Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- .text:00961034 sub_961034 proc near ; CODE XREF: start-7B↓p
- .text:00961034
- .text:00961034 Buf = byte ptr -6Ch
- .text:00961034 var_68 = byte ptr -68h
- .text:00961034 var_4 = dword ptr -4
- .text:00961034
- .text:00961034 push ebp
- .text:00961035 mov ebp, esp
- .text:00961037 sub esp, 6Ch
- .text:0096103A mov eax, ___security_cookie
- .text:0096103F xor eax, ebp
- .text:00961041 mov [ebp+var_4], eax
- .text:00961044 push ebx
- .text:00961045 push offset aPleaseEnterThe ; "Please enter the password: "
- .text:0096104A call sub_961006
- .text:0096104F xor ebx, ebx
- .text:00961051 push ebx
- .text:00961052 call ds:__acrt_iob_func
- .text:00961058 push eax ; File
- .text:00961059 lea eax, [ebp+Buf]
- .text:0096105C push 64h ; MaxCount
- .text:0096105E push eax ; Buf
- .text:0096105F call ds:fgets
- .text:00961065 lea ecx, [ebp+Buf]
- .text:00961068 add esp, 14h
- .text:0096106B lea edx, [ecx+1]
- .text:0096106E
- .text:0096106E loc_96106E: ; CODE XREF: sub_961034+3F↓j
- .text:0096106E mov al, [ecx]
- .text:00961070 inc ecx
- .text:00961071 test al, al
- .text:00961073 jnz short loc_96106E
- .text:00961075 sub ecx, edx
- .text:00961077 cmp ecx, 5
- .text:0096107A jnz short loc_9610C3
- .text:0096107C mov [ebp+var_68], bl
- .text:0096107F
- .text:0096107F loc_96107F: ; CODE XREF: sub_961034+5E↓j
- .text:0096107F mov eax, ebx
- .text:00961081 and eax, 3
- .text:00961084 mov al, [ebp+eax+Buf]
- .text:00961088 xor byte_963018[ebx], al
- .text:0096108E inc ebx
- .text:0096108F cmp ebx, 0Ah
- .text:00961092 jb short loc_96107F
- .text:00961094 mov ecx, offset byte_963018
- .text:00961099 mov edx, offset unk_963024
- .text:0096109E mov eax, [ecx]
- .text:009610A0 cmp eax, [edx]
- .text:009610A2 jnz short loc_9610C3
- .text:009610A4 mov eax, [ecx+4]
- .text:009610A7 cmp eax, [edx+4]
- .text:009610AA jnz short loc_9610C3
- .text:009610AC movzx eax, byte ptr [ecx+8]
- .text:009610B0 cmp al, [edx+8]
- .text:009610B3 jnz short loc_9610C3
- .text:009610B5 push offset aYouDidIt ; "YOU DID IT !~!\r\n"
- .text:009610BA call sub_961006
- .text:009610BF xor eax, eax
- .text:009610C1 jmp short loc_9610D0
- .text:009610C3 ; ---------------------------------------------------------------------------
- .text:009610C3
- .text:009610C3 loc_9610C3: ; CODE XREF: sub_961034+46↑j
- .text:009610C3 ; sub_961034+6E↑j ...
- .text:009610C3 push offset aOhhhhNooTryAga ; "Ohhhh noo... try again.\r\n"
- .text:009610C8 call sub_961006
- .text:009610CD xor eax, eax
- .text:009610CF inc eax
- .text:009610D0
- .text:009610D0 loc_9610D0: ; CODE XREF: sub_961034+8D↑j
- .text:009610D0 pop ecx
- .text:009610D1 mov ecx, [ebp+var_4]
- .text:009610D4 xor ecx, ebp
- .text:009610D6 pop ebx
- .text:009610D7 call @__security_check_cookie@4 ; __security_check_cookie(x)
- .text:009610DC mov esp, ebp
- .text:009610DE pop ebp
- .text:009610DF retn
- .text:009610DF sub_961034 endp
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement