Advertisement
Guest User

Untitled

a guest
Oct 23rd, 2012
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.19 KB | None | 0 0
  1. deadlisting:
  2.  
  3. [0x080485d4]> pD 100
  4. 0x080485d4 main:
  5. 0x080485d4 8d4c2404 lea ecx, [esp+0x4]
  6. 0x080485d8 83e4f0 and esp, 0xfffffff0
  7. 0x080485db ff71fc push dword [ecx-0x4]
  8. 0x080485de 55 push ebp
  9. 0x080485df 89e5 mov ebp, esp
  10. 0x080485e1 53 push ebx
  11. 0x080485e2 51 push ecx
  12. 0x080485e3 81ec40040000 sub esp, 0x440
  13. 0x080485e9 65a114000000 mov eax, [gs:0x14]
  14. 0x080485ef 8945f4 mov [ebp-0xc], eax
  15. 0x080485f2 31c0 xor eax, eax
  16. 0x080485f4 c785e0fbffff130. mov dword [ebp+0xfffffbe0], 0x13
  17. 0x080485fe c785d8fbffff000. mov dword [ebp+0xfffffbd8], 0x0
  18. 0x08048608 c785d4fbffff000. mov dword [ebp+0xfffffbd4], 0x0
  19. 0x08048612 c785c8fbffff000. mov dword [ebp+0xfffffbc8], 0x0
  20. 0x0804861c c744240464000000 mov dword [esp+0x4], 0x64
  21. 0x08048624 8d85e3fcffff lea eax, [ebp+0xfffffce3]
  22. 0x0804862a 890424 mov [esp], eax
  23. 0x0804862d e8eefeffff call dword imp.gethostname
  24.  
  25.  
  26. debugger:
  27.  
  28. [0x080485d4]> pD 100
  29. 0x080485d4 rip:
  30. 0x080485d4 b 8d4c2404 lea ecx, [rsp+0x4]
  31. 0x080485d8 83e4f0 and esp, 0xfffffff0
  32. 0x080485db ff71fc push qword [rcx-0x4]
  33. 0x080485de 55 push rbp
  34. 0x080485df 89e5 mov ebp, esp
  35. 0x080485e1 53 push rbx
  36. 0x080485e2 51 push rcx
  37. 0x080485e3 81ec40040000 sub esp, 0x440
  38. 0x080485e9 65a114000000894. mov eax, [gs:0x31f4458900000014]
  39. 0x080485f3 c0c785 rol bh, 0x85
  40. 0x080485f6 e0fb loopnz 0x80485f3
  41. 0x080485f8 ff invalid
  42. 0x080485f9 ff13 call qword [rbx]
  43. ; unk(unk, unk, unk, unk) (oeax+0)
  44. 0x080485fb 0000 add [rax], al
  45. 0x080485fd 00c7 add bh, al
  46. 0x080485ff 85d8 test eax, ebx
  47. 0x08048601 fb sti
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement