Reputation: 1
I am currently reversing an executable that imports some functions from msvcp60.dll. When I open the executable in IDA Pro, the function names are very long, and it doesn't give any hint about what are they doing. Reversing all of these functions would be a waste of time right now.
So is there any way to get a meaningful names of these functions or at least interpret the listing showed in IDA? Here is an example of a function (the call in address 0040377C of the code):
.TEXT:00403767 loc_403767: ; CODE XREF: sub_402E1B+939j
.TEXT:00403767 mov eax, ds:dword_B59B44
.TEXT:0040376C push esi
.TEXT:0040376D imul eax, 4Fh
.TEXT:00403770 add eax, ds:dword_B52D34
.TEXT:00403776 shl eax, 4
.TEXT:00403779 add eax, ebx
.TEXT:0040377B push eax
.TEXT:0040377C call ds:??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z ; std::operator!=<char,std::char_traits<char>,std::allocator<char>>(std::basic_string<char,std::char_traits<char>,std::allocator<char>> const &,char const *)
.TEXT:00403782 pop ecx
.TEXT:00403783 test al, al
Upvotes: 0
Views: 809
Reputation: 3190
You are seeing a mangled name. Look closely you can see
std::operator!=(stuff)std::basic_string
It looks like it is calling the != operator on a string.
Upvotes: 2