130AE44 8B D0 mov edx, eax +0130AE46 85 D2 test edx, edx +0130AE48 74 2C je +2Eh ;0130AE76 Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+106h +0130AE4A 8B 0D 80 13 51 01 mov ecx, [1511380h] ;+206536h Far.exe::_MOUSE_EVENT_RECORD lastMOUSE_EVENT_RECORD +0130AE50 B8 02 00 00 00 mov eax, 2 +0130AE55 66 89 06 mov [esi], ax +0130AE58 A1 88 13 51 01 mov eax, [1511388h] ;" " +0130AE5D 89 4E 04 mov [esi+4], ecx +0130AE60 89 46 0C mov [esi+0Ch], eax +0130AE63 8B C7 mov eax, edi +0130AE65 89 56 08 mov [esi+8], edx Addr[ 9]: 0130AC64 Mod:01130000 lMod:01130000 "Far.exe"+001DA064 at ".text"+001D9C64: "__cdecl GetInputRecord(_INPUT_RECORD *, bool, bool, bool)" + 00000024 Stack: 1) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 00000001 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 3) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 4) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 5) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 00000001 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 007A0001 = BD D5 09 FF FF FF FF 00 00 00 00 00 00 00 00 00 .............. -0130AC24 C3 ret -0130AC25 8D 49 00 lea ecx, [ecx+0] ; ;; Far.exe::$LN15 ; -0130AC28 07 pop es -0130AC29 AC lodsb -0130AC2A 30 01 xor [ecx], al -0130AC2C 1F pop ds -0130AC2D AC lodsb -0130AC2E 30 01 xor [ecx], al -0130AC30 0D AC 30 01 13 or eax, 130130ACh ;318845100 "0.." -0130AC35 AC lodsb -0130AC36 30 01 xor [ecx], al -0130AC38 19 AC 30 01 CC CC CC sbb [eax+esi-333333FFh], ebp -0130AC3F CC int 03 ; ;; Far.exe::__cdecl GetInputRecord(_INPUT_RECORD *, bool, bool, bool) ; -0130AC40 55 push ebp -0130AC41 8B EC mov ebp, esp -0130AC43 83 E4 F8 and esp, -8 ;-8 "...." -0130AC46 83 EC 3C sub esp, 3Ch ;60 "<..." -0130AC49 A1 10 C0 4D 01 mov eax, [14DC010h] ;+1D13C7h Far.exe::___security_cookie -0130AC4E 33 C4 xor eax, esp -0130AC50 89 44 24 38 mov [esp+38h], eax -0130AC54 53 push ebx -0130AC55 56 push esi -0130AC56 57 push edi -0130AC57 FF 75 0C push dword ptr [ebp+0Ch] -0130AC5A 8B F1 mov esi, ecx -0130AC5C FF 75 08 push dword ptr [ebp+8] -0130AC5F E8 0C 01 00 00 call 130AD70h ;+111h Far.exe::__cdecl __GetInputRecord(_INPUT_RECORD *, bool, bool, bool) >0130AC64 8B F8 mov edi, eax +0130AC66 83 C4 08 add esp, 8 ;8 "...." +0130AC69 85 FF test edi, edi +0130AC6B 0F 84 E9 00 00 00 jz +0EFh ;0130AD5A Far.exe::__cdecl GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+11Ah +0130AC71 8B 1D 74 0B 4F 01 mov ebx, [14F0B74h] ;+1E5F03h Far.exe::global * Global +0130AC77 8B 93 28 01 00 00 mov edx, [ebx+128h] +0130AC7D 85 D2 test edx, edx +0130AC7F 0F 84 D5 00 00 00 jz +0DBh ;0130AD5A Far.exe::__cdecl GetInputRecord(_INPUT_RECORD *, bool, bool, bool)+11Ah +0130AC85 8B 06 mov eax, [esi] +0130AC87 33 C9 xor ecx, ecx +0130AC89 89 44 24 28 mov [esp+28h], eax +0130AC8D 8B 46 04 mov eax, [esi+4] +0130AC90 89 44 24 2C mov [esp+2Ch], eax +0130AC94 8B 46 08 mov eax, [esi+8] +0130AC97 89 44 24 30 mov [esp+30h], eax +0130AC9B 8B 46 0C mov eax, [esi+0Ch] +0130AC9E 89 44 24 34 mov [esp+34h], eax Addr[10]: 0132CA59 Mod:01130000 lMod:01130000 "Far.exe"+001FBE59 at ".text"+001FBA59: "__thiscall Manager::ProcessMainLoop(void)" + 00000089 Stack: 1) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 016AA480 = 1C 28 6A 01 10 28 6A 01 60 C5 6A 01 60 C5 6A 01 .(j..(j.`j.`j. 3) 00F6F504 = 44 F8 F6 00 2A 9E 32 01 00 F8 F6 00 18 F8 F6 00 D.*2..... 4) 0132768C = A1 74 0B 4F 01 8B 88 FC 00 00 00 8D 89 D0 0D 00 t.O....... 5) C7CEB759 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 00F6F800 = 00 00 F6 00 37 57 3F 01 02 00 00 00 10 F8 F6 00 ...7W?....... 7) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 00000003 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ -0132CA19 8D 45 E0 lea eax, [ebp-20h] -0132CA1C 50 push eax -0132CA1D 8D 45 C0 lea eax, [ebp-40h] -0132CA20 50 push eax -0132CA21 E8 7A 00 FE FF call 130CAA0h ;-1FF81h Far.exe::__cdecl TranslateKeyToVK(int, int &, int &, _INPUT_RECORD *) -0132CA26 85 C0 test eax, eax -0132CA28 8D 75 E0 lea esi, [ebp-20h] -0132CA2B 0F 95 45 F8 setnz dword ptr [ebp-8] -0132CA2F 83 EC 14 sub esp, 14h ;20 "...." -0132CA32 E9 B4 00 00 00 jmp 132CAEBh ;+0B9h Far.exe::__thiscall Manager::ProcessMainLoop(void)+11Bh -0132CA37 6A 01 push 1 -0132CA39 8B CB mov ecx, ebx -0132CA3B E8 D0 0C 00 00 call 132D710h ;+0CD5h Far.exe::__thiscall Manager::IsPanelsActive(bool)const -0132CA40 0F B6 C8 movzx ecx, ax -0132CA43 32 D2 xor dl, dl -0132CA45 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1C412Fh Far.exe::global * Global -0132CA4A 6A 01 push 1 -0132CA4C 6A 00 push 0 -0132CA4E 89 48 04 mov [eax+4], ecx -0132CA51 8D 4D E8 lea ecx, [ebp-18h] -0132CA54 E8 E7 E1 FD FF call 130AC40h ;-21E14h Far.exe::__cdecl GetInputRecord(_INPUT_RECORD *, bool, bool, bool) >0132CA59 8B 0D 74 0B 4F 01 mov ecx, [14F0B74h] ;+1C411Bh Far.exe::global * Global +0132CA5F 83 C4 08 add esp, 8 ;8 "...." +0132CA62 8B D0 mov edx, eax +0132CA64 C7 41 04 00 00 00 00 mov dword ptr [ecx+4], 0 +0132CA6B 80 7B 20 00 cmp byte ptr [ebx+20h], 0 ;0 "...." +0132CA6F 0F 85 B9 00 00 00 jnz +0BFh ;0132CB2E Far.exe::__thiscall Manager::ProcessMainLoop(void)+15Eh +0132CA75 8B 45 E8 mov eax, [ebp-18h] +0132CA78 66 83 F8 02 cmp ax, 2 ;2 "...." +0132CA7C 75 45 jne +47h ;0132CAC3 Far.exe::__thiscall Manager::ProcessMainLoop(void)+0F3h +0132CA7E 81 FA 03 00 02 00 cmp edx, 20003h ;131075 "...." +0132CA84 74 3D je +3Fh ;0132CAC3 Far.exe::__thiscall Manager::ProcessMainLoop(void)+0F3h +0132CA86 81 FA 04 00 02 00 cmp edx, 20004h ;131076 "...." +0132CA8C 74 35 je +37h ;0132CAC3 Far.exe::__thiscall Manager::ProcessMainLoop(void)+0F3h +0132CA8E 81 FA 0D 00 02 00 cmp edx, 2000Dh ;131085 "...." +0132CA94 74 2D je +2Fh ;0132CAC3 Far.exe::__thiscall Manager::ProcessMainLoop(void)+0F3h Addr[11]: 0132C9BE Mod:01130000 lMod:01130000 "Far.exe"+001FBDBE at ".text"+001FB9BE: "__thiscall Manager::EnterMainLoop(void)" + 0000003E Stack: 1) C7CEB759 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 00F6F800 = 00 00 F6 00 37 57 3F 01 02 00 00 00 10 F8 F6 00 ...7W?....... 3) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 4) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 5) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 00000003 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 00000007 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ -0132C97E CC int 03 -0132C97F CC int 03 ; ;; Far.exe::__thiscall Manager::EnterMainLoop(void) ; -0132C980 55 push ebp -0132C981 8B EC mov ebp, esp -0132C983 83 E4 F8 and esp, -8 ;-8 "...." -0132C986 51 push ecx -0132C987 A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1C41EDh Far.exe::global * Global -0132C98C 56 push esi -0132C98D 8B F1 mov esi, ecx -0132C98F C7 40 08 00 00 00 00 mov dword ptr [eax+8], 0 -0132C996 C6 46 28 01 mov byte ptr [esi+28h], 1 -0132C99A E8 91 0F 00 00 call 132D930h ;+0F96h Far.exe::__thiscall Manager::Commit(void) -0132C99F 80 7E 20 00 cmp byte ptr [esi+20h], 0 ;0 "...." -0132C9A3 75 26 jne +28h ;0132C9CB Far.exe::__thiscall Manager::EnterMainLoop(void)+4Bh -0132C9A5 8B CE mov ecx, esi -0132C9A7 E8 94 FF FF FF call 132C940h ;-67h Far.exe::__thiscall Manager::HaveAnyWindow(void)const -0132C9AC 84 C0 test al, al -0132C9AE 74 1B je +1Dh ;0132C9CB Far.exe::__thiscall Manager::EnterMainLoop(void)+4Bh -0132C9B0 E8 AB FF FF FF call 132C960h ;-50h Far.exe::__thiscall Manager::OnlyDesktop(void)const -0132C9B5 84 C0 test al, al -0132C9B7 75 12 jne +14h ;0132C9CB Far.exe::__thiscall Manager::EnterMainLoop(void)+4Bh -0132C9B9 E8 12 00 00 00 call 132C9D0h ;+17h Far.exe::__thiscall Manager::ProcessMainLoop(void) >0132C9BE 8B CE mov ecx, esi +0132C9C0 E8 6B 0F 00 00 call 132D930h ;+0F70h Far.exe::__thiscall Manager::Commit(void) +0132C9C5 80 7E 20 00 cmp byte ptr [esi+20h], 0 ;0 "...." +0132C9C9 74 DA je -24h ;0132C9A5 Far.exe::__thiscall Manager::EnterMainLoop(void)+25h +0132C9CB 5E pop esi +0132C9CC 8B E5 mov esp, ebp +0132C9CE 5D pop ebp +0132C9CF C3 ret ; ;; Far.exe::__thiscall Manager::ProcessMainLoop(void) ; +0132C9D0 55 push ebp +0132C9D1 8B EC mov ebp, esp +0132C9D3 83 EC 44 sub esp, 44h ;68 "D..." +0132C9D6 A1 10 C0 4D 01 mov eax, [14DC010h] ;+1AF63Ah Far.exe::___security_cookie +0132C9DB 33 C5 xor eax, ebp +0132C9DD 89 45 FC mov [ebp-4], eax +0132C9E0 53 push ebx +0132C9E1 8B D9 mov ebx, ecx +0132C9E3 56 push esi +0132C9E4 57 push edi +0132C9E5 8B 0B mov ecx, [ebx] +0132C9E7 85 C9 test ecx, ecx +0132C9E9 74 4C je +4Eh ;0132CA37 Far.exe::__thiscall Manager::ProcessMainLoop(void)+67h +0132C9EB 8B 01 mov eax, [ecx] +0132C9ED 8B 40 64 mov eax, [eax+64h] +0132C9F0 FF D0 call eax +0132C9F2 84 C0 test al, al +0132C9F4 75 41 jne +43h ;0132CA37 Far.exe::__thiscall Manager::ProcessMainLoop(void)+67h +0132C9F6 33 C0 xor eax, eax Addr[12]: 0132768C Mod:01130000 lMod:01130000 "Far.exe"+001F6A8C at ".text"+001F668C: "__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::alloc" + 0000069C Stack: 1) 00F6F800 = 00 00 F6 00 37 57 3F 01 02 00 00 00 10 F8 F6 00 ...7W?....... 2) 00F6F818 = 00 00 F6 00 BB 56 3F 01 0C 02 4F 01 04 02 4F 01 ...V?...O...O. 3) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 4) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 5) C7CEBA19 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 014F020C = 68 44 69 01 70 4C 68 01 68 26 67 01 F8 FF 4E 01 hDi.pLh.h&g..N. 7) 014F0204 = 02 00 00 00 00 00 00 00 68 44 69 01 70 4C 68 01 ........hDi.pLh. 8) FE4FE000 = 00 00 00 04 FF FF FF FF 00 00 13 01 40 8B 0E 77 ............@.w 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 00F6E678 = D4 52 48 01 00 00 00 00 00 00 00 00 05 00 00 C0 RH............ -0132764C 00 C6 add dh, al -0132764E 45 inc ebp -0132764F FC cld -01327650 04 8B add al, -75h ;-117 "u..." -01327652 9D popfd -01327653 04 FF add al, -1 ;-1 "...." -01327655 FF FF <invalid> -01327657 85 DB test ebx, ebx -01327659 74 21 je +23h ;0132767C Far.exe::__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<w -0132765B 83 CF FF or edi, -1 ;-1 "...." -0132765E 8B C7 mov eax, edi -01327660 F0 lock -01327661 0F C1 43 04 xadd [ebx+4], eax -01327665 75 15 jne +17h ;0132767C Far.exe::__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<w -01327667 8B 03 mov eax, [ebx] -01327669 8B CB mov ecx, ebx -0132766B FF 10 call dword ptr [eax] -0132766D F0 lock -0132766E 0F C1 7B 08 xadd [ebx+8], edi -01327672 4F dec edi -01327673 75 07 jne +9 ;0132767C Far.exe::__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<w -01327675 8B 03 mov eax, [ebx] -01327677 8B CB mov ecx, ebx -01327679 FF 50 04 call dword ptr [eax+4] -0132767C A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1C94F8h Far.exe::global * Global -01327681 8B 88 1C 01 00 00 mov ecx, [eax+11Ch] -01327687 E8 F4 52 00 00 call 132C980h ;+52F9h Far.exe::__thiscall Manager::EnterMainLoop(void) >0132768C A1 74 0B 4F 01 mov eax, [14F0B74h] ;+1C94E8h Far.exe::global * Global +01327691 8B 88 FC 00 00 00 mov ecx, [eax+0FCh] +01327697 8D 89 D0 0D 00 00 lea ecx, [ecx+0DD0h] +0132769D E8 4E 02 E9 FF call 11B78F0h ;-16FDADh Far.exe::__cdecl any_cast<bool>(any &) +013276A2 8A 00 mov al, [eax] +013276A4 84 C0 test al, al +013276A6 75 2C jne +2Eh ;013276D4 Far.exe::__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<w +013276A8 E8 B3 86 08 00 call 13AFD60h ;+886B8h Far.exe::__cdecl TreeCache(void) +013276AD 83 78 18 00 cmp dword ptr [eax+18h], 0 ;0 "...." +013276B1 74 1C je +1Eh ;013276CF Far.exe::__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<w +013276B3 E8 A8 86 08 00 call 13AFD60h ;+886ADh Far.exe::__cdecl TreeCache(void) +013276B8 83 EC 08 sub esp, 8 ;8 "...." +013276BB 8B F8 mov edi, eax +013276BD E8 9E 86 08 00 call 13AFD60h ;+886A3h Far.exe::__cdecl TreeCache(void) +013276C2 8D 4F 08 lea ecx, [edi+8] +013276C5 8B D0 mov edx, eax +013276C7 E8 C4 EC 08 00 call 13B6390h ;+8ECC9h Far.exe:?$WriteTree@$$CBV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@VTreeListCache@@V<lambda_28963000be03eebde431d9889b2231fa>@@@@YAXABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@ABVTreeListCache@@ABV<lambda Addr[13]: 01329E2A Mod:01130000 lMod:01130000 "Far.exe"+001F922A at ".text"+001F8E2A: "__cdecl mainImpl(range<wchar_t * *> const &)" + 00000EDA Stack: 1) C7CEBAE1 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 014F020C = 68 44 69 01 70 4C 68 01 68 26 67 01 F8 FF 4E 01 hDi.pLh.h&g..N. 3) 014F0204 = 02 00 00 00 00 00 00 00 68 44 69 01 70 4C 68 01 ........hDi.pLh. 4) FE4FE000 = 00 00 00 04 FF FF FF FF 00 00 13 01 40 8B 0E 77 ............@.w 5) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) FFFFFFFF = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 7) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 8) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 020007D0 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ -01329DEA 8B 11 mov edx, [ecx] -01329DEC 85 D2 test edx, edx -01329DEE 74 06 je +8 ;01329DF6 Far.exe::__cdecl mainImpl(range<wchar_t * *> const &)+0EA6h -01329DF0 8B C6 mov eax, esi -01329DF2 F0 lock -01329DF3 0F C1 02 xadd [edx], eax -01329DF6 6A 04 push 4 -01329DF8 51 push ecx -01329DF9 E8 0E 2F 0B 00 call 13DCD0Ch ;+0B2F13h Far.exe::__cdecl operator delete(void *, unsigned int) -01329DFE 83 C4 08 add esp, 8 ;8 "...." -01329E01 C6 45 FC 23 mov byte ptr [ebp-4], 23h -01329E05 FF B5 00 FD FF FF push dword ptr [ebp-300h] -01329E0B FF B5 2C FD FF FF push dword ptr [ebp-2D4h] -01329E11 8D 45 D4 lea eax, [ebp-2Ch] -01329E14 50 push eax -01329E15 8D 45 BC lea eax, [ebp-44h] -01329E18 50 push eax -01329E19 8D 95 1C FF FF FF lea edx, [ebp-0E4h] -01329E1F 8D 8D 04 FF FF FF lea ecx, [ebp-0FCh] -01329E25 E8 C6 D1 FF FF call 1326FF0h ;-2E35h Far.exe::__cdecl MainProcess(std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>> const &, std::basic_string<wchar_t, std::char_traits<wch >01329E2A 83 C4 10 add esp, 10h ;16 "...." +01329E2D 8B F8 mov edi, eax +01329E2F 89 BD F0 FC FF FF mov [ebp-310h], edi +01329E35 C7 45 FC 17 00 00 00 mov dword ptr [ebp-4], 17h +01329E3C E8 5F 02 00 00 call 132A0A0h ;+264h Far.exe:?R<lambda_3d755182d02d06e6996724f2466e989b>@@QBEXXZ +01329E41 C6 45 FC 16 mov byte ptr [ebp-4], 16h +01329E45 8D 8D F4 FC FF FF lea ecx, [ebp-30Ch] +01329E4B E8 C0 05 FE FF call 130A410h ;-1FA3Bh Far.exe::__thiscall std::vector<std::pair<std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>>, std::basic_string<wchar_t, std::char_traits<wchar_t>, std::allocator<wchar_t>>>, std::allocator<std::pair<std::basic_string<wchar +01329E50 C6 45 FC 15 mov byte ptr [ebp-4], 15h +01329E54 8B 85 78 FF FF FF mov eax, [ebp-88h] +01329E5A 83 F8 08 cmp eax, 8 ;8 "...." +01329E5D 72 13 jc +15h ;01329E72 Far.exe::__cdecl mainImpl(range<wchar_t * *> const &)+0F22h +01329E5F 40 inc eax +01329E60 50 push eax +01329E61 FF B5 64 FF FF FF push dword ptr [ebp-9Ch] Addr[14]: 0132A28A Mod:01130000 lMod:01130000 "Far.exe"+001F968A at ".text"+001F928A: "_wmain" + 000000FA Stack: 1) 00000002 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 2) 01694468 = 74 44 69 01 98 44 69 01 00 00 00 00 57 00 3A 00 tDi.Di.....W.:. 3) 01690AD8 = 20 A1 68 01 A8 44 69 01 10 78 69 01 98 F7 68 01 h.Di..xi.h. 4) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 5) C7CEBB55 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 6) 013DD345 = E8 31 04 00 00 E9 7A FE FF FF 55 8B EC 51 56 FF 1...z...UQV. 7) 013DD345 = E8 31 04 00 00 E9 7A FE FF FF 55 8B EC 51 56 FF 1...z...UQV. 8) FE4FE000 = 00 00 00 04 FF FF FF FF 00 00 13 01 40 8B 0E 77 ............@.w 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) 013DD345 = E8 31 04 00 00 E9 7A FE FF FF 55 8B EC 51 56 FF 1...z...UQV. -0132A24A FF 15 44 B6 44 01 call dword ptr [144B644h] ;+1213FAh Far.exe::__imp__CoInitializeEx@8 -0132A250 A3 F0 75 52 01 mov [15275F0h], eax ;+1FD3A0h Far.exe::os::co_initialize const `wmain'::`3'::scoped_object_814 -0132A255 68 50 9A 44 01 push 1449A50h ;+11F7FBh Far.exe::__cdecl `wmain'::`3'::`dynamic atexit destructor for 'scoped_object_814''(void) -0132A25A E8 11 2D 0B 00 call 13DCF70h ;+0B2D16h Far.exe::_atexit -0132A25F C6 45 FC 02 mov byte ptr [ebp-4], 2 -0132A263 68 EC 75 52 01 push 15275ECh ;+1FD389h Far.exe:$TSS0@?2??wmain@@9@4HA -0132A268 E8 5C 29 0B 00 call 13DCBC9h ;+0B2961h Far.exe::__Init_thread_footer -0132A26D 83 C4 08 add esp, 8 ;8 "...." -0132A270 8B 4D 0C mov ecx, [ebp+0Ch] -0132A273 8D 41 04 lea eax, [ecx+4] -0132A276 89 45 DC mov [ebp-24h], eax -0132A279 8B 45 08 mov eax, [ebp+8] -0132A27C 8D 04 81 lea eax, [ecx+eax*4] -0132A27F 89 45 E0 mov [ebp-20h], eax -0132A282 8D 4D DC lea ecx, [ebp-24h] -0132A285 E8 C6 EC FF FF call 1328F50h ;-1335h Far.exe::__cdecl mainImpl(range<wchar_t * *> const &) >0132A28A 8B F0 mov esi, eax +0132A28C C6 45 FC 01 mov byte ptr [ebp-4], 1 +0132A290 8D 4D EC lea ecx, [ebp-14h] +0132A293 E8 D8 F2 F4 FF call 1279570h ;-0B0D23h Far.exe::__thiscall veh_handler::~veh_handler(void) +0132A298 C7 45 FC 06 00 00 00 mov dword ptr [ebp-4], 6 +0132A29F C7 05 C0 0B 4F 01 00 00 00 00mov dword ptr [14F0BC0h], 0 ;+1C6921h Far.exe::static tracer * tracer::sTracer +0132A2A9 C6 45 FC 05 mov byte ptr [ebp-4], 5 +0132A2AD E8 FE 3F FD FF call 12FE2B0h ;-2BFFDh Far.exe::__cdecl Imports(void) +0132A2B2 8D 88 58 01 00 00 lea ecx, [eax+158h] +0132A2B8 E8 F3 F4 F4 FF call 12797B0h ;-0B0B08h Far.exe::__thiscall ImportedFunctions::unique_function_pointer<unsigned long (__stdcall *)(void *), ImportedFunctions::name_RemoveVectoredExceptionHandler, &static __stdcall ImportedFunctions::stub_RemoveVectoredExceptionHandler(void *)>::get_pointer +0132A2BD FF 75 D8 push dword ptr [ebp-28h] +0132A2C0 FF D0 call eax +0132A2C2 C6 45 FC 04 mov byte ptr [ebp-4], 4 +0132A2C6 8D 45 B8 lea eax, [ebp-48h] Addr[15]: 013DD2C8 Mod:01130000 lMod:01130000 "Far.exe"+002AC6C8 at ".text"+002AC2C8: "__cdecl __scrt_common_main_seh(void)" + 000000FF Stack: 1) FE4FE000 = 00 00 00 04 FF FF FF FF 00 00 13 01 40 8B 0E 77 ............@.w 2) 74153720 = 8B FF 55 8B EC 51 A1 00 00 1F 74 33 C5 89 45 FC .UQ...t3ʼnE. 3) 22D9809E = 38 20 4E 75 6D 20 4C 6F 63 6B 20 57 69 6E 20 42 8 Num Lock Win B 4) 00F6F964 = 74 F9 F6 00 1F 9E 03 77 FF FF FF FF EA D6 05 77 t...w.....w 5) 77039E54 = E9 2A C5 03 00 8B 4D EC 8B 01 8B 00 89 45 D4 89 *..M..Eԉ 6) FE4FE000 = 00 00 00 04 FF FF FF FF 00 00 13 01 40 8B 0E 77 ............@.w 7) CF3462D3 = 00 00 00 00 00 84 0A DC 42 00 0C 04 88 4A 00 6F ......B...J.o 8) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 9) 00000000 = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10) FE4FE000 = 00 00 00 04 FF FF FF FF 00 00 13 01 40 8B 0E 77 ............@.w -013DD288 F1 db 000000F1h -013DD289 05 00 00 8B F0 add eax, -0F750000h ;-259325952 "..u." -013DD28E 39 3E cmp [esi], edi -013DD290 74 13 je +15h ;013DD2A5 Far.exe::__cdecl __scrt_common_main_seh(void)+0DCh -013DD292 56 push esi -013DD293 E8 CB FB FF FF call 13DCE63h ;-430h Far.exe::___scrt_is_nonwritable_in_current_image 006ace63 f -013DD298 59 pop ecx -013DD299 84 C0 test al, al -013DD29B 74 08 je +0Ah ;013DD2A5 Far.exe::__cdecl __scrt_common_main_seh(void)+0DCh -013DD29D FF 36 push dword ptr [esi] -013DD29F E8 88 DA 00 00 call 13EAD2Ch ;+0DA8Dh Far.exe::__register_thread_local_exe_atexit_callback 006bad2c f -013DD2A4 59 pop ecx -013DD2A5 57 push edi -013DD2A6 E8 B5 66 D5 FF call 1133960h ;-2A9946h Far.exe::__fastcall _guard_check_icall_nop(x) -013DD2AB E8 A0 8B 01 00 call 13F5E50h ;+18BA5h Far.exe::___p___wargv -013DD2B0 8B F8 mov edi, eax -013DD2B2 E8 93 8B 01 00 call 13F5E4Ah ;+18B98h Far.exe::___p___argc -013DD2B7 8B F0 mov esi, eax -013DD2B9 E8 60 80 01 00 call 13F531Eh ;+18065h Far.exe::__get_initial_wide_environment 006c531e f -013DD2BE 50 push eax -013DD2BF FF 37 push dword ptr [edi] -013DD2C1 FF 36 push dword ptr [esi] -013DD2C3 E8 C8 CE F4 FF call 132A190h ;-0B3133h Far.exe::_wmain >013DD2C8 8B F0 mov esi, eax +013DD2CA 6A 00 push 0 +013DD2CC E8 8F 66 D5 FF call 1133960h ;-2A996Ch Far.exe::__fastcall _guard_check_icall_nop(x) +013DD2D1 83 C4 14 add esp, 14h ;20 "...." +013DD2D4 E8 62 D9 00 00 call 13EAC3Bh ;+0D967h Far.exe::__cdecl is_managed_app(void) +013DD2D9 84 C0 test al, al +013DD2DB 75 06 jne +8 ;013DD2E3 Far.exe::__cdecl __scrt_common_main_seh(void)+11Ah +013DD2DD 56 push esi +013DD2DE E8 81 DA 00 00 call 13EAD64h ;+0DA86h Far.exe::_exit +013DD2E3 84 DB test bl, bl +013DD2E5 75 05 jne +7 ;013DD2EC Far.exe::__cdecl __scrt_common_main_seh(void)+123h +013DD2E7 E8 1B DA 00 00 call 13EAD07h ;+0DA20h Far.exe::__cexit +013DD2EC 6A 00 push 0 +013DD2EE 6A 01 push 1 +013DD2F0 E8 18 FC FF FF call 13DCF0Dh ;-3E3h Far.exe::___scrt_uninitialize_crt +013DD2F5 59 pop ecx +013DD2F6 59 pop ecx +013DD2F7 C7 45 FC FE FF FF FF mov dword ptr [ebp-4], -2 +013DD2FE 8B C6 mov eax, esi +013DD300 EB 3D jmp 13DD33Fh ;+3Fh Far.exe::__cdecl __scrt_common_main_seh(void)+176h +013DD302 8B 4D EC mov ecx, [ebp-14h] +013DD305 8B 01 mov eax, [ecx] Addr[16]: 74153744 Mod:74140000 lMod:74140000 "KERNEL32.DLL"+00012B44 at ".text"+00012744 Stack: FE4FE000 CF3462D3 00000000 00000000 FE4FE000 00FA0014 00000000 00000000 00000000 CF3462D3 Addr[17]: 77039E54 Mod:76FE0000 lMod:76FE0000 "ntdll.dll"+00059254 at ".text"+00058E54 Stack: FFFFFFFF 7705D6EA 00000000 00000000 013DD345 FE4FE000 00000000 00000000 00000000 00000000 Addr[18]: 77039E1F Mod:76FE0000 lMod:76FE0000 "ntdll.dll"+0005921F at ".text"+00058E1F Stack: 013DD345 FE4FE000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 |
| : 585 | . 20-05-2007 | : 20:13 09-05-2016 | : Angel_Ka, 21:01 09-05-2016 |
|