Explore
/
Sign In
/
Unknown
Unknown
Fork
Star
Artifacts
function
0x18000963b:Code_x86_64
disassembly.S
0 lines
|
73.88 KB
function_0x18000963b_Code_x86_64: 18000963b: 55 push rbp 18000963c: 48 89 e5 mov rbp, rsp 18000963f: 48 8b 05 da 2b 00 00 mov rax, qword ptr [rip + offset_to(0x18000c220)] 180009646: c7 00 00 00 00 00 mov dword ptr [rax], 0x0 18000964c: 5d pop rbp 18000964d: e9 00 00 00 00 jmp 0x180009652 180009652: 55 push rbp 180009653: 41 57 push r15 180009655: 41 56 push r14 180009657: 56 push rsi 180009658: 57 push rdi 180009659: 53 push rbx 18000965a: 48 83 ec 28 sub rsp, 0x28 18000965e: 48 8d 6c 24 20 lea rbp, [rsp + 0x20] 180009663: 4c 8b 3d be 2b 00 00 mov r15, qword ptr [rip + offset_to(0x18000c228)] 18000966a: 41 89 17 mov dword ptr [r15], edx 18000966d: 31 ff xor edi, edi 18000966f: 8b 05 6b 6c 00 00 mov eax, dword ptr [rip + offset_to(0x1800102e0)] 180009675: 09 d0 or eax, edx 180009677: 0f 84 c1 00 00 00 je bb_0x18000973e 18000967d: 4c 89 c6 mov rsi, r8 180009680: 41 89 d6 mov r14d, edx 180009683: 48 89 cb mov rbx, rcx 180009686: e8 6d 02 00 00 call function_0x1800098f8_Code_x86_64 18000968b: 41 8d 46 ff lea eax, [r14 - 0x1] 18000968f: 83 f8 01 cmp eax, 0x1 180009692: 77 37 ja bb_0x1800096cb 180009694: 48 89 d9 mov rcx, rbx 180009697: 44 89 f2 mov edx, r14d 18000969a: 49 89 f0 mov r8, rsi 18000969d: e8 07 fe ff ff call function_0x1800094a9_Code_x86_64 1800096a2: 85 c0 test eax, eax 1800096a4: 0f 84 94 00 00 00 je bb_0x18000973e 1800096aa: 48 89 d9 mov rcx, rbx 1800096ad: 44 89 f2 mov edx, r14d 1800096b0: 49 89 f0 mov r8, rsi 1800096b3: e8 bc 00 00 00 call function_0x180009774_Code_x86_64 1800096b8: 85 c0 test eax, eax 1800096ba: 0f 84 94 00 00 00 je bb_0x180009754 1800096c0: 41 83 fe 01 cmp r14d, 0x1 1800096c4: 75 05 jne bb_0x1800096cb 1800096c6: e8 dc 01 00 00 call function_0x1800098a7_Code_x86_64 bb_0x1800096cb: 1800096cb: 48 89 d9 mov rcx, rbx 1800096ce: 44 89 f2 mov edx, r14d 1800096d1: 49 89 f0 mov r8, rsi 1800096d4: e8 a7 00 00 00 call function_0x180009780_Code_x86_64 1800096d9: 89 c7 mov edi, eax 1800096db: 44 89 f0 mov eax, r14d 1800096de: 83 f0 01 xor eax, 0x1 1800096e1: 09 f8 or eax, edi 1800096e3: 74 30 je bb_0x180009715 1800096e5: 41 83 fe 03 cmp r14d, 0x3 1800096e9: 74 05 je bb_0x1800096f0 1800096eb: 45 85 f6 test r14d, r14d 1800096ee: 75 4e jne bb_0x18000973e bb_0x1800096f0: 1800096f0: 48 89 d9 mov rcx, rbx 1800096f3: 44 89 f2 mov edx, r14d 1800096f6: 49 89 f0 mov r8, rsi 1800096f9: e8 76 00 00 00 call function_0x180009774_Code_x86_64 1800096fe: 89 c7 mov edi, eax 180009700: 48 89 d9 mov rcx, rbx 180009703: 44 89 f2 mov edx, r14d 180009706: 49 89 f0 mov r8, rsi 180009709: e8 9b fd ff ff call function_0x1800094a9_Code_x86_64 18000970e: 85 c0 test eax, eax 180009710: 0f 44 f8 cmove edi, eax 180009713: eb 29 jmp bb_0x18000973e bb_0x180009715: 180009715: 31 ff xor edi, edi 180009717: 48 89 d9 mov rcx, rbx 18000971a: 31 d2 xor edx, edx 18000971c: 49 89 f0 mov r8, rsi 18000971f: e8 5c 00 00 00 call function_0x180009780_Code_x86_64 180009724: 48 89 d9 mov rcx, rbx 180009727: 31 d2 xor edx, edx 180009729: 49 89 f0 mov r8, rsi 18000972c: e8 43 00 00 00 call function_0x180009774_Code_x86_64 bb_0x180009731: 180009731: 48 89 d9 mov rcx, rbx 180009734: 31 d2 xor edx, edx 180009736: 49 89 f0 mov r8, rsi 180009739: e8 6b fd ff ff call function_0x1800094a9_Code_x86_64 bb_0x18000973e: 18000973e: 41 c7 07 ff ff ff ff mov dword ptr [r15], 0xffffffff 180009745: 89 f8 mov eax, edi 180009747: 48 83 c4 28 add rsp, 0x28 18000974b: 5b pop rbx 18000974c: 5f pop rdi 18000974d: 5e pop rsi 18000974e: 41 5e pop r14 180009750: 41 5f pop r15 180009752: 5d pop rbp 180009753: c3 ret bb_0x180009754: 180009754: 41 83 fe 01 cmp r14d, 0x1 180009758: 75 e4 jne bb_0x18000973e 18000975a: 31 ff xor edi, edi 18000975c: eb d3 jmp bb_0x180009731
Loading...