【求助】一段MFC类构造函数的汇编代码,写出它的C++形式 本帖最后由 jhk001 于 2010-09-24 15:43:03 编辑 解决方案 » 免费领取超大流量手机卡,每月29元包185G流量+100分钟通话, 中国电信官方发货 没贴完的代码: 0000019A: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ 0000019F: 8D 8E 60 02 00 00 lea ecx,[esi+260h] 000001A5: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ 000001AA: 8D 8E 74 02 00 00 lea ecx,[esi+274h] 000001B0: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ 000001B5: 8D 8E 9C 02 00 00 lea ecx,[esi+29Ch] 000001BB: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ 000001C0: 8D 8E B0 02 00 00 lea ecx,[esi+2B0h] 000001C6: C6 44 24 18 19 mov byte ptr [esp+18h],19h 000001CB: E8 00 00 00 00 call ??0CMIDI@@QAE@XZ 000001D0: 8D 8E 60 03 00 00 lea ecx,[esi+360h] 000001D6: C6 44 24 18 1A mov byte ptr [esp+18h],1Ah 000001DB: E8 00 00 00 00 call ??0CEWorkSpace@@QAE@XZ 000001E0: BB 00 00 00 00 mov ebx,offset ??_7CDllFunc@@6B@ 000001E5: 89 BE 80 03 00 00 mov dword ptr [esi+380h],edi 000001EB: 89 9E 7C 03 00 00 mov dword ptr [esi+37Ch],ebx 000001F1: 89 BE 84 03 00 00 mov dword ptr [esi+384h],edi 000001F7: 89 BE 88 03 00 00 mov dword ptr [esi+388h],edi 000001FD: 89 9E 90 03 00 00 mov dword ptr [esi+390h],ebx 00000203: 89 BE 94 03 00 00 mov dword ptr [esi+394h],edi 00000209: 89 BE 98 03 00 00 mov dword ptr [esi+398h],edi 0000020F: 89 BE 9C 03 00 00 mov dword ptr [esi+39Ch],edi 00000215: 8D 8E A0 03 00 00 lea ecx,[esi+3A0h] 0000021B: C6 44 24 18 1D mov byte ptr [esp+18h],1Dh 00000220: E8 00 00 00 00 call ??0CPing@@QAE@XZ 00000225: 8D 8E B0 03 00 00 lea ecx,[esi+3B0h] 0000022B: C6 44 24 18 1E mov byte ptr [esp+18h],1Eh 00000230: E8 00 00 00 00 call ??0CPtrArray@@QAE@XZ 00000235: 89 9E C4 03 00 00 mov dword ptr [esi+3C4h],ebx 0000023B: 89 BE C8 03 00 00 mov dword ptr [esi+3C8h],edi 00000241: 89 BE CC 03 00 00 mov dword ptr [esi+3CCh],edi 00000247: 89 BE D0 03 00 00 mov dword ptr [esi+3D0h],edi 0000024D: 8D 9E D4 03 00 00 lea ebx,[esi+3D4h] 00000253: C6 44 24 18 20 mov byte ptr [esp+18h],20h 00000258: 8B CB mov ecx,ebx 0000025A: E8 00 00 00 00 call ??0CWnd@@QAE@XZ 0000025F: C7 03 00 00 00 00 mov dword ptr [ebx],offset ??_7CSysHideWnd@@6B@ 00000265: C7 06 00 00 00 00 mov dword ptr [esi],offset ??_7CKrnlApp@@6B@ 0000026B: 89 B6 08 01 00 00 mov dword ptr [esi+108h],esi 00000271: 89 BE 24 04 00 00 mov dword ptr [esi+424h],edi 00000277: 89 BE 20 04 00 00 mov dword ptr [esi+420h],edi 0000027D: 89 BE E0 01 00 00 mov dword ptr [esi+1E0h],edi 00000283: 89 BE E4 01 00 00 mov dword ptr [esi+1E4h],edi 00000289: 89 BE EC 01 00 00 mov dword ptr [esi+1ECh],edi 0000028F: 89 BE E8 01 00 00 mov dword ptr [esi+1E8h],edi 00000295: 89 BE F4 01 00 00 mov dword ptr [esi+1F4h],edi 0000029B: 89 BE F0 01 00 00 mov dword ptr [esi+1F0h],edi 000002A1: 89 BE 8C 02 00 00 mov dword ptr [esi+28Ch],edi 000002A7: 68 00 00 00 00 push offset ?gcs@@3U_RTL_CRITICAL_SECTION@@A 000002AC: 89 BE 88 02 00 00 mov dword ptr [esi+288h],edi 000002B2: 89 BE 90 02 00 00 mov dword ptr [esi+290h],edi 000002B8: 89 BE 98 02 00 00 mov dword ptr [esi+298h],edi 000002BE: 89 BE 94 02 00 00 mov dword ptr [esi+294h],edi 000002C4: 89 BE 8C 03 00 00 mov dword ptr [esi+38Ch],edi 000002CA: 89 BE AC 03 00 00 mov dword ptr [esi+3ACh],edi 000002D0: 89 BE 10 04 00 00 mov dword ptr [esi+410h],edi 000002D6: 89 BE 14 04 00 00 mov dword ptr [esi+414h],edi 000002DC: 89 BE 18 04 00 00 mov dword ptr [esi+418h],edi 000002E2: 89 BE 1C 04 00 00 mov dword ptr [esi+41Ch],edi 000002E8: 89 BE C4 00 00 00 mov dword ptr [esi+0C4h],edi 000002EE: 89 BE C8 00 00 00 mov dword ptr [esi+0C8h],edi 000002F4: 89 BE CC 00 00 00 mov dword ptr [esi+0CCh],edi 000002FA: 89 BE 34 02 00 00 mov dword ptr [esi+234h],edi 00000300: 89 BE 28 04 00 00 mov dword ptr [esi+428h],edi 00000306: 89 BE D4 01 00 00 mov dword ptr [esi+1D4h],edi 0000030C: FF 15 00 00 00 00 call dword ptr [__imp__InitializeCriticalSection@4] 00000312: 8B 4C 24 10 mov ecx,dword ptr [esp+10h] 00000316: 8B C6 mov eax,esi 00000318: 5F pop edi 00000319: 5E pop esi 0000031A: 5B pop ebx 0000031B: 64 89 0D 00 00 00 mov dword ptr fs:[__except_list],ecx 00 00000322: 83 C4 10 add esp,10h 00000325: C3 ret 00000326: 90 nop 00000327: 90 nop 00000328: 90 nop 00000329: 90 nop 0000032A: 90 nop 0000032B: 90 nop 0000032C: 90 nop 0000032D: 90 nop 0000032E: 90 nop 0000032F: 90 nop 没贴完的代码:$L142332: 00000000: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000003: E9 00 00 00 00 jmp ??1CWinApp@@UAE@XZ$L142333: 00000008: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000000B: 81 C1 D0 00 00 00 add ecx,0D0h 00000011: E9 00 00 00 00 jmp ??1CString@@QAE@XZ$L142334: 00000016: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000019: 81 C1 D4 00 00 00 add ecx,0D4h 0000001F: E9 00 00 00 00 jmp ??1CString@@QAE@XZ$L142335: 00000024: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000027: 81 C1 D8 00 00 00 add ecx,0D8h 0000002D: E9 00 00 00 00 jmp ??1CString@@QAE@XZ$L142336: 00000032: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000035: 81 C1 DC 00 00 00 add ecx,0DCh 0000003B: E9 00 00 00 00 jmp ??1CStringArray@@UAE@XZ$L142337: 00000040: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000043: 81 C1 F0 00 00 00 add ecx,0F0h 00000049: E9 00 00 00 00 jmp ??1CStringArray@@UAE@XZ$L142338: 0000004E: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000051: 81 C1 04 01 00 00 add ecx,104h 00000057: E9 00 00 00 00 jmp ??1CWinIDManger@@UAE@XZ$L142339: 0000005C: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000005F: 81 C1 20 01 00 00 add ecx,120h 00000065: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142340: 0000006A: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000006D: 81 C1 34 01 00 00 add ecx,134h 00000073: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142341: 00000078: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000007B: 81 C1 48 01 00 00 add ecx,148h 00000081: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142342: 00000086: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000089: 81 C1 5C 01 00 00 add ecx,15Ch 0000008F: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142343: 00000094: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000097: 81 C1 70 01 00 00 add ecx,170h 0000009D: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142344: 000000A2: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000A5: 81 C1 84 01 00 00 add ecx,184h 000000AB: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142345: 000000B0: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000B3: 81 C1 98 01 00 00 add ecx,198h 000000B9: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142346: 000000BE: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000C1: 81 C1 AC 01 00 00 add ecx,1ACh 000000C7: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142347: 000000CC: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000CF: 81 C1 C0 01 00 00 add ecx,1C0h 000000D5: E9 00 00 00 00 jmp ??1CStringArray@@UAE@XZ$L142348: 000000DA: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000DD: 81 C1 D8 01 00 00 add ecx,1D8h 000000E3: E9 00 00 00 00 jmp ??1CString@@QAE@XZ$L142349: 000000E8: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000EB: 81 C1 DC 01 00 00 add ecx,1DCh 000000F1: E9 00 00 00 00 jmp ??1CString@@QAE@XZ$L142350: 000000F6: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000000F9: 81 C1 F8 01 00 00 add ecx,1F8h 000000FF: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142351: 00000104: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000107: 81 C1 0C 02 00 00 add ecx,20Ch 0000010D: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142352: 00000112: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000115: 81 C1 20 02 00 00 add ecx,220h 0000011B: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142353: 00000120: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000123: 81 C1 38 02 00 00 add ecx,238h 00000129: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ$L142354: 0000012E: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000131: 81 C1 4C 02 00 00 add ecx,24Ch 00000137: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ$L142355: 0000013C: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000013F: 81 C1 60 02 00 00 add ecx,260h 00000145: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ$L142356: 0000014A: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000014D: 81 C1 74 02 00 00 add ecx,274h 00000153: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ$L142357: 00000158: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 0000015B: 81 C1 9C 02 00 00 add ecx,29Ch 00000161: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ$L142358: 00000166: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000169: 81 C1 B0 02 00 00 add ecx,2B0h 0000016F: E9 00 00 00 00 jmp ??1CMIDI@@UAE@XZ$L142359: 00000174: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000177: 81 C1 60 03 00 00 add ecx,360h 0000017D: E9 00 00 00 00 jmp ??1CEWorkSpace@@UAE@XZ$L142360: 00000182: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000185: 81 C1 7C 03 00 00 add ecx,37Ch 0000018B: E9 00 00 00 00 jmp ??1CDllFunc@@UAE@XZ$L142361: 00000190: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 00000193: 81 C1 90 03 00 00 add ecx,390h 00000199: E9 00 00 00 00 jmp ??1CDllFunc@@UAE@XZ$L142362: 0000019E: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000001A1: 81 C1 A0 03 00 00 add ecx,3A0h 000001A7: E9 00 00 00 00 jmp ??1CPing@@UAE@XZ$L142363: 000001AC: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000001AF: 81 C1 B0 03 00 00 add ecx,3B0h 000001B5: E9 00 00 00 00 jmp ??1CPtrArray@@UAE@XZ$L142364: 000001BA: 8B 4D F0 mov ecx,dword ptr [ebp-10h] 000001BD: 81 C1 C4 03 00 00 add ecx,3C4h 000001C3: E9 00 00 00 00 jmp ??1CDllFunc@@UAE@XZ$L142476: 000001C8: B8 00 00 00 00 mov eax,offset $T142475 000001CD: E9 00 00 00 00 jmp ___CxxFrameHandler 代码为什么实现不了 窗口化?求指点,显示我的画图区,但同时点击桌面上的其他图标时,没反应,只能alt+tab退出才行 文件操作的困惑 PreTranslateMessage捕获组合键不能得问题 关于调用卡巴等杀毒软件 请问如何获得应用程序的内存状态? 一个读内存的问题 各位大侠:能否在主窗体显示出来之前就退出程序啊? 谁有DES加密的C++的源代码?一定要C++的哦!先谢了! VC++ V.S VC++.NET ++++数据源的注册问题+++++ 一个socket文件传输的问题 网络通信中,如何 实时 确定 网络通讯 情况
0000019A: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ
0000019F: 8D 8E 60 02 00 00 lea ecx,[esi+260h]
000001A5: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ
000001AA: 8D 8E 74 02 00 00 lea ecx,[esi+274h]
000001B0: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ
000001B5: 8D 8E 9C 02 00 00 lea ecx,[esi+29Ch]
000001BB: E8 00 00 00 00 call ??0CFreqMem@@QAE@XZ
000001C0: 8D 8E B0 02 00 00 lea ecx,[esi+2B0h]
000001C6: C6 44 24 18 19 mov byte ptr [esp+18h],19h
000001CB: E8 00 00 00 00 call ??0CMIDI@@QAE@XZ
000001D0: 8D 8E 60 03 00 00 lea ecx,[esi+360h]
000001D6: C6 44 24 18 1A mov byte ptr [esp+18h],1Ah
000001DB: E8 00 00 00 00 call ??0CEWorkSpace@@QAE@XZ
000001E0: BB 00 00 00 00 mov ebx,offset ??_7CDllFunc@@6B@
000001E5: 89 BE 80 03 00 00 mov dword ptr [esi+380h],edi
000001EB: 89 9E 7C 03 00 00 mov dword ptr [esi+37Ch],ebx
000001F1: 89 BE 84 03 00 00 mov dword ptr [esi+384h],edi
000001F7: 89 BE 88 03 00 00 mov dword ptr [esi+388h],edi
000001FD: 89 9E 90 03 00 00 mov dword ptr [esi+390h],ebx
00000203: 89 BE 94 03 00 00 mov dword ptr [esi+394h],edi
00000209: 89 BE 98 03 00 00 mov dword ptr [esi+398h],edi
0000020F: 89 BE 9C 03 00 00 mov dword ptr [esi+39Ch],edi
00000215: 8D 8E A0 03 00 00 lea ecx,[esi+3A0h]
0000021B: C6 44 24 18 1D mov byte ptr [esp+18h],1Dh
00000220: E8 00 00 00 00 call ??0CPing@@QAE@XZ
00000225: 8D 8E B0 03 00 00 lea ecx,[esi+3B0h]
0000022B: C6 44 24 18 1E mov byte ptr [esp+18h],1Eh
00000230: E8 00 00 00 00 call ??0CPtrArray@@QAE@XZ
00000235: 89 9E C4 03 00 00 mov dword ptr [esi+3C4h],ebx
0000023B: 89 BE C8 03 00 00 mov dword ptr [esi+3C8h],edi
00000241: 89 BE CC 03 00 00 mov dword ptr [esi+3CCh],edi
00000247: 89 BE D0 03 00 00 mov dword ptr [esi+3D0h],edi
0000024D: 8D 9E D4 03 00 00 lea ebx,[esi+3D4h]
00000253: C6 44 24 18 20 mov byte ptr [esp+18h],20h
00000258: 8B CB mov ecx,ebx
0000025A: E8 00 00 00 00 call ??0CWnd@@QAE@XZ
0000025F: C7 03 00 00 00 00 mov dword ptr [ebx],offset ??_7CSysHideWnd@@6B@
00000265: C7 06 00 00 00 00 mov dword ptr [esi],offset ??_7CKrnlApp@@6B@
0000026B: 89 B6 08 01 00 00 mov dword ptr [esi+108h],esi
00000271: 89 BE 24 04 00 00 mov dword ptr [esi+424h],edi
00000277: 89 BE 20 04 00 00 mov dword ptr [esi+420h],edi
0000027D: 89 BE E0 01 00 00 mov dword ptr [esi+1E0h],edi
00000283: 89 BE E4 01 00 00 mov dword ptr [esi+1E4h],edi
00000289: 89 BE EC 01 00 00 mov dword ptr [esi+1ECh],edi
0000028F: 89 BE E8 01 00 00 mov dword ptr [esi+1E8h],edi
00000295: 89 BE F4 01 00 00 mov dword ptr [esi+1F4h],edi
0000029B: 89 BE F0 01 00 00 mov dword ptr [esi+1F0h],edi
000002A1: 89 BE 8C 02 00 00 mov dword ptr [esi+28Ch],edi
000002A7: 68 00 00 00 00 push offset ?gcs@@3U_RTL_CRITICAL_SECTION@@A
000002AC: 89 BE 88 02 00 00 mov dword ptr [esi+288h],edi
000002B2: 89 BE 90 02 00 00 mov dword ptr [esi+290h],edi
000002B8: 89 BE 98 02 00 00 mov dword ptr [esi+298h],edi
000002BE: 89 BE 94 02 00 00 mov dword ptr [esi+294h],edi
000002C4: 89 BE 8C 03 00 00 mov dword ptr [esi+38Ch],edi
000002CA: 89 BE AC 03 00 00 mov dword ptr [esi+3ACh],edi
000002D0: 89 BE 10 04 00 00 mov dword ptr [esi+410h],edi
000002D6: 89 BE 14 04 00 00 mov dword ptr [esi+414h],edi
000002DC: 89 BE 18 04 00 00 mov dword ptr [esi+418h],edi
000002E2: 89 BE 1C 04 00 00 mov dword ptr [esi+41Ch],edi
000002E8: 89 BE C4 00 00 00 mov dword ptr [esi+0C4h],edi
000002EE: 89 BE C8 00 00 00 mov dword ptr [esi+0C8h],edi
000002F4: 89 BE CC 00 00 00 mov dword ptr [esi+0CCh],edi
000002FA: 89 BE 34 02 00 00 mov dword ptr [esi+234h],edi
00000300: 89 BE 28 04 00 00 mov dword ptr [esi+428h],edi
00000306: 89 BE D4 01 00 00 mov dword ptr [esi+1D4h],edi
0000030C: FF 15 00 00 00 00 call dword ptr [__imp__InitializeCriticalSection@4]
00000312: 8B 4C 24 10 mov ecx,dword ptr [esp+10h]
00000316: 8B C6 mov eax,esi
00000318: 5F pop edi
00000319: 5E pop esi
0000031A: 5B pop ebx
0000031B: 64 89 0D 00 00 00 mov dword ptr fs:[__except_list],ecx
00
00000322: 83 C4 10 add esp,10h
00000325: C3 ret
00000326: 90 nop
00000327: 90 nop
00000328: 90 nop
00000329: 90 nop
0000032A: 90 nop
0000032B: 90 nop
0000032C: 90 nop
0000032D: 90 nop
0000032E: 90 nop
0000032F: 90 nop
00000000: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000003: E9 00 00 00 00 jmp ??1CWinApp@@UAE@XZ
$L142333:
00000008: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000000B: 81 C1 D0 00 00 00 add ecx,0D0h
00000011: E9 00 00 00 00 jmp ??1CString@@QAE@XZ
$L142334:
00000016: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000019: 81 C1 D4 00 00 00 add ecx,0D4h
0000001F: E9 00 00 00 00 jmp ??1CString@@QAE@XZ
$L142335:
00000024: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000027: 81 C1 D8 00 00 00 add ecx,0D8h
0000002D: E9 00 00 00 00 jmp ??1CString@@QAE@XZ
$L142336:
00000032: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000035: 81 C1 DC 00 00 00 add ecx,0DCh
0000003B: E9 00 00 00 00 jmp ??1CStringArray@@UAE@XZ
$L142337:
00000040: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000043: 81 C1 F0 00 00 00 add ecx,0F0h
00000049: E9 00 00 00 00 jmp ??1CStringArray@@UAE@XZ
$L142338:
0000004E: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000051: 81 C1 04 01 00 00 add ecx,104h
00000057: E9 00 00 00 00 jmp ??1CWinIDManger@@UAE@XZ
$L142339:
0000005C: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000005F: 81 C1 20 01 00 00 add ecx,120h
00000065: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142340:
0000006A: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000006D: 81 C1 34 01 00 00 add ecx,134h
00000073: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142341:
00000078: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000007B: 81 C1 48 01 00 00 add ecx,148h
00000081: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142342:
00000086: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000089: 81 C1 5C 01 00 00 add ecx,15Ch
0000008F: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142343:
00000094: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000097: 81 C1 70 01 00 00 add ecx,170h
0000009D: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142344:
000000A2: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000A5: 81 C1 84 01 00 00 add ecx,184h
000000AB: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142345:
000000B0: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000B3: 81 C1 98 01 00 00 add ecx,198h
000000B9: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142346:
000000BE: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000C1: 81 C1 AC 01 00 00 add ecx,1ACh
000000C7: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142347:
000000CC: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000CF: 81 C1 C0 01 00 00 add ecx,1C0h
000000D5: E9 00 00 00 00 jmp ??1CStringArray@@UAE@XZ
$L142348:
000000DA: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000DD: 81 C1 D8 01 00 00 add ecx,1D8h
000000E3: E9 00 00 00 00 jmp ??1CString@@QAE@XZ
$L142349:
000000E8: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000EB: 81 C1 DC 01 00 00 add ecx,1DCh
000000F1: E9 00 00 00 00 jmp ??1CString@@QAE@XZ
$L142350:
000000F6: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000000F9: 81 C1 F8 01 00 00 add ecx,1F8h
000000FF: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142351:
00000104: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000107: 81 C1 0C 02 00 00 add ecx,20Ch
0000010D: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142352:
00000112: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000115: 81 C1 20 02 00 00 add ecx,220h
0000011B: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142353:
00000120: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000123: 81 C1 38 02 00 00 add ecx,238h
00000129: E9 00 00 00 00 jmp ??1CMyDWordArray@@UAE@XZ
$L142354:
0000012E: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000131: 81 C1 4C 02 00 00 add ecx,24Ch
00000137: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ
$L142355:
0000013C: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000013F: 81 C1 60 02 00 00 add ecx,260h
00000145: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ
$L142356:
0000014A: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000014D: 81 C1 74 02 00 00 add ecx,274h
00000153: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ
$L142357:
00000158: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
0000015B: 81 C1 9C 02 00 00 add ecx,29Ch
00000161: E9 00 00 00 00 jmp ??1CFreqMem@@UAE@XZ
$L142358:
00000166: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000169: 81 C1 B0 02 00 00 add ecx,2B0h
0000016F: E9 00 00 00 00 jmp ??1CMIDI@@UAE@XZ
$L142359:
00000174: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000177: 81 C1 60 03 00 00 add ecx,360h
0000017D: E9 00 00 00 00 jmp ??1CEWorkSpace@@UAE@XZ
$L142360:
00000182: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000185: 81 C1 7C 03 00 00 add ecx,37Ch
0000018B: E9 00 00 00 00 jmp ??1CDllFunc@@UAE@XZ
$L142361:
00000190: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
00000193: 81 C1 90 03 00 00 add ecx,390h
00000199: E9 00 00 00 00 jmp ??1CDllFunc@@UAE@XZ
$L142362:
0000019E: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000001A1: 81 C1 A0 03 00 00 add ecx,3A0h
000001A7: E9 00 00 00 00 jmp ??1CPing@@UAE@XZ
$L142363:
000001AC: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000001AF: 81 C1 B0 03 00 00 add ecx,3B0h
000001B5: E9 00 00 00 00 jmp ??1CPtrArray@@UAE@XZ
$L142364:
000001BA: 8B 4D F0 mov ecx,dword ptr [ebp-10h]
000001BD: 81 C1 C4 03 00 00 add ecx,3C4h
000001C3: E9 00 00 00 00 jmp ??1CDllFunc@@UAE@XZ
$L142476:
000001C8: B8 00 00 00 00 mov eax,offset $T142475
000001CD: E9 00 00 00 00 jmp ___CxxFrameHandler