Explore
/
Sign In
/
Unknown
Unknown
Fork
Star
Artifacts
function
0x1400010c0:Code_x86_64
disassembly.S
0 lines
|
41.13 KB
function_0x1400010c0_Code_x86_64: 1400010c0: 40 53 push rbx 1400010c2: 48 83 ec 20 sub rsp, 0x20 1400010c6: b9 01 00 00 00 mov ecx, 0x1 1400010cb: e8 9e 0b 00 00 call function_0x140001c6e_Code_x86_64 1400010d0: e8 d3 06 00 00 call function_0x1400017a8_Code_x86_64 1400010d5: 8b c8 mov ecx, eax 1400010d7: e8 c8 0b 00 00 call function_0x140001ca4_Code_x86_64 1400010dc: e8 bb 06 00 00 call function_0x14000179c_Code_x86_64 1400010e1: 8b d8 mov ebx, eax 1400010e3: e8 ec 0b 00 00 call function_0x140001cd4_Code_x86_64 1400010e8: b9 01 00 00 00 mov ecx, 0x1 1400010ed: 89 18 mov dword ptr [rax], ebx 1400010ef: e8 34 04 00 00 call function_0x140001528_Code_x86_64 1400010f4: 84 c0 test al, al 1400010f6: 74 73 je bb_0x14000116b 1400010f8: e8 23 09 00 00 call function_0x140001a20_Code_x86_64 1400010fd: 48 8d 0d 58 09 00 00 lea rcx, [rip + offset_to(0x140001a5c)] 140001104: e8 cf 05 00 00 call function_0x1400016d8_Code_x86_64 140001109: e8 92 06 00 00 call function_0x1400017a0_Code_x86_64 14000110e: 8b c8 mov ecx, eax 140001110: e8 65 0b 00 00 call function_0x140001c7a_Code_x86_64 140001115: 85 c0 test eax, eax 140001117: 75 52 jne bb_0x14000116b 140001119: e8 92 06 00 00 call function_0x1400017b0_Code_x86_64 14000111e: e8 c9 06 00 00 call function_0x1400017ec_Code_x86_64 140001123: 85 c0 test eax, eax 140001125: 74 0c je bb_0x140001133 140001127: 48 8d 0d 6e 06 00 00 lea rcx, [rip + offset_to(0x14000179c)] 14000112e: e8 41 0b 00 00 call function_0x140001c74_Code_x86_64 bb_0x140001133: 140001133: e8 8c 06 00 00 call function_0x1400017c4_Code_x86_64 140001138: e8 87 06 00 00 call function_0x1400017c4_Code_x86_64 14000113d: e8 5a 06 00 00 call function_0x14000179c_Code_x86_64 140001142: 8b c8 mov ecx, eax 140001144: e8 7f 0b 00 00 call function_0x140001cc8_Code_x86_64 140001149: e8 72 06 00 00 call function_0x1400017c0_Code_x86_64 14000114e: 84 c0 test al, al 140001150: 74 05 je bb_0x140001157 140001152: e8 29 0b 00 00 call function_0x140001c80_Code_x86_64 bb_0x140001157: 140001157: e8 40 06 00 00 call function_0x14000179c_Code_x86_64 14000115c: e8 f7 07 00 00 call function_0x140001958_Code_x86_64 140001161: 85 c0 test eax, eax 140001163: 75 06 jne bb_0x14000116b 140001165: 48 83 c4 20 add rsp, 0x20 140001169: 5b pop rbx 14000116a: c3 ret bb_0x14000116b: 14000116b: b9 07 00 00 00 mov ecx, 0x7 140001170: e8 9b 06 00 00 call function_0x140001810_Code_x86_64
Loading...