Advertisement
Guest User

Untitled

a guest
May 19th, 2019
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.10 KB | None | 0 0
  1. CPU Disasm
  2. Address Hex dump Command Comments
  3. 0043DA20 /$ 55 PUSH EBP ; StarCraft.0043DA20(guessed Arg1)
  4. 0043DA21 |. 8BEC MOV EBP,ESP
  5. 0043DA23 |. 56 PUSH ESI
  6. 0043DA24 |. 8BF0 MOV ESI,EAX
  7. 0043DA26 |. 807E 05 03 CMP BYTE PTR DS:[ESI+5],3
  8. 0043DA2A |. 57 PUSH EDI
  9. 0043DA2B |. 75 28 JNE SHORT 0043DA55
  10. 0043DA2D |. 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
  11. 0043DA30 |. 85C0 TEST EAX,EAX
  12. 0043DA32 |. 75 21 JNE SHORT 0043DA55
  13. 0043DA34 |. 8B43 0C MOV EAX,DWORD PTR DS:[EBX+0C]
  14. 0043DA37 |. 0FBF48 16 MOVSX ECX,WORD PTR DS:[EAX+16]
  15. 0043DA3B |. 0FBF78 14 MOVSX EDI,WORD PTR DS:[EAX+14]
  16. 0043DA3F |. E8 ACEF0500 CALL 0049C9F0
  17. 0043DA44 |. 0FB7F0 MOVZX ESI,AX
  18. 0043DA47 |. 0FB643 4C MOVZX EAX,BYTE PTR DS:[EBX+4C]
  19. 0043DA4B |. 6BF6 34 IMUL ESI,ESI,34
  20. 0043DA4E |. 033485 04A669 ADD ESI,DWORD PTR DS:[EAX*4+69A604]
  21. 0043DA55 |> 8B56 2C MOV EDX,DWORD PTR DS:[ESI+2C]
  22. 0043DA58 |. 8B82 204E0000 MOV EAX,DWORD PTR DS:[EDX+4E20]
  23. 0043DA5E |. 33FF XOR EDI,EDI
  24. 0043DA60 |. 3BC7 CMP EAX,EDI
  25. 0043DA62 |. 0F84 A0000000 JE 0043DB08
  26. 0043DA68 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
  27. 0043DA6A |. 3BCF CMP ECX,EDI
  28. 0043DA6C |. 898A 204E0000 MOV DWORD PTR DS:[EDX+4E20],ECX
  29. 0043DA72 |. 74 03 JE SHORT 0043DA77
  30. 0043DA74 |. 8979 04 MOV DWORD PTR DS:[ECX+4],EDI
  31. 0043DA77 |> 3BC7 CMP EAX,EDI
  32. 0043DA79 |. 0F84 89000000 JE 0043DB08
  33. 0043DA7F |. 8978 04 MOV DWORD PTR DS:[EAX+4],EDI
  34. 0043DA82 |. 8B4E 30 MOV ECX,DWORD PTR DS:[ESI+30]
  35. 0043DA85 |. 8908 MOV DWORD PTR DS:[EAX],ECX
  36. 0043DA87 |. 8B4E 30 MOV ECX,DWORD PTR DS:[ESI+30]
  37. 0043DA8A |. 3BCF CMP ECX,EDI
  38. 0043DA8C |. 74 03 JE SHORT 0043DA91
  39. 0043DA8E |. 8941 04 MOV DWORD PTR DS:[ECX+4],EAX
  40. 0043DA91 |> 8946 30 MOV DWORD PTR DS:[ESI+30],EAX
  41. 0043DA94 |. B1 04 MOV CL,4
  42. 0043DA96 |. 8848 08 MOV BYTE PTR DS:[EAX+8],CL
  43. 0043DA99 |. 8958 0C MOV DWORD PTR DS:[EAX+0C],EBX
  44. 0043DA9C |. 8970 10 MOV DWORD PTR DS:[EAX+10],ESI
  45. 0043DA9F |. 848B DC000000 TEST BYTE PTR DS:[EBX+0DC],CL
  46. 0043DAA5 |. 75 04 JNE SHORT 0043DAAB
  47. 0043DAA7 |. 66:FF46 0A INC WORD PTR DS:[ESI+0A]
  48. 0043DAAB |> 8983 34010000 MOV DWORD PTR DS:[EBX+134],EAX
  49. 0043DAB1 |. 0FB716 MOVZX EDX,WORD PTR DS:[ESI]
  50. 0043DAB4 |. A1 FC5B6D00 MOV EAX,DWORD PTR DS:[6D5BFC]
  51. 0043DAB9 |. C1E2 06 SHL EDX,6
  52. 0043DABC |. 8B8C02 104A04 MOV ECX,DWORD PTR DS:[EAX+EDX+44A10] ; UNICODE "reuap-settingsync-status-l1-1-0"
  53. 0043DAC3 |. 8D8402 FC4904 LEA EAX,[EAX+EDX+449FC] ; UNICODE "i-ms-onecoreuap-settingsync-status-l1-1-0"
  54. 0043DACA |. 8B50 10 MOV EDX,DWORD PTR DS:[EAX+10]
  55. 0043DACD |. 33C0 XOR EAX,EAX
  56. 0043DACF |. C1F9 08 SAR ECX,8
  57. 0043DAD2 |. C1FA 08 SAR EDX,8
  58. 0043DAD5 |. 66:837B 64 22 CMP WORD PTR DS:[EBX+64],22
  59. 0043DADA |. 51 PUSH ECX
  60. 0043DADB |. 0F95C0 SETNE AL
  61. 0043DADE |. 52 PUSH EDX
  62. 0043DADF |. 48 DEC EAX
  63. 0043DAE0 |. 83E0 14 AND EAX,00000014
  64. 0043DAE3 |. 05 9D000000 ADD EAX,9D
  65. 0043DAE8 |. 50 PUSH EAX
  66. 0043DAE9 |. 53 PUSH EBX
  67. 0043DAEA |. E8 E1FAFFFF CALL 0043D5D0
  68. 0043DAEF |. 8A46 05 MOV AL,BYTE PTR DS:[ESI+5]
  69. 0043DAF2 |. 3C 08 CMP AL,8
  70. 0043DAF4 |. 74 0C JE SHORT 0043DB02
  71. 0043DAF6 |. 3C 09 CMP AL,9
  72. 0043DAF8 |. 74 08 JE SHORT 0043DB02
  73. 0043DAFA |. 3C 01 CMP AL,1
  74. 0043DAFC |. 74 04 JE SHORT 0043DB02
  75. 0043DAFE |. 3C 02 CMP AL,2
  76. 0043DB00 |. 75 06 JNE SHORT 0043DB08
  77. 0043DB02 |> 56 PUSH ESI ; /Arg1
  78. 0043DB03 |. E8 6894FFFF CALL 00436F70 ; \StarCraft.00436F70
  79. 0043DB08 |> 5F POP EDI
  80. 0043DB09 |. 5E POP ESI
  81. 0043DB0A |. 5D POP EBP
  82. 0043DB0B \. C2 0400 RETN 4
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement