H:\tester\crackme\shelljump_files>shelljmp -x -s -f func.mod.bin 0 dwordptr:37 0x11 10 "string:a_Little" binfile:key.bin
shelljmp: [arg#06] "key.bin" loaded into buffer of 37 (0x25) bytes
shelljmp: loaded code from "func.mod.bin" into buffer of 91 (0x5b) bytes
shelljmp: file loaded at 0x335f00 - 0x335f5a
shelljmp: pushing 6 args onto stack:
[arg#01] dword value 0 (0)
[arg#02] dword ptr 0x12fe88 initialized to 37 (0x25)
[arg#03] dword value 17 (0x11)
[arg#04] dword value 10 (0xa)
[arg#05] string "a_Little" (9 bytes)
[arg#06] file buffer ptr 0x333ec0 of 37 (0x25) bytes from "key.bin"
shelljmp: executing offset 0x335f00 (CALL)
shelljmp: code exited with eax=0x1c7 ebx=0x556 ecx=0 edx=0 edi=0 esi=0
eax indicates possible SUCCESS
shelljmp: dumping buffer contents:
[arg#02] dword ptr points to 37 (0x25)
[arg#06] buffer dump
af aa ad eb ae aa ec a4 ba af ae aa 8a c0 a7 b0
bc 9a ba a5 a5 ba af b8 9d b8 f9 ae 9d ab b4 bc
b6 b3 90 9a a8
<shelljmp normal exit>