Despite the name, WASM files are binary data. If you want to see the 
disassembly, either look at the WASM files in browser devtools under the 
"Sources" tab, or use the wasm2wat tool from the WABT 
toolkit: https://github.com/WebAssembly/wabt



On Thursday, 4 November 2021 at 18:22:11 UTC+1 [email protected] wrote:

> I download from the browser an a file .wasm of an web application where 
> inside
> is present a unique string like:
>
>
> YAJ/fwF/YAF/AX5gBX9/f39/AGAAAGADf39/AGAHf39/f39/fwBgBH9/f38Bf2AAAX9gAX8Bf2AEf39/fwBgBn9/f39/fwF/YAd/f39/f39/AX9gAAACVQIHLi9pbmRleCJfX3diZ19sb2FkUmVzdWx0c19hNzlhNDg1ODc0MmIxNDkyAAUHLi9pbmRleBxfX3diZ19lcnJvcl...
>
> that is very strange. I usually see some code in file wasm. 
> Is it possible for the code to be decrypted and executed on the fly in the 
> browser?
>

-- 
You received this message because you are subscribed to the Google Groups 
"emscripten-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/emscripten-discuss/acaf9af8-0c26-4f91-ac11-977ac22fdd9bn%40googlegroups.com.

Reply via email to