Guest User

Untitled

a guest
Jun 17th, 2018
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Breakpoint 1, 0x00001d43 in -[SandwichAppDelegate validate:] ()
  2. --------------------------------------------------------------------------[regs]
  3.   EAX: 0x00000000  EBX: 0x0016B9D0  ECX: 0x00000000  EDX: 0x00000060  o d I t s Z a P c
  4.   ESI: 0x95C403EE  EDI: 0x0016B9D0  EBP: 0xBFFFF368  ESP: 0xBFFFF340  EIP: 0x00001D43
  5.   CS: 001B  DS: 0023  ES: 0023  FS: 0000  GS: 000F  SS: 0023  Jump is NOT taken (z!=0)
  6. --------------------------------------------------------------------------[code]
  7. 0x1d43 <-[SandwichAppDelegate validate:]+53>:   jne    0x1d6e <-[SandwichAppDelegate validate:]+96>
  8. 0x1d45 <-[SandwichAppDelegate validate:]+55>:   mov    DWORD PTR [esp+0x10],0x0
  9. 0x1d4d <-[SandwichAppDelegate validate:]+63>:   mov    DWORD PTR [esp+0xc],0x0
  10. 0x1d55 <-[SandwichAppDelegate validate:]+71>:   mov    DWORD PTR [esp+0x8],0x2044
  11. 0x1d5d <-[SandwichAppDelegate validate:]+79>:   mov    DWORD PTR [esp+0x4],0x2054
  12. 0x1d65 <-[SandwichAppDelegate validate:]+87>:   mov    DWORD PTR [esp],0x2064
  13. 0x1d6c <-[SandwichAppDelegate validate:]+94>:   jmp    0x1d95 <-[SandwichAppDelegate validate:]+135>
  14. 0x1d6e <-[SandwichAppDelegate validate:]+96>:   mov    DWORD PTR [esp+0x10],0x0
  15. --------------------------------------------------------------------------------
Add Comment
Please, Sign In to add comment