-
Notifications
You must be signed in to change notification settings - Fork 26
/
Disasm-FourthSimplify.txt
12954 lines (12954 loc) · 396 KB
/
Disasm-FourthSimplify.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
0x000000: MOV SCRATCH, EBP
0x000030: ADD SCRATCH, 0x000008
0x000048: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000060: MOV EAX, SCRATCH
0x000078: X86 mov dword ptr [eax], 1D7h
0x000090: X86 mov eax, 41F000h
0x0000a8: X86 leave
0x0000c0: X86 ret 4h
0x0000d8: X86 pushad
0x0000f0: X86 xor ecx, ecx
0x000108: X86 sub ecx, 87858700h
0x000120: X86 push ecx
0x000150: X86 xor ecx, 1D021C2Eh
0x000168: X86 push ecx
0x000198: X86 add ecx, 0CED0D41h
0x0001b0: X86 push ecx
0x0001e0: X86 sub ecx, 5F4FA0Ah
0x0001f8: X86 push ecx
0x000228: X86 mov esi, esp
0x000258: MOV SCRATCH, EBP
0x000288: ADD SCRATCH, 0x000008
0x0002a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0002b8: MOV EDI, SCRATCH
0x0002d0: X86 cld
0x0002e8: X86 xor eax, eax
0x000300: X86 mov al, byte ptr [esi]
0x000318: X86 mov word ptr [edi], ax
0x000330: X86 add esi, 1h
0x000348: X86 add edi, 2h
0x000360: X86 test al, al
0x000378: JNZ VM[0x000300] (fallthrough VM[0x000390])
0x000390: X86 lea esp, dword ptr [esp+10h]
0x0003a8: X86 popad
0x0003c0: X86 leave
0x0003d8: X86 ret 4h
0x0003f0: X86 pushad
0x000408: X86 xor ecx, ecx
0x000420: X86 sub ecx, 87858700h
0x000438: X86 push ecx
0x000468: X86 xor ecx, 48021C74h
0x000480: X86 push ecx
0x0004b0: X86 add ecx, 44D50B01h
0x0004c8: X86 push ecx
0x0004f8: X86 sub ecx, 0DB0F01h
0x000510: X86 push ecx
0x000540: X86 xor ecx, 2706041Ah
0x000558: X86 push ecx
0x000588: X86 add ecx, 15FA03E9h
0x0005a0: X86 push ecx
0x0005d0: X86 mov esi, esp
0x000600: MOV SCRATCH, EBP
0x000630: ADD SCRATCH, 0x000008
0x000648: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000660: MOV EDI, SCRATCH
0x000678: X86 cld
0x000690: X86 xor eax, eax
0x0006a8: X86 mov al, byte ptr [esi]
0x0006c0: X86 mov word ptr [edi], ax
0x0006d8: X86 add esi, 1h
0x0006f0: X86 add edi, 2h
0x000708: X86 test al, al
0x000720: JNZ VM[0x0006a8] (fallthrough VM[0x000738])
0x000738: X86 lea esp, dword ptr [esp+18h]
0x000750: X86 popad
0x000768: X86 leave
0x000780: X86 ret 4h
0x000798: X86 pushad
0x0007b0: X86 xor ecx, ecx
0x0007c8: X86 sub ecx, 0FF93939Ch
0x0007e0: X86 push ecx
0x000810: X86 xor ecx, 2E02030Dh
0x000828: X86 push ecx
0x000858: X86 add ecx, 4503F60Dh
0x000870: X86 push ecx
0x0008a0: X86 mov esi, esp
0x0008d0: MOV SCRATCH, EBP
0x000900: ADD SCRATCH, 0x000008
0x000918: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000930: MOV EDI, SCRATCH
0x000948: X86 cld
0x000960: X86 xor eax, eax
0x000978: X86 mov al, byte ptr [esi]
0x000990: X86 mov word ptr [edi], ax
0x0009a8: X86 add esi, 1h
0x0009c0: X86 add edi, 2h
0x0009d8: X86 test al, al
0x0009f0: JNZ VM[0x000978] (fallthrough VM[0x000a08])
0x000a08: X86 lea esp, dword ptr [esp+0Ch]
0x000a20: MOV SCRATCH, EBP
0x000a50: ADD SCRATCH, 0x000008
0x000a68: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000a80: MOV EAX, SCRATCH
0x000a98: MOV SCRATCH, ESP
0x000ac8: ADD SCRATCH, 0x00001c
0x000ae0: MOV DWORD PTR [SCRATCH], EAX
0x000af8: X86 popad
0x000b10: X86 leave
0x000b28: X86 ret 4h
0x000b40: X86 pushad
0x000b58: X86 xor ecx, ecx
0x000b70: X86 sub ecx, 8785FF94h
0x000b88: X86 push ecx
0x000bb8: X86 xor ecx, 141E2E00h
0x000bd0: X86 push ecx
0x000c00: X86 add ecx, 4602h
0x000c18: X86 push ecx
0x000c48: X86 mov esi, esp
0x000c78: MOV SCRATCH, EBP
0x000ca8: ADD SCRATCH, 0x000008
0x000cc0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000cd8: MOV EDI, SCRATCH
0x000cf0: X86 cld
0x000d08: X86 xor eax, eax
0x000d20: X86 mov al, byte ptr [esi]
0x000d38: X86 mov word ptr [edi], ax
0x000d50: X86 add esi, 1h
0x000d68: X86 add edi, 2h
0x000d80: X86 test al, al
0x000d98: JNZ VM[0x000d20] (fallthrough VM[0x000db0])
0x000db0: X86 lea esp, dword ptr [esp+0Ch]
0x000dc8: MOV SCRATCH, EBP
0x000df8: ADD SCRATCH, 0x000008
0x000e10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000e28: MOV EAX, SCRATCH
0x000e40: MOV SCRATCH, ESP
0x000e70: ADD SCRATCH, 0x00001c
0x000e88: MOV DWORD PTR [SCRATCH], EAX
0x000ea0: X86 popad
0x000eb8: X86 leave
0x000ed0: X86 ret 4h
0x000ee8: X86 pushad
0x000f00: X86 xor ecx, ecx
0x000f18: X86 sub ecx, 87FF9394h
0x000f30: X86 push ecx
0x000f60: X86 xor ecx, 1C2E5E5Fh
0x000f78: X86 push ecx
0x000fa8: X86 add ecx, 0E374142h
0x000fc0: X86 push ecx
0x000ff0: X86 mov esi, esp
0x001020: MOV SCRATCH, EBP
0x001050: ADD SCRATCH, 0x000008
0x001068: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001080: MOV EDI, SCRATCH
0x001098: X86 cld
0x0010b0: X86 xor eax, eax
0x0010c8: X86 mov al, byte ptr [esi]
0x0010e0: X86 mov word ptr [edi], ax
0x0010f8: X86 add esi, 1h
0x001110: X86 add edi, 2h
0x001128: X86 test al, al
0x001140: JNZ VM[0x0010c8] (fallthrough VM[0x001158])
0x001158: X86 lea esp, dword ptr [esp+0Ch]
0x001170: MOV SCRATCH, EBP
0x0011a0: ADD SCRATCH, 0x000008
0x0011b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0011d0: MOV EAX, SCRATCH
0x0011e8: MOV SCRATCH, ESP
0x001218: ADD SCRATCH, 0x00001c
0x001230: MOV DWORD PTR [SCRATCH], EAX
0x001248: X86 popad
0x001260: X86 leave
0x001278: X86 ret 4h
0x001290: X86 pushad
0x0012a8: X86 xor ecx, ecx
0x0012c0: X86 sub ecx, 87858700h
0x0012d8: X86 push ecx
0x001308: X86 xor ecx, 14161D2Eh
0x001320: X86 push ecx
0x001350: X86 add ecx, 46h
0x001368: X86 push ecx
0x001398: X86 sub ecx, 0FBF2F211h
0x0013b0: X86 push ecx
0x0013e0: X86 mov esi, esp
0x001410: MOV SCRATCH, EBP
0x001440: ADD SCRATCH, 0x000008
0x001458: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001470: MOV EDI, SCRATCH
0x001488: X86 cld
0x0014a0: X86 xor eax, eax
0x0014b8: X86 mov al, byte ptr [esi]
0x0014d0: X86 mov word ptr [edi], ax
0x0014e8: X86 add esi, 1h
0x001500: X86 add edi, 2h
0x001518: X86 test al, al
0x001530: JNZ VM[0x0014b8] (fallthrough VM[0x001548])
0x001548: X86 lea esp, dword ptr [esp+10h]
0x001560: MOV SCRATCH, EBP
0x001590: ADD SCRATCH, 0x000008
0x0015a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0015c0: MOV EAX, SCRATCH
0x0015d8: MOV SCRATCH, ESP
0x001608: ADD SCRATCH, 0x00001c
0x001620: MOV DWORD PTR [SCRATCH], EAX
0x001638: X86 popad
0x001650: X86 leave
0x001668: X86 ret 4h
0x001680: X86 pushad
0x001698: X86 xor ecx, ecx
0x0016b0: X86 sub ecx, 8785FF94h
0x0016c8: X86 push ecx
0x0016f8: X86 xor ecx, 141E2E05h
0x001710: X86 push ecx
0x001740: X86 add ecx, 3FD4507h
0x001758: X86 push ecx
0x001788: X86 mov esi, esp
0x0017b8: MOV SCRATCH, EBP
0x0017e8: ADD SCRATCH, 0x000008
0x001800: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001818: MOV EDI, SCRATCH
0x001830: X86 cld
0x001848: X86 xor eax, eax
0x001860: X86 mov al, byte ptr [esi]
0x001878: X86 mov word ptr [edi], ax
0x001890: X86 add esi, 1h
0x0018a8: X86 add edi, 2h
0x0018c0: X86 test al, al
0x0018d8: JNZ VM[0x001860] (fallthrough VM[0x0018f0])
0x0018f0: X86 lea esp, dword ptr [esp+0Ch]
0x001908: MOV SCRATCH, EBP
0x001938: ADD SCRATCH, 0x000008
0x001950: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001968: MOV EAX, SCRATCH
0x001980: MOV SCRATCH, ESP
0x0019b0: ADD SCRATCH, 0x00001c
0x0019c8: MOV DWORD PTR [SCRATCH], EAX
0x0019e0: X86 popad
0x0019f8: X86 leave
0x001a10: X86 ret 4h
0x001a28: X86 pushad
0x001a40: X86 xor ecx, ecx
0x001a58: X86 sub ecx, 87FF879Bh
0x001a70: X86 push ecx
0x001aa0: X86 xor ecx, 0C753511h
0x001ab8: X86 push ecx
0x001ae8: X86 add ecx, 0F9F028D1h
0x001b00: X86 push ecx
0x001b30: X86 sub ecx, 0F50114E0h
0x001b48: X86 push ecx
0x001b78: X86 xor ecx, 2B121336h
0x001b90: X86 push ecx
0x001bc0: X86 add ecx, 1AFBF301h
0x001bd8: X86 push ecx
0x001c08: X86 mov esi, esp
0x001c38: MOV SCRATCH, EBP
0x001c68: ADD SCRATCH, 0x000008
0x001c80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001c98: MOV EDI, SCRATCH
0x001cb0: X86 cld
0x001cc8: X86 xor eax, eax
0x001ce0: X86 mov al, byte ptr [esi]
0x001cf8: X86 mov word ptr [edi], ax
0x001d10: X86 add esi, 1h
0x001d28: X86 add edi, 2h
0x001d40: X86 test al, al
0x001d58: JNZ VM[0x001ce0] (fallthrough VM[0x001d70])
0x001d70: X86 lea esp, dword ptr [esp+18h]
0x001d88: MOV SCRATCH, EBP
0x001db8: ADD SCRATCH, 0x000008
0x001dd0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001de8: MOV EAX, SCRATCH
0x001e00: MOV SCRATCH, ESP
0x001e30: ADD SCRATCH, 0x00001c
0x001e48: MOV DWORD PTR [SCRATCH], EAX
0x001e60: X86 popad
0x001e78: X86 leave
0x001e90: X86 ret 4h
0x001ea8: X86 pushad
0x001ec0: X86 xor ecx, ecx
0x001ed8: X86 sub ecx, 87858700h
0x001ef0: X86 push ecx
0x001f20: X86 xor ecx, 14161D2Eh
0x001f38: X86 push ecx
0x001f68: X86 add ecx, 0C5C70837h
0x001f80: X86 push ecx
0x001fb0: X86 sub ecx, 0C3C106FAh
0x001fc8: X86 push ecx
0x001ff8: X86 mov esi, esp
0x002028: MOV SCRATCH, EBP
0x002058: ADD SCRATCH, 0x000008
0x002070: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002088: MOV EDI, SCRATCH
0x0020a0: X86 cld
0x0020b8: X86 xor eax, eax
0x0020d0: X86 mov al, byte ptr [esi]
0x0020e8: X86 mov word ptr [edi], ax
0x002100: X86 add esi, 1h
0x002118: X86 add edi, 2h
0x002130: X86 test al, al
0x002148: JNZ VM[0x0020d0] (fallthrough VM[0x002160])
0x002160: X86 lea esp, dword ptr [esp+10h]
0x002178: MOV SCRATCH, EBP
0x0021a8: ADD SCRATCH, 0x000008
0x0021c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0021d8: MOV EAX, SCRATCH
0x0021f0: MOV SCRATCH, ESP
0x002220: ADD SCRATCH, 0x00001c
0x002238: MOV DWORD PTR [SCRATCH], EAX
0x002250: X86 popad
0x002268: X86 leave
0x002280: X86 ret 4h
0x002298: X86 pushad
0x0022b0: X86 xor ecx, ecx
0x0022c8: X86 sub ecx, 87FF9394h
0x0022e0: X86 push ecx
0x002310: X86 xor ecx, 1C2E091Fh
0x002328: X86 push ecx
0x002358: X86 add ecx, 0FD3406F2h
0x002370: X86 push ecx
0x0023a0: X86 sub ecx, 0F2F006FAh
0x0023b8: X86 push ecx
0x0023e8: X86 mov esi, esp
0x002418: MOV SCRATCH, EBP
0x002448: ADD SCRATCH, 0x000008
0x002460: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002478: MOV EDI, SCRATCH
0x002490: X86 cld
0x0024a8: X86 xor eax, eax
0x0024c0: X86 mov al, byte ptr [esi]
0x0024d8: X86 mov word ptr [edi], ax
0x0024f0: X86 add esi, 1h
0x002508: X86 add edi, 2h
0x002520: X86 test al, al
0x002538: JNZ VM[0x0024c0] (fallthrough VM[0x002550])
0x002550: X86 lea esp, dword ptr [esp+10h]
0x002568: MOV SCRATCH, EBP
0x002598: ADD SCRATCH, 0x000008
0x0025b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0025c8: MOV EAX, SCRATCH
0x0025e0: MOV SCRATCH, ESP
0x002610: ADD SCRATCH, 0x00001c
0x002628: MOV DWORD PTR [SCRATCH], EAX
0x002640: X86 popad
0x002658: X86 leave
0x002670: X86 ret 4h
0x002688: X86 pushad
0x0026a0: X86 xor ecx, ecx
0x0026b8: X86 sub ecx, 87858700h
0x0026d0: X86 push ecx
0x002700: X86 xor ecx, 14161D2Eh
0x002718: X86 push ecx
0x002748: X86 add ecx, 0C5C70542h
0x002760: X86 push ecx
0x002790: X86 sub ecx, 0D0BD050Fh
0x0027a8: X86 push ecx
0x0027d8: X86 mov esi, esp
0x002808: MOV SCRATCH, EBP
0x002838: ADD SCRATCH, 0x000008
0x002850: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002868: MOV EDI, SCRATCH
0x002880: X86 cld
0x002898: X86 xor eax, eax
0x0028b0: X86 mov al, byte ptr [esi]
0x0028c8: X86 mov word ptr [edi], ax
0x0028e0: X86 add esi, 1h
0x0028f8: X86 add edi, 2h
0x002910: X86 test al, al
0x002928: JNZ VM[0x0028b0] (fallthrough VM[0x002940])
0x002940: X86 lea esp, dword ptr [esp+10h]
0x002958: MOV SCRATCH, EBP
0x002988: ADD SCRATCH, 0x000008
0x0029a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0029b8: MOV EAX, SCRATCH
0x0029d0: MOV SCRATCH, ESP
0x002a00: ADD SCRATCH, 0x00001c
0x002a18: MOV DWORD PTR [SCRATCH], EAX
0x002a30: X86 popad
0x002a48: X86 leave
0x002a60: X86 ret 4h
0x002a78: X86 pushad
0x002a90: X86 xor ecx, ecx
0x002aa8: X86 sub ecx, 87858700h
0x002ac0: X86 push ecx
0x002af0: X86 xor ecx, 2445465Ch
0x002b08: X86 push ecx
0x002b38: X86 mov esi, esp
0x002b68: MOV SCRATCH, EBP
0x002b98: ADD SCRATCH, 0x000008
0x002bb0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002bc8: MOV EDI, SCRATCH
0x002be0: X86 cld
0x002bf8: X86 xor eax, eax
0x002c10: X86 mov al, byte ptr [esi]
0x002c28: X86 mov word ptr [edi], ax
0x002c40: X86 add esi, 1h
0x002c58: X86 add edi, 2h
0x002c70: X86 test al, al
0x002c88: JNZ VM[0x002c10] (fallthrough VM[0x002ca0])
0x002ca0: X86 lea esp, dword ptr [esp+8h]
0x002cb8: MOV SCRATCH, EBP
0x002ce8: ADD SCRATCH, 0x000008
0x002d00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002d18: MOV EAX, SCRATCH
0x002d30: MOV SCRATCH, ESP
0x002d60: ADD SCRATCH, 0x00001c
0x002d78: MOV DWORD PTR [SCRATCH], EAX
0x002d90: X86 popad
0x002da8: X86 leave
0x002dc0: X86 ret 4h
0x002dd8: X86 pushad
0x002df0: X86 xor ecx, ecx
0x002e08: X86 sub ecx, 0FF8F8AB3h
0x002e20: X86 push ecx
0x002e50: X86 xor ecx, 5C151624h
0x002e68: X86 push ecx
0x002e98: X86 add ecx, 19FFE0F3h
0x002eb0: X86 push ecx
0x002ee0: X86 mov esi, esp
0x002f10: MOV SCRATCH, EBP
0x002f40: ADD SCRATCH, 0x000008
0x002f58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002f70: MOV EDI, SCRATCH
0x002f88: X86 cld
0x002fa0: X86 xor eax, eax
0x002fb8: X86 mov al, byte ptr [esi]
0x002fd0: X86 mov word ptr [edi], ax
0x002fe8: X86 add esi, 1h
0x003000: X86 add edi, 2h
0x003018: X86 test al, al
0x003030: JNZ VM[0x002fb8] (fallthrough VM[0x003048])
0x003048: X86 lea esp, dword ptr [esp+0Ch]
0x003060: MOV SCRATCH, EBP
0x003090: ADD SCRATCH, 0x000008
0x0030a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0030c0: MOV EAX, SCRATCH
0x0030d8: MOV SCRATCH, ESP
0x003108: ADD SCRATCH, 0x00001c
0x003120: MOV DWORD PTR [SCRATCH], EAX
0x003138: X86 popad
0x003150: X86 leave
0x003168: X86 ret 4h
0x003180: X86 pushad
0x003198: X86 xor ecx, ecx
0x0031b0: X86 sub ecx, 87858700h
0x0031c8: X86 push ecx
0x0031f8: X86 xor ecx, 0A150D63h
0x003210: X86 push ecx
0x003240: X86 add ecx, 0F302F501h
0x003258: X86 push ecx
0x003288: X86 sub ecx, 1FFB03h
0x0032a0: X86 push ecx
0x0032d0: X86 xor ecx, 83C0F2Dh
0x0032e8: X86 push ecx
0x003318: X86 add ecx, 0EEF7021Dh
0x003330: X86 push ecx
0x003360: X86 sub ecx, 0E6001F0Dh
0x003378: X86 push ecx
0x0033a8: X86 mov esi, esp
0x0033d8: MOV SCRATCH, EBP
0x003408: ADD SCRATCH, 0x000008
0x003420: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003438: MOV EDI, SCRATCH
0x003450: X86 cld
0x003468: X86 xor eax, eax
0x003480: X86 mov al, byte ptr [esi]
0x003498: X86 mov word ptr [edi], ax
0x0034b0: X86 add esi, 1h
0x0034c8: X86 add edi, 2h
0x0034e0: X86 test al, al
0x0034f8: JNZ VM[0x003480] (fallthrough VM[0x003510])
0x003510: X86 lea esp, dword ptr [esp+1Ch]
0x003528: MOV SCRATCH, EBP
0x003558: ADD SCRATCH, 0x000008
0x003570: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003588: MOV EAX, SCRATCH
0x0035a0: MOV SCRATCH, ESP
0x0035d0: ADD SCRATCH, 0x00001c
0x0035e8: MOV DWORD PTR [SCRATCH], EAX
0x003600: X86 popad
0x003618: X86 leave
0x003630: X86 ret 4h
0x003648: X86 pushad
0x003660: X86 mov esi, 41F1E0h
0x003678: MOV SCRATCH, EBP
0x0036a8: ADD SCRATCH, 0x000008
0x0036c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0036d8: MOV EDI, SCRATCH
0x0036f0: MOV SCRATCH, ESI
0x003720: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003738: MOV EAX, SCRATCH
0x003750: X86 sub esp, 4h
0x003768: MOV SCRATCH, ESP
0x003798: MOV DWORD PTR [SCRATCH], EAX
0x0037b0: MOV SCRATCH, 0x420344
0x0037e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0037f8: MOV EAX, SCRATCH
0x003810: X86 sub esp, 4h
0x003828: MOV SCRATCH, ESP
0x003858: MOV DWORD PTR [SCRATCH], EAX
0x003870: X86CALLOUT 0x408360
0x003888: MOV SCRATCH, EDI
0x0038b8: MOV DWORD PTR [SCRATCH], EAX
0x0038d0: X86 add esi, 4h
0x0038e8: X86 add edi, 4h
0x003900: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x003918: JNZ VM[0x0036f0] (fallthrough VM[0x003930])
0x003930: X86 popad
0x003948: X86 leave
0x003960: X86 ret 4h
0x003978: X86 pushad
0x003990: X86 mov esi, 41F26Ch
0x0039a8: MOV SCRATCH, EBP
0x0039d8: ADD SCRATCH, 0x000008
0x0039f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003a08: MOV EDI, SCRATCH
0x003a20: MOV SCRATCH, ESI
0x003a50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003a68: MOV EAX, SCRATCH
0x003a80: X86 sub esp, 4h
0x003a98: MOV SCRATCH, ESP
0x003ac8: MOV DWORD PTR [SCRATCH], EAX
0x003ae0: MOV SCRATCH, 0x420358
0x003b10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003b28: MOV EAX, SCRATCH
0x003b40: X86 sub esp, 4h
0x003b58: MOV SCRATCH, ESP
0x003b88: MOV DWORD PTR [SCRATCH], EAX
0x003ba0: X86CALLOUT 0x408360
0x003bb8: MOV SCRATCH, EDI
0x003be8: MOV DWORD PTR [SCRATCH], EAX
0x003c00: X86 add esi, 4h
0x003c18: X86 add edi, 4h
0x003c30: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x003c48: JNZ VM[0x003a20] (fallthrough VM[0x003c60])
0x003c60: X86 popad
0x003c78: X86 leave
0x003c90: X86 ret 4h
0x003ca8: X86 pushad
0x003cc0: X86 mov esi, 41F308h
0x003cd8: MOV SCRATCH, EBP
0x003d08: ADD SCRATCH, 0x000008
0x003d20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003d38: MOV EDI, SCRATCH
0x003d50: MOV SCRATCH, ESI
0x003d80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003d98: MOV EAX, SCRATCH
0x003db0: X86 sub esp, 4h
0x003dc8: MOV SCRATCH, ESP
0x003df8: MOV DWORD PTR [SCRATCH], EAX
0x003e10: X86 sub esp, 4h
0x003e28: MOV SCRATCH, 0x420350
0x003e58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003e70: MOV EAX, SCRATCH
0x003e88: MOV SCRATCH, ESP
0x003eb8: MOV DWORD PTR [SCRATCH], EAX
0x003ed0: X86CALLOUT 0x408360
0x003ee8: MOV SCRATCH, EDI
0x003f18: MOV DWORD PTR [SCRATCH], EAX
0x003f30: X86 add esi, 4h
0x003f48: X86 add edi, 4h
0x003f60: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x003f78: JNZ VM[0x003d50] (fallthrough VM[0x003f90])
0x003f90: X86 popad
0x003fa8: X86 leave
0x003fc0: X86 ret 4h
0x003fd8: X86 pushad
0x003ff0: X86 mov esi, 41F33Ch
0x004008: MOV SCRATCH, EBP
0x004038: ADD SCRATCH, 0x000008
0x004050: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004068: MOV EDI, SCRATCH
0x004080: MOV SCRATCH, ESI
0x0040b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0040c8: MOV EAX, SCRATCH
0x0040e0: X86 sub esp, 4h
0x0040f8: MOV SCRATCH, ESP
0x004128: MOV DWORD PTR [SCRATCH], EAX
0x004140: X86 sub esp, 4h
0x004158: MOV SCRATCH, 0x420348
0x004188: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0041a0: MOV EAX, SCRATCH
0x0041b8: MOV SCRATCH, ESP
0x0041e8: MOV DWORD PTR [SCRATCH], EAX
0x004200: X86CALLOUT 0x408360
0x004218: MOV SCRATCH, EDI
0x004248: MOV DWORD PTR [SCRATCH], EAX
0x004260: X86 add esi, 4h
0x004278: X86 add edi, 4h
0x004290: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x0042a8: JNZ VM[0x004080] (fallthrough VM[0x0042c0])
0x0042c0: X86 popad
0x0042d8: X86 leave
0x0042f0: X86 ret 4h
0x004308: MOV SCRATCH, EBP
0x004338: ADD SCRATCH, 0x000008
0x004350: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004368: MOV EAX, SCRATCH
0x004380: X86 mov dword ptr [eax], 1A5h
0x004398: X86 mov eax, 41F350h
0x0043b0: X86 leave
0x0043c8: X86 ret 4h
0x0043e0: MOV SCRATCH, EBP
0x004410: ADD SCRATCH, 0x000008
0x004428: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004440: MOV EBX, SCRATCH
0x004458: MOV SCRATCH, EBX
0x004488: ADD SCRATCH, 0x00003c
0x0044a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0044b8: MOV EDI, SCRATCH
0x0044d0: X86 add edi, ebx
0x0044e8: MOV SCRATCH, EDI
0x004518: ADD SCRATCH, 0x0000a0
0x004530: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004548: MOV EAX, SCRATCH
0x004560: X86 test eax, eax
0x004578: JZ VM[0x004e00] (fallthrough VM[0x004590])
0x004590: X86 push esi
0x0045c0: X86 push eax
0x0045f0: X86 push ebx
0x004620: X86CALLOUT 0x4080b2
0x004638: X86 mov esi, eax
0x004668: MOV SCRATCH, EDI
0x004698: ADD SCRATCH, 0x000034
0x0046b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0046c8: MOV EAX, SCRATCH
0x0046e0: X86 add esi, ebx
0x0046f8: X86 cmp dword ptr [ebp+0Ch], eax
0x004710: JZ VM[0x004de8] (fallthrough VM[0x004728])
0x004728: MOV SCRATCH, EDI
0x004758: ADD SCRATCH, 0x0000a4
0x004770: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004788: MOV EDI, SCRATCH
0x0047a0: X86 sub eax, dword ptr [ebp+0Ch]
0x0047b8: X86 test edi, edi
0x0047d0: MOV SCRATCH, EBP
0x004800: ADD SCRATCH, 0x000008
0x004818: MOV DWORD PTR [SCRATCH], EDI
0x004830: MOV SCRATCH, EBP
0x004860: ADD SCRATCH, 0xfffffffc
0x004878: MOV DWORD PTR [SCRATCH], EAX
0x004890: JZ VM[0x004de8] (fallthrough VM[0x0048a8])
0x0048a8: MOV SCRATCH, ESI
0x0048d8: ADD SCRATCH, 0x000004
0x0048f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004908: MOV EDI, SCRATCH
0x004920: MOV SCRATCH, ESI
0x004950: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004968: PUSH SCRATCH
0x004980: MOV SCRATCH, ESI
0x0049b0: ADD SCRATCH, 0x000008
0x0049c8: MOV EAX, SCRATCH
0x0049e0: X86 sub edi, 8h
0x0049f8: X86 push ebx
0x004a28: X86 shr edi, 1h
0x004a40: MOV SCRATCH, EBP
0x004a70: ADD SCRATCH, 0x00000c
0x004a88: MOV DWORD PTR [SCRATCH], EAX
0x004aa0: X86CALLOUT 0x4080b2
0x004ab8: X86 add eax, ebx
0x004ad0: X86 test edi, edi
0x004ae8: JZ VM[0x004d10] (fallthrough VM[0x004b00])
0x004b00: MOV SCRATCH, EBP
0x004b30: ADD SCRATCH, 0x00000c
0x004b48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004b60: MOV ECX, SCRATCH
0x004b78: X86 movzx ecx, word ptr [ecx]
0x004b90: X86 mov edx, ecx
0x004bc0: X86 and dx, 0F000h
0x004bd8: X86 cmp dx, 3000h
0x004bf0: JNZ VM[0x004cc8] (fallthrough VM[0x004c08])
0x004c08: MOV SCRATCH, EBP
0x004c38: ADD SCRATCH, 0xfffffffc
0x004c50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004c68: MOV EDX, SCRATCH
0x004c80: X86 and ecx, 0FFFh
0x004c98: X86 add ecx, eax
0x004cb0: X86 sub dword ptr [ecx], edx
0x004cc8: X86 add dword ptr [ebp+0Ch], 2h
0x004ce0: X86 dec edi
0x004cf8: JNZ VM[0x004b00] (fallthrough VM[0x004d10])
0x004d10: MOV SCRATCH, ESI
0x004d40: ADD SCRATCH, 0x000004
0x004d58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004d70: MOV EAX, SCRATCH
0x004d88: X86 sub dword ptr [ebp+8h], eax
0x004da0: X86 add esi, eax
0x004db8: X86 cmp dword ptr [ebp+8h], 0h
0x004dd0: JNZ VM[0x0048a8] (fallthrough VM[0x004de8])
0x004de8: X86 pop esi
0x004e00: X86 pop edi
0x004e18: X86 mov eax, ebx
0x004e48: X86 pop ebx
0x004e60: X86 leave
0x004e78: X86 ret 8h
0x004e90: MOV SCRATCH, 0x420370
0x004ec0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004ed8: MOV ESI, SCRATCH
0x004ef0: CRASH
0x004f08: MOV SCRATCH, EBP
0x004f38: ADD SCRATCH, 0x000008
0x004f50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004f68: PUSH SCRATCH
0x004f80: MOV SCRATCH, ESI
0x004fb0: ADD SCRATCH, 0x000008
0x004fc8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004fe0: PUSH SCRATCH
0x004ff8: X86JUMPOUT call dword ptr [40110Ch]
0x005010: X86 test eax, eax
0x005028: X86 pop ecx
0x005040: X86 pop ecx
0x005058: JZ VM[0x005bf8] (fallthrough VM[0x005070])
0x005070: MOV SCRATCH, ESI
0x0050a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0050b8: MOV ESI, SCRATCH
0x0050d0: X86 cmp esi, edi
0x0050e8: JNZ VM[0x004f08] (fallthrough VM[0x005100])
0x005100: X86 mov esi, 208h
0x005118: X86 push esi
0x005148: MOV SCRATCH, EBP
0x005178: ADD SCRATCH, 0xfffffbc0
0x005190: MOV EAX, SCRATCH
0x0051a8: X86 push edi
0x0051d8: X86 push eax
0x005208: X86CALLOUT 0x40ae80
0x005220: X86 push esi
0x005250: MOV SCRATCH, EBP
0x005280: ADD SCRATCH, 0xfffffdc8
0x005298: MOV EAX, SCRATCH
0x0052b0: X86 push edi
0x0052e0: X86 push eax
0x005310: X86CALLOUT 0x40ae80
0x005328: X86 push esi
0x005358: MOV SCRATCH, EBP
0x005388: ADD SCRATCH, 0xfffff5a8
0x0053a0: MOV EAX, SCRATCH
0x0053b8: X86 push edi
0x0053e8: X86 push eax
0x005418: X86CALLOUT 0x40ae80
0x005430: X86 add esp, 24h
0x005448: MOV SCRATCH, EBP
0x005478: ADD SCRATCH, 0xfffffdc8
0x005490: MOV EAX, SCRATCH
0x0054a8: X86 push eax
0x0054d8: MOV SCRATCH, EBP
0x005508: ADD SCRATCH, 0xffffffd0
0x005520: MOV EAX, SCRATCH
0x005538: X86 push eax
0x005568: MOV SCRATCH, 0x41ff34
0x005598: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0055b0: MOV EAX, SCRATCH
0x0055c8: X86 mov word ptr [ebp+0FFFFFDC8h], 53h
0x0055e0: X86 mov word ptr [ebp+0FFFFFDCAh], 59h
0x0055f8: X86 mov word ptr [ebp+0FFFFFDCCh], 53h
0x005610: X86 mov word ptr [ebp+0FFFFFDCEh], 54h
0x005628: X86 mov word ptr [ebp+0FFFFFDD0h], 45h
0x005640: X86 mov word ptr [ebp+0FFFFFDD2h], 4Dh
0x005658: X86 mov word ptr [ebp+0FFFFFDD4h], 52h
0x005670: X86 mov word ptr [ebp+0FFFFFDD6h], 4Fh
0x005688: X86 mov word ptr [ebp+0FFFFFDD8h], 4Fh
0x0056a0: X86 mov word ptr [ebp+0FFFFFDDAh], 54h
0x0056b8: X86 mov word ptr [ebp+0FFFFFBC0h], 73h
0x0056d0: X86 mov word ptr [ebp+0FFFFFBC2h], 79h
0x0056e8: X86 mov word ptr [ebp+0FFFFFBC4h], 73h
0x005700: X86 mov word ptr [ebp+0FFFFFBC6h], 74h
0x005718: X86 mov word ptr [ebp+0FFFFFBC8h], 65h
0x005730: X86 mov word ptr [ebp+0FFFFFBCAh], 6Dh
0x005748: X86 mov word ptr [ebp+0FFFFFBCCh], 33h
0x005760: X86 mov word ptr [ebp+0FFFFFBCEh], 32h
0x005778: X86JUMPOUT call dword ptr [eax+24h]
0x005790: MOV SCRATCH, EBP
0x0057c0: ADD SCRATCH, 0xfffff5a8
0x0057d8: MOV EAX, SCRATCH
0x0057f0: MOV SCRATCH, EBP
0x005820: ADD SCRATCH, 0xffffffe4
0x005838: MOV DWORD PTR [SCRATCH], EAX
0x005850: MOV SCRATCH, EBP
0x005880: ADD SCRATCH, 0xffffffe0
0x005898: MOV EAX, SCRATCH
0x0058b0: X86 push eax
0x0058e0: MOV SCRATCH, EBP
0x005910: ADD SCRATCH, 0xffffffd0
0x005928: MOV EAX, SCRATCH
0x005940: X86 push eax
0x005970: MOV SCRATCH, 0x41ff34
0x0059a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0059b8: MOV EAX, SCRATCH
0x0059d0: X86 push edi
0x005a00: X86 mov word ptr [ebp+0FFFFFFE0h], 206h
0x005a18: X86 mov word ptr [ebp+0FFFFFFE2h], si
0x005a30: X86JUMPOUT call dword ptr [eax+58h]
0x005a48: MOV SCRATCH, EBP
0x005a78: ADD SCRATCH, 0x000008
0x005a90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x005aa8: PUSH SCRATCH
0x005ac0: MOV SCRATCH, 0x41ff38
0x005af0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x005b08: MOV EAX, SCRATCH
0x005b20: X86JUMPOUT call dword ptr [eax+6Ch]
0x005b38: X86 cmp eax, edi
0x005b50: MOV SCRATCH, EBP
0x005b80: ADD SCRATCH, 0xfffffff0
0x005b98: MOV DWORD PTR [SCRATCH], EAX
0x005bb0: JNZ VM[0x005c88] (fallthrough VM[0x005bc8])
0x005bc8: X86 xor eax, eax
0x005be0: CRASH
0x005bf8: MOV SCRATCH, ESI
0x005c28: ADD SCRATCH, 0x000004
0x005c40: MOV SCRATCH, DWORD PTR [SCRATCH]
0x005c58: MOV EAX, SCRATCH
0x005c70: CRASH
0x005c88: X86 push ebx
0x005cb8: X86 push esi
0x005ce8: MOV SCRATCH, EBP
0x005d18: ADD SCRATCH, 0xfffff9b8
0x005d30: MOV EAX, SCRATCH
0x005d48: X86 push edi
0x005d78: X86 push eax
0x005da8: X86CALLOUT 0x40ae80
0x005dc0: X86 push esi
0x005df0: MOV SCRATCH, EBP
0x005e20: ADD SCRATCH, 0xfffff7b0
0x005e38: MOV EAX, SCRATCH
0x005e50: X86 push edi
0x005e80: X86 push eax
0x005eb0: X86CALLOUT 0x40ae80
0x005ec8: X86 mov edi, 104h
0x005ee0: X86 push edi
0x005f10: MOV SCRATCH, EBP
0x005f40: ADD SCRATCH, 0xfffff5a8
0x005f58: MOV EAX, SCRATCH
0x005f70: X86 push eax
0x005fa0: MOV SCRATCH, EBP
0x005fd0: ADD SCRATCH, 0xfffff9b8
0x005fe8: MOV EAX, SCRATCH
0x006000: X86 push eax
0x006030: X86 mov word ptr [ebp+0FFFFF7B0h], 5Ch
0x006048: X86JUMPOUT call dword ptr [401110h]
0x006060: MOV SCRATCH, 0x401114
0x006090: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0060a8: MOV EBX, SCRATCH
0x0060c0: X86 push edi
0x0060f0: MOV SCRATCH, EBP
0x006120: ADD SCRATCH, 0xfffff7b0
0x006138: MOV EAX, SCRATCH
0x006150: X86 push eax
0x006180: MOV SCRATCH, EBP
0x0061b0: ADD SCRATCH, 0xfffff9b8
0x0061c8: MOV EAX, SCRATCH
0x0061e0: X86 push eax
0x006210: X86JUMPOUT call ebx
0x006228: X86 push edi
0x006258: MOV SCRATCH, EBP
0x006288: ADD SCRATCH, 0xfffffbc0
0x0062a0: MOV EAX, SCRATCH
0x0062b8: X86 push eax
0x0062e8: MOV SCRATCH, EBP
0x006318: ADD SCRATCH, 0xfffff9b8
0x006330: MOV EAX, SCRATCH
0x006348: X86 push eax
0x006378: X86JUMPOUT call ebx
0x006390: X86 push edi
0x0063c0: MOV SCRATCH, EBP
0x0063f0: ADD SCRATCH, 0xfffff7b0
0x006408: MOV EAX, SCRATCH
0x006420: X86 push eax
0x006450: MOV SCRATCH, EBP
0x006480: ADD SCRATCH, 0xfffff9b8
0x006498: MOV EAX, SCRATCH
0x0064b0: X86 push eax
0x0064e0: X86JUMPOUT call ebx
0x0064f8: X86 add esp, 48h
0x006510: X86 push edi
0x006540: MOV SCRATCH, EBP
0x006570: ADD SCRATCH, 0x000008
0x006588: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0065a0: PUSH SCRATCH
0x0065b8: MOV SCRATCH, EBP
0x0065e8: ADD SCRATCH, 0xfffff9b8
0x006600: MOV EAX, SCRATCH
0x006618: X86 push eax
0x006648: X86JUMPOUT call ebx
0x006660: X86 push esi
0x006690: X86 xor edi, edi
0x0066a8: MOV SCRATCH, EBP
0x0066d8: ADD SCRATCH, 0xfffffbc0
0x0066f0: MOV EAX, SCRATCH
0x006708: X86 push edi
0x006738: X86 push eax
0x006768: X86CALLOUT 0x40ae80
0x006780: X86 push esi
0x0067b0: MOV SCRATCH, EBP
0x0067e0: ADD SCRATCH, 0xfffffdc8
0x0067f8: MOV EAX, SCRATCH
0x006810: X86 push edi
0x006840: X86 push eax
0x006870: X86CALLOUT 0x40ae80
0x006888: X86 add esp, 24h
0x0068a0: X86 push edi
0x0068d0: X86 push edi
0x006900: MOV SCRATCH, 0x000003
0x006918: PUSH SCRATCH
0x006930: X86 push edi
0x006960: MOV SCRATCH, 0x000001
0x006978: PUSH SCRATCH
0x006990: MOV SCRATCH, 0x80000000
0x0069a8: PUSH SCRATCH
0x0069c0: MOV SCRATCH, EBP
0x0069f0: ADD SCRATCH, 0xfffff9b8
0x006a08: MOV EAX, SCRATCH
0x006a20: X86 push eax
0x006a50: X86CALLOUT 0x408933
0x006a68: X86 cmp eax, 0FFFFFFFFh
0x006a80: MOV SCRATCH, EBP
0x006ab0: ADD SCRATCH, 0xffffffdc
0x006ac8: MOV DWORD PTR [SCRATCH], EAX
0x006ae0: JNZ VM[0x006b28] (fallthrough VM[0x006af8])
0x006af8: X86 xor eax, eax
0x006b10: CRASH
0x006b28: X86 push edi
0x006b58: X86 push eax
0x006b88: X86CALLOUT 0x408cbe
0x006ba0: X86 mov ebx, eax
0x006bd0: X86 push ebx
0x006c00: MOV SCRATCH, EBP
0x006c30: ADD SCRATCH, 0xffffffd8
0x006c48: MOV DWORD PTR [SCRATCH], EBX
0x006c60: X86CALLOUT 0x408d2b
0x006c78: X86 push edi
0x006ca8: MOV SCRATCH, EBP
0x006cd8: ADD SCRATCH, 0xffffffe8
0x006cf0: MOV ECX, SCRATCH
0x006d08: X86 push ecx
0x006d38: X86 push ebx
0x006d68: X86 push eax
0x006d98: MOV SCRATCH, EBP
0x006dc8: ADD SCRATCH, 0xffffffdc
0x006de0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x006df8: PUSH SCRATCH
0x006e10: MOV SCRATCH, EBP
0x006e40: ADD SCRATCH, 0xfffffffc
0x006e58: MOV DWORD PTR [SCRATCH], EAX
0x006e70: X86CALLOUT 0x408c4e
0x006e88: MOV SCRATCH, 0x000040
0x006ea0: PUSH SCRATCH
0x006eb8: MOV SCRATCH, 0x001000
0x006ed0: PUSH SCRATCH
0x006ee8: X86 push ebx
0x006f18: X86 push edi
0x006f48: X86CALLOUT 0x408810
0x006f60: X86 cmp eax, edi
0x006f78: MOV SCRATCH, EBP
0x006fa8: ADD SCRATCH, 0xfffffff4
0x006fc0: MOV DWORD PTR [SCRATCH], EAX
0x006fd8: JZ VM[0x008e50] (fallthrough VM[0x006ff0])
0x006ff0: X86 push ebx
0x007020: MOV SCRATCH, EBP
0x007050: ADD SCRATCH, 0xfffffffc
0x007068: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007080: PUSH SCRATCH
0x007098: X86 push eax
0x0070c8: X86CALLOUT 0x40ae74
0x0070e0: MOV SCRATCH, EBP
0x007110: ADD SCRATCH, 0x000008
0x007128: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007140: MOV EAX, SCRATCH
0x007158: X86 add esp, 0Ch
0x007170: MOV SCRATCH, EAX
0x0071a0: ADD SCRATCH, 0x000002
0x0071b8: MOV ECX, SCRATCH
0x0071d0: X86 mov dx, word ptr [eax]
0x0071e8: X86 inc eax
0x007200: X86 inc eax
0x007218: X86 cmp dx, di
0x007230: JNZ VM[0x0071d0] (fallthrough VM[0x007248])
0x007248: X86 sub eax, ecx
0x007260: X86 sar eax, 1h
0x007278: MOV SCRATCH, EAX
0x0072a8: ADD SCRATCH, EAX
0x0072c0: ADD SCRATCH, 0x000002
0x0072d8: MOV EDI, SCRATCH
0x0072f0: X86 mov ebx, 420370h
0x007308: MOV SCRATCH, EBX
0x007338: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007350: MOV EAX, SCRATCH
0x007368: X86 test eax, eax
0x007380: JZ VM[0x007410] (fallthrough VM[0x007398])
0x007398: X86 mov ebx, eax
0x0073c8: X86 test ebx, ebx
0x0073e0: JNZ VM[0x007308] (fallthrough VM[0x0073f8])
0x0073f8: CRASH
0x007410: MOV SCRATCH, 0x00000c
0x007428: PUSH SCRATCH
0x007440: X86CALLOUT 0x408d2b
0x007458: MOV SCRATCH, EBP
0x007488: ADD SCRATCH, 0xfffffff4
0x0074a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0074b8: MOV ECX, SCRATCH
0x0074d0: MOV SCRATCH, EBX
0x007500: MOV DWORD PTR [SCRATCH], EAX
0x007518: X86 push edi
0x007548: MOV SCRATCH, EAX
0x007578: ADD SCRATCH, 0x000004
0x007590: MOV DWORD PTR [SCRATCH], ECX
0x0075a8: X86CALLOUT 0x408d2b
0x0075c0: MOV SCRATCH, EBX
0x0075f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007608: MOV ECX, SCRATCH
0x007620: MOV SCRATCH, ECX
0x007650: ADD SCRATCH, 0x000008
0x007668: MOV DWORD PTR [SCRATCH], EAX
0x007680: MOV SCRATCH, EBX