Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
class label
2 classes
Disassembly
stringlengths
16
68.6k
Dirname
stringlengths
16
28
Exename
stringclasses
17 values
./vs2022/wpo/Debug/oo2.exe
0x403f20
_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 f2 53 40 00 ?? push 0x004053f2 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 4c ?? sub esp, 0x4c<76> 56 ?? push esi 57 ?? push edi 8d 7d a8 ?? lea edi, ss:[ebp + 0xa8<168,-88>] b9 13 00 00 00 ?? mov ecx, 0x00000013<19> ...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4041b0
@_RTC_CheckStackVars2@12
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 85 d2 ?? test edx, edx 74 4f ?? je basic block L10 L2: 33 ff ?? xor edi, edi 39 3a ?? cmp dword ds:[edx], edi 7e 49 ?? jle ...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404290
@_RTC_CheckStackVars@8
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b da ?? mov ebx, edx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 56 ?? push esi 33 f6 ?? xor esi, esi 39 33 ?? cmp dword ds:[ebx], esi 7e 41 ?? jle basic block L9 L2: 57 ?? push edi 33 ff ?? xor edi, edi L3: 8b 4b 04 ?? mov ecx,...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4042f0
__RTC_CheckEsp
0func
L1: 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 00 ?? sub esp, 0 50 ?? push eax 52 ?? push edx 53 ?? push ebx 56 ?? push esi 57 ?? push edi 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 6a 00 ?? push 0 50 ?? push eax e8 97 01 00 00 ?? call function 0x004044a0 L4: 83...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404320
DebuggerProbe
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ??...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404360
DebuggerRuntime
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 89 45 f0...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4043b0
?_RTC_AllocaFailure@@YAXPAXPAU_RTC_ALLOCA_NODE@@H@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 44 01 00 00 ?? sub esp, 0x00000144<324> a1 04 90 40 00 ?? mov eax, dword ds:[0x00409004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 53 ?? push ebx 8b 5d 0c ?? mov ebx, dword ss:[ebp + 12] 57 ??...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4044a0
?_RTC_Failure@@YAXPAXH@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 83 f8 04 ?? cmp eax, 4 77 23 ?? ja basic block L5 L2: 8b 0c 85 18 90 40 00 ?? mov ecx, dword ds:[0x00409018 + eax * 4] 8b 14 85 90 65 40 00 ?? mov edx, dword ds:[0x00406590<"0f@"> + eax * 4] 83 f9 ff ?? cmp ecx, 0xff<255,-1> 74 2...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4044f0
?_RTC_StackFailure@@YAXPAXPBD@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 90 40 00 ?? mov eax, dword ds:[0x00409004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 8b 5d 08 ?? mov ebx, dword ss:[ebp + 8] 56 ?? push esi 8b 75 0c ?? mov esi, dword ss:...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4045a0
_getMemBlockDataString
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 33 d2 ?? xor edx, edx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 33 ff ?? xor edi, edi 2b de ?? sub ebx, esi 89 5d 10 ?? mov dword ss:[ebp + 0x10<16>], ebx L2: 8b...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404610
_strlen_priv
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 8b c2 ?? mov eax, edx L2: 8a 08 ?? mov cl, byte ds:[eax] 40 ?? inc eax 84 c9 ?? test cl, cl L3: 75 f9 ?? jne basic block L2 L4: 2b c2 ?? sub eax, edx 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4048b0
__RTC_UninitUse
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 90 40 00 ?? mov eax, dword ds:[0x00409004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 8b 3d 24 90 40 00 ?? mov edi, ...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404960
__vsprintf_s_l
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 f8 e7 ff ff ?? call function 0x00403160 L2: ff 75 18 ?? push dword ss:[ebp + 0x18<24>] ff 75 14 ?? push dword ss:[ebp + 0x14<20>] ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] ff 70 04 ?? push dwor...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404990
_sprintf_s
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8d 45 14 ?? lea eax, ss:[ebp + 0x14<20>] 50 ?? push eax 6a 00 ?? push 0 ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] e8 b9 ff ff ff ?? call function 0x00404960 L2: 83 c4 14 ?? add esp, 0x14<20> 5d ...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4049b0
?_RTC_GetErrorFunc@@YAP6AHHPBDH00ZZPBX@Z
0func
L1: a1 78 94 40 00 ?? mov eax, dword ds:[0x00409478] c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4049c0
?_RTC_GetErrorFuncW@@YAP6AHHPB_WH00ZZPBX@Z
0func
L1: a1 7c 94 40 00 ?? mov eax, dword ds:[0x0040947c] c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4049d0
__RTC_GetErrDesc
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 f8 04 ?? cmp eax, 4 77 09 ?? ja basic block L3 L2: 8b 04 85 40 6b 40 00 ?? mov eax, dword ds:[0x00406b40<"Tk@"> + eax * 4] 5d ?? pop ebp c3 ?? ret L3: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x4049f0
__RTC_NumErrors
0func
L1: b8 05 00 00 00 ?? mov eax, 5 c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404a00
__RTC_SetErrorFunc
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 78 94 40 00 ?? mov eax, dword ds:[0x00409478] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 78 94 40 00 ?? mov dword ds:[0x00409478], ecx c7 05 7c 94 40 00 00 00 ?? mov dword ds:[0x0040947c], 0 00 00 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404a20
__RTC_SetErrorFuncW
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 7c 94 40 00 ?? mov eax, dword ds:[0x0040947c] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 7c 94 40 00 ?? mov dword ds:[0x0040947c], ecx c7 05 78 94 40 00 00 00 ?? mov dword ds:[0x00409478], 0 00 00 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404a40
__RTC_SetErrorType
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 83 fa 04 ?? cmp edx, 4 77 13 ?? ja basic block L3 L2: 8b 04 95 18 90 40 00 ?? mov eax, dword ds:[0x00409018 + edx * 4] 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 89 0c 95 18 90 40 00 ?? mov dword ds:[0x00409018 + edx * 4], ecx 5d ??...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404a70
GetPdbDll
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 14 04 00 00 ?? sub esp, 0x00000414<1044> a1 04 90 40 00 ?? mov eax, dword ds:[0x00409004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 80 3d 84 94 40 00 00 ?? cmp byte ds:[0x00409484], 0 0f 85 1a 01 00 00 ?? jne basic block L27 L2: c6 0...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404bc0
GetPdbDllFromInstallPath
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 02 00 00 ?? sub esp, 0x0000021c<540> a1 04 90 40 00 ?? mov eax, dword ds:[0x00409004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi 68 00 08 00 00 ?? push 0x00000800<2048> 6a 00 ?? push 0...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404e20
GetPdbDllPathFromFilePath
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 0c 06 00 00 ?? sub esp, 0x0000060c<1548> a1 04 90 40 00 ?? mov eax, dword ds:[0x00409004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8d 8d f4 fd ff ff ?? lea ecx, ss:[ebp + 0xfffffdf4<4294966772,...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x404ef0
?_RTC_GetSrcLine@@YAHPAEPA_WKPAH1K@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 83 ec 4c ?? sub esp, 0x4c<76> 33 c9 ?? xor ecx, ecx 53 ?? push ebx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] c7 00 00 00 00 00 ?? mov dword ds:[eax], 0 4e ?? dec esi 8b 45 0c ?? mov eax, dword ss:[ebp + 12] ...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x405270
__except_handler4_noexcept
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 50 ?? push eax 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 51 ?? push ecx 8b 55 0c ?? mov edx, dword ss:[ebp + 12] 52 ?? push edx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 c7 e2 ff ff ??...
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406060
__imp_?width@ios_base@std@@QAE_J_J@Z
1method
0x00406060: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406064
__imp_?width@ios_base@std@@QBE_JXZ
1method
0x00406064: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406068
__imp_?flags@ios_base@std@@QBEHXZ
1method
0x00406068: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x40606c
__imp_??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
1method
0x0040606c: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406070
__imp_?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
1method
0x00406070: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406080
__imp_?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ
1method
0x00406080: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406088
__imp_?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
1method
0x00406088: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x40608c
__imp_?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
1method
0x0040608c: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406090
__imp_?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
1method
0x00406090: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x406094
__imp_?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
1method
0x00406094: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/oo2.exe
0x40609c
__imp_?good@ios_base@std@@QBE_NXZ
1method
0x0040609c: no instructions
vs2022/wpo/Debug
oo2.exe
./vs2022/wpo/Debug/ooex0.exe
0x401000
??0ClassA@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 40 04 2a 00 00 00 ?? mov dword ds:[eax + 4], 0x0000002a<42> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c7 01 2a 00 00 00 ?? mov dword ds:[ecx],...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401030
?func1@ClassA@@QAEHXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi c7 45 fc cc cc cc cc ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xcccccccc 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b f4 ?? mov esi, esp ff 15 20 51 40 00 ?? call dword ds:[0x00405120<"@d@">] L2: 3b f4 ?? cmp esi, esp e8 d2 23 00 00 ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401060
?func2@ClassA@@QAEHXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 00 ?? mov eax, dword ds:[eax] 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 03 41 04 ?? add eax, dword ds:[ecx + 4] 8b e5 ?? mov esp, ebp 5d ?? ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401080
@__security_check_cookie@4
0func
L1: 3b 0d 04 70 40 00 ?? cmp ecx, dword ds:[0x00407004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 82 04 00 00 ?? jmp function 0x00401510
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401090
??2@YAPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 29 1e 00 00 ?? call function 0x00402ec6 L3: 83 c4 04 ?? add esp, 4 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0 74 05 ?? je basic bloc...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4010e0
??3@YAXPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 24 0a 00 00 ?? call function 0x00401b10 L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401100
pre_c_initialization
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 78 03 00 00 ?? call function 0x00401480 L2: e8 a3 03 00 00 ?? call function 0x004014b0 L3: e8 7e 03 00 00 ?? call function 0x00401490 L4: 6a 01 ?? push 1 e8 07 0d 00 00 ?? call function 0x00401e20 L5: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test ea...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4011b0
post_pgo_initialization
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 c8 11 00 00 ?? call function 0x00402380 L2: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4011c0
pre_cpp_initialization
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 78 14 00 00 ?? call function 0x00402640 L2: e8 e3 10 00 00 ?? call function 0x004022b0 L3: 50 ?? push eax e8 5f 1d 00 00 ?? call function 0x00402f32 L4: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4011e0
__scrt_common_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 08 10 00 00 ?? call function 0x004021f0 L2: e8 03 00 00 00 ?? call function 0x004011f0 L3: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4011f0
__scrt_common_main_seh
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 c8 60 40 00 ?? push 0x004060c8 68 50 27 40 00 ?? push function 0x00402750 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 cc ?? add esp, 0xcc<204,-52> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 70 40 00 ?? mov eax...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401440
invoke_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 e8 9f 1a 00 00 ?? call function 0x00402eea L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax e8 c1 1a 00 00 ?? call function 0x00402f14 L3: 8b 00 ?? mov eax, dword ds:[eax] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax e8 b1 1a 00 00 ??...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4014d0
_mainCRTStartup
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 08 fd ff ff ?? call function 0x004011e0 L2: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4014e0
___raise_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 50 40 00 ?? call dword ds:[0x00405004] L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax ff 15 58 50 40 00 ?? call dword ds:[0x00405058<"zf@">] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 50 40 00 ?? call dword ds:[0x00405008] L4: 5...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401510
___report_gsfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 50 40 00 ?? call dword ds:[0x00405010] L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: b9 02 00 00 00 ?? mov ecx, 2 cd 29 ?? int 0x29<41> L4: a3 a8 71 40 00 ?? mov dword ds:[0x00407...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401630
___report_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 50 40 00 ?? call dword ds:[0x00405010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 a8 71 40 00 ?? mov dword ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401840
??0bad_alloc@std@@AAE@QBD@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 6a 01 ?? push 1 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 1b 01 00 00 ?? call function 0x00401970 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401870
??0bad_alloc@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ad 00 00 00 ?? call function 0x00401930 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4018a0
??0bad_alloc@std@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 6a 01 ?? push 1 68 9c 51 40 00 ?? push 0x0040519c<"bad allocation"> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ba 00 00 00 ?? call function 0x00401970 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401900
??0bad_array_new_length@std@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 68 b8 51 40 00 ?? push 0x004051b8<"bad array new length"> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 2c ff ff ff ?? call function 0x00401840 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401930
??0exception@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 74 51 40 00 ?? mov dword ds:[eax], 0x00405174 33 c9 ?? xor ecx, ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c2 04 ?? add edx, 4 89 0...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401970
??0exception@std@@QAE@QBDH@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 74 51 40 00 ?? mov dword ds:[eax], 0x00405174 33 c9 ?? xor ecx, ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c2 04 ?? add edx, 4 89 0...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4019c0
??1bad_array_new_length@std@@UAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 d1 ff ff ff ?? call function 0x004019a0 L2: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4019e0
??1exception@std@@UAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 74 51 40 00 ?? mov dword ds:[eax], 0x00405174 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 83 c1 04 ?? add ecx, 4 51 ?? push ecx e8 94 14 00...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401a10
??_Gbad_alloc@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 81 ff ff ff ?? call function 0x004019a0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401a40
??_Ebad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 71 ff ff ff ?? call function 0x004019c0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401a40
??_Gbad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 71 ff ff ff ?? call function 0x004019c0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401a70
??_Eexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 61 ff ff ff ?? call function 0x004019e0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401a70
??_Gexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 61 ff ff ff ?? call function 0x004019e0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401aa0
?__scrt_throw_std_bad_alloc@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 f2 fd ff ff ?? call function 0x004018a0 L2: 68 e4 60 40 00 ?? push 0x004060e4 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 da 13 00 00 ?? call function 0x00402e96 L3: 8b e5 ?? m...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401ac0
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 32 fe ff ff ?? call function 0x00401900 L2: 68 38 61 40 00 ?? push 0x00406138 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 ba 13 00 00 ?? call function 0x00402e96 L3: 8b e5 ?? m...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401ae0
?what@exception@std@@UBEPBDXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 78 04 00 ?? cmp dword ds:[eax + 4], 0 74 0b ?? je basic block L3 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 51 04 ?? mov edx, d...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401b10
??3@YAXPAX@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 20 14 00 00 ?? call function 0x00402f3e L2: 83 c4 08 ?? add esp, 8 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401b30
find_pe_section
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 18 ?? sub esp, 0x18<24> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 03 51 3c ?? add edx, dword ds:[ecx + 0x3c<60>...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401bc0
is_potentially_valid_image_base
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 04 ?? jne basic block L3 L2: 32 c0 ?? xor al, al eb 55 ?? jmp basic block L10 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, d...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401c30
_NtCurrentTeb
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401c40
___scrt_acquire_startup_lock
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 15 12 00 00 ?? call function 0x00402e60 L2: 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 32 ?? jmp basic block L11 L4: e8 d8 ff ff ff ?? call function 0x00401c30 L5: 8b 40 04 ?? mov eax, dword ds:[eax + 4] 89 ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401c90
___scrt_dllmain_after_initialize_c
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 c8 11 00 00 ?? call function 0x00402e60 L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 7f 0e 00 00 ?? call function 0x00402b20 L4: eb 12 ?? jmp basic block L9 L5: e8 68 f7 ff ff ?? call function 0x00401410 L6: 85 c0 ?? test eax, eax 74 04 ?? je basic b...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401cc0
___scrt_dllmain_before_initialize_c
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 56 01 00 00 ?? call function 0x00401e20 L2: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L5 L4: b0 01 ?? mov al, 1 L5: 5d ?? pop ebp c3 ?? ret ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401ce0
___scrt_dllmain_crt_thread_attach
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 f8 12 00 00 ?? call function 0x00402fe0 L2: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 17 ?? jmp basic block L9 L4: e8 e8 12 00 00 ?? call function 0x00402fe0 L5: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test e...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401d10
___scrt_dllmain_crt_thread_detach
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 d8 12 00 00 ?? call function 0x00402ff0 L2: e8 d3 12 00 00 ?? call function 0x00402ff0 L3: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401d30
___scrt_dllmain_exception_filter
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 25 11 00 00 ?? call function 0x00402e60 L2: 85 c0 ?? test eax, eax 75 28 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 22 ?? jne basic block L6 L4: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword s...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401d80
___scrt_dllmain_uninitialize_c
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 d8 10 00 00 ?? call function 0x00402e60 L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 68 d0 73 40 00 ?? push 0x004073d0 e8 c0 11 00 00 ?? call function 0x00402f56 L4: 83 c4 04 ?? add esp, 4 eb 0e ?? jmp basic block L8 L5: e8 80 12 00 00 ?? call function ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401db0
___scrt_dllmain_uninitialize_critical
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 56 12 00 00 ?? call function 0x00403010 L2: 83 c4 04 ?? add esp, 4 e8 4e 12 00 00 ?? call function 0x00403010 L3: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401dd0
___scrt_initialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 cc 73 40 00 01 ?? mov byte ds:[0x004073cc], 1 L3: e8 3b 0d 00 00 ?? call function 0x00402b20 L4: e8 e6 11 00 00 ?? call function 0x00402fd0 L5: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, ea...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401e20
___scrt_initialize_onexit_tables
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 0f b6 05 cd 73 40 00 ?? movzx eax, byte ds:[0x004073cd] 85 c0 ?? test eax, eax 74 07 ?? je basic block L3 L2: b0 01 ?? mov al, 1 e9 b6 00 00 00 ?? jmp basic block L18 L3: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 74 0d ?? je basic block L6 ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x401f00
___scrt_is_nonwritable_in_current_image
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 78 61 40 00 ?? push 0x00406178 68 50 27 40 00 ?? push function 0x00402750 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 d8 ?? add esp, 0xd8<216,-40> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 70 40 00 ?? mov eax...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402030
___scrt_release_startup_lock
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 28 0e 00 00 ?? call function 0x00402e60 L2: 85 c0 ?? test eax, eax 75 02 ?? jne basic block L4 L3: eb 13 ?? jmp basic block L7 L4: 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8] 85 c0 ?? test eax, eax 74 02 ?? je basic block L6 L5: eb 09 ?? jmp basic block L7 L6: 33 c...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402060
___scrt_uninitialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 0f b6 05 cc 73 40 00 ?? movzx eax, byte ds:[0x004073cc] 85 c0 ?? test eax, eax 74 0c ?? je basic block L4 L2: 0f b6 4d 0c ?? movzx ecx, byte ss:[ebp + 12] 85 c9 ?? test ecx, ecx 74 04 ?? je basic block L4 L3: b0 01 ?? mov al, 1 eb 1c ?? jmp basic block L7 L4: 0f b6 55...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402110
_at_quick_exit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 a1 dc 73 40 00 ?? mov eax, dword ds:[0x004073dc] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc ff ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xff<255,-1> 75 10 ?? jne basic block L5 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push e...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402150
_atexit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 43 ff ff ff ?? call function 0x004020a0 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 09 ?? je basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402180
__get_entropy
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 33 c0 ?? xor eax, eax 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] 51 ?? push ecx ff 15 20 50 40 00 ?? call dword ds:[0x00405020<">g@">]...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4021f0
___security_init_cookie
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 81 3d 04 70 40 00 4e e6 ?? cmp dword ds:[0x00407004], 0xbb40e64e 40 bb 74 1c ?? je basic block L4 L2: a1 04 70 40 00 ?? mov eax, dword ds:[0x00407004] 25 00 00 ff ff ?? and eax, 0xffff0000<4294901760,-65536> 74 10 ?? je basic block L4 L3: 8b 0d 04 70 40 ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402270
__matherr
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402280
__get_startup_argv_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 01 00 00 00 ?? mov eax, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402290
__get_startup_commit_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4022a0
__get_startup_file_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 00 40 00 00 ?? mov eax, 0x00004000<16384> 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4022b0
__get_startup_new_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4022d0
?__scrt_initialize_type_info@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 e8 73 40 00 ?? push 0x004073e8 ff 15 48 50 40 00 ?? call dword ds:[0x00405048<"Xg@">] L2: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x4022e0
?__scrt_uninitialize_type_info@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 e8 73 40 00 ?? push 0x004073e8 e8 af 0b 00 00 ?? call function 0x00402e9c L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402300
__should_initialize_environment
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402310
__initialize_default_precision
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 00 00 03 00 ?? push 0x00030000 68 00 00 01 00 ?? push 0x00010000 6a 00 ?? push 0 e8 44 0c 00 00 ?? call function 0x00402f68 L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: 6a 07 ?? push 7 e8 de 00 00 00 ?? call function 0x00402410 ...
vs2022/wpo/Debug
ooex0.exe
./vs2022/wpo/Debug/ooex0.exe
0x402340
__initialize_invalid_parameter_handler
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex0.exe