Code:
005A48E0 83EC 2C SUB ESP,2C
005A48E3 A1 24D06800 MOV EAX,DWORD PTR DS:[__security_cookie]
005A48E8 53 PUSH EBX
005A48E9 8B5C24 34 MOV EBX,DWORD PTR SS:[ESP+34]
005A48ED 85DB TEST EBX,EBX
005A48EF 55 PUSH EBP
005A48F0 894424 30 MOV DWORD PTR SS:[ESP+30],EAX
005A48F4 8BE9 MOV EBP,ECX
005A48F6 74 0A JE SHORT 005A4902
005A48F8 8A85 C0130000 MOV AL,BYTE PTR SS:[EBP+13C0]
005A48FE 84C0 TEST AL,AL
005A4900 75 13 JNE SHORT 005A4915
005A4902 5D POP EBP
005A4903 33C0 XOR EAX,EAX
005A4905 5B POP EBX
005A4906 8B4C24 28 MOV ECX,DWORD PTR SS:[ESP+28]
005A490A E8 C36D0300 CALL __security_check_cookie
005A490F 83C4 2C ADD ESP,2C
005A4912 C2 0400 RETN 4
005A4915 66:8B0D E497650 MOV CX,WORD PTR DS:[6597E4]
005A491C A1 E0976500 MOV EAX,DWORD PTR DS:[6597E0] ; ASCII "token"
005A4921 33D2 XOR EDX,EDX
005A4923 66:894C24 20 MOV WORD PTR SS:[ESP+20],CX
005A4928 8B0D D4976500 MOV ECX,DWORD PTR DS:[6597D4] ; ASCII "n_secret"
005A492E 895424 22 MOV DWORD PTR SS:[ESP+22],EDX
005A4932 894424 1C MOV DWORD PTR SS:[ESP+1C],EAX
005A4936 A1 D0976500 MOV EAX,DWORD PTR DS:[6597D0] ; ASCII "token_secret"
005A493B 895424 26 MOV DWORD PTR SS:[ESP+26],EDX
005A493F 894C24 0C MOV DWORD PTR SS:[ESP+0C],ECX
005A4943 895424 2A MOV DWORD PTR SS:[ESP+2A],EDX
005A4947 894424 08 MOV DWORD PTR SS:[ESP+8],EAX
005A494B A0 DC976500 MOV AL,BYTE PTR DS:[6597DC]
005A4950 33C9 XOR ECX,ECX
005A4952 66:895424 2E MOV WORD PTR SS:[ESP+2E],DX
005A4957 8B15 D8976500 MOV EDX,DWORD PTR DS:[6597D8] ; ASCII "cret"
005A495D 894C24 15 MOV DWORD PTR SS:[ESP+15],ECX
005A4961 884424 14 MOV BYTE PTR SS:[ESP+14],AL
005A4965 66:894C24 19 MOV WORD PTR SS:[ESP+19],CX
005A496A 8D4424 1C LEA EAX,[ESP+1C]
005A496E 895424 10 MOV DWORD PTR SS:[ESP+10],EDX
005A4972 884C24 1B MOV BYTE PTR SS:[ESP+1B],CL
005A4976 8D50 01 LEA EDX,[EAX+1]
005A4979 8DA424 00000000 LEA ESP,[ESP]
005A4980 8A08 MOV CL,BYTE PTR DS:[EAX]
005A4982 40 INC EAX
005A4983 84C9 TEST CL,CL
005A4985 ^ 75 F9 JNE SHORT 005A4980
005A4987 2BC2 SUB EAX,EDX
005A4989 57 PUSH EDI
005A498A 8BF8 MOV EDI,EAX
005A498C 8D4424 0C LEA EAX,[ESP+0C]
005A4990 8D50 01 LEA EDX,[EAX+1]
005A4993 8A08 MOV CL,BYTE PTR DS:[EAX]
005A4995 40 INC EAX
005A4996 84C9 TEST CL,CL
005A4998 ^ 75 F9 JNE SHORT 005A4993
005A499A 2BC2 SUB EAX,EDX
005A499C 894424 3C MOV DWORD PTR SS:[ESP+3C],EAX
005A49A0 8B45 0C MOV EAX,DWORD PTR SS:[EBP+0C]
005A49A3 56 PUSH ESI
005A49A4 33F6 XOR ESI,ESI
005A49A6 85C0 TEST EAX,EAX
005A49A8 7E 34 JLE SHORT 005A49DE
005A49AA 8D9B 00000000 LEA EBX,[EBX]
005A49B0 8B45 10 MOV EAX,DWORD PTR SS:[EBP+10]
005A49B3 8378 18 10 CMP DWORD PTR DS:[EAX+18],10
005A49B7 72 05 JB SHORT 005A49BE
005A49B9 8B40 04 MOV EAX,DWORD PTR DS:[EAX+4]
005A49BC EB 03 JMP SHORT 005A49C1
005A49BE 83C0 04 ADD EAX,4
005A49C1 57 PUSH EDI
005A49C2 8D5424 28 LEA EDX,[ESP+28]
005A49C6 52 PUSH EDX
005A49C7 03C6 ADD EAX,ESI
005A49C9 50 PUSH EAX
005A49CA E8 F1840300 CALL strncmp
005A49CF 83C4 0C ADD ESP,0C
005A49D2 85C0 TEST EAX,EAX
005A49D4 74 1D JE SHORT 005A49F3
005A49D6 8B45 0C MOV EAX,DWORD PTR SS:[EBP+0C]
005A49D9 46 INC ESI
005A49DA 3BF0 CMP ESI,EAX
005A49DC ^ 7C D2 JL SHORT 005A49B0
005A49DE 5E POP ESI
005A49DF 5F POP EDI
005A49E0 5D POP EBP
005A49E1 33C0 XOR EAX,EAX
005A49E3 5B POP EBX
005A49E4 8B4C24 28 MOV ECX,DWORD PTR SS:[ESP+28]
005A49E8 E8 E56C0300 CALL __security_check_cookie
005A49ED 83C4 2C ADD ESP,2C
005A49F0 C2 0400 RETN 4
005A49F3 33C0 XOR EAX,EAX
005A49F5 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A49F8 BA 10000000 MOV EDX,10
005A49FD 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4A00 72 05 JB SHORT 005A4A07
005A4A02 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4A05 EB 03 JMP SHORT 005A4A0A
005A4A07 83C1 04 ADD ECX,4
005A4A0A 03C8 ADD ECX,EAX
005A4A0C 03CE ADD ECX,ESI
005A4A0E 8A4C39 03 MOV CL,BYTE PTR DS:[EDI+ECX+3]
005A4A12 80F9 22 CMP CL,22
005A4A15 880C18 MOV BYTE PTR DS:[EBX+EAX],CL
005A4A18 0F84 9C000000 JE 005A4ABA
005A4A1E 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4A21 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4A24 72 05 JB SHORT 005A4A2B
005A4A26 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4A29 EB 03 JMP SHORT 005A4A2E
005A4A2B 83C1 04 ADD ECX,4
005A4A2E 03C8 ADD ECX,EAX
005A4A30 03CE ADD ECX,ESI
005A4A32 8A4C39 04 MOV CL,BYTE PTR DS:[EDI+ECX+4]
005A4A36 80F9 22 CMP CL,22
005A4A39 884C18 01 MOV BYTE PTR DS:[EBX+EAX+1],CL
005A4A3D 74 5C JE SHORT 005A4A9B
005A4A3F 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4A42 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4A45 72 05 JB SHORT 005A4A4C
005A4A47 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4A4A EB 03 JMP SHORT 005A4A4F
005A4A4C 83C1 04 ADD ECX,4
005A4A4F 03C8 ADD ECX,EAX
005A4A51 03CE ADD ECX,ESI
005A4A53 8A4C39 05 MOV CL,BYTE PTR DS:[EDI+ECX+5]
005A4A57 80F9 22 CMP CL,22
005A4A5A 884C18 02 MOV BYTE PTR DS:[EBX+EAX+2],CL
005A4A5E 74 48 JE SHORT 005A4AA8
005A4A60 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4A63 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4A66 72 05 JB SHORT 005A4A6D
005A4A68 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4A6B EB 03 JMP SHORT 005A4A70
005A4A6D 83C1 04 ADD ECX,4
005A4A70 03C8 ADD ECX,EAX
005A4A72 03CE ADD ECX,ESI
005A4A74 8A4C39 06 MOV CL,BYTE PTR DS:[EDI+ECX+6]
005A4A78 80F9 22 CMP CL,22
005A4A7B 884C18 03 MOV BYTE PTR DS:[EBX+EAX+3],CL
005A4A7F 74 36 JE SHORT 005A4AB7
005A4A81 83C0 04 ADD EAX,4
005A4A84 3D 80000000 CMP EAX,80
005A4A89 ^ 0F8C 66FFFFFF JL 005A49F5
005A4A8F C60418 00 MOV BYTE PTR DS:[EBX+EAX],0
005A4A93 03C7 ADD EAX,EDI
005A4A95 8D7406 03 LEA ESI,[EAX+ESI+3]
005A4A99 EB 29 JMP SHORT 005A4AC4
005A4A9B 40 INC EAX
005A4A9C C60418 00 MOV BYTE PTR DS:[EBX+EAX],0
005A4AA0 03C7 ADD EAX,EDI
005A4AA2 8D7406 03 LEA ESI,[EAX+ESI+3]
005A4AA6 EB 1C JMP SHORT 005A4AC4
005A4AA8 83C0 02 ADD EAX,2
005A4AAB C60418 00 MOV BYTE PTR DS:[EBX+EAX],0
005A4AAF 03C7 ADD EAX,EDI
005A4AB1 8D7406 03 LEA ESI,[EAX+ESI+3]
005A4AB5 EB 0D JMP SHORT 005A4AC4
005A4AB7 83C0 03 ADD EAX,3
005A4ABA C60418 00 MOV BYTE PTR DS:[EBX+EAX],0
005A4ABE 03C7 ADD EAX,EDI
005A4AC0 8D7406 03 LEA ESI,[EAX+ESI+3]
005A4AC4 3B75 0C CMP ESI,DWORD PTR SS:[EBP+0C]
005A4AC7 ^ 0F8D 11FFFFFF JGE 005A49DE
005A4ACD EB 05 JMP SHORT 005A4AD4
005A4ACF BA 10000000 MOV EDX,10
005A4AD4 8B45 10 MOV EAX,DWORD PTR SS:[EBP+10]
005A4AD7 3950 18 CMP DWORD PTR DS:[EAX+18],EDX
005A4ADA 72 05 JB SHORT 005A4AE1
005A4ADC 8B40 04 MOV EAX,DWORD PTR DS:[EAX+4]
005A4ADF EB 03 JMP SHORT 005A4AE4
005A4AE1 83C0 04 ADD EAX,4
005A4AE4 8B7C24 40 MOV EDI,DWORD PTR SS:[ESP+40]
005A4AE8 57 PUSH EDI
005A4AE9 8D4C24 14 LEA ECX,[ESP+14]
005A4AED 51 PUSH ECX
005A4AEE 03C6 ADD EAX,ESI
005A4AF0 50 PUSH EAX
005A4AF1 E8 CA830300 CALL strncmp
005A4AF6 83C4 0C ADD ESP,0C
005A4AF9 85C0 TEST EAX,EAX
005A4AFB 74 1D JE SHORT 005A4B1A
005A4AFD 8B45 0C MOV EAX,DWORD PTR SS:[EBP+0C]
005A4B00 46 INC ESI
005A4B01 3BF0 CMP ESI,EAX
005A4B03 ^ 7C CA JL SHORT 005A4ACF
005A4B05 5E POP ESI
005A4B06 5F POP EDI
005A4B07 5D POP EBP
005A4B08 33C0 XOR EAX,EAX
005A4B0A 5B POP EBX
005A4B0B 8B4C24 28 MOV ECX,DWORD PTR SS:[ESP+28]
005A4B0F E8 BE6B0300 CALL __security_check_cookie
005A4B14 83C4 2C ADD ESP,2C
005A4B17 C2 0400 RETN 4
005A4B1A 33C0 XOR EAX,EAX
005A4B1C 8D6424 00 LEA ESP,[ESP]
005A4B20 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4B23 BA 10000000 MOV EDX,10
005A4B28 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4B2B 72 05 JB SHORT 005A4B32
005A4B2D 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4B30 EB 03 JMP SHORT 005A4B35
005A4B32 83C1 04 ADD ECX,4
005A4B35 03C8 ADD ECX,EAX
005A4B37 03CE ADD ECX,ESI
005A4B39 8A4C39 03 MOV CL,BYTE PTR DS:[EDI+ECX+3]
005A4B3D 80F9 22 CMP CL,22
005A4B40 888C03 80000000 MOV BYTE PTR DS:[EAX+EBX+80],CL
005A4B47 0F84 87000000 JE 005A4BD4
005A4B4D 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4B50 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4B53 72 05 JB SHORT 005A4B5A
005A4B55 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4B58 EB 03 JMP SHORT 005A4B5D
005A4B5A 83C1 04 ADD ECX,4
005A4B5D 03C8 ADD ECX,EAX
005A4B5F 03CE ADD ECX,ESI
005A4B61 8A4C39 04 MOV CL,BYTE PTR DS:[EDI+ECX+4]
005A4B65 80F9 22 CMP CL,22
005A4B68 888C18 81000000 MOV BYTE PTR DS:[EBX+EAX+81],CL
005A4B6F 74 58 JE SHORT 005A4BC9
005A4B71 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4B74 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4B77 72 05 JB SHORT 005A4B7E
005A4B79 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4B7C EB 03 JMP SHORT 005A4B81
005A4B7E 83C1 04 ADD ECX,4
005A4B81 03C8 ADD ECX,EAX
005A4B83 03CE ADD ECX,ESI
005A4B85 8A4C39 05 MOV CL,BYTE PTR DS:[EDI+ECX+5]
005A4B89 80F9 22 CMP CL,22
005A4B8C 888C18 82000000 MOV BYTE PTR DS:[EBX+EAX+82],CL
005A4B93 74 37 JE SHORT 005A4BCC
005A4B95 8B4D 10 MOV ECX,DWORD PTR SS:[EBP+10]
005A4B98 3951 18 CMP DWORD PTR DS:[ECX+18],EDX
005A4B9B 72 05 JB SHORT 005A4BA2
005A4B9D 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4]
005A4BA0 EB 03 JMP SHORT 005A4BA5
005A4BA2 83C1 04 ADD ECX,4
005A4BA5 03C8 ADD ECX,EAX
005A4BA7 03CE ADD ECX,ESI
005A4BA9 8A4C39 06 MOV CL,BYTE PTR DS:[EDI+ECX+6]
005A4BAD 80F9 22 CMP CL,22
005A4BB0 888C18 83000000 MOV BYTE PTR DS:[EBX+EAX+83],CL
005A4BB7 74 18 JE SHORT 005A4BD1
005A4BB9 83C0 04 ADD EAX,4
005A4BBC 3D 80000000 CMP EAX,80
005A4BC1 ^ 0F8C 59FFFFFF JL 005A4B20
005A4BC7 EB 0B JMP SHORT 005A4BD4
005A4BC9 40 INC EAX
005A4BCA EB 08 JMP SHORT 005A4BD4
005A4BCC 83C0 02 ADD EAX,2
005A4BCF EB 03 JMP SHORT 005A4BD4
005A4BD1 83C0 03 ADD EAX,3
005A4BD4 8B4C24 38 MOV ECX,DWORD PTR SS:[ESP+38]
005A4BD8 5E POP ESI
005A4BD9 5F POP EDI
005A4BDA C68418 80000000 MOV BYTE PTR DS:[EBX+EAX+80],0
005A4BE2 5D POP EBP
005A4BE3 B8 01000000 MOV EAX,1
005A4BE8 5B POP EBX
005A4BE9 E8 E46A0300 CALL __security_check_cookie
005A4BEE 83C4 2C ADD ESP,2C
005A4BF1 C2 0400 RETN 4