Advertisement
SerityW

Untitled

Jan 3rd, 2021
433
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 44ba46: cmp dword [eax], 0xc    ; angel check, jump if pass
  2. 44ba49: jz 0x44ba68
  3. 44ba4b: inc ecx                 ; ecx = ecx + 1
  4. 44ba4c: add eax, 0x4            ; eax = eax + 4
  5. 44ba4f: cmp ecx, 0x7            ; if ecx < 7, then...
  6. 44ba52: jl 0x44ba46             ; check a diff stack for angels
  7. 44ba54: xor eax, eax            ; eax = 0. none of them were angels. eax & ecx swap functionalities here
  8. 44ba56: mov ecx, edx            ; ecx = 4-byte contents of 1884A0
  9. 44ba58: cmp dword [ecx], 0xd    ; archangel check, jump if pass
  10. 44ba5b: jz 0x44ba68
  11. 44ba5d: inc eax                 ; eax = eax + 1
  12. 44ba5e: add ecx, 0x4            ; ecx = ecx + 4
  13. 44ba61: cmp eax, 0x7            ; if ecx < 7, then...
  14. 44ba64: jl 0x44ba58             ; check a diff stack for archangels
  15. 44ba66: jmp 0x44bad1            ; you have no angels or archangels in your team
  16.  
  17. 44ba68: mov eax, 0xc            ; set type as 0xC (angel)
  18. 44ba6d: xor ecx, ecx            ; zero ecx
  19. 44ba6f: cmp dword [edx], 0xd    ; secondary archangel check, jump if pass
  20. 44ba72: jz 0x44ba7f
  21. 44ba74: inc ecx                 ; ecx = ecx + 1
  22. 44ba75: add edx, 0x4            ; edx = edx + 4 (edx was contents of 1884A0)
  23. 44ba78: cmp ecx, 0x7            ; if ecx < 7, then...
  24. 44ba7b: jl 0x44ba6f             ; check a diff stack for archangels
  25. 44ba7d: jmp 0x44ba84            ; we have angels but no archangels
  26.  
  27. 44ba7f: mov eax, 0xd            ; set type as 0xC (archangel)
  28. 44ba84: lea ecx, [eax*8+0x0]    ; ecx = TYPE*8
  29. 44ba8b: sub ecx, eax            ; ecx = ecx - TYPE (...so TYPE*7??)
  30. 44ba8d: lea edx, [eax+ecx*4]    ; edx = TYPE + <ecx*4> (...so edx = TYPE*29?)
  31. 44ba90: mov eax, [0x6747b0]     ; eax = 4-byte contents of 0x6747B0 <$2747B0>
  32. 44ba95: mov ecx, [0x6a58a4]     ; ecx = 4-byte contents of 0x6A58A4 <$2A58A4>
  33. 44ba9b: mov eax, [eax+edx*4+0x18] ; eax = eax + (edx*4) + 0x18
  34. 44ba9f: lea edx, [ebp-0x40]     ; if ebp is 1884B0 then edx = "188470"
  35. 44baa2: push eax            ; store eax
  36. 44baa3: push ecx            ; store ecx
  37. 44baa4: push edx            ; store edx
  38. 44baa5: call dword 0x50c7f0
  39. 44baaa: add esp, 0xc
  40. 44baad: mov ecx, [0x63a60c]
  41. 44bab3: mov byte [ebp-0x4], 0x3
  42. 44bab7: push ecx
  43. 44bab8: push 0x0
  44. 44baba: push eax
  45. 44babb: lea ecx, [ebp-0x5c]
  46. 44babe: call dword 0x41b1b0
  47. 44bac3: push 0x1
  48. 44bac5: lea ecx, [ebp-0x40]
  49. 44bac8: mov byte [ebp-0x4], 0x0
  50. 44bacc: call dword 0x404130
  51.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement