Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- => 0x400747: push ebp
- 0x400748: mov ebp,esp
- 0x40074a: push esi
- 0x40074b: push ebx
- 0x40074c: sub esp,0x20
- 0x40074f: call 0x400500
- 0x400754: add ebx,0x18ac
- 0x40075a: mov DWORD PTR [ebp-0x1b],0x0
- 0x400761: mov DWORD PTR [ebp-0x17],0x0
- 0x400768: mov WORD PTR [ebp-0x13],0x0
- 0x40076e: mov BYTE PTR [ebp-0x11],0x0
- 0x400772: sub esp,0xc
- 0x400775: push DWORD PTR [ebp+0x8]
- 0x400778: call 0x400480 <strlen@plt>
- 0x40077d: add esp,0x10
- 0x400780: mov DWORD PTR [ebp-0x10],eax
- 0x400783: mov DWORD PTR [ebp-0xc],0x0
- 0x40078a: jmp 0x400868
- 0x40078f: cmp DWORD PTR [ebp-0xc],0x8
- 0x400793: jg 0x400879
- 0x400799: cmp DWORD PTR [ebp-0xc],0x0
- 0x40079d: jne 0x4007db
- 0x40079f: mov eax,DWORD PTR [ebp+0x8]
- 0x4007a2: movzx eax,BYTE PTR [eax]
- 0x4007a5: movsx edx,al
- 0x4007a8: mov eax,DWORD PTR [ebp+0x8]
- 0x4007ab: add eax,0x1
- 0x4007ae: movzx eax,BYTE PTR [eax]
- 0x4007b1: movsx eax,al
- 0x4007b4: lea ecx,[edx+eax*1]
- 0x4007b7: mov edx,0x2c0b02c1
- 0x4007bc: mov eax,ecx
- 0x4007be: imul edx
- 0x4007c0: sar edx,0x4
- 0x4007c3: mov eax,ecx
- 0x4007c5: sar eax,0x1f
- 0x4007c8: sub edx,eax
- 0x4007ca: mov eax,edx
- 0x4007cc: imul eax,eax,0x5d
- 0x4007cf: sub ecx,eax
- 0x4007d1: mov eax,ecx
- 0x4007d3: add eax,0x21
- 0x4007d6: mov BYTE PTR [ebp-0x1b],al
- 0x4007d9: jmp 0x400828
- 0x4007db: mov eax,DWORD PTR [ebp-0xc]
- 0x4007de: sub eax,0x1
- 0x4007e1: movzx eax,BYTE PTR [ebp+eax*1-0x1b]
- 0x4007e6: movsx eax,al
- 0x4007e9: mov ecx,DWORD PTR [ebp-0xc]
- 0x4007ec: mov edx,DWORD PTR [ebp+0x8]
- 0x4007ef: add edx,ecx
- 0x4007f1: movzx edx,BYTE PTR [edx]
- 0x4007f4: movsx edx,dl
- 0x4007f7: shl edx,0x2
- 0x4007fa: lea ecx,[eax+edx*1]
- 0x4007fd: mov edx,0x2c0b02c1
- 0x400802: mov eax,ecx
- 0x400804: imul edx
- 0x400806: sar edx,0x4
- 0x400809: mov eax,ecx
- 0x40080b: sar eax,0x1f
- 0x40080e: sub edx,eax
- 0x400810: mov eax,edx
- 0x400812: imul eax,eax,0x5d
- 0x400815: sub ecx,eax
- 0x400817: mov eax,ecx
- 0x400819: add eax,0x21
- 0x40081c: mov ecx,eax
- 0x40081e: lea edx,[ebp-0x1b]
- 0x400821: mov eax,DWORD PTR [ebp-0xc]
- 0x400824: add eax,edx
- 0x400826: mov BYTE PTR [eax],cl
- 0x400828: lea edx,[ebp-0x1b]
- 0x40082b: mov eax,DWORD PTR [ebp-0xc]
- 0x40082e: add eax,edx
- 0x400830: movzx edx,BYTE PTR [eax]
- 0x400833: mov ecx,DWORD PTR [ebp-0xc]
- 0x400836: mov eax,DWORD PTR [ebp+0xc]
- 0x400839: add eax,ecx
- 0x40083b: movzx eax,BYTE PTR [eax]
- 0x40083e: cmp dl,al
- 0x400840: je 0x40085d
- 0x400842: mov BYTE PTR [ebx+0xc6],0x0
- 0x400849: sub esp,0xc
- 0x40084c: lea eax,[ebx-0x15e0]
- 0x400852: push eax
- 0x400853: call 0x400460 <puts@plt>
- 0x400858: add esp,0x10
- 0x40085b: jmp 0x40087a
- 0x40085d: mov BYTE PTR [ebx+0xc6],0x1
- 0x400864: add DWORD PTR [ebp-0xc],0x1
- 0x400868: mov eax,DWORD PTR [ebp-0xc]
- 0x40086b: cmp eax,DWORD PTR [ebp-0x10]
- 0x40086e: jl 0x40078f
- 0x400874: jmp 0x40091b
- 0x400879: nop
- 0x40087a: jmp 0x40091b
- 0x40087f: cmp DWORD PTR [ebp-0xc],0x9
- 0x400883: jg 0x4008d5
- 0x400885: mov eax,DWORD PTR [ebp-0xc]
- 0x400888: sub eax,0x1
- 0x40088b: movzx eax,BYTE PTR [ebp+eax*1-0x1b]
- 0x400890: movsx edx,al
- 0x400893: mov eax,DWORD PTR [ebp-0xc]
- 0x400896: lea esi,[eax+0x41]
- 0x400899: mov eax,0xa
- 0x40089e: sub eax,DWORD PTR [ebp-0xc]
- 0x4008a1: mov ecx,eax
- 0x4008a3: shl esi,cl
- 0x4008a5: mov eax,esi
- 0x4008a7: lea ecx,[edx+eax*1]
- 0x4008aa: mov edx,0x2c0b02c1
- 0x4008af: mov eax,ecx
- 0x4008b1: imul edx
- 0x4008b3: sar edx,0x4
- 0x4008b6: mov eax,ecx
- 0x4008b8: sar eax,0x1f
- 0x4008bb: sub edx,eax
- 0x4008bd: mov eax,edx
- 0x4008bf: imul eax,eax,0x5d
- 0x4008c2: sub ecx,eax
- 0x4008c4: mov eax,ecx
- 0x4008c6: add eax,0x21
- 0x4008c9: mov ecx,eax
- 0x4008cb: lea edx,[ebp-0x1b]
- 0x4008ce: mov eax,DWORD PTR [ebp-0xc]
- 0x4008d1: add eax,edx
- 0x4008d3: mov BYTE PTR [eax],cl
- 0x4008d5: lea edx,[ebp-0x1b]
- 0x4008d8: mov eax,DWORD PTR [ebp-0xc]
- 0x4008db: add eax,edx
- 0x4008dd: movzx edx,BYTE PTR [eax]
- 0x4008e0: mov ecx,DWORD PTR [ebp-0xc]
- 0x4008e3: mov eax,DWORD PTR [ebp+0xc]
- 0x4008e6: add eax,ecx
- 0x4008e8: movzx eax,BYTE PTR [eax]
- 0x4008eb: cmp dl,al
- 0x4008ed: je 0x40090a
- 0x4008ef: mov BYTE PTR [ebx+0xc6],0x0
- 0x4008f6: sub esp,0xc
- 0x4008f9: lea eax,[ebx-0x15e0]
- 0x4008ff: push eax
- 0x400900: call 0x400460 <puts@plt>
- 0x400905: add esp,0x10
- 0x400908: jmp 0x400917
- 0x40090a: cmp DWORD PTR [ebp-0xc],0x9
- 0x40090e: jne 0x400917
- 0x400910: call 0x4006a8
- 0x400915: jmp 0x40092a
- 0x400917: add DWORD PTR [ebp-0xc],0x1
- 0x40091b: movzx eax,BYTE PTR [ebx+0xc6]
- 0x400922: cmp al,0x1
- 0x400924: je 0x40087f
- 0x40092a: nop
- 0x40092b: lea esp,[ebp-0x8]
- 0x40092e: pop ebx
- 0x40092f: pop esi
- 0x400930: pop ebp
- 0x400931: ret
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement