Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 44ba46: cmp dword [eax], 0xc ; angel check, jump if pass
- 44ba49: jz 0x44ba68
- 44ba4b: inc ecx ; ecx = ecx + 1
- 44ba4c: add eax, 0x4 ; eax = eax + 4
- 44ba4f: cmp ecx, 0x7 ; if ecx < 7, then...
- 44ba52: jl 0x44ba46 ; check a diff stack for angels
- 44ba54: xor eax, eax ; eax = 0. none of them were angels. eax & ecx swap functionalities here
- 44ba56: mov ecx, edx ; ecx = 4-byte contents of 1884A0
- 44ba58: cmp dword [ecx], 0xd ; archangel check, jump if pass
- 44ba5b: jz 0x44ba68
- 44ba5d: inc eax ; eax = eax + 1
- 44ba5e: add ecx, 0x4 ; ecx = ecx + 4
- 44ba61: cmp eax, 0x7 ; if ecx < 7, then...
- 44ba64: jl 0x44ba58 ; check a diff stack for archangels
- 44ba66: jmp 0x44bad1 ; you have no angels or archangels in your team
- 44ba68: mov eax, 0xc ; set type as 0xC (angel)
- 44ba6d: xor ecx, ecx ; zero ecx
- 44ba6f: cmp dword [edx], 0xd ; secondary archangel check, jump if pass
- 44ba72: jz 0x44ba7f
- 44ba74: inc ecx ; ecx = ecx + 1
- 44ba75: add edx, 0x4 ; edx = edx + 4 (edx was contents of 1884A0)
- 44ba78: cmp ecx, 0x7 ; if ecx < 7, then...
- 44ba7b: jl 0x44ba6f ; check a diff stack for archangels
- 44ba7d: jmp 0x44ba84 ; we have angels but no archangels
- 44ba7f: mov eax, 0xd ; set type as 0xC (archangel)
- 44ba84: lea ecx, [eax*8+0x0] ; ecx = TYPE*8
- 44ba8b: sub ecx, eax ; ecx = ecx - TYPE (...so TYPE*7??)
- 44ba8d: lea edx, [eax+ecx*4] ; edx = TYPE + <ecx*4> (...so edx = TYPE*29?)
- 44ba90: mov eax, [0x6747b0] ; eax = 4-byte contents of 0x6747B0 <$2747B0>
- 44ba95: mov ecx, [0x6a58a4] ; ecx = 4-byte contents of 0x6A58A4 <$2A58A4>
- 44ba9b: mov eax, [eax+edx*4+0x18] ; eax = eax + (edx*4) + 0x18
- 44ba9f: lea edx, [ebp-0x40] ; if ebp is 1884B0 then edx = "188470"
- 44baa2: push eax ; store eax
- 44baa3: push ecx ; store ecx
- 44baa4: push edx ; store edx
- 44baa5: call dword 0x50c7f0
- 44baaa: add esp, 0xc
- 44baad: mov ecx, [0x63a60c]
- 44bab3: mov byte [ebp-0x4], 0x3
- 44bab7: push ecx
- 44bab8: push 0x0
- 44baba: push eax
- 44babb: lea ecx, [ebp-0x5c]
- 44babe: call dword 0x41b1b0
- 44bac3: push 0x1
- 44bac5: lea ecx, [ebp-0x40]
- 44bac8: mov byte [ebp-0x4], 0x0
- 44bacc: call dword 0x404130
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement