TransWikia.com

How to track output parameters in disassembly?

Reverse Engineering Asked by Bhavya Singh on November 10, 2020

I have the following disassembly of winload!CmpFindNlsData function and I need to check the output parameters of this function.
P.S.: CmpFindNLSData(int a1<eax>, int a2, PUNICODE_STRING pAnsiFileName, PUNICODE_STRING pOemFileName, PUNICODE_STRING pustrDefaultLanguage, PUNICODE_STRING pustrOemHalFontName) could be the declaration of this function. This is my first attempt at reverse engineering, could someone please guide through the steps I could take up to define the algorithm of this function.

winload!CmpFindNLSData:
00893c10 8bff            mov     edi,edi
00893c12 55              push    ebp
00893c13 8bec            mov     ebp,esp
00893c15 83ec40          sub     esp,40h
00893c18 53              push    ebx
00893c19 56              push    esi
00893c1a 57              push    edi
00893c1b 8d45e0          lea     eax,[ebp-20h]
00893c1e 8bf1            mov     esi,ecx
00893c20 50              push    eax
00893c21 33db            xor     ebx,ebx
00893c23 8975ec          mov     dword ptr [ebp-14h],esi
00893c26 83cfff          or      edi,0FFFFFFFFh
00893c29 895dcc          mov     dword ptr [ebp-34h],ebx
00893c2c 52              push    edx
00893c2d 56              push    esi
00893c2e 897dc8          mov     dword ptr [ebp-38h],edi
00893c31 897dd0          mov     dword ptr [ebp-30h],edi
00893c34 895dd4          mov     dword ptr [ebp-2Ch],ebx
00893c37 897de0          mov     dword ptr [ebp-20h],edi
00893c3a 895de4          mov     dword ptr [ebp-1Ch],ebx
00893c3d 897dc0          mov     dword ptr [ebp-40h],edi
00893c40 895dc4          mov     dword ptr [ebp-3Ch],ebx
00893c43 895de8          mov     dword ptr [ebp-18h],ebx
00893c46 ff5604          call    dword ptr [esi+4]
00893c49 85c0            test    eax,eax
00893c4b 0f845d010000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893c51 8d4df4          lea     ecx,[ebp-0Ch]
00893c54 8bd0            mov     edx,eax
00893c56 51              push    ecx
00893c57 68b8208e00      push    offset winload!CmpControlString (008e20b8)
00893c5c 8bce            mov     ecx,esi
00893c5e e869510000      call    winload!CmpFindSubKeyByNameWithStatus (00898dcc)
00893c63 8d45e0          lea     eax,[ebp-20h]
00893c66 50              push    eax
00893c67 56              push    esi
00893c68 ff5608          call    dword ptr [esi+8]
00893c6b 397df4          cmp     dword ptr [ebp-0Ch],edi
00893c6e 0f843a010000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893c74 8d45e0          lea     eax,[ebp-20h]
00893c77 50              push    eax
00893c78 ff75f4          push    dword ptr [ebp-0Ch]
00893c7b 56              push    esi
00893c7c ff5604          call    dword ptr [esi+4]
00893c7f 85c0            test    eax,eax
00893c81 0f8427010000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893c87 8d4df4          lea     ecx,[ebp-0Ch]
00893c8a 8bd0            mov     edx,eax
00893c8c 51              push    ecx
00893c8d 68f8208e00      push    offset winload!CmpNlsString (008e20f8)
00893c92 8bce            mov     ecx,esi
00893c94 e833510000      call    winload!CmpFindSubKeyByNameWithStatus (00898dcc)
00893c99 8d45e0          lea     eax,[ebp-20h]
00893c9c 50              push    eax
00893c9d 56              push    esi
00893c9e ff5608          call    dword ptr [esi+8]
00893ca1 397df4          cmp     dword ptr [ebp-0Ch],edi
00893ca4 0f8404010000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893caa 8d45e0          lea     eax,[ebp-20h]
00893cad 50              push    eax
00893cae ff75f4          push    dword ptr [ebp-0Ch]
00893cb1 56              push    esi
00893cb2 ff5604          call    dword ptr [esi+4]
00893cb5 85c0            test    eax,eax
00893cb7 0f84f1000000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893cbd 8d4df4          lea     ecx,[ebp-0Ch]
00893cc0 8bd0            mov     edx,eax
00893cc2 51              push    ecx
00893cc3 6808218e00      push    offset winload!CmpCodePageString (008e2108)
00893cc8 8bce            mov     ecx,esi
00893cca e8fd500000      call    winload!CmpFindSubKeyByNameWithStatus (00898dcc)
00893ccf 8d45e0          lea     eax,[ebp-20h]
00893cd2 50              push    eax
00893cd3 56              push    esi
00893cd4 ff5608          call    dword ptr [esi+8]
00893cd7 397df4          cmp     dword ptr [ebp-0Ch],edi
00893cda 0f84ce000000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893ce0 8d45e0          lea     eax,[ebp-20h]
00893ce3 50              push    eax
00893ce4 ff75f4          push    dword ptr [ebp-0Ch]
00893ce7 56              push    esi
00893ce8 ff5604          call    dword ptr [esi+4]
00893ceb 85c0            test    eax,eax
00893ced 0f84bb000000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893cf3 6870228e00      push    offset winload!CmpAcpString (008e2270)
00893cf8 8bd0            mov     edx,eax
00893cfa 8bce            mov     ecx,esi
00893cfc e885330000      call    winload!CmpFindValueByName (00897086)
00893d01 8bf8            mov     edi,eax
00893d03 8d45e0          lea     eax,[ebp-20h]
00893d06 50              push    eax
00893d07 56              push    esi
00893d08 ff5608          call    dword ptr [esi+8]
00893d0b 83ffff          cmp     edi,0FFFFFFFFh
00893d0e 0f849a000000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893d14 8d45d0          lea     eax,[ebp-30h]
00893d17 50              push    eax
00893d18 57              push    edi
00893d19 56              push    esi
00893d1a ff5604          call    dword ptr [esi+4]
00893d1d 85c0            test    eax,eax
00893d1f 0f8489000000    je      winload!CmpFindNLSData+0x19e (00893dae)
00893d25 8d4dc8          lea     ecx,[ebp-38h]
00893d28 8bd7            mov     edx,edi
00893d2a 51              push    ecx
00893d2b 8d4df8          lea     ecx,[ebp-8]
00893d2e 51              push    ecx
00893d2f 50              push    eax
00893d30 8bce            mov     ecx,esi
00893d32 e8c7340000      call    winload!CmpValueToData (008971fe)
00893d37 8bf8            mov     edi,eax
00893d39 8d45d0          lea     eax,[ebp-30h]
00893d3c 50              push    eax
00893d3d 56              push    esi
00893d3e 897ddc          mov     dword ptr [ebp-24h],edi
00893d41 ff5608          call    dword ptr [esi+8]
00893d44 85ff            test    edi,edi
00893d46 7466            je      winload!CmpFindNLSData+0x19e (00893dae)
00893d48 8b55f8          mov     edx,dword ptr [ebp-8]
00893d4b 33c9            xor     ecx,ecx
00893d4d 33c0            xor     eax,eax
00893d4f 668955da        mov     word ptr [ebp-26h],dx
00893d53 66894dd8        mov     word ptr [ebp-28h],cx
00893d57 c745f002000000  mov     dword ptr [ebp-10h],2
00893d5e 663bc2          cmp     ax,dx
00893d61 731d            jae     winload!CmpFindNLSData+0x170 (00893d80)
00893d63 8b75f0          mov     esi,dword ptr [ebp-10h]
00893d66 0fb7c1          movzx   eax,cx
00893d69 d1e8            shr     eax,1
00893d6b 66391c47        cmp     word ptr [edi+eax*2],bx
00893d6f 740c            je      winload!CmpFindNLSData+0x16d (00893d7d)
00893d71 6603ce          add     cx,si
00893d74 66894dd8        mov     word ptr [ebp-28h],cx
00893d78 663bca          cmp     cx,dx
00893d7b 72e9            jb      winload!CmpFindNLSData+0x156 (00893d66)
00893d7d 8b75ec          mov     esi,dword ptr [ebp-14h]
00893d80 8b5d08          mov     ebx,dword ptr [ebp+8]
00893d83 6a36            push    36h
00893d85 58              pop     eax
00893d86 663907          cmp     word ptr [edi],ax
00893d89 750c            jne     winload!CmpFindNLSData+0x187 (00893d97)
00893d8b c745e801000000  mov     dword ptr [ebp-18h],1
00893d92 e992000000      jmp     winload!CmpFindNLSData+0x219 (00893e29)
00893d97 8d45e0          lea     eax,[ebp-20h]
00893d9a 50              push    eax
00893d9b ff75f4          push    dword ptr [ebp-0Ch]
00893d9e 56              push    esi
00893d9f ff5604          call    dword ptr [esi+4]
00893da2 85c0            test    eax,eax
00893da4 7513            jne     winload!CmpFindNLSData+0x1a9 (00893db9)
00893da6 8d45c8          lea     eax,[ebp-38h]
00893da9 50              push    eax
00893daa 56              push    esi
00893dab ff5608          call    dword ptr [esi+8]
00893dae 32c0            xor     al,al
00893db0 5f              pop     edi
00893db1 5e              pop     esi
00893db2 5b              pop     ebx
00893db3 8be5            mov     esp,ebp
00893db5 5d              pop     ebp
00893db6 c20c00          ret     0Ch
00893db9 8d4dd8          lea     ecx,[ebp-28h]
00893dbc 8bd0            mov     edx,eax
00893dbe 51              push    ecx
00893dbf 8bce            mov     ecx,esi
00893dc1 e8c0320000      call    winload!CmpFindValueByName (00897086)
00893dc6 8bf8            mov     edi,eax
00893dc8 8d45c8          lea     eax,[ebp-38h]
00893dcb 50              push    eax
00893dcc 56              push    esi
00893dcd ff5608          call    dword ptr [esi+8]
00893dd0 33c0            xor     eax,eax
00893dd2 8945dc          mov     dword ptr [ebp-24h],eax
00893dd5 8d45e0          lea     eax,[ebp-20h]
00893dd8 50              push    eax
00893dd9 56              push    esi
00893dda ff5608          call    dword ptr [esi+8]
00893ddd 83ffff          cmp     edi,0FFFFFFFFh
00893de0 74cc            je      winload!CmpFindNLSData+0x19e (00893dae)
00893de2 8d45d0          lea     eax,[ebp-30h]
00893de5 50              push    eax
00893de6 57              push    edi
00893de7 56              push    esi
00893de8 ff5604          call    dword ptr [esi+4]
00893deb 85c0            test    eax,eax
00893ded 74bf            je      winload!CmpFindNLSData+0x19e (00893dae)
00893def 8d4dc0          lea     ecx,[ebp-40h]
00893df2 8bd7            mov     edx,edi
00893df4 51              push    ecx
00893df5 8d4df8          lea     ecx,[ebp-8]
00893df8 51              push    ecx
00893df9 50              push    eax
00893dfa 8bce            mov     ecx,esi
00893dfc e8fd330000      call    winload!CmpValueToData (008971fe)
00893e01 894304          mov     dword ptr [ebx+4],eax
00893e04 85c0            test    eax,eax
00893e06 7408            je      winload!CmpFindNLSData+0x200 (00893e10)
00893e08 8d45c0          lea     eax,[ebp-40h]
00893e0b 50              push    eax
00893e0c 56              push    esi
00893e0d ff5608          call    dword ptr [esi+8]
00893e10 8d45d0          lea     eax,[ebp-30h]
00893e13 50              push    eax
00893e14 56              push    esi
00893e15 ff5608          call    dword ptr [esi+8]
00893e18 33c0            xor     eax,eax
00893e1a 394304          cmp     dword ptr [ebx+4],eax
00893e1d 748f            je      winload!CmpFindNLSData+0x19e (00893dae)
00893e1f 8b45f8          mov     eax,dword ptr [ebp-8]
00893e22 66894302        mov     word ptr [ebx+2],ax
00893e26 668903          mov     word ptr [ebx],ax
00893e29 8d45e0          lea     eax,[ebp-20h]
00893e2c 50              push    eax
00893e2d ff75f4          push    dword ptr [ebp-0Ch]
00893e30 56              push    esi
00893e31 ff5604          call    dword ptr [esi+4]
00893e34 85c0            test    eax,eax
00893e36 0f8472ffffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893e3c 6848228e00      push    offset winload!CmpOemCpString (008e2248)
00893e41 8bd0            mov     edx,eax
00893e43 8bce            mov     ecx,esi
00893e45 e83c320000      call    winload!CmpFindValueByName (00897086)
00893e4a 8bf8            mov     edi,eax
00893e4c 8d45e0          lea     eax,[ebp-20h]
00893e4f 50              push    eax
00893e50 56              push    esi
00893e51 ff5608          call    dword ptr [esi+8]
00893e54 83ffff          cmp     edi,0FFFFFFFFh
00893e57 0f8451ffffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893e5d 8d45d0          lea     eax,[ebp-30h]
00893e60 50              push    eax
00893e61 57              push    edi
00893e62 56              push    esi
00893e63 ff5604          call    dword ptr [esi+4]
00893e66 85c0            test    eax,eax
00893e68 0f8440ffffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893e6e 8d4dc8          lea     ecx,[ebp-38h]
00893e71 8bd7            mov     edx,edi
00893e73 51              push    ecx
00893e74 8d4df8          lea     ecx,[ebp-8]
00893e77 51              push    ecx
00893e78 50              push    eax
00893e79 8bce            mov     ecx,esi
00893e7b e87e330000      call    winload!CmpValueToData (008971fe)
00893e80 8bf8            mov     edi,eax
00893e82 8d45d0          lea     eax,[ebp-30h]
00893e85 50              push    eax
00893e86 56              push    esi
00893e87 897ddc          mov     dword ptr [ebp-24h],edi
00893e8a ff5608          call    dword ptr [esi+8]
00893e8d 85ff            test    edi,edi
00893e8f 0f8419ffffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893e95 8b55f8          mov     edx,dword ptr [ebp-8]
00893e98 33c9            xor     ecx,ecx
00893e9a 33c0            xor     eax,eax
00893e9c 668955da        mov     word ptr [ebp-26h],dx
00893ea0 66894dd8        mov     word ptr [ebp-28h],cx
00893ea4 663bc2          cmp     ax,dx
00893ea7 7322            jae     winload!CmpFindNLSData+0x2bb (00893ecb)
00893ea9 8b75f0          mov     esi,dword ptr [ebp-10h]
00893eac 33db            xor     ebx,ebx
00893eae 0fb7c1          movzx   eax,cx
00893eb1 d1e8            shr     eax,1
00893eb3 66391c47        cmp     word ptr [edi+eax*2],bx
00893eb7 740c            je      winload!CmpFindNLSData+0x2b5 (00893ec5)
00893eb9 6603ce          add     cx,si
00893ebc 66894dd8        mov     word ptr [ebp-28h],cx
00893ec0 663bca          cmp     cx,dx
00893ec3 72e9            jb      winload!CmpFindNLSData+0x29e (00893eae)
00893ec5 8b75ec          mov     esi,dword ptr [ebp-14h]
00893ec8 8b5d08          mov     ebx,dword ptr [ebp+8]
00893ecb 6a36            push    36h
00893ecd 58              pop     eax
00893ece 663907          cmp     word ptr [edi],ax
00893ed1 8b7d0c          mov     edi,dword ptr [ebp+0Ch]
00893ed4 0f8496000000    je      winload!CmpFindNLSData+0x360 (00893f70)
00893eda 8d45e0          lea     eax,[ebp-20h]
00893edd 50              push    eax
00893ede ff75f4          push    dword ptr [ebp-0Ch]
00893ee1 56              push    esi
00893ee2 ff5604          call    dword ptr [esi+4]
00893ee5 85c0            test    eax,eax
00893ee7 0f84b9feffff    je      winload!CmpFindNLSData+0x196 (00893da6)
00893eed 8d4dd8          lea     ecx,[ebp-28h]
00893ef0 8bd0            mov     edx,eax
00893ef2 51              push    ecx
00893ef3 8bce            mov     ecx,esi
00893ef5 e88c310000      call    winload!CmpFindValueByName (00897086)
00893efa 894508          mov     dword ptr [ebp+8],eax
00893efd 8d45c8          lea     eax,[ebp-38h]
00893f00 50              push    eax
00893f01 56              push    esi
00893f02 ff5608          call    dword ptr [esi+8]
00893f05 8d45e0          lea     eax,[ebp-20h]
00893f08 50              push    eax
00893f09 56              push    esi
00893f0a ff5608          call    dword ptr [esi+8]
00893f0d 8b4508          mov     eax,dword ptr [ebp+8]
00893f10 83f8ff          cmp     eax,0FFFFFFFFh
00893f13 0f8495feffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893f19 8d4dd0          lea     ecx,[ebp-30h]
00893f1c 51              push    ecx
00893f1d 50              push    eax
00893f1e 56              push    esi
00893f1f ff5604          call    dword ptr [esi+4]
00893f22 85c0            test    eax,eax
00893f24 0f8484feffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893f2a 8b5508          mov     edx,dword ptr [ebp+8]
00893f2d 8d4dc0          lea     ecx,[ebp-40h]
00893f30 51              push    ecx
00893f31 8d4df8          lea     ecx,[ebp-8]
00893f34 51              push    ecx
00893f35 50              push    eax
00893f36 8bce            mov     ecx,esi
00893f38 e8c1320000      call    winload!CmpValueToData (008971fe)
00893f3d 894704          mov     dword ptr [edi+4],eax
00893f40 85c0            test    eax,eax
00893f42 7408            je      winload!CmpFindNLSData+0x33c (00893f4c)
00893f44 8d45c0          lea     eax,[ebp-40h]
00893f47 50              push    eax
00893f48 56              push    esi
00893f49 ff5608          call    dword ptr [esi+8]
00893f4c 8d45d0          lea     eax,[ebp-30h]
00893f4f 50              push    eax
00893f50 56              push    esi
00893f51 ff5608          call    dword ptr [esi+8]
00893f54 33c9            xor     ecx,ecx
00893f56 394f04          cmp     dword ptr [edi+4],ecx
00893f59 0f844ffeffff    je      winload!CmpFindNLSData+0x19e (00893dae)
00893f5f 8b45f8          mov     eax,dword ptr [ebp-8]
00893f62 66894702        mov     word ptr [edi+2],ax
00893f66 668907          mov     word ptr [edi],ax
00893f69 394de8          cmp     dword ptr [ebp-18h],ecx
00893f6c 7412            je      winload!CmpFindNLSData+0x370 (00893f80)
00893f6e eb02            jmp     winload!CmpFindNLSData+0x362 (00893f72)
00893f70 33c9            xor     ecx,ecx
00893f72 33c0            xor     eax,eax
00893f74 894b04          mov     dword ptr [ebx+4],ecx
00893f77 668903          mov     word ptr [ebx],ax
00893f7a 894f04          mov     dword ptr [edi+4],ecx
00893f7d 668907          mov     word ptr [edi],ax
00893f80 8b4d10          mov     ecx,dword ptr [ebp+10h]
00893f83 b001            mov     al,1
00893f85 6a14            push    14h
00893f87 5a              pop     edx
00893f88 c741044c1a8e00  mov     dword ptr [ecx+4],offset winload!`string' (008e1a4c)
00893f8f 66895102        mov     word ptr [ecx+2],dx
00893f93 668911          mov     word ptr [ecx],dx
00893f96 e915feffff      jmp     winload!CmpFindNLSData+0x1a0 (00893db0)
00893f9b cc              int     3

One Answer

The function's Disassembly Does Not Match the prototype
This function takes only 3 arguments which can be ascertained with the first/multiple failure Exits

if(!foo) { return false;}
00893c49 85c0            test    eax,eax  <<<< if(!foo)
00893c4b 0f845d010000    je      winload!CmpFindNLSData+0x19e (00893dae)  
|  
00893dae 32c0            xor     al,al <<<<<<<    bool False
00893db0 5f              pop     edi  
00893db1 5e              pop     esi  
00893db2 5b              pop     ebx  
00893db3 8be5            mov     esp,ebp  
00893db5 5d              pop     ebp  
00893db6 c20c00          ret     0Ch  <<<<<<<<<< pops 3 arguments

we can also confirm the arguments Access in x86 by looking for ebp+ patterns (beware FPO )

copy pasting the disassembly from your query and grepping for ebp+8
yields only access to (ebp + [0x8,0xc,0x10]) so this function definitely takes only 3 arguments or 5 if this is _fastcall (ecx,edx)

:>wc -l nlsdatadis.txt
350 nlsdatadis.txt

:>grep ebp+ nlsdatadis.txt
00893d80 8b5d08          mov     ebx,dword ptr [ebp+8] <<<
00893ec8 8b5d08          mov     ebx,dword ptr [ebp+8]
00893ed1 8b7d0c          mov     edi,dword ptr [ebp+0Ch] <<<
00893efa 894508          mov     dword ptr [ebp+8],eax
00893f0d 8b4508          mov     eax,dword ptr [ebp+8]
00893f2a 8b5508          mov     edx,dword ptr [ebp+8]
00893f80 8b4d10          mov     ecx,dword ptr [ebp+10h] <<<<

we can infer that the last/3rd argument is a PUNICODE_STRING by looking at the Disassembly that Accesses [ebp+10]

00893f80 8b4d10          mov     ecx,dword ptr [ebp+10h]
00893f83 b001            mov     al,1   <<<<<<< bool TRUE
00893f85 6a14            push    14h    <<<< str length
00893f87 5a              pop     edx
00893f88 c741044c1a8e00  mov     dword ptr [ecx+4],offset winload!`string' (008e1a4c)   
<<< pointer to Buffer
00893f8f 66895102        mov     word ptr [ecx+2],dx  << (max len)
00893f93 668911          mov     word ptr [ecx],dx    << (len)     
00893f96 e915feffff      jmp     winload!CmpFindNLSData+0x1a0 (00893db0) << again    
jumps to Exit that is described above with True as Return)

2nd Argument is also PUNICODE_STRING (ebp+0c,edi) ist Argument is Some function pointer or the this call convention's this

as ebp+8 is modified several times by mov

Correct answer by blabb on November 10, 2020

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP