Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
13426 lines (13425 sloc) 408 KB
0x000000: MOV SCRATCH, EBP
0x000030: ADD SCRATCH, 0x000008
0x000048: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000060: MOV EAX, SCRATCH
0x000078: X86 mov dword ptr [eax], 1D7h
0x000090: X86 mov eax, 41F000h
0x0000a8: X86 leave
0x0000c0: X86 ret 4h
0x0000d8: X86 pushad
0x0000f0: X86 xor ecx, ecx
0x000108: X86 sub ecx, 87858700h
0x000120: X86 push ecx
0x000150: X86 xor ecx, 1D021C2Eh
0x000168: X86 push ecx
0x000198: X86 add ecx, 0CED0D41h
0x0001b0: X86 push ecx
0x0001e0: X86 sub ecx, 5F4FA0Ah
0x0001f8: X86 push ecx
0x000228: MOV SCRATCH, ESP
0x000240: MOV ESI, SCRATCH
0x000258: MOV SCRATCH, EBP
0x000288: ADD SCRATCH, 0x000008
0x0002a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0002b8: MOV EDI, SCRATCH
0x0002d0: X86 cld
0x0002e8: X86 xor eax, eax
0x000300: X86 mov al, byte ptr [esi]
0x000318: X86 mov word ptr [edi], ax
0x000330: X86 add esi, 1h
0x000348: X86 add edi, 2h
0x000360: X86 test al, al
0x000378: JNZ VM[0x000300] (fallthrough VM[0x000390])
0x000390: X86 lea esp, dword ptr [esp+10h]
0x0003a8: X86 popad
0x0003c0: X86 leave
0x0003d8: X86 ret 4h
0x0003f0: X86 pushad
0x000408: X86 xor ecx, ecx
0x000420: X86 sub ecx, 87858700h
0x000438: X86 push ecx
0x000468: X86 xor ecx, 48021C74h
0x000480: X86 push ecx
0x0004b0: X86 add ecx, 44D50B01h
0x0004c8: X86 push ecx
0x0004f8: X86 sub ecx, 0DB0F01h
0x000510: X86 push ecx
0x000540: X86 xor ecx, 2706041Ah
0x000558: X86 push ecx
0x000588: X86 add ecx, 15FA03E9h
0x0005a0: X86 push ecx
0x0005d0: MOV SCRATCH, ESP
0x0005e8: MOV ESI, SCRATCH
0x000600: MOV SCRATCH, EBP
0x000630: ADD SCRATCH, 0x000008
0x000648: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000660: MOV EDI, SCRATCH
0x000678: X86 cld
0x000690: X86 xor eax, eax
0x0006a8: X86 mov al, byte ptr [esi]
0x0006c0: X86 mov word ptr [edi], ax
0x0006d8: X86 add esi, 1h
0x0006f0: X86 add edi, 2h
0x000708: X86 test al, al
0x000720: JNZ VM[0x0006a8] (fallthrough VM[0x000738])
0x000738: X86 lea esp, dword ptr [esp+18h]
0x000750: X86 popad
0x000768: X86 leave
0x000780: X86 ret 4h
0x000798: X86 pushad
0x0007b0: X86 xor ecx, ecx
0x0007c8: X86 sub ecx, 0FF93939Ch
0x0007e0: X86 push ecx
0x000810: X86 xor ecx, 2E02030Dh
0x000828: X86 push ecx
0x000858: X86 add ecx, 4503F60Dh
0x000870: X86 push ecx
0x0008a0: MOV SCRATCH, ESP
0x0008b8: MOV ESI, SCRATCH
0x0008d0: MOV SCRATCH, EBP
0x000900: ADD SCRATCH, 0x000008
0x000918: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000930: MOV EDI, SCRATCH
0x000948: X86 cld
0x000960: X86 xor eax, eax
0x000978: X86 mov al, byte ptr [esi]
0x000990: X86 mov word ptr [edi], ax
0x0009a8: X86 add esi, 1h
0x0009c0: X86 add edi, 2h
0x0009d8: X86 test al, al
0x0009f0: JNZ VM[0x000978] (fallthrough VM[0x000a08])
0x000a08: X86 lea esp, dword ptr [esp+0Ch]
0x000a20: MOV SCRATCH, EBP
0x000a50: ADD SCRATCH, 0x000008
0x000a68: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000a80: MOV EAX, SCRATCH
0x000a98: MOV SCRATCH, ESP
0x000ac8: ADD SCRATCH, 0x00001c
0x000ae0: MOV DWORD PTR [SCRATCH], EAX
0x000af8: X86 popad
0x000b10: X86 leave
0x000b28: X86 ret 4h
0x000b40: X86 pushad
0x000b58: X86 xor ecx, ecx
0x000b70: X86 sub ecx, 8785FF94h
0x000b88: X86 push ecx
0x000bb8: X86 xor ecx, 141E2E00h
0x000bd0: X86 push ecx
0x000c00: X86 add ecx, 4602h
0x000c18: X86 push ecx
0x000c48: MOV SCRATCH, ESP
0x000c60: MOV ESI, SCRATCH
0x000c78: MOV SCRATCH, EBP
0x000ca8: ADD SCRATCH, 0x000008
0x000cc0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000cd8: MOV EDI, SCRATCH
0x000cf0: X86 cld
0x000d08: X86 xor eax, eax
0x000d20: X86 mov al, byte ptr [esi]
0x000d38: X86 mov word ptr [edi], ax
0x000d50: X86 add esi, 1h
0x000d68: X86 add edi, 2h
0x000d80: X86 test al, al
0x000d98: JNZ VM[0x000d20] (fallthrough VM[0x000db0])
0x000db0: X86 lea esp, dword ptr [esp+0Ch]
0x000dc8: MOV SCRATCH, EBP
0x000df8: ADD SCRATCH, 0x000008
0x000e10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x000e28: MOV EAX, SCRATCH
0x000e40: MOV SCRATCH, ESP
0x000e70: ADD SCRATCH, 0x00001c
0x000e88: MOV DWORD PTR [SCRATCH], EAX
0x000ea0: X86 popad
0x000eb8: X86 leave
0x000ed0: X86 ret 4h
0x000ee8: X86 pushad
0x000f00: X86 xor ecx, ecx
0x000f18: X86 sub ecx, 87FF9394h
0x000f30: X86 push ecx
0x000f60: X86 xor ecx, 1C2E5E5Fh
0x000f78: X86 push ecx
0x000fa8: X86 add ecx, 0E374142h
0x000fc0: X86 push ecx
0x000ff0: MOV SCRATCH, ESP
0x001008: MOV ESI, SCRATCH
0x001020: MOV SCRATCH, EBP
0x001050: ADD SCRATCH, 0x000008
0x001068: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001080: MOV EDI, SCRATCH
0x001098: X86 cld
0x0010b0: X86 xor eax, eax
0x0010c8: X86 mov al, byte ptr [esi]
0x0010e0: X86 mov word ptr [edi], ax
0x0010f8: X86 add esi, 1h
0x001110: X86 add edi, 2h
0x001128: X86 test al, al
0x001140: JNZ VM[0x0010c8] (fallthrough VM[0x001158])
0x001158: X86 lea esp, dword ptr [esp+0Ch]
0x001170: MOV SCRATCH, EBP
0x0011a0: ADD SCRATCH, 0x000008
0x0011b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0011d0: MOV EAX, SCRATCH
0x0011e8: MOV SCRATCH, ESP
0x001218: ADD SCRATCH, 0x00001c
0x001230: MOV DWORD PTR [SCRATCH], EAX
0x001248: X86 popad
0x001260: X86 leave
0x001278: X86 ret 4h
0x001290: X86 pushad
0x0012a8: X86 xor ecx, ecx
0x0012c0: X86 sub ecx, 87858700h
0x0012d8: X86 push ecx
0x001308: X86 xor ecx, 14161D2Eh
0x001320: X86 push ecx
0x001350: X86 add ecx, 46h
0x001368: X86 push ecx
0x001398: X86 sub ecx, 0FBF2F211h
0x0013b0: X86 push ecx
0x0013e0: MOV SCRATCH, ESP
0x0013f8: MOV ESI, SCRATCH
0x001410: MOV SCRATCH, EBP
0x001440: ADD SCRATCH, 0x000008
0x001458: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001470: MOV EDI, SCRATCH
0x001488: X86 cld
0x0014a0: X86 xor eax, eax
0x0014b8: X86 mov al, byte ptr [esi]
0x0014d0: X86 mov word ptr [edi], ax
0x0014e8: X86 add esi, 1h
0x001500: X86 add edi, 2h
0x001518: X86 test al, al
0x001530: JNZ VM[0x0014b8] (fallthrough VM[0x001548])
0x001548: X86 lea esp, dword ptr [esp+10h]
0x001560: MOV SCRATCH, EBP
0x001590: ADD SCRATCH, 0x000008
0x0015a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0015c0: MOV EAX, SCRATCH
0x0015d8: MOV SCRATCH, ESP
0x001608: ADD SCRATCH, 0x00001c
0x001620: MOV DWORD PTR [SCRATCH], EAX
0x001638: X86 popad
0x001650: X86 leave
0x001668: X86 ret 4h
0x001680: X86 pushad
0x001698: X86 xor ecx, ecx
0x0016b0: X86 sub ecx, 8785FF94h
0x0016c8: X86 push ecx
0x0016f8: X86 xor ecx, 141E2E05h
0x001710: X86 push ecx
0x001740: X86 add ecx, 3FD4507h
0x001758: X86 push ecx
0x001788: MOV SCRATCH, ESP
0x0017a0: MOV ESI, SCRATCH
0x0017b8: MOV SCRATCH, EBP
0x0017e8: ADD SCRATCH, 0x000008
0x001800: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001818: MOV EDI, SCRATCH
0x001830: X86 cld
0x001848: X86 xor eax, eax
0x001860: X86 mov al, byte ptr [esi]
0x001878: X86 mov word ptr [edi], ax
0x001890: X86 add esi, 1h
0x0018a8: X86 add edi, 2h
0x0018c0: X86 test al, al
0x0018d8: JNZ VM[0x001860] (fallthrough VM[0x0018f0])
0x0018f0: X86 lea esp, dword ptr [esp+0Ch]
0x001908: MOV SCRATCH, EBP
0x001938: ADD SCRATCH, 0x000008
0x001950: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001968: MOV EAX, SCRATCH
0x001980: MOV SCRATCH, ESP
0x0019b0: ADD SCRATCH, 0x00001c
0x0019c8: MOV DWORD PTR [SCRATCH], EAX
0x0019e0: X86 popad
0x0019f8: X86 leave
0x001a10: X86 ret 4h
0x001a28: X86 pushad
0x001a40: X86 xor ecx, ecx
0x001a58: X86 sub ecx, 87FF879Bh
0x001a70: X86 push ecx
0x001aa0: X86 xor ecx, 0C753511h
0x001ab8: X86 push ecx
0x001ae8: X86 add ecx, 0F9F028D1h
0x001b00: X86 push ecx
0x001b30: X86 sub ecx, 0F50114E0h
0x001b48: X86 push ecx
0x001b78: X86 xor ecx, 2B121336h
0x001b90: X86 push ecx
0x001bc0: X86 add ecx, 1AFBF301h
0x001bd8: X86 push ecx
0x001c08: MOV SCRATCH, ESP
0x001c20: MOV ESI, SCRATCH
0x001c38: MOV SCRATCH, EBP
0x001c68: ADD SCRATCH, 0x000008
0x001c80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001c98: MOV EDI, SCRATCH
0x001cb0: X86 cld
0x001cc8: X86 xor eax, eax
0x001ce0: X86 mov al, byte ptr [esi]
0x001cf8: X86 mov word ptr [edi], ax
0x001d10: X86 add esi, 1h
0x001d28: X86 add edi, 2h
0x001d40: X86 test al, al
0x001d58: JNZ VM[0x001ce0] (fallthrough VM[0x001d70])
0x001d70: X86 lea esp, dword ptr [esp+18h]
0x001d88: MOV SCRATCH, EBP
0x001db8: ADD SCRATCH, 0x000008
0x001dd0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x001de8: MOV EAX, SCRATCH
0x001e00: MOV SCRATCH, ESP
0x001e30: ADD SCRATCH, 0x00001c
0x001e48: MOV DWORD PTR [SCRATCH], EAX
0x001e60: X86 popad
0x001e78: X86 leave
0x001e90: X86 ret 4h
0x001ea8: X86 pushad
0x001ec0: X86 xor ecx, ecx
0x001ed8: X86 sub ecx, 87858700h
0x001ef0: X86 push ecx
0x001f20: X86 xor ecx, 14161D2Eh
0x001f38: X86 push ecx
0x001f68: X86 add ecx, 0C5C70837h
0x001f80: X86 push ecx
0x001fb0: X86 sub ecx, 0C3C106FAh
0x001fc8: X86 push ecx
0x001ff8: MOV SCRATCH, ESP
0x002010: MOV ESI, SCRATCH
0x002028: MOV SCRATCH, EBP
0x002058: ADD SCRATCH, 0x000008
0x002070: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002088: MOV EDI, SCRATCH
0x0020a0: X86 cld
0x0020b8: X86 xor eax, eax
0x0020d0: X86 mov al, byte ptr [esi]
0x0020e8: X86 mov word ptr [edi], ax
0x002100: X86 add esi, 1h
0x002118: X86 add edi, 2h
0x002130: X86 test al, al
0x002148: JNZ VM[0x0020d0] (fallthrough VM[0x002160])
0x002160: X86 lea esp, dword ptr [esp+10h]
0x002178: MOV SCRATCH, EBP
0x0021a8: ADD SCRATCH, 0x000008
0x0021c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0021d8: MOV EAX, SCRATCH
0x0021f0: MOV SCRATCH, ESP
0x002220: ADD SCRATCH, 0x00001c
0x002238: MOV DWORD PTR [SCRATCH], EAX
0x002250: X86 popad
0x002268: X86 leave
0x002280: X86 ret 4h
0x002298: X86 pushad
0x0022b0: X86 xor ecx, ecx
0x0022c8: X86 sub ecx, 87FF9394h
0x0022e0: X86 push ecx
0x002310: X86 xor ecx, 1C2E091Fh
0x002328: X86 push ecx
0x002358: X86 add ecx, 0FD3406F2h
0x002370: X86 push ecx
0x0023a0: X86 sub ecx, 0F2F006FAh
0x0023b8: X86 push ecx
0x0023e8: MOV SCRATCH, ESP
0x002400: MOV ESI, SCRATCH
0x002418: MOV SCRATCH, EBP
0x002448: ADD SCRATCH, 0x000008
0x002460: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002478: MOV EDI, SCRATCH
0x002490: X86 cld
0x0024a8: X86 xor eax, eax
0x0024c0: X86 mov al, byte ptr [esi]
0x0024d8: X86 mov word ptr [edi], ax
0x0024f0: X86 add esi, 1h
0x002508: X86 add edi, 2h
0x002520: X86 test al, al
0x002538: JNZ VM[0x0024c0] (fallthrough VM[0x002550])
0x002550: X86 lea esp, dword ptr [esp+10h]
0x002568: MOV SCRATCH, EBP
0x002598: ADD SCRATCH, 0x000008
0x0025b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0025c8: MOV EAX, SCRATCH
0x0025e0: MOV SCRATCH, ESP
0x002610: ADD SCRATCH, 0x00001c
0x002628: MOV DWORD PTR [SCRATCH], EAX
0x002640: X86 popad
0x002658: X86 leave
0x002670: X86 ret 4h
0x002688: X86 pushad
0x0026a0: X86 xor ecx, ecx
0x0026b8: X86 sub ecx, 87858700h
0x0026d0: X86 push ecx
0x002700: X86 xor ecx, 14161D2Eh
0x002718: X86 push ecx
0x002748: X86 add ecx, 0C5C70542h
0x002760: X86 push ecx
0x002790: X86 sub ecx, 0D0BD050Fh
0x0027a8: X86 push ecx
0x0027d8: MOV SCRATCH, ESP
0x0027f0: MOV ESI, SCRATCH
0x002808: MOV SCRATCH, EBP
0x002838: ADD SCRATCH, 0x000008
0x002850: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002868: MOV EDI, SCRATCH
0x002880: X86 cld
0x002898: X86 xor eax, eax
0x0028b0: X86 mov al, byte ptr [esi]
0x0028c8: X86 mov word ptr [edi], ax
0x0028e0: X86 add esi, 1h
0x0028f8: X86 add edi, 2h
0x002910: X86 test al, al
0x002928: JNZ VM[0x0028b0] (fallthrough VM[0x002940])
0x002940: X86 lea esp, dword ptr [esp+10h]
0x002958: MOV SCRATCH, EBP
0x002988: ADD SCRATCH, 0x000008
0x0029a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0029b8: MOV EAX, SCRATCH
0x0029d0: MOV SCRATCH, ESP
0x002a00: ADD SCRATCH, 0x00001c
0x002a18: MOV DWORD PTR [SCRATCH], EAX
0x002a30: X86 popad
0x002a48: X86 leave
0x002a60: X86 ret 4h
0x002a78: X86 pushad
0x002a90: X86 xor ecx, ecx
0x002aa8: X86 sub ecx, 87858700h
0x002ac0: X86 push ecx
0x002af0: X86 xor ecx, 2445465Ch
0x002b08: X86 push ecx
0x002b38: MOV SCRATCH, ESP
0x002b50: MOV ESI, SCRATCH
0x002b68: MOV SCRATCH, EBP
0x002b98: ADD SCRATCH, 0x000008
0x002bb0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002bc8: MOV EDI, SCRATCH
0x002be0: X86 cld
0x002bf8: X86 xor eax, eax
0x002c10: X86 mov al, byte ptr [esi]
0x002c28: X86 mov word ptr [edi], ax
0x002c40: X86 add esi, 1h
0x002c58: X86 add edi, 2h
0x002c70: X86 test al, al
0x002c88: JNZ VM[0x002c10] (fallthrough VM[0x002ca0])
0x002ca0: X86 lea esp, dword ptr [esp+8h]
0x002cb8: MOV SCRATCH, EBP
0x002ce8: ADD SCRATCH, 0x000008
0x002d00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002d18: MOV EAX, SCRATCH
0x002d30: MOV SCRATCH, ESP
0x002d60: ADD SCRATCH, 0x00001c
0x002d78: MOV DWORD PTR [SCRATCH], EAX
0x002d90: X86 popad
0x002da8: X86 leave
0x002dc0: X86 ret 4h
0x002dd8: X86 pushad
0x002df0: X86 xor ecx, ecx
0x002e08: X86 sub ecx, 0FF8F8AB3h
0x002e20: X86 push ecx
0x002e50: X86 xor ecx, 5C151624h
0x002e68: X86 push ecx
0x002e98: X86 add ecx, 19FFE0F3h
0x002eb0: X86 push ecx
0x002ee0: MOV SCRATCH, ESP
0x002ef8: MOV ESI, SCRATCH
0x002f10: MOV SCRATCH, EBP
0x002f40: ADD SCRATCH, 0x000008
0x002f58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x002f70: MOV EDI, SCRATCH
0x002f88: X86 cld
0x002fa0: X86 xor eax, eax
0x002fb8: X86 mov al, byte ptr [esi]
0x002fd0: X86 mov word ptr [edi], ax
0x002fe8: X86 add esi, 1h
0x003000: X86 add edi, 2h
0x003018: X86 test al, al
0x003030: JNZ VM[0x002fb8] (fallthrough VM[0x003048])
0x003048: X86 lea esp, dword ptr [esp+0Ch]
0x003060: MOV SCRATCH, EBP
0x003090: ADD SCRATCH, 0x000008
0x0030a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0030c0: MOV EAX, SCRATCH
0x0030d8: MOV SCRATCH, ESP
0x003108: ADD SCRATCH, 0x00001c
0x003120: MOV DWORD PTR [SCRATCH], EAX
0x003138: X86 popad
0x003150: X86 leave
0x003168: X86 ret 4h
0x003180: X86 pushad
0x003198: X86 xor ecx, ecx
0x0031b0: X86 sub ecx, 87858700h
0x0031c8: X86 push ecx
0x0031f8: X86 xor ecx, 0A150D63h
0x003210: X86 push ecx
0x003240: X86 add ecx, 0F302F501h
0x003258: X86 push ecx
0x003288: X86 sub ecx, 1FFB03h
0x0032a0: X86 push ecx
0x0032d0: X86 xor ecx, 83C0F2Dh
0x0032e8: X86 push ecx
0x003318: X86 add ecx, 0EEF7021Dh
0x003330: X86 push ecx
0x003360: X86 sub ecx, 0E6001F0Dh
0x003378: X86 push ecx
0x0033a8: MOV SCRATCH, ESP
0x0033c0: MOV ESI, SCRATCH
0x0033d8: MOV SCRATCH, EBP
0x003408: ADD SCRATCH, 0x000008
0x003420: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003438: MOV EDI, SCRATCH
0x003450: X86 cld
0x003468: X86 xor eax, eax
0x003480: X86 mov al, byte ptr [esi]
0x003498: X86 mov word ptr [edi], ax
0x0034b0: X86 add esi, 1h
0x0034c8: X86 add edi, 2h
0x0034e0: X86 test al, al
0x0034f8: JNZ VM[0x003480] (fallthrough VM[0x003510])
0x003510: X86 lea esp, dword ptr [esp+1Ch]
0x003528: MOV SCRATCH, EBP
0x003558: ADD SCRATCH, 0x000008
0x003570: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003588: MOV EAX, SCRATCH
0x0035a0: MOV SCRATCH, ESP
0x0035d0: ADD SCRATCH, 0x00001c
0x0035e8: MOV DWORD PTR [SCRATCH], EAX
0x003600: X86 popad
0x003618: X86 leave
0x003630: X86 ret 4h
0x003648: X86 pushad
0x003660: X86 mov esi, 41F1E0h
0x003678: MOV SCRATCH, EBP
0x0036a8: ADD SCRATCH, 0x000008
0x0036c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0036d8: MOV EDI, SCRATCH
0x0036f0: MOV SCRATCH, ESI
0x003720: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003738: MOV EAX, SCRATCH
0x003750: X86 sub esp, 4h
0x003768: MOV SCRATCH, ESP
0x003798: MOV DWORD PTR [SCRATCH], EAX
0x0037b0: MOV SCRATCH, 0
0x0037c8: ADD SCRATCH, 0x420344
0x0037e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0037f8: MOV EAX, SCRATCH
0x003810: X86 sub esp, 4h
0x003828: MOV SCRATCH, ESP
0x003858: MOV DWORD PTR [SCRATCH], EAX
0x003870: X86CALLOUT 0x408360
0x003888: MOV SCRATCH, EDI
0x0038b8: MOV DWORD PTR [SCRATCH], EAX
0x0038d0: X86 add esi, 4h
0x0038e8: X86 add edi, 4h
0x003900: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x003918: JNZ VM[0x0036f0] (fallthrough VM[0x003930])
0x003930: X86 popad
0x003948: X86 leave
0x003960: X86 ret 4h
0x003978: X86 pushad
0x003990: X86 mov esi, 41F26Ch
0x0039a8: MOV SCRATCH, EBP
0x0039d8: ADD SCRATCH, 0x000008
0x0039f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003a08: MOV EDI, SCRATCH
0x003a20: MOV SCRATCH, ESI
0x003a50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003a68: MOV EAX, SCRATCH
0x003a80: X86 sub esp, 4h
0x003a98: MOV SCRATCH, ESP
0x003ac8: MOV DWORD PTR [SCRATCH], EAX
0x003ae0: MOV SCRATCH, 0
0x003af8: ADD SCRATCH, 0x420358
0x003b10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003b28: MOV EAX, SCRATCH
0x003b40: X86 sub esp, 4h
0x003b58: MOV SCRATCH, ESP
0x003b88: MOV DWORD PTR [SCRATCH], EAX
0x003ba0: X86CALLOUT 0x408360
0x003bb8: MOV SCRATCH, EDI
0x003be8: MOV DWORD PTR [SCRATCH], EAX
0x003c00: X86 add esi, 4h
0x003c18: X86 add edi, 4h
0x003c30: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x003c48: JNZ VM[0x003a20] (fallthrough VM[0x003c60])
0x003c60: X86 popad
0x003c78: X86 leave
0x003c90: X86 ret 4h
0x003ca8: X86 pushad
0x003cc0: X86 mov esi, 41F308h
0x003cd8: MOV SCRATCH, EBP
0x003d08: ADD SCRATCH, 0x000008
0x003d20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003d38: MOV EDI, SCRATCH
0x003d50: MOV SCRATCH, ESI
0x003d80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003d98: MOV EAX, SCRATCH
0x003db0: X86 sub esp, 4h
0x003dc8: MOV SCRATCH, ESP
0x003df8: MOV DWORD PTR [SCRATCH], EAX
0x003e10: X86 sub esp, 4h
0x003e28: MOV SCRATCH, 0
0x003e40: ADD SCRATCH, 0x420350
0x003e58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x003e70: MOV EAX, SCRATCH
0x003e88: MOV SCRATCH, ESP
0x003eb8: MOV DWORD PTR [SCRATCH], EAX
0x003ed0: X86CALLOUT 0x408360
0x003ee8: MOV SCRATCH, EDI
0x003f18: MOV DWORD PTR [SCRATCH], EAX
0x003f30: X86 add esi, 4h
0x003f48: X86 add edi, 4h
0x003f60: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x003f78: JNZ VM[0x003d50] (fallthrough VM[0x003f90])
0x003f90: X86 popad
0x003fa8: X86 leave
0x003fc0: X86 ret 4h
0x003fd8: X86 pushad
0x003ff0: X86 mov esi, 41F33Ch
0x004008: MOV SCRATCH, EBP
0x004038: ADD SCRATCH, 0x000008
0x004050: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004068: MOV EDI, SCRATCH
0x004080: MOV SCRATCH, ESI
0x0040b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0040c8: MOV EAX, SCRATCH
0x0040e0: X86 sub esp, 4h
0x0040f8: MOV SCRATCH, ESP
0x004128: MOV DWORD PTR [SCRATCH], EAX
0x004140: X86 sub esp, 4h
0x004158: MOV SCRATCH, 0
0x004170: ADD SCRATCH, 0x420348
0x004188: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0041a0: MOV EAX, SCRATCH
0x0041b8: MOV SCRATCH, ESP
0x0041e8: MOV DWORD PTR [SCRATCH], EAX
0x004200: X86CALLOUT 0x408360
0x004218: MOV SCRATCH, EDI
0x004248: MOV DWORD PTR [SCRATCH], EAX
0x004260: X86 add esi, 4h
0x004278: X86 add edi, 4h
0x004290: X86 cmp dword ptr [esi], 0FFFFFFFFh
0x0042a8: JNZ VM[0x004080] (fallthrough VM[0x0042c0])
0x0042c0: X86 popad
0x0042d8: X86 leave
0x0042f0: X86 ret 4h
0x004308: MOV SCRATCH, EBP
0x004338: ADD SCRATCH, 0x000008
0x004350: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004368: MOV EAX, SCRATCH
0x004380: X86 mov dword ptr [eax], 1A5h
0x004398: X86 mov eax, 41F350h
0x0043b0: X86 leave
0x0043c8: X86 ret 4h
0x0043e0: MOV SCRATCH, EBP
0x004410: ADD SCRATCH, 0x000008
0x004428: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004440: MOV EBX, SCRATCH
0x004458: MOV SCRATCH, EBX
0x004488: ADD SCRATCH, 0x00003c
0x0044a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0044b8: MOV EDI, SCRATCH
0x0044d0: X86 add edi, ebx
0x0044e8: MOV SCRATCH, EDI
0x004518: ADD SCRATCH, 0x0000a0
0x004530: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004548: MOV EAX, SCRATCH
0x004560: X86 test eax, eax
0x004578: JZ VM[0x004e00] (fallthrough VM[0x004590])
0x004590: X86 push esi
0x0045c0: X86 push eax
0x0045f0: X86 push ebx
0x004620: X86CALLOUT 0x4080b2
0x004638: MOV SCRATCH, EAX
0x004650: MOV ESI, SCRATCH
0x004668: MOV SCRATCH, EDI
0x004698: ADD SCRATCH, 0x000034
0x0046b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0046c8: MOV EAX, SCRATCH
0x0046e0: X86 add esi, ebx
0x0046f8: X86 cmp dword ptr [ebp+0Ch], eax
0x004710: JZ VM[0x004de8] (fallthrough VM[0x004728])
0x004728: MOV SCRATCH, EDI
0x004758: ADD SCRATCH, 0x0000a4
0x004770: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004788: MOV EDI, SCRATCH
0x0047a0: X86 sub eax, dword ptr [ebp+0Ch]
0x0047b8: X86 test edi, edi
0x0047d0: MOV SCRATCH, EBP
0x004800: ADD SCRATCH, 0x000008
0x004818: MOV DWORD PTR [SCRATCH], EDI
0x004830: MOV SCRATCH, EBP
0x004860: ADD SCRATCH, 0xfffffffc
0x004878: MOV DWORD PTR [SCRATCH], EAX
0x004890: JZ VM[0x004de8] (fallthrough VM[0x0048a8])
0x0048a8: MOV SCRATCH, ESI
0x0048d8: ADD SCRATCH, 0x000004
0x0048f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004908: MOV EDI, SCRATCH
0x004920: MOV SCRATCH, ESI
0x004950: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004968: PUSH SCRATCH
0x004980: MOV SCRATCH, ESI
0x0049b0: ADD SCRATCH, 0x000008
0x0049c8: MOV EAX, SCRATCH
0x0049e0: X86 sub edi, 8h
0x0049f8: X86 push ebx
0x004a28: X86 shr edi, 1h
0x004a40: MOV SCRATCH, EBP
0x004a70: ADD SCRATCH, 0x00000c
0x004a88: MOV DWORD PTR [SCRATCH], EAX
0x004aa0: X86CALLOUT 0x4080b2
0x004ab8: X86 add eax, ebx
0x004ad0: X86 test edi, edi
0x004ae8: JZ VM[0x004d10] (fallthrough VM[0x004b00])
0x004b00: MOV SCRATCH, EBP
0x004b30: ADD SCRATCH, 0x00000c
0x004b48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004b60: MOV ECX, SCRATCH
0x004b78: X86 movzx ecx, word ptr [ecx]
0x004b90: MOV SCRATCH, ECX
0x004ba8: MOV EDX, SCRATCH
0x004bc0: X86 and dx, 0F000h
0x004bd8: X86 cmp dx, 3000h
0x004bf0: JNZ VM[0x004cc8] (fallthrough VM[0x004c08])
0x004c08: MOV SCRATCH, EBP
0x004c38: ADD SCRATCH, 0xfffffffc
0x004c50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004c68: MOV EDX, SCRATCH
0x004c80: X86 and ecx, 0FFFh
0x004c98: X86 add ecx, eax
0x004cb0: X86 sub dword ptr [ecx], edx
0x004cc8: X86 add dword ptr [ebp+0Ch], 2h
0x004ce0: X86 dec edi
0x004cf8: JNZ VM[0x004b00] (fallthrough VM[0x004d10])
0x004d10: MOV SCRATCH, ESI
0x004d40: ADD SCRATCH, 0x000004
0x004d58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004d70: MOV EAX, SCRATCH
0x004d88: X86 sub dword ptr [ebp+8h], eax
0x004da0: X86 add esi, eax
0x004db8: X86 cmp dword ptr [ebp+8h], 0h
0x004dd0: JNZ VM[0x0048a8] (fallthrough VM[0x004de8])
0x004de8: X86 pop esi
0x004e00: X86 pop edi
0x004e18: MOV SCRATCH, EBX
0x004e30: MOV EAX, SCRATCH
0x004e48: X86 pop ebx
0x004e60: X86 leave
0x004e78: X86 ret 8h
0x004e90: MOV SCRATCH, 0
0x004ea8: ADD SCRATCH, 0x420370
0x004ec0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004ed8: MOV ESI, SCRATCH
0x004ef0: CRASH
0x004f08: MOV SCRATCH, EBP
0x004f38: ADD SCRATCH, 0x000008
0x004f50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004f68: PUSH SCRATCH
0x004f80: MOV SCRATCH, ESI
0x004fb0: ADD SCRATCH, 0x000008
0x004fc8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x004fe0: PUSH SCRATCH
0x004ff8: X86JUMPOUT call dword ptr [40110Ch]
0x005010: X86 test eax, eax
0x005028: X86 pop ecx
0x005040: X86 pop ecx
0x005058: JZ VM[0x005bf8] (fallthrough VM[0x005070])
0x005070: MOV SCRATCH, ESI
0x0050a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0050b8: MOV ESI, SCRATCH
0x0050d0: X86 cmp esi, edi
0x0050e8: JNZ VM[0x004f08] (fallthrough VM[0x005100])
0x005100: X86 mov esi, 208h
0x005118: X86 push esi
0x005148: MOV SCRATCH, EBP
0x005178: ADD SCRATCH, 0xfffffbc0
0x005190: MOV EAX, SCRATCH
0x0051a8: X86 push edi
0x0051d8: X86 push eax
0x005208: X86CALLOUT 0x40ae80
0x005220: X86 push esi
0x005250: MOV SCRATCH, EBP
0x005280: ADD SCRATCH, 0xfffffdc8
0x005298: MOV EAX, SCRATCH
0x0052b0: X86 push edi
0x0052e0: X86 push eax
0x005310: X86CALLOUT 0x40ae80
0x005328: X86 push esi
0x005358: MOV SCRATCH, EBP
0x005388: ADD SCRATCH, 0xfffff5a8
0x0053a0: MOV EAX, SCRATCH
0x0053b8: X86 push edi
0x0053e8: X86 push eax
0x005418: X86CALLOUT 0x40ae80
0x005430: X86 add esp, 24h
0x005448: MOV SCRATCH, EBP
0x005478: ADD SCRATCH, 0xfffffdc8
0x005490: MOV EAX, SCRATCH
0x0054a8: X86 push eax
0x0054d8: MOV SCRATCH, EBP
0x005508: ADD SCRATCH, 0xffffffd0
0x005520: MOV EAX, SCRATCH
0x005538: X86 push eax
0x005568: MOV SCRATCH, 0
0x005580: ADD SCRATCH, 0x41ff34
0x005598: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0055b0: MOV EAX, SCRATCH
0x0055c8: X86 mov word ptr [ebp+0FFFFFDC8h], 53h
0x0055e0: X86 mov word ptr [ebp+0FFFFFDCAh], 59h
0x0055f8: X86 mov word ptr [ebp+0FFFFFDCCh], 53h
0x005610: X86 mov word ptr [ebp+0FFFFFDCEh], 54h
0x005628: X86 mov word ptr [ebp+0FFFFFDD0h], 45h
0x005640: X86 mov word ptr [ebp+0FFFFFDD2h], 4Dh
0x005658: X86 mov word ptr [ebp+0FFFFFDD4h], 52h
0x005670: X86 mov word ptr [ebp+0FFFFFDD6h], 4Fh
0x005688: X86 mov word ptr [ebp+0FFFFFDD8h], 4Fh
0x0056a0: X86 mov word ptr [ebp+0FFFFFDDAh], 54h
0x0056b8: X86 mov word ptr [ebp+0FFFFFBC0h], 73h
0x0056d0: X86 mov word ptr [ebp+0FFFFFBC2h], 79h
0x0056e8: X86 mov word ptr [ebp+0FFFFFBC4h], 73h
0x005700: X86 mov word ptr [ebp+0FFFFFBC6h], 74h
0x005718: X86 mov word ptr [ebp+0FFFFFBC8h], 65h
0x005730: X86 mov word ptr [ebp+0FFFFFBCAh], 6Dh
0x005748: X86 mov word ptr [ebp+0FFFFFBCCh], 33h
0x005760: X86 mov word ptr [ebp+0FFFFFBCEh], 32h
0x005778: X86JUMPOUT call dword ptr [eax+24h]
0x005790: MOV SCRATCH, EBP
0x0057c0: ADD SCRATCH, 0xfffff5a8
0x0057d8: MOV EAX, SCRATCH
0x0057f0: MOV SCRATCH, EBP
0x005820: ADD SCRATCH, 0xffffffe4
0x005838: MOV DWORD PTR [SCRATCH], EAX
0x005850: MOV SCRATCH, EBP
0x005880: ADD SCRATCH, 0xffffffe0
0x005898: MOV EAX, SCRATCH
0x0058b0: X86 push eax
0x0058e0: MOV SCRATCH, EBP
0x005910: ADD SCRATCH, 0xffffffd0
0x005928: MOV EAX, SCRATCH
0x005940: X86 push eax
0x005970: MOV SCRATCH, 0
0x005988: ADD SCRATCH, 0x41ff34
0x0059a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0059b8: MOV EAX, SCRATCH
0x0059d0: X86 push edi
0x005a00: X86 mov word ptr [ebp+0FFFFFFE0h], 206h
0x005a18: X86 mov word ptr [ebp+0FFFFFFE2h], si
0x005a30: X86JUMPOUT call dword ptr [eax+58h]
0x005a48: MOV SCRATCH, EBP
0x005a78: ADD SCRATCH, 0x000008
0x005a90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x005aa8: PUSH SCRATCH
0x005ac0: MOV SCRATCH, 0
0x005ad8: ADD SCRATCH, 0x41ff38
0x005af0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x005b08: MOV EAX, SCRATCH
0x005b20: X86JUMPOUT call dword ptr [eax+6Ch]
0x005b38: X86 cmp eax, edi
0x005b50: MOV SCRATCH, EBP
0x005b80: ADD SCRATCH, 0xfffffff0
0x005b98: MOV DWORD PTR [SCRATCH], EAX
0x005bb0: JNZ VM[0x005c88] (fallthrough VM[0x005bc8])
0x005bc8: X86 xor eax, eax
0x005be0: CRASH
0x005bf8: MOV SCRATCH, ESI
0x005c28: ADD SCRATCH, 0x000004
0x005c40: MOV SCRATCH, DWORD PTR [SCRATCH]
0x005c58: MOV EAX, SCRATCH
0x005c70: CRASH
0x005c88: X86 push ebx
0x005cb8: X86 push esi
0x005ce8: MOV SCRATCH, EBP
0x005d18: ADD SCRATCH, 0xfffff9b8
0x005d30: MOV EAX, SCRATCH
0x005d48: X86 push edi
0x005d78: X86 push eax
0x005da8: X86CALLOUT 0x40ae80
0x005dc0: X86 push esi
0x005df0: MOV SCRATCH, EBP
0x005e20: ADD SCRATCH, 0xfffff7b0
0x005e38: MOV EAX, SCRATCH
0x005e50: X86 push edi
0x005e80: X86 push eax
0x005eb0: X86CALLOUT 0x40ae80
0x005ec8: X86 mov edi, 104h
0x005ee0: X86 push edi
0x005f10: MOV SCRATCH, EBP
0x005f40: ADD SCRATCH, 0xfffff5a8
0x005f58: MOV EAX, SCRATCH
0x005f70: X86 push eax
0x005fa0: MOV SCRATCH, EBP
0x005fd0: ADD SCRATCH, 0xfffff9b8
0x005fe8: MOV EAX, SCRATCH
0x006000: X86 push eax
0x006030: X86 mov word ptr [ebp+0FFFFF7B0h], 5Ch
0x006048: X86JUMPOUT call dword ptr [401110h]
0x006060: MOV SCRATCH, 0
0x006078: ADD SCRATCH, 0x401114
0x006090: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0060a8: MOV EBX, SCRATCH
0x0060c0: X86 push edi
0x0060f0: MOV SCRATCH, EBP
0x006120: ADD SCRATCH, 0xfffff7b0
0x006138: MOV EAX, SCRATCH
0x006150: X86 push eax
0x006180: MOV SCRATCH, EBP
0x0061b0: ADD SCRATCH, 0xfffff9b8
0x0061c8: MOV EAX, SCRATCH
0x0061e0: X86 push eax
0x006210: X86JUMPOUT call ebx
0x006228: X86 push edi
0x006258: MOV SCRATCH, EBP
0x006288: ADD SCRATCH, 0xfffffbc0
0x0062a0: MOV EAX, SCRATCH
0x0062b8: X86 push eax
0x0062e8: MOV SCRATCH, EBP
0x006318: ADD SCRATCH, 0xfffff9b8
0x006330: MOV EAX, SCRATCH
0x006348: X86 push eax
0x006378: X86JUMPOUT call ebx
0x006390: X86 push edi
0x0063c0: MOV SCRATCH, EBP
0x0063f0: ADD SCRATCH, 0xfffff7b0
0x006408: MOV EAX, SCRATCH
0x006420: X86 push eax
0x006450: MOV SCRATCH, EBP
0x006480: ADD SCRATCH, 0xfffff9b8
0x006498: MOV EAX, SCRATCH
0x0064b0: X86 push eax
0x0064e0: X86JUMPOUT call ebx
0x0064f8: X86 add esp, 48h
0x006510: X86 push edi
0x006540: MOV SCRATCH, EBP
0x006570: ADD SCRATCH, 0x000008
0x006588: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0065a0: PUSH SCRATCH
0x0065b8: MOV SCRATCH, EBP
0x0065e8: ADD SCRATCH, 0xfffff9b8
0x006600: MOV EAX, SCRATCH
0x006618: X86 push eax
0x006648: X86JUMPOUT call ebx
0x006660: X86 push esi
0x006690: X86 xor edi, edi
0x0066a8: MOV SCRATCH, EBP
0x0066d8: ADD SCRATCH, 0xfffffbc0
0x0066f0: MOV EAX, SCRATCH
0x006708: X86 push edi
0x006738: X86 push eax
0x006768: X86CALLOUT 0x40ae80
0x006780: X86 push esi
0x0067b0: MOV SCRATCH, EBP
0x0067e0: ADD SCRATCH, 0xfffffdc8
0x0067f8: MOV EAX, SCRATCH
0x006810: X86 push edi
0x006840: X86 push eax
0x006870: X86CALLOUT 0x40ae80
0x006888: X86 add esp, 24h
0x0068a0: X86 push edi
0x0068d0: X86 push edi
0x006900: MOV SCRATCH, 0x000003
0x006918: PUSH SCRATCH
0x006930: X86 push edi
0x006960: MOV SCRATCH, 0x000001
0x006978: PUSH SCRATCH
0x006990: MOV SCRATCH, 0x80000000
0x0069a8: PUSH SCRATCH
0x0069c0: MOV SCRATCH, EBP
0x0069f0: ADD SCRATCH, 0xfffff9b8
0x006a08: MOV EAX, SCRATCH
0x006a20: X86 push eax
0x006a50: X86CALLOUT 0x408933
0x006a68: X86 cmp eax, 0FFFFFFFFh
0x006a80: MOV SCRATCH, EBP
0x006ab0: ADD SCRATCH, 0xffffffdc
0x006ac8: MOV DWORD PTR [SCRATCH], EAX
0x006ae0: JNZ VM[0x006b28] (fallthrough VM[0x006af8])
0x006af8: X86 xor eax, eax
0x006b10: CRASH
0x006b28: X86 push edi
0x006b58: X86 push eax
0x006b88: X86CALLOUT 0x408cbe
0x006ba0: MOV SCRATCH, EAX
0x006bb8: MOV EBX, SCRATCH
0x006bd0: X86 push ebx
0x006c00: MOV SCRATCH, EBP
0x006c30: ADD SCRATCH, 0xffffffd8
0x006c48: MOV DWORD PTR [SCRATCH], EBX
0x006c60: X86CALLOUT 0x408d2b
0x006c78: X86 push edi
0x006ca8: MOV SCRATCH, EBP
0x006cd8: ADD SCRATCH, 0xffffffe8
0x006cf0: MOV ECX, SCRATCH
0x006d08: X86 push ecx
0x006d38: X86 push ebx
0x006d68: X86 push eax
0x006d98: MOV SCRATCH, EBP
0x006dc8: ADD SCRATCH, 0xffffffdc
0x006de0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x006df8: PUSH SCRATCH
0x006e10: MOV SCRATCH, EBP
0x006e40: ADD SCRATCH, 0xfffffffc
0x006e58: MOV DWORD PTR [SCRATCH], EAX
0x006e70: X86CALLOUT 0x408c4e
0x006e88: MOV SCRATCH, 0x000040
0x006ea0: PUSH SCRATCH
0x006eb8: MOV SCRATCH, 0x001000
0x006ed0: PUSH SCRATCH
0x006ee8: X86 push ebx
0x006f18: X86 push edi
0x006f48: X86CALLOUT 0x408810
0x006f60: X86 cmp eax, edi
0x006f78: MOV SCRATCH, EBP
0x006fa8: ADD SCRATCH, 0xfffffff4
0x006fc0: MOV DWORD PTR [SCRATCH], EAX
0x006fd8: JZ VM[0x008e50] (fallthrough VM[0x006ff0])
0x006ff0: X86 push ebx
0x007020: MOV SCRATCH, EBP
0x007050: ADD SCRATCH, 0xfffffffc
0x007068: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007080: PUSH SCRATCH
0x007098: X86 push eax
0x0070c8: X86CALLOUT 0x40ae74
0x0070e0: MOV SCRATCH, EBP
0x007110: ADD SCRATCH, 0x000008
0x007128: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007140: MOV EAX, SCRATCH
0x007158: X86 add esp, 0Ch
0x007170: MOV SCRATCH, EAX
0x0071a0: ADD SCRATCH, 0x000002
0x0071b8: MOV ECX, SCRATCH
0x0071d0: X86 mov dx, word ptr [eax]
0x0071e8: X86 inc eax
0x007200: X86 inc eax
0x007218: X86 cmp dx, di
0x007230: JNZ VM[0x0071d0] (fallthrough VM[0x007248])
0x007248: X86 sub eax, ecx
0x007260: X86 sar eax, 1h
0x007278: MOV SCRATCH, EAX
0x0072a8: ADD SCRATCH, EAX
0x0072c0: ADD SCRATCH, 0x000002
0x0072d8: MOV EDI, SCRATCH
0x0072f0: X86 mov ebx, 420370h
0x007308: MOV SCRATCH, EBX
0x007338: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007350: MOV EAX, SCRATCH
0x007368: X86 test eax, eax
0x007380: JZ VM[0x007410] (fallthrough VM[0x007398])
0x007398: MOV SCRATCH, EAX
0x0073b0: MOV EBX, SCRATCH
0x0073c8: X86 test ebx, ebx
0x0073e0: JNZ VM[0x007308] (fallthrough VM[0x0073f8])
0x0073f8: CRASH
0x007410: MOV SCRATCH, 0x00000c
0x007428: PUSH SCRATCH
0x007440: X86CALLOUT 0x408d2b
0x007458: MOV SCRATCH, EBP
0x007488: ADD SCRATCH, 0xfffffff4
0x0074a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0074b8: MOV ECX, SCRATCH
0x0074d0: MOV SCRATCH, EBX
0x007500: MOV DWORD PTR [SCRATCH], EAX
0x007518: X86 push edi
0x007548: MOV SCRATCH, EAX
0x007578: ADD SCRATCH, 0x000004
0x007590: MOV DWORD PTR [SCRATCH], ECX
0x0075a8: X86CALLOUT 0x408d2b
0x0075c0: MOV SCRATCH, EBX
0x0075f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007608: MOV ECX, SCRATCH
0x007620: MOV SCRATCH, ECX
0x007650: ADD SCRATCH, 0x000008
0x007668: MOV DWORD PTR [SCRATCH], EAX
0x007680: MOV SCRATCH, EBX
0x0076b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0076c8: MOV EAX, SCRATCH
0x0076e0: X86 push edi
0x007710: MOV SCRATCH, 0x000000
0x007728: PUSH SCRATCH
0x007740: MOV SCRATCH, EAX
0x007770: ADD SCRATCH, 0x000008
0x007788: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0077a0: PUSH SCRATCH
0x0077b8: X86CALLOUT 0x40ae80
0x0077d0: MOV SCRATCH, EBX
0x007800: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007818: MOV EAX, SCRATCH
0x007830: X86 shr edi, 1h
0x007848: X86 push edi
0x007878: MOV SCRATCH, EBP
0x0078a8: ADD SCRATCH, 0x000008
0x0078c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0078d8: PUSH SCRATCH
0x0078f0: MOV SCRATCH, EAX
0x007920: ADD SCRATCH, 0x000008
0x007938: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007950: PUSH SCRATCH
0x007968: X86JUMPOUT call dword ptr [401110h]
0x007980: MOV SCRATCH, EBX
0x0079b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0079c8: MOV EAX, SCRATCH
0x0079e0: X86 add esp, 18h
0x0079f8: X86 and dword ptr [eax], 0h
0x007a10: MOV SCRATCH, EBP
0x007a40: ADD SCRATCH, 0xfffffff0
0x007a58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007a70: PUSH SCRATCH
0x007a88: MOV SCRATCH, EBP
0x007ab8: ADD SCRATCH, 0xfffffff4
0x007ad0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007ae8: PUSH SCRATCH
0x007b00: X86CALLOUT 0x404698
0x007b18: X86 push esi
0x007b48: MOV SCRATCH, EAX
0x007b60: MOV EBX, SCRATCH
0x007b78: MOV SCRATCH, EBP
0x007ba8: ADD SCRATCH, 0xfffff3a0
0x007bc0: MOV EAX, SCRATCH
0x007bd8: MOV SCRATCH, 0x000000
0x007bf0: PUSH SCRATCH
0x007c08: X86 push eax
0x007c38: X86CALLOUT 0x40ae80
0x007c50: X86 add esp, 0Ch
0x007c68: MOV SCRATCH, EBP
0x007c98: ADD SCRATCH, 0xfffff3a0
0x007cb0: MOV EAX, SCRATCH
0x007cc8: X86 push eax
0x007cf8: X86CALLOUT 0x40146e
0x007d10: X86 push eax
0x007d40: MOV SCRATCH, EBP
0x007d70: ADD SCRATCH, 0x000008
0x007d88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007da0: PUSH SCRATCH
0x007db8: X86CALLOUT 0x407e65
0x007dd0: X86 test eax, eax
0x007de8: JNZ VM[0x008a90] (fallthrough VM[0x007e00])
0x007e00: MOV SCRATCH, EBX
0x007e30: ADD SCRATCH, 0x00003c
0x007e48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x007e60: MOV EAX, SCRATCH
0x007e78: X86 add eax, ebx
0x007e90: X86 movzx edx, word ptr [eax+6h]
0x007ea8: X86 movzx ecx, word ptr [eax+14h]
0x007ec0: X86 xor esi, esi
0x007ed8: X86 test edx, edx
0x007ef0: MOV SCRATCH, EAX
0x007f20: ADD SCRATCH, ECX
0x007f38: ADD SCRATCH, 0x000018
0x007f50: MOV ECX, SCRATCH
0x007f68: MOV SCRATCH, EBP
0x007f98: ADD SCRATCH, 0xffffffec
0x007fb0: MOV DWORD PTR [SCRATCH], EDX
0x007fc8: JBE VM[0x008370] (fallthrough VM[0x007fe0])
0x007fe0: MOV SCRATCH, EAX
0x008010: ADD SCRATCH, 0x00002c
0x008028: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008040: MOV EAX, SCRATCH
0x008058: MOV SCRATCH, EBP
0x008088: ADD SCRATCH, 0x000008
0x0080a0: MOV DWORD PTR [SCRATCH], EAX
0x0080b8: MOV SCRATCH, ECX
0x0080e8: ADD SCRATCH, 0x00000c
0x008100: MOV EDX, SCRATCH
0x008118: MOV SCRATCH, EDX
0x008148: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008160: MOV EDI, SCRATCH
0x008178: X86 cmp edi, eax
0x008190: JA VM[0x008310] (fallthrough VM[0x0081a8])
0x0081a8: MOV SCRATCH, EDX
0x0081d8: ADD SCRATCH, 0xfffffffc
0x0081f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008208: MOV EAX, SCRATCH
0x008220: X86 add eax, edi
0x008238: MOV SCRATCH, EAX
0x008250: MOV EDI, SCRATCH
0x008268: MOV SCRATCH, EBP
0x008298: ADD SCRATCH, 0x000008
0x0082b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0082c8: MOV EAX, SCRATCH
0x0082e0: X86 cmp edi, eax
0x0082f8: JA VM[0x008370] (fallthrough VM[0x008310])
0x008310: X86 inc esi
0x008328: X86 add edx, 28h
0x008340: X86 cmp esi, dword ptr [ebp+0FFFFFFECh]
0x008358: JC VM[0x008118] (fallthrough VM[0x008370])
0x008370: X86 imul esi, esi, 28h
0x008388: MOV SCRATCH, EBP
0x0083b8: ADD SCRATCH, 0xfffffff8
0x0083d0: MOV EAX, SCRATCH
0x0083e8: X86 push eax
0x008418: X86 add esi, ecx
0x008430: MOV SCRATCH, ESI
0x008460: ADD SCRATCH, 0x00000c
0x008478: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008490: MOV EAX, SCRATCH
0x0084a8: X86 add eax, dword ptr [ebp+0FFFFFFF0h]
0x0084c0: MOV SCRATCH, 0x000040
0x0084d8: PUSH SCRATCH
0x0084f0: MOV SCRATCH, ESI
0x008520: ADD SCRATCH, 0x000008
0x008538: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008550: PUSH SCRATCH
0x008568: X86 push eax
0x008598: MOV SCRATCH, 0xffffffff
0x0085b0: PUSH SCRATCH
0x0085c8: X86CALLOUT 0x408c14
0x0085e0: MOV SCRATCH, ESI
0x008610: ADD SCRATCH, 0x000010
0x008628: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008640: PUSH SCRATCH
0x008658: MOV SCRATCH, ESI
0x008688: ADD SCRATCH, 0x000014
0x0086a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0086b8: MOV EAX, SCRATCH
0x0086d0: X86 add eax, ebx
0x0086e8: X86 push eax
0x008718: MOV SCRATCH, ESI
0x008748: ADD SCRATCH, 0x00000c
0x008760: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008778: MOV EAX, SCRATCH
0x008790: X86 add eax, dword ptr [ebp+0FFFFFFF0h]
0x0087a8: X86 push eax
0x0087d8: X86CALLOUT 0x40ae74
0x0087f0: X86 add esp, 0Ch
0x008808: MOV SCRATCH, EBP
0x008838: ADD SCRATCH, 0xfffffff8
0x008850: MOV EAX, SCRATCH
0x008868: X86 push eax
0x008898: MOV SCRATCH, EBP
0x0088c8: ADD SCRATCH, 0xfffffff8
0x0088e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0088f8: PUSH SCRATCH
0x008910: MOV SCRATCH, ESI
0x008940: ADD SCRATCH, 0x00000c
0x008958: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008970: MOV EAX, SCRATCH
0x008988: MOV SCRATCH, ESI
0x0089b8: ADD SCRATCH, 0x000008
0x0089d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0089e8: PUSH SCRATCH
0x008a00: X86 add eax, dword ptr [ebp+0FFFFFFF0h]
0x008a18: X86 push eax
0x008a48: MOV SCRATCH, 0xffffffff
0x008a60: PUSH SCRATCH
0x008a78: X86CALLOUT 0x408c14
0x008a90: X86 xor edi, edi
0x008aa8: X86 cmp dword ptr [ebp+0FFFFFFFCh], edi
0x008ac0: JZ VM[0x008cb8] (fallthrough VM[0x008ad8])
0x008ad8: MOV SCRATCH, EBP
0x008b08: ADD SCRATCH, 0xffffffd8
0x008b20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008b38: PUSH SCRATCH
0x008b50: X86 push edi
0x008b80: MOV SCRATCH, EBP
0x008bb0: ADD SCRATCH, 0xfffffffc
0x008bc8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008be0: PUSH SCRATCH
0x008bf8: X86CALLOUT 0x40ae80
0x008c10: X86 add esp, 0Ch
0x008c28: MOV SCRATCH, EBP
0x008c58: ADD SCRATCH, 0xfffffffc
0x008c70: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008c88: PUSH SCRATCH
0x008ca0: X86CALLOUT 0x408d5d
0x008cb8: MOV SCRATCH, EBP
0x008ce8: ADD SCRATCH, 0xffffffdc
0x008d00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008d18: PUSH SCRATCH
0x008d30: MOV SCRATCH, 0
0x008d48: ADD SCRATCH, 0x41ff34
0x008d60: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008d78: MOV EAX, SCRATCH
0x008d90: X86JUMPOUT call dword ptr [eax+3Ch]
0x008da8: MOV SCRATCH, EBX
0x008dc0: MOV EAX, SCRATCH
0x008dd8: X86 pop ebx
0x008df0: X86 pop edi
0x008e08: X86 pop esi
0x008e20: X86 leave
0x008e38: X86 ret 4h
0x008e50: MOV SCRATCH, EDI
0x008e68: MOV EBX, SCRATCH
0x008e80: CRASH
0x008e98: MOV SCRATCH, 0x2e50340b
0x008eb0: PUSH SCRATCH
0x008ec8: MOV SCRATCH, 0
0x008ee0: ADD SCRATCH, 0x420358
0x008ef8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x008f10: PUSH SCRATCH
0x008f28: X86CALLOUT 0x408360
0x008f40: X86 test eax, eax
0x008f58: JZ VM[0x009108] (fallthrough VM[0x008f70])
0x008f70: MOV SCRATCH, EBP
0x008fa0: ADD SCRATCH, 0xfffffffc
0x008fb8: MOV ECX, SCRATCH
0x008fd0: X86 push ecx
0x009000: MOV SCRATCH, 0xffffffff
0x009018: PUSH SCRATCH
0x009030: X86JUMPOUT call eax
0x009048: X86 test eax, eax
0x009060: JZ VM[0x009108] (fallthrough VM[0x009078])
0x009078: X86 cmp dword ptr [ebp+0FFFFFFFCh], 0h
0x009090: JZ VM[0x009108] (fallthrough VM[0x0090a8])
0x0090a8: X86 xor eax, eax
0x0090c0: X86 inc eax
0x0090d8: X86 leave
0x0090f0: X86 ret
0x009108: X86 xor eax, eax
0x009120: X86 leave
0x009138: X86 ret
0x009150: MOV SCRATCH, EBP
0x009180: ADD SCRATCH, 0xfffffffc
0x009198: MOV EAX, SCRATCH
0x0091b0: X86 push eax
0x0091e0: MOV SCRATCH, 0
0x0091f8: ADD SCRATCH, 0x41ff2c
0x009210: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009228: MOV EAX, SCRATCH
0x009240: MOV SCRATCH, 0x000008
0x009258: PUSH SCRATCH
0x009270: MOV SCRATCH, 0xffffffff
0x009288: PUSH SCRATCH
0x0092a0: X86JUMPOUT call dword ptr [eax]
0x0092b8: X86 test eax, eax
0x0092d0: JNZ VM[0x009318] (fallthrough VM[0x0092e8])
0x0092e8: X86 xor eax, eax
0x009300: CRASH
0x009318: MOV SCRATCH, EBP
0x009348: ADD SCRATCH, 0xfffffff8
0x009360: MOV EAX, SCRATCH
0x009378: X86 push eax
0x0093a8: MOV SCRATCH, 0
0x0093c0: ADD SCRATCH, 0x41ff2c
0x0093d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0093f0: MOV EAX, SCRATCH
0x009408: X86 push ebx
0x009438: X86 push ebx
0x009468: MOV SCRATCH, 0x000002
0x009480: PUSH SCRATCH
0x009498: MOV SCRATCH, EBP
0x0094c8: ADD SCRATCH, 0xfffffffc
0x0094e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0094f8: PUSH SCRATCH
0x009510: X86JUMPOUT call dword ptr [eax+4h]
0x009528: X86 test eax, eax
0x009540: JNZ VM[0x009600] (fallthrough VM[0x009558])
0x009558: MOV SCRATCH, 0
0x009570: ADD SCRATCH, 0x41ff38
0x009588: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0095a0: MOV EAX, SCRATCH
0x0095b8: X86JUMPOUT call dword ptr [eax+84h]
0x0095d0: X86 cmp eax, 7Ah
0x0095e8: JNZ VM[0x0092e8] (fallthrough VM[0x009600])
0x009600: MOV SCRATCH, 0
0x009618: ADD SCRATCH, 0x41ff38
0x009630: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009648: MOV EAX, SCRATCH
0x009660: X86 push esi
0x009690: MOV SCRATCH, EBP
0x0096c0: ADD SCRATCH, 0xfffffff8
0x0096d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0096f0: PUSH SCRATCH
0x009708: MOV SCRATCH, 0x000040
0x009720: PUSH SCRATCH
0x009738: X86JUMPOUT call dword ptr [eax+8Ch]
0x009750: MOV SCRATCH, EAX
0x009768: MOV ESI, SCRATCH
0x009780: X86 cmp esi, ebx
0x009798: JZ VM[0x00a0f8] (fallthrough VM[0x0097b0])
0x0097b0: MOV SCRATCH, EBP
0x0097e0: ADD SCRATCH, 0xfffffff8
0x0097f8: MOV EAX, SCRATCH
0x009810: X86 push eax
0x009840: MOV SCRATCH, EBP
0x009870: ADD SCRATCH, 0xfffffff8
0x009888: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0098a0: PUSH SCRATCH
0x0098b8: MOV SCRATCH, 0
0x0098d0: ADD SCRATCH, 0x41ff2c
0x0098e8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009900: MOV EAX, SCRATCH
0x009918: X86 push esi
0x009948: MOV SCRATCH, 0x000002
0x009960: PUSH SCRATCH
0x009978: MOV SCRATCH, EBP
0x0099a8: ADD SCRATCH, 0xfffffffc
0x0099c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0099d8: PUSH SCRATCH
0x0099f0: X86JUMPOUT call dword ptr [eax+4h]
0x009a08: X86 test eax, eax
0x009a20: JNZ VM[0x009be8] (fallthrough VM[0x009a38])
0x009a38: MOV SCRATCH, 0
0x009a50: ADD SCRATCH, 0x41ff38
0x009a68: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009a80: MOV EAX, SCRATCH
0x009a98: X86 push esi
0x009ac8: X86JUMPOUT call dword ptr [eax+90h]
0x009ae0: MOV SCRATCH, EBP
0x009b10: ADD SCRATCH, 0xfffffffc
0x009b28: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009b40: PUSH SCRATCH
0x009b58: MOV SCRATCH, 0
0x009b70: ADD SCRATCH, 0x41ff34
0x009b88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009ba0: MOV EAX, SCRATCH
0x009bb8: X86JUMPOUT call dword ptr [eax+3Ch]
0x009bd0: CRASH
0x009be8: MOV SCRATCH, EBP
0x009c18: ADD SCRATCH, 0xfffffffc
0x009c30: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009c48: PUSH SCRATCH
0x009c60: MOV SCRATCH, 0
0x009c78: ADD SCRATCH, 0x41ff34
0x009c90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009ca8: MOV EAX, SCRATCH
0x009cc0: X86JUMPOUT call dword ptr [eax+3Ch]
0x009cd8: MOV SCRATCH, EBP
0x009d08: ADD SCRATCH, 0xfffffff4
0x009d20: MOV EAX, SCRATCH
0x009d38: X86 push eax
0x009d68: X86 push ebx
0x009d98: X86 push ebx
0x009dc8: X86 push ebx
0x009df8: X86 push ebx
0x009e28: X86 push ebx
0x009e58: X86 push ebx
0x009e88: MOV SCRATCH, 0x000220
0x009ea0: PUSH SCRATCH
0x009eb8: MOV SCRATCH, 0x000020
0x009ed0: PUSH SCRATCH
0x009ee8: MOV SCRATCH, 0x000002
0x009f00: PUSH SCRATCH
0x009f18: MOV SCRATCH, EBP
0x009f48: ADD SCRATCH, 0xffffffe8
0x009f60: MOV EAX, SCRATCH
0x009f78: X86 push eax
0x009fa8: MOV SCRATCH, 0
0x009fc0: ADD SCRATCH, 0x41ff2c
0x009fd8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x009ff0: MOV EAX, SCRATCH
0x00a008: X86JUMPOUT call dword ptr [eax+8h]
0x00a020: X86 test eax, eax
0x00a038: JNZ VM[0x00a128] (fallthrough VM[0x00a050])
0x00a050: MOV SCRATCH, 0
0x00a068: ADD SCRATCH, 0x41ff38
0x00a080: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a098: MOV EAX, SCRATCH
0x00a0b0: X86 push esi
0x00a0e0: X86JUMPOUT call dword ptr [eax+90h]
0x00a0f8: X86 xor eax, eax
0x00a110: CRASH
0x00a128: MOV SCRATCH, EBP
0x00a158: ADD SCRATCH, 0x000008
0x00a170: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a188: MOV EAX, SCRATCH
0x00a1a0: X86 push edi
0x00a1d0: MOV SCRATCH, EAX
0x00a200: MOV DWORD PTR [SCRATCH], EBX
0x00a218: X86 xor edi, edi
0x00a230: X86 cmp dword ptr [esi], ebx
0x00a248: JBE VM[0x00a620] (fallthrough VM[0x00a260])
0x00a260: MOV SCRATCH, ESI
0x00a290: ADD SCRATCH, 0x000004
0x00a2a8: MOV EAX, SCRATCH
0x00a2c0: MOV SCRATCH, EBP
0x00a2f0: ADD SCRATCH, 0xfffffff0
0x00a308: MOV DWORD PTR [SCRATCH], EAX
0x00a320: MOV SCRATCH, EBP
0x00a350: ADD SCRATCH, 0xfffffff0
0x00a368: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a380: MOV EAX, SCRATCH
0x00a398: MOV SCRATCH, EAX
0x00a3c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a3e0: PUSH SCRATCH
0x00a3f8: MOV SCRATCH, 0
0x00a410: ADD SCRATCH, 0x41ff2c
0x00a428: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a440: MOV EAX, SCRATCH
0x00a458: MOV SCRATCH, EBP
0x00a488: ADD SCRATCH, 0xfffffff4
0x00a4a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a4b8: PUSH SCRATCH
0x00a4d0: X86JUMPOUT call dword ptr [eax+0Ch]
0x00a4e8: X86 test eax, eax
0x00a500: JNZ VM[0x00a590] (fallthrough VM[0x00a518])
0x00a518: X86 add dword ptr [ebp+0FFFFFFF0h], 8h
0x00a530: X86 inc edi
0x00a548: X86 cmp edi, dword ptr [esi]
0x00a560: JC VM[0x00a320] (fallthrough VM[0x00a578])
0x00a578: CRASH
0x00a590: MOV SCRATCH, EBP
0x00a5c0: ADD SCRATCH, 0x000008
0x00a5d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a5f0: MOV EAX, SCRATCH
0x00a608: X86 mov dword ptr [eax], 1h
0x00a620: MOV SCRATCH, EBP
0x00a650: ADD SCRATCH, 0xfffffff4
0x00a668: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a680: PUSH SCRATCH
0x00a698: MOV SCRATCH, 0
0x00a6b0: ADD SCRATCH, 0x41ff2c
0x00a6c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a6e0: MOV EAX, SCRATCH
0x00a6f8: X86JUMPOUT call dword ptr [eax+14h]
0x00a710: MOV SCRATCH, 0
0x00a728: ADD SCRATCH, 0x41ff38
0x00a740: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a758: MOV EAX, SCRATCH
0x00a770: X86 push esi
0x00a7a0: X86JUMPOUT call dword ptr [eax+90h]
0x00a7b8: MOV SCRATCH, 0
0x00a7d0: ADD SCRATCH, 0x41ff38
0x00a7e8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a800: MOV EAX, SCRATCH
0x00a818: X86JUMPOUT call dword ptr [eax+74h]
0x00a830: X86 and eax, 0FFh
0x00a848: X86 cmp eax, 6h
0x00a860: JC VM[0x00ba90] (fallthrough VM[0x00a878])
0x00a878: MOV SCRATCH, EBP
0x00a8a8: ADD SCRATCH, 0x000008
0x00a8c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a8d8: MOV EAX, SCRATCH
0x00a8f0: X86 cmp dword ptr [eax], ebx
0x00a908: JZ VM[0x00ba90] (fallthrough VM[0x00a920])
0x00a920: MOV SCRATCH, EBP
0x00a950: ADD SCRATCH, 0xfffffffc
0x00a968: MOV EAX, SCRATCH
0x00a980: X86 push eax
0x00a9b0: MOV SCRATCH, 0
0x00a9c8: ADD SCRATCH, 0x41ff2c
0x00a9e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00a9f8: MOV EAX, SCRATCH
0x00aa10: MOV SCRATCH, 0x000008
0x00aa28: PUSH SCRATCH
0x00aa40: MOV SCRATCH, 0xffffffff
0x00aa58: PUSH SCRATCH
0x00aa70: X86JUMPOUT call dword ptr [eax]
0x00aa88: X86 test eax, eax
0x00aaa0: JZ VM[0x00ba90] (fallthrough VM[0x00aab8])
0x00aab8: MOV SCRATCH, EBP
0x00aae8: ADD SCRATCH, 0xfffffff8
0x00ab00: MOV EAX, SCRATCH
0x00ab18: X86 push eax
0x00ab48: MOV SCRATCH, 0
0x00ab60: ADD SCRATCH, 0x41ff2c
0x00ab78: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ab90: MOV EAX, SCRATCH
0x00aba8: X86 push ebx
0x00abd8: X86 push ebx
0x00ac08: MOV SCRATCH, 0x000019
0x00ac20: PUSH SCRATCH
0x00ac38: MOV SCRATCH, EBP
0x00ac68: ADD SCRATCH, 0xfffffffc
0x00ac80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ac98: PUSH SCRATCH
0x00acb0: X86JUMPOUT call dword ptr [eax+4h]
0x00acc8: X86 test eax, eax
0x00ace0: JNZ VM[0x00aea8] (fallthrough VM[0x00acf8])
0x00acf8: MOV SCRATCH, 0
0x00ad10: ADD SCRATCH, 0x41ff38
0x00ad28: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ad40: MOV EAX, SCRATCH
0x00ad58: X86JUMPOUT call dword ptr [eax+84h]
0x00ad70: X86 cmp eax, 7Ah
0x00ad88: JZ VM[0x00aea8] (fallthrough VM[0x00ada0])
0x00ada0: MOV SCRATCH, EBP
0x00add0: ADD SCRATCH, 0xfffffffc
0x00ade8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ae00: PUSH SCRATCH
0x00ae18: MOV SCRATCH, 0
0x00ae30: ADD SCRATCH, 0x41ff34
0x00ae48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ae60: MOV EAX, SCRATCH
0x00ae78: X86JUMPOUT call dword ptr [eax+3Ch]
0x00ae90: CRASH
0x00aea8: MOV SCRATCH, EBP
0x00aed8: ADD SCRATCH, 0xfffffff8
0x00aef0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00af08: PUSH SCRATCH
0x00af20: MOV SCRATCH, 0
0x00af38: ADD SCRATCH, 0x41ff38
0x00af50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00af68: MOV EAX, SCRATCH
0x00af80: MOV SCRATCH, 0x000040
0x00af98: PUSH SCRATCH
0x00afb0: X86JUMPOUT call dword ptr [eax+8Ch]
0x00afc8: MOV SCRATCH, EAX
0x00afe0: MOV ESI, SCRATCH
0x00aff8: X86 cmp esi, ebx
0x00b010: JZ VM[0x00ada0] (fallthrough VM[0x00b028])
0x00b028: MOV SCRATCH, EBP
0x00b058: ADD SCRATCH, 0xfffffff8
0x00b070: MOV EAX, SCRATCH
0x00b088: X86 push eax
0x00b0b8: MOV SCRATCH, EBP
0x00b0e8: ADD SCRATCH, 0xfffffff8
0x00b100: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b118: PUSH SCRATCH
0x00b130: MOV SCRATCH, 0
0x00b148: ADD SCRATCH, 0x41ff2c
0x00b160: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b178: MOV EAX, SCRATCH
0x00b190: X86 push esi
0x00b1c0: MOV SCRATCH, 0x000019
0x00b1d8: PUSH SCRATCH
0x00b1f0: MOV SCRATCH, EBP
0x00b220: ADD SCRATCH, 0xfffffffc
0x00b238: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b250: PUSH SCRATCH
0x00b268: X86JUMPOUT call dword ptr [eax+4h]
0x00b280: X86 test eax, eax
0x00b298: JNZ VM[0x00b460] (fallthrough VM[0x00b2b0])
0x00b2b0: MOV SCRATCH, EBP
0x00b2e0: ADD SCRATCH, 0xfffffffc
0x00b2f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b310: PUSH SCRATCH
0x00b328: MOV SCRATCH, 0
0x00b340: ADD SCRATCH, 0x41ff34
0x00b358: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b370: MOV EAX, SCRATCH
0x00b388: X86JUMPOUT call dword ptr [eax+3Ch]
0x00b3a0: MOV SCRATCH, 0
0x00b3b8: ADD SCRATCH, 0x41ff38
0x00b3d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b3e8: MOV EAX, SCRATCH
0x00b400: X86 push esi
0x00b430: X86JUMPOUT call dword ptr [eax+90h]
0x00b448: CRASH
0x00b460: MOV SCRATCH, 0
0x00b478: ADD SCRATCH, 0x41ff2c
0x00b490: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b4a8: MOV EAX, SCRATCH
0x00b4c0: MOV SCRATCH, ESI
0x00b4f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b508: PUSH SCRATCH
0x00b520: MOV SCRATCH, EAX
0x00b550: ADD SCRATCH, 0x000010
0x00b568: MOV EDI, SCRATCH
0x00b580: X86JUMPOUT call dword ptr [eax+18h]
0x00b598: X86 mov al, byte ptr [eax]
0x00b5b0: X86 dec al
0x00b5c8: X86 movzx eax, al
0x00b5e0: X86 push eax
0x00b610: MOV SCRATCH, ESI
0x00b640: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b658: PUSH SCRATCH
0x00b670: X86JUMPOUT call dword ptr [edi]
0x00b688: MOV SCRATCH, EAX
0x00b6b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b6d0: MOV EDI, SCRATCH
0x00b6e8: MOV SCRATCH, EBP
0x00b718: ADD SCRATCH, 0xfffffffc
0x00b730: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b748: PUSH SCRATCH
0x00b760: MOV SCRATCH, 0
0x00b778: ADD SCRATCH, 0x41ff34
0x00b790: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b7a8: MOV EAX, SCRATCH
0x00b7c0: X86JUMPOUT call dword ptr [eax+3Ch]
0x00b7d8: MOV SCRATCH, 0
0x00b7f0: ADD SCRATCH, 0x41ff38
0x00b808: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b820: MOV EAX, SCRATCH
0x00b838: X86 push esi
0x00b868: X86JUMPOUT call dword ptr [eax+90h]
0x00b880: X86 cmp edi, 2000h
0x00b898: JNC VM[0x00b988] (fallthrough VM[0x00b8b0])
0x00b8b0: MOV SCRATCH, EBP
0x00b8e0: ADD SCRATCH, 0x000008
0x00b8f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b910: MOV EAX, SCRATCH
0x00b928: MOV SCRATCH, EAX
0x00b958: MOV DWORD PTR [SCRATCH], EBX
0x00b970: CRASH
0x00b988: MOV SCRATCH, EBP
0x00b9b8: ADD SCRATCH, 0x000008
0x00b9d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00b9e8: MOV ECX, SCRATCH
0x00ba00: X86 cmp edi, 3000h
0x00ba18: X86 sbb eax, eax
0x00ba30: X86 inc eax
0x00ba48: MOV SCRATCH, ECX
0x00ba78: MOV DWORD PTR [SCRATCH], EAX
0x00ba90: X86 xor eax, eax
0x00baa8: X86 inc eax
0x00bac0: X86 pop edi
0x00bad8: X86 pop esi
0x00baf0: X86 pop ebx
0x00bb08: X86 leave
0x00bb20: X86 ret 4h
0x00bb38: MOV SCRATCH, EBP
0x00bb68: ADD SCRATCH, 0x00000c
0x00bb80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00bb98: MOV EBX, SCRATCH
0x00bbb0: X86 push ebx
0x00bbe0: MOV SCRATCH, 0x000002
0x00bbf8: PUSH SCRATCH
0x00bc10: MOV SCRATCH, EBP
0x00bc40: ADD SCRATCH, 0x000008
0x00bc58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00bc70: PUSH SCRATCH
0x00bc88: X86CALLOUT 0x40867a
0x00bca0: MOV SCRATCH, EAX
0x00bcb8: MOV EDI, SCRATCH
0x00bcd0: MOV SCRATCH, EBX
0x00bd00: ADD SCRATCH, 0x000001
0x00bd18: MOV EAX, SCRATCH
0x00bd30: X86 push eax
0x00bd60: MOV SCRATCH, 0x000002
0x00bd78: PUSH SCRATCH
0x00bd90: MOV SCRATCH, EBP
0x00bdc0: ADD SCRATCH, 0x000008
0x00bdd8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00bdf0: PUSH SCRATCH
0x00be08: X86 mov esi, 428h
0x00be20: X86 sub edi, esi
0x00be38: MOV SCRATCH, EBP
0x00be68: ADD SCRATCH, 0xfffffff4
0x00be80: MOV DWORD PTR [SCRATCH], EAX
0x00be98: X86CALLOUT 0x40867a
0x00beb0: X86 sub eax, esi
0x00bec8: MOV SCRATCH, EBP
0x00bef8: ADD SCRATCH, 0xfffffff8
0x00bf10: MOV DWORD PTR [SCRATCH], EAX
0x00bf28: MOV SCRATCH, EBX
0x00bf58: ADD SCRATCH, 0x000002
0x00bf70: MOV EAX, SCRATCH
0x00bf88: X86 push eax
0x00bfb8: MOV SCRATCH, 0x000002
0x00bfd0: PUSH SCRATCH
0x00bfe8: MOV SCRATCH, EBP
0x00c018: ADD SCRATCH, 0x000008
0x00c030: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c048: PUSH SCRATCH
0x00c060: MOV SCRATCH, EBP
0x00c090: ADD SCRATCH, 0xfffffff0
0x00c0a8: MOV DWORD PTR [SCRATCH], EAX
0x00c0c0: X86CALLOUT 0x40867a
0x00c0d8: MOV SCRATCH, EAX
0x00c0f0: MOV EBX, SCRATCH
0x00c108: MOV SCRATCH, EBP
0x00c138: ADD SCRATCH, 0x00000c
0x00c150: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c168: MOV EAX, SCRATCH
0x00c180: X86 add eax, 3h
0x00c198: X86 push eax
0x00c1c8: MOV SCRATCH, 0x000002
0x00c1e0: PUSH SCRATCH
0x00c1f8: MOV SCRATCH, EBP
0x00c228: ADD SCRATCH, 0x000008
0x00c240: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c258: PUSH SCRATCH
0x00c270: X86 sub ebx, esi
0x00c288: MOV SCRATCH, EBP
0x00c2b8: ADD SCRATCH, 0xffffffe8
0x00c2d0: MOV DWORD PTR [SCRATCH], EAX
0x00c2e8: X86CALLOUT 0x40867a
0x00c300: X86 sub eax, esi
0x00c318: MOV SCRATCH, EBP
0x00c348: ADD SCRATCH, 0xffffffec
0x00c360: MOV DWORD PTR [SCRATCH], EAX
0x00c378: X86 add eax, ebx
0x00c390: X86 add eax, dword ptr [ebp+0FFFFFFF8h]
0x00c3a8: X86 add eax, edi
0x00c3c0: X86 push eax
0x00c3f0: MOV SCRATCH, EBP
0x00c420: ADD SCRATCH, 0xffffffe4
0x00c438: MOV DWORD PTR [SCRATCH], EAX
0x00c450: MOV SCRATCH, 0
0x00c468: ADD SCRATCH, 0x41ff38
0x00c480: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c498: MOV EAX, SCRATCH
0x00c4b0: MOV SCRATCH, 0x000040
0x00c4c8: PUSH SCRATCH
0x00c4e0: X86JUMPOUT call dword ptr [eax+8Ch]
0x00c4f8: X86 push edi
0x00c528: MOV SCRATCH, EBP
0x00c558: ADD SCRATCH, 0x00000c
0x00c570: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c588: PUSH SCRATCH
0x00c5a0: MOV SCRATCH, EBP
0x00c5d0: ADD SCRATCH, 0xfffffffc
0x00c5e8: MOV DWORD PTR [SCRATCH], EAX
0x00c600: MOV SCRATCH, 0x000002
0x00c618: PUSH SCRATCH
0x00c630: MOV SCRATCH, EBP
0x00c660: ADD SCRATCH, 0x000008
0x00c678: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c690: PUSH SCRATCH
0x00c6a8: X86CALLOUT 0x4085e7
0x00c6c0: X86 add eax, esi
0x00c6d8: X86 push eax
0x00c708: MOV SCRATCH, EBP
0x00c738: ADD SCRATCH, 0xfffffffc
0x00c750: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c768: PUSH SCRATCH
0x00c780: X86CALLOUT 0x40ae74
0x00c798: X86 add esp, 0Ch
0x00c7b0: MOV SCRATCH, EBP
0x00c7e0: ADD SCRATCH, 0xfffffff8
0x00c7f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c810: PUSH SCRATCH
0x00c828: MOV SCRATCH, EBP
0x00c858: ADD SCRATCH, 0xfffffff4
0x00c870: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c888: PUSH SCRATCH
0x00c8a0: MOV SCRATCH, 0x000002
0x00c8b8: PUSH SCRATCH
0x00c8d0: MOV SCRATCH, EBP
0x00c900: ADD SCRATCH, 0x000008
0x00c918: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00c930: PUSH SCRATCH
0x00c948: X86CALLOUT 0x4085e7
0x00c960: X86 add eax, esi
0x00c978: X86 push eax
0x00c9a8: MOV SCRATCH, EBP
0x00c9d8: ADD SCRATCH, 0xfffffffc
0x00c9f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ca08: MOV EAX, SCRATCH
0x00ca20: X86 add eax, edi
0x00ca38: X86 push eax
0x00ca68: X86CALLOUT 0x40ae74
0x00ca80: X86 add esp, 0Ch
0x00ca98: X86 push ebx
0x00cac8: MOV SCRATCH, EBP
0x00caf8: ADD SCRATCH, 0xfffffff0
0x00cb10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cb28: PUSH SCRATCH
0x00cb40: MOV SCRATCH, 0x000002
0x00cb58: PUSH SCRATCH
0x00cb70: MOV SCRATCH, EBP
0x00cba0: ADD SCRATCH, 0x000008
0x00cbb8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cbd0: PUSH SCRATCH
0x00cbe8: X86CALLOUT 0x4085e7
0x00cc00: MOV SCRATCH, EBP
0x00cc30: ADD SCRATCH, 0xfffffff8
0x00cc48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cc60: MOV ECX, SCRATCH
0x00cc78: X86 add eax, esi
0x00cc90: X86 push eax
0x00ccc0: MOV SCRATCH, EBP
0x00ccf0: ADD SCRATCH, 0xfffffffc
0x00cd08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cd20: MOV EAX, SCRATCH
0x00cd38: X86 add eax, ecx
0x00cd50: X86 add eax, edi
0x00cd68: X86 push eax
0x00cd98: X86CALLOUT 0x40ae74
0x00cdb0: X86 add esp, 0Ch
0x00cdc8: MOV SCRATCH, EBP
0x00cdf8: ADD SCRATCH, 0xffffffec
0x00ce10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ce28: PUSH SCRATCH
0x00ce40: MOV SCRATCH, EBP
0x00ce70: ADD SCRATCH, 0xffffffe8
0x00ce88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cea0: PUSH SCRATCH
0x00ceb8: MOV SCRATCH, 0x000002
0x00ced0: PUSH SCRATCH
0x00cee8: MOV SCRATCH, EBP
0x00cf18: ADD SCRATCH, 0x000008
0x00cf30: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cf48: PUSH SCRATCH
0x00cf60: X86CALLOUT 0x4085e7
0x00cf78: X86 add eax, esi
0x00cf90: MOV SCRATCH, EBP
0x00cfc0: ADD SCRATCH, 0xfffffffc
0x00cfd8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00cff0: MOV ESI, SCRATCH
0x00d008: X86 push eax
0x00d038: MOV SCRATCH, EBX
0x00d068: ADD SCRATCH, ESI
0x00d080: MOV EAX, SCRATCH
0x00d098: X86 add eax, dword ptr [ebp+0FFFFFFF8h]
0x00d0b0: X86 add eax, edi
0x00d0c8: X86 push eax
0x00d0f8: X86CALLOUT 0x40ae74
0x00d110: MOV SCRATCH, EBP
0x00d140: ADD SCRATCH, 0x000010
0x00d158: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00d170: MOV EAX, SCRATCH
0x00d188: MOV SCRATCH, EBP
0x00d1b8: ADD SCRATCH, 0xffffffe4
0x00d1d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00d1e8: MOV ECX, SCRATCH
0x00d200: X86 add esp, 0Ch
0x00d218: X86 pop edi
0x00d230: MOV SCRATCH, EAX
0x00d260: MOV DWORD PTR [SCRATCH], ECX
0x00d278: MOV SCRATCH, ESI
0x00d290: MOV EAX, SCRATCH
0x00d2a8: X86 pop esi
0x00d2c0: X86 pop ebx
0x00d2d8: X86 leave
0x00d2f0: X86 ret 0Ch
0x00d308: MOV SCRATCH, 0xc9cef3e4
0x00d320: PUSH SCRATCH
0x00d338: X86CALLOUT 0x409edc
0x00d350: X86 test eax, eax
0x00d368: JZ VM[0x00d3c8] (fallthrough VM[0x00d380])
0x00d380: MOV SCRATCH, 0x000000
0x00d398: PUSH SCRATCH
0x00d3b0: X86CALLOUT 0x408bde
0x00d3c8: X86 ret
0x00d3e0: X86 xor eax, eax
0x00d3f8: MOV SCRATCH, EBP
0x00d428: ADD SCRATCH, 0xffffffcc
0x00d440: MOV EDI, SCRATCH
0x00d458: X86 stosd dword ptr es:[edi]
0x00d470: X86 stosd dword ptr es:[edi]
0x00d488: X86 stosd dword ptr es:[edi]
0x00d4a0: MOV SCRATCH, 0
0x00d4b8: ADD SCRATCH, 0x42035c
0x00d4d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00d4e8: PUSH SCRATCH
0x00d500: MOV SCRATCH, 0
0x00d518: ADD SCRATCH, 0x41ff34
0x00d530: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00d548: MOV EAX, SCRATCH
0x00d560: X86JUMPOUT call dword ptr [eax+3Ch]
0x00d578: MOV SCRATCH, EBP
0x00d5a8: ADD SCRATCH, 0xfffffffc
0x00d5c0: MOV DWORD PTR [SCRATCH], ESI
0x00d5d8: X86 mov dword ptr [ebp+0FFFFF484h], 0C0000008h
0x00d5f0: MOV SCRATCH, 0x0002cc
0x00d608: PUSH SCRATCH
0x00d620: X86 push esi
0x00d650: MOV SCRATCH, EBP
0x00d680: ADD SCRATCH, 0xfffff4d4
0x00d698: MOV EAX, SCRATCH
0x00d6b0: X86 push eax
0x00d6e0: X86CALLOUT 0x40ae80
0x00d6f8: X86 add esp, 0Ch
0x00d710: X86 mov dword ptr [ebp+0FFFFF4ECh], 9Bh
0x00d728: X86 mov dword ptr [ebp+0FFFFF4D4h], 10017h
0x00d740: MOV SCRATCH, EBP
0x00d770: ADD SCRATCH, 0xfffff598
0x00d788: MOV DWORD PTR [SCRATCH], ESP
0x00d7a0: X86 xor eax, eax
0x00d7b8: X86 mov ax, cs
0x00d7d0: MOV SCRATCH, EBP
0x00d800: ADD SCRATCH, 0xfffff590
0x00d818: MOV DWORD PTR [SCRATCH], EAX
0x00d830: X86 mov ax, ss
0x00d848: MOV SCRATCH, EBP
0x00d878: ADD SCRATCH, 0xfffff59c
0x00d890: MOV DWORD PTR [SCRATCH], EAX
0x00d8a8: X86 mov ax, fs
0x00d8c0: MOV SCRATCH, EBP
0x00d8f0: ADD SCRATCH, 0xfffff564
0x00d908: MOV DWORD PTR [SCRATCH], EAX
0x00d920: X86 mov ax, ds
0x00d938: MOV SCRATCH, EBP
0x00d968: ADD SCRATCH, 0xfffff56c
0x00d980: MOV DWORD PTR [SCRATCH], EAX
0x00d998: X86 mov dword ptr [ebp+0FFFFFFC0h], 1h
0x00d9b0: X86 or dword ptr [ebp+0FFFFFFFCh], 0FFFFFFFFh
0x00d9c8: CRASH
0x00d9e0: MOV SCRATCH, EBP
0x00da10: ADD SCRATCH, 0xffffffdc
0x00da28: MOV EAX, SCRATCH
0x00da40: X86 push eax
0x00da70: MOV SCRATCH, 0x000004
0x00da88: PUSH SCRATCH
0x00daa0: MOV SCRATCH, EBP
0x00dad0: ADD SCRATCH, 0xffffffe0
0x00dae8: MOV EAX, SCRATCH
0x00db00: X86 push eax
0x00db30: MOV SCRATCH, 0x000007
0x00db48: PUSH SCRATCH
0x00db60: MOV SCRATCH, 0xffffffff
0x00db78: PUSH SCRATCH
0x00db90: MOV SCRATCH, 0
0x00dba8: ADD SCRATCH, 0x41ff34
0x00dbc0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00dbd8: MOV EAX, SCRATCH
0x00dbf0: X86JUMPOUT call dword ptr [eax+4h]
0x00dc08: X86 test eax, eax
0x00dc20: JNZ VM[0x00dcb0] (fallthrough VM[0x00dc38])
0x00dc38: X86 cmp dword ptr [ebp+0FFFFFFE0h], esi
0x00dc50: JZ VM[0x00dcb0] (fallthrough VM[0x00dc68])
0x00dc68: X86 rdtsc
0x00dc80: X86 cpuid
0x00dc98: X86JUMPOUT call eax
0x00dcb0: MOV SCRATCH, EBP
0x00dce0: ADD SCRATCH, 0xffffffdc
0x00dcf8: MOV EAX, SCRATCH
0x00dd10: X86 push eax
0x00dd40: MOV SCRATCH, 0x000004
0x00dd58: PUSH SCRATCH
0x00dd70: MOV SCRATCH, EBP
0x00dda0: ADD SCRATCH, 0xffffffe0
0x00ddb8: MOV EAX, SCRATCH
0x00ddd0: X86 push eax
0x00de00: MOV SCRATCH, 0x00001e
0x00de18: PUSH SCRATCH
0x00de30: MOV SCRATCH, 0xffffffff
0x00de48: PUSH SCRATCH
0x00de60: MOV SCRATCH, 0
0x00de78: ADD SCRATCH, 0x41ff34
0x00de90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00dea8: MOV EAX, SCRATCH
0x00dec0: X86JUMPOUT call dword ptr [eax+4h]
0x00ded8: X86 test eax, eax
0x00def0: JNZ VM[0x00df80] (fallthrough VM[0x00df08])
0x00df08: X86 cmp dword ptr [ebp+0FFFFFFE0h], esi
0x00df20: JZ VM[0x00df80] (fallthrough VM[0x00df38])
0x00df38: X86 rdtsc
0x00df50: X86 cpuid
0x00df68: X86JUMPOUT call eax
0x00df80: X86CALLOUT 0x404f4c
0x00df98: MOV SCRATCH, EBP
0x00dfc8: ADD SCRATCH, 0xffffffcc
0x00dfe0: MOV EAX, SCRATCH
0x00dff8: X86 push eax
0x00e028: X86CALLOUT 0x4076c2
0x00e040: X86 mov edi, 208h
0x00e058: X86 push edi
0x00e088: X86 push esi
0x00e0b8: MOV SCRATCH, EBP
0x00e0e8: ADD SCRATCH, 0xfffff7a0
0x00e100: MOV EAX, SCRATCH
0x00e118: X86 push eax
0x00e148: X86CALLOUT 0x40ae80
0x00e160: X86 push edi
0x00e190: X86 push esi
0x00e1c0: MOV SCRATCH, EBP
0x00e1f0: ADD SCRATCH, 0xfffffbb0
0x00e208: MOV EAX, SCRATCH
0x00e220: X86 push eax
0x00e250: X86CALLOUT 0x40ae80
0x00e268: X86 add esp, 18h
0x00e280: MOV SCRATCH, EBP
0x00e2b0: ADD SCRATCH, 0xfffff7a0
0x00e2c8: MOV EAX, SCRATCH
0x00e2e0: X86 push eax
0x00e310: X86 mov ebx, 104h
0x00e328: X86 push ebx
0x00e358: MOV SCRATCH, 0
0x00e370: ADD SCRATCH, 0x41ff38
0x00e388: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00e3a0: MOV EAX, SCRATCH
0x00e3b8: X86JUMPOUT call dword ptr [eax+50h]
0x00e3d0: X86 push edi
0x00e400: X86 push esi
0x00e430: MOV SCRATCH, EBP
0x00e460: ADD SCRATCH, 0xfffffdb8
0x00e478: MOV EAX, SCRATCH
0x00e490: X86 push eax
0x00e4c0: X86CALLOUT 0x40ae80
0x00e4d8: X86 add esp, 0Ch
0x00e4f0: X86 mov word ptr [ebp+0FFFFFDB8h], 74h
0x00e508: X86 mov word ptr [ebp+0FFFFFDBAh], 6Dh
0x00e520: X86 mov word ptr [ebp+0FFFFFDBCh], 70h
0x00e538: MOV SCRATCH, EBP
0x00e568: ADD SCRATCH, 0xfffffbb0
0x00e580: MOV EAX, SCRATCH
0x00e598: X86 push eax
0x00e5c8: X86 push esi
0x00e5f8: MOV SCRATCH, EBP
0x00e628: ADD SCRATCH, 0xfffffdb8
0x00e640: MOV EAX, SCRATCH
0x00e658: X86 push eax
0x00e688: MOV SCRATCH, EBP
0x00e6b8: ADD SCRATCH, 0xfffff7a0
0x00e6d0: MOV EAX, SCRATCH
0x00e6e8: X86 push eax
0x00e718: MOV SCRATCH, 0
0x00e730: ADD SCRATCH, 0x41ff38
0x00e748: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00e760: MOV EAX, SCRATCH
0x00e778: X86JUMPOUT call dword ptr [eax+4Ch]
0x00e790: X86 push edi
0x00e7c0: X86 push esi
0x00e7f0: MOV SCRATCH, EBP
0x00e820: ADD SCRATCH, 0xfffff9a8
0x00e838: MOV EAX, SCRATCH
0x00e850: X86 push eax
0x00e880: X86CALLOUT 0x40ae80
0x00e898: X86 add esp, 0Ch
0x00e8b0: MOV SCRATCH, 0
0x00e8c8: ADD SCRATCH, 0x41ff38
0x00e8e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00e8f8: MOV EAX, SCRATCH
0x00e910: MOV SCRATCH, EAX
0x00e940: ADD SCRATCH, 0x000048
0x00e958: MOV EDI, SCRATCH
0x00e970: X86 push ebx
0x00e9a0: MOV SCRATCH, EBP
0x00e9d0: ADD SCRATCH, 0xfffff9a8
0x00e9e8: MOV ECX, SCRATCH
0x00ea00: X86 push ecx
0x00ea30: X86 push esi
0x00ea60: X86JUMPOUT call dword ptr [eax+78h]
0x00ea78: X86 push eax
0x00eaa8: X86JUMPOUT call dword ptr [edi]
0x00eac0: X86 mov ax, word ptr [ebp+0FFFFF9A8h]
0x00ead8: X86 cmp ax, word ptr [ebp+0FFFFFBB0h]
0x00eaf0: JNZ VM[0x00ee50] (fallthrough VM[0x00eb08])
0x00eb08: X86 cmp dword ptr [ebp+0FFFFFFD4h], 9h
0x00eb20: JZ VM[0x00ee50] (fallthrough VM[0x00eb38])
0x00eb38: X86 cmp dword ptr [ebp+0FFFFFFD4h], 0Ah
0x00eb50: JZ VM[0x00ee50] (fallthrough VM[0x00eb68])
0x00eb68: MOV SCRATCH, 0x000001
0x00eb80: PUSH SCRATCH
0x00eb98: MOV SCRATCH, EBP
0x00ebc8: ADD SCRATCH, 0xfffffbb0
0x00ebe0: MOV EAX, SCRATCH
0x00ebf8: X86 push eax
0x00ec28: MOV SCRATCH, EBP
0x00ec58: ADD SCRATCH, 0xfffff9a8
0x00ec70: MOV EAX, SCRATCH
0x00ec88: X86 push eax
0x00ecb8: MOV SCRATCH, 0
0x00ecd0: ADD SCRATCH, 0x41ff38
0x00ece8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ed00: MOV EAX, SCRATCH
0x00ed18: X86JUMPOUT call dword ptr [eax+44h]
0x00ed30: X86 test eax, eax
0x00ed48: JNZ VM[0x00ee50] (fallthrough VM[0x00ed60])
0x00ed60: MOV SCRATCH, 0
0x00ed78: ADD SCRATCH, 0x41ff38
0x00ed90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00eda8: MOV EAX, SCRATCH
0x00edc0: X86JUMPOUT call dword ptr [eax+84h]
0x00edd8: X86 cmp eax, 5h
0x00edf0: JNZ VM[0x00ee50] (fallthrough VM[0x00ee08])
0x00ee08: X86 push esi
0x00ee38: X86CALLOUT 0x408bde
0x00ee50: X86 mov eax, dword ptr fs:[30h]
0x00ee68: MOV SCRATCH, EAX
0x00ee98: ADD SCRATCH, 0x000008
0x00eeb0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00eec8: MOV EAX, SCRATCH
0x00eee0: MOV SCRATCH, EAX
0x00ef10: ADD SCRATCH, 0x00003c
0x00ef28: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00ef40: MOV EDI, SCRATCH
0x00ef58: X86 add edi, eax
0x00ef70: X86CALLOUT 0x404b76
0x00ef88: X86 test eax, eax
0x00efa0: JZ VM[0x00fac8] (fallthrough VM[0x00efb8])
0x00efb8: MOV SCRATCH, EBP
0x00efe8: ADD SCRATCH, 0xffffffd8
0x00f000: MOV EAX, SCRATCH
0x00f018: X86 push eax
0x00f048: MOV SCRATCH, 0x000005
0x00f060: PUSH SCRATCH
0x00f078: X86 push esi
0x00f0a8: MOV SCRATCH, 0
0x00f0c0: ADD SCRATCH, 0x41ff38
0x00f0d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f0f0: MOV EAX, SCRATCH
0x00f108: X86JUMPOUT call dword ptr [eax+78h]
0x00f120: X86 push eax
0x00f150: X86CALLOUT 0x404e1f
0x00f168: MOV SCRATCH, EAX
0x00f180: MOV EBX, SCRATCH
0x00f198: MOV SCRATCH, EDI
0x00f1c8: ADD SCRATCH, 0x000008
0x00f1e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f1f8: MOV EAX, SCRATCH
0x00f210: MOV SCRATCH, EBP
0x00f240: ADD SCRATCH, 0xffffffe4
0x00f258: MOV DWORD PTR [SCRATCH], EAX
0x00f270: MOV SCRATCH, 0x000005
0x00f288: PUSH SCRATCH
0x00f2a0: X86 pop ecx
0x00f2b8: X86 add eax, dword ptr [edi+8h]
0x00f2d0: MOV SCRATCH, EBP
0x00f300: ADD SCRATCH, 0xffffffe4
0x00f318: MOV DWORD PTR [SCRATCH], EAX
0x00f330: X86 dec ecx
0x00f348: JNZ VM[0x00f2b8] (fallthrough VM[0x00f360])
0x00f360: MOV SCRATCH, 0x000004
0x00f378: PUSH SCRATCH
0x00f390: MOV SCRATCH, EBP
0x00f3c0: ADD SCRATCH, 0xffffffe4
0x00f3d8: MOV EAX, SCRATCH
0x00f3f0: X86 push eax
0x00f420: MOV SCRATCH, EBP
0x00f450: ADD SCRATCH, 0xffffffd8
0x00f468: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f480: PUSH SCRATCH
0x00f498: X86 push ebx
0x00f4c8: X86CALLOUT 0x409bc8
0x00f4e0: MOV SCRATCH, EBP
0x00f510: ADD SCRATCH, 0xffffffd8
0x00f528: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f540: MOV EAX, SCRATCH
0x00f558: X86 add eax, 0FFFFFE00h
0x00f570: MOV SCRATCH, 0x000040
0x00f588: PUSH SCRATCH
0x00f5a0: MOV SCRATCH, 0x001000
0x00f5b8: PUSH SCRATCH
0x00f5d0: X86 push eax
0x00f600: X86 push esi
0x00f630: X86CALLOUT 0x408810
0x00f648: MOV SCRATCH, EBP
0x00f678: ADD SCRATCH, 0xffffffc8
0x00f690: MOV DWORD PTR [SCRATCH], EAX
0x00f6a8: MOV SCRATCH, EBP
0x00f6d8: ADD SCRATCH, 0xffffffd8
0x00f6f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f708: MOV EAX, SCRATCH
0x00f720: X86 add eax, 0FFFFFE00h
0x00f738: X86 push eax
0x00f768: MOV SCRATCH, EBX
0x00f798: ADD SCRATCH, 0x000200
0x00f7b0: MOV EAX, SCRATCH
0x00f7c8: X86 push eax
0x00f7f8: MOV SCRATCH, EBP
0x00f828: ADD SCRATCH, 0xffffffc8
0x00f840: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f858: PUSH SCRATCH
0x00f870: X86CALLOUT 0x40ae74
0x00f888: MOV SCRATCH, EBP
0x00f8b8: ADD SCRATCH, 0xffffffd8
0x00f8d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00f8e8: PUSH SCRATCH
0x00f900: X86 push esi
0x00f930: X86 push ebx
0x00f960: X86CALLOUT 0x409a67
0x00f978: X86 add esp, 18h
0x00f990: X86 push ebx
0x00f9c0: MOV SCRATCH, 0
0x00f9d8: ADD SCRATCH, 0x41ff38
0x00f9f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00fa08: MOV EAX, SCRATCH
0x00fa20: X86JUMPOUT call dword ptr [eax+90h]
0x00fa38: MOV SCRATCH, EBP
0x00fa68: ADD SCRATCH, 0xffffffc8
0x00fa80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00fa98: PUSH SCRATCH
0x00fab0: X86CALLOUT 0x401935
0x00fac8: MOV SCRATCH, EBP
0x00faf8: ADD SCRATCH, 0xffffffc4
0x00fb10: MOV EAX, SCRATCH
0x00fb28: X86 push eax
0x00fb58: X86CALLOUT 0x404bc2
0x00fb70: X86 test eax, eax
0x00fb88: JNZ VM[0x00fbe8] (fallthrough VM[0x00fba0])
0x00fba0: X86 push esi
0x00fbd0: X86CALLOUT 0x408bde
0x00fbe8: MOV SCRATCH, EBP
0x00fc18: ADD SCRATCH, 0xffffffd8
0x00fc30: MOV EAX, SCRATCH
0x00fc48: X86 push eax
0x00fc78: MOV SCRATCH, 0x000001
0x00fc90: PUSH SCRATCH
0x00fca8: X86 push esi
0x00fcd8: MOV SCRATCH, 0
0x00fcf0: ADD SCRATCH, 0x41ff38
0x00fd08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00fd20: MOV EAX, SCRATCH
0x00fd38: X86JUMPOUT call dword ptr [eax+78h]
0x00fd50: X86 push eax
0x00fd80: X86CALLOUT 0x404e1f
0x00fd98: MOV SCRATCH, EAX
0x00fdb0: MOV EBX, SCRATCH
0x00fdc8: MOV SCRATCH, EDI
0x00fdf8: ADD SCRATCH, 0x000008
0x00fe10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x00fe28: MOV EAX, SCRATCH
0x00fe40: MOV SCRATCH, EBP
0x00fe70: ADD SCRATCH, 0xffffffe4
0x00fe88: MOV DWORD PTR [SCRATCH], EAX
0x00fea0: X86 add eax, dword ptr [edi+8h]
0x00feb8: MOV SCRATCH, EBP
0x00fee8: ADD SCRATCH, 0xffffffe4
0x00ff00: MOV DWORD PTR [SCRATCH], EAX
0x00ff18: MOV SCRATCH, 0x000004
0x00ff30: PUSH SCRATCH
0x00ff48: MOV SCRATCH, EBP
0x00ff78: ADD SCRATCH, 0xffffffe4
0x00ff90: MOV EAX, SCRATCH
0x00ffa8: X86 push eax
0x00ffd8: MOV SCRATCH, EBP
0x010008: ADD SCRATCH, 0xffffffd8
0x010020: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010038: MOV EDI, SCRATCH
0x010050: X86 push edi
0x010080: X86 push ebx
0x0100b0: X86CALLOUT 0x409bc8
0x0100c8: MOV SCRATCH, EDI
0x0100f8: ADD SCRATCH, 0xfffffe00
0x010110: MOV EAX, SCRATCH
0x010128: X86 push eax
0x010158: MOV SCRATCH, EBX
0x010188: ADD SCRATCH, 0x000200
0x0101a0: MOV EAX, SCRATCH
0x0101b8: X86 push eax
0x0101e8: X86 cmp dword ptr [ebp+0FFFFFFC4h], esi
0x010200: JZ VM[0x010248] (fallthrough VM[0x010218])
0x010218: X86JUMPOUT call dword ptr [ebp+0FFFFFFCCh]
0x010230: CRASH
0x010248: X86JUMPOUT call dword ptr [ebp+0FFFFFFD0h]
0x010260: X86 push edi
0x010290: X86 push esi
0x0102c0: X86 push ebx
0x0102f0: X86CALLOUT 0x409a67
0x010308: X86 add esp, 0Ch
0x010320: X86 push esi
0x010350: X86CALLOUT 0x408bde
0x010368: X86 xor eax, eax
0x010380: X86CALLOUT 0x40aec7
0x010398: X86 ret 8h
0x0103b0: MOV SCRATCH, EBP
0x0103e0: ADD SCRATCH, 0xfffffff0
0x0103f8: MOV EAX, SCRATCH
0x010410: X86 push eax
0x010440: MOV SCRATCH, 0
0x010458: ADD SCRATCH, 0x41ff2c
0x010470: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010488: MOV EAX, SCRATCH
0x0104a0: MOV SCRATCH, 0x000008
0x0104b8: PUSH SCRATCH
0x0104d0: MOV SCRATCH, 0xffffffff
0x0104e8: PUSH SCRATCH
0x010500: X86JUMPOUT call dword ptr [eax]
0x010518: MOV SCRATCH, EBP
0x010548: ADD SCRATCH, 0xfffffffc
0x010560: MOV EAX, SCRATCH
0x010578: X86 push eax
0x0105a8: MOV SCRATCH, 0
0x0105c0: ADD SCRATCH, 0x41ff2c
0x0105d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0105f0: MOV EAX, SCRATCH
0x010608: X86 xor ebx, ebx
0x010620: X86 push ebx
0x010650: X86 push ebx
0x010680: MOV SCRATCH, 0x000001
0x010698: PUSH SCRATCH
0x0106b0: MOV SCRATCH, EBP
0x0106e0: ADD SCRATCH, 0xfffffff0
0x0106f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010710: PUSH SCRATCH
0x010728: X86JUMPOUT call dword ptr [eax+4h]
0x010740: MOV SCRATCH, EBP
0x010770: ADD SCRATCH, 0xfffffffc
0x010788: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0107a0: PUSH SCRATCH
0x0107b8: MOV SCRATCH, 0
0x0107d0: ADD SCRATCH, 0x41ff38
0x0107e8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010800: MOV EAX, SCRATCH
0x010818: MOV SCRATCH, 0x000040
0x010830: PUSH SCRATCH
0x010848: X86JUMPOUT call dword ptr [eax+8Ch]
0x010860: MOV SCRATCH, EBP
0x010890: ADD SCRATCH, 0xfffffffc
0x0108a8: MOV ECX, SCRATCH
0x0108c0: X86 push ecx
0x0108f0: MOV SCRATCH, EBP
0x010920: ADD SCRATCH, 0xfffffffc
0x010938: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010950: PUSH SCRATCH
0x010968: MOV SCRATCH, EBP
0x010998: ADD SCRATCH, 0xffffffec
0x0109b0: MOV DWORD PTR [SCRATCH], EAX
0x0109c8: X86 push eax
0x0109f8: MOV SCRATCH, 0
0x010a10: ADD SCRATCH, 0x41ff2c
0x010a28: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010a40: MOV EAX, SCRATCH
0x010a58: MOV SCRATCH, 0x000001
0x010a70: PUSH SCRATCH
0x010a88: MOV SCRATCH, EBP
0x010ab8: ADD SCRATCH, 0xfffffff0
0x010ad0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010ae8: PUSH SCRATCH
0x010b00: X86JUMPOUT call dword ptr [eax+4h]
0x010b18: MOV SCRATCH, EBP
0x010b48: ADD SCRATCH, 0xfffffff0
0x010b60: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010b78: PUSH SCRATCH
0x010b90: MOV SCRATCH, 0
0x010ba8: ADD SCRATCH, 0x41ff34
0x010bc0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010bd8: MOV EAX, SCRATCH
0x010bf0: X86JUMPOUT call dword ptr [eax+3Ch]
0x010c08: MOV SCRATCH, 0x000004
0x010c20: PUSH SCRATCH
0x010c38: X86 mov edi, 1000h
0x010c50: X86 push edi
0x010c80: X86 mov esi, 10000h
0x010c98: X86 push esi
0x010cc8: X86 push ebx
0x010cf8: MOV SCRATCH, EBP
0x010d28: ADD SCRATCH, 0xfffffff8
0x010d40: MOV DWORD PTR [SCRATCH], ESI
0x010d58: X86CALLOUT 0x408810
0x010d70: MOV SCRATCH, EAX
0x010d88: MOV EBX, SCRATCH
0x010da0: MOV SCRATCH, EBP
0x010dd0: ADD SCRATCH, 0xfffffffc
0x010de8: MOV EAX, SCRATCH
0x010e00: X86 push eax
0x010e30: X86 push esi
0x010e60: CRASH
0x010e78: X86 push ebx
0x010ea8: X86CALLOUT 0x408e07
0x010ec0: X86 add dword ptr [ebp+0FFFFFFF8h], esi
0x010ed8: MOV SCRATCH, 0x000004
0x010ef0: PUSH SCRATCH
0x010f08: X86 push edi
0x010f38: MOV SCRATCH, EBP
0x010f68: ADD SCRATCH, 0xfffffff8
0x010f80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x010f98: PUSH SCRATCH
0x010fb0: MOV SCRATCH, 0x000000
0x010fc8: PUSH SCRATCH
0x010fe0: X86CALLOUT 0x408810
0x010ff8: MOV SCRATCH, EAX
0x011010: MOV EBX, SCRATCH
0x011028: MOV SCRATCH, 0
0x011040: ADD SCRATCH, 0x41ff38
0x011058: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011070: MOV EAX, SCRATCH
0x011088: MOV SCRATCH, 0x000032
0x0110a0: PUSH SCRATCH
0x0110b8: X86JUMPOUT call dword ptr [eax+38h]
0x0110d0: MOV SCRATCH, EBP
0x011100: ADD SCRATCH, 0xfffffffc
0x011118: MOV EAX, SCRATCH
0x011130: X86 push eax
0x011160: MOV SCRATCH, EBP
0x011190: ADD SCRATCH, 0xfffffff8
0x0111a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0111c0: PUSH SCRATCH
0x0111d8: MOV SCRATCH, 0
0x0111f0: ADD SCRATCH, 0x41ff34
0x011208: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011220: MOV EAX, SCRATCH
0x011238: X86 push ebx
0x011268: MOV SCRATCH, 0x000005
0x011280: PUSH SCRATCH
0x011298: X86JUMPOUT call dword ptr [eax]
0x0112b0: X86 test eax, eax
0x0112c8: JNZ VM[0x010e78] (fallthrough VM[0x0112e0])
0x0112e0: X86 and dword ptr [ebp+0FFFFFFF8h], eax
0x0112f8: MOV SCRATCH, 0x000208
0x011310: PUSH SCRATCH
0x011328: X86 push eax
0x011358: MOV SCRATCH, EBP
0x011388: ADD SCRATCH, 0xfffffddc
0x0113a0: MOV EAX, SCRATCH
0x0113b8: X86 push eax
0x0113e8: X86CALLOUT 0x40ae80
0x011400: X86 add esp, 0Ch
0x011418: MOV SCRATCH, EBP
0x011448: ADD SCRATCH, 0xfffffddc
0x011460: MOV EAX, SCRATCH
0x011478: X86 push eax
0x0114a8: X86CALLOUT 0x401370
0x0114c0: MOV SCRATCH, EBP
0x0114f0: ADD SCRATCH, 0xffffffe8
0x011508: MOV DWORD PTR [SCRATCH], EBX
0x011520: X86 cmp word ptr [ebx+38h], 0h
0x011538: JZ VM[0x012738] (fallthrough VM[0x011550])
0x011550: MOV SCRATCH, EBX
0x011580: ADD SCRATCH, 0x00003c
0x011598: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0115b0: MOV EDX, SCRATCH
0x0115c8: X86 test edx, edx
0x0115e0: JZ VM[0x012738] (fallthrough VM[0x0115f8])
0x0115f8: MOV SCRATCH, EBP
0x011628: ADD SCRATCH, 0xfffffddc
0x011640: MOV EAX, SCRATCH
0x011658: MOV SCRATCH, EAX
0x011688: ADD SCRATCH, 0x000002
0x0116a0: MOV ESI, SCRATCH
0x0116b8: X86 mov cx, word ptr [eax]
0x0116d0: X86 inc eax
0x0116e8: X86 inc eax
0x011700: X86 test cx, cx
0x011718: JNZ VM[0x0116b8] (fallthrough VM[0x011730])
0x011730: X86 sub eax, esi
0x011748: X86 sar eax, 1h
0x011760: X86 push eax
0x011790: MOV SCRATCH, EBP
0x0117c0: ADD SCRATCH, 0xfffffddc
0x0117d8: MOV EAX, SCRATCH
0x0117f0: X86 push eax
0x011820: X86 push edx
0x011850: X86JUMPOUT call dword ptr [4010FCh]
0x011868: X86 add esp, 0Ch
0x011880: X86 test eax, eax
0x011898: JNZ VM[0x012738] (fallthrough VM[0x0118b0])
0x0118b0: MOV SCRATCH, EBX
0x0118e0: ADD SCRATCH, 0x000044
0x0118f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011910: PUSH SCRATCH
0x011928: X86 push eax
0x011958: MOV SCRATCH, 0
0x011970: ADD SCRATCH, 0x41ff38
0x011988: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0119a0: MOV EAX, SCRATCH
0x0119b8: MOV SCRATCH, 0x000400
0x0119d0: PUSH SCRATCH
0x0119e8: X86JUMPOUT call dword ptr [eax]
0x011a00: MOV SCRATCH, EAX
0x011a18: MOV EDI, SCRATCH
0x011a30: X86 test edi, edi
0x011a48: JZ VM[0x012738] (fallthrough VM[0x011a60])
0x011a60: MOV SCRATCH, EBP
0x011a90: ADD SCRATCH, 0xfffffff4
0x011aa8: MOV EAX, SCRATCH
0x011ac0: X86 push eax
0x011af0: MOV SCRATCH, 0
0x011b08: ADD SCRATCH, 0x41ff2c
0x011b20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011b38: MOV EAX, SCRATCH
0x011b50: MOV SCRATCH, 0x000008
0x011b68: PUSH SCRATCH
0x011b80: X86 push edi
0x011bb0: X86JUMPOUT call dword ptr [eax]
0x011bc8: X86 test eax, eax
0x011be0: JNZ VM[0x011cb8] (fallthrough VM[0x011bf8])
0x011bf8: MOV SCRATCH, 0
0x011c10: ADD SCRATCH, 0x41ff34
0x011c28: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011c40: MOV EAX, SCRATCH
0x011c58: X86 push edi
0x011c88: X86JUMPOUT call dword ptr [eax+3Ch]
0x011ca0: CRASH
0x011cb8: MOV SCRATCH, EBP
0x011ce8: ADD SCRATCH, 0xfffffffc
0x011d00: MOV EAX, SCRATCH
0x011d18: X86 push eax
0x011d48: MOV SCRATCH, 0
0x011d60: ADD SCRATCH, 0x41ff2c
0x011d78: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011d90: MOV EAX, SCRATCH
0x011da8: MOV SCRATCH, 0x000000
0x011dc0: PUSH SCRATCH
0x011dd8: MOV SCRATCH, 0x000000
0x011df0: PUSH SCRATCH
0x011e08: MOV SCRATCH, 0x000001
0x011e20: PUSH SCRATCH
0x011e38: MOV SCRATCH, EBP
0x011e68: ADD SCRATCH, 0xfffffff4
0x011e80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011e98: PUSH SCRATCH
0x011eb0: X86JUMPOUT call dword ptr [eax+4h]
0x011ec8: MOV SCRATCH, EBP
0x011ef8: ADD SCRATCH, 0xfffffffc
0x011f10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011f28: PUSH SCRATCH
0x011f40: MOV SCRATCH, 0
0x011f58: ADD SCRATCH, 0x41ff38
0x011f70: MOV SCRATCH, DWORD PTR [SCRATCH]
0x011f88: MOV EAX, SCRATCH
0x011fa0: MOV SCRATCH, 0x000040
0x011fb8: PUSH SCRATCH
0x011fd0: X86JUMPOUT call dword ptr [eax+8Ch]
0x011fe8: MOV SCRATCH, EAX
0x012000: MOV ESI, SCRATCH
0x012018: MOV SCRATCH, EBP
0x012048: ADD SCRATCH, 0xfffffffc
0x012060: MOV EAX, SCRATCH
0x012078: X86 push eax
0x0120a8: MOV SCRATCH, EBP
0x0120d8: ADD SCRATCH, 0xfffffffc
0x0120f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012108: PUSH SCRATCH
0x012120: MOV SCRATCH, 0
0x012138: ADD SCRATCH, 0x41ff2c
0x012150: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012168: MOV EAX, SCRATCH
0x012180: X86 push esi
0x0121b0: MOV SCRATCH, 0x000001
0x0121c8: PUSH SCRATCH
0x0121e0: MOV SCRATCH, EBP
0x012210: ADD SCRATCH, 0xfffffff4
0x012228: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012240: PUSH SCRATCH
0x012258: X86JUMPOUT call dword ptr [eax+4h]
0x012270: MOV SCRATCH, EBP
0x0122a0: ADD SCRATCH, 0xfffffff4
0x0122b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0122d0: PUSH SCRATCH
0x0122e8: MOV SCRATCH, EBP
0x012318: ADD SCRATCH, 0xffffffe4
0x012330: MOV DWORD PTR [SCRATCH], EAX
0x012348: MOV SCRATCH, 0
0x012360: ADD SCRATCH, 0x41ff34
0x012378: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012390: MOV EAX, SCRATCH
0x0123a8: X86JUMPOUT call dword ptr [eax+3Ch]
0x0123c0: MOV SCRATCH, 0
0x0123d8: ADD SCRATCH, 0x41ff34
0x0123f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012408: MOV EAX, SCRATCH
0x012420: X86 push edi
0x012450: X86JUMPOUT call dword ptr [eax+3Ch]
0x012468: X86 cmp dword ptr [ebp+0FFFFFFE4h], 0h
0x012480: JNZ VM[0x012558] (fallthrough VM[0x012498])
0x012498: MOV SCRATCH, 0
0x0124b0: ADD SCRATCH, 0x41ff38
0x0124c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0124e0: MOV EAX, SCRATCH
0x0124f8: X86 push esi
0x012528: X86JUMPOUT call dword ptr [eax+90h]
0x012540: CRASH
0x012558: MOV SCRATCH, EBP
0x012588: ADD SCRATCH, 0xffffffec
0x0125a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0125b8: MOV EAX, SCRATCH
0x0125d0: MOV SCRATCH, EAX
0x012600: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012618: PUSH SCRATCH
0x012630: MOV SCRATCH, 0
0x012648: ADD SCRATCH, 0x41ff2c
0x012660: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012678: MOV EAX, SCRATCH
0x012690: MOV SCRATCH, ESI
0x0126c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0126d8: PUSH SCRATCH
0x0126f0: X86JUMPOUT call dword ptr [eax+0Ch]
0x012708: X86 test eax, eax
0x012720: JNZ VM[0x0127f8] (fallthrough VM[0x012738])
0x012738: MOV SCRATCH, EBX
0x012768: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012780: MOV EAX, SCRATCH
0x012798: X86 test eax, eax
0x0127b0: JZ VM[0x0128d0] (fallthrough VM[0x0127c8])
0x0127c8: X86 add ebx, eax
0x0127e0: CRASH
0x0127f8: MOV SCRATCH, EBX
0x012828: ADD SCRATCH, 0x000044
0x012840: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012858: MOV EAX, SCRATCH
0x012870: MOV SCRATCH, EBP
0x0128a0: ADD SCRATCH, 0xfffffff8
0x0128b8: MOV DWORD PTR [SCRATCH], EAX
0x0128d0: MOV SCRATCH, EBP
0x012900: ADD SCRATCH, 0xffffffec
0x012918: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012930: PUSH SCRATCH
0x012948: MOV SCRATCH, 0
0x012960: ADD SCRATCH, 0x41ff38
0x012978: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012990: MOV EAX, SCRATCH
0x0129a8: X86JUMPOUT call dword ptr [eax+90h]
0x0129c0: MOV SCRATCH, EBP
0x0129f0: ADD SCRATCH, 0xffffffe8
0x012a08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012a20: PUSH SCRATCH
0x012a38: X86CALLOUT 0x408e07
0x012a50: MOV SCRATCH, EBP
0x012a80: ADD SCRATCH, 0xfffffff8
0x012a98: MOV SCRATCH, DWORD PTR [SCRATCH]
0x012ab0: MOV EAX, SCRATCH
0x012ac8: X86 pop edi
0x012ae0: X86 pop esi
0x012af8: X86 pop ebx
0x012b10: X86 leave
0x012b28: X86 ret
0x012b40: X86 xor eax, eax
0x012b58: MOV SCRATCH, EBP
0x012b88: ADD SCRATCH, 0xfffffff0
0x012ba0: MOV EDI, SCRATCH
0x012bb8: X86 stosd dword ptr es:[edi]
0x012bd0: X86 stosd dword ptr es:[edi]
0x012be8: X86 stosd dword ptr es:[edi]
0x012c00: X86 stosd dword ptr es:[edi]
0x012c18: MOV SCRATCH, 0x000044
0x012c30: PUSH SCRATCH
0x012c48: X86 xor edi, edi
0x012c60: MOV SCRATCH, EBP
0x012c90: ADD SCRATCH, 0xffffffac
0x012ca8: MOV EAX, SCRATCH
0x012cc0: X86 push edi
0x012cf0: X86 push eax
0x012d20: X86CALLOUT 0x40ae80
0x012d38: X86 mov esi, 208h
0x012d50: X86 push esi
0x012d80: MOV SCRATCH, EBP
0x012db0: ADD SCRATCH, 0xfffffb9c
0x012dc8: MOV EAX, SCRATCH
0x012de0: X86 push edi
0x012e10: X86 push eax
0x012e40: X86CALLOUT 0x40ae80
0x012e58: X86 push esi
0x012e88: MOV SCRATCH, EBP
0x012eb8: ADD SCRATCH, 0xfffffda4
0x012ed0: MOV EAX, SCRATCH
0x012ee8: X86 push edi
0x012f18: X86 push eax
0x012f48: X86CALLOUT 0x40ae80
0x012f60: X86 add esp, 24h
0x012f78: MOV SCRATCH, EBP
0x012fa8: ADD SCRATCH, 0xfffffb9c
0x012fc0: MOV EAX, SCRATCH
0x012fd8: X86 push eax
0x013008: X86CALLOUT 0x401370
0x013020: X86 mov esi, 104h
0x013038: X86 push esi
0x013068: MOV SCRATCH, EBP
0x013098: ADD SCRATCH, 0xfffffda4
0x0130b0: MOV EAX, SCRATCH
0x0130c8: X86 push eax
0x0130f8: MOV SCRATCH, 0
0x013110: ADD SCRATCH, 0x41ff38
0x013128: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013140: MOV EAX, SCRATCH
0x013158: X86JUMPOUT call dword ptr [eax+54h]
0x013170: MOV SCRATCH, 0
0x013188: ADD SCRATCH, 0x401114
0x0131a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0131b8: MOV EBX, SCRATCH
0x0131d0: X86 push esi
0x013200: MOV SCRATCH, EBP
0x013230: ADD SCRATCH, 0xfffffda4
0x013248: MOV EAX, SCRATCH
0x013260: MOV SCRATCH, 0x40116c
0x013278: PUSH SCRATCH
0x013290: X86 push eax
0x0132c0: X86JUMPOUT call ebx
0x0132d8: X86 push esi
0x013308: MOV SCRATCH, EBP
0x013338: ADD SCRATCH, 0xfffffb9c
0x013350: MOV EAX, SCRATCH
0x013368: X86 push eax
0x013398: MOV SCRATCH, EBP
0x0133c8: ADD SCRATCH, 0xfffffda4
0x0133e0: MOV EAX, SCRATCH
0x0133f8: X86 push eax
0x013428: X86JUMPOUT call ebx
0x013440: X86 add esp, 18h
0x013458: MOV SCRATCH, EBP
0x013488: ADD SCRATCH, 0xfffffff0
0x0134a0: MOV EAX, SCRATCH
0x0134b8: X86 push eax
0x0134e8: MOV SCRATCH, EBP
0x013518: ADD SCRATCH, 0xffffffac
0x013530: MOV EAX, SCRATCH
0x013548: X86 push eax
0x013578: X86 push edi
0x0135a8: X86 push edi
0x0135d8: MOV SCRATCH, 0x1000004
0x0135f0: PUSH SCRATCH
0x013608: X86 push edi
0x013638: X86 push edi
0x013668: X86 push edi
0x013698: MOV SCRATCH, EBP
0x0136c8: ADD SCRATCH, 0xfffffda4
0x0136e0: MOV EAX, SCRATCH
0x0136f8: X86 push eax
0x013728: MOV SCRATCH, 0
0x013740: ADD SCRATCH, 0x41ff38
0x013758: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013770: MOV EAX, SCRATCH
0x013788: X86 push edi
0x0137b8: X86JUMPOUT call dword ptr [eax+20h]
0x0137d0: MOV SCRATCH, 0
0x0137e8: ADD SCRATCH, 0x41ff38
0x013800: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013818: MOV EAX, SCRATCH
0x013830: MOV SCRATCH, 0x00012c
0x013848: PUSH SCRATCH
0x013860: X86JUMPOUT call dword ptr [eax+38h]
0x013878: MOV SCRATCH, 0x000fa0
0x013890: PUSH SCRATCH
0x0138a8: MOV SCRATCH, 0x000002
0x0138c0: PUSH SCRATCH
0x0138d8: MOV SCRATCH, EBP
0x013908: ADD SCRATCH, 0x00000c
0x013920: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013938: PUSH SCRATCH
0x013950: MOV SCRATCH, EBP
0x013980: ADD SCRATCH, 0x000008
0x013998: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0139b0: PUSH SCRATCH
0x0139c8: MOV SCRATCH, EBP
0x0139f8: ADD SCRATCH, 0xfffffff4
0x013a10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013a28: PUSH SCRATCH
0x013a40: MOV SCRATCH, EBP
0x013a70: ADD SCRATCH, 0xfffffff0
0x013a88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013aa0: PUSH SCRATCH
0x013ab8: X86CALLOUT 0x4097f5
0x013ad0: MOV SCRATCH, EBP
0x013b00: ADD SCRATCH, 0xfffffff4
0x013b18: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013b30: PUSH SCRATCH
0x013b48: MOV SCRATCH, 0
0x013b60: ADD SCRATCH, 0x41ff34
0x013b78: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013b90: MOV EAX, SCRATCH
0x013ba8: X86JUMPOUT call dword ptr [eax+3Ch]
0x013bc0: MOV SCRATCH, EBP
0x013bf0: ADD SCRATCH, 0xfffffff0
0x013c08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013c20: PUSH SCRATCH
0x013c38: MOV SCRATCH, 0
0x013c50: ADD SCRATCH, 0x41ff34
0x013c68: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013c80: MOV EAX, SCRATCH
0x013c98: X86JUMPOUT call dword ptr [eax+3Ch]
0x013cb0: X86 pop edi
0x013cc8: X86 xor eax, eax
0x013ce0: X86 pop esi
0x013cf8: X86 inc eax
0x013d10: X86 pop ebx
0x013d28: X86 leave
0x013d40: X86 ret 0Ch
0x013d58: MOV SCRATCH, 0x000000
0x013d70: PUSH SCRATCH
0x013d88: MOV SCRATCH, EBP
0x013db8: ADD SCRATCH, 0x00000c
0x013dd0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013de8: PUSH SCRATCH
0x013e00: MOV SCRATCH, EBP
0x013e30: ADD SCRATCH, 0x000008
0x013e48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x013e60: PUSH SCRATCH
0x013e78: X86CALLOUT 0x4054c8
0x013e90: X86 pop ebp
0x013ea8: X86 ret 8h
0x013ec0: X86 xor eax, eax
0x013ed8: MOV SCRATCH, EBP
0x013f08: ADD SCRATCH, 0xffffffe8
0x013f20: MOV EDI, SCRATCH
0x013f38: X86 stosd dword ptr es:[edi]
0x013f50: X86 stosd dword ptr es:[edi]
0x013f68: X86 stosd dword ptr es:[edi]
0x013f80: MOV SCRATCH, 0x000044
0x013f98: PUSH SCRATCH
0x013fb0: X86 stosd dword ptr es:[edi]
0x013fc8: MOV SCRATCH, EBP
0x013ff8: ADD SCRATCH, 0xffffff40
0x014010: MOV EAX, SCRATCH
0x014028: X86 push ebx
0x014058: X86 push eax
0x014088: X86CALLOUT 0x40ae80
0x0140a0: X86 mov edi, 208h
0x0140b8: X86 push edi
0x0140e8: MOV SCRATCH, EBP
0x014118: ADD SCRATCH, 0xfffffb30
0x014130: MOV EAX, SCRATCH
0x014148: X86 push ebx
0x014178: X86 push eax
0x0141a8: X86CALLOUT 0x40ae80
0x0141c0: X86 push edi
0x0141f0: MOV SCRATCH, EBP
0x014220: ADD SCRATCH, 0xfffffd38
0x014238: MOV EAX, SCRATCH
0x014250: X86 push ebx
0x014280: X86 push eax
0x0142b0: X86CALLOUT 0x40ae80
0x0142c8: X86 add esp, 24h
0x0142e0: MOV SCRATCH, EBP
0x014310: ADD SCRATCH, 0xfffffb30
0x014328: MOV EAX, SCRATCH
0x014340: X86 push eax
0x014370: X86CALLOUT 0x401370
0x014388: X86 mov esi, 104h
0x0143a0: X86 push esi
0x0143d0: MOV SCRATCH, EBP
0x014400: ADD SCRATCH, 0xfffffd38
0x014418: MOV EAX, SCRATCH
0x014430: X86 push eax
0x014460: MOV SCRATCH, 0
0x014478: ADD SCRATCH, 0x41ff38
0x014490: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0144a8: MOV EAX, SCRATCH
0x0144c0: X86JUMPOUT call dword ptr [eax+54h]
0x0144d8: X86 push esi
0x014508: MOV SCRATCH, EBP
0x014538: ADD SCRATCH, 0xfffffd38
0x014550: MOV EAX, SCRATCH
0x014568: MOV SCRATCH, 0x40116c
0x014580: PUSH SCRATCH
0x014598: X86 push eax
0x0145c8: X86JUMPOUT call dword ptr [401114h]
0x0145e0: X86 push esi
0x014610: MOV SCRATCH, EBP
0x014640: ADD SCRATCH, 0xfffffb30
0x014658: MOV EAX, SCRATCH
0x014670: X86 push eax
0x0146a0: MOV SCRATCH, EBP
0x0146d0: ADD SCRATCH, 0xfffffd38
0x0146e8: MOV EAX, SCRATCH
0x014700: X86 push eax
0x014730: X86JUMPOUT call dword ptr [401114h]
0x014748: X86 add esp, 18h
0x014760: MOV SCRATCH, EBP
0x014790: ADD SCRATCH, 0xffffffe8
0x0147a8: MOV EAX, SCRATCH
0x0147c0: X86 push eax
0x0147f0: MOV SCRATCH, EBP
0x014820: ADD SCRATCH, 0xffffff40
0x014838: MOV EAX, SCRATCH
0x014850: X86 push eax
0x014880: X86 push ebx
0x0148b0: X86 push ebx
0x0148e0: MOV SCRATCH, 0x000003
0x0148f8: PUSH SCRATCH
0x014910: X86 push ebx
0x014940: X86 push ebx
0x014970: X86 push ebx
0x0149a0: MOV SCRATCH, EBP
0x0149d0: ADD SCRATCH, 0xfffffd38
0x0149e8: MOV EAX, SCRATCH
0x014a00: X86 push eax
0x014a30: MOV SCRATCH, 0
0x014a48: ADD SCRATCH, 0x41ff38
0x014a60: MOV SCRATCH, DWORD PTR [SCRATCH]
0x014a78: MOV EAX, SCRATCH
0x014a90: X86 push ebx
0x014ac0: X86JUMPOUT call dword ptr [eax+20h]
0x014ad8: MOV SCRATCH, 0
0x014af0: ADD SCRATCH, 0x41ff38
0x014b08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x014b20: MOV EAX, SCRATCH
0x014b38: MOV SCRATCH, 0x00012c
0x014b50: PUSH SCRATCH
0x014b68: X86JUMPOUT call dword ptr [eax+38h]
0x014b80: X86 push edi
0x014bb0: MOV SCRATCH, EBP
0x014be0: ADD SCRATCH, 0xfffff928
0x014bf8: MOV EAX, SCRATCH
0x014c10: X86 push ebx
0x014c40: X86 push eax
0x014c70: X86CALLOUT 0x40ae80
0x014c88: MOV SCRATCH, 0
0x014ca0: ADD SCRATCH, 0x41ff38
0x014cb8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x014cd0: MOV ESI, SCRATCH
0x014ce8: X86 add esp, 0Ch
0x014d00: MOV SCRATCH, EBP
0x014d30: ADD SCRATCH, 0xfffff928
0x014d48: MOV EAX, SCRATCH
0x014d60: X86 push eax
0x014d90: X86 add esi, 64h
0x014da8: X86CALLOUT 0x4015b2
0x014dc0: X86 push eax
0x014df0: X86 push ebx
0x014e20: X86 push ebx
0x014e50: X86 push ebx
0x014e80: X86JUMPOUT call dword ptr [esi]
0x014e98: MOV SCRATCH, EAX
0x014eb0: MOV EDI, SCRATCH
0x014ec8: CRASH
0x014ee0: X86 cmp dword ptr [ebp+0FFFFFF84h], 3h
0x014ef8: X86 mov esi, 10002h
0x014f10: JNZ VM[0x0151b0] (fallthrough VM[0x014f28])
0x014f28: MOV SCRATCH, EBP
0x014f58: ADD SCRATCH, 0xffffffac
0x014f70: MOV SCRATCH, DWORD PTR [SCRATCH]
0x014f88: MOV EAX, SCRATCH
0x014fa0: X86 push ebx
0x014fd0: MOV SCRATCH, 0x000001
0x014fe8: PUSH SCRATCH
0x015000: MOV SCRATCH, 0x401170
0x015018: PUSH SCRATCH
0x015030: X86 push eax
0x015060: MOV SCRATCH, EBP
0x015090: ADD SCRATCH, 0xffffffe8
0x0150a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0150c0: PUSH SCRATCH
0x0150d8: MOV SCRATCH, EBP
0x015108: ADD SCRATCH, 0xffffffe4
0x015120: MOV DWORD PTR [SCRATCH], EAX
0x015138: MOV SCRATCH, 0
0x015150: ADD SCRATCH, 0x41ff38
0x015168: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015180: MOV EAX, SCRATCH
0x015198: X86JUMPOUT call dword ptr [eax+8h]
0x0151b0: X86 cmp dword ptr [ebp+0FFFFFF84h], 1h
0x0151c8: JNZ VM[0x015540] (fallthrough VM[0x0151e0])
0x0151e0: X86 cmp dword ptr [ebp+0FFFFFF90h], 80000003h
0x0151f8: JNZ VM[0x015528] (fallthrough VM[0x015210])
0x015210: MOV SCRATCH, EBP
0x015240: ADD SCRATCH, 0xffffff9c
0x015258: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015270: MOV EAX, SCRATCH
0x015288: X86 cmp eax, dword ptr [ebp+0FFFFFFE4h]
0x0152a0: JNZ VM[0x015588] (fallthrough VM[0x0152b8])
0x0152b8: X86 push eax
0x0152e8: MOV SCRATCH, 0x000007
0x015300: PUSH SCRATCH
0x015318: MOV SCRATCH, EBP
0x015348: ADD SCRATCH, 0x00000c
0x015360: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015378: PUSH SCRATCH
0x015390: MOV SCRATCH, EBP
0x0153c0: ADD SCRATCH, 0x000008
0x0153d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0153f0: PUSH SCRATCH
0x015408: MOV SCRATCH, EBP
0x015438: ADD SCRATCH, 0xffffffec
0x015450: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015468: PUSH SCRATCH
0x015480: MOV SCRATCH, EBP
0x0154b0: ADD SCRATCH, 0xffffffe8
0x0154c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0154e0: PUSH SCRATCH
0x0154f8: X86CALLOUT 0x4096b1
0x015510: CRASH
0x015528: X86 mov esi, 80010001h
0x015540: X86 cmp dword ptr [ebp+0FFFFFF84h], 5h
0x015558: JNZ VM[0x015588] (fallthrough VM[0x015570])
0x015570: X86 mov dword ptr [ebp+0FFFFFFF8h], 1h
0x015588: MOV SCRATCH, 0
0x0155a0: ADD SCRATCH, 0x41ff38
0x0155b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0155d0: MOV EAX, SCRATCH
0x0155e8: X86 push esi
0x015618: MOV SCRATCH, EBP
0x015648: ADD SCRATCH, 0xffffff8c
0x015660: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015678: PUSH SCRATCH
0x015690: MOV SCRATCH, EBP
0x0156c0: ADD SCRATCH, 0xffffff88
0x0156d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0156f0: PUSH SCRATCH
0x015708: X86JUMPOUT call dword ptr [eax+80h]
0x015720: X86 cmp dword ptr [ebp+0FFFFFFF8h], ebx
0x015738: JNZ VM[0x0158b8] (fallthrough VM[0x015750])
0x015750: MOV SCRATCH, 0xffffffff
0x015768: PUSH SCRATCH
0x015780: MOV SCRATCH, EBP
0x0157b0: ADD SCRATCH, 0xffffff84
0x0157c8: MOV EAX, SCRATCH
0x0157e0: X86 push eax
0x015810: MOV SCRATCH, 0
0x015828: ADD SCRATCH, 0x41ff38
0x015840: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015858: MOV EAX, SCRATCH
0x015870: X86JUMPOUT call dword ptr [eax+7Ch]
0x015888: X86 test eax, eax
0x0158a0: JNZ VM[0x014ee0] (fallthrough VM[0x0158b8])
0x0158b8: MOV SCRATCH, EBP
0x0158e8: ADD SCRATCH, 0xffffffec
0x015900: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015918: PUSH SCRATCH
0x015930: MOV SCRATCH, 0
0x015948: ADD SCRATCH, 0x41ff34
0x015960: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015978: MOV EAX, SCRATCH
0x015990: X86JUMPOUT call dword ptr [eax+3Ch]
0x0159a8: MOV SCRATCH, 0
0x0159c0: ADD SCRATCH, 0x41ff38
0x0159d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0159f0: MOV EAX, SCRATCH
0x015a08: MOV SCRATCH, 0xffffffff
0x015a20: PUSH SCRATCH
0x015a38: MOV SCRATCH, EBP
0x015a68: ADD SCRATCH, 0xffffffe8
0x015a80: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015a98: PUSH SCRATCH
0x015ab0: X86JUMPOUT call dword ptr [eax+68h]
0x015ac8: MOV SCRATCH, EBP
0x015af8: ADD SCRATCH, 0xfffffffc
0x015b10: MOV EAX, SCRATCH
0x015b28: X86 push eax
0x015b58: MOV SCRATCH, EBP
0x015b88: ADD SCRATCH, 0xffffffe8
0x015ba0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015bb8: PUSH SCRATCH
0x015bd0: MOV SCRATCH, 0
0x015be8: ADD SCRATCH, 0x41ff38
0x015c00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015c18: MOV EAX, SCRATCH
0x015c30: MOV SCRATCH, EBP
0x015c60: ADD SCRATCH, 0xfffffffc
0x015c78: MOV DWORD PTR [SCRATCH], EBX
0x015c90: X86JUMPOUT call dword ptr [eax+58h]
0x015ca8: X86 test eax, eax
0x015cc0: X86 mov esi, 11335577h
0x015cd8: JNZ VM[0x015f00] (fallthrough VM[0x015cf0])
0x015cf0: MOV SCRATCH, 0
0x015d08: ADD SCRATCH, 0x41ff38
0x015d20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015d38: MOV EAX, SCRATCH
0x015d50: MOV SCRATCH, 0x001388
0x015d68: PUSH SCRATCH
0x015d80: X86 push edi
0x015db0: X86JUMPOUT call dword ptr [eax+68h]
0x015dc8: X86 test eax, eax
0x015de0: JNZ VM[0x015e58] (fallthrough VM[0x015df8])
0x015df8: MOV SCRATCH, EBP
0x015e28: ADD SCRATCH, 0xfffffffc
0x015e40: MOV DWORD PTR [SCRATCH], ESI
0x015e58: MOV SCRATCH, 0
0x015e70: ADD SCRATCH, 0x41ff34
0x015e88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015ea0: MOV EAX, SCRATCH
0x015eb8: X86 push edi
0x015ee8: X86JUMPOUT call dword ptr [eax+3Ch]
0x015f00: MOV SCRATCH, EBP
0x015f30: ADD SCRATCH, 0xffffffe8
0x015f48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015f60: PUSH SCRATCH
0x015f78: MOV SCRATCH, 0
0x015f90: ADD SCRATCH, 0x41ff34
0x015fa8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x015fc0: MOV EAX, SCRATCH
0x015fd8: X86JUMPOUT call dword ptr [eax+3Ch]
0x015ff0: X86 cmp dword ptr [ebp+0FFFFFFFCh], esi
0x016008: JNZ VM[0x0161d0] (fallthrough VM[0x016020])
0x016020: X86CALLOUT 0x4052a9
0x016038: X86 cmp eax, ebx
0x016050: JZ VM[0x0161d0] (fallthrough VM[0x016068])
0x016068: MOV SCRATCH, 0x000006
0x016080: PUSH SCRATCH
0x016098: MOV SCRATCH, EBP
0x0160c8: ADD SCRATCH, 0x00000c
0x0160e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0160f8: PUSH SCRATCH
0x016110: MOV SCRATCH, EBP
0x016140: ADD SCRATCH, 0x000008
0x016158: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016170: PUSH SCRATCH
0x016188: X86 push eax
0x0161b8: X86CALLOUT 0x4092e7
0x0161d0: X86 pop edi
0x0161e8: X86 xor eax, eax
0x016200: X86 pop esi
0x016218: X86 inc eax
0x016230: X86 pop ebx
0x016248: X86 leave
0x016260: X86 ret 8h
0x016278: MOV SCRATCH, 0x000001
0x016290: PUSH SCRATCH
0x0162a8: MOV SCRATCH, EBP
0x0162d8: ADD SCRATCH, 0x00000c
0x0162f0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016308: PUSH SCRATCH
0x016320: MOV SCRATCH, EBP
0x016350: ADD SCRATCH, 0x000008
0x016368: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016380: PUSH SCRATCH
0x016398: X86CALLOUT 0x4054c8
0x0163b0: X86 pop ebp
0x0163c8: X86 ret 8h
0x0163e0: MOV SCRATCH, 0x000009
0x0163f8: PUSH SCRATCH
0x016410: MOV SCRATCH, EBP
0x016440: ADD SCRATCH, 0x00000c
0x016458: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016470: PUSH SCRATCH
0x016488: MOV SCRATCH, EBP
0x0164b8: ADD SCRATCH, 0x000008
0x0164d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0164e8: PUSH SCRATCH
0x016500: X86JUMPOUT call dword ptr [401058h]
0x016518: X86 push eax
0x016548: X86CALLOUT 0x409567
0x016560: X86 test eax, eax
0x016578: JNZ VM[0x016710] (fallthrough VM[0x016590])
0x016590: X86CALLOUT 0x4052a9
0x0165a8: MOV SCRATCH, 0x000009
0x0165c0: PUSH SCRATCH
0x0165d8: MOV SCRATCH, EBP
0x016608: ADD SCRATCH, 0x00000c
0x016620: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016638: PUSH SCRATCH
0x016650: MOV SCRATCH, EBP
0x016680: ADD SCRATCH, 0x000008
0x016698: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0166b0: PUSH SCRATCH
0x0166c8: X86 push eax
0x0166f8: X86CALLOUT 0x4090a7
0x016710: X86 xor eax, eax
0x016728: X86 inc eax
0x016740: X86 pop ebp
0x016758: X86 ret 8h
0x016770: X86CALLOUT 0x4052a9
0x016788: MOV SCRATCH, 0x000009
0x0167a0: PUSH SCRATCH
0x0167b8: MOV SCRATCH, EBP
0x0167e8: ADD SCRATCH, 0x00000c
0x016800: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016818: PUSH SCRATCH
0x016830: MOV SCRATCH, EBP
0x016860: ADD SCRATCH, 0x000008
0x016878: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016890: PUSH SCRATCH
0x0168a8: X86 push eax
0x0168d8: X86CALLOUT 0x4090a7
0x0168f0: X86 xor eax, eax
0x016908: X86 inc eax
0x016920: X86 pop ebp
0x016938: X86 ret 8h
0x016950: MOV SCRATCH, 0x000005
0x016968: PUSH SCRATCH
0x016980: MOV SCRATCH, EBP
0x0169b0: ADD SCRATCH, 0x00000c
0x0169c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0169e0: PUSH SCRATCH
0x0169f8: MOV SCRATCH, EBP
0x016a28: ADD SCRATCH, 0x000008
0x016a40: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016a58: PUSH SCRATCH
0x016a70: X86JUMPOUT call dword ptr [401058h]
0x016a88: X86 push eax
0x016ab8: X86CALLOUT 0x409567
0x016ad0: X86 test eax, eax
0x016ae8: JNZ VM[0x016c80] (fallthrough VM[0x016b00])
0x016b00: X86CALLOUT 0x4052a9
0x016b18: MOV SCRATCH, 0x000000
0x016b30: PUSH SCRATCH
0x016b48: MOV SCRATCH, EBP
0x016b78: ADD SCRATCH, 0x00000c
0x016b90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016ba8: PUSH SCRATCH
0x016bc0: MOV SCRATCH, EBP
0x016bf0: ADD SCRATCH, 0x000008
0x016c08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016c20: PUSH SCRATCH
0x016c38: X86 push eax
0x016c68: X86CALLOUT 0x4090a7
0x016c80: X86 xor eax, eax
0x016c98: X86 inc eax
0x016cb0: X86 pop ebp
0x016cc8: X86 ret 8h
0x016ce0: X86CALLOUT 0x4052a9
0x016cf8: MOV SCRATCH, 0x000008
0x016d10: PUSH SCRATCH
0x016d28: MOV SCRATCH, EBP
0x016d58: ADD SCRATCH, 0x00000c
0x016d70: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016d88: PUSH SCRATCH
0x016da0: MOV SCRATCH, EBP
0x016dd0: ADD SCRATCH, 0x000008
0x016de8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016e00: PUSH SCRATCH
0x016e18: X86 push eax
0x016e48: X86CALLOUT 0x4090a7
0x016e60: X86 pop ebp
0x016e78: X86 ret 8h
0x016e90: X86CALLOUT 0x4052a9
0x016ea8: X86 test eax, eax
0x016ec0: JZ VM[0x017040] (fallthrough VM[0x016ed8])
0x016ed8: MOV SCRATCH, 0x000001
0x016ef0: PUSH SCRATCH
0x016f08: MOV SCRATCH, EBP
0x016f38: ADD SCRATCH, 0x00000c
0x016f50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016f68: PUSH SCRATCH
0x016f80: MOV SCRATCH, EBP
0x016fb0: ADD SCRATCH, 0x000008
0x016fc8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x016fe0: PUSH SCRATCH
0x016ff8: X86 push eax
0x017028: X86CALLOUT 0x4092e7
0x017040: X86 xor eax, eax
0x017058: X86 inc eax
0x017070: X86 pop ebp
0x017088: X86 ret 8h
0x0170a0: MOV SCRATCH, 0x000006
0x0170b8: PUSH SCRATCH
0x0170d0: MOV SCRATCH, EBP
0x017100: ADD SCRATCH, 0x00000c
0x017118: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017130: PUSH SCRATCH
0x017148: MOV SCRATCH, EBP
0x017178: ADD SCRATCH, 0x000008
0x017190: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0171a8: PUSH SCRATCH
0x0171c0: X86JUMPOUT call dword ptr [401058h]
0x0171d8: X86 push eax
0x017208: X86CALLOUT 0x409567
0x017220: X86 xor eax, eax
0x017238: X86 inc eax
0x017250: X86 pop ebp
0x017268: X86 ret 8h
0x017280: X86CALLOUT 0x4052a9
0x017298: X86 test eax, eax
0x0172b0: JZ VM[0x017430] (fallthrough VM[0x0172c8])
0x0172c8: MOV SCRATCH, 0x000004
0x0172e0: PUSH SCRATCH
0x0172f8: MOV SCRATCH, EBP
0x017328: ADD SCRATCH, 0x00000c
0x017340: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017358: PUSH SCRATCH
0x017370: MOV SCRATCH, EBP
0x0173a0: ADD SCRATCH, 0x000008
0x0173b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0173d0: PUSH SCRATCH
0x0173e8: X86 push eax
0x017418: X86CALLOUT 0x4090a7
0x017430: X86 xor eax, eax
0x017448: X86 inc eax
0x017460: X86 pop ebp
0x017478: X86 ret 8h
0x017490: MOV SCRATCH, 0x000004
0x0174a8: PUSH SCRATCH
0x0174c0: MOV SCRATCH, EBP
0x0174f0: ADD SCRATCH, 0x00000c
0x017508: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017520: PUSH SCRATCH
0x017538: MOV SCRATCH, EBP
0x017568: ADD SCRATCH, 0x000008
0x017580: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017598: PUSH SCRATCH
0x0175b0: X86JUMPOUT call dword ptr [401058h]
0x0175c8: X86 push eax
0x0175f8: X86CALLOUT 0x409567
0x017610: X86 xor eax, eax
0x017628: X86 inc eax
0x017640: X86 pop ebp
0x017658: X86 ret 8h
0x017670: X86CALLOUT 0x4052a9
0x017688: X86 test eax, eax
0x0176a0: JZ VM[0x017820] (fallthrough VM[0x0176b8])
0x0176b8: MOV SCRATCH, 0x00000a
0x0176d0: PUSH SCRATCH
0x0176e8: MOV SCRATCH, EBP
0x017718: ADD SCRATCH, 0x00000c
0x017730: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017748: PUSH SCRATCH
0x017760: MOV SCRATCH, EBP
0x017790: ADD SCRATCH, 0x000008
0x0177a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0177c0: PUSH SCRATCH
0x0177d8: X86 push eax
0x017808: X86CALLOUT 0x4090a7
0x017820: X86 xor eax, eax
0x017838: X86 inc eax
0x017850: X86 pop ebp
0x017868: X86 ret 8h
0x017880: MOV SCRATCH, 0x00000a
0x017898: PUSH SCRATCH
0x0178b0: MOV SCRATCH, EBP
0x0178e0: ADD SCRATCH, 0x00000c
0x0178f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017910: PUSH SCRATCH
0x017928: MOV SCRATCH, EBP
0x017958: ADD SCRATCH, 0x000008
0x017970: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017988: PUSH SCRATCH
0x0179a0: X86JUMPOUT call dword ptr [401058h]
0x0179b8: X86 push eax
0x0179e8: X86CALLOUT 0x409567
0x017a00: X86 test eax, eax
0x017a18: JNZ VM[0x017bb0] (fallthrough VM[0x017a30])
0x017a30: X86CALLOUT 0x4052a9
0x017a48: MOV SCRATCH, 0x00000a
0x017a60: PUSH SCRATCH
0x017a78: MOV SCRATCH, EBP
0x017aa8: ADD SCRATCH, 0x00000c
0x017ac0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017ad8: PUSH SCRATCH
0x017af0: MOV SCRATCH, EBP
0x017b20: ADD SCRATCH, 0x000008
0x017b38: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017b50: PUSH SCRATCH
0x017b68: X86 push eax
0x017b98: X86CALLOUT 0x4090a7
0x017bb0: X86 xor eax, eax
0x017bc8: X86 inc eax
0x017be0: X86 pop ebp
0x017bf8: X86 ret 8h
0x017c10: X86CALLOUT 0x4052a9
0x017c28: X86 test eax, eax
0x017c40: JZ VM[0x017dc0] (fallthrough VM[0x017c58])
0x017c58: MOV SCRATCH, 0x00000b
0x017c70: PUSH SCRATCH
0x017c88: MOV SCRATCH, EBP
0x017cb8: ADD SCRATCH, 0x00000c
0x017cd0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017ce8: PUSH SCRATCH
0x017d00: MOV SCRATCH, EBP
0x017d30: ADD SCRATCH, 0x000008
0x017d48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017d60: PUSH SCRATCH
0x017d78: X86 push eax
0x017da8: X86CALLOUT 0x4090a7
0x017dc0: X86 xor eax, eax
0x017dd8: X86 inc eax
0x017df0: X86 pop ebp
0x017e08: X86 ret 8h
0x017e20: MOV SCRATCH, 0x00000b
0x017e38: PUSH SCRATCH
0x017e50: MOV SCRATCH, EBP
0x017e80: ADD SCRATCH, 0x00000c
0x017e98: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017eb0: PUSH SCRATCH
0x017ec8: MOV SCRATCH, EBP
0x017ef8: ADD SCRATCH, 0x000008
0x017f10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x017f28: PUSH SCRATCH
0x017f40: X86JUMPOUT call dword ptr [401058h]
0x017f58: X86 push eax
0x017f88: X86CALLOUT 0x409567
0x017fa0: X86 test eax, eax
0x017fb8: JNZ VM[0x018150] (fallthrough VM[0x017fd0])
0x017fd0: X86CALLOUT 0x4052a9
0x017fe8: MOV SCRATCH, 0x00000b
0x018000: PUSH SCRATCH
0x018018: MOV SCRATCH, EBP
0x018048: ADD SCRATCH, 0x00000c
0x018060: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018078: PUSH SCRATCH
0x018090: MOV SCRATCH, EBP
0x0180c0: ADD SCRATCH, 0x000008
0x0180d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0180f0: PUSH SCRATCH
0x018108: X86 push eax
0x018138: X86CALLOUT 0x4090a7
0x018150: X86 xor eax, eax
0x018168: X86 inc eax
0x018180: X86 pop ebp
0x018198: X86 ret 8h
0x0181b0: X86CALLOUT 0x4052a9
0x0181c8: X86 test eax, eax
0x0181e0: JZ VM[0x018360] (fallthrough VM[0x0181f8])
0x0181f8: MOV SCRATCH, 0x00000c
0x018210: PUSH SCRATCH
0x018228: MOV SCRATCH, EBP
0x018258: ADD SCRATCH, 0x00000c
0x018270: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018288: PUSH SCRATCH
0x0182a0: MOV SCRATCH, EBP
0x0182d0: ADD SCRATCH, 0x000008
0x0182e8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018300: PUSH SCRATCH
0x018318: X86 push eax
0x018348: X86CALLOUT 0x4090a7
0x018360: X86 xor eax, eax
0x018378: X86 inc eax
0x018390: X86 pop ebp
0x0183a8: X86 ret 8h
0x0183c0: X86CALLOUT 0x4052a9
0x0183d8: X86 test eax, eax
0x0183f0: JZ VM[0x018570] (fallthrough VM[0x018408])
0x018408: MOV SCRATCH, 0x000000
0x018420: PUSH SCRATCH
0x018438: MOV SCRATCH, EBP
0x018468: ADD SCRATCH, 0x00000c
0x018480: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018498: PUSH SCRATCH
0x0184b0: MOV SCRATCH, EBP
0x0184e0: ADD SCRATCH, 0x000008
0x0184f8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018510: PUSH SCRATCH
0x018528: X86 push eax
0x018558: X86CALLOUT 0x4090a7
0x018570: X86 xor eax, eax
0x018588: X86 inc eax
0x0185a0: X86 pop ebp
0x0185b8: X86 ret 8h
0x0185d0: MOV SCRATCH, 0x000003
0x0185e8: PUSH SCRATCH
0x018600: MOV SCRATCH, EBP
0x018630: ADD SCRATCH, 0x00000c
0x018648: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018660: PUSH SCRATCH
0x018678: MOV SCRATCH, EBP
0x0186a8: ADD SCRATCH, 0x000008
0x0186c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0186d8: PUSH SCRATCH
0x0186f0: X86JUMPOUT call dword ptr [401058h]
0x018708: X86 push eax
0x018738: X86CALLOUT 0x409567
0x018750: X86 test eax, eax
0x018768: JNZ VM[0x018900] (fallthrough VM[0x018780])
0x018780: X86CALLOUT 0x4052a9
0x018798: MOV SCRATCH, 0x000000
0x0187b0: PUSH SCRATCH
0x0187c8: MOV SCRATCH, EBP
0x0187f8: ADD SCRATCH, 0x00000c
0x018810: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018828: PUSH SCRATCH
0x018840: MOV SCRATCH, EBP
0x018870: ADD SCRATCH, 0x000008
0x018888: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0188a0: PUSH SCRATCH
0x0188b8: X86 push eax
0x0188e8: X86CALLOUT 0x4090a7
0x018900: X86 xor eax, eax
0x018918: X86 inc eax
0x018930: X86 pop ebp
0x018948: X86 ret 8h
0x018960: MOV SCRATCH, 0
0x018978: ADD SCRATCH, 0x41ff38
0x018990: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0189a8: MOV EAX, SCRATCH
0x0189c0: MOV SCRATCH, 0x000088
0x0189d8: PUSH SCRATCH
0x0189f0: MOV SCRATCH, 0x000040
0x018a08: PUSH SCRATCH
0x018a20: X86JUMPOUT call dword ptr [eax+8Ch]
0x018a38: MOV SCRATCH, 0x000030
0x018a50: PUSH SCRATCH
0x018a68: MOV SCRATCH, 0
0x018a80: ADD SCRATCH, 0x41ff34
0x018a98: MOV DWORD PTR [SCRATCH], EAX
0x018ab0: MOV SCRATCH, 0
0x018ac8: ADD SCRATCH, 0x41ff38
0x018ae0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018af8: MOV EAX, SCRATCH
0x018b10: MOV SCRATCH, 0x000040
0x018b28: PUSH SCRATCH
0x018b40: X86JUMPOUT call dword ptr [eax+8Ch]
0x018b58: MOV SCRATCH, 0x00000c
0x018b70: PUSH SCRATCH
0x018b88: MOV SCRATCH, 0
0x018ba0: ADD SCRATCH, 0x41ff2c
0x018bb8: MOV DWORD PTR [SCRATCH], EAX
0x018bd0: MOV SCRATCH, 0
0x018be8: ADD SCRATCH, 0x41ff38
0x018c00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018c18: MOV EAX, SCRATCH
0x018c30: MOV SCRATCH, 0x000040
0x018c48: PUSH SCRATCH
0x018c60: X86JUMPOUT call dword ptr [eax+8Ch]
0x018c78: MOV SCRATCH, 0
0x018c90: ADD SCRATCH, 0x41ff30
0x018ca8: MOV DWORD PTR [SCRATCH], EAX
0x018cc0: X86 mov eax, dword ptr fs:[30h]
0x018cd8: MOV SCRATCH, EAX
0x018d08: ADD SCRATCH, 0x00000c
0x018d20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018d38: MOV EAX, SCRATCH
0x018d50: MOV SCRATCH, EAX
0x018d80: ADD SCRATCH, 0x00001c
0x018d98: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018db0: MOV EAX, SCRATCH
0x018dc8: MOV SCRATCH, EAX
0x018df8: ADD SCRATCH, 0x000008
0x018e10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018e28: MOV ESI, SCRATCH
0x018e40: X86 mov ebx, 94FCB0C0h
0x018e58: X86 push ebx
0x018e88: X86 push esi
0x018eb8: MOV SCRATCH, 0
0x018ed0: ADD SCRATCH, 0x420360
0x018ee8: MOV DWORD PTR [SCRATCH], ESI
0x018f00: X86CALLOUT 0x407ff5
0x018f18: MOV SCRATCH, 0
0x018f30: ADD SCRATCH, 0x41ff34
0x018f48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x018f60: MOV ECX, SCRATCH
0x018f78: MOV SCRATCH, 0xa1d45974
0x018f90: PUSH SCRATCH
0x018fa8: X86 push esi
0x018fd8: MOV SCRATCH, ECX
0x019008: ADD SCRATCH, 0x000044
0x019020: MOV DWORD PTR [SCRATCH], EAX
0x019038: X86CALLOUT 0x407ff5
0x019050: MOV SCRATCH, 0
0x019068: ADD SCRATCH, 0x41ff34
0x019080: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019098: MOV ECX, SCRATCH
0x0190b0: MOV SCRATCH, 0xaf11bc24
0x0190c8: PUSH SCRATCH
0x0190e0: X86 push esi
0x019110: MOV SCRATCH, ECX
0x019140: ADD SCRATCH, 0x000060
0x019158: MOV DWORD PTR [SCRATCH], EAX
0x019170: X86CALLOUT 0x407ff5
0x019188: MOV SCRATCH, 0
0x0191a0: ADD SCRATCH, 0x41ff34
0x0191b8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0191d0: MOV ECX, SCRATCH
0x0191e8: MOV SCRATCH, 0x000004
0x019200: PUSH SCRATCH
0x019218: MOV SCRATCH, ECX
0x019248: ADD SCRATCH, 0x000064
0x019260: MOV DWORD PTR [SCRATCH], EAX
0x019278: X86 mov eax, 1000h
0x019290: X86 push eax
0x0192c0: X86 push eax
0x0192f0: X86 push edi
0x019320: X86JUMPOUT call dword ptr [401050h]
0x019338: X86 xor eax, eax
0x019350: X86 mov ax, cs
0x019368: MOV SCRATCH, EBP
0x019398: ADD SCRATCH, 0xfffffff4
0x0193b0: MOV DWORD PTR [SCRATCH], EAX
0x0193c8: X86 cmp dword ptr [ebp+0FFFFFFF4h], 1Bh
0x0193e0: JZ VM[0x019440] (fallthrough VM[0x0193f8])
0x0193f8: X86 cmp dword ptr [ebp+0FFFFFFF4h], 23h
0x019410: JZ VM[0x019440] (fallthrough VM[0x019428])
0x019428: X86 mov dword ptr [ebp+0FFFFFFE8h], 1h
0x019440: MOV SCRATCH, 0x3ee6cc56
0x019458: PUSH SCRATCH
0x019470: X86 push esi
0x0194a0: X86CALLOUT 0x407ff5
0x0194b8: MOV SCRATCH, 0
0x0194d0: ADD SCRATCH, 0x41ff34
0x0194e8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019500: MOV ECX, SCRATCH
0x019518: MOV SCRATCH, 0x7aa7b69b
0x019530: PUSH SCRATCH
0x019548: X86 push esi
0x019578: MOV SCRATCH, ECX
0x0195a8: ADD SCRATCH, 0x000020
0x0195c0: MOV DWORD PTR [SCRATCH], EAX
0x0195d8: X86CALLOUT 0x407ff5
0x0195f0: MOV SCRATCH, 0
0x019608: ADD SCRATCH, 0x41ff34
0x019620: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019638: MOV ECX, SCRATCH
0x019650: MOV SCRATCH, 0xe0762feb
0x019668: PUSH SCRATCH
0x019680: X86 push esi
0x0196b0: MOV SCRATCH, ECX
0x0196e0: ADD SCRATCH, 0x000024
0x0196f8: MOV DWORD PTR [SCRATCH], EAX
0x019710: X86CALLOUT 0x407ff5
0x019728: MOV SCRATCH, 0
0x019740: ADD SCRATCH, 0x41ff34
0x019758: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019770: MOV ECX, SCRATCH
0x019788: MOV SCRATCH, 0x97fd2398
0x0197a0: PUSH SCRATCH
0x0197b8: X86 push esi
0x0197e8: MOV SCRATCH, ECX
0x019818: ADD SCRATCH, 0x000010
0x019830: MOV DWORD PTR [SCRATCH], EAX
0x019848: X86CALLOUT 0x407ff5
0x019860: MOV SCRATCH, 0
0x019878: ADD SCRATCH, 0x41ff34
0x019890: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0198a8: MOV ECX, SCRATCH
0x0198c0: MOV SCRATCH, 0xb7a26d79
0x0198d8: PUSH SCRATCH
0x0198f0: X86 push esi
0x019920: MOV SCRATCH, ECX
0x019950: MOV DWORD PTR [SCRATCH], EAX
0x019968: X86CALLOUT 0x407ff5
0x019980: MOV SCRATCH, 0
0x019998: ADD SCRATCH, 0x41ff34
0x0199b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0199c8: MOV ECX, SCRATCH
0x0199e0: MOV SCRATCH, 0x67614ada
0x0199f8: PUSH SCRATCH
0x019a10: X86 push esi
0x019a40: MOV SCRATCH, ECX
0x019a70: ADD SCRATCH, 0x000034
0x019a88: MOV DWORD PTR [SCRATCH], EAX
0x019aa0: X86CALLOUT 0x407ff5
0x019ab8: MOV SCRATCH, 0
0x019ad0: ADD SCRATCH, 0x41ff34
0x019ae8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019b00: MOV ECX, SCRATCH
0x019b18: MOV SCRATCH, 0xd09c750
0x019b30: PUSH SCRATCH
0x019b48: X86 push esi
0x019b78: MOV SCRATCH, ECX
0x019ba8: ADD SCRATCH, 0x000038
0x019bc0: MOV DWORD PTR [SCRATCH], EAX
0x019bd8: X86CALLOUT 0x407ff5
0x019bf0: MOV SCRATCH, 0
0x019c08: ADD SCRATCH, 0x41ff34
0x019c20: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019c38: MOV ECX, SCRATCH
0x019c50: MOV SCRATCH, 0xe9d6ce5e
0x019c68: PUSH SCRATCH
0x019c80: X86 push esi
0x019cb0: MOV SCRATCH, ECX
0x019ce0: ADD SCRATCH, 0x00003c
0x019cf8: MOV DWORD PTR [SCRATCH], EAX
0x019d10: X86CALLOUT 0x407ff5
0x019d28: MOV SCRATCH, 0
0x019d40: ADD SCRATCH, 0x41ff34
0x019d58: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019d70: MOV ECX, SCRATCH
0x019d88: X86 push ebx
0x019db8: X86 push esi
0x019de8: MOV SCRATCH, ECX
0x019e18: ADD SCRATCH, 0x000014
0x019e30: MOV DWORD PTR [SCRATCH], EAX
0x019e48: X86CALLOUT 0x407ff5
0x019e60: MOV SCRATCH, 0
0x019e78: ADD SCRATCH, 0x41ff34
0x019e90: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019ea8: MOV ECX, SCRATCH
0x019ec0: MOV SCRATCH, 0x5c2d1a97
0x019ed8: PUSH SCRATCH
0x019ef0: X86 push esi
0x019f20: MOV SCRATCH, ECX
0x019f50: ADD SCRATCH, 0x000044
0x019f68: MOV DWORD PTR [SCRATCH], EAX
0x019f80: X86CALLOUT 0x407ff5
0x019f98: MOV SCRATCH, 0
0x019fb0: ADD SCRATCH, 0x41ff34
0x019fc8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x019fe0: MOV ECX, SCRATCH
0x019ff8: MOV SCRATCH, 0x31133574
0x01a010: PUSH SCRATCH
0x01a028: X86 push esi
0x01a058: MOV SCRATCH, ECX
0x01a088: ADD SCRATCH, 0x000048
0x01a0a0: MOV DWORD PTR [SCRATCH], EAX
0x01a0b8: X86CALLOUT 0x407ff5
0x01a0d0: MOV SCRATCH, 0
0x01a0e8: ADD SCRATCH, 0x41ff34
0x01a100: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01a118: MOV ECX, SCRATCH
0x01a130: MOV SCRATCH, 0xdbf381b5
0x01a148: PUSH SCRATCH
0x01a160: X86 push esi
0x01a190: MOV SCRATCH, ECX
0x01a1c0: ADD SCRATCH, 0x00004c
0x01a1d8: MOV DWORD PTR [SCRATCH], EAX
0x01a1f0: X86CALLOUT 0x407ff5
0x01a208: MOV SCRATCH, 0
0x01a220: ADD SCRATCH, 0x41ff34
0x01a238: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01a250: MOV ECX, SCRATCH
0x01a268: MOV SCRATCH, 0xa5c44c50
0x01a280: PUSH SCRATCH
0x01a298: X86 push esi
0x01a2c8: MOV SCRATCH, ECX
0x01a2f8: ADD SCRATCH, 0x000050
0x01a310: MOV DWORD PTR [SCRATCH], EAX
0x01a328: X86CALLOUT 0x407ff5
0x01a340: MOV SCRATCH, 0
0x01a358: ADD SCRATCH, 0x41ff34
0x01a370: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01a388: MOV ECX, SCRATCH
0x01a3a0: MOV SCRATCH, 0xa2c81105
0x01a3b8: PUSH SCRATCH
0x01a3d0: X86 push esi
0x01a400: MOV SCRATCH, ECX
0x01a430: ADD SCRATCH, 0x000004
0x01a448: MOV DWORD PTR [SCRATCH], EAX
0x01a460: X86CALLOUT 0x407ff5
0x01a478: MOV SCRATCH, 0
0x01a490: ADD SCRATCH, 0x41ff34
0x01a4a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01a4c0: MOV ECX, SCRATCH
0x01a4d8: MOV SCRATCH, 0x50cfba45
0x01a4f0: PUSH SCRATCH
0x01a508: X86 push esi
0x01a538: MOV SCRATCH, ECX
0x01a568: ADD SCRATCH, 0x000054
0x01a580: MOV DWORD PTR [SCRATCH], EAX
0x01a598: X86CALLOUT 0x407ff5
0x01a5b0: MOV SCRATCH, 0
0x01a5c8: ADD SCRATCH, 0x41ff34
0x01a5e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01a5f8: MOV ECX, SCRATCH
0x01a610: MOV SCRATCH, 0xf675d37d
0x01a628: PUSH SCRATCH
0x01a640: X86 push esi
0x01a670: MOV SCRATCH, ECX
0x01a6a0: ADD SCRATCH, 0x000058
0x01a6b8: MOV DWORD PTR [SCRATCH], EAX
0x01a6d0: X86CALLOUT 0x407ff5
0x01a6e8: MOV SCRATCH, 0
0x01a700: ADD SCRATCH, 0x41ff34
0x01a718: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01a730: MOV ECX, SCRATCH
0x01a748: MOV SCRATCH, ECX
0x01a778: ADD SCRATCH, 0x00005c
0x01a790: MOV DWORD PTR [SCRATCH], EAX
0x01a7a8: X86CALLOUT 0x40765a
0x01a7c0: X86 test eax, eax
0x01a7d8: JNZ VM[0x01a808] (fallthrough VM[0x01a7f0])
0x01a7f0: X86CALLOUT 0x407a58
0x01a808: X86CALLOUT 0x40870b
0x01a820: MOV SCRATCH, EBP
0x01a850: ADD SCRATCH, 0xfffffde0
0x01a868: MOV EAX, SCRATCH
0x01a880: X86 push eax
0x01a8b0: X86CALLOUT 0x40146e
0x01a8c8: X86 push eax
0x01a8f8: X86CALLOUT 0x404747
0x01a910: X86 cmp eax, edi
0x01a928: MOV SCRATCH, 0
0x01a940: ADD SCRATCH, 0x420344
0x01a958: MOV DWORD PTR [SCRATCH], EAX
0x01a970: JNZ VM[0x01a9d0] (fallthrough VM[0x01a988])
0x01a988: X86 push edi
0x01a9b8: X86CALLOUT 0x408bde
0x01a9d0: MOV SCRATCH, 0
0x01a9e8: ADD SCRATCH, 0x41ff34
0x01aa00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01aa18: PUSH SCRATCH
0x01aa30: X86CALLOUT 0x401821
0x01aa48: MOV SCRATCH, EBP
0x01aa78: ADD SCRATCH, 0xfffffde0
0x01aa90: MOV EAX, SCRATCH
0x01aaa8: X86 push eax
0x01aad8: X86CALLOUT 0x401617
0x01aaf0: X86 push eax
0x01ab20: X86CALLOUT 0x404747
0x01ab38: MOV SCRATCH, 0
0x01ab50: ADD SCRATCH, 0x420358
0x01ab68: MOV DWORD PTR [SCRATCH], EAX
0x01ab80: MOV SCRATCH, EBP
0x01abb0: ADD SCRATCH, 0xfffffde0
0x01abc8: MOV EAX, SCRATCH
0x01abe0: X86 push eax
0x01ac10: X86CALLOUT 0x4016c5
0x01ac28: X86 push eax
0x01ac58: X86CALLOUT 0x404747
0x01ac70: MOV SCRATCH, 0
0x01ac88: ADD SCRATCH, 0x420350
0x01aca0: MOV DWORD PTR [SCRATCH], EAX
0x01acb8: MOV SCRATCH, EBP
0x01ace8: ADD SCRATCH, 0xfffffde0
0x01ad00: MOV EAX, SCRATCH
0x01ad18: X86 push eax
0x01ad48: X86CALLOUT 0x40141e
0x01ad60: X86 push eax
0x01ad90: X86CALLOUT 0x404747
0x01ada8: MOV SCRATCH, 0
0x01adc0: ADD SCRATCH, 0x41ff38
0x01add8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01adf0: PUSH SCRATCH
0x01ae08: MOV SCRATCH, 0
0x01ae20: ADD SCRATCH, 0x420348
0x01ae38: MOV DWORD PTR [SCRATCH], EAX
0x01ae50: X86CALLOUT 0x401866
0x01ae68: MOV SCRATCH, 0
0x01ae80: ADD SCRATCH, 0x41ff2c
0x01ae98: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01aeb0: PUSH SCRATCH
0x01aec8: X86CALLOUT 0x4018ab
0x01aee0: MOV SCRATCH, 0
0x01aef8: ADD SCRATCH, 0x41ff30
0x01af10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01af28: PUSH SCRATCH
0x01af40: X86CALLOUT 0x4018f0
0x01af58: MOV SCRATCH, 0
0x01af70: ADD SCRATCH, 0x41ff38
0x01af88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01afa0: MOV EBX, SCRATCH
0x01afb8: MOV SCRATCH, EBP
0x01afe8: ADD SCRATCH, 0xfffffde0
0x01b000: MOV EAX, SCRATCH
0x01b018: X86 push eax
0x01b048: X86 add ebx, 78h
0x01b060: X86CALLOUT 0x401617
0x01b078: X86 push eax
0x01b0a8: X86JUMPOUT call dword ptr [ebx]
0x01b0c0: X86 push eax
0x01b0f0: X86CALLOUT 0x409c62
0x01b108: MOV SCRATCH, 0
0x01b120: ADD SCRATCH, 0x41ff38
0x01b138: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01b150: MOV EBX, SCRATCH
0x01b168: MOV SCRATCH, EBP
0x01b198: ADD SCRATCH, 0xfffffde0
0x01b1b0: MOV EAX, SCRATCH
0x01b1c8: X86 push eax
0x01b1f8: X86 add ebx, 78h
0x01b210: X86CALLOUT 0x4016c5
0x01b228: X86 push eax
0x01b258: X86JUMPOUT call dword ptr [ebx]
0x01b270: X86 push eax
0x01b2a0: X86CALLOUT 0x409c62
0x01b2b8: MOV SCRATCH, 0
0x01b2d0: ADD SCRATCH, 0x41ff38
0x01b2e8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01b300: MOV EBX, SCRATCH
0x01b318: MOV SCRATCH, EBP
0x01b348: ADD SCRATCH, 0xfffffde0
0x01b360: MOV EAX, SCRATCH
0x01b378: X86 push eax
0x01b3a8: X86 add ebx, 78h
0x01b3c0: X86CALLOUT 0x40166e
0x01b3d8: X86 push eax
0x01b408: X86JUMPOUT call dword ptr [ebx]
0x01b420: X86 push eax
0x01b450: X86CALLOUT 0x409c62
0x01b468: X86CALLOUT 0x407c9f
0x01b480: X86CALLOUT 0x4073a2
0x01b498: X86CALLOUT 0x406c16
0x01b4b0: X86CALLOUT 0x40765a
0x01b4c8: X86 test eax, eax
0x01b4e0: JZ VM[0x01b600] (fallthrough VM[0x01b4f8])
0x01b4f8: X86CALLOUT 0x404b76
0x01b510: X86 test eax, eax
0x01b528: JNZ VM[0x01b600] (fallthrough VM[0x01b540])
0x01b540: X86 push edi
0x01b570: X86CALLOUT 0x40a63e
0x01b588: X86 test eax, eax
0x01b5a0: JNZ VM[0x01b600] (fallthrough VM[0x01b5b8])
0x01b5b8: X86 push edi
0x01b5e8: X86CALLOUT 0x408bde
0x01b600: X86 mov eax, dword ptr fs:[30h]
0x01b618: MOV SCRATCH, EAX
0x01b648: ADD SCRATCH, 0x000008
0x01b660: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01b678: MOV EAX, SCRATCH
0x01b690: MOV SCRATCH, EAX
0x01b6c0: ADD SCRATCH, 0x00003c
0x01b6d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01b6f0: MOV ECX, SCRATCH
0x01b708: X86 test byte ptr [ecx+eax+8h], 1h
0x01b720: JNZ VM[0x01b7c8] (fallthrough VM[0x01b738])
0x01b738: X86CALLOUT 0x406653
0x01b750: X86 test eax, eax
0x01b768: JZ VM[0x01b7c8] (fallthrough VM[0x01b780])
0x01b780: X86 push edi
0x01b7b0: X86CALLOUT 0x408bde
0x01b7c8: X86 mov ebx, 208h
0x01b7e0: X86 push ebx
0x01b810: MOV SCRATCH, EBP
0x01b840: ADD SCRATCH, 0xfffffbd8
0x01b858: MOV EAX, SCRATCH
0x01b870: X86 push edi
0x01b8a0: X86 push eax
0x01b8d0: X86CALLOUT 0x40ae80
0x01b8e8: X86 add esp, 0Ch
0x01b900: MOV SCRATCH, EBP
0x01b930: ADD SCRATCH, 0xfffffbd8
0x01b948: MOV EAX, SCRATCH
0x01b960: X86 push eax
0x01b990: X86CALLOUT 0x4013c0
0x01b9a8: MOV SCRATCH, EBP
0x01b9d8: ADD SCRATCH, 0xfffffbd8
0x01b9f0: MOV EAX, SCRATCH
0x01ba08: X86 push eax
0x01ba38: MOV SCRATCH, 0
0x01ba50: ADD SCRATCH, 0x41ff38
0x01ba68: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01ba80: MOV EAX, SCRATCH
0x01ba98: MOV SCRATCH, 0x000001
0x01bab0: PUSH SCRATCH
0x01bac8: X86 push edi
0x01baf8: X86JUMPOUT call dword ptr [eax+34h]
0x01bb10: X86 push ebx
0x01bb40: MOV SCRATCH, EBP
0x01bb70: ADD SCRATCH, 0xffffffec
0x01bb88: MOV DWORD PTR [SCRATCH], EAX
0x01bba0: MOV SCRATCH, EBP
0x01bbd0: ADD SCRATCH, 0xfffffbd8
0x01bbe8: MOV EAX, SCRATCH
0x01bc00: X86 push edi
0x01bc30: X86 push eax
0x01bc60: X86CALLOUT 0x40ae80
0x01bc78: X86 add esp, 0Ch
0x01bc90: X86 cmp dword ptr [ebp+0FFFFFFECh], edi
0x01bca8: JZ VM[0x01be58] (fallthrough VM[0x01bcc0])
0x01bcc0: MOV SCRATCH, 0
0x01bcd8: ADD SCRATCH, 0x41ff38
0x01bcf0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01bd08: MOV EAX, SCRATCH
0x01bd20: X86JUMPOUT call dword ptr [eax+84h]
0x01bd38: X86 cmp eax, 0B7h
0x01bd50: JNZ VM[0x01bea0] (fallthrough VM[0x01bd68])
0x01bd68: MOV SCRATCH, EBP
0x01bd98: ADD SCRATCH, 0xffffffec
0x01bdb0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01bdc8: PUSH SCRATCH
0x01bde0: MOV SCRATCH, 0
0x01bdf8: ADD SCRATCH, 0x41ff34
0x01be10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01be28: MOV EAX, SCRATCH
0x01be40: X86JUMPOUT call dword ptr [eax+3Ch]
0x01be58: X86 push edi
0x01be88: X86CALLOUT 0x408bde
0x01bea0: MOV SCRATCH, 0xec63cd77
0x01beb8: PUSH SCRATCH
0x01bed0: X86 push esi
0x01bf00: MOV SCRATCH, EBP
0x01bf30: ADD SCRATCH, 0xfffffff8
0x01bf48: MOV DWORD PTR [SCRATCH], EDI
0x01bf60: X86CALLOUT 0x407ff5
0x01bf78: MOV SCRATCH, EAX
0x01bf90: MOV ESI, SCRATCH
0x01bfa8: MOV SCRATCH, EBP
0x01bfd8: ADD SCRATCH, 0xfffffff8
0x01bff0: MOV EAX, SCRATCH
0x01c008: X86 push eax
0x01c038: MOV SCRATCH, 0
0x01c050: ADD SCRATCH, 0x41ff38
0x01c068: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01c080: MOV EAX, SCRATCH
0x01c098: MOV SCRATCH, 0x000040
0x01c0b0: PUSH SCRATCH
0x01c0c8: MOV SCRATCH, 0x000001
0x01c0e0: PUSH SCRATCH
0x01c0f8: X86 push esi
0x01c128: MOV SCRATCH, 0xffffffff
0x01c140: PUSH SCRATCH
0x01c158: X86JUMPOUT call dword ptr [eax+10h]
0x01c170: MOV SCRATCH, EBP
0x01c1a0: ADD SCRATCH, 0xfffffff8
0x01c1b8: MOV EAX, SCRATCH
0x01c1d0: X86 push eax
0x01c200: X86 mov byte ptr [esi], 90h
0x01c218: MOV SCRATCH, EBP
0x01c248: ADD SCRATCH, 0xfffffff8
0x01c260: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01c278: PUSH SCRATCH
0x01c290: MOV SCRATCH, 0
0x01c2a8: ADD SCRATCH, 0x41ff38
0x01c2c0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01c2d8: MOV EAX, SCRATCH
0x01c2f0: MOV SCRATCH, 0x000001
0x01c308: PUSH SCRATCH
0x01c320: X86 push esi
0x01c350: MOV SCRATCH, 0xffffffff
0x01c368: PUSH SCRATCH
0x01c380: X86JUMPOUT call dword ptr [eax+10h]
0x01c398: X86 cmp dword ptr [ebp+0FFFFFFE8h], 1h
0x01c3b0: JNZ VM[0x01c410] (fallthrough VM[0x01c3c8])
0x01c3c8: X86 push edi
0x01c3f8: X86CALLOUT 0x408bde
0x01c410: MOV SCRATCH, 0
0x01c428: ADD SCRATCH, 0x41ff34
0x01c440: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01c458: MOV EAX, SCRATCH
0x01c470: X86 push edi
0x01c4a0: X86 push edi
0x01c4d0: MOV SCRATCH, 0x000011
0x01c4e8: PUSH SCRATCH
0x01c500: MOV SCRATCH, 0xfffffffe
0x01c518: PUSH SCRATCH
0x01c530: X86JUMPOUT call dword ptr [eax+8h]
0x01c548: MOV SCRATCH, EBP
0x01c578: ADD SCRATCH, 0xfffffff0
0x01c590: MOV EAX, SCRATCH
0x01c5a8: X86 push eax
0x01c5d8: MOV SCRATCH, 0x000004
0x01c5f0: PUSH SCRATCH
0x01c608: MOV SCRATCH, EBP
0x01c638: ADD SCRATCH, 0xfffffffc
0x01c650: MOV EAX, SCRATCH
0x01c668: X86 push eax
0x01c698: MOV SCRATCH, 0
0x01c6b0: ADD SCRATCH, 0x41ff34
0x01c6c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01c6e0: MOV EAX, SCRATCH
0x01c6f8: MOV SCRATCH, 0x000022
0x01c710: PUSH SCRATCH
0x01c728: MOV SCRATCH, 0xffffffff
0x01c740: PUSH SCRATCH
0x01c758: X86JUMPOUT call dword ptr [eax+4h]
0x01c770: X86 test eax, eax
0x01c788: JNZ VM[0x01c950] (fallthrough VM[0x01c7a0])
0x01c7a0: X86 or dword ptr [ebp+0FFFFFFFCh], 30h
0x01c7b8: MOV SCRATCH, 0x000004
0x01c7d0: PUSH SCRATCH
0x01c7e8: MOV SCRATCH, EBP
0x01c818: ADD SCRATCH, 0xfffffffc
0x01c830: MOV EAX, SCRATCH
0x01c848: X86 push eax
0x01c878: MOV SCRATCH, 0
0x01c890: ADD SCRATCH, 0x41ff34
0x01c8a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01c8c0: MOV EAX, SCRATCH
0x01c8d8: MOV SCRATCH, 0x000022
0x01c8f0: PUSH SCRATCH
0x01c908: MOV SCRATCH, 0xffffffff
0x01c920: PUSH SCRATCH
0x01c938: X86JUMPOUT call dword ptr [eax+40h]
0x01c950: X86 push ebx
0x01c980: MOV SCRATCH, EBP
0x01c9b0: ADD SCRATCH, 0xfffff9d0
0x01c9c8: MOV EAX, SCRATCH
0x01c9e0: X86 push edi
0x01ca10: X86 push eax
0x01ca40: X86CALLOUT 0x40ae80
0x01ca58: MOV SCRATCH, 0
0x01ca70: ADD SCRATCH, 0x41ff38
0x01ca88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01caa0: MOV EAX, SCRATCH
0x01cab8: X86 add esp, 0Ch
0x01cad0: MOV SCRATCH, 0x000104
0x01cae8: PUSH SCRATCH
0x01cb00: MOV SCRATCH, EBP
0x01cb30: ADD SCRATCH, 0xfffff9d0
0x01cb48: MOV ECX, SCRATCH
0x01cb60: X86 push ecx
0x01cb90: X86 push edi
0x01cbc0: MOV SCRATCH, EAX
0x01cbf0: ADD SCRATCH, 0x000048
0x01cc08: MOV ESI, SCRATCH
0x01cc20: X86JUMPOUT call dword ptr [eax+78h]
0x01cc38: X86 push eax
0x01cc68: X86JUMPOUT call dword ptr [esi]
0x01cc80: X86 push edi
0x01ccb0: X86 push edi
0x01cce0: MOV SCRATCH, 0x000003
0x01ccf8: PUSH SCRATCH
0x01cd10: X86 push edi
0x01cd40: MOV SCRATCH, 0x000001
0x01cd58: PUSH SCRATCH
0x01cd70: MOV SCRATCH, 0x80000000
0x01cd88: PUSH SCRATCH
0x01cda0: MOV SCRATCH, EBP
0x01cdd0: ADD SCRATCH, 0xfffff9d0
0x01cde8: MOV EAX, SCRATCH
0x01ce00: X86 push eax
0x01ce30: X86CALLOUT 0x408933
0x01ce48: X86 cmp eax, 0FFFFFFFFh
0x01ce60: MOV SCRATCH, 0
0x01ce78: ADD SCRATCH, 0x42035c
0x01ce90: MOV DWORD PTR [SCRATCH], EAX
0x01cea8: JNZ VM[0x01cf08] (fallthrough VM[0x01cec0])
0x01cec0: X86 push edi
0x01cef0: X86CALLOUT 0x408bde
0x01cf08: X86 push edi
0x01cf38: X86 push edi
0x01cf68: X86CALLOUT 0x404f77
0x01cf80: X86 rdtsc
0x01cf98: X86 xor eax, edx
0x01cfb0: X86 and eax, 0FFFFh
0x01cfc8: X86 push ss
0x01cfe0: X86 pop ss
0x01cff8: X86JUMPOUT call eax
0x01d010: X86 push edi
0x01d040: MOV SCRATCH, 0xffffffff
0x01d058: PUSH SCRATCH
0x01d070: X86 push edi
0x01d0a0: X86 push edi
0x01d0d0: X86 push edi
0x01d100: X86JUMPOUT call dword ptr [401054h]
0x01d118: X86 push edi
0x01d148: X86 push edi
0x01d178: X86 push edi
0x01d1a8: X86 push edi
0x01d1d8: X86 push edi
0x01d208: X86JUMPOUT call dword ptr [4010ACh]
0x01d220: X86 push edi
0x01d250: X86CALLOUT 0x408bde
0x01d268: X86 pop edi
0x01d280: X86 pop esi
0x01d298: X86 pop ebx
0x01d2b0: X86 leave
0x01d2c8: X86 ret 4h
0x01d2e0: MOV SCRATCH, EBP
0x01d310: ADD SCRATCH, 0x00000c
0x01d328: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01d340: MOV EAX, SCRATCH
0x01d358: X86 dec eax
0x01d370: JZ VM[0x01daa8] (fallthrough VM[0x01d388])
0x01d388: X86 sub eax, 0Eh
0x01d3a0: JZ VM[0x01d490] (fallthrough VM[0x01d3b8])
0x01d3b8: X86 dec eax
0x01d3d0: JNZ VM[0x01db50] (fallthrough VM[0x01d3e8])
0x01d3e8: X86 push eax
0x01d418: X86JUMPOUT call dword ptr [401084h]
0x01d430: X86 xor eax, eax
0x01d448: X86 pop edi
0x01d460: X86 leave
0x01d478: X86 ret 10h
0x01d490: X86 push ebx
0x01d4c0: X86 push esi
0x01d4f0: MOV SCRATCH, EBP
0x01d520: ADD SCRATCH, 0xffffffc0
0x01d538: MOV EAX, SCRATCH
0x01d550: X86 push eax
0x01d580: MOV SCRATCH, EBP
0x01d5b0: ADD SCRATCH, 0x000008
0x01d5c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01d5e0: PUSH SCRATCH
0x01d5f8: X86JUMPOUT call dword ptr [401080h]
0x01d610: MOV SCRATCH, 0
0x01d628: ADD SCRATCH, 0x40107c
0x01d640: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01d658: MOV ESI, SCRATCH
0x01d670: MOV SCRATCH, 0xcc0020
0x01d688: PUSH SCRATCH
0x01d6a0: X86 xor edi, edi
0x01d6b8: X86 push edi
0x01d6e8: X86 push edi
0x01d718: MOV SCRATCH, 0
0x01d730: ADD SCRATCH, 0x420354
0x01d748: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01d760: PUSH SCRATCH
0x01d778: MOV SCRATCH, EAX
0x01d790: MOV EBX, SCRATCH
0x01d7a8: MOV SCRATCH, 0x000001
0x01d7c0: PUSH SCRATCH
0x01d7d8: X86JUMPOUT call esi
0x01d7f0: X86 push eax
0x01d820: X86 push edi
0x01d850: X86JUMPOUT call esi
0x01d868: X86 push eax
0x01d898: X86 push edi
0x01d8c8: X86 push edi
0x01d8f8: X86 push ebx
0x01d928: X86JUMPOUT call dword ptr [401024h]
0x01d940: MOV SCRATCH, EBP
0x01d970: ADD SCRATCH, 0xffffffc0
0x01d988: MOV EAX, SCRATCH
0x01d9a0: X86 push eax
0x01d9d0: MOV SCRATCH, EBP
0x01da00: ADD SCRATCH, 0x000008
0x01da18: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01da30: PUSH SCRATCH
0x01da48: X86JUMPOUT call dword ptr [401078h]
0x01da60: X86 pop esi
0x01da78: X86 pop ebx
0x01da90: CRASH
0x01daa8: X86 xor edi, edi
0x01dac0: X86 push edi
0x01daf0: X86 push edi
0x01db20: X86JUMPOUT call dword ptr [4010B0h]
0x01db38: CRASH
0x01db50: MOV SCRATCH, EBP
0x01db80: ADD SCRATCH, 0x000014
0x01db98: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01dbb0: PUSH SCRATCH
0x01dbc8: MOV SCRATCH, EBP
0x01dbf8: ADD SCRATCH, 0x000010
0x01dc10: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01dc28: PUSH SCRATCH
0x01dc40: MOV SCRATCH, EBP
0x01dc70: ADD SCRATCH, 0x00000c
0x01dc88: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01dca0: PUSH SCRATCH
0x01dcb8: MOV SCRATCH, EBP
0x01dce8: ADD SCRATCH, 0x000008
0x01dd00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01dd18: PUSH SCRATCH
0x01dd30: X86JUMPOUT call dword ptr [4010A8h]
0x01dd48: CRASH
0x01dd60: X86CALLOUT 0x407fb4
0x01dd78: X86 mov eax, dword ptr fs:[30h]
0x01dd90: MOV SCRATCH, EAX
0x01ddc0: ADD SCRATCH, 0x00000c
0x01ddd8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01ddf0: MOV EAX, SCRATCH
0x01de08: MOV SCRATCH, EAX
0x01de38: ADD SCRATCH, 0x00001c
0x01de50: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01de68: MOV EAX, SCRATCH
0x01de80: MOV SCRATCH, EAX
0x01deb0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01dec8: MOV ESI, SCRATCH
0x01dee0: X86 xor ebx, ebx
0x01def8: MOV SCRATCH, 0x7fbc7431
0x01df10: PUSH SCRATCH
0x01df28: MOV SCRATCH, ESI
0x01df58: ADD SCRATCH, 0x000008
0x01df70: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01df88: PUSH SCRATCH
0x01dfa0: X86CALLOUT 0x407ff5
0x01dfb8: MOV SCRATCH, EAX
0x01dfd0: MOV EDI, SCRATCH
0x01dfe8: X86 cmp edi, ebx
0x01e000: JNZ VM[0x01e090] (fallthrough VM[0x01e018])
0x01e018: MOV SCRATCH, ESI
0x01e048: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e060: MOV ESI, SCRATCH
0x01e078: CRASH
0x01e090: MOV SCRATCH, ESI
0x01e0c0: ADD SCRATCH, 0x000008
0x01e0d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e0f0: MOV ESI, SCRATCH
0x01e108: MOV SCRATCH, 0x000098
0x01e120: PUSH SCRATCH
0x01e138: MOV SCRATCH, 0x000040
0x01e150: PUSH SCRATCH
0x01e168: X86JUMPOUT call edi
0x01e180: MOV SCRATCH, 0xc97c1fff
0x01e198: PUSH SCRATCH
0x01e1b0: MOV SCRATCH, 0
0x01e1c8: ADD SCRATCH, 0x41ff38
0x01e1e0: MOV DWORD PTR [SCRATCH], EAX
0x01e1f8: X86 push esi
0x01e228: MOV SCRATCH, EAX
0x01e258: ADD SCRATCH, 0x00008c
0x01e270: MOV DWORD PTR [SCRATCH], EDI
0x01e288: X86CALLOUT 0x407ff5
0x01e2a0: MOV SCRATCH, 0
0x01e2b8: ADD SCRATCH, 0x41ff38
0x01e2d0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e2e8: MOV ECX, SCRATCH
0x01e300: MOV SCRATCH, 0x4552d021
0x01e318: PUSH SCRATCH
0x01e330: X86 push esi
0x01e360: MOV SCRATCH, ECX
0x01e390: ADD SCRATCH, 0x000088
0x01e3a8: MOV DWORD PTR [SCRATCH], EAX
0x01e3c0: X86CALLOUT 0x407ff5
0x01e3d8: MOV SCRATCH, 0
0x01e3f0: ADD SCRATCH, 0x41ff38
0x01e408: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e420: MOV ECX, SCRATCH
0x01e438: MOV SCRATCH, ECX
0x01e468: ADD SCRATCH, 0x000078
0x01e480: MOV DWORD PTR [SCRATCH], EAX
0x01e498: MOV SCRATCH, 0
0x01e4b0: ADD SCRATCH, 0x41ff38
0x01e4c8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e4e0: MOV ESI, SCRATCH
0x01e4f8: MOV SCRATCH, 0xcb1508dc
0x01e510: PUSH SCRATCH
0x01e528: MOV SCRATCH, EBP
0x01e558: ADD SCRATCH, 0xfffff77c
0x01e570: MOV EAX, SCRATCH
0x01e588: X86 push eax
0x01e5b8: X86 add esi, 78h
0x01e5d0: X86CALLOUT 0x401617
0x01e5e8: X86 push eax
0x01e618: X86JUMPOUT call dword ptr [esi]
0x01e630: X86 push eax
0x01e660: X86CALLOUT 0x407ff5
0x01e678: MOV SCRATCH, 0
0x01e690: ADD SCRATCH, 0x41ff38
0x01e6a8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e6c0: MOV ECX, SCRATCH
0x01e6d8: MOV SCRATCH, ECX
0x01e708: ADD SCRATCH, 0x00006c
0x01e720: MOV DWORD PTR [SCRATCH], EAX
0x01e738: MOV SCRATCH, 0
0x01e750: ADD SCRATCH, 0x41ff38
0x01e768: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e780: MOV ESI, SCRATCH
0x01e798: MOV SCRATCH, 0xe058bb45
0x01e7b0: PUSH SCRATCH
0x01e7c8: MOV SCRATCH, EBP
0x01e7f8: ADD SCRATCH, 0xfffff77c
0x01e810: MOV EAX, SCRATCH
0x01e828: X86 push eax
0x01e858: X86 add esi, 6Ch
0x01e870: X86CALLOUT 0x401617
0x01e888: X86 push eax
0x01e8b8: X86JUMPOUT call dword ptr [esi]
0x01e8d0: X86 push eax
0x01e900: X86CALLOUT 0x407ff5
0x01e918: MOV SCRATCH, 0
0x01e930: ADD SCRATCH, 0x41ff38
0x01e948: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01e960: MOV ECX, SCRATCH
0x01e978: MOV SCRATCH, ECX
0x01e9a8: ADD SCRATCH, 0x000068
0x01e9c0: MOV DWORD PTR [SCRATCH], EAX
0x01e9d8: MOV SCRATCH, 0
0x01e9f0: ADD SCRATCH, 0x41ff38
0x01ea08: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01ea20: MOV ESI, SCRATCH
0x01ea38: MOV SCRATCH, 0xff808c10
0x01ea50: PUSH SCRATCH
0x01ea68: MOV SCRATCH, EBP
0x01ea98: ADD SCRATCH, 0xfffff77c
0x01eab0: MOV EAX, SCRATCH
0x01eac8: X86 push eax
0x01eaf8: X86 add esi, 6Ch
0x01eb10: X86CALLOUT 0x401617
0x01eb28: X86 push eax
0x01eb58: X86JUMPOUT call dword ptr [esi]
0x01eb70: X86 push eax
0x01eba0: X86CALLOUT 0x407ff5
0x01ebb8: MOV SCRATCH, 0
0x01ebd0: ADD SCRATCH, 0x41ff38
0x01ebe8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01ec00: MOV ECX, SCRATCH
0x01ec18: MOV SCRATCH, 0
0x01ec30: ADD SCRATCH, 0x40105c
0x01ec48: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01ec60: MOV ESI, SCRATCH
0x01ec78: MOV SCRATCH, ECX
0x01eca8: ADD SCRATCH, 0x000004
0x01ecc0: MOV DWORD PTR [SCRATCH], EAX
0x01ecd8: MOV SCRATCH, 0x000005
0x01ecf0: PUSH SCRATCH
0x01ed08: X86 pop ecx
0x01ed20: MOV SCRATCH, 0x000010
0x01ed38: PUSH SCRATCH
0x01ed50: MOV SCRATCH, EBP
0x01ed80: ADD SCRATCH, 0xffffffe8
0x01ed98: MOV EAX, SCRATCH
0x01edb0: MOV SCRATCH, EBP
0x01ede0: ADD SCRATCH, 0xffffffe8
0x01edf8: MOV EDI, SCRATCH
0x01ee10: X86 [rep] movsd dword ptr [esi], dword ptr es:[edi]
0x01ee28: X86 push eax
0x01ee58: X86 mov byte ptr [ebp+0FFFFFFEAh], bl
0x01ee70: X86 mov byte ptr [ebp+0FFFFFFE9h], bl
0x01ee88: X86CALLOUT 0x407ec9
0x01eea0: X86 cmp eax, 530BF41Dh
0x01eeb8: JNZ VM[0x01ef00] (fallthrough VM[0x01eed0])
0x01eed0: X86 xor eax, eax
0x01eee8: CRASH
0x01ef00: X86 mov eax, dword ptr fs:[30h]
0x01ef18: MOV SCRATCH, 0
0x01ef30: ADD SCRATCH, 0x42034c
0x01ef48: MOV DWORD PTR [SCRATCH], EAX
0x01ef60: MOV SCRATCH, EAX
0x01ef90: ADD SCRATCH, 0x000008
0x01efa8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01efc0: MOV EAX, SCRATCH
0x01efd8: MOV SCRATCH, 0x000030
0x01eff0: PUSH SCRATCH
0x01f008: MOV SCRATCH, 0
0x01f020: ADD SCRATCH, 0x42034c
0x01f038: MOV DWORD PTR [SCRATCH], EAX
0x01f050: MOV SCRATCH, EBP
0x01f080: ADD SCRATCH, 0xffffffb8
0x01f098: MOV EAX, SCRATCH
0x01f0b0: X86 push ebx
0x01f0e0: X86 push eax
0x01f110: X86CALLOUT 0x40ae80
0x01f128: X86 mov edi, 208h
0x01f140: X86 push edi
0x01f170: MOV SCRATCH, EBP
0x01f1a0: ADD SCRATCH, 0xfffffb8c
0x01f1b8: MOV EAX, SCRATCH
0x01f1d0: X86 push ebx
0x01f200: X86 push eax
0x01f230: X86CALLOUT 0x40ae80
0x01f248: MOV SCRATCH, 0
0x01f260: ADD SCRATCH, 0x41ff38
0x01f278: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01f290: MOV ESI, SCRATCH
0x01f2a8: X86 add esp, 18h
0x01f2c0: MOV SCRATCH, 0x839a7905
0x01f2d8: PUSH SCRATCH
0x01f2f0: MOV SCRATCH, EBP
0x01f320: ADD SCRATCH, 0xfffff77c
0x01f338: MOV EAX, SCRATCH
0x01f350: X86 push eax
0x01f380: X86 add esi, 6Ch
0x01f398: X86CALLOUT 0x401617
0x01f3b0: X86 push eax
0x01f3e0: X86JUMPOUT call dword ptr [esi]
0x01f3f8: X86 push eax
0x01f428: X86CALLOUT 0x407ff5
0x01f440: MOV SCRATCH, 0x000001
0x01f458: PUSH SCRATCH
0x01f470: X86JUMPOUT call eax
0x01f488: MOV SCRATCH, 0x000410
0x01f4a0: PUSH SCRATCH
0x01f4b8: MOV SCRATCH, EBP
0x01f4e8: ADD SCRATCH, 0xfffff36c
0x01f500: MOV EAX, SCRATCH
0x01f518: X86 push ebx
0x01f548: X86 push eax
0x01f578: X86CALLOUT 0x40ae80
0x01f590: X86 add esp, 0Ch
0x01f5a8: MOV SCRATCH, 0x000030
0x01f5c0: PUSH SCRATCH
0x01f5d8: X86 pop esi
0x01f5f0: X86 mov word ptr [ebp+0FFFFFB8Ch], 25h
0x01f608: X86 mov word ptr [ebp+0FFFFFB8Eh], 2Eh
0x01f620: X86 mov word ptr [ebp+0FFFFFB90h], si
0x01f638: X86 mov word ptr [ebp+0FFFFFB92h], 38h
0x01f650: X86 mov word ptr [ebp+0FFFFFB94h], 78h
0x01f668: X86 mov word ptr [ebp+0FFFFFB96h], bx
0x01f680: X86JUMPOUT call dword ptr [40105Ch]
0x01f698: X86 push eax
0x01f6c8: MOV SCRATCH, EBP
0x01f6f8: ADD SCRATCH, 0xfffffb8c
0x01f710: MOV EAX, SCRATCH
0x01f728: X86 push eax
0x01f758: MOV SCRATCH, EBP
0x01f788: ADD SCRATCH, 0xfffff36c
0x01f7a0: MOV EAX, SCRATCH
0x01f7b8: MOV SCRATCH, 0x000104
0x01f7d0: PUSH SCRATCH
0x01f7e8: X86 push eax
0x01f818: X86JUMPOUT call dword ptr [4010F8h]
0x01f830: X86 push edi
0x01f860: MOV SCRATCH, EBP
0x01f890: ADD SCRATCH, 0xfffffb8c
0x01f8a8: MOV EAX, SCRATCH
0x01f8c0: X86 push ebx
0x01f8f0: X86 push eax
0x01f920: X86CALLOUT 0x40ae80
0x01f938: MOV SCRATCH, 0
0x01f950: ADD SCRATCH, 0x42034c
0x01f968: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01f980: MOV EAX, SCRATCH
0x01f998: X86 add esp, 1Ch
0x01f9b0: MOV SCRATCH, 0x007f00
0x01f9c8: PUSH SCRATCH
0x01f9e0: X86 push ebx
0x01fa10: MOV SCRATCH, EBP
0x01fa40: ADD SCRATCH, 0xffffffb8
0x01fa58: MOV DWORD PTR [SCRATCH], ESI
0x01fa70: MOV SCRATCH, EBP
0x01faa0: ADD SCRATCH, 0xffffffbc
0x01fab8: MOV DWORD PTR [SCRATCH], EBX
0x01fad0: X86 mov dword ptr [ebp+0FFFFFFC0h], 4060B3h
0x01fae8: MOV SCRATCH, EBP
0x01fb18: ADD SCRATCH, 0xffffffc4
0x01fb30: MOV DWORD PTR [SCRATCH], EBX
0x01fb48: MOV SCRATCH, EBP
0x01fb78: ADD SCRATCH, 0xffffffc8
0x01fb90: MOV DWORD PTR [SCRATCH], EBX
0x01fba8: MOV SCRATCH, EBP
0x01fbd8: ADD SCRATCH, 0xffffffcc
0x01fbf0: MOV DWORD PTR [SCRATCH], EAX
0x01fc08: X86JUMPOUT call dword ptr [401074h]
0x01fc20: MOV SCRATCH, EBP
0x01fc50: ADD SCRATCH, 0xffffffd4
0x01fc68: MOV DWORD PTR [SCRATCH], EAX
0x01fc80: MOV SCRATCH, EBP
0x01fcb0: ADD SCRATCH, 0xfffff36c
0x01fcc8: MOV EAX, SCRATCH
0x01fce0: MOV SCRATCH, 0xb3c27a4d
0x01fcf8: PUSH SCRATCH
0x01fd10: X86 mov dword ptr [ebp+0FFFFFFD8h], 6h
0x01fd28: MOV SCRATCH, EBP
0x01fd58: ADD SCRATCH, 0xffffffe0
0x01fd70: MOV DWORD PTR [SCRATCH], EAX
0x01fd88: X86CALLOUT 0x409edc
0x01fda0: X86 test eax, eax
0x01fdb8: JNZ VM[0x020070] (fallthrough VM[0x01fdd0])
0x01fdd0: MOV SCRATCH, 0
0x01fde8: ADD SCRATCH, 0x41ff38
0x01fe00: MOV SCRATCH, DWORD PTR [SCRATCH]
0x01fe18: MOV EAX, SCRATCH
0x01fe30: X86 push ebx
0x01fe60: X86 push ebx
0x01fe90: X86 push ebx
0x01fec0: MOV SCRATCH, 0x405bc4
0x01fed8: PUSH SCRATCH
0x01fef0: X86 push ebx
0x01ff20: X86 push ebx
0x01ff50: MOV SCRATCH, 0xffffffff
0x01ff68: PUSH SCRATCH
0x01ff80: X86JUMPOUT call dword ptr [eax+4h]
0x01ff98: MOV SCRATCH, 0xffffffff
0x01ffb0: PUSH SCRATCH
0x01ffc8: X86 push eax
0x01fff8: MOV SCRATCH, 0
0x020010: ADD SCRATCH, 0x41ff38
0x020028: MOV SCRATCH, DWORD PTR [SCRATCH]
0x020040: MOV EAX, SCRATCH
0x020058: X86JUMPOUT call dword ptr [eax+68h]
0x020070: MOV SCRATCH, EBP
0x0200a0: ADD SCRATCH, 0xfffffd94
0x0200b8: MOV EAX, SCRATCH
0x0200d0: X86 push eax
0x020100: MOV SCRATCH, 0
0x020118: ADD SCRATCH, 0x41ff38
0x020130: MOV SCRATCH, DWORD PTR [SCRATCH]
0x020148: MOV EAX, SCRATCH
0x020160: X86 mov word ptr [ebp+0FFFFFD94h], 67h
0x020178: X86 mov word ptr [ebp+0FFFFFD96h], 64h
0x020190: X86 mov word ptr [ebp+0FFFFFD98h], 69h
0x0201a8: X86 mov word ptr [ebp+0FFFFFD9Ah], 33h
0x0201c0: X86 mov word ptr [ebp+0FFFFFD9Ch], 32h
0x0201d8: X86 mov word ptr [ebp+0FFFFFD9Eh], 2Eh
0x0201f0: X86 mov word ptr [ebp+0FFFFFDA0h], 64h
0x020208: X86 mov word ptr [ebp+0FFFFFDA2h], 6Ch
0x020220: X86 mov word ptr [ebp+0FFFFFDA4h], 6Ch
0x020238: X86 mov word ptr [ebp+0FFFFFDA6h], bx
0x020250: X86JUMPOUT call dword ptr [eax+6Ch]
0x020268: X86 push ebx
0x020298: X86JUMPOUT call dword ptr [401070h]
0x0202b0: X86 push eax
0x0202e0: MOV SCRATCH, EBP
0x020310: ADD SCRATCH, 0xfffffffc
0x020328: MOV DWORD PTR [SCRATCH], EAX
0x020340: X86JUMPOUT call dword ptr [401018h]
0x020358: MOV SCRATCH, 0
0x020370: ADD SCRATCH, 0x40107c
0x020388: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0203a0: MOV ESI, SCRATCH
0x0203b8: MOV SCRATCH, 0x000001
0x0203d0: PUSH SCRATCH
0x0203e8: MOV SCRATCH, 0
0x020400: ADD SCRATCH, 0x420354
0x020418: MOV DWORD PTR [SCRATCH], EAX
0x020430: X86JUMPOUT call esi
0x020448: X86 push eax
0x020478: X86 push ebx
0x0204a8: X86JUMPOUT call esi
0x0204c0: X86 push eax
0x0204f0: MOV SCRATCH, EBP
0x020520: ADD SCRATCH, 0xfffffffc
0x020538: MOV SCRATCH, DWORD PTR [SCRATCH]
0x020550: PUSH SCRATCH
0x020568: X86JUMPOUT call dword ptr [40101Ch]
0x020580: X86 push eax
0x0205b0: MOV SCRATCH, 0
0x0205c8: ADD SCRATCH, 0x420354
0x0205e0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0205f8: PUSH SCRATCH
0x020610: X86JUMPOUT call dword ptr [401020h]
0x020628: MOV SCRATCH, 0xcc0020
0x020640: PUSH SCRATCH
0x020658: X86 push ebx
0x020688: X86 push ebx
0x0206b8: MOV SCRATCH, EBP
0x0206e8: ADD SCRATCH, 0xfffffffc
0x020700: MOV SCRATCH, DWORD PTR [SCRATCH]
0x020718: PUSH SCRATCH
0x020730: MOV SCRATCH, 0x000001
0x020748: PUSH SCRATCH
0x020760: X86JUMPOUT call esi
0x020778: X86 push eax
0x0207a8: X86 push ebx
0x0207d8: X86JUMPOUT call esi
0x0207f0: X86 push eax
0x020820: X86 push ebx
0x020850: X86 push ebx
0x020880: MOV SCRATCH, 0
0x020898: ADD SCRATCH, 0x420354
0x0208b0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0208c8: PUSH SCRATCH
0x0208e0: X86JUMPOUT call dword ptr [401024h]
0x0208f8: MOV SCRATCH, EBP
0x020928: ADD SCRATCH, 0xfffffffc
0x020940: MOV SCRATCH, DWORD PTR [SCRATCH]
0x020958: PUSH SCRATCH
0x020970: X86 push ebx
0x0209a0: X86JUMPOUT call dword ptr [4010B4h]
0x0209b8: MOV SCRATCH, EBP
0x0209e8: ADD SCRATCH, 0xffffffb8
0x020a00: MOV EAX, SCRATCH
0x020a18: X86 push eax
0x020a48: X86JUMPOUT call dword ptr [4010A4h]
0x020a60: X86 push edi
0x020a90: MOV SCRATCH, EBP
0x020ac0: ADD SCRATCH, 0xfffff984
0x020ad8: MOV EAX, SCRATCH
0x020af0: X86 push ebx
0x020b20: X86 push eax
0x020b50: X86CALLOUT 0x40ae80
0x020b68: X86 add esp, 0Ch
0x020b80: X86 push ebx
0x020bb0: MOV SCRATCH, 0
0x020bc8: ADD SCRATCH, 0x42034c
0x020be0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x020bf8: PUSH SCRATCH
0x020c10: X86 mov word ptr [ebp+0FFFFF984h], 3Ch
0x020c28: X86 push ebx
0x020c58: X86 push ebx
0x020c88: MOV SCRATCH, 0x000001
0x020ca0: PUSH SCRATCH
0x020cb8: X86 mov word ptr [ebp+0FFFFF986h], 75h
0x020cd0: X86 mov word ptr [ebp+0FFFFF988h], 6Eh
0x020ce8: X86 mov word ptr [ebp+0FFFFF98Ah], 3Eh
0x020d00: X86JUMPOUT call esi
0x020d18: X86 push eax
0x020d48: X86 push ebx
0x020d78: X86JUMPOUT call esi
0x020d90: X86 push eax
0x020dc0: X86 push ebx
0x020df0: X86 push ebx
0x020e20: MOV SCRATCH, 0x80000000
0x020e38: PUSH SCRATCH
0x020e50: MOV SCRATCH, EBP
0x020e80: ADD SCRATCH, 0xfffff984
0x020e98: MOV EAX, SCRATCH
0x020eb0: X86 push eax
0x020ee0: MOV SCRATCH, EBP
0x020f10: ADD SCRATCH, 0xfffff36c
0x020f28: MOV EAX, SCRATCH
0x020f40: X86 push eax
0x020f70: MOV SCRATCH, 0x000008
0x020f88: PUSH SCRATCH
0x020fa0: X86JUMPOUT call dword ptr [4010A0h]
0x020fb8: MOV SCRATCH, EAX
0x020fd0: MOV ESI, SCRATCH
0x020fe8: MOV SCRATCH, 0x000005
0x021000: PUSH SCRATCH
0x021018: X86 push esi
0x021048: X86JUMPOUT call dword ptr [40109Ch]
0x021060: X86 push esi
0x021090: X86JUMPOUT call dword ptr [401098h]
0x0210a8: MOV SCRATCH, 0
0x0210c0: ADD SCRATCH, 0x41ff38
0x0210d8: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0210f0: MOV EAX, SCRATCH
0x021108: X86 push ebx
0x021138: X86 push ebx
0x021168: X86 push ebx
0x021198: MOV SCRATCH, 0x405bc4
0x0211b0: PUSH SCRATCH
0x0211c8: X86 push ebx
0x0211f8: X86 push ebx
0x021228: MOV SCRATCH, 0xffffffff
0x021240: PUSH SCRATCH
0x021258: X86JUMPOUT call dword ptr [eax+4h]
0x021270: MOV SCRATCH, 0
0x021288: ADD SCRATCH, 0x401094
0x0212a0: MOV SCRATCH, DWORD PTR [SCRATCH]
0x0212b8: MOV ESI, SCRATCH
0x0212d0: MOV SCRATCH, EAX
0x0212e8: MOV EDI, SCRATCH
0x021300: CRASH
0x021318: MOV SCRATCH, EBP
0x021348: ADD SCRATCH, 0xffffff9c
0x021360: MOV EAX, SCRATCH
0x021378: X86 push eax
0x0213a8: X86JUMPOUT call dword ptr [401090h]
0x0213c0: MOV SCRATCH, EBP
0x0213f0: ADD SCRATCH, 0xffffff9c
0x021408: MOV EAX, SCRATCH
0x021420: X86 push eax