Skip to content

Instantly share code, notes, and snippets.

@AdiD253
Last active November 5, 2018 07:54
Show Gist options
  • Save AdiD253/3ab59310354a38c570bb114f0a42aa00 to your computer and use it in GitHub Desktop.
Save AdiD253/3ab59310354a38c570bb114f0a42aa00 to your computer and use it in GitHub Desktop.
.text:00030FF0 public Java_tech_skyrise_adriandefus_testsecurityapp_MainActivity_secretKey
.text:00030FF0 Java_tech_skyrise_adriandefus_testsecurityapp_MainActivity_secretKey proc near
.text:00030FF0 ; DATA XREF: LOAD:00000230↑o
.text:00030FF0
.text:00030FF0 arg_0 = dword ptr 8
.text:00030FF0
.text:00030FF0 push ebp
.text:00030FF1 mov ebp, esp
.text:00030FF3 push ebx
.text:00030FF4 push edi
.text:00030FF5 push esi
.text:00030FF6 and esp, 0FFFFFFF0h
.text:00030FF9 sub esp, 10h
.text:00030FFC call $+5
.text:00031001 pop ebx
.text:00031002 add ebx, 0A52C3h
.text:00031008 mov edi, [ebp+arg_0]
.text:0003100B mov dword ptr [esp], 10h ; unsigned int
.text:00031012 call __Znwj ; operator new(uint)
.text:00031017 mov esi, eax
.text:00031019 mov word ptr [eax+0Ch], 3D32h
.text:0003101F mov dword ptr [eax+8], 676E2D31h
.text:00031026 mov dword ptr [eax+4], 35553D61h
.text:0003102D mov dword ptr [eax], 3126626Ah
.text:00031033 mov byte ptr [eax+0Eh], 0
.text:00031037 mov eax, [edi]
.text:00031039 mov eax, [eax+29Ch]
.text:0003103F mov [esp+4], esi
.text:00031043 mov [esp], edi
.text:00031046 call eax
.text:00031048 mov edi, eax
.text:0003104A mov [esp], esi ; void *
.text:0003104D call __ZdlPv ; operator delete(void *)
.text:00031052 mov eax, edi
.text:00031054 lea esp, [ebp-0Ch]
.text:00031057 pop esi
.text:00031058 pop edi
.text:00031059 pop ebx
.text:0003105A pop ebp
.text:0003105B retn
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment