Tags: assembly 

Rating:

# not assembly
Category: Reverse Engineering

Score: 170 (solved by 173 teams)

Original description: Find the output and wrap it in LITCTF{} !

# Introduction
Нам дается картинка ![notassembly](https://user-images.githubusercontent.com/55994705/181242331-5c545d02-1dbe-450b-8e57-994800c5e97d.png)

Это обычный цикл

```flag=0
codetiger=23
orz=4138
while True:
orz*=3
orz+=codetiger
flag=orz
orz-=9538
if orz<=0:
break
flag-=3571
print(flag)```

flag is: BDSEC{5149}