Reverse Engineering challenge #69.

Tags: X86 L1 ASM WINDOWS .

Using the MSDN documentation, find out which flags were used in the MessageBox() win32 function call.

Optimizing MSVC 2010


_main	PROC
	push	278595		; 00044043H
	push	OFFSET $SG79792 ; 'caption'
	push	OFFSET $SG79793 ; 'hello, world!'
	push	0
	call	DWORD PTR __imp__MessageBoxA@16
	xor	eax, eax
	ret	0
_main	ENDP

More challenges: challenges.re; about solutions: challenges.re/#Solutions.