Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
int64
0
1
Disassembly
stringlengths
16
68.6k
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e63
___scrt_stub_for_acrt_thread_attach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e63
___vcrt_thread_attach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e66
___acrt_thread_detach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e66
___scrt_stub_for_acrt_thread_detach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e66
___vcrt_thread_detach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e69
___acrt_uninitialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e69
___scrt_stub_for_acrt_uninitialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e69
___vcrt_uninitialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6c
___acrt_uninitialize_critical
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6c
___scrt_stub_for_acrt_uninitialize_critical
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6c
___vcrt_uninitialize_critical
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6f
___scrt_stub_for_is_c_termination_complete
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oonewdel.exe
0x402e6f
__is_c_termination_complete
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401000
?draw@Rectangle@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078] ba e8 31 40 00 ?? mov edx, 0x004031e8<"Drawing Rectangle"> 68 90 13 40 00 ?? push function 0x00401390 e8 5b 01 00 00 ?? call function 0x00401170 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"@A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401020
?draw@Circle@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078] ba fc 31 40 00 ?? mov edx, 0x004031fc<"Drawing Circle"> 68 90 13 40 00 ?? push function 0x00401390 e8 3b 01 00 00 ?? call function 0x00401170 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"@A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401040
?draw@Triangle@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078] ba 0c 32 40 00 ?? mov edx, 0x0040320c<"Drawing Triangle"> 68 90 13 40 00 ?? push function 0x00401390 e8 1b 01 00 00 ?? call function 0x00401170 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"@A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401060
_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 56 ?? push esi 6a 04 ?? push 4 e8 4a 05 00 00 ?? call function 0x004015c2 L2: 6a 04 ?? push 4 89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax c7 00 40 32 40 00 ?? mov dword ds:[eax], 0x00403240 e8 3a 05 00 00 ?? call function 0x004015c2 L3: 6a 04 ?? push 4 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax c7 00 2c 32 40 00 ?? mov dword ds:[eax], 0x0040322c e8 2a 05 00 00 ?? call function 0x004015c2 L4: 83 c4 0c ?? add esp, 12 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 33 f6 ?? xor esi, esi c7 00 38 32 40 00 ?? mov dword ds:[eax], 0x00403238 L5: 8b 4c b5 f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16> + esi * 4] 8b 01 ?? mov eax, dword ds:[ecx] ff 10 ?? call dword ds:[eax] L6: 46 ?? inc esi 83 fe 03 ?? cmp esi, 3 7c f2 ?? jl basic block L5 L7: 33 f6 ?? xor esi, esi 66 66 0f 1f 84 00 00 00 ?? nop word ds:[eax + eax + 0] 00 00 L8: 6a 04 ?? push 4 ff 74 b5 f0 ?? push dword ss:[ebp + 0xf0<240,-16> + esi * 4] e8 27 05 00 00 ?? call function 0x004015f2 L9: 46 ?? inc esi 83 c4 08 ?? add esp, 8 83 fe 03 ?? cmp esi, 3 7c ec ?? jl basic block L8 L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 c0 ?? xor eax, eax 33 cd ?? xor ecx, ebp 5e ?? pop esi e8 d3 04 00 00 ?? call function 0x004015b4 L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4010f0
??0Rectangle@@QAE@XZ
1
L1: c7 01 40 32 40 00 ?? mov dword ds:[ecx], 0x00403240 8b c1 ?? mov eax, ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401100
??0Shape@@QAE@XZ
1
L1: c7 01 24 32 40 00 ?? mov dword ds:[ecx], 0x00403224<"})@"> 8b c1 ?? mov eax, ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401110
??0Circle@@QAE@XZ
1
L1: c7 01 2c 32 40 00 ?? mov dword ds:[ecx], 0x0040322c 8b c1 ?? mov eax, ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401120
??0Triangle@@QAE@XZ
1
L1: c7 01 38 32 40 00 ?? mov dword ds:[ecx], 0x00403238 8b c1 ?? mov eax, ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401170
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 65 2b 40 00 ?? push 0x00402b65 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 24 ?? sub esp, 0x24<36> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], esp 89 55 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], edx 8b d9 ?? mov ebx, ecx 89 5d e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], ebx 8b ca ?? mov ecx, edx 33 c0 ?? xor eax, eax 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8d 71 01 ?? lea esi, ds:[ecx + 1] L2: 8a 01 ?? mov al, byte ds:[ecx] 41 ?? inc ecx 84 c0 ?? test al, al L3: 75 f9 ?? jne basic block L2 L4: 8b 03 ?? mov eax, dword ds:[ebx] 2b ce ?? sub ecx, esi 89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 7c 18 24 ?? mov edi, dword ds:[eax + ebx + 0x24<36>] 8b 74 18 20 ?? mov esi, dword ds:[eax + ebx + 0x20<32>] 85 ff ?? test edi, edi 7c 17 ?? jl basic block L11 L5: 7f 0e ?? jg basic block L10 L6: 85 f6 ?? test esi, esi 74 11 ?? je basic block L11 L7: 85 ff ?? test edi, edi 7c 0d ?? jl basic block L11 L8: 7f 04 ?? jg basic block L10 L9: 3b f1 ?? cmp esi, ecx 76 07 ?? jbe basic block L11 L10: 2b f1 ?? sub esi, ecx 83 df 00 ?? sbb edi, 0 eb 0e ?? jmp basic block L12 L11: 0f 57 c0 ?? xorps xmm0, xmm0 66 0f 13 45 d0 ?? movlpd double ss:[ebp + 0xd0<208,-48>], xmm0 8b 7d d4 ?? mov edi, dword ss:[ebp + 0xd4<212,-44>] 8b 75 d0 ?? mov esi, dword ss:[ebp + 0xd0<208,-48>] L12: 8b 4c 18 38 ?? mov ecx, dword ds:[eax + ebx + 0x38<56>] 89 5d d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], ebx 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L14 L13: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L14: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 cb ?? add ecx, ebx ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040] L15: 84 c0 ?? test al, al 74 28 ?? je basic block L22 L16: 8b 03 ?? mov eax, dword ds:[ebx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 18 3c ?? mov ecx, dword ds:[eax + ebx + 0x3c<60>] 85 c9 ?? test ecx, ecx 74 19 ?? je basic block L21 L17: 3b cb ?? cmp ecx, ebx 74 15 ?? je basic block L21 L18: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L19: 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 cb ?? add ecx, ebx ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040] L20: eb 02 ?? jmp basic block L22 L21: b0 01 ?? mov al, 1 L22: 88 45 d4 ?? mov byte ss:[ebp + 0xd4<212,-44>], al c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 84 c0 ?? test al, al 75 0a ?? jne basic block L24 L23: b9 04 00 00 00 ?? mov ecx, 4 e9 e4 00 00 00 ?? jmp basic block L49 L24: c6 45 fc 02 ?? mov byte ss:[ebp + 0xfc<252,-4>], 2 8b 03 ?? mov eax, dword ds:[ebx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 44 18 14 ?? mov eax, dword ds:[eax + ebx + 0x14<20>] 25 c0 01 00 00 ?? and eax, 0x000001c0<448> 83 f8 40 ?? cmp eax, 0x40<64> 74 35 ?? je basic block L32 L25: 85 ff ?? test edi, edi 7c 31 ?? jl basic block L32 L26: 7f 04 ?? jg basic block L28 L27: 85 f6 ?? test esi, esi 74 2b ?? je basic block L32 L28: 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 8a 44 19 40 ?? mov al, byte ds:[ecx + ebx + 0x40<64>] 8b 4c 19 38 ?? mov ecx, dword ds:[ecx + ebx + 0x38<56>] 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] ff 15 48 30 40 00 ?? call dword ds:[function 0x00403048] L29: 83 f8 ff ?? cmp eax, 0xff<255,-1> 75 05 ?? jne basic block L31 L30: 8d 48 05 ?? lea ecx, ds:[eax + 5] eb 2d ?? jmp basic block L37 L31: 83 c6 ff ?? add esi, 0xff<255,-1> 83 d7 ff ?? adc edi, 0xff<255,-1> eb cb ?? jmp basic block L25 L32: 8b 03 ?? mov eax, dword ds:[ebx] 6a 00 ?? push 0 ff 75 e4 ?? push dword ss:[ebp + 0xe4<228,-28>] 8b 40 04 ?? mov eax, dword ds:[eax + 4] ff 75 d8 ?? push dword ss:[ebp + 0xd8<216,-40>] 8b 4c 18 38 ?? mov ecx, dword ds:[eax + ebx + 0x38<56>] ff 15 64 30 40 00 ?? call dword ds:[function 0x00403064] L33: 3b 45 e4 ?? cmp eax, dword ss:[ebp + 0xe4<228,-28>] 75 04 ?? jne basic block L35 L34: 85 d2 ?? test edx, edx 74 1c ?? je basic block L38 L35: 33 c9 ?? xor ecx, ecx L36: 83 c9 04 ?? or ecx, 4 L37: 8b 03 ?? mov eax, dword ds:[ebx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 44 18 20 00 00 00 00 ?? mov dword ds:[eax + ebx + 0x20<32>], 0 c7 44 18 24 00 00 00 00 ?? mov dword ds:[eax + ebx + 0x24<36>], 0 eb 55 ?? jmp basic block L48 L38: 33 c9 ?? xor ecx, ecx L39: 85 ff ?? test edi, edi 7c e3 ?? jl basic block L37 L40: 7f 04 ?? jg basic block L42 L41: 85 f6 ?? test esi, esi 74 dd ?? je basic block L37 L42: 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 8a 44 19 40 ?? mov al, byte ds:[ecx + ebx + 0x40<64>] 8b 4c 19 38 ?? mov ecx, dword ds:[ecx + ebx + 0x38<56>] 88 45 d8 ?? mov byte ss:[ebp + 0xd8<216,-40>], al ff 75 d8 ?? push dword ss:[ebp + 0xd8<216,-40>] ff 15 48 30 40 00 ?? call dword ds:[function 0x00403048] L43: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 83 f8 ff ?? cmp eax, 0xff<255,-1> 74 b9 ?? je basic block L36 L44: 83 c6 ff ?? add esi, 0xff<255,-1> 83 d7 ff ?? adc edi, 0xff<255,-1> eb cd ?? jmp basic block L39 L45: 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>] 6a 01 ?? push 1 6a 04 ?? push 4 8b 02 ?? mov eax, dword ds:[edx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ca ?? add ecx, edx ff 15 60 30 40 00 ?? call dword ds:[function 0x00403060<"b?@">] L46: b8 31 13 40 00 ?? mov eax, basic block L47 c3 ?? ret L47: 8b 5d e0 ?? mov ebx, dword ss:[ebp + 0xe0<224,-32>] 8b 4d e8 ?? mov ecx, dword ss:[ebp + 0xe8<232,-24>] L48: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 L49: 8b 03 ?? mov eax, dword ds:[ebx] 6a 00 ?? push 0 51 ?? push ecx 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 cb ?? add ecx, ebx ff 15 60 30 40 00 ?? call dword ds:[function 0x00403060<"b?@">] L50: ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"X>@">] L51: 8b 75 d0 ?? mov esi, dword ss:[ebp + 0xd0<208,-48>] 84 c0 ?? test al, al 75 08 ?? jne basic block L53 L52: 8b ce ?? mov ecx, esi ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068] L53: c7 45 fc 04 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 4 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L55 L54: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L55: 8b c3 ?? mov eax, ebx 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401390
??$endl@DU?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 6a 0a ?? push 10 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 54 30 40 00 ?? call dword ds:[function 0x00403054<"B@@">] L2: 0f b6 c8 ?? movzx ecx, al 51 ?? push ecx 8b ce ?? mov ecx, esi ff 15 50 30 40 00 ?? call dword ds:[function 0x00403050<"|@@">] L3: 8b ce ?? mov ecx, esi ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4013c0
??Bsentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QBE_NXZ
1
L1: 8a 41 04 ?? mov al, byte ds:[ecx + 4] c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4013d0
??1sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 90 2b 40 00 ?? push 0x00402b90 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 56 ?? push esi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b f1 ?? mov esi, ecx ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"X>@">] L2: 84 c0 ?? test al, al 75 08 ?? jne basic block L4 L3: 8b 0e ?? mov ecx, dword ds:[esi] ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068] L4: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 0e ?? mov ecx, dword ds:[esi] 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L6 L5: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L6: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401440
??0sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 bd 2b 40 00 ?? push 0x00402bbd 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 51 ?? push ecx 56 ?? push esi 57 ?? push edi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b f9 ?? mov edi, ecx 89 7d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 89 37 ?? mov dword ds:[edi], esi 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040] L4: 84 c0 ?? test al, al 74 28 ?? je basic block L11 L5: 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 3c ?? mov ecx, dword ds:[eax + esi + 0x3c<60>] 85 c9 ?? test ecx, ecx 74 19 ?? je basic block L10 L6: 3b ce ?? cmp ecx, esi 74 15 ?? je basic block L10 L7: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L8: 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040] L9: eb 02 ?? jmp basic block L11 L10: b0 01 ?? mov al, 1 L11: 88 47 04 ?? mov byte ds:[edi + 4], al 8b c7 ?? mov eax, edi 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4014e0
??1_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 e0 2b 40 00 ?? push 0x00402be0 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b 09 ?? mov ecx, dword ds:[ecx] 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L3: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401530
??0_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 56 ?? push esi 8b f1 ?? mov esi, ecx 89 16 ?? mov dword ds:[esi], edx 8b 02 ?? mov eax, dword ds:[edx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 10 38 ?? mov ecx, dword ds:[eax + edx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L3: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4015b4
@__security_check_cookie@4
0
L1: 3b 0d 04 50 40 00 ?? cmp ecx, dword ds:[0x00405004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 48 03 00 00 ?? jmp function 0x0040190a
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4015c2
??2@YAPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp eb 0d ?? jmp basic block L4 L2: ff 75 08 ?? push dword ss:[ebp + 8] e8 ea 13 00 00 ?? call function 0x004029b9 L3: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 0f ?? je basic block L7 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 e3 13 00 00 ?? call function 0x004029bf L5: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 e6 ?? je basic block L2 L6: 5d ?? pop ebp c3 ?? ret L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 0f 84 aa 07 00 00 ?? je function 0x00401d97 L8: e9 88 07 00 00 ?? jmp function 0x00401d7a
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4015f2
??3@YAXPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 c4 07 00 00 ?? call function 0x00401dc1 L2: 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401600
??1type_info@@UAE@XZ
1
L1: c7 01 7c 31 40 00 ?? mov dword ds:[ecx], 0x0040317c c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401607
??_Etype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 7c 31 40 00 ?? mov dword ds:[esi], 0x0040317c 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 d1 ff ff ff ?? call function 0x004015f2 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401607
??_Gtype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 7c 31 40 00 ?? mov dword ds:[esi], 0x0040317c 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 d1 ff ff ff ?? call function 0x004015f2 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40162a
pre_c_initialization
0
L1: 56 ?? push esi 6a 01 ?? push 1 e8 99 13 00 00 ?? call function 0x004029cb L2: e8 a8 0b 00 00 ?? call function 0x004021df L3: 50 ?? push eax e8 c4 13 00 00 ?? call function 0x00402a01 L4: e8 9a 0b 00 00 ?? call function 0x004021dc L5: 8b f0 ?? mov esi, eax e8 e8 13 00 00 ?? call function 0x00402a31 L6: 6a 01 ?? push 1 89 30 ?? mov dword ds:[eax], esi e8 26 09 00 00 ?? call function 0x00401f78 L7: 83 c4 0c ?? add esp, 12 5e ?? pop esi 84 c0 ?? test al, al 74 73 ?? je basic block L30 L8: db e2 ?? fnclex e8 10 0e 00 00 ?? call function 0x00402471 L9: 68 9d 24 40 00 ?? push function 0x0040249d e8 bd 0a 00 00 ?? call function 0x00402128 L10: e8 68 0b 00 00 ?? call function 0x004021d8 L11: 50 ?? push eax e8 61 13 00 00 ?? call function 0x004029d7 L12: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 75 51 ?? jne basic block L30 L13: e8 6a 0b 00 00 ?? call function 0x004021eb L14: e8 d0 0b 00 00 ?? call function 0x00402256 L15: 85 c0 ?? test eax, eax 74 0b ?? je basic block L18 L16: 68 d5 21 40 00 ?? push function 0x004021d5 e8 3d 13 00 00 ?? call function 0x004029d1 L17: 59 ?? pop ecx L18: e8 8d 0b 00 00 ?? call function 0x00402227 L19: e8 8b 0b 00 00 ?? call function 0x0040222a L20: e8 62 0b 00 00 ?? call function 0x00402206 L21: e8 3f 0b 00 00 ?? call function 0x004021e8 L22: 50 ?? push eax e8 76 13 00 00 ?? call function 0x00402a25 L23: 59 ?? pop ecx e8 4e 0b 00 00 ?? call function 0x00402203 L24: 84 c0 ?? test al, al 74 05 ?? je basic block L26 L25: e8 1f 13 00 00 ?? call function 0x004029dd L26: e8 fc 0c 00 00 ?? call function 0x004023bf L27: e8 f2 0c 00 00 ?? call function 0x004023ba L28: 85 c0 ?? test eax, eax 75 01 ?? jne basic block L30 L29: c3 ?? ret L30: 6a 07 ?? push 7 e8 9a 0b 00 00 ?? call function 0x0040226e L31: cc ?? int3
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016d5
post_pgo_initialization
0
L1: e8 5f 0b 00 00 ?? call function 0x00402239 L2: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016dd
pre_cpp_initialization
0
L1: e8 22 0d 00 00 ?? call function 0x00402404 L2: e8 fe 0a 00 00 ?? call function 0x004021e5 L3: 50 ?? push eax e8 3e 13 00 00 ?? call function 0x00402a2b L4: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016ef
__scrt_common_main
0
L1: e8 96 0a 00 00 ?? call function 0x0040218a L2: e9 00 00 00 00 ?? jmp function 0x004016f9
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4016f9
__scrt_common_main_seh
0
L1: 6a 14 ?? push 0x14<20> 68 60 3b 40 00 ?? push 0x00403b60 e8 cb 0d 00 00 ?? call function 0x004024d0 L2: 6a 01 ?? push 1 e8 33 08 00 00 ?? call function 0x00401f3f L3: 59 ?? pop ecx 84 c0 ?? test al, al 0f 84 50 01 00 00 ?? je basic block L44 L4: 32 db ?? xor bl, bl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 e8 21 07 00 00 ?? call function 0x00401e44 L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al a1 0c 54 40 00 ?? mov eax, dword ds:[0x0040540c] 33 c9 ?? xor ecx, ecx 41 ?? inc ecx 3b c1 ?? cmp eax, ecx 0f 84 2f 01 00 00 ?? je basic block L44 L6: 85 c0 ?? test eax, eax 75 49 ?? jne basic block L12 L7: 89 0d 0c 54 40 00 ?? mov dword ds:[0x0040540c], ecx 68 60 31 40 00 ?? push 0x00403160 68 54 31 40 00 ?? push 0x00403154 e8 a0 12 00 00 ?? call function 0x004029ef L8: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 11 ?? je basic block L10 L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b8 ff 00 00 00 ?? mov eax, 0x000000ff<255> e9 ef 00 00 00 ?? jmp basic block L43 L10: 68 50 31 40 00 ?? push 0x00403150 68 48 31 40 00 ?? push 0x00403148 e8 74 12 00 00 ?? call function 0x004029e9 L11: 59 ?? pop ecx 59 ?? pop ecx c7 05 0c 54 40 00 02 00 ?? mov dword ds:[0x0040540c], 2 00 00 eb 05 ?? jmp basic block L13 L12: 8a d9 ?? mov bl, cl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] e8 03 09 00 00 ?? call function 0x00402093 L14: 59 ?? pop ecx e8 cc 0a 00 00 ?? call function 0x00402262 L15: 8b f0 ?? mov esi, eax 33 ff ?? xor edi, edi 39 3e ?? cmp dword ds:[esi], edi 74 1b ?? je basic block L20 L16: 56 ?? push esi e8 5b 08 00 00 ?? call function 0x00401fff L17: 59 ?? pop ecx 84 c0 ?? test al, al 74 10 ?? je basic block L20 L18: 8b 36 ?? mov esi, dword ds:[esi] 57 ?? push edi 6a 02 ?? push 2 57 ?? push edi 8b ce ?? mov ecx, esi ff 15 3c 31 40 00 ?? call dword ds:[0x0040313c<"c%@">] L19: ff d6 ?? call esi L20: e8 aa 0a 00 00 ?? call function 0x00402268 L21: 8b f0 ?? mov esi, eax 39 3e ?? cmp dword ds:[esi], edi 74 13 ?? je basic block L26 L22: 56 ?? push esi e8 35 08 00 00 ?? call function 0x00401fff L23: 59 ?? pop ecx 84 c0 ?? test al, al 74 08 ?? je basic block L26 L24: ff 36 ?? push dword ds:[esi] e8 49 12 00 00 ?? call function 0x00402a1f L25: 59 ?? pop ecx L26: e8 07 12 00 00 ?? call function 0x004029e3 L27: 8b f8 ?? mov edi, eax e8 2a 12 00 00 ?? call function 0x00402a0d L28: 8b 30 ?? mov esi, dword ds:[eax] e8 1d 12 00 00 ?? call function 0x00402a07 L29: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 6d f8 ff ff ?? call function 0x00401060 L30: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax e8 c5 0b 00 00 ?? call function 0x004023c2 L31: 84 c0 ?? test al, al 74 6b ?? je basic block L45 L32: 84 db ?? test bl, bl 75 05 ?? jne basic block L34 L33: e8 09 12 00 00 ?? call function 0x00402a13 L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 9d 08 00 00 ?? call function 0x004020b0 L35: 59 ?? pop ecx 59 ?? pop ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b c6 ?? mov eax, esi eb 35 ?? jmp basic block L43 L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 01 ?? mov eax, dword ds:[ecx] 8b 00 ?? mov eax, dword ds:[eax] 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 51 ?? push ecx 50 ?? push eax e8 94 11 00 00 ?? call function 0x004029c5 L37: 59 ?? pop ecx 59 ?? pop ecx c3 ?? ret L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] e8 86 0b 00 00 ?? call function 0x004023c2 L39: 84 c0 ?? test al, al 74 32 ?? je basic block L46 L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0 75 05 ?? jne basic block L42 L41: e8 ce 11 00 00 ?? call function 0x00402a19 L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret L44: 6a 07 ?? push 7 e8 02 0a 00 00 ?? call function 0x0040226e L45: 56 ?? push esi e8 83 11 00 00 ?? call function 0x004029f5 L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>] e8 81 11 00 00 ?? call function 0x004029fb L47: cc ?? int3 L48: e8 58 09 00 00 ?? call function 0x004021d8 L49: 50 ?? push eax e8 51 11 00 00 ?? call function 0x004029d7 L50: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40188d
invoke_main
0
L1: 56 ?? push esi 57 ?? push edi e8 4f 11 00 00 ?? call function 0x004029e3 L2: 8b f8 ?? mov edi, eax e8 72 11 00 00 ?? call function 0x00402a0d L3: 8b 30 ?? mov esi, dword ds:[eax] e8 65 11 00 00 ?? call function 0x00402a07 L4: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 b5 f7 ff ff ?? call function 0x00401060 L5: 83 c4 0c ?? add esp, 12 5f ?? pop edi 5e ?? pop esi c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4018d8
_mainCRTStartup
0
L1: e8 ad 08 00 00 ?? call function 0x0040218a L2: e9 17 fe ff ff ?? jmp function 0x004016f9
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4018e2
___raise_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 30 40 00 ?? call dword ds:[0x00403004] L2: ff 75 08 ?? push dword ss:[ebp + 8] ff 15 00 30 40 00 ?? call dword ds:[0x00403000] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 30 40 00 ?? call dword ds:[0x00403008<" F@">] L4: 50 ?? push eax ff 15 0c 30 40 00 ?? call dword ds:[0x0040300c<"4F@">] L5: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40190a
___report_gsfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"HF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 6a 02 ?? push 2 59 ?? pop ecx cd 29 ?? int 0x29<41> L4: a3 f0 51 40 00 ?? mov dword ds:[0x004051f0], eax 89 0d ec 51 40 00 ?? mov dword ds:[0x004051ec], ecx 89 15 e8 51 40 00 ?? mov dword ds:[0x004051e8], edx 89 1d e4 51 40 00 ?? mov dword ds:[0x004051e4], ebx 89 35 e0 51 40 00 ?? mov dword ds:[0x004051e0], esi 89 3d dc 51 40 00 ?? mov dword ds:[0x004051dc], edi 66 8c 15 08 52 40 00 ?? mov word ds:[0x00405208], ss 66 8c 0d fc 51 40 00 ?? mov word ds:[0x004051fc], cs 66 8c 1d d8 51 40 00 ?? mov word ds:[0x004051d8], ds 66 8c 05 d4 51 40 00 ?? mov word ds:[0x004051d4], es 66 8c 25 d0 51 40 00 ?? mov word ds:[0x004051d0], fs 66 8c 2d cc 51 40 00 ?? mov word ds:[0x004051cc], gs 9c ?? pushfd 8f 05 00 52 40 00 ?? pop dword ds:[0x00405200] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 f4 51 40 00 ?? mov dword ds:[0x004051f4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 f8 51 40 00 ?? mov dword ds:[0x004051f8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 04 52 40 00 ?? mov dword ds:[0x00405204], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 40 51 40 00 01 00 ?? mov dword ds:[0x00405140], 0x00010001 01 00 a1 f8 51 40 00 ?? mov eax, dword ds:[0x004051f8] a3 fc 50 40 00 ?? mov dword ds:[0x004050fc], eax c7 05 f0 50 40 00 09 04 ?? mov dword ds:[0x004050f0], 0xc0000409 00 c0 c7 05 f4 50 40 00 01 00 ?? mov dword ds:[0x004050f4], 1 00 00 c7 05 00 51 40 00 01 00 ?? mov dword ds:[0x00405100], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 c7 80 04 51 40 00 02 00 ?? mov dword ds:[eax + 0x00405104], 2 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 6a 04 ?? push 4 58 ?? pop eax c1 e0 00 ?? shl eax, 0 8b 0d 00 50 40 00 ?? mov ecx, dword ds:[0x00405000] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 80 31 40 00 ?? push 0x00403180 e8 e0 fe ff ff ?? call function 0x004018e2 L5: c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401a04
___report_rangecheckfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 08 ?? push 8 e8 02 00 00 00 ?? call function 0x00401a10 L2: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401a10
___report_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"HF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 f0 51 40 00 ?? mov dword ds:[0x004051f0], eax 89 0d ec 51 40 00 ?? mov dword ds:[0x004051ec], ecx 89 15 e8 51 40 00 ?? mov dword ds:[0x004051e8], edx 89 1d e4 51 40 00 ?? mov dword ds:[0x004051e4], ebx 89 35 e0 51 40 00 ?? mov dword ds:[0x004051e0], esi 89 3d dc 51 40 00 ?? mov dword ds:[0x004051dc], edi 66 8c 15 08 52 40 00 ?? mov word ds:[0x00405208], ss 66 8c 0d fc 51 40 00 ?? mov word ds:[0x004051fc], cs 66 8c 1d d8 51 40 00 ?? mov word ds:[0x004051d8], ds 66 8c 05 d4 51 40 00 ?? mov word ds:[0x004051d4], es 66 8c 25 d0 51 40 00 ?? mov word ds:[0x004051d0], fs 66 8c 2d cc 51 40 00 ?? mov word ds:[0x004051cc], gs 9c ?? pushfd 8f 05 00 52 40 00 ?? pop dword ds:[0x00405200] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 f4 51 40 00 ?? mov dword ds:[0x004051f4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 f8 51 40 00 ?? mov dword ds:[0x004051f8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 04 52 40 00 ?? mov dword ds:[0x00405204], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 f8 51 40 00 ?? mov eax, dword ds:[0x004051f8] a3 fc 50 40 00 ?? mov dword ds:[0x004050fc], eax c7 05 f0 50 40 00 09 04 ?? mov dword ds:[0x004050f0], 0xc0000409 00 c0 c7 05 f4 50 40 00 01 00 ?? mov dword ds:[0x004050f4], 1 00 00 c7 05 00 51 40 00 01 00 ?? mov dword ds:[0x00405100], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 04 51 40 00 ?? mov dword ds:[eax + 0x00405104], ecx 68 80 31 40 00 ?? push 0x00403180 e8 05 fe ff ff ?? call function 0x004018e2 L5: c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401adf
___report_securityfailureEx
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 20 03 00 00 ?? sub esp, 0x00000320<800> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"HF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 f0 51 40 00 ?? mov dword ds:[0x004051f0], eax 89 0d ec 51 40 00 ?? mov dword ds:[0x004051ec], ecx 89 15 e8 51 40 00 ?? mov dword ds:[0x004051e8], edx 89 1d e4 51 40 00 ?? mov dword ds:[0x004051e4], ebx 89 35 e0 51 40 00 ?? mov dword ds:[0x004051e0], esi 89 3d dc 51 40 00 ?? mov dword ds:[0x004051dc], edi 66 8c 15 08 52 40 00 ?? mov word ds:[0x00405208], ss 66 8c 0d fc 51 40 00 ?? mov word ds:[0x004051fc], cs 66 8c 1d d8 51 40 00 ?? mov word ds:[0x004051d8], ds 66 8c 05 d4 51 40 00 ?? mov word ds:[0x004051d4], es 66 8c 25 d0 51 40 00 ?? mov word ds:[0x004051d0], fs 66 8c 2d cc 51 40 00 ?? mov word ds:[0x004051cc], gs 9c ?? pushfd 8f 05 00 52 40 00 ?? pop dword ds:[0x00405200] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 f4 51 40 00 ?? mov dword ds:[0x004051f4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 f8 51 40 00 ?? mov dword ds:[0x004051f8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 04 52 40 00 ?? mov dword ds:[0x00405204], eax 8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>] a1 f8 51 40 00 ?? mov eax, dword ds:[0x004051f8] a3 fc 50 40 00 ?? mov dword ds:[0x004050fc], eax c7 05 f0 50 40 00 09 04 ?? mov dword ds:[0x004050f0], 0xc0000409 00 c0 c7 05 f4 50 40 00 01 00 ?? mov dword ds:[0x004050f4], 1 00 00 83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0 76 0a ?? jbe basic block L7 L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0 75 04 ?? jne basic block L7 L6: 83 65 0c 00 ?? and dword ss:[ebp + 12], 0 L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14 76 07 ?? jbe basic block L9 L8: 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 48 ?? dec eax 89 45 0c ?? mov dword ss:[ebp + 12], eax L9: 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 40 ?? inc eax a3 00 51 40 00 ?? mov dword ds:[0x00405100], eax 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 04 51 40 00 ?? mov dword ds:[eax + 0x00405104], ecx 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp basic block L10 L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 3b 45 0c ?? cmp eax, dword ss:[ebp + 12] 73 15 ?? jae basic block L12 L11: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>] 8b 0c 8a ?? mov ecx, dword ds:[edx + ecx * 4] 89 0c 85 08 51 40 00 ?? mov dword ds:[0x00405108 + eax * 4], ecx eb dc ?? jmp 0x00401bc4 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 40 ?? inc eax 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L12: 68 80 31 40 00 ?? push 0x00403180 e8 f0 fc ff ff ?? call function 0x004018e2 L13: c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401bf4
??0bad_alloc@std@@AAE@QBD@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 ac 31 40 00 ?? mov dword ds:[ecx], 0x004031ac 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c11
??0bad_alloc@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 58 00 00 00 ?? call function 0x00401c77 L2: c7 06 ac 31 40 00 ?? mov dword ds:[esi], 0x004031ac 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c2c
??0bad_alloc@std@@QAE@XZ
1
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 b4 31 40 00 ?? mov dword ds:[ecx + 4], 0x004031b4<"bad allocation"> c7 01 ac 31 40 00 ?? mov dword ds:[ecx], 0x004031ac c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c44
??0bad_array_new_length@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 25 00 00 00 ?? call function 0x00401c77 L2: c7 06 c8 31 40 00 ?? mov dword ds:[esi], 0x004031c8 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c5f
??0bad_array_new_length@std@@QAE@XZ
1
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 d0 31 40 00 ?? mov dword ds:[ecx + 4], 0x004031d0<"bad array new length"> c7 01 c8 31 40 00 ?? mov dword ds:[ecx], 0x004031c8 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401c77
??0exception@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 83 20 00 ?? and dword ds:[eax], 0 83 60 04 00 ?? and dword ds:[eax + 4], 0 50 ?? push eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 c0 04 ?? add eax, 4 50 ?? push eax e8 ef 0c 00 00 ?? call function 0x00402989 L2: 59 ?? pop ecx 59 ?? pop ecx 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ca3
??0exception@std@@QAE@QBDH@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx 5d ?? pop ebp c2 08 00 ?? ret 8
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401cc0
??1bad_alloc@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 50 ?? push eax e8 c0 0c 00 00 ?? call function 0x0040298f L2: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401cd1
??1bad_array_new_length@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 50 ?? push eax e8 af 0c 00 00 ?? call function 0x0040298f L2: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ce2
??1exception@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 8c 31 40 00 ?? mov dword ds:[ecx], 0x0040318c 50 ?? push eax e8 9e 0c 00 00 ?? call function 0x0040298f L2: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401cf3
??_Ebad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 87 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 db f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401cf3
??_Gbad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 87 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 db f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d20
??_Ebad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 5a 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 ae f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d20
??_Gbad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 5a 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 ae f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d4d
??_Eexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 2d 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 81 f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d4d
??_Gexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 8c 31 40 00 ?? mov dword ds:[esi], 0x0040318c 50 ?? push eax e8 2d 0c 00 00 ?? call function 0x0040298f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 81 f8 ff ff ?? call function 0x004015f2 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d7a
?__scrt_throw_std_bad_alloc@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 a4 fe ff ff ?? call function 0x00401c2c L2: 68 7c 3b 40 00 ?? push 0x00403b7c 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 ff 0b 00 00 ?? call function 0x00402995 L3: cc ?? int3
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401d97
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 ba fe ff ff ?? call function 0x00401c5f L2: 68 d0 3b 40 00 ?? push 0x00403bd0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 e2 0b 00 00 ?? call function 0x00402995 L3: cc ?? int3
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401db4
?what@exception@std@@UBEPBDXZ
1
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L3 L2: b8 94 31 40 00 ?? mov eax, 0x00403194<"Unknown exception"> L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401dc1
??3@YAXPAX@Z
0
L1: e9 71 0c 00 00 ?? jmp 0x00402a37 ff 25 b0 30 40 00 ?? jmp dword ds:[0x004030b0]
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401dc6
find_pe_section
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 56 ?? push esi 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>] 8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>] 03 d0 ?? add edx, eax 0f b7 41 06 ?? movzx eax, word ds:[ecx + 6] 6b f0 28 ?? imul esi, eax, 0x28<40> 03 f2 ?? add esi, edx 3b d6 ?? cmp edx, esi 74 19 ?? je basic block L6 L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12] 72 0a ?? jb basic block L5 L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8] 03 42 0c ?? add eax, dword ds:[edx + 12] 3b c8 ?? cmp ecx, eax 72 0c ?? jb basic block L8 L5: 83 c2 28 ?? add edx, 0x28<40> 3b d6 ?? cmp edx, esi 75 ea ?? jne basic block L3 L6: 33 c0 ?? xor eax, eax L7: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L8: 8b c2 ?? mov eax, edx eb f9 ?? jmp basic block L7
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e0a
is_potentially_valid_image_base
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 85 c0 ?? test eax, eax 74 25 ?? je basic block L5 L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 75 1b ?? jne basic block L5 L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 75 0e ?? jne basic block L5 L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267> 66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax 0f 94 c0 ?? sete al 5d ?? pop ebp c3 ?? ret L5: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e3d
_NtCurrentTeb
0
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e44
___scrt_acquire_startup_lock
0
L1: 56 ?? push esi e8 21 0b 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 20 ?? je basic block L6 L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] be 10 54 40 00 ?? mov esi, 0x00405410 8b 50 04 ?? mov edx, dword ds:[eax + 4] eb 04 ?? jmp basic block L5 L4: 3b d0 ?? cmp edx, eax 74 10 ?? je basic block L7 L5: 33 c0 ?? xor eax, eax 8b ca ?? mov ecx, edx f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx 85 c0 ?? test eax, eax 75 f0 ?? jne basic block L4 L6: 32 c0 ?? xor al, al 5e ?? pop esi c3 ?? ret L7: b0 01 ?? mov al, 1 5e ?? pop esi c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401e76
___scrt_dllmain_after_initialize_c
0
L1: e8 f0 0a 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 13 09 00 00 ?? call function 0x00402797 L4: eb 18 ?? jmp basic block L10 L5: e8 4d 03 00 00 ?? call function 0x004021d8 L6: 50 ?? push eax e8 46 0b 00 00 ?? call function 0x004029d7 L7: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 03 ?? je basic block L9 L8: 32 c0 ?? xor al, al c3 ?? ret L9: e8 3f 0b 00 00 ?? call function 0x004029dd L10: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ea1
___scrt_dllmain_before_initialize_c
0
L1: 6a 00 ?? push 0 e8 d0 00 00 00 ?? call function 0x00401f78 L2: 84 c0 ?? test al, al 59 ?? pop ecx 0f 95 c0 ?? setne al c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401eaf
___scrt_dllmain_crt_thread_attach
0
L1: e8 0a 0c 00 00 ?? call function 0x00402abe L2: 84 c0 ?? test al, al 75 03 ?? jne basic block L4 L3: 32 c0 ?? xor al, al c3 ?? ret L4: e8 fe 0b 00 00 ?? call function 0x00402abe L5: 84 c0 ?? test al, al 75 07 ?? jne basic block L8 L6: e8 f8 0b 00 00 ?? call function 0x00402ac1 L7: eb ed ?? jmp basic block L3 L8: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401ece
___scrt_dllmain_crt_thread_detach
0
L1: e8 ee 0b 00 00 ?? call function 0x00402ac1 L2: e8 e9 0b 00 00 ?? call function 0x00402ac1 L3: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401edb
___scrt_dllmain_exception_filter
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 88 0a 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 75 19 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 13 ?? jne basic block L6 L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>] 50 ?? push eax ff 75 08 ?? push dword ss:[ebp + 8] ff 15 3c 31 40 00 ?? call dword ds:[0x0040313c<"c%@">] L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>] L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>] ff 75 18 ?? push dword ss:[ebp + 0x18<24>] e8 32 0b 00 00 ?? call function 0x00402a3d L7: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f0f
___scrt_dllmain_uninitialize_c
0
L1: e8 57 0a 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 68 18 54 40 00 ?? push 0x00405418 e8 2d 0b 00 00 ?? call function 0x00402a4f L4: 59 ?? pop ecx c3 ?? ret L5: e8 a1 0b 00 00 ?? call function 0x00402aca L6: 85 c0 ?? test eax, eax 0f 84 e2 0a 00 00 ?? je function 0x00402a13 L7: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f32
___scrt_dllmain_uninitialize_critical
0
L1: 6a 00 ?? push 0 e8 8e 0b 00 00 ?? call function 0x00402ac7 L2: 59 ?? pop ecx e9 88 0b 00 00 ?? jmp function 0x00402ac7
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f3f
___scrt_initialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 14 54 40 00 01 ?? mov byte ds:[0x00405414], 1 L3: e8 43 08 00 00 ?? call function 0x00402797 L4: e8 62 0b 00 00 ?? call function 0x00402abb L5: 84 c0 ?? test al, al 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret L7: e8 55 0b 00 00 ?? call function 0x00402abb L8: 84 c0 ?? test al, al 75 0a ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 53 0b 00 00 ?? call function 0x00402ac4 L10: 59 ?? pop ecx eb e9 ?? jmp basic block L6 L11: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401f78
___scrt_initialize_onexit_tables
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d 15 54 40 00 00 ?? cmp byte ds:[0x00405415], 0 74 04 ?? je basic block L3 L2: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret L3: 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 85 f6 ?? test esi, esi 74 05 ?? je basic block L5 L4: 83 fe 01 ?? cmp esi, 1 75 62 ?? jne basic block L16 L5: e8 d1 09 00 00 ?? call function 0x0040296b L6: 85 c0 ?? test eax, eax 74 26 ?? je basic block L13 L7: 85 f6 ?? test esi, esi 75 22 ?? jne basic block L13 L8: 68 18 54 40 00 ?? push 0x00405418 e8 97 0a 00 00 ?? call function 0x00402a43 L9: 59 ?? pop ecx 85 c0 ?? test eax, eax 75 0f ?? jne basic block L12 L10: 68 24 54 40 00 ?? push 0x00405424 e8 88 0a 00 00 ?? call function 0x00402a43 L11: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 2b ?? je basic block L14 L12: 32 c0 ?? xor al, al eb 30 ?? jmp basic block L15 L13: 83 c9 ff ?? or ecx, 0xff<255,-1> 89 0d 18 54 40 00 ?? mov dword ds:[0x00405418], ecx 89 0d 1c 54 40 00 ?? mov dword ds:[0x0040541c], ecx 89 0d 20 54 40 00 ?? mov dword ds:[0x00405420], ecx 89 0d 24 54 40 00 ?? mov dword ds:[0x00405424], ecx 89 0d 28 54 40 00 ?? mov dword ds:[0x00405428], ecx 89 0d 2c 54 40 00 ?? mov dword ds:[0x0040542c], ecx L14: c6 05 15 54 40 00 01 ?? mov byte ds:[0x00405415], 1 b0 01 ?? mov al, 1 L15: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L16: 6a 05 ?? push 5 e8 70 02 00 00 ?? call function 0x0040226e L17: cc ?? int3
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x401fff
___scrt_is_nonwritable_in_current_image
0
L1: 6a 08 ?? push 8 68 10 3c 40 00 ?? push 0x00403c10 e8 c5 04 00 00 ?? call function 0x004024d0 L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117> 66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax 75 5d ?? jne basic block L11 L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c] 81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744> 00 00 75 4c ?? jne basic block L11 L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267> 66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx 75 3e ?? jne basic block L11 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] b9 00 00 40 00 ?? mov ecx, 0x00400000 2b c1 ?? sub eax, ecx 50 ?? push eax 51 ?? push ecx e8 79 fd ff ff ?? call function 0x00401dc6 L6: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 27 ?? je basic block L11 L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0 7c 21 ?? jl basic block L11 L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b0 01 ?? mov al, 1 eb 1f ?? jmp basic block L12 L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 32 c0 ?? xor al, al L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402093
___scrt_release_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 d0 08 00 00 ?? call function 0x0040296b L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0 75 09 ?? jne basic block L5 L4: 33 c0 ?? xor eax, eax b9 10 54 40 00 ?? mov ecx, 0x00405410 87 01 ?? xchg dword ds:[ecx], eax L5: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4020b0
___scrt_uninitialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d 14 54 40 00 00 ?? cmp byte ds:[0x00405414], 0 74 06 ?? je basic block L3 L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0 75 12 ?? jne basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 fa 09 00 00 ?? call function 0x00402ac4 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 f2 09 00 00 ?? call function 0x00402ac4 L5: 59 ?? pop ecx 59 ?? pop ecx L6: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4020d8
__onexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 18 54 40 00 ff ?? cmp dword ds:[0x00405418], 0xff<255,-1> ff 75 08 ?? push dword ss:[ebp + 8] 75 07 ?? jne basic block L4 L2: e8 69 09 00 00 ?? call function 0x00402a55 L3: eb 0b ?? jmp basic block L6 L4: 68 18 54 40 00 ?? push 0x00405418 e8 51 09 00 00 ?? call function 0x00402a49 L5: 59 ?? pop ecx L6: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d0 ?? not eax 23 45 08 ?? and eax, dword ss:[ebp + 8] 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402105
_at_quick_exit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 24 54 40 00 ff ?? cmp dword ds:[0x00405424], 0xff<255,-1> 75 06 ?? jne basic block L3 L2: 5d ?? pop ebp e9 44 09 00 00 ?? jmp 0x00402a5b ff 25 e4 30 40 00 ?? jmp dword ds:[0x004030e4] L3: ff 75 08 ?? push dword ss:[ebp + 8] 68 24 54 40 00 ?? push 0x00405424 e8 25 09 00 00 ?? call function 0x00402a49 L4: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402128
_atexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 a5 ff ff ff ?? call function 0x004020d8 L2: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d8 ?? neg eax 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40213d
__get_entropy
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 83 65 f4 00 ?? and dword ss:[ebp + 0xf4<244,-12>], 0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 83 65 f8 00 ?? and dword ss:[ebp + 0xf8<248,-8>], 0 50 ?? push eax ff 15 20 30 40 00 ?? call dword ds:[0x00403020] L2: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 33 45 f4 ?? xor eax, dword ss:[ebp + 0xf4<244,-12>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 1c 30 40 00 ?? call dword ds:[0x0040301c] L3: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax ff 15 18 30 40 00 ?? call dword ds:[0x00403018<"~F@">] L4: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>] 50 ?? push eax ff 15 14 30 40 00 ?? call dword ds:[0x00403014<"dF@">] L5: 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>] 8d 4d fc ?? lea ecx, ss:[ebp + 0xfc<252,-4>] 33 45 ec ?? xor eax, dword ss:[ebp + 0xec<236,-20>] 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 33 c1 ?? xor eax, ecx c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40218a
___security_init_cookie
0
L1: 8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004] 56 ?? push esi 57 ?? push edi bf 4e e6 40 bb ?? mov edi, 0xbb40e64e be 00 00 ff ff ?? mov esi, 0xffff0000<4294901760,-65536> 3b cf ?? cmp ecx, edi 74 04 ?? je basic block L3 L2: 85 ce ?? test esi, ecx 75 26 ?? jne basic block L9 L3: e8 94 ff ff ff ?? call function 0x0040213d L4: 8b c8 ?? mov ecx, eax 3b cf ?? cmp ecx, edi 75 07 ?? jne basic block L6 L5: b9 4f e6 40 bb ?? mov ecx, 0xbb40e64f eb 0e ?? jmp basic block L8 L6: 85 ce ?? test esi, ecx 75 0a ?? jne basic block L8 L7: 0d 11 47 00 00 ?? or eax, 0x00004711<18193> c1 e0 10 ?? shl eax, 0x10<16> 0b c8 ?? or ecx, eax L8: 89 0d 04 50 40 00 ?? mov dword ds:[0x00405004], ecx L9: f7 d1 ?? not ecx 5f ?? pop edi 89 0d 00 50 40 00 ?? mov dword ds:[0x00405000], ecx 5e ?? pop esi c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021d5
__matherr
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021d8
__get_startup_argv_mode
0
L1: 33 c0 ?? xor eax, eax 40 ?? inc eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021dc
__get_startup_commit_mode
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021df
__get_startup_file_mode
0
L1: b8 00 40 00 00 ?? mov eax, 0x00004000<16384> c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021e5
__get_startup_new_mode
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021e8
__get_startup_thread_locale_mode
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021eb
?__scrt_initialize_type_info@@YAXXZ
0
L1: 68 30 54 40 00 ?? push 0x00405430 ff 15 24 30 40 00 ?? call dword ds:[0x00403024] L2: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x4021f7
?__scrt_uninitialize_type_info@@YAXXZ
0
L1: 68 30 54 40 00 ?? push 0x00405430 e8 9a 07 00 00 ?? call function 0x0040299b L2: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402203
__should_initialize_environment
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402206
__initialize_default_precision
0
L1: 68 00 00 03 00 ?? push 0x00030000 68 00 00 01 00 ?? push 0x00010000 6a 00 ?? push 0 e8 4a 08 00 00 ?? call function 0x00402a61 L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 01 ?? jne basic block L4 L3: c3 ?? ret L4: 6a 07 ?? push 7 e8 48 00 00 00 ?? call function 0x0040226e L5: cc ?? int3
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x402227
__initialize_invalid_parameter_handler
0
L1: c2 00 00 ?? ret 0
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40222a
__initialize_denormal_control
0
L1: c2 00 00 ?? ret 0
./vs2022/wpo/RelWithDebInfo/oopoly.exe
0x40222d
___local_stdio_printf_options
0
L1: b8 38 54 40 00 ?? mov eax, 0x00405438 c3 ?? ret