=============================================================================
Private Sub Form_Load()
s = "1"
s = s + "z1"
End Sub
=============================================================================
; ---------------------------------------------------------------------------
loc_4019F0:
push ebp
mov ebp, esp
sub esp, 0Ch
push offset loc_4010A6
mov eax, large fs:0
push eax
mov large fs:0, esp
sub esp, 38h
push ebx
push esi
push edi
mov [ebp-0Ch], esp
mov dword ptr [ebp-8], offset dword_401088
mov eax, [ebp+8]
mov ecx, eax
and ecx, 1
mov [ebp-4], ecx
and al, 0FEh
push eax
mov [ebp+8], eax
mov edx, [eax]
call dword ptr [edx+4]
xor esi, esi
mov edi, 8
mov [ebp-44h], esi
lea edx, [ebp-44h]
lea ecx, [ebp-24h]
mov [ebp-24h], esi
mov [ebp-34h], esi
mov dword ptr [ebp-3Ch], offset dword_4016C4
mov [ebp-44h], edi
call ds:__vbaVarCopy
lea eax, [ebp-24h]
lea ecx, [ebp-44h]
push eax
lea edx, [ebp-34h]
push ecx
push edx
mov dword ptr [ebp-3Ch], offset s_Z1 ; "z1"
mov [ebp-44h], edi
call ds:__vbaVarAdd
mov edx, eax
lea ecx, [ebp-24h]
call ds:__vbaVarMove
mov [ebp-4], esi
push offset s_LePlQLeLm_Di ; "婨/bP媆b/xFFQ/b婨鼖M靇^d塡r"
jmp short loc_401A90
; ---------------------------------------------------------------------------
lea ecx, [ebp-34h]
call ds:__vbaFreeVar
retn
; ---------------------------------------------------------------------------
loc_401A90:
lea ecx, [ebp-24h]
call ds:__vbaFreeVar
retn
; ---------------------------------------------------------------------------
这样下去,VB的.exe源码就可以分析出来了!妖魔鬼怪快献身!
昨天晚上看<spring>看了一晚上,一年前的书,发现什么东西都是豁然开朗,人仿佛象是中了邪,害得我今天开会一直犯困,哈哈!IoC 理解了,AOP理解了!等看完它再去看加速深入理解<Herbinate>一下,找到好的设计思想!
上周六买了一本好书,但绝对不是一个小时一章的那种,<深入理解 Windows操作系统>,终于有像核心编程那样的书出来,记得近六年前,我还是刚毕业的时候,对了十一时公司(很怀念的公司,虽然......)发的两百块的补助,买了〈高级编程〉,使我知道了window线程的细节,更有趣的是它好象也是99!
不求上进,但求解惑!
看了W2写的三十的Blog,只能说:"日子还再继续......"