Shellphish targetted CodeJitsu running CROMU_00088 in round 64.


Type 2 POV

Reading from protected address: 0x4347c000

0x805163e : mov eax,dword ptr [eax]

Tracing data from eip: 0x805163e tracing source of register: eax (value: 0x4347c000)

0x804a515 : mov dword ptr [esp+0x4],0x4347c000
0x804dfb2 : mov esi,dword ptr [ebp+0xc]
0x804dfbb : mov dword ptr [ebp-0x18],esi
0x804e18f : mov ecx,dword ptr [ebp-0x18]
0x804e195 : mov dword ptr [esi],ecx
0x805163e : mov eax,dword ptr [eax]
0x8051643 : mov dword ptr [ecx],eax
0x805163e : mov eax,dword ptr [eax]
0x8051643 : mov dword ptr [ecx],eax
0x804d00e : mov edx,dword ptr [edx]
0x804d01c : add edx,dword ptr [ecx+0xc]
0x804d025 : mov dword ptr [esp+0x4],edx
0x8051619 : mov ecx,dword ptr [ebp+0xc]
0x8051622 : mov dword ptr [ebp-0x8],ecx
0x805163b : mov eax,dword ptr [ebp-0x8]
0x805163e: mov eax,dword ptr [eax] // address: eax value: 0x4347c000

Curated by Lunge Technology, LLC. Questions or comments? Send us email