libmwemu 0.24.5

x86 32/64bits and system internals emulator, for securely emulating malware and other stuff.
Documentation
use crate::windows::constants;
use crate::emu;

pub fn BasepQueryAppCompat(emu: &mut emu::Emu) {
    let _a1 = emu
        .maps
        .read_dword(emu.regs().get_esp())
        .expect("cannot read the api parameter");
    let _a2 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 4)
        .expect("cannot read the api parameter");
    let _a3 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 8)
        .expect("cannot read the api parameter");
    let _a4 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 12)
        .expect("cannot read the api parameter");
    let _a5 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 16)
        .expect("cannot read the api parameter");
    let _a6 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 20)
        .expect("cannot read the api parameter");
    let _a7 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 24)
        .expect("cannot read the api parameter");
    let _a8 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 28)
        .expect("cannot read the api parameter");
    let _a9 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 32)
        .expect("cannot read the api parameter");
    let _a10 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 36)
        .expect("cannot read the api parameter");
    let _a11 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 40)
        .expect("cannot read the api parameter");
    let _a12 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 44)
        .expect("cannot read the api parameter");
    let _a13 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 48)
        .expect("cannot read the api parameter");
    let _a14 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 52)
        .expect("cannot read the api parameter");
    let _a15 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 56)
        .expect("cannot read the api parameter");
    let _a16 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 60)
        .expect("cannot read the api parameter");
    let _a17 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 64)
        .expect("cannot read the api parameter");
    let _a18 = emu
        .maps
        .read_dword(emu.regs().get_esp() + 68)
        .expect("cannot read the api parameter");

    log_red!(emu, "kernel32!BasepQueryAppCompat");

    emu.regs_mut().rax = constants::ERROR_SUCCESS;

    for _ in 0..18 {
        emu.stack_pop32(false);
    }
}