想请问下大家OllyDBG里面的命令
eax是什么意思? edx.short,esp ptr请各位大侠帮帮忙
0056BFA9 83F8 0A cmp eax, 0A
0056BFAC . 0F8D 03010000 jge 0056C0B5
0056BFB2 . 8B5424 10 mov edx, dword ptr [esp+10]
0056BFB6 . 8B92 ACAF0000 mov edx, dword ptr [edx+AFAC]
0056BFBC . 3BD3 cmp edx, ebx
0056BFBE . 74 42 je short 0056C002
0056BFC0 . 8B86 ACAF0000 mov eax, dword ptr [esi+AFAC]
0056BFC6 . 3BC3 cmp eax, ebx
0056BFC8 . 75 09 jnz short 0056BFD3
0056BFCA . 83FA 01 cmp edx, 1
0056BFCD . 74 33 je short 0056C002
0056BFCF . 3BC3 cmp eax, ebx
0056BFD1 . 74 24 je short 0056BFF7
0056BFD3 > 3B4C24 14 cmp ecx, dword ptr [esp+14]
0056BFD7 8B4424 10 mov eax, dword ptr [esp+10]
0056BFDB 8D5424 2C lea edx, dword ptr [esp+2C]
0056BFDF 75 0B jnz short 0056BFEC
0056BFE1 8B0D A8266E00 mov ecx, dword ptr [6E26A8] ; CxPT.00604DF8
0056BFE7 . E9 D7000000 jmp 0056C0C3
0056BFEC > 8B0D AC266E00 mov ecx, dword ptr [6E26AC] ; CxPT.00604DCC
0056BFF2 . E9 CC000000 jmp 0056C0C3
0056BFF7 > 8B0D B0266E00 mov ecx, dword ptr [6E26B0] ; CxPT.00604DCC
0056BFFD . E9 B9000000 jmp 0056C0BB
0056C002 > 83BE ACAF0000>cmp dword ptr [esi+AFAC], 2
0056C009 . 75 68 jnz short 0056C073
0056C00B . 3BCB cmp ecx, ebx
0056C00D . 0F84 C1000000 je 0056C0D4
0056C013 . 8B4424 10 mov eax, dword ptr [esp+10]
0056C017 . 05 A4000000 add eax, 0A4
0056C01C . 50 push eax
0056C01D . 81C1 A4000000 add ecx, 0A4
0056C023 . 51 push ecx
0056C024 . 8B0D A0266E00 mov ecx, dword ptr [6E26A0] ; CxPT.00604E3C
0056C02A . 51 push ecx ; |Format => "Recommended leader %s to invite %s to the party "
0056C02B . 8D5424 38 lea edx, dword ptr [esp+38] ; |
0056C02F . 52 push edx ; |s
0056C030 . FF15 0CF35D00 call dword ptr [<&USER32.wsprintfA>] ; \wsprintfA
0056C036 . 8B4424 20 mov eax, dword ptr [esp+20]
0056C03A . 8B88 706C0000 mov ecx, dword ptr [eax+6C70]
0056C040 . 8B96 B0AF0000 mov edx, dword ptr [esi+AFB0]
0056C046 . 898C24 740200>mov dword ptr [esp+274], ecx
0056C04D . 8B8A FC6D0000 mov ecx, dword ptr [edx+6DFC]
0056C053 83C4 10 add esp, 10
0056C056 3BCB cmp ecx, ebx
0056C058 74 7A je short 0056C0D4
0056C05A . 8B8424 580200>mov eax, dword ptr [esp+258]
0056C061 . 6A 01 push 1
0056C063 . 50 push eax
0056C064 . 8D9424 600200>lea edx, dword ptr [esp+260]
0056C06B . 52 push edx
0056C06C . E8 7F4DEEFF call 00450DF0
0056C071 . EB 61 jmp short 0056C0D4
0056C073 > 8B4424 10 mov eax, dword ptr [esp+10]
0056C077 . 8B0D A4266E00 mov ecx, dword ptr [6E26A4] ; CxPT.00604E18
0056C07D . 05 A4000000 add eax, 0A4
0056C082 . 50 push eax
0056C083 . 51 push ecx ; |Format => "Sent party request to %s "
0056C084 . 8D5424 34 lea edx, dword ptr [esp+34] ; |
0056C088 . 52 push edx ; |s
0056C089 . FF15 0CF35D00 call dword ptr [<&USER32.wsprintfA>] ; \wsprintfA