:!;h;se^[^+]*+ *ee;s|^\([0-9]*\)\([0-9]\)|\1_\2|;:=;H;s-^.*_\(.\).*-\1-;ya0123456789a1234567890a;:";H;g;s ^[^\n]*\n ;s+_[0-9]\([0-9]*\)\n\([0-9]*\)+_\2\1+;/_0/{;t:;::;sN\([0-9]*\)\([0-9]\)_\([0-9]\)N\1_\2\3N;t ;sa^a_nc_a;: ;x;st^\([^\n]*\)\n.*t\1t;x;/^_nc_/!b=;st^_nc_tt;/^_0/{;si^_i1i;x;se\(.*\)\n[0-9]*e\1e;x;b";};};s*_**;H;x;s+.*\n++p;b!
One comment on “Reverse Engineering Challenge #1: file”
Leave a Reply
You must be logged in to post a comment.
Pingback: Reverse Engineering Challenge with a Difference « Malware Musings