Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- .text:008E4C60 processevent proc near ; CODE XREF: sub_8E3E70+A40p
- .text:008E4C60
- .text:008E4C60 var_80 = byte ptr -80h
- .text:008E4C60 var_78 = dword ptr -78h
- .text:008E4C60 var_74 = dword ptr -74h
- .text:008E4C60 var_70 = dword ptr -70h
- .text:008E4C60 var_6C = dword ptr -6Ch
- .text:008E4C60 var_68 = dword ptr -68h
- .text:008E4C60 var_64 = dword ptr -64h
- .text:008E4C60 var_60 = dword ptr -60h
- .text:008E4C60 var_5C = dword ptr -5Ch
- .text:008E4C60 var_58 = dword ptr -58h
- .text:008E4C60 var_54 = dword ptr -54h
- .text:008E4C60 var_50 = dword ptr -50h
- .text:008E4C60 var_4C = dword ptr -4Ch
- .text:008E4C60 var_48 = dword ptr -48h
- .text:008E4C60 var_44 = dword ptr -44h
- .text:008E4C60 Src = dword ptr -40h
- .text:008E4C60 var_3C = dword ptr -3Ch
- .text:008E4C60 var_38 = dword ptr -38h
- .text:008E4C60 var_24 = dword ptr -24h
- .text:008E4C60 var_20 = dword ptr -20h
- .text:008E4C60 var_1C = dword ptr -1Ch
- .text:008E4C60 var_18 = dword ptr -18h
- .text:008E4C60 var_14 = dword ptr -14h
- .text:008E4C60 var_10 = dword ptr -10h
- .text:008E4C60 var_C = dword ptr -0Ch
- .text:008E4C60 var_4 = dword ptr -4
- .text:008E4C60
- .text:008E4C60 push ebp
- .text:008E4C61 mov ebp, esp
- .text:008E4C63 push 0FFFFFFFFh
- .text:008E4C65 push offset sub_19051AE
- .text:008E4C6A mov eax, large fs:0
- .text:008E4C70 push eax
- .text:008E4C71 sub esp, 7Ch
- .text:008E4C74 mov eax, ___security_cookie
- .text:008E4C79 xor eax, ebp
- .text:008E4C7B mov [ebp+var_10], eax
- .text:008E4C7E push ebx
- .text:008E4C7F push esi
- .text:008E4C80 push edi
- .text:008E4C81 push eax
- .text:008E4C82 lea eax, [ebp+var_C]
- .text:008E4C85 mov large fs:0, eax
- .text:008E4C8B mov ebx, ecx
- .text:008E4C8D mov [ebp+var_58], ebx
- .text:008E4C90 mov [ebp+Src], 0
- .text:008E4C97 mov [ebp+var_3C], 0
- .text:008E4C9E mov [ebp+var_38], 0
- .text:008E4CA5 mov [ebp+var_24], 0
- .text:008E4CAC mov [ebp+var_1C], 0
- .text:008E4CB3 mov [ebp+var_20], 0
- .text:008E4CBA mov [ebp+var_18], 0
- .text:008E4CC1 mov [ebp+var_14], 0
- .text:008E4CC8 mov eax, [ebx+4]
- .text:008E4CCB lea ecx, [ebp+Src]
- .text:008E4CCE sub eax, [ebx+2Ch]
- .text:008E4CD1 push eax
- .text:008E4CD2 mov [ebp+var_4], 2
- .text:008E4CD9 call sub_9EAF50
- .text:008E4CDE push 0
- .text:008E4CE0 lea eax, [ebx+0Ch]
- .text:008E4CE3 mov [ebp+var_74], ebx
- .text:008E4CE6 push eax
- .text:008E4CE7 lea ecx, [ebp+var_70]
- .text:008E4CEA call sub_8D1E40
- .text:008E4CEF mov eax, [ebp+var_68]
- .text:008E4CF2 mov edi, [ebp+var_60]
- .text:008E4CF5 cmp edi, [eax+14h]
- .text:008E4CF8 jge loc_8E4E4D
- .text:008E4CFE mov eax, [ebp+var_64]
- .text:008E4D01 mov ebx, [ebp+var_5C]
- .text:008E4D04 mov esi, [ebp+var_70]
- .text:008E4D07 mov [ebp+var_44], eax
- .text:008E4D0A mov eax, [ebp+var_6C]
- .text:008E4D0D mov [ebp+var_54], 0
- .text:008E4D14 mov [ebp+var_4C], eax
- .text:008E4D17
- .text:008E4D17 loc_8E4D17: ; CODE XREF: processevent+1E4j
- .text:008E4D17 lea eax, [ebp+var_80]
- .text:008E4D1A push eax
- .text:008E4D1B lea ecx, [ebp+Src]
- .text:008E4D1E call sub_1314D40
- .text:008E4D23 mov edx, [eax+4]
- .text:008E4D26 mov [ebp+var_48], edx
- .text:008E4D29 test edx, edx
- .text:008E4D2B jz loc_8E4DB2
- .text:008E4D31 mov eax, [ebp+var_74]
- .text:008E4D34 mov ecx, [eax]
- .text:008E4D36 lea eax, ds:0[edi*8]
- .text:008E4D3D sub eax, edi
- .text:008E4D3F lea edi, [edx+8]
- .text:008E4D42 mov [ebp+var_78], edi
- .text:008E4D45 lea ecx, [ecx+eax*4]
- .text:008E4D48 mov eax, [ecx]
- .text:008E4D4A mov [edx], eax
- .text:008E4D4C mov eax, [ecx+4]
- .text:008E4D4F mov [edx+4], eax
- .text:008E4D52 mov eax, [ecx+0Ch]
- .text:008E4D55 mov [ebp+var_50], ecx
- .text:008E4D58 mov dword ptr [edi], 0
- .text:008E4D5E mov [edi+4], eax
- .text:008E4D61 mov [edi+8], eax
- .text:008E4D64 mov edx, [edi]
- .text:008E4D66 mov byte ptr [ebp+var_4], 3
- .text:008E4D6A test edx, edx
- .text:008E4D6C jnz short loc_8E4D72
- .text:008E4D6E test eax, eax
- .text:008E4D70 jz short loc_8E4D85
- .text:008E4D72
- .text:008E4D72 loc_8E4D72: ; CODE XREF: processevent+10Cj
- .text:008E4D72 push 8
- .text:008E4D74 add eax, eax
- .text:008E4D76 push eax
- .text:008E4D77 push edx
- .text:008E4D78 call sub_9160F0
- .text:008E4D7D mov ecx, [ebp+var_50]
- .text:008E4D80 add esp, 0Ch
- .text:008E4D83 mov [edi], eax
- .text:008E4D85
- .text:008E4D85 loc_8E4D85: ; CODE XREF: processevent+110j
- .text:008E4D85 mov eax, [edi+4]
- .text:008E4D88 mov byte ptr [ebp+var_4], 2
- .text:008E4D8C test eax, eax
- .text:008E4D8E jz short loc_8E4DA0
- .text:008E4D90 add eax, eax
- .text:008E4D92 push eax ; Size
- .text:008E4D93 push dword ptr [ecx+8] ; Src
- .text:008E4D96 push dword ptr [edi] ; Dst
- .text:008E4D98 call memcpy
- .text:008E4D9D add esp, 0Ch
- .text:008E4DA0
- .text:008E4DA0 loc_8E4DA0: ; CODE XREF: processevent+12Ej
- .text:008E4DA0 mov edx, [ebp+var_50]
- .text:008E4DA3 mov ecx, [ebp+var_48]
- .text:008E4DA6 mov eax, [edx+14h]
- .text:008E4DA9 mov [ecx+14h], eax
- .text:008E4DAC mov eax, [edx+18h]
- .text:008E4DAF mov [ecx+18h], eax
- .text:008E4DB2
- .text:008E4DB2 loc_8E4DB2: ; CODE XREF: processevent+CBj
- .text:008E4DB2 mov edx, [ebp+var_68]
- .text:008E4DB5 mov eax, [ebp+var_4C]
- .text:008E4DB8 mov edi, [ebp+var_44]
- .text:008E4DBB not eax
- .text:008E4DBD and edi, eax
- .text:008E4DBF xor eax, eax
- .text:008E4DC1 mov ecx, [edx+10h]
- .text:008E4DC4 test ecx, ecx
- .text:008E4DC6 mov [ebp+var_44], edi
- .text:008E4DC9 setz al
- .text:008E4DCC neg eax
- .text:008E4DCE and edx, eax
- .text:008E4DD0 lea eax, [ebp+var_54]
- .text:008E4DD3 or edx, ecx
- .text:008E4DD5 mov ecx, 0
- .text:008E4DDA setz cl
- .text:008E4DDD neg ecx
- .text:008E4DDF and ecx, eax
- .text:008E4DE1 or ecx, edx
- .text:008E4DE3 mov eax, [ecx+esi*4]
- .text:008E4DE6 and eax, edi
- .text:008E4DE8 jnz short loc_8E4E16
- .text:008E4DEA mov eax, [ebp+var_68]
- .text:008E4DED mov edi, [eax+14h]
- .text:008E4DF0 lea eax, [edi-1]
- .text:008E4DF3 cdq
- .text:008E4DF4 and edx, 1Fh
- .text:008E4DF7 add edx, eax
- .text:008E4DF9 sar edx, 5
- .text:008E4DFC lea esp, [esp+0]
- .text:008E4E00
- .text:008E4E00 loc_8E4E00: ; CODE XREF: processevent+1B4j
- .text:008E4E00 inc esi
- .text:008E4E01 add ebx, 20h
- .text:008E4E04 cmp esi, edx
- .text:008E4E06 jg short loc_8E4E3E
- .text:008E4E08 mov eax, [ecx+esi*4]
- .text:008E4E0B mov [ebp+var_44], 0FFFFFFFFh
- .text:008E4E12 test eax, eax
- .text:008E4E14 jz short loc_8E4E00
- .text:008E4E16
- .text:008E4E16 loc_8E4E16: ; CODE XREF: processevent+188j
- .text:008E4E16 lea ecx, [eax-1]
- .text:008E4E19 and ecx, eax
- .text:008E4E1B xor ecx, eax
- .text:008E4E1D mov [ebp+var_4C], ecx
- .text:008E4E20 jnz short loc_8E4E29
- .text:008E4E22 mov eax, 20h
- .text:008E4E27 jmp short loc_8E4E37
- .text:008E4E29 ; ---------------------------------------------------------------------------
- .text:008E4E29
- .text:008E4E29 loc_8E4E29: ; CODE XREF: processevent+1C0j
- .text:008E4E29 bsr eax, ecx
- .text:008E4E2C mov [ebp+var_48], eax
- .text:008E4E2F mov eax, 1Fh
- .text:008E4E34 sub eax, [ebp+var_48]
- .text:008E4E37
- .text:008E4E37 loc_8E4E37: ; CODE XREF: processevent+1C7j
- .text:008E4E37 mov edi, ebx
- .text:008E4E39 sub edi, eax
- .text:008E4E3B add edi, 1Fh
- .text:008E4E3E
- .text:008E4E3E loc_8E4E3E: ; CODE XREF: processevent+1A6j
- .text:008E4E3E mov eax, [ebp+var_68]
- .text:008E4E41 cmp edi, [eax+14h]
- .text:008E4E44 jl loc_8E4D17
- .text:008E4E4A mov ebx, [ebp+var_58]
- .text:008E4E4D
- .text:008E4E4D loc_8E4E4D: ; CODE XREF: processevent+98j
- .text:008E4E4D mov eax, 30h
- .text:008E4E52 call sub_1900220
- .text:008E4E57 mov esi, esp
- .text:008E4E59 push 30h ; Size
- .text:008E4E5B push ebx ; Src
- .text:008E4E5C push esi ; Dst
- .text:008E4E5D call memcpy
- .text:008E4E62 push 30h ; Size
- .text:008E4E64 lea eax, [ebp+Src]
- .text:008E4E67 push eax ; Src
- .text:008E4E68 push ebx ; Dst
- .text:008E4E69 call memcpy
- .text:008E4E6E push 30h ; Size
- .text:008E4E70 lea eax, [ebp+Src]
- .text:008E4E73 push esi ; Src
- .text:008E4E74 push eax ; Dst
- .text:008E4E75 call memcpy
- .text:008E4E7A add esp, 24h
- .text:008E4E7D push 0
- .text:008E4E7F lea ecx, [ebp+Src]
- .text:008E4E82 mov [ebp+var_4], 5
- .text:008E4E89 call sub_9EAF50
- .text:008E4E8E mov eax, [ebp+var_24]
- .text:008E4E91 mov byte ptr [ebp+var_4], 4
- .text:008E4E95 test eax, eax
- .text:008E4E97 jz short loc_8E4EA9
- .text:008E4E99 push eax
- .text:008E4E9A call sub_915C70
- .text:008E4E9F add esp, 4
- .text:008E4EA2 mov [ebp+var_24], 0
- .text:008E4EA9
- .text:008E4EA9 loc_8E4EA9: ; CODE XREF: processevent+237j
- .text:008E4EA9 mov eax, [ebp+Src]
- .text:008E4EAC mov [ebp+var_38], 0
- .text:008E4EB3 mov [ebp+var_3C], 0
- .text:008E4EBA mov [ebp+var_4], 0FFFFFFFFh
- .text:008E4EC1 test eax, eax
- .text:008E4EC3 jz short loc_8E4ECE
- .text:008E4EC5 push eax
- .text:008E4EC6 call sub_915C70
- .text:008E4ECB add esp, 4
- .text:008E4ECE
- .text:008E4ECE loc_8E4ECE: ; CODE XREF: processevent+263j
- .text:008E4ECE lea esp, [ebp-98h]
- .text:008E4ED4 mov ecx, [ebp+var_C]
- .text:008E4ED7 mov large fs:0, ecx
- .text:008E4EDE pop ecx
- .text:008E4EDF pop edi
- .text:008E4EE0 pop esi
- .text:008E4EE1 pop ebx
- .text:008E4EE2 mov ecx, [ebp+var_10]
- .text:008E4EE5 xor ecx, ebp
- .text:008E4EE7 call sub_1900196
- .text:008E4EEC mov esp, ebp
- .text:008E4EEE pop ebp
- .text:008E4EEF retn
- .text:008E4EEF processevent endp
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement