TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019be3d6-84fb-701e-884c-bd21f4d3f54e

complete
Chain ID
1
Address
Block Number
Created
Thu, Jan 22, 2026 3:54 AM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Present
Best current signal
Untrusted DELEGATECALL target reachable
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
41149 artifact.fetch complete 1 / 3 2 months ago
41150 proxy.resolve complete 1 / 3 2 months ago
41151 tool.cast_disasm complete 1 / 3 2 months ago
41152 analysis.bundle complete 1 / 3 2 months ago
41153 capability.graph complete 1 / 3 2 months ago
41154 detector.run complete 1 / 3 2 months ago
41155 validation.fork complete 1 / 3 2 months ago
41442 report.consolidate complete 1 / 6 2 months ago

Artifact

Runtime bytecode: available
Creation TX:
Deployer:
Proxy: no not_proxy
Implementation:
Verified Source: no
Proxy evidence
{
    "status": "not_proxy"
}

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate
Job Status
complete
Attempts
1 / 6
Findings
1
No findings?
no
Summary
Bytecode shows a dispatcher that relies heavily on DELEGATECALL into a fixed external address; behavior and security depend on that target’s code and governance.
View stdout
{"no_findings":false,"summary":"Bytecode shows a dispatcher that relies heavily on DELEGATECALL into a fixed external address; behavior and security depend on that target’s code and governance.","findings":[{"severity":"medium","category":"upgradeability","title":"External DELEGATECALL to fixed target gives that contract full control of this contract’s storage","exploit_scenario":"All reachable entrypoints delegatecall into 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. If that target is a proxy, is upgradable, or becomes compromised, its code can execute in this contract’s storage context and arbitrarily modify balances/ownership/flags or drain funds. This is effectively an external trust dependency even though the target is constant in bytecode.","recommendation":"Treat 0xedef… as trusted and immutable; verify it is not a proxy or that its admin is tightly controlled (e.g., multisig with timelock). Consider hard‑linking audited library code, or using regular CALL when storage context is not required. Monitor the target’s codehash for unexpected changes.","evidence":"Detector reports 16 DELEGATECALL sites with untrusted_delegatecall_count=16; validation observed a constant call target 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. Runtime bytecode shows PUSH20 0xedef… followed by DELEGATECALL (with only an EXTCODESIZE check).","locations":["pc:341","pc:1903","pc:2077","pc:2309","pc:2526","pc:2638","pc:2781","pc:2921","pc:3028","pc:3151","pc:3602","pc:3886","pc:4013","pc:4131","pc:4939","pc:5482"]}]}
View stderr
OpenAI Codex v0.77.0 (research preview)
--------
workdir: /tmp/codex-8s8rgxrg
model: gpt-5.2-codex
provider: openai
approval: never
sandbox: read-only
reasoning effort: high
reasoning summaries: auto
session id: 019be4a2-10ac-7793-8717-f7a964400a0c
--------
user
You are a security auditor. You ONLY have runtime bytecode + analysis artifacts.
You MUST read `BYTECODE_BUNDLE.json` before concluding; it contains the bytecode summary,
evidence bundle, callsites, storage slots, and detector findings.

Special cases when reasoning from bytecode (be explicit about uncertainty):
- Selector inference is best-effort; missing selectors are common.
- Fallback/receive paths may be the only entrypoints.
- CALL vs DELEGATECALL semantics differ; DELEGATECALL executes in caller storage.
- Proxy patterns (EIP-1967, minimal proxies, beacon) change which storage is authoritative.
- Storage slots are raw; mappings/arrays appear via keccak patterns, names are unknown.
- Guard detection is heuristic; absence of guards does NOT mean unguarded.
- Returndata checking is unknown unless explicitly shown in evidence.
- Precompiles (0x1..0x9) and common ERC20 transfer selectors may appear; do not over-claim.

Output MUST be valid JSON matching the provided schema.
- If you find nothing meaningful: set no_findings=true and findings=[].
- Otherwise: set no_findings=false and include findings with severity/category/title.
- Locations can be pc references like "pc:0x123" or selectors like "selector:0xa9059cbb".

Focus on: reentrancy, access control, upgradeability/proxy issues, signature validation,
accounting/invariant breaks, dangerous delegatecall, and untrusted external calls.
Be conservative: if evidence is weak, mark severity low/medium and explain why.
mcp startup: no servers

thinking
**Listing files to verify BYTECODE_BUNDLE.json presence**
exec
/bin/bash -lc ls in /tmp/codex-8s8rgxrg succeeded in 7ms:
BYTECODE_BUNDLE.json
codex-output-schema.json
exec
/bin/bash -lc 'cat BYTECODE_BUNDLE.json' in /tmp/codex-8s8rgxrg succeeded in 6ms:
{
  "analysis_artifact": {
    "address": "0xf3347c1feca81e9e42c263458ec8d6fea3662ea2",
    "artifact_hash": "0x927db428585241dbb553b35070d85042647ef54a174fca39ad8674c97990e94b",
    "artifact_json": {
      "auth": {
        "guards": []
      },
      "basic_blocks": [
        {
          "end_pc": 12,
          "hash": "0x3fd0931de1db5e239099371326be3152d2c67b610e8ed3caaf844eee83d1610c",
          "opcodes": [
            "PUSH1",
            "PUSH1",
            "MSTORE",
            "PUSH1",
            "CALLDATASIZE",
            "LT",
            "PUSH2",

thinking
**Identifying proxy indicators and planning deeper bundle inspection**

The code shows delegatecall usage suggesting a proxy pattern, so I'll gather more evidence by searching within the file for storage slots, callsites, and related bundle data to analyze truncation and confirm the proxy setup.
exec
/bin/bash -lc 'rg -n "storage|slot|proxy|eip|beacon|implementation|admin|fallback|receive|callsite|evidence|selector" BYTECODE_BUNDLE.json' in /tmp/codex-8s8rgxrg succeeded in 22ms:
5268:      "callsites": [
6455:      "dispatcher_type": "selector_jump_table",
6459:          "selector": "0x089fff19"
6463:          "selector": "0x12d7e533"
6467:          "selector": "0x1fb75dbf"
6471:          "selector": "0x2d923501"
6475:          "selector": "0x54fd4d50"
6479:          "selector": "0x5a89f648"
6483:          "selector": "0x77d378fe"
6487:          "selector": "0x89fb8a48"
6491:          "selector": "0x8e5bcbb0"
6495:          "selector": "0x9aae82c1"
6499:          "selector": "0xa71b00d0"
6503:          "selector": "0xa9cc4718"
6507:          "selector": "0xaa0b7db7"
6511:          "selector": "0xb2088555"
6515:          "selector": "0xc0d9e7fb"
6519:          "selector": "0xc0ee0b8a"
6523:          "selector": "0xc519c77b"
6527:          "selector": "0xd3c4c4d0"

thinking
**Inspecting detector findings near callsites**

I'm planning to use sed to extract relevant code snippets around callsites related to detector findings and proxy evidence, focusing on storage usage.
exec
/bin/bash -lc "sed -n '5200,5320p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 7ms:
            "GAS",
            "DELEGATECALL",
            "ISZERO",
            "ISZERO",
            "PUSH2",
            "JUMPI"
          ],
          "start_pc": 5480
        },
        {
          "end_pc": 5492,
          "hash": "0x3824c3321f99869d42c3c53fcffda4424cd8d7f01c395fed0c6dae7e3c2f95df",
          "opcodes": [
            "PUSH1",
            "OP_80",
            "REVERT"
          ],
          "start_pc": 5489
        },
        {
exec
/bin/bash -lc "sed -n '5320,5440p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 9ms:
          "pc": 2921,
          "returndata_checked": null,
          "target_expression_category": "computed",
          "value_expression_category": "n/a"
        },
        {
          "opcode": "DELEGATECALL",
          "pc": 3028,
          "returndata_checked": null,
          "target_expression_category": "computed",
          "value_expression_category": "n/a"
        },
        {
          "opcode": "DELEGATECALL",
          "pc": 3151,
          "returndata_checked": null,
          "target_expression_category": "computed",
          "value_expression_category": "n/a"
        },
        {

thinking
**Requesting proxy evidence**
exec
/bin/bash -lc "sed -n '8080,8260p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 12ms:
                "pc": 5283,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000017"
              },
              {
                "op": "SLOAD",
                "pc": 5307,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000017"
              },
              {
                "op": "SLOAD",
                "pc": 5499,
                "slot": "0x0000000000000000000000000000000000000000000000000000000000000017"
              }
            ],
            "writes": 7
          }
        }
      ],
      "selectors": [
        "0x089fff19",

thinking
**Preparing to extract detector findings**

I'm targeting details near line 11250 and plan to use sed to extract the relevant detector_findings information.
exec
/bin/bash -lc "sed -n '11240,11310p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 6ms:
          "id": "fn:0xfe55892d",
          "selector": "0xfe55892d",
          "type": "function"
        },
        {
          "entry_pc": 1.3583709108994347e+48,
          "id": "fn:0xfffe58a2",
          "selector": "0xfffe58a2",
          "type": "function"
        }
      ],
      "version": "capability_graph_v1"
    },
    "id": 1217,
    "updated_at": "2026-01-22T03:57:16.000000Z",
    "version": "capability_graph_v1"
  },
  "detector_findings": [
    {
      "confidence": 70,


thinking
**Analyzing delegatecall to constant external address**

The contract acts as a dispatcher forwarding calls via delegatecall to a fixed external address, effectively using it like a statically linked library. While this isn't upgradeable, it poses a medium risk if the external contract is untrusted since delegatecall lets it modify this contract's storage.
thinking
**Noting potential upgradeability risk from external delegatecall and unclear access control**

Delegatecalls target a fixed external address that could itself be a proxy, creating an upgradeability risk since that external code may change and control this contract's behavior. Also, storage writes to slot 0x17 (likely a packed admin or flag) appear without detected access control guards, raising potential privilege concerns though no definitive evidence is found yet.
exec
/bin/bash -lc 'rg -n "CALLER|ORIGIN" BYTECODE_BUNDLE.json' in /tmp/codex-8s8rgxrg succeeded in 7ms:
3653:            "CALLER",
3842:            "CALLER",

thinking
**Inspecting access control near key calls**

I'm focusing on the two CALLER occurrences to examine surrounding code for access control checks using line context commands.
exec
/bin/bash -lc "sed -n '3620,3670p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 7ms:
            "JUMPDEST",
            "POP",
            "POP",
            "POP",
            "JUMP"
          ],
          "start_pc": 3613
        },
        {
          "end_pc": 3879,
          "hash": "0x473a696d121e52c1cc932b7f9601ea87feabe67ae74d51b3632c5ce1c0526052",
          "opcodes": [
            "JUMPDEST",
            "PUSH20",
            "PUSH4",
            "PUSH1",
            "OP_86",
            "OP_86",
            "PUSH1",
            "MLOAD",
exec
/bin/bash -lc "sed -n '3670,3725p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 7ms:
            "OP_81",
            "MUL",
            "PUSH1",
            "OP_87",
            "ADD",
            "MSTORE",
            "OP_92",
            "OP_90",
            "OP_93",
            "AND",
            "OP_90",
            "OP_91",
            "MUL",
            "PUSH1",
            "OP_84",
            "ADD",
            "MSTORE",
            "PUSH1",
            "OP_83",
            "ADD",

thinking
**Noticing multiple CALLER mappings**

I found another CALLER usage around line 3842, indicating repeated mapping operations but no explicit access control yet.
exec
/bin/bash -lc "sed -n '3815,3865p' BYTECODE_BUNDLE.json" in /tmp/codex-8s8rgxrg succeeded in 6ms:
            "JUMPI"
          ],
          "start_pc": 3884
        },
        {
          "end_pc": 3896,
          "hash": "0x8a355eb32c651f9b5f6595c6a270fd1d2269dc8374dd5e57c6269d347f3e0d69",
          "opcodes": [
            "PUSH1",
            "OP_80",
            "REVERT"
          ],
          "start_pc": 3893
        },
        {
          "end_pc": 4006,
          "hash": "0x0b0b110ca958cc7d1775c57b06a60f2c726edfbfe9cb2ae2c1b91fc49bab90a3",
          "opcodes": [
            "JUMPDEST",
            "POP",


thinking
**Analyzing delegatecall usage and risks**

The delegatecall target is a fixed constant address, not dynamically set, reducing trust issues but still posing risk if that address is malicious or upgradeable. Storage slot 0x17 shows state changes possibly influenced by delegatecall, suggesting upgradeability concerns, so marking this as a low/medium risk is appropriate. Next, I’ll confirm no external control over the target and check for CALL instructions to assess further attack surfaces.
thinking
```json
{
  "no_findings": false,
  "summary": "Bytecode shows 16 DELEGATECALL sites to a fixed external address; behavior depends on that target which may be immutable or upgradeable, posing a trust assumption risk.",
  "findings": [
    {
      "severity": "medium",
      "category": "upgradeability",
      "title": "External DELEGATECALL to fixed target gives that contract full control of this contract’s storage",
      "exploit_scenario": "If the target contract at 0xedef... is a proxy or can be upgraded or compromised, an attacker controlling it can execute arbitrary logic within this contract's context, potentially draining funds or overwriting ownership and control flags.",
      "recommendation": "Ensure the target contract is immutable and trusted; if it is upgradeable, protect the admin keys with strong controls or multisig. Consider inlining critical logic or using direct CALL instead of delegatecall, and monitor the codehash of the target contract regularly.",
      "evidence": "Detector shows 16 delegatecalls with a constant target 0xedef...; runtime bytecode includes PUSH20 0xedef... followed by DELEGATECALL and an EXTCODESIZE check to ensure code presence.",
      "locations": [
        "pc:341",
        "pc:1903",
        "pc:2077",
        "pc:2309",
        "pc:2526",
        "pc:2638",
        "pc:2781",
        "pc:2921",
        "pc:3028",
        "pc:3151",
        "pc:3602",
        "pc:3886",
        "pc:4013",
        "pc:4131",
        "pc:4939",
        "pc:5482"
      ]
    }
  ]
}
```
codex
{"no_findings":false,"summary":"Bytecode shows a dispatcher that relies heavily on DELEGATECALL into a fixed external address; behavior and security depend on that target’s code and governance.","findings":[{"severity":"medium","category":"upgradeability","title":"External DELEGATECALL to fixed target gives that contract full control of this contract’s storage","exploit_scenario":"All reachable entrypoints delegatecall into 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. If that target is a proxy, is upgradable, or becomes compromised, its code can execute in this contract’s storage context and arbitrarily modify balances/ownership/flags or drain funds. This is effectively an external trust dependency even though the target is constant in bytecode.","recommendation":"Treat 0xedef… as trusted and immutable; verify it is not a proxy or that its admin is tightly controlled (e.g., multisig with timelock). Consider hard‑linking audited library code, or using regular CALL when storage context is not required. Monitor the target’s codehash for unexpected changes.","evidence":"Detector reports 16 DELEGATECALL sites with untrusted_delegatecall_count=16; validation observed a constant call target 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. Runtime bytecode shows PUSH20 0xedef… followed by DELEGATECALL (with only an EXTCODESIZE check).","locations":["pc:341","pc:1903","pc:2077","pc:2309","pc:2526","pc:2638","pc:2781","pc:2921","pc:3028","pc:3151","pc:3602","pc:3886","pc:4013","pc:4131","pc:4939","pc:5482"]}]}
tokens used
78,024
Metadata
{
    "codex": {
        "ran_at": "2026-01-22T07:38:51.680153+00:00",
        "returncode": 0
    },
    "project": {
        "mode": "bytecode",
        "bytecode_length": 11122,
        "bytecode_truncated": false,
        "capability_graph_present": true,
        "analysis_artifact_present": true
    },
    "summary": "Bytecode shows a dispatcher that relies heavily on DELEGATECALL into a fixed external address; behavior and security depend on that target\u2019s code and governance.",
    "raw_final": {
        "summary": "Bytecode shows a dispatcher that relies heavily on DELEGATECALL into a fixed external address; behavior and security depend on that target\u2019s code and governance.",
        "findings": [
            {
                "title": "External DELEGATECALL to fixed target gives that contract full control of this contract\u2019s storage",
                "category": "upgradeability",
                "evidence": "Detector reports 16 DELEGATECALL sites with untrusted_delegatecall_count=16; validation observed a constant call target 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. Runtime bytecode shows PUSH20 0xedef\u2026 followed by DELEGATECALL (with only an EXTCODESIZE check).",
                "severity": "medium",
                "locations": [
                    "pc:341",
                    "pc:1903",
                    "pc:2077",
                    "pc:2309",
                    "pc:2526",
                    "pc:2638",
                    "pc:2781",
                    "pc:2921",
                    "pc:3028",
                    "pc:3151",
                    "pc:3602",
                    "pc:3886",
                    "pc:4013",
                    "pc:4131",
                    "pc:4939",
                    "pc:5482"
                ],
                "recommendation": "Treat 0xedef\u2026 as trusted and immutable; verify it is not a proxy or that its admin is tightly controlled (e.g., multisig with timelock). Consider hard\u2011linking audited library code, or using regular CALL when storage context is not required. Monitor the target\u2019s codehash for unexpected changes.",
                "exploit_scenario": "All reachable entrypoints delegatecall into 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. If that target is a proxy, is upgradable, or becomes compromised, its code can execute in this contract\u2019s storage context and arbitrarily modify balances/ownership/flags or drain funds. This is effectively an external trust dependency even though the target is constant in bytecode."
            }
        ],
        "no_findings": false
    },
    "no_findings": false,
    "schema_version": 1
}

Opcode Heuristics

tool.cast_disasm
Delegatecall
16
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
26
Total opcodes
3815
Flags
delegatecall_present heavy_ext_balance_usage
View cast disassembly output
00000000: PUSH1 0x60
00000002: PUSH1 0x40
00000004: MSTORE
00000005: PUSH1 0x04
00000007: CALLDATASIZE
00000008: LT
00000009: PUSH2 0x0103
0000000c: JUMPI
0000000d: PUSH4 0xffffffff
00000012: PUSH1 0xe0
00000014: PUSH1 0x02
00000016: EXP
00000017: PUSH1 0x00
00000019: CALLDATALOAD
0000001a: DIV
0000001b: AND
0000001c: PUSH4 0x089fff19
00000021: DUP2
00000022: EQ
00000023: PUSH2 0x0165
00000026: JUMPI
00000027: DUP1
00000028: PUSH4 0x12d7e533
0000002d: EQ
0000002e: PUSH2 0x0251
00000031: JUMPI
00000032: DUP1
00000033: PUSH4 0x1fb75dbf
00000038: EQ
00000039: PUSH2 0x0269
0000003c: JUMPI
0000003d: DUP1
0000003e: PUSH4 0x2d923501
00000043: EQ
00000044: PUSH2 0x02ac
00000047: JUMPI
00000048: DUP1
00000049: PUSH4 0x54fd4d50
0000004e: EQ
0000004f: PUSH2 0x02d7
00000052: JUMPI
00000053: DUP1
00000054: PUSH4 0x5a89f648
00000059: EQ
0000005a: PUSH2 0x030e
0000005d: JUMPI
0000005e: DUP1
0000005f: PUSH4 0x77d378fe
00000064: EQ
00000065: PUSH2 0x0333
00000068: JUMPI
00000069: DUP1
0000006a: PUSH4 0x89fb8a48
0000006f: EQ
00000070: PUSH2 0x0353
00000073: JUMPI
00000074: DUP1
00000075: PUSH4 0x8e5bcbb0
0000007a: EQ
0000007b: PUSH2 0x0369
0000007e: JUMPI
0000007f: DUP1
00000080: PUSH4 0x9aae82c1
00000085: EQ
00000086: PUSH2 0x0382
00000089: JUMPI
0000008a: DUP1
0000008b: PUSH4 0xa71b00d0
00000090: EQ
00000091: PUSH2 0x03a1
00000094: JUMPI
00000095: DUP1
00000096: PUSH4 0xa9cc4718
0000009b: EQ
0000009c: PUSH2 0x03e4
0000009f: JUMPI
000000a0: DUP1
000000a1: PUSH4 0xaa0b7db7
000000a6: EQ
000000a7: PUSH2 0x03f7
000000aa: JUMPI
000000ab: DUP1
000000ac: PUSH4 0xb2088555
000000b1: EQ
000000b2: PUSH2 0x0412
000000b5: JUMPI
000000b6: DUP1
000000b7: PUSH4 0xc0d9e7fb
000000bc: EQ
000000bd: PUSH2 0x0431
000000c0: JUMPI
000000c1: DUP1
000000c2: PUSH4 0xc0ee0b8a
000000c7: EQ
000000c8: PUSH2 0x045a
000000cb: JUMPI
000000cc: DUP1
000000cd: PUSH4 0xc519c77b
000000d2: EQ
000000d3: PUSH2 0x0489
000000d6: JUMPI
000000d7: DUP1
000000d8: PUSH4 0xd3c4c4d0
000000dd: EQ
000000de: PUSH2 0x053b
000000e1: JUMPI
000000e2: DUP1
000000e3: PUSH4 0xdef86cbb
000000e8: EQ
000000e9: PUSH2 0x0565
000000ec: JUMPI
000000ed: DUP1
000000ee: PUSH4 0xfe55892d
000000f3: EQ
000000f4: PUSH2 0x058f
000000f7: JUMPI
000000f8: DUP1
000000f9: PUSH4 0xfffe58a2
000000fe: EQ
000000ff: PUSH2 0x05b9
00000102: JUMPI
00000103: JUMPDEST
00000104: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000119: PUSH4 0x6c2802e8
0000011e: PUSH1 0x00
00000120: PUSH1 0x40
00000122: MLOAD
00000123: PUSH1 0xe0
00000125: PUSH1 0x02
00000127: EXP
00000128: PUSH4 0xffffffff
0000012d: DUP5
0000012e: AND
0000012f: MUL
00000130: DUP2
00000131: MSTORE
00000132: PUSH1 0x04
00000134: DUP2
00000135: ADD
00000136: SWAP2
00000137: SWAP1
00000138: SWAP2
00000139: MSTORE
0000013a: PUSH1 0x24
0000013c: ADD
0000013d: PUSH1 0x00
0000013f: PUSH1 0x40
00000141: MLOAD
00000142: DUP1
00000143: DUP4
00000144: SUB
00000145: DUP2
00000146: DUP7
00000147: DUP1
00000148: EXTCODESIZE
00000149: ISZERO
0000014a: ISZERO
0000014b: PUSH2 0x0153
0000014e: JUMPI
0000014f: PUSH1 0x00
00000151: DUP1
00000152: REVERT
00000153: JUMPDEST
00000154: GAS
00000155: DELEGATECALL
00000156: ISZERO
00000157: ISZERO
00000158: PUSH2 0x0160
0000015b: JUMPI
0000015c: PUSH1 0x00
0000015e: DUP1
0000015f: REVERT
00000160: JUMPDEST
00000161: POP
00000162: POP
00000163: POP
00000164: STOP
00000165: JUMPDEST
00000166: CALLVALUE
00000167: ISZERO
00000168: PUSH2 0x0170
0000016b: JUMPI
0000016c: PUSH1 0x00
0000016e: DUP1
0000016f: REVERT
00000170: JUMPDEST
00000171: PUSH2 0x024f
00000174: PUSH1 0x04
00000176: DUP1
00000177: CALLDATALOAD
00000178: PUSH1 0x01
0000017a: PUSH1 0xa0
0000017c: PUSH1 0x02
0000017e: EXP
0000017f: SUB
00000180: AND
00000181: SWAP1
00000182: PUSH1 0x44
00000184: PUSH1 0x24
00000186: DUP1
00000187: CALLDATALOAD
00000188: SWAP1
00000189: DUP2
0000018a: ADD
0000018b: SWAP1
0000018c: DUP4
0000018d: ADD
0000018e: CALLDATALOAD
0000018f: DUP1
00000190: PUSH1 0x20
00000192: DUP1
00000193: DUP3
00000194: MUL
00000195: ADD
00000196: PUSH1 0x40
00000198: MLOAD
00000199: SWAP1
0000019a: DUP2
0000019b: ADD
0000019c: PUSH1 0x40
0000019e: MSTORE
0000019f: DUP1
000001a0: SWAP4
000001a1: SWAP3
000001a2: SWAP2
000001a3: SWAP1
000001a4: DUP2
000001a5: DUP2
000001a6: MSTORE
000001a7: PUSH1 0x20
000001a9: ADD
000001aa: DUP4
000001ab: DUP4
000001ac: PUSH1 0x20
000001ae: MUL
000001af: DUP1
000001b0: DUP3
000001b1: DUP5
000001b2: CALLDATACOPY
000001b3: POP
000001b4: SWAP5
000001b5: SWAP7
000001b6: DUP7
000001b7: CALLDATALOAD
000001b8: SWAP7
000001b9: PUSH1 0x20
000001bb: DUP1
000001bc: DUP3
000001bd: ADD
000001be: CALLDATALOAD
000001bf: SWAP8
000001c0: POP
000001c1: SWAP2
000001c2: SWAP6
000001c3: POP
000001c4: PUSH1 0x60
000001c6: DUP2
000001c7: ADD
000001c8: SWAP5
000001c9: POP
000001ca: PUSH1 0x40
000001cc: SWAP1
000001cd: DUP2
000001ce: ADD
000001cf: CALLDATALOAD
000001d0: DUP7
000001d1: ADD
000001d2: DUP1
000001d3: DUP4
000001d4: ADD
000001d5: SWAP5
000001d6: POP
000001d7: CALLDATALOAD
000001d8: SWAP3
000001d9: POP
000001da: DUP3
000001db: SWAP2
000001dc: PUSH1 0x1f
000001de: DUP4
000001df: ADD
000001e0: DUP2
000001e1: SWAP1
000001e2: DIV
000001e3: DUP2
000001e4: MUL
000001e5: ADD
000001e6: SWAP1
000001e7: MLOAD
000001e8: SWAP1
000001e9: DUP2
000001ea: ADD
000001eb: PUSH1 0x40
000001ed: MSTORE
000001ee: DUP2
000001ef: DUP2
000001f0: MSTORE
000001f1: SWAP3
000001f2: SWAP2
000001f3: SWAP1
000001f4: PUSH1 0x20
000001f6: DUP5
000001f7: ADD
000001f8: DUP4
000001f9: DUP4
000001fa: DUP1
000001fb: DUP3
000001fc: DUP5
000001fd: CALLDATACOPY
000001fe: DUP3
000001ff: ADD
00000200: SWAP2
00000201: POP
00000202: POP
00000203: POP
00000204: POP
00000205: POP
00000206: POP
00000207: SWAP2
00000208: SWAP1
00000209: DUP1
0000020a: CALLDATALOAD
0000020b: SWAP1
0000020c: PUSH1 0x20
0000020e: ADD
0000020f: SWAP1
00000210: DUP3
00000211: ADD
00000212: DUP1
00000213: CALLDATALOAD
00000214: SWAP1
00000215: PUSH1 0x20
00000217: ADD
00000218: SWAP1
00000219: DUP1
0000021a: DUP1
0000021b: PUSH1 0x1f
0000021d: ADD
0000021e: PUSH1 0x20
00000220: DUP1
00000221: SWAP2
00000222: DIV
00000223: MUL
00000224: PUSH1 0x20
00000226: ADD
00000227: PUSH1 0x40
00000229: MLOAD
0000022a: SWAP1
0000022b: DUP2
0000022c: ADD
0000022d: PUSH1 0x40
0000022f: MSTORE
00000230: DUP2
00000231: DUP2
00000232: MSTORE
00000233: SWAP3
00000234: SWAP2
00000235: SWAP1
00000236: PUSH1 0x20
00000238: DUP5
00000239: ADD
0000023a: DUP4
0000023b: DUP4
0000023c: DUP1
0000023d: DUP3
0000023e: DUP5
0000023f: CALLDATACOPY
00000240: POP
00000241: SWAP5
00000242: SWAP7
00000243: POP
00000244: PUSH2 0x05d7
00000247: SWAP6
00000248: POP
00000249: POP
0000024a: POP
0000024b: POP
0000024c: POP
0000024d: POP
0000024e: JUMP
0000024f: JUMPDEST
00000250: STOP
00000251: JUMPDEST
00000252: CALLVALUE
00000253: ISZERO
00000254: PUSH2 0x025c
00000257: JUMPI
00000258: PUSH1 0x00
0000025a: DUP1
0000025b: REVERT
0000025c: JUMPDEST
0000025d: PUSH2 0x024f
00000260: PUSH1 0x04
00000262: CALLDATALOAD
00000263: ISZERO
00000264: ISZERO
00000265: PUSH2 0x0785
00000268: JUMP
00000269: JUMPDEST
0000026a: CALLVALUE
0000026b: ISZERO
0000026c: PUSH2 0x0274
0000026f: JUMPI
00000270: PUSH1 0x00
00000272: DUP1
00000273: REVERT
00000274: JUMPDEST
00000275: PUSH2 0x024f
00000278: PUSH1 0x04
0000027a: DUP1
0000027b: CALLDATALOAD
0000027c: PUSH1 0x01
0000027e: PUSH1 0xa0
00000280: PUSH1 0x02
00000282: EXP
00000283: SUB
00000284: AND
00000285: SWAP1
00000286: PUSH1 0x24
00000288: DUP1
00000289: CALLDATALOAD
0000028a: SWAP2
0000028b: PUSH1 0x44
0000028d: CALLDATALOAD
0000028e: DUP1
0000028f: DUP4
00000290: ADD
00000291: SWAP3
00000292: SWAP1
00000293: DUP3
00000294: ADD
00000295: CALLDATALOAD
00000296: SWAP2
00000297: PUSH1 0x64
00000299: CALLDATALOAD
0000029a: SWAP2
0000029b: PUSH1 0x84
0000029d: CALLDATALOAD
0000029e: SWAP2
0000029f: PUSH1 0xa4
000002a1: CALLDATALOAD
000002a2: SWAP2
000002a3: DUP3
000002a4: ADD
000002a5: SWAP2
000002a6: ADD
000002a7: CALLDATALOAD
000002a8: PUSH2 0x083e
000002ab: JUMP
000002ac: JUMPDEST
000002ad: CALLVALUE
000002ae: ISZERO
000002af: PUSH2 0x02b7
000002b2: JUMPI
000002b3: PUSH1 0x00
000002b5: DUP1
000002b6: REVERT
000002b7: JUMPDEST
000002b8: PUSH2 0x024f
000002bb: PUSH1 0x04
000002bd: DUP1
000002be: CALLDATALOAD
000002bf: PUSH1 0x01
000002c1: PUSH1 0xa0
000002c3: PUSH1 0x02
000002c5: EXP
000002c6: SUB
000002c7: AND
000002c8: SWAP1
000002c9: PUSH1 0x24
000002cb: DUP1
000002cc: CALLDATALOAD
000002cd: SWAP1
000002ce: DUP2
000002cf: ADD
000002d0: SWAP2
000002d1: ADD
000002d2: CALLDATALOAD
000002d3: PUSH2 0x091d
000002d6: JUMP
000002d7: JUMPDEST
000002d8: CALLVALUE
000002d9: ISZERO
000002da: PUSH2 0x02e2
000002dd: JUMPI
000002de: PUSH1 0x00
000002e0: DUP1
000002e1: REVERT
000002e2: JUMPDEST
000002e3: PUSH2 0x02ea
000002e6: PUSH2 0x0a01
000002e9: JUMP
000002ea: JUMPDEST
000002eb: PUSH1 0x40
000002ed: MLOAD
000002ee: DUP1
000002ef: DUP5
000002f0: DUP2
000002f1: MSTORE
000002f2: PUSH1 0x20
000002f4: ADD
000002f5: DUP4
000002f6: DUP2
000002f7: MSTORE
000002f8: PUSH1 0x20
000002fa: ADD
000002fb: DUP3
000002fc: DUP2
000002fd: MSTORE
000002fe: PUSH1 0x20
00000300: ADD
00000301: SWAP4
00000302: POP
00000303: POP
00000304: POP
00000305: POP
00000306: PUSH1 0x40
00000308: MLOAD
00000309: DUP1
0000030a: SWAP2
0000030b: SUB
0000030c: SWAP1
0000030d: RETURN
0000030e: JUMPDEST
0000030f: CALLVALUE
00000310: ISZERO
00000311: PUSH2 0x0319
00000314: JUMPI
00000315: PUSH1 0x00
00000317: DUP1
00000318: REVERT
00000319: JUMPDEST
0000031a: PUSH2 0x0321
0000031d: PUSH2 0x0a7a
00000320: JUMP
00000321: JUMPDEST
00000322: PUSH1 0x40
00000324: MLOAD
00000325: SWAP1
00000326: DUP2
00000327: MSTORE
00000328: PUSH1 0x20
0000032a: ADD
0000032b: PUSH1 0x40
0000032d: MLOAD
0000032e: DUP1
0000032f: SWAP2
00000330: SUB
00000331: SWAP1
00000332: RETURN
00000333: JUMPDEST
00000334: PUSH2 0x024f
00000337: PUSH1 0x01
00000339: PUSH1 0xa0
0000033b: PUSH1 0x02
0000033d: EXP
0000033e: SUB
0000033f: PUSH1 0x04
00000341: CALLDATALOAD
00000342: DUP2
00000343: AND
00000344: SWAP1
00000345: PUSH1 0x24
00000347: CALLDATALOAD
00000348: ISZERO
00000349: ISZERO
0000034a: SWAP1
0000034b: PUSH1 0x44
0000034d: CALLDATALOAD
0000034e: AND
0000034f: PUSH2 0x0af6
00000352: JUMP
00000353: JUMPDEST
00000354: CALLVALUE
00000355: ISZERO
00000356: PUSH2 0x035e
00000359: JUMPI
0000035a: PUSH1 0x00
0000035c: DUP1
0000035d: REVERT
0000035e: JUMPDEST
0000035f: PUSH2 0x024f
00000362: PUSH1 0x04
00000364: CALLDATALOAD
00000365: PUSH2 0x0b7c
00000368: JUMP
00000369: JUMPDEST
0000036a: PUSH2 0x024f
0000036d: PUSH1 0x04
0000036f: CALLDATALOAD
00000370: ISZERO
00000371: ISZERO
00000372: PUSH1 0x01
00000374: PUSH1 0xa0
00000376: PUSH1 0x02
00000378: EXP
00000379: SUB
0000037a: PUSH1 0x24
0000037c: CALLDATALOAD
0000037d: AND
0000037e: PUSH2 0x0be5
00000381: JUMP
00000382: JUMPDEST
00000383: CALLVALUE
00000384: ISZERO
00000385: PUSH2 0x038d
00000388: JUMPI
00000389: PUSH1 0x00
0000038b: DUP1
0000038c: REVERT
0000038d: JUMPDEST
0000038e: PUSH2 0x024f
00000391: PUSH1 0x01
00000393: PUSH1 0xa0
00000395: PUSH1 0x02
00000397: EXP
00000398: SUB
00000399: PUSH1 0x04
0000039b: CALLDATALOAD
0000039c: AND
0000039d: PUSH2 0x0c61
000003a0: JUMP
000003a1: JUMPDEST
000003a2: CALLVALUE
000003a3: ISZERO
000003a4: PUSH2 0x03ac
000003a7: JUMPI
000003a8: PUSH1 0x00
000003aa: DUP1
000003ab: REVERT
000003ac: JUMPDEST
000003ad: PUSH2 0x024f
000003b0: PUSH1 0x04
000003b2: DUP1
000003b3: CALLDATALOAD
000003b4: PUSH1 0x01
000003b6: PUSH1 0xa0
000003b8: PUSH1 0x02
000003ba: EXP
000003bb: SUB
000003bc: AND
000003bd: SWAP1
000003be: PUSH1 0x24
000003c0: DUP1
000003c1: CALLDATALOAD
000003c2: SWAP2
000003c3: PUSH1 0x44
000003c5: CALLDATALOAD
000003c6: DUP1
000003c7: DUP4
000003c8: ADD
000003c9: SWAP3
000003ca: SWAP1
000003cb: DUP3
000003cc: ADD
000003cd: CALLDATALOAD
000003ce: SWAP2
000003cf: PUSH1 0x64
000003d1: CALLDATALOAD
000003d2: SWAP2
000003d3: PUSH1 0x84
000003d5: CALLDATALOAD
000003d6: SWAP2
000003d7: PUSH1 0xa4
000003d9: CALLDATALOAD
000003da: SWAP2
000003db: DUP3
000003dc: ADD
000003dd: SWAP2
000003de: ADD
000003df: CALLDATALOAD
000003e0: PUSH2 0x0cc0
000003e3: JUMP
000003e4: JUMPDEST
000003e5: CALLVALUE
000003e6: ISZERO
000003e7: PUSH2 0x03ef
000003ea: JUMPI
000003eb: PUSH1 0x00
000003ed: DUP1
000003ee: REVERT
000003ef: JUMPDEST
000003f0: PUSH2 0x024f
000003f3: PUSH2 0x0db1
000003f6: JUMP
000003f7: JUMPDEST
000003f8: PUSH2 0x024f
000003fb: PUSH1 0x04
000003fd: DUP1
000003fe: CALLDATALOAD
000003ff: SWAP1
00000400: PUSH1 0x24
00000402: DUP1
00000403: CALLDATALOAD
00000404: SWAP2
00000405: PUSH1 0x44
00000407: CALLDATALOAD
00000408: SWAP2
00000409: DUP3
0000040a: ADD
0000040b: SWAP2
0000040c: ADD
0000040d: CALLDATALOAD
0000040e: PUSH2 0x0e22
00000411: JUMP
00000412: JUMPDEST
00000413: CALLVALUE
00000414: ISZERO
00000415: PUSH2 0x041d
00000418: JUMPI
00000419: PUSH1 0x00
0000041b: DUP1
0000041c: REVERT
0000041d: JUMPDEST
0000041e: PUSH2 0x0321
00000421: PUSH1 0x01
00000423: PUSH1 0xa0
00000425: PUSH1 0x02
00000427: EXP
00000428: SUB
00000429: PUSH1 0x04
0000042b: CALLDATALOAD
0000042c: AND
0000042d: PUSH2 0x0fc1
00000430: JUMP
00000431: JUMPDEST
00000432: CALLVALUE
00000433: ISZERO
00000434: PUSH2 0x043c
00000437: JUMPI
00000438: PUSH1 0x00
0000043a: DUP1
0000043b: REVERT
0000043c: JUMPDEST
0000043d: PUSH2 0x024f
00000440: PUSH1 0x01
00000442: PUSH1 0xa0
00000444: PUSH1 0x02
00000446: EXP
00000447: SUB
00000448: PUSH1 0x04
0000044a: CALLDATALOAD
0000044b: AND
0000044c: PUSH1 0x24
0000044e: CALLDATALOAD
0000044f: ISZERO
00000450: ISZERO
00000451: PUSH1 0x44
00000453: CALLDATALOAD
00000454: ISZERO
00000455: ISZERO
00000456: PUSH2 0x103d
00000459: JUMP
0000045a: JUMPDEST
0000045b: CALLVALUE
0000045c: ISZERO
0000045d: PUSH2 0x0465
00000460: JUMPI
00000461: PUSH1 0x00
00000463: DUP1
00000464: REVERT
00000465: JUMPDEST
00000466: PUSH2 0x024f
00000469: PUSH1 0x04
0000046b: DUP1
0000046c: CALLDATALOAD
0000046d: PUSH1 0x01
0000046f: PUSH1 0xa0
00000471: PUSH1 0x02
00000473: EXP
00000474: SUB
00000475: AND
00000476: SWAP1
00000477: PUSH1 0x24
00000479: DUP1
0000047a: CALLDATALOAD
0000047b: SWAP2
0000047c: PUSH1 0x44
0000047e: CALLDATALOAD
0000047f: SWAP2
00000480: DUP3
00000481: ADD
00000482: SWAP2
00000483: ADD
00000484: CALLDATALOAD
00000485: PUSH2 0x10e6
00000488: JUMP
00000489: JUMPDEST
0000048a: CALLVALUE
0000048b: ISZERO
0000048c: PUSH2 0x0494
0000048f: JUMPI
00000490: PUSH1 0x00
00000492: DUP1
00000493: REVERT
00000494: JUMPDEST
00000495: PUSH2 0x024f
00000498: PUSH1 0x01
0000049a: PUSH1 0xa0
0000049c: PUSH1 0x02
0000049e: EXP
0000049f: SUB
000004a0: PUSH1 0x04
000004a2: DUP1
000004a3: CALLDATALOAD
000004a4: DUP3
000004a5: AND
000004a6: SWAP2
000004a7: PUSH1 0x24
000004a9: DUP1
000004aa: CALLDATALOAD
000004ab: SWAP1
000004ac: SWAP2
000004ad: AND
000004ae: SWAP2
000004af: SWAP1
000004b0: PUSH1 0x64
000004b2: SWAP1
000004b3: PUSH1 0x44
000004b5: CALLDATALOAD
000004b6: SWAP1
000004b7: DUP2
000004b8: ADD
000004b9: SWAP1
000004ba: DUP4
000004bb: ADD
000004bc: CALLDATALOAD
000004bd: DUP1
000004be: PUSH1 0x20
000004c0: DUP2
000004c1: DUP2
000004c2: MUL
000004c3: ADD
000004c4: PUSH1 0x40
000004c6: MLOAD
000004c7: SWAP1
000004c8: DUP2
000004c9: ADD
000004ca: PUSH1 0x40
000004cc: MSTORE
000004cd: DUP1
000004ce: SWAP4
000004cf: SWAP3
000004d0: SWAP2
000004d1: SWAP1
000004d2: DUP2
000004d3: DUP2
000004d4: MSTORE
000004d5: PUSH1 0x20
000004d7: ADD
000004d8: DUP4
000004d9: DUP4
000004da: PUSH1 0x20
000004dc: MUL
000004dd: DUP1
000004de: DUP3
000004df: DUP5
000004e0: CALLDATACOPY
000004e1: POP
000004e2: SWAP5
000004e3: SWAP7
000004e4: DUP7
000004e5: CALLDATALOAD
000004e6: SWAP7
000004e7: PUSH1 0x20
000004e9: DUP1
000004ea: DUP3
000004eb: ADD
000004ec: CALLDATALOAD
000004ed: SWAP8
000004ee: POP
000004ef: SWAP2
000004f0: SWAP6
000004f1: POP
000004f2: PUSH1 0x60
000004f4: DUP2
000004f5: ADD
000004f6: SWAP5
000004f7: POP
000004f8: PUSH1 0x40
000004fa: SWAP1
000004fb: DUP2
000004fc: ADD
000004fd: CALLDATALOAD
000004fe: DUP7
000004ff: ADD
00000500: DUP1
00000501: DUP4
00000502: ADD
00000503: SWAP5
00000504: POP
00000505: CALLDATALOAD
00000506: SWAP3
00000507: POP
00000508: DUP3
00000509: SWAP2
0000050a: PUSH1 0x1f
0000050c: DUP4
0000050d: ADD
0000050e: DUP2
0000050f: SWAP1
00000510: DIV
00000511: DUP2
00000512: MUL
00000513: ADD
00000514: SWAP1
00000515: MLOAD
00000516: SWAP1
00000517: DUP2
00000518: ADD
00000519: PUSH1 0x40
0000051b: MSTORE
0000051c: DUP2
0000051d: DUP2
0000051e: MSTORE
0000051f: SWAP3
00000520: SWAP2
00000521: SWAP1
00000522: PUSH1 0x20
00000524: DUP5
00000525: ADD
00000526: DUP4
00000527: DUP4
00000528: DUP1
00000529: DUP3
0000052a: DUP5
0000052b: CALLDATACOPY
0000052c: POP
0000052d: SWAP5
0000052e: SWAP7
0000052f: POP
00000530: PUSH2 0x1174
00000533: SWAP6
00000534: POP
00000535: POP
00000536: POP
00000537: POP
00000538: POP
00000539: POP
0000053a: JUMP
0000053b: JUMPDEST
0000053c: CALLVALUE
0000053d: ISZERO
0000053e: PUSH2 0x0546
00000541: JUMPI
00000542: PUSH1 0x00
00000544: DUP1
00000545: REVERT
00000546: JUMPDEST
00000547: PUSH2 0x024f
0000054a: PUSH1 0x04
0000054c: DUP1
0000054d: CALLDATALOAD
0000054e: SWAP1
0000054f: PUSH1 0x24
00000551: DUP1
00000552: CALLDATALOAD
00000553: SWAP2
00000554: PUSH1 0x44
00000556: CALLDATALOAD
00000557: SWAP2
00000558: PUSH1 0x64
0000055a: CALLDATALOAD
0000055b: SWAP1
0000055c: DUP2
0000055d: ADD
0000055e: SWAP2
0000055f: ADD
00000560: CALLDATALOAD
00000561: PUSH2 0x12ba
00000564: JUMP
00000565: JUMPDEST
00000566: CALLVALUE
00000567: ISZERO
00000568: PUSH2 0x0570
0000056b: JUMPI
0000056c: PUSH1 0x00
0000056e: DUP1
0000056f: REVERT
00000570: JUMPDEST
00000571: PUSH2 0x024f
00000574: PUSH1 0x24
00000576: PUSH1 0x04
00000578: DUP1
00000579: CALLDATALOAD
0000057a: DUP3
0000057b: DUP2
0000057c: ADD
0000057d: SWAP3
0000057e: SWAP1
0000057f: DUP3
00000580: ADD
00000581: CALLDATALOAD
00000582: SWAP2
00000583: DUP2
00000584: CALLDATALOAD
00000585: SWAP2
00000586: DUP3
00000587: ADD
00000588: SWAP2
00000589: ADD
0000058a: CALLDATALOAD
0000058b: PUSH2 0x1360
0000058e: JUMP
0000058f: JUMPDEST
00000590: CALLVALUE
00000591: ISZERO
00000592: PUSH2 0x059a
00000595: JUMPI
00000596: PUSH1 0x00
00000598: DUP1
00000599: REVERT
0000059a: JUMPDEST
0000059b: PUSH2 0x024f
0000059e: PUSH1 0x04
000005a0: DUP1
000005a1: CALLDATALOAD
000005a2: SWAP1
000005a3: PUSH1 0x24
000005a5: DUP1
000005a6: CALLDATALOAD
000005a7: SWAP2
000005a8: PUSH1 0x44
000005aa: CALLDATALOAD
000005ab: SWAP2
000005ac: PUSH1 0x64
000005ae: CALLDATALOAD
000005af: SWAP1
000005b0: DUP2
000005b1: ADD
000005b2: SWAP2
000005b3: ADD
000005b4: CALLDATALOAD
000005b5: PUSH2 0x13fa
000005b8: JUMP
000005b9: JUMPDEST
000005ba: CALLVALUE
000005bb: ISZERO
000005bc: PUSH2 0x05c4
000005bf: JUMPI
000005c0: PUSH1 0x00
000005c2: DUP1
000005c3: REVERT
000005c4: JUMPDEST
000005c5: PUSH2 0x024f
000005c8: PUSH1 0x04
000005ca: DUP1
000005cb: CALLDATALOAD
000005cc: PUSH1 0x24
000005ce: DUP2
000005cf: ADD
000005d0: SWAP2
000005d1: ADD
000005d2: CALLDATALOAD
000005d3: PUSH2 0x14a0
000005d6: JUMP
000005d7: JUMPDEST
000005d8: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
000005ed: PUSH4 0x13347323
000005f2: PUSH1 0x00
000005f4: DUP9
000005f5: DUP9
000005f6: DUP9
000005f7: DUP9
000005f8: DUP9
000005f9: DUP9
000005fa: PUSH1 0x40
000005fc: MLOAD
000005fd: DUP9
000005fe: PUSH4 0xffffffff
00000603: AND
00000604: PUSH1 0xe0
00000606: PUSH1 0x02
00000608: EXP
00000609: MUL
0000060a: DUP2
0000060b: MSTORE
0000060c: PUSH1 0x04
0000060e: ADD
0000060f: DUP1
00000610: DUP9
00000611: DUP2
00000612: MSTORE
00000613: PUSH1 0x20
00000615: ADD
00000616: DUP8
00000617: PUSH1 0x01
00000619: PUSH1 0xa0
0000061b: PUSH1 0x02
0000061d: EXP
0000061e: SUB
0000061f: AND
00000620: PUSH1 0x01
00000622: PUSH1 0xa0
00000624: PUSH1 0x02
00000626: EXP
00000627: SUB
00000628: AND
00000629: DUP2
0000062a: MSTORE
0000062b: PUSH1 0x20
0000062d: ADD
0000062e: DUP1
0000062f: PUSH1 0x20
00000631: ADD
00000632: DUP7
00000633: DUP2
00000634: MSTORE
00000635: PUSH1 0x20
00000637: ADD
00000638: DUP6
00000639: DUP2
0000063a: MSTORE
0000063b: PUSH1 0x20
0000063d: ADD
0000063e: DUP1
0000063f: PUSH1 0x20
00000641: ADD
00000642: DUP1
00000643: PUSH1 0x20
00000645: ADD
00000646: DUP5
00000647: DUP2
00000648: SUB
00000649: DUP5
0000064a: MSTORE
0000064b: DUP10
0000064c: DUP2
0000064d: DUP2
0000064e: MLOAD
0000064f: DUP2
00000650: MSTORE
00000651: PUSH1 0x20
00000653: ADD
00000654: SWAP2
00000655: POP
00000656: DUP1
00000657: MLOAD
00000658: SWAP1
00000659: PUSH1 0x20
0000065b: ADD
0000065c: SWAP1
0000065d: PUSH1 0x20
0000065f: MUL
00000660: DUP1
00000661: DUP4
00000662: DUP4
00000663: PUSH1 0x00
00000665: JUMPDEST
00000666: DUP4
00000667: DUP2
00000668: LT
00000669: ISZERO
0000066a: PUSH2 0x067d
0000066d: JUMPI
0000066e: DUP1
0000066f: DUP3
00000670: ADD
00000671: MLOAD
00000672: DUP4
00000673: DUP3
00000674: ADD
00000675: MSTORE
00000676: PUSH1 0x20
00000678: ADD
00000679: PUSH2 0x0665
0000067c: JUMP
0000067d: JUMPDEST
0000067e: POP
0000067f: POP
00000680: POP
00000681: POP
00000682: SWAP1
00000683: POP
00000684: ADD
00000685: DUP5
00000686: DUP2
00000687: SUB
00000688: DUP4
00000689: MSTORE
0000068a: DUP7
0000068b: DUP2
0000068c: DUP2
0000068d: MLOAD
0000068e: DUP2
0000068f: MSTORE
00000690: PUSH1 0x20
00000692: ADD
00000693: SWAP2
00000694: POP
00000695: DUP1
00000696: MLOAD
00000697: SWAP1
00000698: PUSH1 0x20
0000069a: ADD
0000069b: SWAP1
0000069c: DUP1
0000069d: DUP4
0000069e: DUP4
0000069f: PUSH1 0x00
000006a1: JUMPDEST
000006a2: DUP4
000006a3: DUP2
000006a4: LT
000006a5: ISZERO
000006a6: PUSH2 0x06b9
000006a9: JUMPI
000006aa: DUP1
000006ab: DUP3
000006ac: ADD
000006ad: MLOAD
000006ae: DUP4
000006af: DUP3
000006b0: ADD
000006b1: MSTORE
000006b2: PUSH1 0x20
000006b4: ADD
000006b5: PUSH2 0x06a1
000006b8: JUMP
000006b9: JUMPDEST
000006ba: POP
000006bb: POP
000006bc: POP
000006bd: POP
000006be: SWAP1
000006bf: POP
000006c0: SWAP1
000006c1: DUP2
000006c2: ADD
000006c3: SWAP1
000006c4: PUSH1 0x1f
000006c6: AND
000006c7: DUP1
000006c8: ISZERO
000006c9: PUSH2 0x06e6
000006cc: JUMPI
000006cd: DUP1
000006ce: DUP3
000006cf: SUB
000006d0: DUP1
000006d1: MLOAD
000006d2: PUSH1 0x01
000006d4: DUP4
000006d5: PUSH1 0x20
000006d7: SUB
000006d8: PUSH2 0x0100
000006db: EXP
000006dc: SUB
000006dd: NOT
000006de: AND
000006df: DUP2
000006e0: MSTORE
000006e1: PUSH1 0x20
000006e3: ADD
000006e4: SWAP2
000006e5: POP
000006e6: JUMPDEST
000006e7: POP
000006e8: DUP5
000006e9: DUP2
000006ea: SUB
000006eb: DUP3
000006ec: MSTORE
000006ed: DUP6
000006ee: DUP2
000006ef: DUP2
000006f0: MLOAD
000006f1: DUP2
000006f2: MSTORE
000006f3: PUSH1 0x20
000006f5: ADD
000006f6: SWAP2
000006f7: POP
000006f8: DUP1
000006f9: MLOAD
000006fa: SWAP1
000006fb: PUSH1 0x20
000006fd: ADD
000006fe: SWAP1
000006ff: DUP1
00000700: DUP4
00000701: DUP4
00000702: PUSH1 0x00
00000704: JUMPDEST
00000705: DUP4
00000706: DUP2
00000707: LT
00000708: ISZERO
00000709: PUSH2 0x071c
0000070c: JUMPI
0000070d: DUP1
0000070e: DUP3
0000070f: ADD
00000710: MLOAD
00000711: DUP4
00000712: DUP3
00000713: ADD
00000714: MSTORE
00000715: PUSH1 0x20
00000717: ADD
00000718: PUSH2 0x0704
0000071b: JUMP
0000071c: JUMPDEST
0000071d: POP
0000071e: POP
0000071f: POP
00000720: POP
00000721: SWAP1
00000722: POP
00000723: SWAP1
00000724: DUP2
00000725: ADD
00000726: SWAP1
00000727: PUSH1 0x1f
00000729: AND
0000072a: DUP1
0000072b: ISZERO
0000072c: PUSH2 0x0749
0000072f: JUMPI
00000730: DUP1
00000731: DUP3
00000732: SUB
00000733: DUP1
00000734: MLOAD
00000735: PUSH1 0x01
00000737: DUP4
00000738: PUSH1 0x20
0000073a: SUB
0000073b: PUSH2 0x0100
0000073e: EXP
0000073f: SUB
00000740: NOT
00000741: AND
00000742: DUP2
00000743: MSTORE
00000744: PUSH1 0x20
00000746: ADD
00000747: SWAP2
00000748: POP
00000749: JUMPDEST
0000074a: POP
0000074b: SWAP11
0000074c: POP
0000074d: POP
0000074e: POP
0000074f: POP
00000750: POP
00000751: POP
00000752: POP
00000753: POP
00000754: POP
00000755: POP
00000756: POP
00000757: PUSH1 0x00
00000759: PUSH1 0x40
0000075b: MLOAD
0000075c: DUP1
0000075d: DUP4
0000075e: SUB
0000075f: DUP2
00000760: DUP7
00000761: DUP1
00000762: EXTCODESIZE
00000763: ISZERO
00000764: ISZERO
00000765: PUSH2 0x076d
00000768: JUMPI
00000769: PUSH1 0x00
0000076b: DUP1
0000076c: REVERT
0000076d: JUMPDEST
0000076e: GAS
0000076f: DELEGATECALL
00000770: ISZERO
00000771: ISZERO
00000772: PUSH2 0x077a
00000775: JUMPI
00000776: PUSH1 0x00
00000778: DUP1
00000779: REVERT
0000077a: JUMPDEST
0000077b: POP
0000077c: POP
0000077d: POP
0000077e: POP
0000077f: POP
00000780: POP
00000781: POP
00000782: POP
00000783: POP
00000784: JUMP
00000785: JUMPDEST
00000786: PUSH1 0x17
00000788: SLOAD
00000789: PUSH1 0xa0
0000078b: PUSH1 0x02
0000078d: EXP
0000078e: SWAP1
0000078f: DIV
00000790: PUSH1 0xff
00000792: AND
00000793: ISZERO
00000794: PUSH2 0x079c
00000797: JUMPI
00000798: PUSH1 0x00
0000079a: DUP1
0000079b: REVERT
0000079c: JUMPDEST
0000079d: PUSH1 0x17
0000079f: DUP1
000007a0: SLOAD
000007a1: PUSH1 0xa0
000007a3: PUSH1 0x02
000007a5: EXP
000007a6: PUSH1 0xff
000007a8: MUL
000007a9: NOT
000007aa: AND
000007ab: PUSH1 0xa0
000007ad: PUSH1 0x02
000007af: EXP
000007b0: OR
000007b1: SWAP1
000007b2: SSTORE
000007b3: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
000007c8: PUSH4 0x961e1e1b
000007cd: PUSH1 0x00
000007cf: DUP1
000007d0: DUP5
000007d1: PUSH1 0x40
000007d3: MLOAD
000007d4: PUSH1 0xe0
000007d6: PUSH1 0x02
000007d8: EXP
000007d9: PUSH4 0xffffffff
000007de: DUP7
000007df: AND
000007e0: MUL
000007e1: DUP2
000007e2: MSTORE
000007e3: PUSH1 0x04
000007e5: DUP2
000007e6: ADD
000007e7: SWAP4
000007e8: SWAP1
000007e9: SWAP4
000007ea: MSTORE
000007eb: PUSH1 0x01
000007ed: PUSH1 0xa0
000007ef: PUSH1 0x02
000007f1: EXP
000007f2: SUB
000007f3: SWAP1
000007f4: SWAP2
000007f5: AND
000007f6: PUSH1 0x24
000007f8: DUP4
000007f9: ADD
000007fa: MSTORE
000007fb: ISZERO
000007fc: ISZERO
000007fd: PUSH1 0x44
000007ff: DUP3
00000800: ADD
00000801: MSTORE
00000802: PUSH1 0x64
00000804: ADD
00000805: PUSH1 0x00
00000807: PUSH1 0x40
00000809: MLOAD
0000080a: DUP1
0000080b: DUP4
0000080c: SUB
0000080d: DUP2
0000080e: DUP7
0000080f: DUP1
00000810: EXTCODESIZE
00000811: ISZERO
00000812: ISZERO
00000813: PUSH2 0x081b
00000816: JUMPI
00000817: PUSH1 0x00
00000819: DUP1
0000081a: REVERT
0000081b: JUMPDEST
0000081c: GAS
0000081d: DELEGATECALL
0000081e: ISZERO
0000081f: ISZERO
00000820: PUSH2 0x0828
00000823: JUMPI
00000824: PUSH1 0x00
00000826: DUP1
00000827: REVERT
00000828: JUMPDEST
00000829: POP
0000082a: POP
0000082b: PUSH1 0x17
0000082d: DUP1
0000082e: SLOAD
0000082f: PUSH1 0xa0
00000831: PUSH1 0x02
00000833: EXP
00000834: PUSH1 0xff
00000836: MUL
00000837: NOT
00000838: AND
00000839: SWAP1
0000083a: SSTORE
0000083b: POP
0000083c: POP
0000083d: JUMP
0000083e: JUMPDEST
0000083f: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000854: PUSH4 0x148b9557
00000859: PUSH1 0x00
0000085b: DUP11
0000085c: DUP11
0000085d: DUP11
0000085e: DUP11
0000085f: DUP11
00000860: DUP11
00000861: DUP11
00000862: DUP11
00000863: PUSH1 0x40
00000865: MLOAD
00000866: DUP11
00000867: PUSH4 0xffffffff
0000086c: AND
0000086d: PUSH1 0xe0
0000086f: PUSH1 0x02
00000871: EXP
00000872: MUL
00000873: DUP2
00000874: MSTORE
00000875: PUSH1 0x04
00000877: ADD
00000878: DUP1
00000879: DUP11
0000087a: DUP2
0000087b: MSTORE
0000087c: PUSH1 0x20
0000087e: ADD
0000087f: DUP10
00000880: PUSH1 0x01
00000882: PUSH1 0xa0
00000884: PUSH1 0x02
00000886: EXP
00000887: SUB
00000888: AND
00000889: PUSH1 0x01
0000088b: PUSH1 0xa0
0000088d: PUSH1 0x02
0000088f: EXP
00000890: SUB
00000891: AND
00000892: DUP2
00000893: MSTORE
00000894: PUSH1 0x20
00000896: ADD
00000897: DUP9
00000898: DUP2
00000899: MSTORE
0000089a: PUSH1 0x20
0000089c: ADD
0000089d: DUP1
0000089e: PUSH1 0x20
000008a0: ADD
000008a1: DUP7
000008a2: DUP2
000008a3: MSTORE
000008a4: PUSH1 0x20
000008a6: ADD
000008a7: DUP6
000008a8: DUP2
000008a9: MSTORE
000008aa: PUSH1 0x20
000008ac: ADD
000008ad: DUP1
000008ae: PUSH1 0x20
000008b0: ADD
000008b1: DUP4
000008b2: DUP2
000008b3: SUB
000008b4: DUP4
000008b5: MSTORE
000008b6: DUP10
000008b7: DUP10
000008b8: DUP3
000008b9: DUP2
000008ba: DUP2
000008bb: MSTORE
000008bc: PUSH1 0x20
000008be: ADD
000008bf: SWAP3
000008c0: POP
000008c1: DUP1
000008c2: DUP3
000008c3: DUP5
000008c4: CALLDATACOPY
000008c5: SWAP1
000008c6: SWAP2
000008c7: ADD
000008c8: DUP5
000008c9: DUP2
000008ca: SUB
000008cb: DUP4
000008cc: MSTORE
000008cd: DUP6
000008ce: DUP2
000008cf: MSTORE
000008d0: PUSH1 0x20
000008d2: ADD
000008d3: SWAP1
000008d4: POP
000008d5: DUP6
000008d6: DUP6
000008d7: DUP1
000008d8: DUP3
000008d9: DUP5
000008da: CALLDATACOPY
000008db: DUP3
000008dc: ADD
000008dd: SWAP2
000008de: POP
000008df: POP
000008e0: SWAP12
000008e1: POP
000008e2: POP
000008e3: POP
000008e4: POP
000008e5: POP
000008e6: POP
000008e7: POP
000008e8: POP
000008e9: POP
000008ea: POP
000008eb: POP
000008ec: POP
000008ed: PUSH1 0x00
000008ef: PUSH1 0x40
000008f1: MLOAD
000008f2: DUP1
000008f3: DUP4
000008f4: SUB
000008f5: DUP2
000008f6: DUP7
000008f7: DUP1
000008f8: EXTCODESIZE
000008f9: ISZERO
000008fa: ISZERO
000008fb: PUSH2 0x0903
000008fe: JUMPI
000008ff: PUSH1 0x00
00000901: DUP1
00000902: REVERT
00000903: JUMPDEST
00000904: GAS
00000905: DELEGATECALL
00000906: ISZERO
00000907: ISZERO
00000908: PUSH2 0x0910
0000090b: JUMPI
0000090c: PUSH1 0x00
0000090e: DUP1
0000090f: REVERT
00000910: JUMPDEST
00000911: POP
00000912: POP
00000913: POP
00000914: POP
00000915: POP
00000916: POP
00000917: POP
00000918: POP
00000919: POP
0000091a: POP
0000091b: POP
0000091c: JUMP
0000091d: JUMPDEST
0000091e: PUSH1 0x17
00000920: SLOAD
00000921: PUSH1 0xa0
00000923: PUSH1 0x02
00000925: EXP
00000926: SWAP1
00000927: DIV
00000928: PUSH1 0xff
0000092a: AND
0000092b: ISZERO
0000092c: PUSH2 0x0934
0000092f: JUMPI
00000930: PUSH1 0x00
00000932: DUP1
00000933: REVERT
00000934: JUMPDEST
00000935: PUSH1 0x17
00000937: DUP1
00000938: SLOAD
00000939: PUSH1 0xa0
0000093b: PUSH1 0x02
0000093d: EXP
0000093e: PUSH1 0xff
00000940: MUL
00000941: NOT
00000942: AND
00000943: PUSH1 0xa0
00000945: PUSH1 0x02
00000947: EXP
00000948: OR
00000949: SWAP1
0000094a: SSTORE
0000094b: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000960: PUSH4 0x837ddfcd
00000965: PUSH1 0x00
00000967: DUP1
00000968: DUP7
00000969: DUP7
0000096a: DUP7
0000096b: PUSH1 0x40
0000096d: MLOAD
0000096e: PUSH1 0xe0
00000970: PUSH1 0x02
00000972: EXP
00000973: PUSH4 0xffffffff
00000978: DUP9
00000979: AND
0000097a: MUL
0000097b: DUP2
0000097c: MSTORE
0000097d: PUSH1 0x04
0000097f: DUP2
00000980: ADD
00000981: DUP7
00000982: DUP2
00000983: MSTORE
00000984: PUSH1 0x01
00000986: PUSH1 0xa0
00000988: PUSH1 0x02
0000098a: EXP
0000098b: SUB
0000098c: DUP1
0000098d: DUP8
0000098e: AND
0000098f: PUSH1 0x24
00000991: DUP5
00000992: ADD
00000993: MSTORE
00000994: DUP6
00000995: AND
00000996: PUSH1 0x44
00000998: DUP4
00000999: ADD
0000099a: MSTORE
0000099b: PUSH1 0x80
0000099d: PUSH1 0x64
0000099f: DUP4
000009a0: ADD
000009a1: SWAP1
000009a2: DUP2
000009a3: MSTORE
000009a4: PUSH1 0x84
000009a6: DUP4
000009a7: ADD
000009a8: DUP5
000009a9: SWAP1
000009aa: MSTORE
000009ab: SWAP1
000009ac: SWAP2
000009ad: PUSH1 0xa4
000009af: ADD
000009b0: DUP5
000009b1: PUSH1 0x20
000009b3: DUP6
000009b4: MUL
000009b5: DUP1
000009b6: DUP3
000009b7: DUP5
000009b8: CALLDATACOPY
000009b9: DUP3
000009ba: ADD
000009bb: SWAP2
000009bc: POP
000009bd: POP
000009be: SWAP7
000009bf: POP
000009c0: POP
000009c1: POP
000009c2: POP
000009c3: POP
000009c4: POP
000009c5: POP
000009c6: PUSH1 0x00
000009c8: PUSH1 0x40
000009ca: MLOAD
000009cb: DUP1
000009cc: DUP4
000009cd: SUB
000009ce: DUP2
000009cf: DUP7
000009d0: DUP1
000009d1: EXTCODESIZE
000009d2: ISZERO
000009d3: ISZERO
000009d4: PUSH2 0x09dc
000009d7: JUMPI
000009d8: PUSH1 0x00
000009da: DUP1
000009db: REVERT
000009dc: JUMPDEST
000009dd: GAS
000009de: DELEGATECALL
000009df: ISZERO
000009e0: ISZERO
000009e1: PUSH2 0x09e9
000009e4: JUMPI
000009e5: PUSH1 0x00
000009e7: DUP1
000009e8: REVERT
000009e9: JUMPDEST
000009ea: POP
000009eb: POP
000009ec: PUSH1 0x17
000009ee: DUP1
000009ef: SLOAD
000009f0: PUSH1 0xa0
000009f2: PUSH1 0x02
000009f4: EXP
000009f5: PUSH1 0xff
000009f7: MUL
000009f8: NOT
000009f9: AND
000009fa: SWAP1
000009fb: SSTORE
000009fc: POP
000009fd: POP
000009fe: POP
000009ff: POP
00000a00: JUMP
00000a01: JUMPDEST
00000a02: PUSH1 0x00
00000a04: DUP1
00000a05: PUSH1 0x00
00000a07: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000a1c: PUSH4 0x54fd4d50
00000a21: PUSH1 0x40
00000a23: MLOAD
00000a24: DUP2
00000a25: PUSH4 0xffffffff
00000a2a: AND
00000a2b: PUSH1 0xe0
00000a2d: PUSH1 0x02
00000a2f: EXP
00000a30: MUL
00000a31: DUP2
00000a32: MSTORE
00000a33: PUSH1 0x04
00000a35: ADD
00000a36: PUSH1 0x60
00000a38: PUSH1 0x40
00000a3a: MLOAD
00000a3b: DUP1
00000a3c: DUP4
00000a3d: SUB
00000a3e: DUP2
00000a3f: DUP7
00000a40: DUP1
00000a41: EXTCODESIZE
00000a42: ISZERO
00000a43: ISZERO
00000a44: PUSH2 0x0a4c
00000a47: JUMPI
00000a48: PUSH1 0x00
00000a4a: DUP1
00000a4b: REVERT
00000a4c: JUMPDEST
00000a4d: GAS
00000a4e: DELEGATECALL
00000a4f: ISZERO
00000a50: ISZERO
00000a51: PUSH2 0x0a59
00000a54: JUMPI
00000a55: PUSH1 0x00
00000a57: DUP1
00000a58: REVERT
00000a59: JUMPDEST
00000a5a: POP
00000a5b: POP
00000a5c: POP
00000a5d: PUSH1 0x40
00000a5f: MLOAD
00000a60: DUP1
00000a61: MLOAD
00000a62: SWAP1
00000a63: PUSH1 0x20
00000a65: ADD
00000a66: DUP1
00000a67: MLOAD
00000a68: SWAP1
00000a69: PUSH1 0x20
00000a6b: ADD
00000a6c: DUP1
00000a6d: MLOAD
00000a6e: SWAP1
00000a6f: POP
00000a70: SWAP3
00000a71: POP
00000a72: SWAP3
00000a73: POP
00000a74: SWAP3
00000a75: POP
00000a76: SWAP1
00000a77: SWAP2
00000a78: SWAP3
00000a79: JUMP
00000a7a: JUMPDEST
00000a7b: PUSH1 0x00
00000a7d: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000a92: PUSH4 0x54729885
00000a97: DUP3
00000a98: PUSH1 0x01
00000a9a: PUSH1 0xa0
00000a9c: PUSH1 0x02
00000a9e: EXP
00000a9f: SUB
00000aa0: ADDRESS
00000aa1: AND
00000aa2: BALANCE
00000aa3: PUSH1 0x40
00000aa5: MLOAD
00000aa6: PUSH1 0xe0
00000aa8: PUSH1 0x02
00000aaa: EXP
00000aab: PUSH4 0xffffffff
00000ab0: DUP6
00000ab1: AND
00000ab2: MUL
00000ab3: DUP2
00000ab4: MSTORE
00000ab5: PUSH1 0x04
00000ab7: DUP2
00000ab8: ADD
00000ab9: SWAP3
00000aba: SWAP1
00000abb: SWAP3
00000abc: MSTORE
00000abd: PUSH1 0x24
00000abf: DUP3
00000ac0: ADD
00000ac1: MSTORE
00000ac2: PUSH1 0x44
00000ac4: ADD
00000ac5: PUSH1 0x20
00000ac7: PUSH1 0x40
00000ac9: MLOAD
00000aca: DUP1
00000acb: DUP4
00000acc: SUB
00000acd: DUP2
00000ace: DUP7
00000acf: DUP1
00000ad0: EXTCODESIZE
00000ad1: ISZERO
00000ad2: ISZERO
00000ad3: PUSH2 0x0adb
00000ad6: JUMPI
00000ad7: PUSH1 0x00
00000ad9: DUP1
00000ada: REVERT
00000adb: JUMPDEST
00000adc: GAS
00000add: DELEGATECALL
00000ade: ISZERO
00000adf: ISZERO
00000ae0: PUSH2 0x0ae8
00000ae3: JUMPI
00000ae4: PUSH1 0x00
00000ae6: DUP1
00000ae7: REVERT
00000ae8: JUMPDEST
00000ae9: POP
00000aea: POP
00000aeb: POP
00000aec: PUSH1 0x40
00000aee: MLOAD
00000aef: DUP1
00000af0: MLOAD
00000af1: SWAP2
00000af2: POP
00000af3: POP
00000af4: SWAP1
00000af5: JUMP
00000af6: JUMPDEST
00000af7: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000b0c: PUSH4 0xf980df95
00000b11: PUSH1 0x00
00000b13: DUP6
00000b14: DUP6
00000b15: DUP6
00000b16: PUSH1 0x40
00000b18: MLOAD
00000b19: PUSH1 0xe0
00000b1b: PUSH1 0x02
00000b1d: EXP
00000b1e: PUSH4 0xffffffff
00000b23: DUP8
00000b24: AND
00000b25: MUL
00000b26: DUP2
00000b27: MSTORE
00000b28: PUSH1 0x04
00000b2a: DUP2
00000b2b: ADD
00000b2c: SWAP5
00000b2d: SWAP1
00000b2e: SWAP5
00000b2f: MSTORE
00000b30: PUSH1 0x01
00000b32: PUSH1 0xa0
00000b34: PUSH1 0x02
00000b36: EXP
00000b37: SUB
00000b38: SWAP3
00000b39: DUP4
00000b3a: AND
00000b3b: PUSH1 0x24
00000b3d: DUP6
00000b3e: ADD
00000b3f: MSTORE
00000b40: SWAP1
00000b41: ISZERO
00000b42: ISZERO
00000b43: PUSH1 0x44
00000b45: DUP5
00000b46: ADD
00000b47: MSTORE
00000b48: AND
00000b49: PUSH1 0x64
00000b4b: DUP3
00000b4c: ADD
00000b4d: MSTORE
00000b4e: PUSH1 0x84
00000b50: ADD
00000b51: PUSH1 0x00
00000b53: PUSH1 0x40
00000b55: MLOAD
00000b56: DUP1
00000b57: DUP4
00000b58: SUB
00000b59: DUP2
00000b5a: DUP7
00000b5b: DUP1
00000b5c: EXTCODESIZE
00000b5d: ISZERO
00000b5e: ISZERO
00000b5f: PUSH2 0x0b67
00000b62: JUMPI
00000b63: PUSH1 0x00
00000b65: DUP1
00000b66: REVERT
00000b67: JUMPDEST
00000b68: GAS
00000b69: DELEGATECALL
00000b6a: ISZERO
00000b6b: ISZERO
00000b6c: PUSH2 0x0b74
00000b6f: JUMPI
00000b70: PUSH1 0x00
00000b72: DUP1
00000b73: REVERT
00000b74: JUMPDEST
00000b75: POP
00000b76: POP
00000b77: POP
00000b78: POP
00000b79: POP
00000b7a: POP
00000b7b: JUMP
00000b7c: JUMPDEST
00000b7d: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000b92: PUSH4 0x68540b6b
00000b97: PUSH1 0x00
00000b99: DUP4
00000b9a: PUSH1 0x40
00000b9c: MLOAD
00000b9d: PUSH1 0xe0
00000b9f: PUSH1 0x02
00000ba1: EXP
00000ba2: PUSH4 0xffffffff
00000ba7: DUP6
00000ba8: AND
00000ba9: MUL
00000baa: DUP2
00000bab: MSTORE
00000bac: PUSH1 0x04
00000bae: DUP2
00000baf: ADD
00000bb0: SWAP3
00000bb1: SWAP1
00000bb2: SWAP3
00000bb3: MSTORE
00000bb4: PUSH1 0x24
00000bb6: DUP3
00000bb7: ADD
00000bb8: MSTORE
00000bb9: PUSH1 0x44
00000bbb: ADD
00000bbc: PUSH1 0x00
00000bbe: PUSH1 0x40
00000bc0: MLOAD
00000bc1: DUP1
00000bc2: DUP4
00000bc3: SUB
00000bc4: DUP2
00000bc5: DUP7
00000bc6: DUP1
00000bc7: EXTCODESIZE
00000bc8: ISZERO
00000bc9: ISZERO
00000bca: PUSH2 0x0bd2
00000bcd: JUMPI
00000bce: PUSH1 0x00
00000bd0: DUP1
00000bd1: REVERT
00000bd2: JUMPDEST
00000bd3: GAS
00000bd4: DELEGATECALL
00000bd5: ISZERO
00000bd6: ISZERO
00000bd7: PUSH2 0x0bdf
00000bda: JUMPI
00000bdb: PUSH1 0x00
00000bdd: DUP1
00000bde: REVERT
00000bdf: JUMPDEST
00000be0: POP
00000be1: POP
00000be2: POP
00000be3: POP
00000be4: JUMP
00000be5: JUMPDEST
00000be6: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000bfb: PUSH4 0x0e95c1df
00000c00: PUSH1 0x00
00000c02: DUP5
00000c03: DUP5
00000c04: PUSH1 0x40
00000c06: MLOAD
00000c07: PUSH1 0xe0
00000c09: PUSH1 0x02
00000c0b: EXP
00000c0c: PUSH4 0xffffffff
00000c11: DUP7
00000c12: AND
00000c13: MUL
00000c14: DUP2
00000c15: MSTORE
00000c16: PUSH1 0x04
00000c18: DUP2
00000c19: ADD
00000c1a: SWAP4
00000c1b: SWAP1
00000c1c: SWAP4
00000c1d: MSTORE
00000c1e: SWAP1
00000c1f: ISZERO
00000c20: ISZERO
00000c21: PUSH1 0x24
00000c23: DUP4
00000c24: ADD
00000c25: MSTORE
00000c26: PUSH1 0x01
00000c28: PUSH1 0xa0
00000c2a: PUSH1 0x02
00000c2c: EXP
00000c2d: SUB
00000c2e: AND
00000c2f: PUSH1 0x44
00000c31: DUP3
00000c32: ADD
00000c33: MSTORE
00000c34: PUSH1 0x64
00000c36: ADD
00000c37: PUSH1 0x00
00000c39: PUSH1 0x40
00000c3b: MLOAD
00000c3c: DUP1
00000c3d: DUP4
00000c3e: SUB
00000c3f: DUP2
00000c40: DUP7
00000c41: DUP1
00000c42: EXTCODESIZE
00000c43: ISZERO
00000c44: ISZERO
00000c45: PUSH2 0x0c4d
00000c48: JUMPI
00000c49: PUSH1 0x00
00000c4b: DUP1
00000c4c: REVERT
00000c4d: JUMPDEST
00000c4e: GAS
00000c4f: DELEGATECALL
00000c50: ISZERO
00000c51: ISZERO
00000c52: PUSH2 0x0c5a
00000c55: JUMPI
00000c56: PUSH1 0x00
00000c58: DUP1
00000c59: REVERT
00000c5a: JUMPDEST
00000c5b: POP
00000c5c: POP
00000c5d: POP
00000c5e: POP
00000c5f: POP
00000c60: JUMP
00000c61: JUMPDEST
00000c62: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000c77: PUSH4 0xc27d2d45
00000c7c: PUSH1 0x00
00000c7e: DUP4
00000c7f: PUSH1 0x40
00000c81: MLOAD
00000c82: PUSH1 0xe0
00000c84: PUSH1 0x02
00000c86: EXP
00000c87: PUSH4 0xffffffff
00000c8c: DUP6
00000c8d: AND
00000c8e: MUL
00000c8f: DUP2
00000c90: MSTORE
00000c91: PUSH1 0x04
00000c93: DUP2
00000c94: ADD
00000c95: SWAP3
00000c96: SWAP1
00000c97: SWAP3
00000c98: MSTORE
00000c99: PUSH1 0x01
00000c9b: PUSH1 0xa0
00000c9d: PUSH1 0x02
00000c9f: EXP
00000ca0: SUB
00000ca1: AND
00000ca2: PUSH1 0x24
00000ca4: DUP3
00000ca5: ADD
00000ca6: MSTORE
00000ca7: PUSH1 0x44
00000ca9: ADD
00000caa: PUSH1 0x00
00000cac: PUSH1 0x40
00000cae: MLOAD
00000caf: DUP1
00000cb0: DUP4
00000cb1: SUB
00000cb2: DUP2
00000cb3: DUP7
00000cb4: DUP1
00000cb5: EXTCODESIZE
00000cb6: ISZERO
00000cb7: ISZERO
00000cb8: PUSH2 0x0bd2
00000cbb: JUMPI
00000cbc: PUSH1 0x00
00000cbe: DUP1
00000cbf: REVERT
00000cc0: JUMPDEST
00000cc1: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000cd6: PUSH4 0x081a2e06
00000cdb: PUSH1 0x00
00000cdd: DUP1
00000cde: PUSH1 0x01
00000ce0: PUSH1 0xa0
00000ce2: PUSH1 0x02
00000ce4: EXP
00000ce5: SUB
00000ce6: ADDRESS
00000ce7: AND
00000ce8: BALANCE
00000ce9: DUP13
00000cea: DUP13
00000ceb: DUP13
00000cec: DUP13
00000ced: DUP13
00000cee: DUP13
00000cef: DUP13
00000cf0: DUP13
00000cf1: PUSH1 0x40
00000cf3: MLOAD
00000cf4: DUP13
00000cf5: PUSH4 0xffffffff
00000cfa: AND
00000cfb: PUSH1 0xe0
00000cfd: PUSH1 0x02
00000cff: EXP
00000d00: MUL
00000d01: DUP2
00000d02: MSTORE
00000d03: PUSH1 0x04
00000d05: ADD
00000d06: DUP1
00000d07: DUP13
00000d08: DUP2
00000d09: MSTORE
00000d0a: PUSH1 0x20
00000d0c: ADD
00000d0d: DUP12
00000d0e: PUSH1 0x01
00000d10: PUSH1 0xa0
00000d12: PUSH1 0x02
00000d14: EXP
00000d15: SUB
00000d16: AND
00000d17: PUSH1 0x01
00000d19: PUSH1 0xa0
00000d1b: PUSH1 0x02
00000d1d: EXP
00000d1e: SUB
00000d1f: AND
00000d20: DUP2
00000d21: MSTORE
00000d22: PUSH1 0x20
00000d24: ADD
00000d25: DUP11
00000d26: DUP2
00000d27: MSTORE
00000d28: PUSH1 0x20
00000d2a: ADD
00000d2b: DUP10
00000d2c: PUSH1 0x01
00000d2e: PUSH1 0xa0
00000d30: PUSH1 0x02
00000d32: EXP
00000d33: SUB
00000d34: AND
00000d35: PUSH1 0x01
00000d37: PUSH1 0xa0
00000d39: PUSH1 0x02
00000d3b: EXP
00000d3c: SUB
00000d3d: AND
00000d3e: DUP2
00000d3f: MSTORE
00000d40: PUSH1 0x20
00000d42: ADD
00000d43: DUP9
00000d44: DUP2
00000d45: MSTORE
00000d46: PUSH1 0x20
00000d48: ADD
00000d49: DUP1
00000d4a: PUSH1 0x20
00000d4c: ADD
00000d4d: DUP7
00000d4e: DUP2
00000d4f: MSTORE
00000d50: PUSH1 0x20
00000d52: ADD
00000d53: DUP6
00000d54: DUP2
00000d55: MSTORE
00000d56: PUSH1 0x20
00000d58: ADD
00000d59: DUP1
00000d5a: PUSH1 0x20
00000d5c: ADD
00000d5d: DUP4
00000d5e: DUP2
00000d5f: SUB
00000d60: DUP4
00000d61: MSTORE
00000d62: DUP10
00000d63: DUP10
00000d64: DUP3
00000d65: DUP2
00000d66: DUP2
00000d67: MSTORE
00000d68: PUSH1 0x20
00000d6a: ADD
00000d6b: SWAP3
00000d6c: POP
00000d6d: DUP1
00000d6e: DUP3
00000d6f: DUP5
00000d70: CALLDATACOPY
00000d71: SWAP1
00000d72: SWAP2
00000d73: ADD
00000d74: DUP5
00000d75: DUP2
00000d76: SUB
00000d77: DUP4
00000d78: MSTORE
00000d79: DUP6
00000d7a: DUP2
00000d7b: MSTORE
00000d7c: PUSH1 0x20
00000d7e: ADD
00000d7f: SWAP1
00000d80: POP
00000d81: DUP6
00000d82: DUP6
00000d83: DUP1
00000d84: DUP3
00000d85: DUP5
00000d86: CALLDATACOPY
00000d87: DUP3
00000d88: ADD
00000d89: SWAP2
00000d8a: POP
00000d8b: POP
00000d8c: SWAP14
00000d8d: POP
00000d8e: POP
00000d8f: POP
00000d90: POP
00000d91: POP
00000d92: POP
00000d93: POP
00000d94: POP
00000d95: POP
00000d96: POP
00000d97: POP
00000d98: POP
00000d99: POP
00000d9a: POP
00000d9b: PUSH1 0x00
00000d9d: PUSH1 0x40
00000d9f: MLOAD
00000da0: DUP1
00000da1: DUP4
00000da2: SUB
00000da3: DUP2
00000da4: DUP7
00000da5: DUP1
00000da6: EXTCODESIZE
00000da7: ISZERO
00000da8: ISZERO
00000da9: PUSH2 0x0903
00000dac: JUMPI
00000dad: PUSH1 0x00
00000daf: DUP1
00000db0: REVERT
00000db1: JUMPDEST
00000db2: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000dc7: PUSH4 0x6a5471be
00000dcc: PUSH1 0x00
00000dce: DUP1
00000dcf: PUSH1 0x40
00000dd1: MLOAD
00000dd2: PUSH1 0xe0
00000dd4: PUSH1 0x02
00000dd6: EXP
00000dd7: PUSH4 0xffffffff
00000ddc: DUP6
00000ddd: AND
00000dde: MUL
00000ddf: DUP2
00000de0: MSTORE
00000de1: PUSH1 0x04
00000de3: DUP2
00000de4: ADD
00000de5: SWAP3
00000de6: SWAP1
00000de7: SWAP3
00000de8: MSTORE
00000de9: PUSH1 0x01
00000deb: PUSH1 0xa0
00000ded: PUSH1 0x02
00000def: EXP
00000df0: SUB
00000df1: AND
00000df2: PUSH1 0x24
00000df4: DUP3
00000df5: ADD
00000df6: MSTORE
00000df7: PUSH1 0x44
00000df9: ADD
00000dfa: PUSH1 0x00
00000dfc: PUSH1 0x40
00000dfe: MLOAD
00000dff: DUP1
00000e00: DUP4
00000e01: SUB
00000e02: DUP2
00000e03: DUP7
00000e04: DUP1
00000e05: EXTCODESIZE
00000e06: ISZERO
00000e07: ISZERO
00000e08: PUSH2 0x0e10
00000e0b: JUMPI
00000e0c: PUSH1 0x00
00000e0e: DUP1
00000e0f: REVERT
00000e10: JUMPDEST
00000e11: GAS
00000e12: DELEGATECALL
00000e13: ISZERO
00000e14: ISZERO
00000e15: PUSH2 0x0e1d
00000e18: JUMPI
00000e19: PUSH1 0x00
00000e1b: DUP1
00000e1c: REVERT
00000e1d: JUMPDEST
00000e1e: POP
00000e1f: POP
00000e20: POP
00000e21: JUMP
00000e22: JUMPDEST
00000e23: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000e38: PUSH4 0x38ac816e
00000e3d: PUSH1 0x00
00000e3f: DUP7
00000e40: DUP7
00000e41: PUSH1 0x40
00000e43: MLOAD
00000e44: PUSH32 0x6465706f73697400000000000000000000000000000000000000000000000000
00000e65: DUP2
00000e66: MSTORE
00000e67: PUSH1 0x07
00000e69: ADD
00000e6a: PUSH1 0x40
00000e6c: MLOAD
00000e6d: DUP1
00000e6e: SWAP2
00000e6f: SUB
00000e70: SWAP1
00000e71: KECCAK256
00000e72: ADDRESS
00000e73: CALLER
00000e74: DUP12
00000e75: DUP12
00000e76: PUSH1 0x40
00000e78: MLOAD
00000e79: SWAP5
00000e7a: DUP6
00000e7b: MSTORE
00000e7c: PUSH13 0x01000000000000000000000000
00000e8a: PUSH1 0x01
00000e8c: PUSH1 0xa0
00000e8e: PUSH1 0x02
00000e90: EXP
00000e91: SUB
00000e92: SWAP5
00000e93: DUP6
00000e94: AND
00000e95: DUP2
00000e96: MUL
00000e97: PUSH1 0x20
00000e99: DUP8
00000e9a: ADD
00000e9b: MSTORE
00000e9c: SWAP3
00000e9d: SWAP1
00000e9e: SWAP4
00000e9f: AND
00000ea0: SWAP1
00000ea1: SWAP2
00000ea2: MUL
00000ea3: PUSH1 0x34
00000ea5: DUP5
00000ea6: ADD
00000ea7: MSTORE
00000ea8: PUSH1 0x48
00000eaa: DUP4
00000eab: ADD
00000eac: MSTORE
00000ead: PUSH1 0x68
00000eaf: DUP3
00000eb0: ADD
00000eb1: MSTORE
00000eb2: PUSH1 0x88
00000eb4: ADD
00000eb5: PUSH1 0x40
00000eb7: MLOAD
00000eb8: DUP1
00000eb9: SWAP2
00000eba: SUB
00000ebb: SWAP1
00000ebc: KECCAK256
00000ebd: DUP8
00000ebe: DUP8
00000ebf: PUSH1 0x40
00000ec1: MLOAD
00000ec2: PUSH1 0xe0
00000ec4: PUSH1 0x02
00000ec6: EXP
00000ec7: PUSH4 0xffffffff
00000ecc: DUP10
00000ecd: AND
00000ece: MUL
00000ecf: DUP2
00000ed0: MSTORE
00000ed1: PUSH1 0x04
00000ed3: DUP2
00000ed4: ADD
00000ed5: DUP8
00000ed6: DUP2
00000ed7: MSTORE
00000ed8: PUSH1 0x24
00000eda: DUP3
00000edb: ADD
00000edc: DUP8
00000edd: SWAP1
00000ede: MSTORE
00000edf: PUSH1 0x44
00000ee1: DUP3
00000ee2: ADD
00000ee3: DUP7
00000ee4: SWAP1
00000ee5: MSTORE
00000ee6: PUSH1 0x64
00000ee8: DUP3
00000ee9: ADD
00000eea: DUP6
00000eeb: SWAP1
00000eec: MSTORE
00000eed: PUSH1 0xa0
00000eef: PUSH1 0x84
00000ef1: DUP4
00000ef2: ADD
00000ef3: SWAP1
00000ef4: DUP2
00000ef5: MSTORE
00000ef6: PUSH1 0xa4
00000ef8: DUP4
00000ef9: ADD
00000efa: DUP5
00000efb: SWAP1
00000efc: MSTORE
00000efd: SWAP1
00000efe: SWAP2
00000eff: PUSH1 0xc4
00000f01: ADD
00000f02: DUP5
00000f03: DUP5
00000f04: DUP1
00000f05: DUP3
00000f06: DUP5
00000f07: CALLDATACOPY
00000f08: DUP3
00000f09: ADD
00000f0a: SWAP2
00000f0b: POP
00000f0c: POP
00000f0d: SWAP8
00000f0e: POP
00000f0f: POP
00000f10: POP
00000f11: POP
00000f12: POP
00000f13: POP
00000f14: POP
00000f15: POP
00000f16: PUSH1 0x00
00000f18: PUSH1 0x40
00000f1a: MLOAD
00000f1b: DUP1
00000f1c: DUP4
00000f1d: SUB
00000f1e: DUP2
00000f1f: DUP7
00000f20: DUP1
00000f21: EXTCODESIZE
00000f22: ISZERO
00000f23: ISZERO
00000f24: PUSH2 0x0f2c
00000f27: JUMPI
00000f28: PUSH1 0x00
00000f2a: DUP1
00000f2b: REVERT
00000f2c: JUMPDEST
00000f2d: GAS
00000f2e: DELEGATECALL
00000f2f: ISZERO
00000f30: ISZERO
00000f31: PUSH2 0x0f39
00000f34: JUMPI
00000f35: PUSH1 0x00
00000f37: DUP1
00000f38: REVERT
00000f39: JUMPDEST
00000f3a: POP
00000f3b: POP
00000f3c: POP
00000f3d: PUSH1 0x00
00000f3f: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000f54: PUSH4 0x914293e7
00000f59: SWAP1
00000f5a: SWAP2
00000f5b: CALLER
00000f5c: CALLVALUE
00000f5d: DUP9
00000f5e: PUSH1 0x40
00000f60: MLOAD
00000f61: PUSH1 0xe0
00000f63: PUSH1 0x02
00000f65: EXP
00000f66: PUSH4 0xffffffff
00000f6b: DUP8
00000f6c: AND
00000f6d: MUL
00000f6e: DUP2
00000f6f: MSTORE
00000f70: PUSH1 0x04
00000f72: DUP2
00000f73: ADD
00000f74: SWAP5
00000f75: SWAP1
00000f76: SWAP5
00000f77: MSTORE
00000f78: PUSH1 0x01
00000f7a: PUSH1 0xa0
00000f7c: PUSH1 0x02
00000f7e: EXP
00000f7f: SUB
00000f80: SWAP1
00000f81: SWAP3
00000f82: AND
00000f83: PUSH1 0x24
00000f85: DUP5
00000f86: ADD
00000f87: MSTORE
00000f88: PUSH1 0x44
00000f8a: DUP4
00000f8b: ADD
00000f8c: MSTORE
00000f8d: PUSH1 0x64
00000f8f: DUP3
00000f90: ADD
00000f91: MSTORE
00000f92: PUSH1 0x84
00000f94: ADD
00000f95: PUSH1 0x00
00000f97: PUSH1 0x40
00000f99: MLOAD
00000f9a: DUP1
00000f9b: DUP4
00000f9c: SUB
00000f9d: DUP2
00000f9e: DUP7
00000f9f: DUP1
00000fa0: EXTCODESIZE
00000fa1: ISZERO
00000fa2: ISZERO
00000fa3: PUSH2 0x0fab
00000fa6: JUMPI
00000fa7: PUSH1 0x00
00000fa9: DUP1
00000faa: REVERT
00000fab: JUMPDEST
00000fac: GAS
00000fad: DELEGATECALL
00000fae: ISZERO
00000faf: ISZERO
00000fb0: PUSH2 0x0fb8
00000fb3: JUMPI
00000fb4: PUSH1 0x00
00000fb6: DUP1
00000fb7: REVERT
00000fb8: JUMPDEST
00000fb9: POP
00000fba: POP
00000fbb: POP
00000fbc: POP
00000fbd: POP
00000fbe: POP
00000fbf: POP
00000fc0: JUMP
00000fc1: JUMPDEST
00000fc2: PUSH1 0x00
00000fc4: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00000fd9: PUSH4 0xec5cbcd4
00000fde: DUP3
00000fdf: DUP5
00000fe0: PUSH1 0x40
00000fe2: MLOAD
00000fe3: PUSH1 0xe0
00000fe5: PUSH1 0x02
00000fe7: EXP
00000fe8: PUSH4 0xffffffff
00000fed: DUP6
00000fee: AND
00000fef: MUL
00000ff0: DUP2
00000ff1: MSTORE
00000ff2: PUSH1 0x04
00000ff4: DUP2
00000ff5: ADD
00000ff6: SWAP3
00000ff7: SWAP1
00000ff8: SWAP3
00000ff9: MSTORE
00000ffa: PUSH1 0x01
00000ffc: PUSH1 0xa0
00000ffe: PUSH1 0x02
00001000: EXP
00001001: SUB
00001002: AND
00001003: PUSH1 0x24
00001005: DUP3
00001006: ADD
00001007: MSTORE
00001008: PUSH1 0x44
0000100a: ADD
0000100b: PUSH1 0x20
0000100d: PUSH1 0x40
0000100f: MLOAD
00001010: DUP1
00001011: DUP4
00001012: SUB
00001013: DUP2
00001014: DUP7
00001015: DUP1
00001016: EXTCODESIZE
00001017: ISZERO
00001018: ISZERO
00001019: PUSH2 0x1021
0000101c: JUMPI
0000101d: PUSH1 0x00
0000101f: DUP1
00001020: REVERT
00001021: JUMPDEST
00001022: GAS
00001023: DELEGATECALL
00001024: ISZERO
00001025: ISZERO
00001026: PUSH2 0x102e
00001029: JUMPI
0000102a: PUSH1 0x00
0000102c: DUP1
0000102d: REVERT
0000102e: JUMPDEST
0000102f: POP
00001030: POP
00001031: POP
00001032: PUSH1 0x40
00001034: MLOAD
00001035: DUP1
00001036: MLOAD
00001037: SWAP4
00001038: SWAP3
00001039: POP
0000103a: POP
0000103b: POP
0000103c: JUMP
0000103d: JUMPDEST
0000103e: PUSH1 0x17
00001040: SLOAD
00001041: PUSH1 0xa0
00001043: PUSH1 0x02
00001045: EXP
00001046: SWAP1
00001047: DIV
00001048: PUSH1 0xff
0000104a: AND
0000104b: ISZERO
0000104c: PUSH2 0x1054
0000104f: JUMPI
00001050: PUSH1 0x00
00001052: DUP1
00001053: REVERT
00001054: JUMPDEST
00001055: PUSH1 0x17
00001057: DUP1
00001058: SLOAD
00001059: PUSH1 0xa0
0000105b: PUSH1 0x02
0000105d: EXP
0000105e: PUSH1 0xff
00001060: MUL
00001061: NOT
00001062: AND
00001063: PUSH1 0xa0
00001065: PUSH1 0x02
00001067: EXP
00001068: OR
00001069: SWAP1
0000106a: SSTORE
0000106b: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00001080: PUSH4 0x044a32e8
00001085: PUSH1 0x00
00001087: DUP1
00001088: DUP7
00001089: DUP7
0000108a: DUP7
0000108b: PUSH1 0x40
0000108d: MLOAD
0000108e: PUSH1 0xe0
00001090: PUSH1 0x02
00001092: EXP
00001093: PUSH4 0xffffffff
00001098: DUP9
00001099: AND
0000109a: MUL
0000109b: DUP2
0000109c: MSTORE
0000109d: PUSH1 0x04
0000109f: DUP2
000010a0: ADD
000010a1: SWAP6
000010a2: SWAP1
000010a3: SWAP6
000010a4: MSTORE
000010a5: PUSH1 0x01
000010a7: PUSH1 0xa0
000010a9: PUSH1 0x02
000010ab: EXP
000010ac: SUB
000010ad: SWAP4
000010ae: DUP5
000010af: AND
000010b0: PUSH1 0x24
000010b2: DUP7
000010b3: ADD
000010b4: MSTORE
000010b5: SWAP2
000010b6: SWAP1
000010b7: SWAP3
000010b8: AND
000010b9: PUSH1 0x44
000010bb: DUP5
000010bc: ADD
000010bd: MSTORE
000010be: SWAP1
000010bf: ISZERO
000010c0: ISZERO
000010c1: PUSH1 0x64
000010c3: DUP4
000010c4: ADD
000010c5: MSTORE
000010c6: ISZERO
000010c7: ISZERO
000010c8: PUSH1 0x84
000010ca: DUP3
000010cb: ADD
000010cc: MSTORE
000010cd: PUSH1 0xa4
000010cf: ADD
000010d0: PUSH1 0x00
000010d2: PUSH1 0x40
000010d4: MLOAD
000010d5: DUP1
000010d6: DUP4
000010d7: SUB
000010d8: DUP2
000010d9: DUP7
000010da: DUP1
000010db: EXTCODESIZE
000010dc: ISZERO
000010dd: ISZERO
000010de: PUSH2 0x09dc
000010e1: JUMPI
000010e2: PUSH1 0x00
000010e4: DUP1
000010e5: REVERT
000010e6: JUMPDEST
000010e7: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
000010fc: PUSH4 0xdde9806b
00001101: PUSH1 0x00
00001103: DUP7
00001104: DUP7
00001105: DUP7
00001106: DUP7
00001107: PUSH1 0x40
00001109: MLOAD
0000110a: PUSH1 0xe0
0000110c: PUSH1 0x02
0000110e: EXP
0000110f: PUSH4 0xffffffff
00001114: DUP9
00001115: AND
00001116: MUL
00001117: DUP2
00001118: MSTORE
00001119: PUSH1 0x04
0000111b: DUP2
0000111c: ADD
0000111d: DUP7
0000111e: DUP2
0000111f: MSTORE
00001120: PUSH1 0x01
00001122: PUSH1 0xa0
00001124: PUSH1 0x02
00001126: EXP
00001127: SUB
00001128: DUP7
00001129: AND
0000112a: PUSH1 0x24
0000112c: DUP4
0000112d: ADD
0000112e: MSTORE
0000112f: PUSH1 0x44
00001131: DUP3
00001132: ADD
00001133: DUP6
00001134: SWAP1
00001135: MSTORE
00001136: PUSH1 0x80
00001138: PUSH1 0x64
0000113a: DUP4
0000113b: ADD
0000113c: SWAP1
0000113d: DUP2
0000113e: MSTORE
0000113f: PUSH1 0x84
00001141: DUP4
00001142: ADD
00001143: DUP5
00001144: SWAP1
00001145: MSTORE
00001146: SWAP1
00001147: SWAP2
00001148: PUSH1 0xa4
0000114a: ADD
0000114b: DUP5
0000114c: DUP5
0000114d: DUP1
0000114e: DUP3
0000114f: DUP5
00001150: CALLDATACOPY
00001151: DUP3
00001152: ADD
00001153: SWAP2
00001154: POP
00001155: POP
00001156: SWAP7
00001157: POP
00001158: POP
00001159: POP
0000115a: POP
0000115b: POP
0000115c: POP
0000115d: POP
0000115e: PUSH1 0x00
00001160: PUSH1 0x40
00001162: MLOAD
00001163: DUP1
00001164: DUP4
00001165: SUB
00001166: DUP2
00001167: DUP7
00001168: DUP1
00001169: EXTCODESIZE
0000116a: ISZERO
0000116b: ISZERO
0000116c: PUSH2 0x0fab
0000116f: JUMPI
00001170: PUSH1 0x00
00001172: DUP1
00001173: REVERT
00001174: JUMPDEST
00001175: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
0000118a: PUSH4 0x6c324928
0000118f: PUSH1 0x00
00001191: DUP9
00001192: DUP9
00001193: DUP9
00001194: DUP9
00001195: DUP9
00001196: DUP9
00001197: PUSH1 0x40
00001199: MLOAD
0000119a: DUP9
0000119b: PUSH4 0xffffffff
000011a0: AND
000011a1: PUSH1 0xe0
000011a3: PUSH1 0x02
000011a5: EXP
000011a6: MUL
000011a7: DUP2
000011a8: MSTORE
000011a9: PUSH1 0x04
000011ab: ADD
000011ac: DUP1
000011ad: DUP9
000011ae: DUP2
000011af: MSTORE
000011b0: PUSH1 0x20
000011b2: ADD
000011b3: DUP8
000011b4: PUSH1 0x01
000011b6: PUSH1 0xa0
000011b8: PUSH1 0x02
000011ba: EXP
000011bb: SUB
000011bc: AND
000011bd: PUSH1 0x01
000011bf: PUSH1 0xa0
000011c1: PUSH1 0x02
000011c3: EXP
000011c4: SUB
000011c5: AND
000011c6: DUP2
000011c7: MSTORE
000011c8: PUSH1 0x20
000011ca: ADD
000011cb: DUP7
000011cc: PUSH1 0x01
000011ce: PUSH1 0xa0
000011d0: PUSH1 0x02
000011d2: EXP
000011d3: SUB
000011d4: AND
000011d5: PUSH1 0x01
000011d7: PUSH1 0xa0
000011d9: PUSH1 0x02
000011db: EXP
000011dc: SUB
000011dd: AND
000011de: DUP2
000011df: MSTORE
000011e0: PUSH1 0x20
000011e2: ADD
000011e3: DUP1
000011e4: PUSH1 0x20
000011e6: ADD
000011e7: DUP6
000011e8: DUP2
000011e9: MSTORE
000011ea: PUSH1 0x20
000011ec: ADD
000011ed: DUP5
000011ee: DUP2
000011ef: MSTORE
000011f0: PUSH1 0x20
000011f2: ADD
000011f3: DUP1
000011f4: PUSH1 0x20
000011f6: ADD
000011f7: DUP4
000011f8: DUP2
000011f9: SUB
000011fa: DUP4
000011fb: MSTORE
000011fc: DUP8
000011fd: DUP2
000011fe: DUP2
000011ff: MLOAD
00001200: DUP2
00001201: MSTORE
00001202: PUSH1 0x20
00001204: ADD
00001205: SWAP2
00001206: POP
00001207: DUP1
00001208: MLOAD
00001209: SWAP1
0000120a: PUSH1 0x20
0000120c: ADD
0000120d: SWAP1
0000120e: PUSH1 0x20
00001210: MUL
00001211: DUP1
00001212: DUP4
00001213: DUP4
00001214: PUSH1 0x00
00001216: JUMPDEST
00001217: DUP4
00001218: DUP2
00001219: LT
0000121a: ISZERO
0000121b: PUSH2 0x122e
0000121e: JUMPI
0000121f: DUP1
00001220: DUP3
00001221: ADD
00001222: MLOAD
00001223: DUP4
00001224: DUP3
00001225: ADD
00001226: MSTORE
00001227: PUSH1 0x20
00001229: ADD
0000122a: PUSH2 0x1216
0000122d: JUMP
0000122e: JUMPDEST
0000122f: POP
00001230: POP
00001231: POP
00001232: POP
00001233: SWAP1
00001234: POP
00001235: ADD
00001236: DUP4
00001237: DUP2
00001238: SUB
00001239: DUP3
0000123a: MSTORE
0000123b: DUP5
0000123c: DUP2
0000123d: DUP2
0000123e: MLOAD
0000123f: DUP2
00001240: MSTORE
00001241: PUSH1 0x20
00001243: ADD
00001244: SWAP2
00001245: POP
00001246: DUP1
00001247: MLOAD
00001248: SWAP1
00001249: PUSH1 0x20
0000124b: ADD
0000124c: SWAP1
0000124d: DUP1
0000124e: DUP4
0000124f: DUP4
00001250: PUSH1 0x00
00001252: JUMPDEST
00001253: DUP4
00001254: DUP2
00001255: LT
00001256: ISZERO
00001257: PUSH2 0x126a
0000125a: JUMPI
0000125b: DUP1
0000125c: DUP3
0000125d: ADD
0000125e: MLOAD
0000125f: DUP4
00001260: DUP3
00001261: ADD
00001262: MSTORE
00001263: PUSH1 0x20
00001265: ADD
00001266: PUSH2 0x1252
00001269: JUMP
0000126a: JUMPDEST
0000126b: POP
0000126c: POP
0000126d: POP
0000126e: POP
0000126f: SWAP1
00001270: POP
00001271: SWAP1
00001272: DUP2
00001273: ADD
00001274: SWAP1
00001275: PUSH1 0x1f
00001277: AND
00001278: DUP1
00001279: ISZERO
0000127a: PUSH2 0x1297
0000127d: JUMPI
0000127e: DUP1
0000127f: DUP3
00001280: SUB
00001281: DUP1
00001282: MLOAD
00001283: PUSH1 0x01
00001285: DUP4
00001286: PUSH1 0x20
00001288: SUB
00001289: PUSH2 0x0100
0000128c: EXP
0000128d: SUB
0000128e: NOT
0000128f: AND
00001290: DUP2
00001291: MSTORE
00001292: PUSH1 0x20
00001294: ADD
00001295: SWAP2
00001296: POP
00001297: JUMPDEST
00001298: POP
00001299: SWAP10
0000129a: POP
0000129b: POP
0000129c: POP
0000129d: POP
0000129e: POP
0000129f: POP
000012a0: POP
000012a1: POP
000012a2: POP
000012a3: POP
000012a4: PUSH1 0x00
000012a6: PUSH1 0x40
000012a8: MLOAD
000012a9: DUP1
000012aa: DUP4
000012ab: SUB
000012ac: DUP2
000012ad: DUP7
000012ae: DUP1
000012af: EXTCODESIZE
000012b0: ISZERO
000012b1: ISZERO
000012b2: PUSH2 0x076d
000012b5: JUMPI
000012b6: PUSH1 0x00
000012b8: DUP1
000012b9: REVERT
000012ba: JUMPDEST
000012bb: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
000012d0: PUSH4 0x2006b39d
000012d5: PUSH1 0x00
000012d7: DUP8
000012d8: DUP8
000012d9: DUP8
000012da: DUP8
000012db: DUP8
000012dc: PUSH1 0x40
000012de: MLOAD
000012df: DUP8
000012e0: PUSH4 0xffffffff
000012e5: AND
000012e6: PUSH1 0xe0
000012e8: PUSH1 0x02
000012ea: EXP
000012eb: MUL
000012ec: DUP2
000012ed: MSTORE
000012ee: PUSH1 0x04
000012f0: ADD
000012f1: DUP1
000012f2: DUP8
000012f3: DUP2
000012f4: MSTORE
000012f5: PUSH1 0x20
000012f7: ADD
000012f8: DUP7
000012f9: DUP2
000012fa: MSTORE
000012fb: PUSH1 0x20
000012fd: ADD
000012fe: DUP6
000012ff: DUP2
00001300: MSTORE
00001301: PUSH1 0x20
00001303: ADD
00001304: DUP5
00001305: DUP2
00001306: MSTORE
00001307: PUSH1 0x20
00001309: ADD
0000130a: DUP1
0000130b: PUSH1 0x20
0000130d: ADD
0000130e: DUP3
0000130f: DUP2
00001310: SUB
00001311: DUP3
00001312: MSTORE
00001313: DUP5
00001314: DUP5
00001315: DUP3
00001316: DUP2
00001317: DUP2
00001318: MSTORE
00001319: PUSH1 0x20
0000131b: ADD
0000131c: SWAP3
0000131d: POP
0000131e: PUSH1 0x20
00001320: MUL
00001321: DUP1
00001322: DUP3
00001323: DUP5
00001324: CALLDATACOPY
00001325: DUP3
00001326: ADD
00001327: SWAP2
00001328: POP
00001329: POP
0000132a: SWAP8
0000132b: POP
0000132c: POP
0000132d: POP
0000132e: POP
0000132f: POP
00001330: POP
00001331: POP
00001332: POP
00001333: PUSH1 0x00
00001335: PUSH1 0x40
00001337: MLOAD
00001338: DUP1
00001339: DUP4
0000133a: SUB
0000133b: DUP2
0000133c: DUP7
0000133d: DUP1
0000133e: EXTCODESIZE
0000133f: ISZERO
00001340: ISZERO
00001341: PUSH2 0x1349
00001344: JUMPI
00001345: PUSH1 0x00
00001347: DUP1
00001348: REVERT
00001349: JUMPDEST
0000134a: GAS
0000134b: DELEGATECALL
0000134c: ISZERO
0000134d: ISZERO
0000134e: PUSH2 0x1356
00001351: JUMPI
00001352: PUSH1 0x00
00001354: DUP1
00001355: REVERT
00001356: JUMPDEST
00001357: POP
00001358: POP
00001359: POP
0000135a: POP
0000135b: POP
0000135c: POP
0000135d: POP
0000135e: POP
0000135f: JUMP
00001360: JUMPDEST
00001361: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00001376: PUSH4 0x536b7ad5
0000137b: PUSH1 0x00
0000137d: DUP7
0000137e: DUP7
0000137f: DUP7
00001380: DUP7
00001381: PUSH1 0x40
00001383: MLOAD
00001384: DUP7
00001385: PUSH4 0xffffffff
0000138a: AND
0000138b: PUSH1 0xe0
0000138d: PUSH1 0x02
0000138f: EXP
00001390: MUL
00001391: DUP2
00001392: MSTORE
00001393: PUSH1 0x04
00001395: ADD
00001396: DUP1
00001397: DUP7
00001398: DUP2
00001399: MSTORE
0000139a: PUSH1 0x20
0000139c: ADD
0000139d: DUP1
0000139e: PUSH1 0x20
000013a0: ADD
000013a1: DUP1
000013a2: PUSH1 0x20
000013a4: ADD
000013a5: DUP4
000013a6: DUP2
000013a7: SUB
000013a8: DUP4
000013a9: MSTORE
000013aa: DUP8
000013ab: DUP8
000013ac: DUP3
000013ad: DUP2
000013ae: DUP2
000013af: MSTORE
000013b0: PUSH1 0x20
000013b2: ADD
000013b3: SWAP3
000013b4: POP
000013b5: PUSH1 0x20
000013b7: MUL
000013b8: DUP1
000013b9: DUP3
000013ba: DUP5
000013bb: CALLDATACOPY
000013bc: SWAP1
000013bd: SWAP2
000013be: ADD
000013bf: DUP5
000013c0: DUP2
000013c1: SUB
000013c2: DUP4
000013c3: MSTORE
000013c4: DUP6
000013c5: DUP2
000013c6: MSTORE
000013c7: PUSH1 0x20
000013c9: SWAP1
000013ca: DUP2
000013cb: ADD
000013cc: SWAP2
000013cd: POP
000013ce: DUP7
000013cf: SWAP1
000013d0: DUP7
000013d1: MUL
000013d2: DUP1
000013d3: DUP3
000013d4: DUP5
000013d5: CALLDATACOPY
000013d6: DUP3
000013d7: ADD
000013d8: SWAP2
000013d9: POP
000013da: POP
000013db: SWAP8
000013dc: POP
000013dd: POP
000013de: POP
000013df: POP
000013e0: POP
000013e1: POP
000013e2: POP
000013e3: POP
000013e4: PUSH1 0x00
000013e6: PUSH1 0x40
000013e8: MLOAD
000013e9: DUP1
000013ea: DUP4
000013eb: SUB
000013ec: DUP2
000013ed: DUP7
000013ee: DUP1
000013ef: EXTCODESIZE
000013f0: ISZERO
000013f1: ISZERO
000013f2: PUSH2 0x0fab
000013f5: JUMPI
000013f6: PUSH1 0x00
000013f8: DUP1
000013f9: REVERT
000013fa: JUMPDEST
000013fb: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
00001410: PUSH4 0xc636159e
00001415: PUSH1 0x00
00001417: DUP1
00001418: DUP9
00001419: DUP9
0000141a: DUP9
0000141b: DUP9
0000141c: DUP9
0000141d: PUSH1 0x40
0000141f: MLOAD
00001420: DUP9
00001421: PUSH4 0xffffffff
00001426: AND
00001427: PUSH1 0xe0
00001429: PUSH1 0x02
0000142b: EXP
0000142c: MUL
0000142d: DUP2
0000142e: MSTORE
0000142f: PUSH1 0x04
00001431: ADD
00001432: DUP1
00001433: DUP9
00001434: DUP2
00001435: MSTORE
00001436: PUSH1 0x20
00001438: ADD
00001439: DUP8
0000143a: PUSH1 0x01
0000143c: PUSH1 0xa0
0000143e: PUSH1 0x02
00001440: EXP
00001441: SUB
00001442: AND
00001443: PUSH1 0x01
00001445: PUSH1 0xa0
00001447: PUSH1 0x02
00001449: EXP
0000144a: SUB
0000144b: AND
0000144c: DUP2
0000144d: MSTORE
0000144e: PUSH1 0x20
00001450: ADD
00001451: DUP7
00001452: DUP2
00001453: MSTORE
00001454: PUSH1 0x20
00001456: ADD
00001457: DUP6
00001458: DUP2
00001459: MSTORE
0000145a: PUSH1 0x20
0000145c: ADD
0000145d: DUP5
0000145e: DUP2
0000145f: MSTORE
00001460: PUSH1 0x20
00001462: ADD
00001463: DUP1
00001464: PUSH1 0x20
00001466: ADD
00001467: DUP3
00001468: DUP2
00001469: SUB
0000146a: DUP3
0000146b: MSTORE
0000146c: DUP5
0000146d: DUP5
0000146e: DUP3
0000146f: DUP2
00001470: DUP2
00001471: MSTORE
00001472: PUSH1 0x20
00001474: ADD
00001475: SWAP3
00001476: POP
00001477: DUP1
00001478: DUP3
00001479: DUP5
0000147a: CALLDATACOPY
0000147b: DUP3
0000147c: ADD
0000147d: SWAP2
0000147e: POP
0000147f: POP
00001480: SWAP9
00001481: POP
00001482: POP
00001483: POP
00001484: POP
00001485: POP
00001486: POP
00001487: POP
00001488: POP
00001489: POP
0000148a: PUSH1 0x00
0000148c: PUSH1 0x40
0000148e: MLOAD
0000148f: DUP1
00001490: DUP4
00001491: SUB
00001492: DUP2
00001493: DUP7
00001494: DUP1
00001495: EXTCODESIZE
00001496: ISZERO
00001497: ISZERO
00001498: PUSH2 0x1349
0000149b: JUMPI
0000149c: PUSH1 0x00
0000149e: DUP1
0000149f: REVERT
000014a0: JUMPDEST
000014a1: PUSH1 0x17
000014a3: SLOAD
000014a4: PUSH1 0xa0
000014a6: PUSH1 0x02
000014a8: EXP
000014a9: SWAP1
000014aa: DIV
000014ab: PUSH1 0xff
000014ad: AND
000014ae: ISZERO
000014af: PUSH2 0x14b7
000014b2: JUMPI
000014b3: PUSH1 0x00
000014b5: DUP1
000014b6: REVERT
000014b7: JUMPDEST
000014b8: PUSH1 0x17
000014ba: DUP1
000014bb: SLOAD
000014bc: PUSH1 0xa0
000014be: PUSH1 0x02
000014c0: EXP
000014c1: PUSH1 0xff
000014c3: MUL
000014c4: NOT
000014c5: AND
000014c6: PUSH1 0xa0
000014c8: PUSH1 0x02
000014ca: EXP
000014cb: OR
000014cc: SWAP1
000014cd: SSTORE
000014ce: PUSH20 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
000014e3: PUSH4 0xc03bc3be
000014e8: PUSH1 0x00
000014ea: DUP1
000014eb: PUSH1 0x01
000014ed: PUSH1 0xa0
000014ef: PUSH1 0x02
000014f1: EXP
000014f2: SUB
000014f3: ADDRESS
000014f4: AND
000014f5: BALANCE
000014f6: DUP7
000014f7: DUP7
000014f8: PUSH1 0x40
000014fa: MLOAD
000014fb: PUSH1 0xe0
000014fd: PUSH1 0x02
000014ff: EXP
00001500: PUSH4 0xffffffff
00001505: DUP9
00001506: AND
00001507: MUL
00001508: DUP2
00001509: MSTORE
0000150a: PUSH1 0x04
0000150c: DUP2
0000150d: ADD
0000150e: DUP7
0000150f: DUP2
00001510: MSTORE
00001511: PUSH1 0x01
00001513: PUSH1 0xa0
00001515: PUSH1 0x02
00001517: EXP
00001518: SUB
00001519: DUP7
0000151a: AND
0000151b: PUSH1 0x24
0000151d: DUP4
0000151e: ADD
0000151f: MSTORE
00001520: PUSH1 0x44
00001522: DUP3
00001523: ADD
00001524: DUP6
00001525: SWAP1
00001526: MSTORE
00001527: PUSH1 0x80
00001529: PUSH1 0x64
0000152b: DUP4
0000152c: ADD
0000152d: SWAP1
0000152e: DUP2
0000152f: MSTORE
00001530: PUSH1 0x84
00001532: DUP4
00001533: ADD
00001534: DUP5
00001535: SWAP1
00001536: MSTORE
00001537: SWAP1
00001538: SWAP2
00001539: PUSH1 0xa4
0000153b: ADD
0000153c: DUP5
0000153d: PUSH1 0x20
0000153f: DUP6
00001540: MUL
00001541: DUP1
00001542: DUP3
00001543: DUP5
00001544: CALLDATACOPY
00001545: DUP3
00001546: ADD
00001547: SWAP2
00001548: POP
00001549: POP
0000154a: SWAP7
0000154b: POP
0000154c: POP
0000154d: POP
0000154e: POP
0000154f: POP
00001550: POP
00001551: POP
00001552: PUSH1 0x00
00001554: PUSH1 0x40
00001556: MLOAD
00001557: DUP1
00001558: DUP4
00001559: SUB
0000155a: DUP2
0000155b: DUP7
0000155c: DUP1
0000155d: EXTCODESIZE
0000155e: ISZERO
0000155f: ISZERO
00001560: PUSH2 0x1568
00001563: JUMPI
00001564: PUSH1 0x00
00001566: DUP1
00001567: REVERT
00001568: JUMPDEST
00001569: GAS
0000156a: DELEGATECALL
0000156b: ISZERO
0000156c: ISZERO
0000156d: PUSH2 0x1575
00001570: JUMPI
00001571: PUSH1 0x00
00001573: DUP1
00001574: REVERT
00001575: JUMPDEST
00001576: POP
00001577: POP
00001578: PUSH1 0x17
0000157a: DUP1
0000157b: SLOAD
0000157c: PUSH1 0xa0
0000157e: PUSH1 0x02
00001580: EXP
00001581: PUSH1 0xff
00001583: MUL
00001584: NOT
00001585: AND
00001586: SWAP1
00001587: SSTORE
00001588: POP
00001589: POP
0000158a: POP
0000158b: JUMP
0000158c: STOP
0000158d: LOG1
0000158e: PUSH6 0x627a7a723058
00001595: KECCAK256
00001596: UNKNOWN(0xC5)
00001597: SGT
00001598: PUSH30 0x29e7ae6b07edca4d7b228746fa106afb390edc073921fab0c01f59db0500
000015b7: UNKNOWN(0x29)

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
critical upgradeability detector Untrusted DELEGATECALL target reachable 70 no no
view
trace_id: 0x390af1694d69c3b7ca654aa73b317927d4124ad74b9376d76bb414438e6a3e9a
call_targets: 0xedef75523582b5c0ab24cecdec6c4b51faf399d8
target_varies: no
classification: constant_target
validation_json
{
    "sink": "DELEGATECALL",
    "errors": 0,
    "status": "sink_reached",
    "attempts": 1,
    "trace_id": "0x390af1694d69c3b7ca654aa73b317927d4124ad74b9376d76bb414438e6a3e9a",
    "confirmed": false,
    "trace_mode": "callTracer",
    "call_targets": [
        "0xedef75523582b5c0ab24cecdec6c4b51faf399d8"
    ],
    "matched_probe": null,
    "target_varies": false,
    "classification": "constant_target"
}
witness_json
{
    "notes": "heuristic witness; entrypoints are best-effort selectors with zeroed calldata",
    "constraints": [],
    "entrypoints": [
        {
            "calldata": "0x089fff19",
            "selector": "0x089fff19",
            "calldata_variants": [
                "0x089fff19",
                "0x089fff190000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x12d7e533",
            "selector": "0x12d7e533",
            "calldata_variants": [
                "0x12d7e533",
                "0x12d7e5330000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x1fb75dbf",
            "selector": "0x1fb75dbf",
            "calldata_variants": [
                "0x1fb75dbf",
                "0x1fb75dbf0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x2d923501",
            "selector": "0x2d923501",
            "calldata_variants": [
                "0x2d923501",
                "0x2d9235010000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x54fd4d50",
            "selector": "0x54fd4d50",
            "calldata_variants": [
                "0x54fd4d50",
                "0x54fd4d500000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x5a89f648",
            "selector": "0x5a89f648",
            "calldata_variants": [
                "0x5a89f648",
                "0x5a89f6480000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x77d378fe",
            "selector": "0x77d378fe",
            "calldata_variants": [
                "0x77d378fe",
                "0x77d378fe0000000000000000000000000000000000000000000000000000000000000000"
            ]
        },
        {
            "calldata": "0x89fb8a48",
            "selector": "0x89fb8a48",
            "calldata_variants": [
                "0x89fb8a48",
                "0x89fb8a480000000000000000000000000000000000000000000000000000000000000000"
            ]
        }
    ]
}
evidence_json
{
    "examples": [
        {
            "pc": 341,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        },
        {
            "pc": 1903,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        },
        {
            "pc": 2077,
            "opcode": "DELEGATECALL",
            "returndata_checked": null,
            "value_expression_category": "n/a",
            "target_expression_category": "computed"
        }
    ],
    "guards_detected": [],
    "delegatecall_count": 16,
    "untrusted_delegatecall_count": 16
}
medium upgradeability codex External DELEGATECALL to fixed target gives that contract full control of this contract’s storage 75 no
view
evidence_json
{
    "evidence": "Detector reports 16 DELEGATECALL sites with untrusted_delegatecall_count=16; validation observed a constant call target 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. Runtime bytecode shows PUSH20 0xedef\u2026 followed by DELEGATECALL (with only an EXTCODESIZE check).",
    "locations": [
        "pc:341",
        "pc:1903",
        "pc:2077",
        "pc:2309",
        "pc:2526",
        "pc:2638",
        "pc:2781",
        "pc:2921",
        "pc:3028",
        "pc:3151",
        "pc:3602",
        "pc:3886",
        "pc:4013",
        "pc:4131",
        "pc:4939",
        "pc:5482"
    ],
    "recommendation": "Treat 0xedef\u2026 as trusted and immutable; verify it is not a proxy or that its admin is tightly controlled (e.g., multisig with timelock). Consider hard\u2011linking audited library code, or using regular CALL when storage context is not required. Monitor the target\u2019s codehash for unexpected changes.",
    "exploit_scenario": "All reachable entrypoints delegatecall into 0xedef75523582b5c0ab24cecdec6c4b51faf399d8. If that target is a proxy, is upgradable, or becomes compromised, its code can execute in this contract\u2019s storage context and arbitrarily modify balances/ownership/flags or drain funds. This is effectively an external trust dependency even though the target is constant in bytecode."
}
medium upgradeability cast DELEGATECALL present 80 no
view
evidence_json
{
    "notes": "delegatecall enables execution in caller context; common in proxies/upgradeable patterns",
    "delegatecall_count": 16
}
info other cast Heavy EXTCODE*/BALANCE usage 55 no
view
evidence_json
{
    "notes": "frequent external code or balance checks; may indicate introspection or validation logic",
    "ext_balance_count": 26
}