0x423132: 8CC9 MOV CX,CS 0x423134: 32C9 XOR CL,CL 0x423136: 83F900 CMP ECX,0x0 0x423139: 0F84A1130000 JE 0x4244E0 0x42313F: 8B4638 MOV EAX,DWORD PTR [ESI+0x38] 0x423142: 8078014C CMP BYTE PTR [EAX+0x1],0x4C 0x423146: 0F8594130000 JNE 0x4244E0 0x42314C: E800000000 CALL 0x423151 0x423151: 8104246E130000 ADD DWORD PTR [ESP],0x136E ; see following code fragment 0x423158: 59 POP ECX 0x423159: 64FF3500000000 PUSH DWORD PTR [DWORD PTR FS:[0x0] 0x423160: 8B4638 MOV EAX,DWORD PTR [ESI+0x38] 0x423163: 8B400B MOV EAX,DWORD PTR [EAX+0xB] 0x423166: 8908 MOV DWORD PTR [EAX],ECX 0x423168: EB05 JMP 0x42316F ; leads to divide by zero 0x423B0F: 33DB XOR EBX,EBX 0x423B11: F7F3 DIV EBX disassembly at 0x00423151 + 0x136E 0x4244BF: 8B442404 MOV EAX,DWORD PTR [ESP+0x4] 0x4244C3: 8B4004 MOV EAX,DWORD PTR [EAX+0x4] 0x4244C6: E800000000 CALL 0x4244CB 0x4244CB: 5B POP EBX 0x4244CC: 81C315000000 ADD EBX,0x15 0x4244D2: 8998B8000000 MOV DWORD PTR [EAX+0xB8],EBX 0x4244D8: B8FFFFFFFF MOV EAX,0xFFFFFFFF 0x4244DD: C20400 RET 0x4 0x424E87: E800000000 CALL 0x424E8C 0x424E8C: 58 POP EAX 0x424E8D: 2DE2BD0000 SUB EAX,0xBDE2 0x424E92: B000 MOV AL,0x0 0x424E94: 0500200100 ADD EAX,0x12000 0x424E99: 8BF0 MOV ESI,EAX 0x424E9B: 807E0C00 CMP BYTE PTR [ESI+0xC],0x0 0x424E9F: 7451 JE 0x424EF2 0x424EA1: 6A00 PUSH 0x0 0x424EA3: FF5650 CALL DWORD PTR [ESI+0x50] 0x424EA6: 50 PUSH EAX 0x424EA7: 8BD8 MOV EBX,EAX 0x424EA9: 8B403C MOV EAX,DWORD PTR [EAX+0x3C] 0x424EAC: 03C3 ADD EAX,EBX 0x424EAE: 8D9800010000 LEA EBX,DWORD PTR [EAX+0x100] 0x424EB4: 8B1B MOV EBX,DWORD PTR [EBX] 0x424EB6: 58 POP EAX 0x424EB7: 03D8 ADD EBX,EAX 0x424EB9: 0500100000 ADD EAX,0x1000 0x424EBE: 8BF8 MOV EDI,EAX 0x424EC0: 81EBFF000000 SUB EBX,0xFF 0x424EC6: B910270000 MOV ECX,0x2710 0x424ECB: 0F31 RDTSC 0x424ECD: C1E818 SHR EAX,0x18 0x424ED0: 03F8 ADD EDI,EAX 0x424ED2: 3007 XOR DWORD PTR [EDI],AL 0x424ED4: 3BFB CMP EDI,EBX 0x424ED6: 7D03 JGE 0x424EDB 0x424ED8: 49 DEC ECX 0x424ED9: 75F0 JNZ 0x424ECB 0x424EDB: 50 PUSH EAX 0x424EDC: E802000000 CALL 0x424EE3 0x424EE1: 295A58 SUB DWORD PTR [EDX+0x58],EBX 0x424EE4: 6BC003 IMUL EAX,EAX,0x3 0x424EE7: E802000000 CALL 0x424EEE 0x424EEC: 295A83 SUB DWORD PTR [EDX-0x7D],EBX 0x424EEF: C40458 LES EAX,FWORD PTR [EAX+EBX*2] 0x424EF2: 807E0D00 CMP BYTE PTR [ESI+0xD],0x0 0x424EF6: 0F85AF41FFFF JNE 0x4190AB 0x424EFC: 7404 JE 0x424F02