Explore
/
Sign In
/
Unknown
Unknown
Fork
Star
Artifacts
function
0x140001e50:Code_x86_64
disassembly.S
0 lines
|
280.42 KB
function_0x140001e50_Code_x86_64: 140001e50: 44 89 44 24 18 mov dword ptr [rsp + 0x18], r8d 140001e55: 48 89 54 24 10 mov qword ptr [rsp + 0x10], rdx 140001e5a: 48 89 4c 24 08 mov qword ptr [rsp + 0x8], rcx 140001e5f: 55 push rbp 140001e60: 56 push rsi 140001e61: 57 push rdi 140001e62: 41 56 push r14 140001e64: 48 83 ec 38 sub rsp, 0x38 140001e68: 44 8b 49 10 mov r9d, dword ptr [rcx + 0x10] 140001e6c: 41 8b e8 mov ebp, r8d 140001e6f: 4c 8b f2 mov r14, rdx 140001e72: 48 8b f1 mov rsi, rcx 140001e75: 43 8d 04 c1 lea eax, [r9 + 8*r8] 140001e79: 89 41 10 mov dword ptr [rcx + 0x10], eax 140001e7c: 41 3b c1 cmp eax, r9d 140001e7f: 73 03 jae bb_0x140001e84 140001e81: ff 41 14 inc dword ptr [rcx + 0x14] bb_0x140001e84: 140001e84: 48 89 5c 24 78 mov qword ptr [rsp + 0x78], rbx 140001e89: 41 8b c0 mov eax, r8d 140001e8c: c1 e8 1d shr eax, 0x1d 140001e8f: 33 ff xor edi, edi 140001e91: 01 41 14 add dword ptr [rcx + 0x14], eax 140001e94: 4c 89 64 24 30 mov qword ptr [rsp + 0x30], r12 140001e99: 41 c1 e9 03 shr r9d, 0x3 140001e9d: 4c 89 6c 24 28 mov qword ptr [rsp + 0x28], r13 140001ea2: 4c 89 7c 24 20 mov qword ptr [rsp + 0x20], r15 140001ea7: 41 83 e1 3f and r9d, 0x3f 140001eab: 0f 84 39 02 00 00 je bb_0x1400020ea 140001eb1: 45 8b e9 mov r13d, r9d 140001eb4: 41 bc 40 00 00 00 mov r12d, 0x40 140001eba: 4c 03 e9 add r13, rcx 140001ebd: 45 2b e1 sub r12d, r9d 140001ec0: 45 3b c4 cmp r8d, r12d 140001ec3: 0f 83 06 01 00 00 jae bb_0x140001fcf 140001ec9: e8 b2 23 00 00 call function_0x140004280_Code_x86_64 140001ece: 45 33 e4 xor r12d, r12d 140001ed1: 48 8b 48 18 mov rcx, qword ptr [rax + 0x18] 140001ed5: 48 8b 59 20 mov rbx, qword ptr [rcx + 0x20] 140001ed9: 4c 8b 79 28 mov r15, qword ptr [rcx + 0x28] 140001edd: 49 3b df cmp rbx, r15 140001ee0: 0f 84 d3 00 00 00 je bb_0x140001fb9 140001ee6: 66 66 0f 1f 84 00 00 00 00 00 nop word ptr [rax + rax] bb_0x140001ef0: 140001ef0: 4c 8b 5b 20 mov r11, qword ptr [rbx + 0x20] 140001ef4: 49 63 43 3c movsxd rax, dword ptr [r11 + 0x3c] 140001ef8: 42 8b 8c 18 88 00 00 00 mov ecx, dword ptr [rax + r11 + 0x88] 140001f00: 85 c9 test ecx, ecx 140001f02: 0f 84 80 00 00 00 je bb_0x140001f88 140001f08: 41 8b 74 0b 20 mov esi, dword ptr [r11 + rcx + 0x20] 140001f0d: 49 8d 04 0b lea rax, [r11 + rcx] 140001f11: 8b 68 24 mov ebp, dword ptr [rax + 0x24] 140001f14: 49 03 f3 add rsi, r11 140001f17: 44 8b 70 1c mov r14d, dword ptr [rax + 0x1c] 140001f1b: 49 03 eb add rbp, r11 140001f1e: 8b 78 18 mov edi, dword ptr [rax + 0x18] 140001f21: 4d 03 f3 add r14, r11 140001f24: 45 8b d4 mov r10d, r12d 140001f27: 85 ff test edi, edi 140001f29: 74 5d je bb_0x140001f88 140001f2b: 0f 1f 44 00 00 nop dword ptr [rax + rax] bb_0x140001f30: 140001f30: 41 8b c2 mov eax, r10d 140001f33: 48 c7 c1 ff ff ff ff mov rcx, -0x1 140001f3a: 41 b9 78 70 75 f8 mov r9d, 0xf8757078 140001f40: 44 8b 04 86 mov r8d, dword ptr [rsi + 4*rax] 140001f44: 4d 03 c3 add r8, r11 bb_0x140001f47: 140001f47: 48 ff c1 inc rcx 140001f4a: 45 38 24 08 cmp byte ptr [r8 + rcx], r12b 140001f4e: 75 f7 jne bb_0x140001f47 140001f50: 49 8b d4 mov rdx, r12 140001f53: 48 85 c9 test rcx, rcx 140001f56: 74 28 je bb_0x140001f80 140001f58: 0f 1f 84 00 00 00 00 00 nop dword ptr [rax + rax] bb_0x140001f60: 140001f60: 42 0f be 04 02 movsx eax, byte ptr [rdx + r8] 140001f65: 48 ff c2 inc rdx 140001f68: 41 33 c1 xor eax, r9d 140001f6b: 44 69 c8 93 01 00 01 imul r9d, eax, 0x1000193 140001f72: 48 3b d1 cmp rdx, rcx 140001f75: 72 e9 jb bb_0x140001f60 140001f77: 41 81 f9 29 fd 35 ee cmp r9d, 0xee35fd29 140001f7e: 74 2a je bb_0x140001faa bb_0x140001f80: 140001f80: 41 ff c2 inc r10d 140001f83: 44 3b d7 cmp r10d, edi 140001f86: 72 a8 jb bb_0x140001f30 bb_0x140001f88: 140001f88: 48 8b 1b mov rbx, qword ptr [rbx] 140001f8b: 49 3b df cmp rbx, r15 140001f8e: 0f 85 5c ff ff ff jne bb_0x140001ef0 140001f94: 44 8b 44 24 70 mov r8d, dword ptr [rsp + 0x70] 140001f99: 49 8d 4d 18 lea rcx, [r13 + 0x18] 140001f9d: 48 8b 54 24 68 mov rdx, qword ptr [rsp + 0x68] 140001fa2: 41 ff d4 call r12 140001fa5: e9 29 03 00 00 jmp bb_0x1400022d3 bb_0x140001faa: 140001faa: 41 8b c2 mov eax, r10d 140001fad: 0f b7 4c 45 00 movzx ecx, word ptr [rbp + 2*rax] 140001fb2: 45 8b 24 8e mov r12d, dword ptr [r14 + 4*rcx] 140001fb6: 4d 03 e3 add r12, r11 bb_0x140001fb9: 140001fb9: 44 8b 44 24 70 mov r8d, dword ptr [rsp + 0x70] 140001fbe: 49 8d 4d 18 lea rcx, [r13 + 0x18] 140001fc2: 48 8b 54 24 68 mov rdx, qword ptr [rsp + 0x68] 140001fc7: 41 ff d4 call r12 140001fca: e9 04 03 00 00 jmp bb_0x1400022d3 bb_0x140001fcf: 140001fcf: e8 ac 22 00 00 call function_0x140004280_Code_x86_64 140001fd4: 48 8b 48 18 mov rcx, qword ptr [rax + 0x18] 140001fd8: 48 8b 59 20 mov rbx, qword ptr [rcx + 0x20] 140001fdc: 4c 8b 79 28 mov r15, qword ptr [rcx + 0x28] 140001fe0: 49 3b df cmp rbx, r15 140001fe3: 0f 84 b0 00 00 00 je bb_0x140002099 140001fe9: 0f 1f 80 00 00 00 00 nop dword ptr [rax] bb_0x140001ff0: 140001ff0: 4c 8b 5b 20 mov r11, qword ptr [rbx + 0x20] 140001ff4: 49 63 43 3c movsxd rax, dword ptr [r11 + 0x3c] 140001ff8: 42 8b 8c 18 88 00 00 00 mov ecx, dword ptr [rax + r11 + 0x88] 140002000: 85 c9 test ecx, ecx 140002002: 74 79 je bb_0x14000207d 140002004: 41 8b 74 0b 20 mov esi, dword ptr [r11 + rcx + 0x20] 140002009: 49 8d 04 0b lea rax, [r11 + rcx] 14000200d: 8b 68 24 mov ebp, dword ptr [rax + 0x24] 140002010: 49 03 f3 add rsi, r11 140002013: 44 8b 70 1c mov r14d, dword ptr [rax + 0x1c] 140002017: 49 03 eb add rbp, r11 14000201a: 8b 78 18 mov edi, dword ptr [rax + 0x18] 14000201d: 4d 03 f3 add r14, r11 140002020: 45 33 d2 xor r10d, r10d 140002023: 85 ff test edi, edi 140002025: 74 56 je bb_0x14000207d 140002027: 66 0f 1f 84 00 00 00 00 00 nop word ptr [rax + rax] bb_0x140002030: 140002030: 46 8b 04 96 mov r8d, dword ptr [rsi + 4*r10] 140002034: 48 c7 c1 ff ff ff ff mov rcx, -0x1 14000203b: 4d 03 c3 add r8, r11 14000203e: 41 b9 78 70 75 f8 mov r9d, 0xf8757078 bb_0x140002044: 140002044: 48 ff c1 inc rcx 140002047: 41 80 3c 08 00 cmp byte ptr [r8 + rcx], 0x0 14000204c: 75 f6 jne bb_0x140002044 14000204e: 33 d2 xor edx, edx 140002050: 48 85 c9 test rcx, rcx 140002053: 74 20 je bb_0x140002075 bb_0x140002055: 140002055: 42 0f be 04 02 movsx eax, byte ptr [rdx + r8] 14000205a: 48 ff c2 inc rdx 14000205d: 41 33 c1 xor eax, r9d 140002060: 44 69 c8 93 01 00 01 imul r9d, eax, 0x1000193 140002067: 48 3b d1 cmp rdx, rcx 14000206a: 72 e9 jb bb_0x140002055 14000206c: 41 81 f9 29 fd 35 ee cmp r9d, 0xee35fd29 140002073: 74 56 je bb_0x1400020cb bb_0x140002075: 140002075: 41 ff c2 inc r10d 140002078: 44 3b d7 cmp r10d, edi 14000207b: 72 b3 jb bb_0x140002030 bb_0x14000207d: 14000207d: 48 8b 1b mov rbx, qword ptr [rbx] 140002080: 49 3b df cmp rbx, r15 140002083: 0f 85 67 ff ff ff jne bb_0x140001ff0 140002089: 48 8b 74 24 60 mov rsi, qword ptr [rsp + 0x60] 14000208e: 33 ff xor edi, edi 140002090: 8b 6c 24 70 mov ebp, dword ptr [rsp + 0x70] 140002094: 4c 8b 74 24 68 mov r14, qword ptr [rsp + 0x68] bb_0x140002099: 140002099: 48 8b c7 mov rax, rdi bb_0x14000209c: 14000209c: 45 8b c4 mov r8d, r12d 14000209f: 49 8d 4d 18 lea rcx, [r13 + 0x18] 1400020a3: 49 8b d6 mov rdx, r14 1400020a6: 41 8b dc mov ebx, r12d 1400020a9: ff d0 call rax 1400020ab: 4c 8d 6e 18 lea r13, [rsi + 0x18] 1400020af: 48 8b ce mov rcx, rsi 1400020b2: 49 8b d5 mov rdx, r13 1400020b5: e8 a6 f5 ff ff call function_0x140001660_Code_x86_64 1400020ba: 4c 03 f3 add r14, rbx 1400020bd: 41 2b ec sub ebp, r12d 1400020c0: 4c 89 74 24 68 mov qword ptr [rsp + 0x68], r14 1400020c5: 89 6c 24 70 mov dword ptr [rsp + 0x70], ebp 1400020c9: eb 23 jmp bb_0x1400020ee bb_0x1400020cb: 1400020cb: 42 0f b7 4c 55 00 movzx ecx, word ptr [rbp + 2*r10] 1400020d1: 48 8b 74 24 60 mov rsi, qword ptr [rsp + 0x60] 1400020d6: 8b 6c 24 70 mov ebp, dword ptr [rsp + 0x70] 1400020da: 41 8b 04 8e mov eax, dword ptr [r14 + 4*rcx] 1400020de: 4c 8b 74 24 68 mov r14, qword ptr [rsp + 0x68] 1400020e3: 49 03 c3 add rax, r11 1400020e6: 33 ff xor edi, edi 1400020e8: eb b2 jmp bb_0x14000209c bb_0x1400020ea: 1400020ea: 4c 8d 69 18 lea r13, [rcx + 0x18] bb_0x1400020ee: 1400020ee: 83 fd 40 cmp ebp, 0x40 1400020f1: 0f 82 09 01 00 00 jb bb_0x140002200 1400020f7: 44 8b e5 mov r12d, ebp 1400020fa: 49 c1 ec 06 shr r12, 0x6 1400020fe: 66 90 nop bb_0x140002100: 140002100: e8 7b 21 00 00 call function_0x140004280_Code_x86_64 140002105: 48 8b 48 18 mov rcx, qword ptr [rax + 0x18] 140002109: 48 8b 59 20 mov rbx, qword ptr [rcx + 0x20] 14000210d: 4c 8b 79 28 mov r15, qword ptr [rcx + 0x28] 140002111: 49 3b df cmp rbx, r15 140002114: 0f 84 a9 00 00 00 je bb_0x1400021c3 14000211a: 66 0f 1f 44 00 00 nop word ptr [rax + rax] bb_0x140002120: 140002120: 4c 8b 5b 20 mov r11, qword ptr [rbx + 0x20] 140002124: 49 63 43 3c movsxd rax, dword ptr [r11 + 0x3c] 140002128: 42 8b 8c 18 88 00 00 00 mov ecx, dword ptr [rax + r11 + 0x88] 140002130: 85 c9 test ecx, ecx 140002132: 74 7d je bb_0x1400021b1 140002134: 41 8b 74 0b 20 mov esi, dword ptr [r11 + rcx + 0x20] 140002139: 49 8d 04 0b lea rax, [r11 + rcx] 14000213d: 8b 68 24 mov ebp, dword ptr [rax + 0x24] 140002140: 49 03 f3 add rsi, r11 140002143: 44 8b 70 1c mov r14d, dword ptr [rax + 0x1c] 140002147: 49 03 eb add rbp, r11 14000214a: 8b 78 18 mov edi, dword ptr [rax + 0x18] 14000214d: 4d 03 f3 add r14, r11 140002150: 45 33 d2 xor r10d, r10d 140002153: 85 ff test edi, edi 140002155: 74 5a je bb_0x1400021b1 140002157: 66 0f 1f 84 00 00 00 00 00 nop word ptr [rax + rax] bb_0x140002160: 140002160: 46 8b 04 96 mov r8d, dword ptr [rsi + 4*r10] 140002164: 48 c7 c0 ff ff ff ff mov rax, -0x1 14000216b: 4d 03 c3 add r8, r11 14000216e: 41 b9 78 70 75 f8 mov r9d, 0xf8757078 bb_0x140002174: 140002174: 48 ff c0 inc rax 140002177: 41 80 3c 00 00 cmp byte ptr [r8 + rax], 0x0 14000217c: 75 f6 jne bb_0x140002174 14000217e: 33 d2 xor edx, edx 140002180: 48 85 c0 test rax, rax 140002183: 74 24 je bb_0x1400021a9 bb_0x140002185: 140002185: 42 0f be 0c 02 movsx ecx, byte ptr [rdx + r8] 14000218a: 48 ff c2 inc rdx 14000218d: 41 33 c9 xor ecx, r9d 140002190: 44 69 c9 93 01 00 01 imul r9d, ecx, 0x1000193 140002197: 48 3b d0 cmp rdx, rax 14000219a: 72 e9 jb bb_0x140002185 14000219c: 41 81 f9 29 fd 35 ee cmp r9d, 0xee35fd29 1400021a3: 0f 84 48 01 00 00 je bb_0x1400022f1 bb_0x1400021a9: 1400021a9: 41 ff c2 inc r10d 1400021ac: 44 3b d7 cmp r10d, edi 1400021af: 72 af jb bb_0x140002160 bb_0x1400021b1: 1400021b1: 48 8b 1b mov rbx, qword ptr [rbx] 1400021b4: 49 3b df cmp rbx, r15 1400021b7: 0f 85 63 ff ff ff jne bb_0x140002120 1400021bd: 8b 6c 24 70 mov ebp, dword ptr [rsp + 0x70] 1400021c1: 33 ff xor edi, edi bb_0x1400021c3: 1400021c3: 48 8b c7 mov rax, rdi bb_0x1400021c6: 1400021c6: 4c 8b 74 24 68 mov r14, qword ptr [rsp + 0x68] 1400021cb: 41 b8 40 00 00 00 mov r8d, 0x40 1400021d1: 49 8b d6 mov rdx, r14 1400021d4: 49 8b cd mov rcx, r13 1400021d7: ff d0 call rax 1400021d9: 48 8b 4c 24 60 mov rcx, qword ptr [rsp + 0x60] 1400021de: 49 8b d5 mov rdx, r13 1400021e1: e8 7a f4 ff ff call function_0x140001660_Code_x86_64 1400021e6: 49 83 c6 40 add r14, 0x40 1400021ea: 83 c5 c0 add ebp, -0x40 1400021ed: 4c 89 74 24 68 mov qword ptr [rsp + 0x68], r14 1400021f2: 89 6c 24 70 mov dword ptr [rsp + 0x70], ebp 1400021f6: 49 83 ec 01 sub r12, 0x1 1400021fa: 0f 85 00 ff ff ff jne bb_0x140002100 bb_0x140002200: 140002200: e8 7b 20 00 00 call function_0x140004280_Code_x86_64 140002205: 48 8b 48 18 mov rcx, qword ptr [rax + 0x18] 140002209: 48 8b 59 20 mov rbx, qword ptr [rcx + 0x20] 14000220d: 4c 8b 79 28 mov r15, qword ptr [rcx + 0x28] 140002211: 49 3b df cmp rbx, r15 140002214: 0f 84 aa 00 00 00 je bb_0x1400022c4 14000221a: 66 0f 1f 44 00 00 nop word ptr [rax + rax] bb_0x140002220: 140002220: 4c 8b 5b 20 mov r11, qword ptr [rbx + 0x20] 140002224: 49 63 43 3c movsxd rax, dword ptr [r11 + 0x3c] 140002228: 42 8b 8c 18 88 00 00 00 mov ecx, dword ptr [rax + r11 + 0x88] 140002230: 85 c9 test ecx, ecx 140002232: 74 79 je bb_0x1400022ad 140002234: 41 8b 74 0b 20 mov esi, dword ptr [r11 + rcx + 0x20] 140002239: 49 8d 04 0b lea rax, [r11 + rcx] 14000223d: 8b 68 24 mov ebp, dword ptr [rax + 0x24] 140002240: 49 03 f3 add rsi, r11 140002243: 44 8b 70 1c mov r14d, dword ptr [rax + 0x1c] 140002247: 49 03 eb add rbp, r11 14000224a: 8b 78 18 mov edi, dword ptr [rax + 0x18] 14000224d: 4d 03 f3 add r14, r11 140002250: 45 33 d2 xor r10d, r10d 140002253: 85 ff test edi, edi 140002255: 74 56 je bb_0x1400022ad 140002257: 66 0f 1f 84 00 00 00 00 00 nop word ptr [rax + rax] bb_0x140002260: 140002260: 46 8b 04 96 mov r8d, dword ptr [rsi + 4*r10] 140002264: 48 c7 c1 ff ff ff ff mov rcx, -0x1 14000226b: 4d 03 c3 add r8, r11 14000226e: 41 b9 78 70 75 f8 mov r9d, 0xf8757078 bb_0x140002274: 140002274: 48 ff c1 inc rcx 140002277: 41 80 3c 08 00 cmp byte ptr [r8 + rcx], 0x0 14000227c: 75 f6 jne bb_0x140002274 14000227e: 33 d2 xor edx, edx 140002280: 48 85 c9 test rcx, rcx 140002283: 74 20 je bb_0x1400022a5 bb_0x140002285: 140002285: 42 0f be 04 02 movsx eax, byte ptr [rdx + r8] 14000228a: 48 ff c2 inc rdx 14000228d: 41 33 c1 xor eax, r9d 140002290: 44 69 c8 93 01 00 01 imul r9d, eax, 0x1000193 140002297: 48 3b d1 cmp rdx, rcx 14000229a: 72 e9 jb bb_0x140002285 14000229c: 41 81 f9 29 fd 35 ee cmp r9d, 0xee35fd29 1400022a3: 74 64 je bb_0x140002309 bb_0x1400022a5: 1400022a5: 41 ff c2 inc r10d 1400022a8: 44 3b d7 cmp r10d, edi 1400022ab: 72 b3 jb bb_0x140002260 bb_0x1400022ad: 1400022ad: 48 8b 1b mov rbx, qword ptr [rbx] 1400022b0: 49 3b df cmp rbx, r15 1400022b3: 0f 85 67 ff ff ff jne bb_0x140002220 1400022b9: 4c 8b 6c 24 60 mov r13, qword ptr [rsp + 0x60] 1400022be: 49 83 c5 18 add r13, 0x18 1400022c2: 33 ff xor edi, edi bb_0x1400022c4: 1400022c4: 44 8b 44 24 70 mov r8d, dword ptr [rsp + 0x70] 1400022c9: 49 8b cd mov rcx, r13 1400022cc: 48 8b 54 24 68 mov rdx, qword ptr [rsp + 0x68] 1400022d1: ff d7 call rdi bb_0x1400022d3: 1400022d3: 4c 8b 7c 24 20 mov r15, qword ptr [rsp + 0x20] 1400022d8: 4c 8b 6c 24 28 mov r13, qword ptr [rsp + 0x28] 1400022dd: 4c 8b 64 24 30 mov r12, qword ptr [rsp + 0x30] 1400022e2: 48 8b 5c 24 78 mov rbx, qword ptr [rsp + 0x78] 1400022e7: 48 83 c4 38 add rsp, 0x38 1400022eb: 41 5e pop r14 1400022ed: 5f pop rdi 1400022ee: 5e pop rsi 1400022ef: 5d pop rbp 1400022f0: c3 ret bb_0x1400022f1: 1400022f1: 42 0f b7 4c 55 00 movzx ecx, word ptr [rbp + 2*r10] 1400022f7: 8b 6c 24 70 mov ebp, dword ptr [rsp + 0x70] 1400022fb: 41 8b 04 8e mov eax, dword ptr [r14 + 4*rcx] 1400022ff: 49 03 c3 add rax, r11 140002302: 33 ff xor edi, edi 140002304: e9 bd fe ff ff jmp bb_0x1400021c6 bb_0x140002309: 140002309: 42 0f b7 4c 55 00 movzx ecx, word ptr [rbp + 2*r10] 14000230f: 4c 8b 6c 24 60 mov r13, qword ptr [rsp + 0x60] 140002314: 41 8b 3c 8e mov edi, dword ptr [r14 + 4*rcx] 140002318: 49 03 fb add rdi, r11 14000231b: 49 83 c5 18 add r13, 0x18 14000231f: eb a3 jmp bb_0x1400022c4
Loading...