Advertisement
Kiosani

Como Aprender mas sobre MASM32

Jul 17th, 2021
44
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.60 KB | None | 0 0
  1. CPU Disasm
  2. Address Hex dump Command Comments
  3. 0045793F |. 833D B461F300 CMP DWORD PTR DS:[0F361B4],1
  4. 00457946 |. 75 10 JNE SHORT 00457958
  5. 00457948 |. 68 ECC74D00 PUSH OFFSET 004DC7EC ; ASCII "[Monsters] Monsters Scripts reloaded"
  6. 0045794D |. 6A 02 PUSH 2
  7. 0045794F |. FF15 DC15F300 CALL DWORD PTR DS:[0F315DC]
  8. 00457955 |. 83C4 08 ADD ESP,8
  9. 00457958 |> \5F POP EDI
  10.  
  11. 0F361B4 // -> Memory Allocation of my Var: BOOL bOnReloadMobs;
  12. 0F315DC // -> Memory Allocation of my Class: class CSetStates
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement