Explore
/
Sign In
/
Unknown
Unknown
Fork
Star
Artifacts
function
0x180002764:Code_x86_64
decompiled.c
0 lines
|
117.98 KB
_ABI(Microsoft_x86_64) generic64_t function_0x180002764_Code_x86_64(struct_371 *argument_0, generic64_t argument_1, generic64_t argument_2, generic64_t argument_3) { struct_285 stack; generic64_t var_0; stack.offset_32 = "kernel32.dll"; var_0 = &(&stack)[1]; if (segment_2.offset_992.member_2) { generic64_t var_1; generic64_t var_2; generic64_t var_3; generic64_t var_4; generic64_t var_5; generic64_t var_6; struct_254 var_7; var_5 = ((cabifunction_465 *) *(generic64_t *) "")((generic64_t) "U"); var_4 = ((cabifunction_466 *) *(generic64_t *) "")(0); var_3 = !var_5 ? var_4 : var_5; var_2 = function_0x180002694_Code_x86_64((struct_322 *) var_3, (generic64_t) "kernel32.dll", segment_1.offset_16, (generic64_t) function_0x1800024f4_Code_x86_64, var_7); var_1 = function_0x180002694_Code_x86_64((struct_322 *) var_3, (generic64_t) "kernel32.dll", segment_1.offset_104, (generic64_t) function_0x18000222c_Code_x86_64, var_7); var_6 = var_1 & var_2 & 0x1; if (segment_2.offset_1016) { struct_384 *var_8; var_8 = function_0x180002d90_Code_x86_64((generic64_t) segment_2.offset_1016, (generic64_t) "kernel32.dll", segment_1.offset_104, (generic64_t) function_0x18000222c_Code_x86_64); var_6 = var_1 & var_2 & 0x1; if (((number64_t) var_8 & 0xFFFFFFFF)) { generic64_t var_9; generic64_t var_10; generic64_t var_11; generic64_t var_12; struct_384 *var_13; struct_384 *var_14; generic64_t var_15; generic64_t var_16; struct_384 *var_17; struct_384 *var_18; struct_264 var_19; function_0x1800031a8_Code_x86_64(1024, 2, segment_1.offset_104); segment_2.offset_656 = var_8; var_18 = function_0x180003310_Code_x86_64(var_8, 0, 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_17 = function_0x180002fe4_Code_x86_64((generic64_t) var_8, 0, 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_16 = function_0x18000336c_Code_x86_64((struct_384 *) segment_2.offset_656, var_17, 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_15 = function_0x18000336c_Code_x86_64((struct_384 *) segment_2.offset_656, (struct_384 *) "\\", 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_14 = function_0x1800030a4_Code_x86_64((generic64_t) segment_2.offset_656, (generic64_t) "\\", 2048, (generic64_t) function_0x18000222c_Code_x86_64, var_19); var_13 = function_0x180002dd8_Code_x86_64(var_14, 0, 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_12 = function_0x18000336c_Code_x86_64((struct_384 *) segment_2.offset_656, var_13, 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_11 = function_0x18000336c_Code_x86_64((struct_384 *) segment_2.offset_656, (struct_384 *) "_", 2048, (generic64_t) function_0x18000222c_Code_x86_64); var_10 = function_0x180002694_Code_x86_64((struct_322 *) var_3, (generic64_t) "kernel32.dll", segment_1.offset_96, (generic64_t) function_0x18000224c_Code_x86_64, var_7); var_9 = function_0x180002694_Code_x86_64((struct_322 *) var_3, (generic64_t) "kernel32.dll", segment_1.offset_88, (generic64_t) function_0x180002324_Code_x86_64, var_7); var_6 = var_10 & var_9 & (var_1 & var_2 & 0x1); } } generic64_t var_20; generic64_t var_21; generic64_t var_22; generic64_t var_23; var_21 = function_0x180002694_Code_x86_64((struct_322 *) var_4, (generic64_t) "kernel32.dll", segment_1.offset_24, (generic64_t) function_0x1800024bc_Code_x86_64, var_7); var_20 = function_0x180002694_Code_x86_64((struct_322 *) var_4, (generic64_t) "kernel32.dll", *(generic64_t *) "ju", (generic64_t) function_0x1800024d8_Code_x86_64, var_7); var_22 = var_20; var_23 = var_6 & var_21 & 0xFFFFFFFF & var_22; if (var_3 != var_4) { generic64_t var_24; generic64_t var_25; generic64_t var_26; var_26 = function_0x180002694_Code_x86_64((struct_322 *) var_3, (generic64_t) "kernel32.dll", segment_1.offset_24, (generic64_t) function_0x1800024bc_Code_x86_64, var_7); var_24 = var_6 & var_21 & 0xFFFFFFFF & var_22 & var_26; var_25 = function_0x180002694_Code_x86_64((struct_322 *) var_3, (generic64_t) "kernel32.dll", *(generic64_t *) "ju", (generic64_t) function_0x1800024d8_Code_x86_64, var_7); var_22 = var_25; var_23 = var_24 & var_22; } var_0 = var_22; if (var_23) { generic64_t var_27; var_27 = function_0x180003334_Code_x86_64((generic64_t) "D", (generic64_t) "T", 1, (generic64_t) function_0x1800024d8_Code_x86_64); var_0 = var_27; } } return var_0; }
Loading...