Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
class label
2 classes
Disassembly
stringlengths
16
68.6k
Dirname
stringlengths
16
28
Exename
stringclasses
17 values
./vs2022/wpo/Debug/ooex3.exe
0x403b40
__RTC_NumErrors
0func
L1: b8 05 00 00 00 ?? mov eax, 5 c3 ?? ret
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x403b50
__RTC_SetErrorFunc
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 10 74 40 00 ?? mov eax, dword ds:[0x00407410] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 10 74 40 00 ?? mov dword ds:[0x00407410], ecx c7 05 14 74 40 00 00 00 ?? mov dword ds:[0x00407414], 0 00 00 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x403b70
__RTC_SetErrorFuncW
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 14 74 40 00 ?? mov eax, dword ds:[0x00407414] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 14 74 40 00 ?? mov dword ds:[0x00407414], ecx c7 05 10 74 40 00 00 00 ?? mov dword ds:[0x00407410], 0 00 00 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x403b90
__RTC_SetErrorType
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 83 fa 04 ?? cmp edx, 4 77 13 ?? ja basic block L3 L2: 8b 04 95 18 70 40 00 ?? mov eax, dword ds:[0x00407018 + edx * 4] 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 89 0c 95 18 70 40 00 ?? mov dword ds:[0x00407018 + edx * 4], ecx 5d ??...
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x403bc0
GetPdbDll
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 14 04 00 00 ?? sub esp, 0x00000414<1044> a1 04 70 40 00 ?? mov eax, dword ds:[0x00407004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 80 3d 1c 74 40 00 00 ?? cmp byte ds:[0x0040741c], 0 0f 85 1a 01 00 00 ?? jne basic block L27 L2: c6 0...
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x403d10
GetPdbDllFromInstallPath
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 02 00 00 ?? sub esp, 0x0000021c<540> a1 04 70 40 00 ?? mov eax, dword ds:[0x00407004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi 68 00 08 00 00 ?? push 0x00000800<2048> 6a 00 ?? push 0...
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x403f70
GetPdbDllPathFromFilePath
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 0c 06 00 00 ?? sub esp, 0x0000060c<1548> a1 04 70 40 00 ?? mov eax, dword ds:[0x00407004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8d 8d f4 fd ff ff ?? lea ecx, ss:[ebp + 0xfffffdf4<4294966772,...
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x404040
?_RTC_GetSrcLine@@YAHPAEPA_WKPAH1K@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 83 ec 4c ?? sub esp, 0x4c<76> 33 c9 ?? xor ecx, ecx 53 ?? push ebx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] c7 00 00 00 00 00 ?? mov dword ds:[eax], 0 4e ?? dec esi 8b 45 0c ?? mov eax, dword ss:[ebp + 12] ...
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex3.exe
0x4043c0
__except_handler4_noexcept
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 50 ?? push eax 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 51 ?? push ecx 8b 55 0c ?? mov edx, dword ss:[ebp + 12] 52 ?? push edx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 07 e4 ff ff ??...
vs2022/wpo/Debug
ooex3.exe
./vs2022/wpo/Debug/ooex4.exe
0x401000
??0Base@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 dc 51 40 00 ?? mov dword ds:[eax], 0x004051dc 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c7 41 04 01 00 00 00 ?? mov dword ds:[ecx + 4], 1 ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401040
?func1@Base@@UAEHXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 40 04 02 00 00 00 ?? mov dword ds:[eax + 4], 2 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c6 41 08 62 ?? mov byte ds:[ecx + 8], 0x62<98> 8b 55...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401070
?func2@Base@@UAEHXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 40 04 03 00 00 00 ?? mov dword ds:[eax + 4], 3 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c6 41 08 63 ?? mov byte ds:[ecx + 8], 0x63<99> 8b 55...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4010a0
??0Derived@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi c7 45 fc cc cc cc cc ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xcccccccc 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 49 ff ff ff ?? call function 0x00401000 L2: 8b 45 fc ?? mov eax, ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401110
?func3@Derived@@UAEHXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 40 10 ?? mov eax, dword ds:[eax + 0x10<16>] 83 c0 01 ?? add eax, 1 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401130
@__security_check_cookie@4
0func
L1: 3b 0d 04 70 40 00 ?? cmp ecx, dword ds:[0x00407004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 d2 04 00 00 ?? jmp function 0x00401610
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401140
??2@YAPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 2f 1e 00 00 ?? call function 0x00402f7c L3: 83 c4 04 ?? add esp, 4 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0 74 05 ?? je basic bloc...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401190
??3@YAXPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 74 0a 00 00 ?? call function 0x00401c10 L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4011b0
??1type_info@@UAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 6c 51 40 00 ?? mov dword ds:[eax], 0x0040516c 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4011d0
??_Etype_info@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 d1 ff ff ff ?? call function 0x004011b0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4011d0
??_Gtype_info@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 d1 ff ff ff ?? call function 0x004011b0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401200
pre_c_initialization
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 78 03 00 00 ?? call function 0x00401580 L2: e8 a3 03 00 00 ?? call function 0x004015b0 L3: e8 7e 03 00 00 ?? call function 0x00401590 L4: 6a 01 ?? push 1 e8 07 0d 00 00 ?? call function 0x00401f20 L5: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test ea...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4012b0
post_pgo_initialization
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 c8 11 00 00 ?? call function 0x00402480 L2: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4012c0
pre_cpp_initialization
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 78 14 00 00 ?? call function 0x00402740 L2: e8 e3 10 00 00 ?? call function 0x004023b0 L3: 50 ?? push eax e8 15 1d 00 00 ?? call function 0x00402fe8 L4: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4012e0
__scrt_common_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 08 10 00 00 ?? call function 0x004022f0 L2: e8 03 00 00 00 ?? call function 0x004012f0 L3: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4012f0
__scrt_common_main_seh
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 a0 61 40 00 ?? push 0x004061a0 68 50 28 40 00 ?? push function 0x00402850 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 cc ?? add esp, 0xcc<204,-52> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 70 40 00 ?? mov eax...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401540
invoke_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 e8 55 1a 00 00 ?? call function 0x00402fa0 L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax e8 77 1a 00 00 ?? call function 0x00402fca L3: 8b 00 ?? mov eax, dword ds:[eax] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax e8 67 1a 00 00 ??...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4015d0
_mainCRTStartup
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 08 fd ff ff ?? call function 0x004012e0 L2: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4015e0
___raise_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 50 40 00 ?? call dword ds:[0x00405004<"~g@">] L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax ff 15 58 50 40 00 ?? call dword ds:[0x00405058<"bg@">] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 50 40 00 ?? call dword ds:[0x00405008]...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401610
___report_gsfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 50 40 00 ?? call dword ds:[0x00405010] L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: b9 02 00 00 00 ?? mov ecx, 2 cd 29 ?? int 0x29<41> L4: a3 d0 71 40 00 ?? mov dword ds:[0x00407...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401730
___report_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 50 40 00 ?? call dword ds:[0x00405010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 d0 71 40 00 ?? mov dword ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401940
??0bad_alloc@std@@AAE@QBD@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 6a 01 ?? push 1 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 1b 01 00 00 ?? call function 0x00401a70 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401970
??0bad_alloc@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ad 00 00 00 ?? call function 0x00401a30 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4019a0
??0bad_alloc@std@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 6a 01 ?? push 1 68 a4 51 40 00 ?? push 0x004051a4<"bad allocation"> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ba 00 00 00 ?? call function 0x00401a70 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401a00
??0bad_array_new_length@std@@QAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 68 c0 51 40 00 ?? push 0x004051c0<"bad array new length"> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 2c ff ff ff ?? call function 0x00401940 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401a30
??0exception@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 7c 51 40 00 ?? mov dword ds:[eax], 0x0040517c 33 c9 ?? xor ecx, ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c2 04 ?? add edx, 4 89 0...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401a70
??0exception@std@@QAE@QBDH@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 7c 51 40 00 ?? mov dword ds:[eax], 0x0040517c 33 c9 ?? xor ecx, ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c2 04 ?? add edx, 4 89 0...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401ac0
??1bad_array_new_length@std@@UAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 d1 ff ff ff ?? call function 0x00401aa0 L2: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401ae0
??1exception@std@@UAE@XZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 7c 51 40 00 ?? mov dword ds:[eax], 0x0040517c 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 83 c1 04 ?? add ecx, 4 51 ?? push ecx e8 4a 14 00...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401b10
??_Gbad_alloc@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 81 ff ff ff ?? call function 0x00401aa0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401b40
??_Ebad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 71 ff ff ff ?? call function 0x00401ac0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401b40
??_Gbad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 71 ff ff ff ?? call function 0x00401ac0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401b70
??_Eexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 61 ff ff ff ?? call function 0x00401ae0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401b70
??_Gexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 61 ff ff ff ?? call function 0x00401ae0 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? pu...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401ba0
?__scrt_throw_std_bad_alloc@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 f2 fd ff ff ?? call function 0x004019a0 L2: 68 bc 61 40 00 ?? push 0x004061bc 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 90 13 00 00 ?? call function 0x00402f4c L3: 8b e5 ?? m...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401bc0
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 32 fe ff ff ?? call function 0x00401a00 L2: 68 10 62 40 00 ?? push 0x00406210 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 70 13 00 00 ?? call function 0x00402f4c L3: 8b e5 ?? m...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401be0
?what@exception@std@@UBEPBDXZ
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 78 04 00 ?? cmp dword ds:[eax + 4], 0 74 0b ?? je basic block L3 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 51 04 ?? mov edx, d...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401c10
??3@YAXPAX@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 d6 13 00 00 ?? call function 0x00402ff4 L2: 83 c4 08 ?? add esp, 8 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401c30
find_pe_section
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 18 ?? sub esp, 0x18<24> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 03 51 3c ?? add edx, dword ds:[ecx + 0x3c<60>...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401cc0
is_potentially_valid_image_base
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 04 ?? jne basic block L3 L2: 32 c0 ?? xor al, al eb 55 ?? jmp basic block L10 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, d...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401d30
_NtCurrentTeb
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401d40
___scrt_acquire_startup_lock
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 c5 11 00 00 ?? call function 0x00402f10 L2: 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 32 ?? jmp basic block L11 L4: e8 d8 ff ff ff ?? call function 0x00401d30 L5: 8b 40 04 ?? mov eax, dword ds:[eax + 4] 89 ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401d90
___scrt_dllmain_after_initialize_c
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 78 11 00 00 ?? call function 0x00402f10 L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 2f 0e 00 00 ?? call function 0x00402bd0 L4: eb 12 ?? jmp basic block L9 L5: e8 68 f7 ff ff ?? call function 0x00401510 L6: 85 c0 ?? test eax, eax 74 04 ?? je basic b...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401dc0
___scrt_dllmain_before_initialize_c
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 56 01 00 00 ?? call function 0x00401f20 L2: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L5 L4: b0 01 ?? mov al, 1 L5: 5d ?? pop ebp c3 ?? ret ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401de0
___scrt_dllmain_crt_thread_attach
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 a8 12 00 00 ?? call function 0x00403090 L2: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 17 ?? jmp basic block L9 L4: e8 98 12 00 00 ?? call function 0x00403090 L5: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test e...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401e10
___scrt_dllmain_crt_thread_detach
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 88 12 00 00 ?? call function 0x004030a0 L2: e8 83 12 00 00 ?? call function 0x004030a0 L3: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401e30
___scrt_dllmain_exception_filter
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 d5 10 00 00 ?? call function 0x00402f10 L2: 85 c0 ?? test eax, eax 75 28 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 22 ?? jne basic block L6 L4: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword s...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401e80
___scrt_dllmain_uninitialize_c
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 88 10 00 00 ?? call function 0x00402f10 L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 68 f8 73 40 00 ?? push 0x004073f8 e8 76 11 00 00 ?? call function 0x0040300c L4: 83 c4 04 ?? add esp, 4 eb 0e ?? jmp basic block L8 L5: e8 30 12 00 00 ?? call function ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401eb0
___scrt_dllmain_uninitialize_critical
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 06 12 00 00 ?? call function 0x004030c0 L2: 83 c4 04 ?? add esp, 4 e8 fe 11 00 00 ?? call function 0x004030c0 L3: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401ed0
___scrt_initialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 f4 73 40 00 01 ?? mov byte ds:[0x004073f4], 1 L3: e8 eb 0c 00 00 ?? call function 0x00402bd0 L4: e8 96 11 00 00 ?? call function 0x00403080 L5: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, ea...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x401f20
___scrt_initialize_onexit_tables
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 0f b6 05 f5 73 40 00 ?? movzx eax, byte ds:[0x004073f5] 85 c0 ?? test eax, eax 74 07 ?? je basic block L3 L2: b0 01 ?? mov al, 1 e9 b6 00 00 00 ?? jmp basic block L18 L3: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 74 0d ?? je basic block L6 ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402000
___scrt_is_nonwritable_in_current_image
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 50 62 40 00 ?? push 0x00406250 68 50 28 40 00 ?? push function 0x00402850 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 d8 ?? add esp, 0xd8<216,-40> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 70 40 00 ?? mov eax...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402130
___scrt_release_startup_lock
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 d8 0d 00 00 ?? call function 0x00402f10 L2: 85 c0 ?? test eax, eax 75 02 ?? jne basic block L4 L3: eb 13 ?? jmp basic block L7 L4: 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8] 85 c0 ?? test eax, eax 74 02 ?? je basic block L6 L5: eb 09 ?? jmp basic block L7 L6: 33 c...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402160
___scrt_uninitialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 0f b6 05 f4 73 40 00 ?? movzx eax, byte ds:[0x004073f4] 85 c0 ?? test eax, eax 74 0c ?? je basic block L4 L2: 0f b6 4d 0c ?? movzx ecx, byte ss:[ebp + 12] 85 c9 ?? test ecx, ecx 74 04 ?? je basic block L4 L3: b0 01 ?? mov al, 1 eb 1c ?? jmp basic block L7 L4: 0f b6 55...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402210
_at_quick_exit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 a1 04 74 40 00 ?? mov eax, dword ds:[0x00407404] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc ff ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xff<255,-1> 75 10 ?? jne basic block L5 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push e...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402250
_atexit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 43 ff ff ff ?? call function 0x004021a0 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 09 ?? je basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402280
__get_entropy
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 33 c0 ?? xor eax, eax 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] 51 ?? push ecx ff 15 20 50 40 00 ?? call dword ds:[0x00405020<"&h@">]...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4022f0
___security_init_cookie
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 81 3d 04 70 40 00 4e e6 ?? cmp dword ds:[0x00407004], 0xbb40e64e 40 bb 74 1c ?? je basic block L4 L2: a1 04 70 40 00 ?? mov eax, dword ds:[0x00407004] 25 00 00 ff ff ?? and eax, 0xffff0000<4294901760,-65536> 74 10 ?? je basic block L4 L3: 8b 0d 04 70 40 ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402370
__matherr
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402380
__get_startup_argv_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 01 00 00 00 ?? mov eax, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402390
__get_startup_commit_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4023a0
__get_startup_file_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 00 40 00 00 ?? mov eax, 0x00004000<16384> 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4023b0
__get_startup_new_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4023d0
?__scrt_initialize_type_info@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 10 74 40 00 ?? push 0x00407410 ff 15 24 50 40 00 ?? call dword ds:[0x00405024<"@h@">] L2: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4023e0
?__scrt_uninitialize_type_info@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 10 74 40 00 ?? push 0x00407410 e8 65 0b 00 00 ?? call function 0x00402f52 L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402400
__should_initialize_environment
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402410
__initialize_default_precision
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 00 00 03 00 ?? push 0x00030000 68 00 00 01 00 ?? push 0x00010000 6a 00 ?? push 0 e8 fa 0b 00 00 ?? call function 0x0040301e L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: 6a 07 ?? push 7 e8 de 00 00 00 ?? call function 0x00402510 ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402440
__initialize_invalid_parameter_handler
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402450
__initialize_denormal_control
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402460
___local_stdio_printf_options
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 18 74 40 00 ?? mov eax, 0x00407418 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402470
___local_stdio_scanf_options
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 20 74 40 00 ?? mov eax, 0x00407420 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402480
___scrt_initialize_default_local_stdio_options
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 d5 ff ff ff ?? call function 0x00402460 L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 08 ?? mov ecx, dword ds:[eax] 83 c9 24 ?? or ecx, 0x24<36> 8b 50 04 ?? mov edx, dword ds:[eax +...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4024c0
___scrt_is_user_matherr_present
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d 0c 70 40 00 00 ?? cmp dword ds:[0x0040700c], 0 75 09 ?? jne basic block L3 L2: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 eb 07 ?? jmp basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 L4: 8b 45 fc ?? ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4024f0
___scrt_get_dyn_tls_init_callback
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 4c 74 40 00 ?? mov eax, 0x0040744c 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402500
___scrt_get_dyn_tls_dtor_callback
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 48 74 40 00 ?? mov eax, 0x00407448 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402510
___scrt_fastfail
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 2c 03 00 00 ?? sub esp, 0x0000032c<812> 6a 17 ?? push 0x17<23> ff 15 10 50 40 00 ?? call dword ds:[0x00405010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: 6a 03 ?? push 3 e8 af 02 00...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402650
___scrt_get_show_window_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 48 ?? sub esp, 0x48<72> 6a 44 ?? push 0x44<68> 6a 00 ?? push 0 8d 45 b8 ?? lea eax, ss:[ebp + 0xb8<184,-72>] 50 ?? push eax e8 01 09 00 00 ?? call function 0x00402f64 L2: 83 c4 0c ?? add esp, 12 8d 4d b8 ?? lea ecx, ss:[ebp + 0xb8<184,-72>] 51 ?? push ecx ff 15...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4026a0
___scrt_initialize_winrt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402740
___scrt_set_unhandled_exception_filter
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 60 27 40 00 ?? push function 0x00402760 ff 15 04 50 40 00 ?? call dword ds:[0x00405004<"~g@">] L2: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402750
___scrt_stub_for_initialize_mta
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402760
___scrt_unhandled_exception_filter@4
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 3a 63 73 6d e0 ?? cmp dword ds:[edx], 0xe06d7363 75 5b ?? jne basic b...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4027e0
__crt_debugger_hook
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp c7 05 28 74 40 00 00 00 ?? mov dword ds:[0x00407428], 0 00 00 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4027f0
__RTC_Initialize
0func
L1: 56 ?? push esi be 90 61 40 00 ?? mov esi, 0x00406190 8b c6 ?? mov eax, esi 3d 90 61 40 00 ?? cmp eax, 0x00406190 73 1d ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 30 51 40 00 ?? call dword ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402820
__RTC_Terminate
0func
L1: 56 ?? push esi be 98 61 40 00 ?? mov esi, 0x00406198 8b c6 ?? mov eax, esi 3d 98 61 40 00 ?? cmp eax, 0x00406198 73 1d ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 30 51 40 00 ?? call dword ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402850
__except_handler4
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 51 ?? push ecx e8 82 08 00 00 ?? call function 0x004030e0 L2: 83 c4 04 ?? add esp, 4 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 02 ?? mov dword ds:[edx], eax 8b 45 14 ?? mov eax, dword ss:[ebp + 0...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402890
@_guard_check_icall_nop@4
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4028a0
_ReadNoFence
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4028c0
_ReadPointerNoFence
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 d4 ff ff ff ?? call function 0x004028a0 L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x4028e0
__InlineInterlockedExchangePointer
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 87 01 ?? xchg dword ds:[ecx], eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402910
___castguard_check_failure_fastfail
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 e4 00 00 00 ?? call function 0x00402a00 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: b9 41 00 00 00 ?? mov ecx, 0x00000041<65> cd 29 ?? int 0x29<41> L4: 5d ?? pop ebp c3 ?? ...
vs2022/wpo/Debug
ooex4.exe
./vs2022/wpo/Debug/ooex4.exe
0x402930
___castguard_check_failure_nop
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/Debug
ooex4.exe