ASM Code:
Code:
CPU Disasm
Address Hex dump Command Comments
00519B78 /$ 53 PUSH EBX ; nostalex.00519B78(guessed void)
00519B79 |. 56 PUSH ESI
00519B7A |. 57 PUSH EDI
00519B7B |. 55 PUSH EBP
00519B7C |. 51 PUSH ECX
00519B7D |. 891424 MOV DWORD PTR SS:[LOCAL.4],EDX
00519B80 |. 8BE8 MOV EBP,EAX
00519B82 |. 33F6 XOR ESI,ESI
00519B84 |. 8B45 04 MOV EAX,DWORD PTR SS:[EBP+4]
00519B87 |. 8B78 08 MOV EDI,DWORD PTR DS:[EAX+8]
00519B8A |. 4F DEC EDI
00519B8B |. 3BFE CMP EDI,ESI
00519B8D |. 7C 32 JL SHORT 00519BC1
00519B8F |> 8D1C37 /LEA EBX,[ESI+EDI]
00519B92 |. D1EB |SHR EBX,1
00519B94 |. 8B45 04 |MOV EAX,DWORD PTR SS:[EBP+4]
00519B97 |. 8BD3 |MOV EDX,EBX
00519B99 |. E8 BE22F0FF |CALL 0041BE5C
00519B9E |. 8B40 10 |MOV EAX,DWORD PTR DS:[EAX+10]
00519BA1 |. 8B1424 |MOV EDX,DWORD PTR SS:[LOCAL.4]
00519BA4 |. E8 2B1BEFFF |CALL 0040B6D4 ; [nostalex.0040B6D4
00519BA9 |. 85C0 |TEST EAX,EAX
00519BAB |. 7D 05 |JGE SHORT 00519BB2
00519BAD |. 8D73 01 |LEA ESI,[EBX+1]
00519BB0 |. EB 0B |JMP SHORT 00519BBD
00519BB2 |> 8BFB |MOV EDI,EBX
00519BB4 |. 4F |DEC EDI
00519BB5 |. 85C0 |TEST EAX,EAX
00519BB7 |. 75 04 |JNZ SHORT 00519BBD
00519BB9 |. 8BC3 |MOV EAX,EBX
00519BBB |. EB 07 |JMP SHORT 00519BC4
00519BBD |> 3BFE |CMP EDI,ESI
00519BBF |.^ 7D CE \JGE SHORT 00519B8F
00519BC1 |> 83C8 FF OR EAX,FFFFFFFF
00519BC4 |> 5A POP EDX
00519BC5 |. 5D POP EBP
00519BC6 |. 5F POP EDI
00519BC7 |. 5E POP ESI
00519BC8 |. 5B POP EBX
00519BC9 \. C3 RETN
Durch Detour:
Code:
CPU Disasm
Address Hex dump Command Comments
00519B78 /$ E9 137F125D JMP 5D641A90 ; nostalex.00519B78(guessed void)
00519B7D |. 891424 MOV DWORD PTR SS:[LOCAL.4],EDX
00519B80 |. 8BE8 MOV EBP,EAX
00519B82 |. 33F6 XOR ESI,ESI
00519B84 |. 8B45 04 MOV EAX,DWORD PTR SS:[EBP+4]
00519B87 |. 8B78 08 MOV EDI,DWORD PTR DS:[EAX+8]
00519B8A |. 4F DEC EDI
00519B8B |. 3BFE CMP EDI,ESI
00519B8D |. 7C 32 JL SHORT 00519BC1
00519B8F |> 8D1C37 /LEA EBX,[ESI+EDI]
00519B92 |. D1EB |SHR EBX,1
00519B94 |. 8B45 04 |MOV EAX,DWORD PTR SS:[EBP+4]
00519B97 |. 8BD3 |MOV EDX,EBX
00519B99 |. E8 BE22F0FF |CALL 0041BE5C
00519B9E |. 8B40 10 |MOV EAX,DWORD PTR DS:[EAX+10]
00519BA1 |. 8B1424 |MOV EDX,DWORD PTR SS:[LOCAL.4]
00519BA4 |. E8 2B1BEFFF |CALL 0040B6D4 ; [nostalex.0040B6D4
00519BA9 |. 85C0 |TEST EAX,EAX
00519BAB |. 7D 05 |JGE SHORT 00519BB2
00519BAD |. 8D73 01 |LEA ESI,[EBX+1]
00519BB0 |. EB 0B |JMP SHORT 00519BBD
00519BB2 |> 8BFB |MOV EDI,EBX
00519BB4 |. 4F |DEC EDI
00519BB5 |. 85C0 |TEST EAX,EAX
00519BB7 |. 75 04 |JNZ SHORT 00519BBD
00519BB9 |. 8BC3 |MOV EAX,EBX
00519BBB |. EB 07 |JMP SHORT 00519BC4
00519BBD |> 3BFE |CMP EDI,ESI
00519BBF |.^ 7D CE \JGE SHORT 00519B8F
00519BC1 |> 83C8 FF OR EAX,FFFFFFFF
00519BC4 |> 5A POP EDX
00519BC5 |. 5D POP EBP
00519BC6 |. 5F POP EDI
00519BC7 |. 5E POP ESI
00519BC8 |. 5B POP EBX
00519BC9 \. C3 RETN
______________________
CPU Disasm
Address Hex dump Command Comments
5D641A90 8915 0CA2645D MOV DWORD PTR DS:[5D64A20C],EDX
5D641A96 ^ FF25 C0A1645D JMP DWORD PTR DS:[5D64A1C0]