Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
class label
2 classes
Disassembly
stringlengths
16
68.6k
Dirname
stringlengths
16
28
Exename
stringclasses
17 values
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x40295a
___scrt_get_show_window_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 44 ?? sub esp, 0x44<68> 6a 44 ?? push 0x44<68> 8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>] 6a 00 ?? push 0 50 ?? push eax e8 6d 03 00 00 ?? call function 0x00402cda L2: 83 c4 0c ?? add esp, 12 8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>] 50 ?? push eax ff 15 00 30 40 00 ?? call dword ds:[0x00403000<"DA@">] L3: f6 45 e8 01 ?? test byte ss:[ebp + 0xe8<232,-24>], 1 74 06 ?? je basic block L5 L4: 0f b7 45 ec ?? movzx eax, word ss:[ebp + 0xec<236,-20>] c9 ?? leave c3 ?? ret L5: 6a 0a ?? push 10 58 ?? pop eax c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402990
___scrt_initialize_winrt
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x4029d5
___scrt_set_unhandled_exception_filter
0func
L1: 68 e4 29 40 00 ?? push function 0x004029e4 ff 15 04 30 40 00 ?? call dword ds:[0x00403004<"X@@">] L2: c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x4029e1
___scrt_stub_for_initialize_mta
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x4029e4
___scrt_unhandled_exception_filter@4
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 57 ?? push edi 8b 7d 08 ?? mov edi, dword ss:[ebp + 8] 8b 37 ?? mov esi, dword ds:[edi] 81 3e 63 73 6d e0 ?? cmp dword ds:[esi], 0xe06d7363 75 25 ?? jne basic block L7 L2: 83 7e 10 03 ?? cmp dword ds:[esi + 0x10<16>], 3 75 1f ?? jne basic block L7 L3: 8b 46 14 ?? mov eax, dword ds:[esi + 0x14<20>] 3d 20 05 93 19 ?? cmp eax, 0x19930520 74 1d ?? je basic block L8 L4: 3d 21 05 93 19 ?? cmp eax, 0x19930521 74 16 ?? je basic block L8 L5: 3d 22 05 93 19 ?? cmp eax, 0x19930522 74 0f ?? je basic block L8 L6: 3d 00 40 99 01 ?? cmp eax, 0x01994000 74 08 ?? je basic block L8 L7: 5f ?? pop edi 33 c0 ?? xor eax, eax 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4 L8: e8 88 02 00 00 ?? call function 0x00402cb0 L9: 89 30 ?? mov dword ds:[eax], esi 8b 77 04 ?? mov esi, dword ds:[edi + 4] e8 84 02 00 00 ?? call function 0x00402cb6 L10: 89 30 ?? mov dword ds:[eax], esi e8 b9 02 00 00 ?? call function 0x00402cf2 L11: cc ?? int3
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402a3a
__crt_debugger_hook
0func
L1: 83 25 f8 53 40 00 00 ?? and dword ds:[0x004053f8], 0 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402a42
__RTC_Initialize
0func
L1: 53 ?? push ebx 56 ?? push esi be d8 38 40 00 ?? mov esi, 0x004038d8 bb d8 38 40 00 ?? mov ebx, 0x004038d8 3b f3 ?? cmp esi, ebx 73 19 ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 f4 30 40 00 ?? call dword ds:[0x004030f4<"c!@">] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 3b f3 ?? cmp esi, ebx 72 e9 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi 5b ?? pop ebx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402a6e
__RTC_Terminate
0func
L1: 53 ?? push ebx 56 ?? push esi be e0 38 40 00 ?? mov esi, 0x004038e0 bb e0 38 40 00 ?? mov ebx, 0x004038e0 3b f3 ?? cmp esi, ebx 73 19 ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 f4 30 40 00 ?? call dword ds:[0x004030f4<"c!@">] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 3b f3 ?? cmp esi, ebx 72 e9 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi 5b ?? pop ebx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402a9a
??1type_info@@UAE@XZ
1method
L1: c7 01 a0 31 40 00 ?? mov dword ds:[ecx], 0x004031a0 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402aa1
??_Etype_info@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 a0 31 40 00 ?? mov dword ds:[esi], 0x004031a0 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 dd ed ff ff ?? call function 0x00401898 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402aa1
??_Gtype_info@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 a0 31 40 00 ?? mov dword ds:[esi], 0x004031a0 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 dd ed ff ff ?? call function 0x00401898 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402ac4
___isa_available_init
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 25 fc 53 40 00 00 ?? and dword ds:[0x004053fc], 0 83 ec 24 ?? sub esp, 0x24<36> 83 0d 18 50 40 00 01 ?? or dword ds:[0x00405018], 1 6a 0a ?? push 10 ff 15 10 30 40 00 ?? call dword ds:[0x00403010] L2: 85 c0 ?? test eax, eax 0f 84 ac 01 00 00 ?? je basic block L25 L3: 83 65 f0 00 ?? and dword ss:[ebp + 0xf0<240,-16>], 0 33 c0 ?? xor eax, eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi 33 c9 ?? xor ecx, ecx 8d 7d dc ?? lea edi, ss:[ebp + 0xdc<220,-36>] 53 ?? push ebx 0f a2 ?? cpuid 8b f3 ?? mov esi, ebx 5b ?? pop ebx 90 ?? nop 89 07 ?? mov dword ds:[edi], eax 89 77 04 ?? mov dword ds:[edi + 4], esi 89 4f 08 ?? mov dword ds:[edi + 8], ecx 33 c9 ?? xor ecx, ecx 89 57 0c ?? mov dword ds:[edi + 12], edx 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>] 8b 7d e0 ?? mov edi, dword ss:[ebp + 0xe0<224,-32>] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 81 f7 47 65 6e 75 ?? xor edi, 0x756e6547 8b 45 e8 ?? mov eax, dword ss:[ebp + 0xe8<232,-24>] 35 69 6e 65 49 ?? xor eax, 0x49656e69 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 e4 ?? mov eax, dword ss:[ebp + 0xe4<228,-28>] 35 6e 74 65 6c ?? xor eax, 0x6c65746e 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 33 c0 ?? xor eax, eax 40 ?? inc eax 53 ?? push ebx 0f a2 ?? cpuid 8b f3 ?? mov esi, ebx 5b ?? pop ebx 90 ?? nop 8d 5d dc ?? lea ebx, ss:[ebp + 0xdc<220,-36>] 89 03 ?? mov dword ds:[ebx], eax 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 0b 45 f8 ?? or eax, dword ss:[ebp + 0xf8<248,-8>] 0b c7 ?? or eax, edi 89 73 04 ?? mov dword ds:[ebx + 4], esi 89 4b 08 ?? mov dword ds:[ebx + 8], ecx 89 53 0c ?? mov dword ds:[ebx + 12], edx 75 43 ?? jne basic block L11 L4: 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>] 25 f0 3f ff 0f ?? and eax, 0x0fff3ff0 3d c0 06 01 00 ?? cmp eax, 0x000106c0 74 23 ?? je basic block L10 L5: 3d 60 06 02 00 ?? cmp eax, 0x00020660 74 1c ?? je basic block L10 L6: 3d 70 06 02 00 ?? cmp eax, 0x00020670 74 15 ?? je basic block L10 L7: 3d 50 06 03 00 ?? cmp eax, 0x00030650 74 0e ?? je basic block L10 L8: 3d 60 06 03 00 ?? cmp eax, 0x00030660 74 07 ?? je basic block L10 L9: 3d 70 06 03 00 ?? cmp eax, 0x00030670 75 11 ?? jne basic block L11 L10: 8b 3d 00 54 40 00 ?? mov edi, dword ds:[0x00405400] 83 cf 01 ?? or edi, 1 89 3d 00 54 40 00 ?? mov dword ds:[0x00405400], edi eb 06 ?? jmp basic block L12 L11: 8b 3d 00 54 40 00 ?? mov edi, dword ds:[0x00405400] L12: 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 6a 07 ?? push 7 58 ?? pop eax 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 39 45 f4 ?? cmp dword ss:[ebp + 0xf4<244,-12>], eax 7c 30 ?? jl basic block L15 L13: 33 c9 ?? xor ecx, ecx 53 ?? push ebx 0f a2 ?? cpuid 8b f3 ?? mov esi, ebx 5b ?? pop ebx 90 ?? nop 8d 5d dc ?? lea ebx, ss:[ebp + 0xdc<220,-36>] 89 03 ?? mov dword ds:[ebx], eax 89 73 04 ?? mov dword ds:[ebx + 4], esi 89 4b 08 ?? mov dword ds:[ebx + 8], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 53 0c ?? mov dword ds:[ebx + 12], edx 8b 5d e0 ?? mov ebx, dword ss:[ebp + 0xe0<224,-32>] f7 c3 00 02 00 00 ?? test ebx, 0x00000200<512> 74 0e ?? je basic block L16 L14: 83 cf 02 ?? or edi, 2 89 3d 00 54 40 00 ?? mov dword ds:[0x00405400], edi eb 03 ?? jmp basic block L16 L15: 8b 5d f0 ?? mov ebx, dword ss:[ebp + 0xf0<240,-16>] L16: a1 18 50 40 00 ?? mov eax, dword ds:[0x00405018] 83 c8 02 ?? or eax, 2 c7 05 fc 53 40 00 01 00 ?? mov dword ds:[0x004053fc], 1 00 00 a3 18 50 40 00 ?? mov dword ds:[0x00405018], eax f7 c1 00 00 10 00 ?? test ecx, 0x00100000 0f 84 93 00 00 00 ?? je basic block L24 L17: 83 c8 04 ?? or eax, 4 c7 05 fc 53 40 00 02 00 ?? mov dword ds:[0x004053fc], 2 00 00 a3 18 50 40 00 ?? mov dword ds:[0x00405018], eax f7 c1 00 00 00 08 ?? test ecx, 0x08000000 74 79 ?? je basic block L24 L18: f7 c1 00 00 00 10 ?? test ecx, 0x10000000 74 71 ?? je basic block L24 L19: 33 c9 ?? xor ecx, ecx 0f 01 d0 ?? xgetbv 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 89 55 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edx 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 6a 06 ?? push 6 5e ?? pop esi 23 c6 ?? and eax, esi 3b c6 ?? cmp eax, esi 75 57 ?? jne basic block L24 L20: a1 18 50 40 00 ?? mov eax, dword ds:[0x00405018] 83 c8 08 ?? or eax, 8 c7 05 fc 53 40 00 03 00 ?? mov dword ds:[0x004053fc], 3 00 00 a3 18 50 40 00 ?? mov dword ds:[0x00405018], eax f6 c3 20 ?? test bl, 0x20<32> 74 3b ?? je basic block L24 L21: 83 c8 20 ?? or eax, 0x20<32> c7 05 fc 53 40 00 05 00 ?? mov dword ds:[0x004053fc], 5 00 00 a3 18 50 40 00 ?? mov dword ds:[0x00405018], eax b8 00 00 03 d0 ?? mov eax, 0xd0030000 23 d8 ?? and ebx, eax 3b d8 ?? cmp ebx, eax 75 1e ?? jne basic block L24 L22: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] ba e0 00 00 00 ?? mov edx, 0x000000e0<224> 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 23 c2 ?? and eax, edx 3b c2 ?? cmp eax, edx 75 0d ?? jne basic block L24 L23: 83 0d 18 50 40 00 40 ?? or dword ds:[0x00405018], 0x40<64> 89 35 fc 53 40 00 ?? mov dword ds:[0x004053fc], esi L24: 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx L25: 33 c0 ?? xor eax, eax c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402c98
___scrt_is_ucrt_dll_in_use
0func
L1: 33 c0 ?? xor eax, eax 39 05 1c 50 40 00 ?? cmp dword ds:[0x0040501c], eax 0f 95 c0 ?? setne al c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402de8
__filter_x86_sse2_floating_point_exception
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d fc 53 40 00 01 ?? cmp dword ds:[0x004053fc], 1 7c 66 ?? jl basic block L15 L2: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4 74 09 ?? je basic block L4 L3: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5 75 54 ?? jne basic block L15 L4: 0f ae 5d fc ?? stmxcsr dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 f0 3f ?? xor eax, 0x3f<63> a8 81 ?? test al, 0x81<129,-127> 74 3f ?? je basic block L14 L5: a9 04 02 00 00 ?? test eax, 0x00000204<516> 75 07 ?? jne basic block L7 L6: b8 8e 00 00 c0 ?? mov eax, 0xc000008e c9 ?? leave c3 ?? ret L7: a9 02 01 00 00 ?? test eax, 0x00000102<258> 74 2a ?? je basic block L14 L8: a9 08 04 00 00 ?? test eax, 0x00000408<1032> 75 07 ?? jne basic block L10 L9: b8 91 00 00 c0 ?? mov eax, 0xc0000091 c9 ?? leave c3 ?? ret L10: a9 10 08 00 00 ?? test eax, 0x00000810<2064> 75 07 ?? jne basic block L12 L11: b8 93 00 00 c0 ?? mov eax, 0xc0000093 c9 ?? leave c3 ?? ret L12: a9 20 10 00 00 ?? test eax, 0x00001020<4128> 75 0e ?? jne basic block L15 L13: b8 8f 00 00 c0 ?? mov eax, 0xc000008f c9 ?? leave c3 ?? ret L14: b8 90 00 00 c0 ?? mov eax, 0xc0000090 c9 ?? leave c3 ?? ret L15: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402de8
__filter_x86_sse2_floating_point_exception_default
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d fc 53 40 00 01 ?? cmp dword ds:[0x004053fc], 1 7c 66 ?? jl basic block L15 L2: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4 74 09 ?? je basic block L4 L3: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5 75 54 ?? jne basic block L15 L4: 0f ae 5d fc ?? stmxcsr dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 f0 3f ?? xor eax, 0x3f<63> a8 81 ?? test al, 0x81<129,-127> 74 3f ?? je basic block L14 L5: a9 04 02 00 00 ?? test eax, 0x00000204<516> 75 07 ?? jne basic block L7 L6: b8 8e 00 00 c0 ?? mov eax, 0xc000008e c9 ?? leave c3 ?? ret L7: a9 02 01 00 00 ?? test eax, 0x00000102<258> 74 2a ?? je basic block L14 L8: a9 08 04 00 00 ?? test eax, 0x00000408<1032> 75 07 ?? jne basic block L10 L9: b8 91 00 00 c0 ?? mov eax, 0xc0000091 c9 ?? leave c3 ?? ret L10: a9 10 08 00 00 ?? test eax, 0x00000810<2064> 75 07 ?? jne basic block L12 L11: b8 93 00 00 c0 ?? mov eax, 0xc0000093 c9 ?? leave c3 ?? ret L12: a9 20 10 00 00 ?? test eax, 0x00001020<4128> 75 0e ?? jne basic block L15 L13: b8 8f 00 00 c0 ?? mov eax, 0xc000008f c9 ?? leave c3 ?? ret L14: b8 90 00 00 c0 ?? mov eax, 0xc0000090 c9 ?? leave c3 ?? ret L15: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e60
___acrt_initialize
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e60
___scrt_stub_for_acrt_initialize
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e60
___vcrt_initialize
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e63
___acrt_thread_attach
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e63
___scrt_stub_for_acrt_thread_attach
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e63
___vcrt_thread_attach
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e66
___acrt_thread_detach
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e66
___scrt_stub_for_acrt_thread_detach
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e66
___vcrt_thread_detach
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e69
___acrt_uninitialize
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e69
___scrt_stub_for_acrt_uninitialize
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e69
___vcrt_uninitialize
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6c
___acrt_uninitialize_critical
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6c
___scrt_stub_for_acrt_uninitialize_critical
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6c
___vcrt_uninitialize_critical
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6f
___scrt_stub_for_is_c_termination_complete
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6f
__is_c_termination_complete
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
oonewdel.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401000
?draw@Rectangle@@UAEXXZ
1method
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078] ba e8 31 40 00 ?? mov edx, 0x004031e8<"Drawing Rectangle"> 68 90 13 40 00 ?? push function 0x00401390 e8 5b 01 00 00 ?? call function 0x00401170 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"@A@">] L3: c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401020
?draw@Circle@@UAEXXZ
1method
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078] ba fc 31 40 00 ?? mov edx, 0x004031fc<"Drawing Circle"> 68 90 13 40 00 ?? push function 0x00401390 e8 3b 01 00 00 ?? call function 0x00401170 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"@A@">] L3: c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401040
?draw@Triangle@@UAEXXZ
1method
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078] ba 0c 32 40 00 ?? mov edx, 0x0040320c<"Drawing Triangle"> 68 90 13 40 00 ?? push function 0x00401390 e8 1b 01 00 00 ?? call function 0x00401170 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"@A@">] L3: c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401060
_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 56 ?? push esi 6a 04 ?? push 4 e8 4a 05 00 00 ?? call function 0x004015c2 L2: 6a 04 ?? push 4 89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax c7 00 40 32 40 00 ?? mov dword ds:[eax], 0x00403240 e8 3a 05 00 00 ?? call function 0x004015c2 L3: 6a 04 ?? push 4 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax c7 00 2c 32 40 00 ?? mov dword ds:[eax], 0x0040322c e8 2a 05 00 00 ?? call function 0x004015c2 L4: 83 c4 0c ?? add esp, 12 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 33 f6 ?? xor esi, esi c7 00 38 32 40 00 ?? mov dword ds:[eax], 0x00403238 L5: 8b 4c b5 f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16> + esi * 4] 8b 01 ?? mov eax, dword ds:[ecx] ff 10 ?? call dword ds:[eax] L6: 46 ?? inc esi 83 fe 03 ?? cmp esi, 3 7c f2 ?? jl basic block L5 L7: 33 f6 ?? xor esi, esi 66 66 0f 1f 84 00 00 00 ?? nop word ds:[eax + eax + 0] 00 00 L8: 6a 04 ?? push 4 ff 74 b5 f0 ?? push dword ss:[ebp + 0xf0<240,-16> + esi * 4] e8 27 05 00 00 ?? call function 0x004015f2 L9: 46 ?? inc esi 83 c4 08 ?? add esp, 8 83 fe 03 ?? cmp esi, 3 7c ec ?? jl basic block L8 L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 c0 ?? xor eax, eax 33 cd ?? xor ecx, ebp 5e ?? pop esi e8 d3 04 00 00 ?? call function 0x004015b4 L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4010f0
??0Rectangle@@QAE@XZ
1method
L1: c7 01 40 32 40 00 ?? mov dword ds:[ecx], 0x00403240 8b c1 ?? mov eax, ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401100
??0Shape@@QAE@XZ
1method
L1: c7 01 24 32 40 00 ?? mov dword ds:[ecx], 0x00403224<"})@"> 8b c1 ?? mov eax, ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401110
??0Circle@@QAE@XZ
1method
L1: c7 01 2c 32 40 00 ?? mov dword ds:[ecx], 0x0040322c 8b c1 ?? mov eax, ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401120
??0Triangle@@QAE@XZ
1method
L1: c7 01 38 32 40 00 ?? mov dword ds:[ecx], 0x00403238 8b c1 ?? mov eax, ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401390
??$endl@DU?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 6a 0a ?? push 10 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 54 30 40 00 ?? call dword ds:[function 0x00403054<"B@@">] L2: 0f b6 c8 ?? movzx ecx, al 51 ?? push ecx 8b ce ?? mov ecx, esi ff 15 50 30 40 00 ?? call dword ds:[function 0x00403050<"|@@">] L3: 8b ce ?? mov ecx, esi ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4013c0
??Bsentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QBE_NXZ
1method
L1: 8a 41 04 ?? mov al, byte ds:[ecx + 4] c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4013d0
??1sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 90 2b 40 00 ?? push 0x00402b90 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 56 ?? push esi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b f1 ?? mov esi, ecx ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"X>@">] L2: 84 c0 ?? test al, al 75 08 ?? jne basic block L4 L3: 8b 0e ?? mov ecx, dword ds:[esi] ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068] L4: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 0e ?? mov ecx, dword ds:[esi] 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L6 L5: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L6: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401440
??0sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 bd 2b 40 00 ?? push 0x00402bbd 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 51 ?? push ecx 56 ?? push esi 57 ?? push edi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b f9 ?? mov edi, ecx 89 7d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 89 37 ?? mov dword ds:[edi], esi 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040] L4: 84 c0 ?? test al, al 74 28 ?? je basic block L11 L5: 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 3c ?? mov ecx, dword ds:[eax + esi + 0x3c<60>] 85 c9 ?? test ecx, ecx 74 19 ?? je basic block L10 L6: 3b ce ?? cmp ecx, esi 74 15 ?? je basic block L10 L7: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L8: 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040] L9: eb 02 ?? jmp basic block L11 L10: b0 01 ?? mov al, 1 L11: 88 47 04 ?? mov byte ds:[edi + 4], al 8b c7 ?? mov eax, edi 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4014e0
??1_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 e0 2b 40 00 ?? push 0x00402be0 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b 09 ?? mov ecx, dword ds:[ecx] 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L3: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401530
??0_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 56 ?? push esi 8b f1 ?? mov esi, ecx 89 16 ?? mov dword ds:[esi], edx 8b 02 ?? mov eax, dword ds:[edx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 10 38 ?? mov ecx, dword ds:[eax + edx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L3: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4015b4
@__security_check_cookie@4
0func
L1: 3b 0d 04 50 40 00 ?? cmp ecx, dword ds:[0x00405004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 48 03 00 00 ?? jmp function 0x0040190a
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4015c2
??2@YAPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp eb 0d ?? jmp basic block L4 L2: ff 75 08 ?? push dword ss:[ebp + 8] e8 ea 13 00 00 ?? call function 0x004029b9 L3: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 0f ?? je basic block L7 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 e3 13 00 00 ?? call function 0x004029bf L5: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 e6 ?? je basic block L2 L6: 5d ?? pop ebp c3 ?? ret L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 0f 84 aa 07 00 00 ?? je function 0x00401d97 L8: e9 88 07 00 00 ?? jmp function 0x00401d7a
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4015f2
??3@YAXPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 c4 07 00 00 ?? call function 0x00401dc1 L2: 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401600
??1type_info@@UAE@XZ
1method
L1: c7 01 7c 31 40 00 ?? mov dword ds:[ecx], 0x0040317c c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401607
??_Etype_info@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 7c 31 40 00 ?? mov dword ds:[esi], 0x0040317c 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 d1 ff ff ff ?? call function 0x004015f2 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401607
??_Gtype_info@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 7c 31 40 00 ?? mov dword ds:[esi], 0x0040317c 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 d1 ff ff ff ?? call function 0x004015f2 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40162a
pre_c_initialization
0func
L1: 56 ?? push esi 6a 01 ?? push 1 e8 99 13 00 00 ?? call function 0x004029cb L2: e8 a8 0b 00 00 ?? call function 0x004021df L3: 50 ?? push eax e8 c4 13 00 00 ?? call function 0x00402a01 L4: e8 9a 0b 00 00 ?? call function 0x004021dc L5: 8b f0 ?? mov esi, eax e8 e8 13 00 00 ?? call function 0x00402a31 L6: 6a 01 ?? push 1 89 30 ?? mov dword ds:[eax], esi e8 26 09 00 00 ?? call function 0x00401f78 L7: 83 c4 0c ?? add esp, 12 5e ?? pop esi 84 c0 ?? test al, al 74 73 ?? je basic block L30 L8: db e2 ?? fnclex e8 10 0e 00 00 ?? call function 0x00402471 L9: 68 9d 24 40 00 ?? push function 0x0040249d e8 bd 0a 00 00 ?? call function 0x00402128 L10: e8 68 0b 00 00 ?? call function 0x004021d8 L11: 50 ?? push eax e8 61 13 00 00 ?? call function 0x004029d7 L12: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 75 51 ?? jne basic block L30 L13: e8 6a 0b 00 00 ?? call function 0x004021eb L14: e8 d0 0b 00 00 ?? call function 0x00402256 L15: 85 c0 ?? test eax, eax 74 0b ?? je basic block L18 L16: 68 d5 21 40 00 ?? push function 0x004021d5 e8 3d 13 00 00 ?? call function 0x004029d1 L17: 59 ?? pop ecx L18: e8 8d 0b 00 00 ?? call function 0x00402227 L19: e8 8b 0b 00 00 ?? call function 0x0040222a L20: e8 62 0b 00 00 ?? call function 0x00402206 L21: e8 3f 0b 00 00 ?? call function 0x004021e8 L22: 50 ?? push eax e8 76 13 00 00 ?? call function 0x00402a25 L23: 59 ?? pop ecx e8 4e 0b 00 00 ?? call function 0x00402203 L24: 84 c0 ?? test al, al 74 05 ?? je basic block L26 L25: e8 1f 13 00 00 ?? call function 0x004029dd L26: e8 fc 0c 00 00 ?? call function 0x004023bf L27: e8 f2 0c 00 00 ?? call function 0x004023ba L28: 85 c0 ?? test eax, eax 75 01 ?? jne basic block L30 L29: c3 ?? ret L30: 6a 07 ?? push 7 e8 9a 0b 00 00 ?? call function 0x0040226e L31: cc ?? int3
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016d5
post_pgo_initialization
0func
L1: e8 5f 0b 00 00 ?? call function 0x00402239 L2: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016dd
pre_cpp_initialization
0func
L1: e8 22 0d 00 00 ?? call function 0x00402404 L2: e8 fe 0a 00 00 ?? call function 0x004021e5 L3: 50 ?? push eax e8 3e 13 00 00 ?? call function 0x00402a2b L4: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016ef
__scrt_common_main
0func
L1: e8 96 0a 00 00 ?? call function 0x0040218a L2: e9 00 00 00 00 ?? jmp function 0x004016f9
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016f9
__scrt_common_main_seh
0func
L1: 6a 14 ?? push 0x14<20> 68 60 3b 40 00 ?? push 0x00403b60 e8 cb 0d 00 00 ?? call function 0x004024d0 L2: 6a 01 ?? push 1 e8 33 08 00 00 ?? call function 0x00401f3f L3: 59 ?? pop ecx 84 c0 ?? test al, al 0f 84 50 01 00 00 ?? je basic block L44 L4: 32 db ?? xor bl, bl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 e8 21 07 00 00 ?? call function 0x00401e44 L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al a1 0c 54 40 00 ?? mov eax, dword ds:[0x0040540c] 33 c9 ?? xor ecx, ecx 41 ?? inc ecx 3b c1 ?? cmp eax, ecx 0f 84 2f 01 00 00 ?? je basic block L44 L6: 85 c0 ?? test eax, eax 75 49 ?? jne basic block L12 L7: 89 0d 0c 54 40 00 ?? mov dword ds:[0x0040540c], ecx 68 60 31 40 00 ?? push 0x00403160 68 54 31 40 00 ?? push 0x00403154 e8 a0 12 00 00 ?? call function 0x004029ef L8: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 11 ?? je basic block L10 L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b8 ff 00 00 00 ?? mov eax, 0x000000ff<255> e9 ef 00 00 00 ?? jmp basic block L43 L10: 68 50 31 40 00 ?? push 0x00403150 68 48 31 40 00 ?? push 0x00403148 e8 74 12 00 00 ?? call function 0x004029e9 L11: 59 ?? pop ecx 59 ?? pop ecx c7 05 0c 54 40 00 02 00 ?? mov dword ds:[0x0040540c], 2 00 00 eb 05 ?? jmp basic block L13 L12: 8a d9 ?? mov bl, cl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] e8 03 09 00 00 ?? call function 0x00402093 L14: 59 ?? pop ecx e8 cc 0a 00 00 ?? call function 0x00402262 L15: 8b f0 ?? mov esi, eax 33 ff ?? xor edi, edi 39 3e ?? cmp dword ds:[esi], edi 74 1b ?? je basic block L20 L16: 56 ?? push esi e8 5b 08 00 00 ?? call function 0x00401fff L17: 59 ?? pop ecx 84 c0 ?? test al, al 74 10 ?? je basic block L20 L18: 8b 36 ?? mov esi, dword ds:[esi] 57 ?? push edi 6a 02 ?? push 2 57 ?? push edi 8b ce ?? mov ecx, esi ff 15 3c 31 40 00 ?? call dword ds:[0x0040313c<"c%@">] L19: ff d6 ?? call esi L20: e8 aa 0a 00 00 ?? call function 0x00402268 L21: 8b f0 ?? mov esi, eax 39 3e ?? cmp dword ds:[esi], edi 74 13 ?? je basic block L26 L22: 56 ?? push esi e8 35 08 00 00 ?? call function 0x00401fff L23: 59 ?? pop ecx 84 c0 ?? test al, al 74 08 ?? je basic block L26 L24: ff 36 ?? push dword ds:[esi] e8 49 12 00 00 ?? call function 0x00402a1f L25: 59 ?? pop ecx L26: e8 07 12 00 00 ?? call function 0x004029e3 L27: 8b f8 ?? mov edi, eax e8 2a 12 00 00 ?? call function 0x00402a0d L28: 8b 30 ?? mov esi, dword ds:[eax] e8 1d 12 00 00 ?? call function 0x00402a07 L29: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 6d f8 ff ff ?? call function 0x00401060 L30: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax e8 c5 0b 00 00 ?? call function 0x004023c2 L31: 84 c0 ?? test al, al 74 6b ?? je basic block L45 L32: 84 db ?? test bl, bl 75 05 ?? jne basic block L34 L33: e8 09 12 00 00 ?? call function 0x00402a13 L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 9d 08 00 00 ?? call function 0x004020b0 L35: 59 ?? pop ecx 59 ?? pop ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b c6 ?? mov eax, esi eb 35 ?? jmp basic block L43 L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 01 ?? mov eax, dword ds:[ecx] 8b 00 ?? mov eax, dword ds:[eax] 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 51 ?? push ecx 50 ?? push eax e8 94 11 00 00 ?? call function 0x004029c5 L37: 59 ?? pop ecx 59 ?? pop ecx c3 ?? ret L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] e8 86 0b 00 00 ?? call function 0x004023c2 L39: 84 c0 ?? test al, al 74 32 ?? je basic block L46 L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0 75 05 ?? jne basic block L42 L41: e8 ce 11 00 00 ?? call function 0x00402a19 L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret L44: 6a 07 ?? push 7 e8 02 0a 00 00 ?? call function 0x0040226e L45: 56 ?? push esi e8 83 11 00 00 ?? call function 0x004029f5 L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>] e8 81 11 00 00 ?? call function 0x004029fb L47: cc ?? int3 L48: e8 58 09 00 00 ?? call function 0x004021d8 L49: 50 ?? push eax e8 51 11 00 00 ?? call function 0x004029d7 L50: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40188d
invoke_main
0func
L1: 56 ?? push esi 57 ?? push edi e8 4f 11 00 00 ?? call function 0x004029e3 L2: 8b f8 ?? mov edi, eax e8 72 11 00 00 ?? call function 0x00402a0d L3: 8b 30 ?? mov esi, dword ds:[eax] e8 65 11 00 00 ?? call function 0x00402a07 L4: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 b5 f7 ff ff ?? call function 0x00401060 L5: 83 c4 0c ?? add esp, 12 5f ?? pop edi 5e ?? pop esi c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4018d8
_mainCRTStartup
0func
L1: e8 ad 08 00 00 ?? call function 0x0040218a L2: e9 17 fe ff ff ?? jmp function 0x004016f9
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4018e2
___raise_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 30 40 00 ?? call dword ds:[0x00403004] L2: ff 75 08 ?? push dword ss:[ebp + 8] ff 15 00 30 40 00 ?? call dword ds:[0x00403000] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 30 40 00 ?? call dword ds:[0x00403008<" F@">] L4: 50 ?? push eax ff 15 0c 30 40 00 ?? call dword ds:[0x0040300c<"4F@">] L5: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40190a
___report_gsfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"HF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 6a 02 ?? push 2 59 ?? pop ecx cd 29 ?? int 0x29<41> L4: a3 f0 51 40 00 ?? mov dword ds:[0x004051f0], eax 89 0d ec 51 40 00 ?? mov dword ds:[0x004051ec], ecx 89 15 e8 51 40 00 ?? mov dword ds:[0x004051e8], edx 89 1d e4 51 40 00 ?? mov dword ds:[0x004051e4], ebx 89 35 e0 51 40 00 ?? mov dword ds:[0x004051e0], esi 89 3d dc 51 40 00 ?? mov dword ds:[0x004051dc], edi 66 8c 15 08 52 40 00 ?? mov word ds:[0x00405208], ss 66 8c 0d fc 51 40 00 ?? mov word ds:[0x004051fc], cs 66 8c 1d d8 51 40 00 ?? mov word ds:[0x004051d8], ds 66 8c 05 d4 51 40 00 ?? mov word ds:[0x004051d4], es 66 8c 25 d0 51 40 00 ?? mov word ds:[0x004051d0], fs 66 8c 2d cc 51 40 00 ?? mov word ds:[0x004051cc], gs 9c ?? pushfd 8f 05 00 52 40 00 ?? pop dword ds:[0x00405200] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 f4 51 40 00 ?? mov dword ds:[0x004051f4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 f8 51 40 00 ?? mov dword ds:[0x004051f8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 04 52 40 00 ?? mov dword ds:[0x00405204], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 40 51 40 00 01 00 ?? mov dword ds:[0x00405140], 0x00010001 01 00 a1 f8 51 40 00 ?? mov eax, dword ds:[0x004051f8] a3 fc 50 40 00 ?? mov dword ds:[0x004050fc], eax c7 05 f0 50 40 00 09 04 ?? mov dword ds:[0x004050f0], 0xc0000409 00 c0 c7 05 f4 50 40 00 01 00 ?? mov dword ds:[0x004050f4], 1 00 00 c7 05 00 51 40 00 01 00 ?? mov dword ds:[0x00405100], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 c7 80 04 51 40 00 02 00 ?? mov dword ds:[eax + 0x00405104], 2 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 6a 04 ?? push 4 58 ?? pop eax c1 e0 00 ?? shl eax, 0 8b 0d 00 50 40 00 ?? mov ecx, dword ds:[0x00405000] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 80 31 40 00 ?? push 0x00403180 e8 e0 fe ff ff ?? call function 0x004018e2 L5: c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401a10
___report_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"HF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 f0 51 40 00 ?? mov dword ds:[0x004051f0], eax 89 0d ec 51 40 00 ?? mov dword ds:[0x004051ec], ecx 89 15 e8 51 40 00 ?? mov dword ds:[0x004051e8], edx 89 1d e4 51 40 00 ?? mov dword ds:[0x004051e4], ebx 89 35 e0 51 40 00 ?? mov dword ds:[0x004051e0], esi 89 3d dc 51 40 00 ?? mov dword ds:[0x004051dc], edi 66 8c 15 08 52 40 00 ?? mov word ds:[0x00405208], ss 66 8c 0d fc 51 40 00 ?? mov word ds:[0x004051fc], cs 66 8c 1d d8 51 40 00 ?? mov word ds:[0x004051d8], ds 66 8c 05 d4 51 40 00 ?? mov word ds:[0x004051d4], es 66 8c 25 d0 51 40 00 ?? mov word ds:[0x004051d0], fs 66 8c 2d cc 51 40 00 ?? mov word ds:[0x004051cc], gs 9c ?? pushfd 8f 05 00 52 40 00 ?? pop dword ds:[0x00405200] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 f4 51 40 00 ?? mov dword ds:[0x004051f4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 f8 51 40 00 ?? mov dword ds:[0x004051f8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 04 52 40 00 ?? mov dword ds:[0x00405204], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 f8 51 40 00 ?? mov eax, dword ds:[0x004051f8] a3 fc 50 40 00 ?? mov dword ds:[0x004050fc], eax c7 05 f0 50 40 00 09 04 ?? mov dword ds:[0x004050f0], 0xc0000409 00 c0 c7 05 f4 50 40 00 01 00 ?? mov dword ds:[0x004050f4], 1 00 00 c7 05 00 51 40 00 01 00 ?? mov dword ds:[0x00405100], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 04 51 40 00 ?? mov dword ds:[eax + 0x00405104], ecx 68 80 31 40 00 ?? push 0x00403180 e8 05 fe ff ff ?? call function 0x004018e2 L5: c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401bf4
??0bad_alloc@std@@AAE@QBD@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 ac 31 40 00 ?? mov dword ds:[ecx], 0x004031ac 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c11
??0bad_alloc@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 58 00 00 00 ?? call function 0x00401c77 L2: c7 06 ac 31 40 00 ?? mov dword ds:[esi], 0x004031ac 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c2c
??0bad_alloc@std@@QAE@XZ
1method
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 b4 31 40 00 ?? mov dword ds:[ecx + 4], 0x004031b4<"bad allocation"> c7 01 ac 31 40 00 ?? mov dword ds:[ecx], 0x004031ac c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c5f
??0bad_array_new_length@std@@QAE@XZ
1method
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 d0 31 40 00 ?? mov dword ds:[ecx + 4], 0x004031d0<"bad array new length"> c7 01 c8 31 40 00 ?? mov dword ds:[ecx], 0x004031c8 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c77
??0exception@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 83 20 00 ?? and dword ds:[eax], 0 83 60 04 00 ?? and dword ds:[eax + 4], 0 50 ?? push eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 c0 04 ?? add eax, 4 50 ?? push eax e8 ef 0c 00 00 ?? call function 0x00402989 L2: 59 ?? pop ecx 59 ?? pop ecx 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ca3
??0exception@std@@QAE@QBDH@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx 5d ?? pop ebp c2 08 00 ?? ret 8
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401cd1
??1bad_array_new_length@std@@UAE@XZ
1method
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 50 ?? push eax e8 af 0c 00 00 ?? call function 0x0040298f L2: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ce2
??1exception@std@@UAE@XZ
1method
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 50 ?? push eax e8 9e 0c 00 00 ?? call function 0x0040298f L2: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401cf3
??_Gbad_alloc@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 87 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 db f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d20
??_Ebad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 5a 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 ae f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d20
??_Gbad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 5a 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 ae f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d4d
??_Eexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 2d 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 81 f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d4d
??_Gexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 2d 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 81 f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d7a
?__scrt_throw_std_bad_alloc@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 a4 fe ff ff ?? call function 0x00401c2c L2: 68 7c 3b 40 00 ?? push 0x00403b7c 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 ff 0b 00 00 ?? call function 0x00402995 L3: cc ?? int3
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d97
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 ba fe ff ff ?? call function 0x00401c5f L2: 68 d0 3b 40 00 ?? push 0x00403bd0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 e2 0b 00 00 ?? call function 0x00402995 L3: cc ?? int3
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401db4
?what@exception@std@@UBEPBDXZ
1method
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L3 L2: b8 94 31 40 00 ?? mov eax, 0x00403194<"Unknown exception"> L3: c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401dc1
??3@YAXPAX@Z
0func
L1: e9 71 0c 00 00 ?? jmp 0x00402a37 ff 25 b0 30 40 00 ?? jmp dword ds:[0x004030b0]
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401dc6
find_pe_section
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 56 ?? push esi 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>] 8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>] 03 d0 ?? add edx, eax 0f b7 41 06 ?? movzx eax, word ds:[ecx + 6] 6b f0 28 ?? imul esi, eax, 0x28<40> 03 f2 ?? add esi, edx 3b d6 ?? cmp edx, esi 74 19 ?? je basic block L6 L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12] 72 0a ?? jb basic block L5 L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8] 03 42 0c ?? add eax, dword ds:[edx + 12] 3b c8 ?? cmp ecx, eax 72 0c ?? jb basic block L8 L5: 83 c2 28 ?? add edx, 0x28<40> 3b d6 ?? cmp edx, esi 75 ea ?? jne basic block L3 L6: 33 c0 ?? xor eax, eax L7: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L8: 8b c2 ?? mov eax, edx eb f9 ?? jmp basic block L7
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e0a
is_potentially_valid_image_base
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 85 c0 ?? test eax, eax 74 25 ?? je basic block L5 L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 75 1b ?? jne basic block L5 L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 75 0e ?? jne basic block L5 L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267> 66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax 0f 94 c0 ?? sete al 5d ?? pop ebp c3 ?? ret L5: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e3d
_NtCurrentTeb
0func
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e44
___scrt_acquire_startup_lock
0func
L1: 56 ?? push esi e8 21 0b 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 20 ?? je basic block L6 L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] be 10 54 40 00 ?? mov esi, 0x00405410 8b 50 04 ?? mov edx, dword ds:[eax + 4] eb 04 ?? jmp basic block L5 L4: 3b d0 ?? cmp edx, eax 74 10 ?? je basic block L7 L5: 33 c0 ?? xor eax, eax 8b ca ?? mov ecx, edx f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx 85 c0 ?? test eax, eax 75 f0 ?? jne basic block L4 L6: 32 c0 ?? xor al, al 5e ?? pop esi c3 ?? ret L7: b0 01 ?? mov al, 1 5e ?? pop esi c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e76
___scrt_dllmain_after_initialize_c
0func
L1: e8 f0 0a 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 13 09 00 00 ?? call function 0x00402797 L4: eb 18 ?? jmp basic block L10 L5: e8 4d 03 00 00 ?? call function 0x004021d8 L6: 50 ?? push eax e8 46 0b 00 00 ?? call function 0x004029d7 L7: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 03 ?? je basic block L9 L8: 32 c0 ?? xor al, al c3 ?? ret L9: e8 3f 0b 00 00 ?? call function 0x004029dd L10: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ea1
___scrt_dllmain_before_initialize_c
0func
L1: 6a 00 ?? push 0 e8 d0 00 00 00 ?? call function 0x00401f78 L2: 84 c0 ?? test al, al 59 ?? pop ecx 0f 95 c0 ?? setne al c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401eaf
___scrt_dllmain_crt_thread_attach
0func
L1: e8 0a 0c 00 00 ?? call function 0x00402abe L2: 84 c0 ?? test al, al 75 03 ?? jne basic block L4 L3: 32 c0 ?? xor al, al c3 ?? ret L4: e8 fe 0b 00 00 ?? call function 0x00402abe L5: 84 c0 ?? test al, al 75 07 ?? jne basic block L8 L6: e8 f8 0b 00 00 ?? call function 0x00402ac1 L7: eb ed ?? jmp basic block L3 L8: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ece
___scrt_dllmain_crt_thread_detach
0func
L1: e8 ee 0b 00 00 ?? call function 0x00402ac1 L2: e8 e9 0b 00 00 ?? call function 0x00402ac1 L3: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401edb
___scrt_dllmain_exception_filter
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 88 0a 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 75 19 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 13 ?? jne basic block L6 L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>] 50 ?? push eax ff 75 08 ?? push dword ss:[ebp + 8] ff 15 3c 31 40 00 ?? call dword ds:[0x0040313c<"c%@">] L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>] L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>] ff 75 18 ?? push dword ss:[ebp + 0x18<24>] e8 32 0b 00 00 ?? call function 0x00402a3d L7: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f0f
___scrt_dllmain_uninitialize_c
0func
L1: e8 57 0a 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 68 18 54 40 00 ?? push 0x00405418 e8 2d 0b 00 00 ?? call function 0x00402a4f L4: 59 ?? pop ecx c3 ?? ret L5: e8 a1 0b 00 00 ?? call function 0x00402aca L6: 85 c0 ?? test eax, eax 0f 84 e2 0a 00 00 ?? je function 0x00402a13 L7: c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f32
___scrt_dllmain_uninitialize_critical
0func
L1: 6a 00 ?? push 0 e8 8e 0b 00 00 ?? call function 0x00402ac7 L2: 59 ?? pop ecx e9 88 0b 00 00 ?? jmp function 0x00402ac7
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f3f
___scrt_initialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 14 54 40 00 01 ?? mov byte ds:[0x00405414], 1 L3: e8 43 08 00 00 ?? call function 0x00402797 L4: e8 62 0b 00 00 ?? call function 0x00402abb L5: 84 c0 ?? test al, al 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret L7: e8 55 0b 00 00 ?? call function 0x00402abb L8: 84 c0 ?? test al, al 75 0a ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 53 0b 00 00 ?? call function 0x00402ac4 L10: 59 ?? pop ecx eb e9 ?? jmp basic block L6 L11: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f78
___scrt_initialize_onexit_tables
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d 15 54 40 00 00 ?? cmp byte ds:[0x00405415], 0 74 04 ?? je basic block L3 L2: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret L3: 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 85 f6 ?? test esi, esi 74 05 ?? je basic block L5 L4: 83 fe 01 ?? cmp esi, 1 75 62 ?? jne basic block L16 L5: e8 d1 09 00 00 ?? call function 0x0040296b L6: 85 c0 ?? test eax, eax 74 26 ?? je basic block L13 L7: 85 f6 ?? test esi, esi 75 22 ?? jne basic block L13 L8: 68 18 54 40 00 ?? push 0x00405418 e8 97 0a 00 00 ?? call function 0x00402a43 L9: 59 ?? pop ecx 85 c0 ?? test eax, eax 75 0f ?? jne basic block L12 L10: 68 24 54 40 00 ?? push 0x00405424 e8 88 0a 00 00 ?? call function 0x00402a43 L11: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 2b ?? je basic block L14 L12: 32 c0 ?? xor al, al eb 30 ?? jmp basic block L15 L13: 83 c9 ff ?? or ecx, 0xff<255,-1> 89 0d 18 54 40 00 ?? mov dword ds:[0x00405418], ecx 89 0d 1c 54 40 00 ?? mov dword ds:[0x0040541c], ecx 89 0d 20 54 40 00 ?? mov dword ds:[0x00405420], ecx 89 0d 24 54 40 00 ?? mov dword ds:[0x00405424], ecx 89 0d 28 54 40 00 ?? mov dword ds:[0x00405428], ecx 89 0d 2c 54 40 00 ?? mov dword ds:[0x0040542c], ecx L14: c6 05 15 54 40 00 01 ?? mov byte ds:[0x00405415], 1 b0 01 ?? mov al, 1 L15: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L16: 6a 05 ?? push 5 e8 70 02 00 00 ?? call function 0x0040226e L17: cc ?? int3
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401fff
___scrt_is_nonwritable_in_current_image
0func
L1: 6a 08 ?? push 8 68 10 3c 40 00 ?? push 0x00403c10 e8 c5 04 00 00 ?? call function 0x004024d0 L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117> 66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax 75 5d ?? jne basic block L11 L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c] 81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744> 00 00 75 4c ?? jne basic block L11 L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267> 66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx 75 3e ?? jne basic block L11 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] b9 00 00 40 00 ?? mov ecx, 0x00400000 2b c1 ?? sub eax, ecx 50 ?? push eax 51 ?? push ecx e8 79 fd ff ff ?? call function 0x00401dc6 L6: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 27 ?? je basic block L11 L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0 7c 21 ?? jl basic block L11 L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b0 01 ?? mov al, 1 eb 1f ?? jmp basic block L12 L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 32 c0 ?? xor al, al L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402093
___scrt_release_startup_lock
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 d0 08 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0 75 09 ?? jne basic block L5 L4: 33 c0 ?? xor eax, eax b9 10 54 40 00 ?? mov ecx, 0x00405410 87 01 ?? xchg dword ds:[ecx], eax L5: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4020b0
___scrt_uninitialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d 14 54 40 00 00 ?? cmp byte ds:[0x00405414], 0 74 06 ?? je basic block L3 L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0 75 12 ?? jne basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 fa 09 00 00 ?? call function 0x00402ac4 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 f2 09 00 00 ?? call function 0x00402ac4 L5: 59 ?? pop ecx 59 ?? pop ecx L6: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402105
_at_quick_exit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 24 54 40 00 ff ?? cmp dword ds:[0x00405424], 0xff<255,-1> 75 06 ?? jne basic block L3 L2: 5d ?? pop ebp e9 44 09 00 00 ?? jmp 0x00402a5b ff 25 e4 30 40 00 ?? jmp dword ds:[0x004030e4] L3: ff 75 08 ?? push dword ss:[ebp + 8] 68 24 54 40 00 ?? push 0x00405424 e8 25 09 00 00 ?? call function 0x00402a49 L4: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402128
_atexit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 a5 ff ff ff ?? call function 0x004020d8 L2: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d8 ?? neg eax 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40213d
__get_entropy
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 83 65 f4 00 ?? and dword ss:[ebp + 0xf4<244,-12>], 0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 83 65 f8 00 ?? and dword ss:[ebp + 0xf8<248,-8>], 0 50 ?? push eax ff 15 20 30 40 00 ?? call dword ds:[0x00403020] L2: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 33 45 f4 ?? xor eax, dword ss:[ebp + 0xf4<244,-12>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 1c 30 40 00 ?? call dword ds:[0x0040301c] L3: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax ff 15 18 30 40 00 ?? call dword ds:[0x00403018<"~F@">] L4: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>] 50 ?? push eax ff 15 14 30 40 00 ?? call dword ds:[0x00403014<"dF@">] L5: 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>] 8d 4d fc ?? lea ecx, ss:[ebp + 0xfc<252,-4>] 33 45 ec ?? xor eax, dword ss:[ebp + 0xec<236,-20>] 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 33 c1 ?? xor eax, ecx c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40218a
___security_init_cookie
0func
L1: 8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004] 56 ?? push esi 57 ?? push edi bf 4e e6 40 bb ?? mov edi, 0xbb40e64e be 00 00 ff ff ?? mov esi, 0xffff0000<4294901760,-65536> 3b cf ?? cmp ecx, edi 74 04 ?? je basic block L3 L2: 85 ce ?? test esi, ecx 75 26 ?? jne basic block L9 L3: e8 94 ff ff ff ?? call function 0x0040213d L4: 8b c8 ?? mov ecx, eax 3b cf ?? cmp ecx, edi 75 07 ?? jne basic block L6 L5: b9 4f e6 40 bb ?? mov ecx, 0xbb40e64f eb 0e ?? jmp basic block L8 L6: 85 ce ?? test esi, ecx 75 0a ?? jne basic block L8 L7: 0d 11 47 00 00 ?? or eax, 0x00004711<18193> c1 e0 10 ?? shl eax, 0x10<16> 0b c8 ?? or ecx, eax L8: 89 0d 04 50 40 00 ?? mov dword ds:[0x00405004], ecx L9: f7 d1 ?? not ecx 5f ?? pop edi 89 0d 00 50 40 00 ?? mov dword ds:[0x00405000], ecx 5e ?? pop esi c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021d5
__matherr
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
oopoly.exe