Dump of assembler code for function main: 0x08048723 : push ebp 0x08048724 : mov ebp,esp 0x08048726 : push edi 0x08048727 : push esi 0x08048728 : push ebx 0x08048729 : and esp,0xfffffff0 0x0804872c : sub esp,0x1d0 0x08048732 : mov eax,DWORD PTR [ebp+0xc] 0x08048735 : mov DWORD PTR [esp+0x1c],eax 0x08048739 : mov eax,DWORD PTR [ebp+0x10] 0x0804873c : mov DWORD PTR [esp+0x18],eax 0x08048740 : mov eax,gs:0x14 0x08048746 : mov DWORD PTR [esp+0x1cc],eax 0x0804874d : xor eax,eax 0x0804874f : mov DWORD PTR [esp+0x1b4],0x0 0x0804875a : mov DWORD PTR [esp+0x1b8],0x0 0x08048765 : mov DWORD PTR [esp+0x1bc],0x0 0x08048770 : mov DWORD PTR [esp+0x1c0],0x0 0x0804877b : mov DWORD PTR [esp+0x1c4],0x0 0x08048786 : mov DWORD PTR [esp+0x1c8],0x0 0x08048791 : lea ebx,[esp+0x24] 0x08048795 : mov eax,0x0 0x0804879a : mov edx,0x64 0x0804879f : mov edi,ebx 0x080487a1 : mov ecx,edx 0x080487a3 : rep stos DWORD PTR es:[edi],eax 0x080487a5 : jmp 0x80487ea 0x080487a7 : mov eax,DWORD PTR [esp+0x1c] 0x080487ab : mov eax,DWORD PTR [eax] 0x080487ad : mov DWORD PTR [esp+0x14],0xffffffff 0x080487b5 : mov edx,eax 0x080487b7 : mov eax,0x0 0x080487bc : mov ecx,DWORD PTR [esp+0x14] 0x080487c0 : mov edi,edx 0x080487c2 : repnz scas al,BYTE PTR es:[edi] 0x080487c4 : mov eax,ecx 0x080487c6 : not eax 0x080487c8 : lea edx,[eax-0x1] 0x080487cb : mov eax,DWORD PTR [esp+0x1c] 0x080487cf : mov eax,DWORD PTR [eax] 0x080487d1 : mov DWORD PTR [esp+0x8],edx 0x080487d5 : mov DWORD PTR [esp+0x4],0x0 0x080487dd : mov DWORD PTR [esp],eax 0x080487e0 : call 0x80484f0 0x080487e5 : add DWORD PTR [esp+0x1c],0x4 0x080487ea : mov eax,DWORD PTR [esp+0x1c] 0x080487ee : mov eax,DWORD PTR [eax] 0x080487f0 : test eax,eax 0x080487f2 : jne 0x80487a7 0x080487f4 : jmp 0x8048839 0x080487f6 : mov eax,DWORD PTR [esp+0x18] 0x080487fa : mov eax,DWORD PTR [eax] 0x080487fc : mov DWORD PTR [esp+0x14],0xffffffff 0x08048804 : mov edx,eax 0x08048806 : mov eax,0x0 0x0804880b : mov ecx,DWORD PTR [esp+0x14] 0x0804880f : mov edi,edx 0x08048811 : repnz scas al,BYTE PTR es:[edi] 0x08048813 : mov eax,ecx 0x08048815 : not eax 0x08048817 : lea edx,[eax-0x1] 0x0804881a : mov eax,DWORD PTR [esp+0x18] 0x0804881e : mov eax,DWORD PTR [eax] 0x08048820 : mov DWORD PTR [esp+0x8],edx 0x08048824 : mov DWORD PTR [esp+0x4],0x0 0x0804882c : mov DWORD PTR [esp],eax 0x0804882f : call 0x80484f0 0x08048834 : add DWORD PTR [esp+0x18],0x4 0x08048839 : mov eax,DWORD PTR [esp+0x18] 0x0804883d : mov eax,DWORD PTR [eax] 0x0804883f : test eax,eax 0x08048841 : jne 0x80487f6 0x08048843 : mov DWORD PTR [esp],0x8048b38 0x0804884a : call 0x80484c0 0x0804884f : mov eax,0x8048d4b 0x08048854 : mov DWORD PTR [esp],eax 0x08048857 : call 0x8048470 0x0804885c : mov DWORD PTR [esp+0x1b4],0x1 0x08048867 : mov eax,ds:0x804a040 0x0804886c : mov DWORD PTR [esp+0x8],eax 0x08048870 : mov DWORD PTR [esp+0x4],0x14 0x08048878 : lea eax,[esp+0x1b8] 0x0804887f : mov DWORD PTR [esp],eax 0x08048882 : call 0x80484a0 0x08048887 : lea eax,[esp+0x1b8] 0x0804888e : mov DWORD PTR [esp+0x14],0xffffffff 0x08048896 : mov edx,eax 0x08048898 : mov eax,0x0 0x0804889d : mov ecx,DWORD PTR [esp+0x14] 0x080488a1 : mov edi,edx 0x080488a3 : repnz scas al,BYTE PTR es:[edi] 0x080488a5 : mov eax,ecx 0x080488a7 : not eax 0x080488a9 : sub eax,0x1 0x080488ac : sub eax,0x1 0x080488af : mov BYTE PTR [esp+eax*1+0x1b8],0x0 0x080488b7 : lea eax,[esp+0x1b8] 0x080488be : mov edx,eax 0x080488c0 : mov eax,0x8048d5b 0x080488c5 : mov ecx,0x5 0x080488ca : mov esi,edx 0x080488cc : mov edi,eax 0x080488ce : repz cmps BYTE PTR ds:[esi],BYTE PTR es:[edi] 0x080488d0 : seta dl 0x080488d3 : setb al 0x080488d6 : mov ecx,edx 0x080488d8 : sub cl,al 0x080488da : mov eax,ecx 0x080488dc : movsx eax,al 0x080488df : test eax,eax 0x080488e1 : jne 0x80488f8 0x080488e3 : lea eax,[esp+0x24] 0x080488e7 : mov DWORD PTR [esp],eax 0x080488ea : call 0x8048630 0x080488ef : mov DWORD PTR [esp+0x1b4],eax 0x080488f6 : jmp 0x8048965 0x080488f8 : lea eax,[esp+0x1b8] 0x080488ff : mov edx,eax 0x08048901 : mov eax,0x8048d61 0x08048906 : mov ecx,0x4 0x0804890b : mov esi,edx 0x0804890d : mov edi,eax 0x0804890f : repz cmps BYTE PTR ds:[esi],BYTE PTR es:[edi] 0x08048911 : seta dl 0x08048914 : setb al 0x08048917 : mov ecx,edx 0x08048919 : sub cl,al 0x0804891b : mov eax,ecx 0x0804891d : movsx eax,al 0x08048920 : test eax,eax 0x08048922 : jne 0x8048939 0x08048924 : lea eax,[esp+0x24] 0x08048928 : mov DWORD PTR [esp],eax 0x0804892b : call 0x80486d7 0x08048930 : mov DWORD PTR [esp+0x1b4],eax 0x08048937 : jmp 0x8048965 0x08048939 : lea eax,[esp+0x1b8] 0x08048940 : mov edx,eax 0x08048942 : mov eax,0x8048d66 0x08048947 : mov ecx,0x4 0x0804894c : mov esi,edx 0x0804894e : mov edi,eax 0x08048950 : repz cmps BYTE PTR ds:[esi],BYTE PTR es:[edi] 0x08048952 : seta dl 0x08048955 : setb al 0x08048958 : mov ecx,edx 0x0804895a : sub cl,al 0x0804895c : mov eax,ecx 0x0804895e : movsx eax,al 0x08048961 : test eax,eax 0x08048963 : je 0x80489cf 0x08048965 : cmp DWORD PTR [esp+0x1b4],0x0 0x0804896d : je 0x8048989 0x0804896f : mov eax,0x8048d6b 0x08048974 : lea edx,[esp+0x1b8] 0x0804897b : mov DWORD PTR [esp+0x4],edx 0x0804897f : mov DWORD PTR [esp],eax 0x08048982 : call 0x8048470 0x08048987 : jmp 0x80489a1 0x08048989 : mov eax,0x8048d88 0x0804898e : lea edx,[esp+0x1b8] 0x08048995 : mov DWORD PTR [esp+0x4],edx 0x08048999 : mov DWORD PTR [esp],eax 0x0804899c : call 0x8048470 0x080489a1 : lea eax,[esp+0x1b8] 0x080489a8 : mov DWORD PTR [eax],0x0 0x080489ae : mov DWORD PTR [eax+0x4],0x0 0x080489b5 : mov DWORD PTR [eax+0x8],0x0 0x080489bc : mov DWORD PTR [eax+0xc],0x0 0x080489c3 : mov DWORD PTR [eax+0x10],0x0 0x080489ca : jmp 0x804884f 0x080489cf : nop 0x080489d0 : mov eax,0x0 0x080489d5 : mov esi,DWORD PTR [esp+0x1cc] 0x080489dc : xor esi,DWORD PTR gs:0x14 0x080489e3 : je 0x80489ea 0x080489e5 : call 0x80484b0 <__stack_chk_fail@plt> 0x080489ea : lea esp,[ebp-0xc] 0x080489ed : pop ebx 0x080489ee : pop esi 0x080489ef : pop edi 0x080489f0 : pop ebp 0x080489f1 : ret End of assembler dump.