Online Solidity Decompiler

« Decompile another contract

Address

0x9929c7a4bf9899cef34742d45077d174e76f01e1 [etherscan.io | etherchain.org]

Public Methods

No public methods detected.

Internal Methods

No internal methods detected.

Decompilation

This might be constructor bytecode - to get at the deployed contract, go back and remove the constructor prefix, usually up to the next 6060 or 6080.
contract Contract { function main() { var var0 = address(this) == 0x9929c7a4bf9899cef34742d45077d174e76f01e1; memory[0x40:0x60] = 0x80; revert(memory[0x00:0x00]); } }

Disassembly

label_0000: // Inputs[2] // { // @0015 address(this) // @001F memory[0x00:0x00] // } 0000 73 PUSH20 0x9929c7a4bf9899cef34742d45077d174e76f01e1 0015 30 ADDRESS 0016 14 EQ 0017 60 PUSH1 0x80 0019 60 PUSH1 0x40 001B 52 MSTORE 001C 60 PUSH1 0x00 001E 80 DUP1 001F FD *REVERT // Stack delta = +1 // Outputs[3] // { // @0016 stack[0] = address(this) == 0x9929c7a4bf9899cef34742d45077d174e76f01e1 // @001B memory[0x40:0x60] = 0x80 // @001F revert(memory[0x00:0x00]); // } // Block terminates 0020 FE *ASSERT 0021 A2 LOG2 0022 64 PUSH5 0x6970667358 0028 22 22 0029 12 SLT 002A 20 SHA3 002B C8 C8 002C 08 ADDMOD 002D 0E 0E 002E 72 PUSH19 0x4f779944a02ebcd234da4f11da7b8299a6bb42 0042 38 CODESIZE 0043 2A 2A 0044 D3 D3 0045 AE AE 0046 C0 C0 0047 B4 B4 0048 61 PUSH2 0x8995 004B 64 PUSH5 0x736f6c6343 0051 00 *STOP 0052 06 MOD 0053 0C 0C 0054 00 *STOP 0055 33 CALLER
Found this site useful?
Donations are greatly appreciated!
ETH: 0xB3F04f0c276fa1177c1779f6E1E156B2738ea392
Contact/hire: [email protected]