![]() ![]() ![]() Which is directly followed by "cmp eax, ebp" and "je 0000000100007352h". ( Show Stream)įound API call (Target: "Netflix Cracker Coded By EVG " Stream UID: "32170001000070BC") See related instructions: ".+59 lea rcx, qword ptr +60 lea ecx, dword ptr +64 xor edi, edi+66 mov dword ptr, 00000094h+74 mov dword ptr, edi+80 call qword ptr GetVersionExA+86 cmp eax, edi+88 je 00000001000083C6h". Which is directly followed by "cmp eax, edi" and "je 00000001000083C6h". ![]() ( Show Stream)įound API call (Target: "Netflix Cracker Coded By EVG " Stream UID: "3217000100008254") See related instructions: ".+663 lea rax, qword ptr +664 lea eax, dword ptr +668 lea r9, qword ptr +669 lea ecx, dword ptr +673 lea r8, qword ptr +674 lea eax, dword ptr +678 lea rdx, qword ptr +679 lea edx, dword ptr +683 lea rcx, qword ptr +684 lea ecx, dword ptr +688 mov qword ptr, rax+689 mov dword ptr, eax+693 call qword ptr GetDiskFreeSpaceA+699 cmp eax, ebx+701 je 0000000100006D63h". Which is directly followed by "cmp eax, ebx" and "je 0000000100006D63h". Found API call (Target: "Netflix Cracker Coded By EVG " Stream UID: "3217000100006A80")
0 Comments
Leave a Reply. |