Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- DWORD dwChatFunc = ((DWORD)GetModuleHandle("samp.dll") + 0x5F890);
- DWORD dwChatPtr = ((DWORD)GetModuleHandle("samp.dll") + 0x2071C0);
- CPU Disasm
- Address Hex dump Command Comments
- 03DEF890 55 PUSH EBP
- 03DEF891 8BEC MOV EBP,ESP
- 03DEF893 83E4 F8 AND ESP,FFFFFFF8
- 03DEF896 81EC 04020000 SUB ESP,204
- 03DEF89C 57 PUSH EDI
- 03DEF89D 33C0 XOR EAX,EAX
- 03DEF89F B9 80000000 MOV ECX,80
- 03DEF8A4 8D7C24 08 LEA EDI,[ESP+8]
- 03DEF8A8 F3:AB REP STOS DWORD PTR ES:[EDI]
- 03DEF8AA 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+0C]
- 03DEF8AD 8D45 10 LEA EAX,[EBP+10]
- 03DEF8B0 50 PUSH EAX
- 03DEF8B1 51 PUSH ECX
- 03DEF8B2 8D5424 10 LEA EDX,[ESP+10]
- 03DEF8B6 52 PUSH EDX
- 03DEF8B7 E8 A88D0400 CALL 03E38664
- 03DEF8BC 8A4C24 14 MOV CL,BYTE PTR SS:[ESP+14]
- 03DEF8C0 83C4 0C ADD ESP,0C
- 03DEF8C3 84C9 TEST CL,CL
- 03DEF8C5 8D4424 08 LEA EAX,[ESP+8]
- 03DEF8C9 74 1B JE SHORT 03DEF8E6
- 03DEF8CB EB 03 JMP SHORT 03DEF8D0
- 03DEF8CD 8D49 00 LEA ECX,[ECX]
- 03DEF8D0 8A08 MOV CL,BYTE PTR DS:[EAX]
- 03DEF8D2 84C9 TEST CL,CL
- 03DEF8D4 7E 08 JLE SHORT 03DEF8DE
- 03DEF8D6 80F9 20 CMP CL,20
- 03DEF8D9 7D 03 JGE SHORT 03DEF8DE
- 03DEF8DB C600 20 MOV BYTE PTR DS:[EAX],20
- 03DEF8DE 8A48 01 MOV CL,BYTE PTR DS:[EAX+1]
- 03DEF8E1 40 INC EAX
- 03DEF8E2 84C9 TEST CL,CL
- 03DEF8E4 ^ 75 EA JNE SHORT 03DEF8D0
- 03DEF8E6 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
- 03DEF8E9 8B41 08 MOV EAX,DWORD PTR DS:[ECX+8]
- 03DEF8EC 6A 00 PUSH 0
- 03DEF8EE 50 PUSH EAX
- 03DEF8EF 6A 00 PUSH 0
- 03DEF8F1 8D5424 14 LEA EDX,[ESP+14]
- 03DEF8F5 52 PUSH EDX
- 03DEF8F6 6A 0F PUSH 0F
- 03DEF8F8 E8 93FAFFFF CALL 03DEF390
- 03DEF8FD 5F POP EDI
- 03DEF8FE 8BE5 MOV ESP,EBP
- 03DEF900 5D POP EBP
- 03DEF901 C3 RETN
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement