Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /*
- Code: by Dark
- */
- .text:004DAB10
- .text:004DAB10 ; ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦ S U B R O U T I N E ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
- .text:004DAB10
- .text:004DAB10
- .text:004DAB10 sub_4DAB10 proc near ; CODE XREF: sub_4CC340+6C4p
- .text:004DAB10
- .text:004DAB10 var_10 = dword ptr -10h
- .text:004DAB10 var_C = dword ptr -0Ch
- .text:004DAB10 var_8 = dword ptr -8
- .text:004DAB10 var_4 = dword ptr -4
- .text:004DAB10
- .text:004DAB10 sub esp, 10h
- .text:004DAB13 push esi
- .text:004DAB14 mov esi, eax
- .text:004DAB16 mov eax, [edi+3360h]
- .text:004DAB1C test eax, eax
- .text:004DAB1E jnz short loc_4DAB33
- .text:004DAB20 push 5000h
- .text:004DAB25 call j_??2@YAPAXI@Z ; operator new(uint)
- .text:004DAB2A add esp, 4
- .text:004DAB2D mov [edi+3360h], eax
- .text:004DAB33
- .text:004DAB33 loc_4DAB33: ; CODE XREF: sub_4DAB10+Ej
- .text:004DAB33 lea eax, [esp+14h+var_8]
- .text:004DAB37 push eax
- .text:004DAB38 lea ecx, [esp+18h+var_C]
- .text:004DAB3C push ecx
- .text:004DAB3D lea edx, [esp+1Ch+var_10]
- .text:004DAB41 push edx
- .text:004DAB42 mov ecx, esi
- .text:004DAB44 call sub_63D600
- .text:004DAB49 mov ecx, eax
- .text:004DAB4B call sub_63D600
- .text:004DAB50 mov ecx, eax
- .text:004DAB52 call sub_63D600
- .text:004DAB57 movzx ecx, word ptr [esp+14h+var_10]
- .text:004DAB5C mov eax, [esp+14h+var_8]
- .text:004DAB60 imul ecx, 0FB0h
- .text:004DAB66 mov edx, [edi+3360h]
- .text:004DAB6C push eax
- .text:004DAB6D lea eax, [ecx+edx-0FB0h]
- .text:004DAB74 push eax
- .text:004DAB75 mov ecx, esi
- .text:004DAB77 call sub_63D480
- .text:004DAB7C mov ax, word ptr [esp+14h+var_C]
- .text:004DAB81 cmp word ptr [esp+14h+var_10], ax
- .text:004DAB86 jnz loc_4DAC2F
- .text:004DAB8C cmp dword_70BA68, 10h
- .text:004DAB93 push ebx ; char
- .text:004DAB94 mov ebx, dword_70BA54
- .text:004DAB9A mov [esp+18h+var_4], 17E9C541h
- .text:004DABA2 jnb short loc_4DABA9
- .text:004DABA4 mov ebx, offset dword_70BA54
- .text:004DABA9
- .text:004DABA9 loc_4DABA9: ; CODE XREF: sub_4DAB10+92j
- .text:004DABA9 movzx edx, word ptr [esp+18h+var_8]
- .text:004DABAE movzx ecx, ax
- .text:004DABB1 imul ecx, 0FB0h
- .text:004DABB7 push offset aCallApr_init ; "Call APR_Init"
- .text:004DABBC lea esi, [ecx+edx-0FB0h]
- .text:004DABC3 call sub_63BC50
- .text:004DABC8 mov eax, [edi+3360h]
- .text:004DABCE push esi
- .text:004DABCF push eax
- .text:004DABD0 lea ecx, [esp+24h+var_4]
- .text:004DABD4 push ecx
- .text:004DABD5 push ebx
- .text:004DABD6 call sub_695CBC
- .text:004DABDB mov esi, eax
- .text:004DABDD push esi ; char
- .text:004DABDE push offset aReturnDFromApr ; "return %d from APR_Init"
- .text:004DABE3 call sub_63BC50
- .text:004DABE8 add esp, 1Ch
- .text:004DABEB test esi, esi
- .text:004DABED pop ebx
- .text:004DABEE jz short loc_4DAC16
- .text:004DABF0 push esi ; char
- .text:004DABF1 push offset aErrorFailToIni ; "error: fail to initialize crypt module,"...
- .text:004DABF6 call sub_63BC50
- .text:004DABFB mov edx, hWnd
- .text:004DAC01 add esp, 8
- .text:004DAC04 push 0 ; lParam
- .text:004DAC06 push 0 ; wParam
- .text:004DAC08 push 10h ; Msg
- .text:004DAC0A push edx ; hWnd
- .text:004DAC0B call ds:PostMessageA
- .text:004DAC11 pop esi
- .text:004DAC12 add esp, 10h
- .text:004DAC15 retn
- .text:004DAC16 ; -----------------------------------------------------
Add Comment
Please, Sign In to add comment