Function Graph 0Basic Block 0Opcode: 55sub_804ac60:Opcode: 55push    ebpOpcode: 89 e5mov     ebpespOpcode: 53push    ebxOpcode: 57push    ediOpcode: 56push    esiOpcode: 83 e4 fcand     esp0xfffffffc {var_10}Opcode: 83 ec 1csub     esp0x1c {var_2c}Opcode: 8d 05 28 5c 05 08lea     eax[data_8055c28]Opcode: b9 74 04 00 00mov     ecx0x474Opcode: 89 04 24mov     dword [esp {var_2c}]eaxOpcode: c7 44 24 04 74 04 00 00mov     dword [esp+0x4 {var_28}]0x474Opcode: 89 4c 24 10mov     dword [esp+0x10 {var_1c}]ecxOpcode: e8 65 59 00 00call    sub_80505f0Opcode: c6 44 24 17 00mov     byte [esp+0x17 {var_15}]0x0Basic Block 1Opcode: 8d 65 f4lea     esp[ebp-0xc] {var_10}Opcode: 5epop     esiOpcode: 5fpop     ediOpcode: 5bpop     ebxOpcode: 5dpop     ebpOpcode: c3retn    Basic Block 2Opcode: 8d 05 9f 15 05 08lea     eax[data_805159f]  {"Disinfection$d"}Opcode: 8d 0d 28 5c 05 08lea     ecx[data_8055c28]Opcode: 0f b6 54 24 17movzx   edxbyte [esp+0x17 {var_15}]Opcode: 69 d2 e4 00 00 00imul    edxedx0xe4Opcode: 89 cemov     esiecx  {data_8055c28}Opcode: 01 d6add     esiedxOpcode: c6 06 04mov     byte [esi]0x4Opcode: 0f b6 54 24 17movzx   edxbyte [esp+0x17 {var_15}]Opcode: 69 d2 e4 00 00 00imul    edxedx0xe4Opcode: 01 d1add     ecxedxOpcode: 83 c1 01add     ecx0x1Opcode: 0f b6 54 24 17movzx   edxbyte [esp+0x17 {var_15}]Opcode: 89 0c 24mov     dword [esp {var_2c}]ecxOpcode: 89 44 24 04mov     dword [esp+0x4 {var_28}]eaxOpcode: 89 54 24 08mov     dword [esp+0x8 {var_24}]edxOpcode: e8 d9 3e 00 00call    sub_804ebc0Opcode: b9 01 00 00 00mov     ecx0x1Opcode: f2 0f 2a c1cvtsi2sd xmm0ecxOpcode: 8d 0d 28 5c 05 08lea     ecx[data_8055c28]Opcode: 8d 15 08 55 05 08lea     edx[data_8055508]Opcode: 8d 35 44 5b 05 08lea     esi[data_8055b44]Opcode: 0f b6 7c 24 17movzx   edibyte [esp+0x17 {var_15}]Opcode: 69 ff e4 00 00 00imul    ediedi0xe4Opcode: 89 cbmov     ebxecx  {data_8055c28}Opcode: 01 fbadd     ebxediOpcode: 89 b3 a8 00 00 00mov     dword [ebx+0xa8]esiOpcode: 0f b6 74 24 17movzx   esibyte [esp+0x17 {var_15}]Opcode: 69 f6 e4 00 00 00imul    esiesi0xe4Opcode: 89 cfmov     ediecx  {data_8055c28}Opcode: 01 f7add     ediesiOpcode: 89 57 6cmov     dword [edi+0x6c]edxOpcode: 0f b6 54 24 17movzx   edxbyte [esp+0x17 {var_15}]Opcode: 69 d2 e4 00 00 00imul    edxedx0xe4Opcode: 01 d1add     ecxedxOpcode: f2 0f 11 41 58movsd   qword [ecx+0x58]xmm0Opcode: 89 44 24 0cmov     dword [esp+0xc {var_20}]eaxOpcode: 8a 44 24 17mov     albyte [esp+0x17 {var_15}]Opcode: 04 01add     al0x1Opcode: 88 44 24 17mov     byte [esp+0x17 {var_15}]alOpcode: e9 42 ff ff ffjmp     0x804ac90Basic Block 3Opcode: 0f b6 44 24 17movzx   eaxbyte [esp+0x17 {var_15}]Opcode: 0f b6 0d c2 33 05 08movzx   ecxbyte [data_80533c2]Opcode: 39 c8cmp     eaxecxOpcode: 0f 8d aa 00 00 00jge     0x804ad4e