Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
int64
0
1
Disassembly
stringlengths
16
68.6k
./vs2022/normal/Debug/ooex2.exe
0x402190
??_Gbad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 15 ef ff ff ?? call function 0x004010b4 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 a3 ee ff ff ?? call function 0x00401055 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/ooex2.exe
0x4021d0
??_Ebad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ed ef ff ff ?? call function 0x004011cc L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 63 ee ff ff ?? call function 0x00401055 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/ooex2.exe
0x4021d0
??_Gbad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ed ef ff ff ?? call function 0x004011cc L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 63 ee ff ff ?? call function 0x00401055 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/ooex2.exe
0x402210
??_Eexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 98 f0 ff ff ?? call function 0x004012b7 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 23 ee ff ff ?? call function 0x00401055 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/ooex2.exe
0x402210
??_Gexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 98 f0 ff ff ?? call function 0x004012b7 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 23 ee ff ff ?? call function 0x00401055 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/ooex2.exe
0x402250
?__scrt_throw_std_bad_alloc@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 50 ef ff ff ?? call function 0x004011ae L2: 68 f0 a5 40 00 ?? push 0x0040a5f0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 03 30 00 00 ?? call function 0x0040526f L3: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402280
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 cc ed ff ff ?? call function 0x0040105a L2: 68 54 a6 40 00 ?? push 0x0040a654 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 d3 2f 00 00 ?? call function 0x0040526f L3: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4022b0
?what@exception@std@@UBEPBDXZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 78 04 00 ?? cmp dword ds:[eax + 4], 0 74 0b ?? je basic block L3 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 51 04 ?? mov edx, dword ds:[ecx + 4] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx eb 07 ?? jmp basic block L4 L3: c7 45 f8 40 8b 40 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0x00408b40<"Unknown exception"> L4: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4022f0
??3@YAXPAX@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 37 30 00 00 ?? call function 0x00405335 L2: 83 c4 08 ?? add esp, 8 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402310
___raise_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 c0 40 00 ?? call dword ds:[0x0040c004] L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax ff 15 44 c0 40 00 ?? call dword ds:[0x0040c044] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 c0 40 00 ?? call dword ds:[0x0040c008] L4: 50 ?? push eax ff 15 0c c0 40 00 ?? call dword ds:[0x0040c00c] L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402350
___report_gsfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 c0 40 00 ?? call dword ds:[0x0040c010] L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: b9 02 00 00 00 ?? mov ecx, 2 cd 29 ?? int 0x29<41> L4: a3 d8 b4 40 00 ?? mov dword ds:[0x0040b4d8], eax 89 0d d4 b4 40 00 ?? mov dword ds:[0x0040b4d4], ecx 89 15 d0 b4 40 00 ?? mov dword ds:[0x0040b4d0], edx 89 1d cc b4 40 00 ?? mov dword ds:[0x0040b4cc], ebx 89 35 c8 b4 40 00 ?? mov dword ds:[0x0040b4c8], esi 89 3d c4 b4 40 00 ?? mov dword ds:[0x0040b4c4], edi 66 8c 15 f0 b4 40 00 ?? mov word ds:[0x0040b4f0], ss 66 8c 0d e4 b4 40 00 ?? mov word ds:[0x0040b4e4], cs 66 8c 1d c0 b4 40 00 ?? mov word ds:[0x0040b4c0], ds 66 8c 05 bc b4 40 00 ?? mov word ds:[0x0040b4bc], es 66 8c 25 b8 b4 40 00 ?? mov word ds:[0x0040b4b8], fs 66 8c 2d b4 b4 40 00 ?? mov word ds:[0x0040b4b4], gs 9c ?? pushfd 8f 05 e8 b4 40 00 ?? pop dword ds:[0x0040b4e8] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 dc b4 40 00 ?? mov dword ds:[0x0040b4dc], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 e0 b4 40 00 ?? mov dword ds:[0x0040b4e0], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 ec b4 40 00 ?? mov dword ds:[0x0040b4ec], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 28 b4 40 00 01 00 ?? mov dword ds:[0x0040b428], 0x00010001 01 00 a1 e0 b4 40 00 ?? mov eax, dword ds:[0x0040b4e0] a3 e4 b3 40 00 ?? mov dword ds:[0x0040b3e4], eax c7 05 d8 b3 40 00 09 04 ?? mov dword ds:[0x0040b3d8], 0xc0000409 00 c0 c7 05 dc b3 40 00 01 00 ?? mov dword ds:[0x0040b3dc], 1 00 00 c7 05 e8 b3 40 00 01 00 ?? mov dword ds:[0x0040b3e8], 1 00 00 b9 04 00 00 00 ?? mov ecx, 4 6b d1 00 ?? imul edx, ecx, 0 c7 82 ec b3 40 00 02 00 ?? mov dword ds:[edx + 0x0040b3ec], 2 00 00 b8 04 00 00 00 ?? mov eax, 4 6b c8 00 ?? imul ecx, eax, 0 8b 15 04 b0 40 00 ?? mov edx, dword ds:[0x0040b004] 89 54 0d f8 ?? mov dword ss:[ebp + ecx + 0xf8<248,-8>], edx b8 04 00 00 00 ?? mov eax, 4 c1 e0 00 ?? shl eax, 0 8b 0d 00 b0 40 00 ?? mov ecx, dword ds:[0x0040b000] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 a8 8b 40 00 ?? push 0x00408ba8 e8 99 ee ff ff ?? call function 0x004012e9 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4024a0
___report_rangecheckfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 08 ?? push 8 e8 08 ee ff ff ?? call function 0x004012b2 L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4024b0
___report_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 c0 40 00 ?? call dword ds:[0x0040c010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 d8 b4 40 00 ?? mov dword ds:[0x0040b4d8], eax 89 0d d4 b4 40 00 ?? mov dword ds:[0x0040b4d4], ecx 89 15 d0 b4 40 00 ?? mov dword ds:[0x0040b4d0], edx 89 1d cc b4 40 00 ?? mov dword ds:[0x0040b4cc], ebx 89 35 c8 b4 40 00 ?? mov dword ds:[0x0040b4c8], esi 89 3d c4 b4 40 00 ?? mov dword ds:[0x0040b4c4], edi 66 8c 15 f0 b4 40 00 ?? mov word ds:[0x0040b4f0], ss 66 8c 0d e4 b4 40 00 ?? mov word ds:[0x0040b4e4], cs 66 8c 1d c0 b4 40 00 ?? mov word ds:[0x0040b4c0], ds 66 8c 05 bc b4 40 00 ?? mov word ds:[0x0040b4bc], es 66 8c 25 b8 b4 40 00 ?? mov word ds:[0x0040b4b8], fs 66 8c 2d b4 b4 40 00 ?? mov word ds:[0x0040b4b4], gs 9c ?? pushfd 8f 05 e8 b4 40 00 ?? pop dword ds:[0x0040b4e8] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 dc b4 40 00 ?? mov dword ds:[0x0040b4dc], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 e0 b4 40 00 ?? mov dword ds:[0x0040b4e0], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 ec b4 40 00 ?? mov dword ds:[0x0040b4ec], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 e0 b4 40 00 ?? mov eax, dword ds:[0x0040b4e0] a3 e4 b3 40 00 ?? mov dword ds:[0x0040b3e4], eax c7 05 d8 b3 40 00 09 04 ?? mov dword ds:[0x0040b3d8], 0xc0000409 00 c0 c7 05 dc b3 40 00 01 00 ?? mov dword ds:[0x0040b3dc], 1 00 00 c7 05 e8 b3 40 00 01 00 ?? mov dword ds:[0x0040b3e8], 1 00 00 b9 04 00 00 00 ?? mov ecx, 4 6b d1 00 ?? imul edx, ecx, 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 82 ec b3 40 00 ?? mov dword ds:[edx + 0x0040b3ec], eax 68 a8 8b 40 00 ?? push 0x00408ba8 e8 6a ed ff ff ?? call function 0x004012e9 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4025c0
___report_securityfailureEx
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 20 03 00 00 ?? sub esp, 0x00000320<800> 6a 17 ?? push 0x17<23> ff 15 10 c0 40 00 ?? call dword ds:[0x0040c010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 d8 b4 40 00 ?? mov dword ds:[0x0040b4d8], eax 89 0d d4 b4 40 00 ?? mov dword ds:[0x0040b4d4], ecx 89 15 d0 b4 40 00 ?? mov dword ds:[0x0040b4d0], edx 89 1d cc b4 40 00 ?? mov dword ds:[0x0040b4cc], ebx 89 35 c8 b4 40 00 ?? mov dword ds:[0x0040b4c8], esi 89 3d c4 b4 40 00 ?? mov dword ds:[0x0040b4c4], edi 66 8c 15 f0 b4 40 00 ?? mov word ds:[0x0040b4f0], ss 66 8c 0d e4 b4 40 00 ?? mov word ds:[0x0040b4e4], cs 66 8c 1d c0 b4 40 00 ?? mov word ds:[0x0040b4c0], ds 66 8c 05 bc b4 40 00 ?? mov word ds:[0x0040b4bc], es 66 8c 25 b8 b4 40 00 ?? mov word ds:[0x0040b4b8], fs 66 8c 2d b4 b4 40 00 ?? mov word ds:[0x0040b4b4], gs 9c ?? pushfd 8f 05 e8 b4 40 00 ?? pop dword ds:[0x0040b4e8] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 dc b4 40 00 ?? mov dword ds:[0x0040b4dc], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 e0 b4 40 00 ?? mov dword ds:[0x0040b4e0], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 ec b4 40 00 ?? mov dword ds:[0x0040b4ec], eax 8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>] a1 e0 b4 40 00 ?? mov eax, dword ds:[0x0040b4e0] a3 e4 b3 40 00 ?? mov dword ds:[0x0040b3e4], eax c7 05 d8 b3 40 00 09 04 ?? mov dword ds:[0x0040b3d8], 0xc0000409 00 c0 c7 05 dc b3 40 00 01 00 ?? mov dword ds:[0x0040b3dc], 1 00 00 83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0 76 0d ?? jbe basic block L7 L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0 75 07 ?? jne basic block L7 L6: c7 45 0c 00 00 00 00 ?? mov dword ss:[ebp + 12], 0 L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14 76 09 ?? jbe basic block L9 L8: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 83 e9 01 ?? sub ecx, 1 89 4d 0c ?? mov dword ss:[ebp + 12], ecx L9: 8b 55 0c ?? mov edx, dword ss:[ebp + 12] 83 c2 01 ?? add edx, 1 89 15 e8 b3 40 00 ?? mov dword ds:[0x0040b3e8], edx b8 04 00 00 00 ?? mov eax, 4 6b c8 00 ?? imul ecx, eax, 0 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 91 ec b3 40 00 ?? mov dword ds:[ecx + 0x0040b3ec], edx c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 eb 09 ?? jmp basic block L10 L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 3b 4d 0c ?? cmp ecx, dword ss:[ebp + 12] 73 15 ?? jae basic block L12 L11: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 8b 04 81 ?? mov eax, dword ds:[ecx + eax * 4] 89 04 95 f0 b3 40 00 ?? mov dword ds:[0x0040b3f0 + edx * 4], eax eb da ?? jmp 0x004026b2 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 c0 01 ?? add eax, 1 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L12: 68 a8 8b 40 00 ?? push 0x00408ba8 e8 07 ec ff ff ?? call function 0x004012e9 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402730
DebuggerProbe
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 c7 45 e4 01 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001001<4097> e8 2a 06 00 00 ?? call function 0x00402d80 L2: 83 c4 04 ?? add esp, 4 80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0 0f 95 c0 ?? setne al 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402780
DebuggerRuntime
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 c7 45 e4 02 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001002<4098> e8 c8 05 00 00 ?? call function 0x00402d80 L2: 83 c4 04 ?? add esp, 4 80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0 0f 95 c0 ?? setne al 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4027e0
?_RTC_AllocaFailure@@YAXPAXPAU_RTC_ALLOCA_NODE@@H@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 44 01 00 00 ?? sub esp, 0x00000144<324> a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 53 ?? push ebx 8b 5d 0c ?? mov ebx, dword ss:[ebp + 12] 57 ?? push edi 8b 3d 1c b0 40 00 ?? mov edi, dword ds:[0x0040b01c] 89 85 bc fe ff ff ?? mov dword ss:[ebp + 0xfffffebc<4294966972,-324>], eax 83 ff ff ?? cmp edi, 0xff<255,-1> 0f 84 a6 00 00 00 ?? je basic block L10 L2: 85 db ?? test ebx, ebx 75 21 ?? jne basic block L6 L3: 68 f8 90 40 00 ?? push 0x004090f8<"Stack area around _alloca"+47 more> 6a 04 ?? push 4 57 ?? push edi 50 ?? push eax e8 de 02 00 00 ?? call function 0x00402b00 L4: 83 c4 10 ?? add esp, 0x10<16> 5f ?? pop edi 5b ?? pop ebx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 e7 e8 ff ff ?? call function 0x00401118 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L6: 8b 43 0c ?? mov eax, dword ds:[ebx + 12] 56 ?? push esi 83 e8 24 ?? sub eax, 0x24<36> 8d 73 20 ?? lea esi, ds:[ebx + 0x20<32>] 50 ?? push eax 56 ?? push esi 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 50 ?? push eax e8 02 02 00 00 ?? call function 0x00402a50 L7: 68 50 91 40 00 ?? push 0x00409150<"\n"> 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 68 54 91 40 00 ?? push 0x00409154<"> "> 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 50 ?? push eax 8b 43 0c ?? mov eax, dword ds:[ebx + 12] 68 58 91 40 00 ?? push 0x00409158<"\nData: <"> ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 83 e8 24 ?? sub eax, 0x24<36> 68 64 91 40 00 ?? push 0x00409164<"\nAllocation number within"+16 more> 50 ?? push eax 68 98 91 40 00 ?? push 0x00409198<"\nSize: "> 56 ?? push esi 68 a4 91 40 00 ?? push 0x004091a4<"\nAddress: 0x"> 68 b8 91 40 00 ?? push 0x004091b8<"Stack area around _alloca"+46 more> 68 10 92 40 00 ?? push 0x00409210<"%s%s%p%s%zd%s%d%s%s%s%s%s"> 8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>] 68 f4 00 00 00 ?? push 0x000000f4<244> 50 ?? push eax e8 aa e9 ff ff ?? call function 0x00401244 L8: 83 c4 4c ?? add esp, 0x4c<76> 8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>] 50 ?? push eax 6a 04 ?? push 4 57 ?? push edi ff b5 bc fe ff ff ?? push dword ss:[ebp + 0xfffffebc<4294966972,-324>] e8 4e 02 00 00 ?? call function 0x00402b00 L9: 83 c4 10 ?? add esp, 0x10<16> 5e ?? pop esi L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 56 e8 ff ff ?? call function 0x00401118 L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402900
?_RTC_Failure@@YAXPAXH@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 83 f8 04 ?? cmp eax, 4 77 23 ?? ja basic block L5 L2: 8b 0c 85 0c b0 40 00 ?? mov ecx, dword ds:[0x0040b00c + eax * 4] 8b 14 85 b4 8b 40 00 ?? mov edx, dword ds:[0x00408bb4 + eax * 4] 83 f9 ff ?? cmp ecx, 0xff<255,-1> 74 2e ?? je basic block L7 L3: 52 ?? push edx 50 ?? push eax 51 ?? push ecx ff 75 08 ?? push dword ss:[ebp + 8] e8 d7 01 00 00 ?? call function 0x00402b00 L4: 83 c4 10 ?? add esp, 0x10<16> 5d ?? pop ebp c3 ?? ret L5: 8b 15 c8 8b 40 00 ?? mov edx, dword ds:[0x00408bc8] b8 05 00 00 00 ?? mov eax, 5 52 ?? push edx 50 ?? push eax b9 01 00 00 00 ?? mov ecx, 1 51 ?? push ecx ff 75 08 ?? push dword ss:[ebp + 8] e8 b7 01 00 00 ?? call function 0x00402b00 L6: 83 c4 10 ?? add esp, 0x10<16> L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402970
?_RTC_StackFailure@@YAXPAXPBD@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 8b 5d 08 ?? mov ebx, dword ss:[ebp + 8] 56 ?? push esi 8b 75 0c ?? mov esi, dword ss:[ebp + 12] 57 ?? push edi 8b 3d 14 b0 40 00 ?? mov edi, dword ds:[0x0040b014] 83 ff ff ?? cmp edi, 0xff<255,-1> 74 73 ?? je basic block L12 L2: 80 3e 00 ?? cmp byte ds:[esi], 0 74 5c ?? je basic block L9 L3: 56 ?? push esi e8 3e 01 00 00 ?? call function 0x00402ae0 L4: 83 c0 2d ?? add eax, 0x2d<45> 83 c4 04 ?? add esp, 4 3d 00 04 00 00 ?? cmp eax, 0x00000400<1024> 77 49 ?? ja basic block L9 L5: 68 e4 8b 40 00 ?? push 0x00408be4<"Stack around the variable '"> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 76 29 00 00 ?? call function 0x0040533b L6: 56 ?? push esi 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 6a 29 00 00 ?? call function 0x00405341 L7: 68 00 8c 40 00 ?? push 0x00408c00<"' was corrupted."> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 54 29 00 00 ?? call function 0x00405341 L8: 83 c4 24 ?? add esp, 0x24<36> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] eb 05 ?? jmp basic block L10 L9: b8 c0 90 40 00 ?? mov eax, 0x004090c0<"Stack corrupted near unkn"+12 more> L10: 50 ?? push eax 6a 02 ?? push 2 57 ?? push edi 53 ?? push ebx e8 f9 00 00 00 ?? call function 0x00402b00 L11: 83 c4 10 ?? add esp, 0x10<16> L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 01 e7 ff ff ?? call function 0x00401118 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402a50
_getMemBlockDataString
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 33 d2 ?? xor edx, edx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 33 ff ?? xor edi, edi 2b de ?? sub ebx, esi 89 5d 10 ?? mov dword ss:[ebp + 0x10<16>], ebx L2: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 83 f8 10 ?? cmp eax, 0x10<16> 72 05 ?? jb basic block L4 L3: b8 10 00 00 00 ?? mov eax, 0x00000010<16> L4: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 03 cf ?? add ecx, edi 3b d0 ?? cmp edx, eax 73 2c ?? jae basic block L7 L5: 8a 1c 33 ?? mov bl, byte ds:[ebx + esi] 0f b6 c3 ?? movzx eax, bl 50 ?? push eax b8 31 00 00 00 ?? mov eax, 0x00000031<49> 68 f0 90 40 00 ?? push 0x004090f0<"%.2X "> 2b c7 ?? sub eax, edi 50 ?? push eax 51 ?? push ecx e8 ab e7 ff ff ?? call function 0x00401244 L6: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c4 10 ?? add esp, 0x10<16> 88 1e ?? mov byte ds:[esi], bl 42 ?? inc edx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 46 ?? inc esi 83 c7 03 ?? add edi, 3 eb bb ?? jmp basic block L2 L7: 5f ?? pop edi c6 06 00 ?? mov byte ds:[esi], 0 5e ?? pop esi c6 01 00 ?? mov byte ds:[ecx], 0 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402ae0
_strlen_priv
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 8b c2 ?? mov eax, edx L2: 8a 08 ?? mov cl, byte ds:[eax] 40 ?? inc eax 84 c9 ?? test cl, cl L3: 75 f9 ?? jne basic block L2 L4: 2b c2 ?? sub eax, edx 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402b00
failwithmessage
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 3c 0e 00 00 ?? sub esp, 0x00000e3c<3644> a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 53 ?? push ebx 8b 5d 14 ?? mov ebx, dword ss:[ebp + 0x14<20>] 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 56 ?? push esi 89 85 d0 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1d0<4294963664,-3632>], eax 89 9d c4 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1c4<4294963652,-3644>], ebx c7 85 cc f1 ff ff 00 00 ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0 00 00 e8 8b e7 ff ff ?? call function 0x004012c6 L2: 8b f8 ?? mov edi, eax 83 c4 04 ?? add esp, 4 85 ff ?? test edi, edi 75 0f ?? jne basic block L5 L3: 56 ?? push esi e8 1a e5 ff ff ?? call function 0x00401064 L4: 83 c4 04 ?? add esp, 4 89 85 cc f1 ff ff ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], eax L5: 6a 00 ?? push 0 6a 00 ?? push 0 6a ff ?? push 0xff<255,-1> 53 ?? push ebx 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 1c c0 40 00 ?? call dword ds:[0x0040c01c] L6: 3d 00 02 00 00 ?? cmp eax, 0x00000200<512> 73 22 ?? jae basic block L9 L7: 50 ?? push eax 8d 85 d4 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1d4<4294963668,-3628>] 50 ?? push eax 6a ff ?? push 0xff<255,-1> 53 ?? push ebx 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 1c c0 40 00 ?? call dword ds:[0x0040c01c] L8: 8d 9d d4 f1 ff ff ?? lea ebx, ss:[ebp + 0xfffff1d4<4294963668,-3628>] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L10 L9: bb 98 8f 40 00 ?? mov ebx, 0x00408f98<"Runtime Check Error.\r\n Un"+28 more> L10: 68 02 10 00 00 ?? push 0x00001002<4098> e8 91 fb ff ff ?? call function 0x00402730 L11: 83 c4 04 ?? add esp, 4 84 c0 ?? test al, al 74 22 ?? je basic block L15 L12: 8b 85 d0 f1 ff ff ?? mov eax, dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 53 ?? push ebx 56 ?? push esi ff 34 85 cc 8b 40 00 ?? push dword ds:[0x00408bcc + eax * 4] 50 ?? push eax e8 c5 fb ff ff ?? call function 0x00402780 L13: 83 c4 10 ?? add esp, 0x10<16> 84 c0 ?? test al, al 0f 85 27 01 00 00 ?? jne basic block L36 L14: eb 02 ?? jmp basic block L16 L15: b0 01 ?? mov al, 1 L16: 83 bd cc f1 ff ff 00 ?? cmp dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0 75 08 ?? jne basic block L18 L17: 85 ff ?? test edi, edi 0f 84 11 01 00 00 ?? je basic block L35 L18: 84 c0 ?? test al, al 74 0e ?? je basic block L21 L19: ff 15 14 c0 40 00 ?? call dword ds:[0x0040c014] L20: 85 c0 ?? test eax, eax 0f 85 ff 00 00 00 ?? jne basic block L35 L21: 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 8d 85 c8 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1c8<4294963656,-3640>] 50 ?? push eax 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 8d 46 fb ?? lea eax, ds:[esi + 0xfb<251,-5>] 50 ?? push eax e8 4a e4 ff ff ?? call function 0x0040105f L22: 83 c4 18 ?? add esp, 0x18<24> 85 ff ?? test edi, edi 74 32 ?? je basic block L26 L23: 53 ?? push ebx ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 8b cf ?? mov ecx, edi 68 20 90 40 00 ?? push 0x00409020<"Run-Time Check Failure #%d - %s"> 50 ?? push eax ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>] 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax ff 75 0c ?? push dword ss:[ebp + 12] ff 15 00 d0 40 00 ?? call dword ds:[0x0040d000] L24: ff d7 ?? call edi L25: e9 96 00 00 00 ?? jmp basic block L34 L26: 6a 00 ?? push 0 6a 00 ?? push 0 68 0a 03 00 00 ?? push 0x0000030a<778> 8d 85 e0 f8 ff ff ?? lea eax, ss:[ebp + 0xfffff8e0<4294965472,-1824>] be 6c 90 40 00 ?? mov esi, 0x0040906c<"Unknown Filename"> 50 ?? push eax 6a ff ?? push 0xff<255,-1> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 20 c0 40 00 ?? call dword ds:[0x0040c020] L27: 85 c0 ?? test eax, eax 74 06 ?? je basic block L29 L28: 8d b5 e0 f8 ff ff ?? lea esi, ss:[ebp + 0xfffff8e0<4294965472,-1824>] L29: 6a 00 ?? push 0 6a 00 ?? push 0 68 0a 03 00 00 ?? push 0x0000030a<778> 8d 85 d4 f5 ff ff ?? lea eax, ss:[ebp + 0xfffff5d4<4294964692,-2604>] bf 80 90 40 00 ?? mov edi, 0x00409080<"Unknown Module Name"> 50 ?? push eax 6a ff ?? push 0xff<255,-1> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 20 c0 40 00 ?? call dword ds:[0x0040c020] L30: 85 c0 ?? test eax, eax 74 06 ?? je basic block L32 L31: 8d bd d4 f5 ff ff ?? lea edi, ss:[ebp + 0xfffff5d4<4294964692,-2604>] L32: ff b5 c4 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c4<4294963652,-3644>] 8b 9d cc f1 ff ff ?? mov ebx, dword ss:[ebp + 0xfffff1cc<4294963660,-3636>] 8b cb ?? mov ecx, ebx ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 68 98 90 40 00 ?? push 0x00409098<"Run-Time Check Failure #%d - %s"> 57 ?? push edi ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>] 56 ?? push esi ff 75 0c ?? push dword ss:[ebp + 12] ff 15 00 d0 40 00 ?? call dword ds:[0x0040d000] L33: ff d3 ?? call ebx L34: 83 c4 1c ?? add esp, 0x1c<28> 83 f8 01 ?? cmp eax, 1 75 01 ?? jne basic block L36 L35: cc ?? int3 L36: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 1e e4 ff ff ?? call function 0x00401118 L37: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402d80
notify_debugger
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 a0 a6 40 00 ?? push 0x0040a6a0 68 b0 4d 40 00 ?? push function 0x00404db0 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 08 ?? sub esp, 8 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 ff 75 08 ?? push dword ss:[ebp + 8] 6a 06 ?? push 6 6a 00 ?? push 0 68 88 13 6d 40 ?? push 0x406d1388 ff 15 18 c0 40 00 ?? call dword ds:[0x0040c018] L2: eb 16 ?? jmp basic block L5 L3: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 88 13 6d 40 ?? cmp dword ds:[eax], 0x406d1388 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L4: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L5: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402e20
__RTC_UninitUse
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 8b 3d 18 b0 40 00 ?? mov edi, dword ds:[0x0040b018] 83 ff ff ?? cmp edi, 0xff<255,-1> 74 75 ?? je basic block L12 L2: 85 f6 ?? test esi, esi 74 5c ?? je basic block L9 L3: 56 ?? push esi e8 93 fc ff ff ?? call function 0x00402ae0 L4: 83 c0 3a ?? add eax, 0x3a<58> 83 c4 04 ?? add esp, 4 3d 00 04 00 00 ?? cmp eax, 0x00000400<1024> 77 49 ?? ja basic block L9 L5: 68 14 8c 40 00 ?? push 0x00408c14<"The variable '"> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 cb 24 00 00 ?? call function 0x0040533b L6: 56 ?? push esi 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 bf 24 00 00 ?? call function 0x00405341 L7: 68 24 8c 40 00 ?? push 0x00408c24<"' is being used without b"+17 more> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 a9 24 00 00 ?? call function 0x00405341 L8: 83 c4 24 ?? add esp, 0x24<36> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] eb 05 ?? jmp basic block L10 L9: b8 30 92 40 00 ?? mov eax, 0x00409230<"A variable is being used "+26 more> L10: 50 ?? push eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 6a 03 ?? push 3 57 ?? push edi 50 ?? push eax e8 4b fc ff ff ?? call function 0x00402b00 L11: 83 c4 10 ?? add esp, 0x10<16> L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 33 cd ?? xor ecx, ebp 5e ?? pop esi e8 54 e2 ff ff ?? call function 0x00401118 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402f00
___local_stdio_printf_options
0
L1: b8 98 b7 40 00 ?? mov eax, 0x0040b798 c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402f10
__vsprintf_s_l
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 4f e3 ff ff ?? call function 0x00401267 L2: ff 75 18 ?? push dword ss:[ebp + 0x18<24>] ff 75 14 ?? push dword ss:[ebp + 0x14<20>] ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] ff 70 04 ?? push dword ds:[eax + 4] ff 30 ?? push dword ds:[eax] e8 16 24 00 00 ?? call function 0x00405347 L3: 83 c4 1c ?? add esp, 0x1c<28> 85 c0 ?? test eax, eax 79 03 ?? jns basic block L5 L4: 83 c8 ff ?? or eax, 0xff<255,-1> L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402f50
_sprintf_s
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8d 45 14 ?? lea eax, ss:[ebp + 0x14<20>] 50 ?? push eax 6a 00 ?? push 0 ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] e8 fc e1 ff ff ?? call function 0x00401163 L2: 83 c4 14 ?? add esp, 0x14<20> 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402f80
?_RTC_GetErrorFunc@@YAP6AHHPBDH00ZZPBX@Z
0
L1: a1 a4 b7 40 00 ?? mov eax, dword ds:[0x0040b7a4] c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402f90
?_RTC_GetErrorFuncW@@YAP6AHHPB_WH00ZZPBX@Z
0
L1: a1 a8 b7 40 00 ?? mov eax, dword ds:[0x0040b7a8] c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402fa0
__RTC_GetErrDesc
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 f8 04 ?? cmp eax, 4 77 09 ?? ja basic block L3 L2: 8b 04 85 70 92 40 00 ?? mov eax, dword ds:[0x00409270 + eax * 4] 5d ?? pop ebp c3 ?? ret L3: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402fc0
__RTC_NumErrors
0
L1: b8 05 00 00 00 ?? mov eax, 5 c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x402fd0
__RTC_SetErrorFunc
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 a4 b7 40 00 ?? mov eax, dword ds:[0x0040b7a4] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d a4 b7 40 00 ?? mov dword ds:[0x0040b7a4], ecx c7 05 a8 b7 40 00 00 00 ?? mov dword ds:[0x0040b7a8], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403000
__RTC_SetErrorFuncW
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 a8 b7 40 00 ?? mov eax, dword ds:[0x0040b7a8] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d a8 b7 40 00 ?? mov dword ds:[0x0040b7a8], ecx c7 05 a4 b7 40 00 00 00 ?? mov dword ds:[0x0040b7a4], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403030
__RTC_SetErrorType
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 83 fa 04 ?? cmp edx, 4 77 13 ?? ja basic block L3 L2: 8b 04 95 0c b0 40 00 ?? mov eax, dword ds:[0x0040b00c + edx * 4] 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 89 0c 95 0c b0 40 00 ?? mov dword ds:[0x0040b00c + edx * 4], ecx 5d ?? pop ebp c3 ?? ret L3: 83 c8 ff ?? or eax, 0xff<255,-1> 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403060
find_pe_section
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 18 ?? sub esp, 0x18<24> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 03 51 3c ?? add edx, dword ds:[ecx + 0x3c<60>] 89 55 ec ?? mov dword ss:[ebp + 0xec<236,-20>], edx 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 0f b7 51 14 ?? movzx edx, word ds:[ecx + 0x14<20>] 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 8d 4c 10 18 ?? lea ecx, ds:[eax + edx + 0x18<24>] 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>] 0f b7 42 06 ?? movzx eax, word ds:[edx + 6] 6b c8 28 ?? imul ecx, eax, 0x28<40> 03 4d f0 ?? add ecx, dword ss:[ebp + 0xf0<240,-16>] 89 4d e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], ecx 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx eb 09 ?? jmp basic block L2 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 3b 4d e8 ?? cmp ecx, dword ss:[ebp + 0xe8<232,-24>] 74 23 ?? je basic block L7 L3: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 3b 42 0c ?? cmp eax, dword ds:[edx + 12] 72 16 ?? jb basic block L6 L4: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 51 0c ?? mov edx, dword ds:[ecx + 12] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 03 50 08 ?? add edx, dword ds:[eax + 8] 39 55 0c ?? cmp dword ss:[ebp + 12], edx 73 05 ?? jae basic block L6 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] eb 04 ?? jmp basic block L8 L6: eb cc ?? jmp 0x004030a7 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 c0 28 ?? add eax, 0x28<40> 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L7: 33 c0 ?? xor eax, eax L8: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403110
is_potentially_valid_image_base
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 04 ?? jne basic block L3 L2: 32 c0 ?? xor al, al eb 55 ?? jmp basic block L10 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 0f b7 11 ?? movzx edx, word ds:[ecx] 81 fa 4d 5a 00 00 ?? cmp edx, 0x00005a4d<23117> 74 04 ?? je basic block L5 L4: 32 c0 ?? xor al, al eb 3d ?? jmp basic block L10 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 03 48 3c ?? add ecx, dword ds:[eax + 0x3c<60>] 89 4d f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], ecx 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 81 38 50 45 00 00 ?? cmp dword ds:[eax], 0x00004550<17744> 74 04 ?? je basic block L7 L6: 32 c0 ?? xor al, al eb 1c ?? jmp basic block L10 L7: 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 83 c1 18 ?? add ecx, 0x18<24> 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>] 0f b7 02 ?? movzx eax, word ds:[edx] 3d 0b 01 00 00 ?? cmp eax, 0x0000010b<267> 74 04 ?? je basic block L9 L8: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L10 L9: b0 01 ?? mov al, 1 L10: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4031a0
_NtCurrentTeb
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4031b0
___scrt_acquire_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 94 df ff ff ?? call function 0x0040114f L2: 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 32 ?? jmp basic block L11 L4: e8 f9 e0 ff ff ?? call function 0x004012c1 L5: 8b 40 04 ?? mov eax, dword ds:[eax + 4] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] ba b4 b7 40 00 ?? mov edx, 0x0040b7b4 33 c0 ?? xor eax, eax f0 0f b1 0a ?? lock cmpxchg dword ds:[edx], ecx 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 83 7d f8 00 ?? cmp dword ss:[ebp + 0xf8<248,-8>], 0 74 0e ?? je basic block L10 L7: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 3b 45 f8 ?? cmp eax, dword ss:[ebp + 0xf8<248,-8>] 75 04 ?? jne basic block L9 L8: b0 01 ?? mov al, 1 eb 04 ?? jmp basic block L11 L9: eb db ?? jmp basic block L6 L10: 32 c0 ?? xor al, al L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403210
___scrt_dllmain_after_initialize_c
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 37 df ff ff ?? call function 0x0040114f L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 33 df ff ff ?? call function 0x00401154 L4: eb 12 ?? jmp basic block L9 L5: e8 5e df ff ff ?? call function 0x00401186 L6: 85 c0 ?? test eax, eax 74 04 ?? je basic block L8 L7: 32 c0 ?? xor al, al eb 07 ?? jmp basic block L10 L8: e8 c5 de ff ff ?? call function 0x004010fa L9: b0 01 ?? mov al, 1 L10: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403250
___scrt_dllmain_before_initialize_c
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 a5 de ff ff ?? call function 0x004010ff L2: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L5 L4: b0 01 ?? mov al, 1 L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403280
___scrt_dllmain_crt_thread_attach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 35 df ff ff ?? call function 0x004011bd L2: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 17 ?? jmp basic block L9 L4: e8 52 df ff ff ?? call function 0x004011ea L5: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 75 09 ?? jne basic block L8 L6: e8 3d de ff ff ?? call function 0x004010e1 L7: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L9 L8: b0 01 ?? mov al, 1 L9: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4032c0
___scrt_dllmain_crt_thread_detach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 78 de ff ff ?? call function 0x00401140 L2: e8 14 de ff ff ?? call function 0x004010e1 L3: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4032e0
___scrt_dllmain_exception_filter
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 64 de ff ff ?? call function 0x0040114f L2: 85 c0 ?? test eax, eax 75 28 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 22 ?? jne basic block L6 L4: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 51 ?? push ecx 6a 00 ?? push 0 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 52 ?? push edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] ff 15 00 d0 40 00 ?? call dword ds:[0x0040d000] L5: ff 55 fc ?? call dword ss:[ebp + 0xfc<252,-4>] L6: 8b 4d 1c ?? mov ecx, dword ss:[ebp + 0x1c<28>] 51 ?? push ecx 8b 55 18 ?? mov edx, dword ss:[ebp + 0x18<24>] 52 ?? push edx e8 29 20 00 00 ?? call function 0x0040534d L7: 83 c4 08 ?? add esp, 8 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403340
___scrt_dllmain_uninitialize_c
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 07 de ff ff ?? call function 0x0040114f L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 68 bc b7 40 00 ?? push 0x0040b7bc e8 09 20 00 00 ?? call function 0x0040535f L4: 83 c4 04 ?? add esp, 4 eb 0e ?? jmp basic block L8 L5: e8 12 de ff ff ?? call function 0x00401172 L6: 85 c0 ?? test eax, eax 75 05 ?? jne basic block L8 L7: e8 a8 1f 00 00 ?? call function 0x00405311 L8: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403380
___scrt_dllmain_uninitialize_critical
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 5a df ff ff ?? call function 0x004012e4 L2: 83 c4 04 ?? add esp, 4 e8 3f de ff ff ?? call function 0x004011d1 L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4033a0
___scrt_initialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 b8 b7 40 00 01 ?? mov byte ds:[0x0040b7b8], 1 L3: e8 9f dd ff ff ?? call function 0x00401154 L4: e8 44 de ff ff ?? call function 0x004011fe L5: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al eb 1c ?? jmp basic block L12 L7: e8 39 de ff ff ?? call function 0x00401203 L8: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 75 0e ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 37 dc ff ff ?? call function 0x0040100f L10: 83 c4 04 ?? add esp, 4 32 c0 ?? xor al, al eb 02 ?? jmp basic block L12 L11: b0 01 ?? mov al, 1 L12: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403400
___scrt_initialize_onexit_tables
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 0f b6 05 b9 b7 40 00 ?? movzx eax, byte ds:[0x0040b7b9] 85 c0 ?? test eax, eax 74 07 ?? je basic block L3 L2: b0 01 ?? mov al, 1 e9 b6 00 00 00 ?? jmp basic block L18 L3: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 74 0d ?? je basic block L6 L4: 83 7d 08 01 ?? cmp dword ss:[ebp + 8], 1 74 07 ?? je basic block L6 L5: 6a 05 ?? push 5 e8 3d dd ff ff ?? call function 0x00401168 L6: e8 1f dd ff ff ?? call function 0x0040114f L7: 85 c0 ?? test eax, eax 74 32 ?? je basic block L16 L8: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 2c ?? jne basic block L16 L9: 68 bc b7 40 00 ?? push 0x0040b7bc e8 0f 1f 00 00 ?? call function 0x00405353 L10: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 04 ?? je basic block L12 L11: 32 c0 ?? xor al, al eb 7f ?? jmp basic block L18 L12: 68 c8 b7 40 00 ?? push 0x0040b7c8 e8 fa 1e 00 00 ?? call function 0x00405353 L13: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 04 ?? je basic block L15 L14: 32 c0 ?? xor al, al eb 6a ?? jmp basic block L18 L15: eb 5f ?? jmp basic block L17 L16: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 89 55 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 89 0d bc b7 40 00 ?? mov dword ds:[0x0040b7bc], ecx 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 89 15 c0 b7 40 00 ?? mov dword ds:[0x0040b7c0], edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] a3 c4 b7 40 00 ?? mov dword ds:[0x0040b7c4], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 89 55 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 89 0d c8 b7 40 00 ?? mov dword ds:[0x0040b7c8], ecx 8b 55 e8 ?? mov edx, dword ss:[ebp + 0xe8<232,-24>] 89 15 cc b7 40 00 ?? mov dword ds:[0x0040b7cc], edx 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] a3 d0 b7 40 00 ?? mov dword ds:[0x0040b7d0], eax L17: c6 05 b9 b7 40 00 01 ?? mov byte ds:[0x0040b7b9], 1 b0 01 ?? mov al, 1 L18: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403510
___scrt_is_nonwritable_in_current_image
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 c0 a6 40 00 ?? push 0x0040a6c0 68 20 3f 40 00 ?? push function 0x00403f20 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 d8 ?? add esp, 0xd8<216,-40> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], eax c7 45 dc 00 00 40 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x00400000 c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>] 51 ?? push ecx e8 b0 fb ff ff ?? call function 0x00403110 L2: 83 c4 04 ?? add esp, 4 0f b6 d0 ?? movzx edx, al 85 d2 ?? test edx, edx 75 13 ?? jne basic block L4 L3: c6 45 e7 00 ?? mov byte ss:[ebp + 0xe7<231,-25>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e7 ?? mov al, byte ss:[ebp + 0xe7<231,-25>] e9 aa 00 00 00 ?? jmp basic block L17 L4: 8b 45 d0 ?? mov eax, dword ss:[ebp + 0xd0<208,-48>] 2b 45 dc ?? sub eax, dword ss:[ebp + 0xdc<220,-36>] 89 45 cc ?? mov dword ss:[ebp + 0xcc<204,-52>], eax 8b 4d cc ?? mov ecx, dword ss:[ebp + 0xcc<204,-52>] 51 ?? push ecx 8b 55 dc ?? mov edx, dword ss:[ebp + 0xdc<220,-36>] 52 ?? push edx e8 cd fa ff ff ?? call function 0x00403060 L5: 83 c4 08 ?? add esp, 8 89 45 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], eax 83 7d d8 00 ?? cmp dword ss:[ebp + 0xd8<216,-40>], 0 75 10 ?? jne basic block L7 L6: c6 45 e6 00 ?? mov byte ss:[ebp + 0xe6<230,-26>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e6 ?? mov al, byte ss:[ebp + 0xe6<230,-26>] eb 78 ?? jmp basic block L17 L7: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>] 8b 48 24 ?? mov ecx, dword ds:[eax + 0x24<36>] 81 e1 00 00 00 80 ?? and ecx, 0x80000000 74 10 ?? je basic block L9 L8: c6 45 e5 00 ?? mov byte ss:[ebp + 0xe5<229,-27>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e5 ?? mov al, byte ss:[ebp + 0xe5<229,-27>] eb 5a ?? jmp basic block L17 L9: c6 45 e4 01 ?? mov byte ss:[ebp + 0xe4<228,-28>], 1 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e4 ?? mov al, byte ss:[ebp + 0xe4<228,-28>] eb 4a ?? jmp basic block L17 L10: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> eb 41 ?? jmp basic block L17 L11: 8b 55 ec ?? mov edx, dword ss:[ebp + 0xec<236,-20>] 8b 02 ?? mov eax, dword ds:[edx] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d c8 ?? mov dword ss:[ebp + 0xc8<200,-56>], ecx 81 7d c8 05 00 00 c0 ?? cmp dword ss:[ebp + 0xc8<200,-56>], 0xc0000005 75 09 ?? jne basic block L13 L12: c7 45 d4 01 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 1 eb 07 ?? jmp basic block L14 L13: c7 45 d4 00 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0 L14: 8b 45 d4 ?? mov eax, dword ss:[ebp + 0xd4<212,-44>] c3 ?? ret L15: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] c6 45 e3 00 ?? mov byte ss:[ebp + 0xe3<227,-29>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e3 ?? mov al, byte ss:[ebp + 0xe3<227,-29>] eb 07 ?? jmp basic block L17 L16: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> L17: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403690
___scrt_release_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 b7 da ff ff ?? call function 0x0040114f L2: 85 c0 ?? test eax, eax 75 02 ?? jne basic block L4 L3: eb 13 ?? jmp basic block L7 L4: 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8] 85 c0 ?? test eax, eax 74 02 ?? je basic block L6 L5: eb 09 ?? jmp basic block L7 L6: 33 c9 ?? xor ecx, ecx ba b4 b7 40 00 ?? mov edx, 0x0040b7b4 87 0a ?? xchg dword ds:[edx], ecx L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4036c0
___scrt_uninitialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 0f b6 05 b8 b7 40 00 ?? movzx eax, byte ds:[0x0040b7b8] 85 c0 ?? test eax, eax 74 0c ?? je basic block L4 L2: 0f b6 4d 0c ?? movzx ecx, byte ss:[ebp + 12] 85 c9 ?? test ecx, ecx 74 04 ?? je basic block L4 L3: b0 01 ?? mov al, 1 eb 1c ?? jmp basic block L7 L4: 0f b6 55 08 ?? movzx edx, byte ss:[ebp + 8] 52 ?? push edx e8 11 da ff ff ?? call function 0x004010f5 L5: 83 c4 04 ?? add esp, 4 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8] 50 ?? push eax e8 1e d9 ff ff ?? call function 0x0040100f L6: 83 c4 04 ?? add esp, 4 b0 01 ?? mov al, 1 L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403710
__onexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 a1 bc b7 40 00 ?? mov eax, dword ds:[0x0040b7bc] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 83 7d f4 ff ?? cmp dword ss:[ebp + 0xf4<244,-12>], 0xff<255,-1> 75 26 ?? jne basic block L8 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 38 1c 00 00 ?? call function 0x00405365 L3: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 75 08 ?? jne basic block L5 L4: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx eb 07 ?? jmp basic block L6 L5: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 L6: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] eb 29 ?? jmp basic block L13 L7: eb 27 ?? jmp basic block L13 L8: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 68 bc b7 40 00 ?? push 0x0040b7bc e8 01 1c 00 00 ?? call function 0x00405359 L9: 83 c4 08 ?? add esp, 8 85 c0 ?? test eax, eax 75 08 ?? jne basic block L11 L10: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 4d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ecx eb 07 ?? jmp basic block L12 L11: c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0 L12: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403790
_at_quick_exit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 a1 c8 b7 40 00 ?? mov eax, dword ds:[0x0040b7c8] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc ff ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xff<255,-1> 75 10 ?? jne basic block L5 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 be 1b 00 00 ?? call function 0x0040536b L3: 83 c4 04 ?? add esp, 4 eb 19 ?? jmp basic block L7 L4: eb 17 ?? jmp basic block L7 L5: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 50 ?? push eax 68 c8 b7 40 00 ?? push 0x0040b7c8 e8 91 1b 00 00 ?? call function 0x00405359 L6: 83 c4 08 ?? add esp, 8 L7: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4037e0
_atexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 a3 d9 ff ff ?? call function 0x00401190 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 09 ?? je basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp basic block L5 L4: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1> L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403820
__get_entropy
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 33 c0 ?? xor eax, eax 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] 51 ?? push ecx ff 15 58 c0 40 00 ?? call dword ds:[0x0040c058] L2: 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 33 45 f8 ?? xor eax, dword ss:[ebp + 0xf8<248,-8>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 2c c0 40 00 ?? call dword ds:[0x0040c02c] L3: 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 28 c0 40 00 ?? call dword ds:[0x0040c028] L4: 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8d 4d ec ?? lea ecx, ss:[ebp + 0xec<236,-20>] 51 ?? push ecx ff 15 24 c0 40 00 ?? call dword ds:[0x0040c024] L5: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 33 55 ec ?? xor edx, dword ss:[ebp + 0xec<236,-20>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 33 45 f0 ?? xor eax, dword ss:[ebp + 0xf0<240,-16>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8d 55 fc ?? lea edx, ss:[ebp + 0xfc<252,-4>] 33 ca ?? xor ecx, edx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4038b0
___security_init_cookie
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 81 3d 04 b0 40 00 4e e6 ?? cmp dword ds:[0x0040b004], 0xbb40e64e 40 bb 74 1c ?? je basic block L4 L2: a1 04 b0 40 00 ?? mov eax, dword ds:[0x0040b004] 25 00 00 ff ff ?? and eax, 0xffff0000<4294901760,-65536> 74 10 ?? je basic block L4 L3: 8b 0d 04 b0 40 00 ?? mov ecx, dword ds:[0x0040b004] f7 d1 ?? not ecx 89 0d 00 b0 40 00 ?? mov dword ds:[0x0040b000], ecx eb 4a ?? jmp basic block L10 L4: e8 3f ff ff ff ?? call function 0x00403820 L5: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 81 7d fc 4e e6 40 bb ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xbb40e64e 75 09 ?? jne basic block L7 L6: c7 45 fc 4f e6 40 bb ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xbb40e64f eb 1c ?? jmp basic block L9 L7: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 e2 00 00 ff ff ?? and edx, 0xffff0000<4294901760,-65536> 75 11 ?? jne basic block L9 L8: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 0d 11 47 00 00 ?? or eax, 0x00004711<18193> c1 e0 10 ?? shl eax, 0x10<16> 0b 45 fc ?? or eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L9: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 0d 04 b0 40 00 ?? mov dword ds:[0x0040b004], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] f7 d2 ?? not edx 89 15 00 b0 40 00 ?? mov dword ds:[0x0040b000], edx L10: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403950
__matherr
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403960
__get_startup_argv_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 01 00 00 00 ?? mov eax, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403970
__get_startup_commit_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403980
__get_startup_file_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 00 40 00 00 ?? mov eax, 0x00004000<16384> 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403990
__get_startup_new_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4039a0
__get_startup_thread_locale_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4039b0
?__scrt_initialize_type_info@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 e0 b7 40 00 ?? push 0x0040b7e0 ff 15 54 c0 40 00 ?? call dword ds:[0x0040c054] L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4039d0
?__scrt_uninitialize_type_info@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 e0 b7 40 00 ?? push 0x0040b7e0 e8 98 18 00 00 ?? call function 0x00405275 L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4039f0
__should_initialize_environment
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403a00
__initialize_default_precision
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 00 00 03 00 ?? push 0x00030000 68 00 00 01 00 ?? push 0x00010000 6a 00 ?? push 0 e8 5d 19 00 00 ?? call function 0x00405371 L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: 6a 07 ?? push 7 e8 46 d7 ff ff ?? call function 0x00401168 L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403a30
__initialize_invalid_parameter_handler
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403a40
__initialize_denormal_control
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403a50
___local_stdio_scanf_options
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 f0 b7 40 00 ?? mov eax, 0x0040b7f0 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403a60
___scrt_initialize_default_local_stdio_options
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 fc d7 ff ff ?? call function 0x00401267 L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 08 ?? mov ecx, dword ds:[eax] 83 c9 24 ?? or ecx, 0x24<36> 8b 50 04 ?? mov edx, dword ds:[eax + 4] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 89 08 ?? mov dword ds:[eax], ecx 89 50 04 ?? mov dword ds:[eax + 4], edx e8 22 d8 ff ff ?? call function 0x004012a8 L3: 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 8b 11 ?? mov edx, dword ds:[ecx] 83 ca 02 ?? or edx, 2 8b 41 04 ?? mov eax, dword ds:[ecx + 4] 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 89 11 ?? mov dword ds:[ecx], edx 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403ab0
___scrt_is_user_matherr_present
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d 28 b0 40 00 00 ?? cmp dword ds:[0x0040b028], 0 75 09 ?? jne basic block L3 L2: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 eb 07 ?? jmp basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403ae0
___scrt_get_dyn_tls_init_callback
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 24 b8 40 00 ?? mov eax, 0x0040b824 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403af0
___scrt_get_dyn_tls_dtor_callback
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 18 b8 40 00 ?? mov eax, 0x0040b818 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403b00
___scrt_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 2c 03 00 00 ?? sub esp, 0x0000032c<812> 6a 17 ?? push 0x17<23> ff 15 10 c0 40 00 ?? call dword ds:[0x0040c010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: 6a 03 ?? push 3 e8 00 d7 ff ff ?? call function 0x00401221 L5: 83 c4 04 ?? add esp, 4 68 cc 02 00 00 ?? push 0x000002cc<716> 6a 00 ?? push 0 8d 85 d4 fc ff ff ?? lea eax, ss:[ebp + 0xfffffcd4<4294966484,-812>] 50 ?? push eax e8 50 17 00 00 ?? call function 0x00405287 L6: 83 c4 0c ?? add esp, 12 89 85 84 fd ff ff ?? mov dword ss:[ebp + 0xfffffd84<4294966660,-636>], eax 89 8d 80 fd ff ff ?? mov dword ss:[ebp + 0xfffffd80<4294966656,-640>], ecx 89 95 7c fd ff ff ?? mov dword ss:[ebp + 0xfffffd7c<4294966652,-644>], edx 89 9d 78 fd ff ff ?? mov dword ss:[ebp + 0xfffffd78<4294966648,-648>], ebx 89 b5 74 fd ff ff ?? mov dword ss:[ebp + 0xfffffd74<4294966644,-652>], esi 89 bd 70 fd ff ff ?? mov dword ss:[ebp + 0xfffffd70<4294966640,-656>], edi 66 8c 95 9c fd ff ff ?? mov word ss:[ebp + 0xfffffd9c<4294966684,-612>], ss 66 8c 8d 90 fd ff ff ?? mov word ss:[ebp + 0xfffffd90<4294966672,-624>], cs 66 8c 9d 6c fd ff ff ?? mov word ss:[ebp + 0xfffffd6c<4294966636,-660>], ds 66 8c 85 68 fd ff ff ?? mov word ss:[ebp + 0xfffffd68<4294966632,-664>], es 66 8c a5 64 fd ff ff ?? mov word ss:[ebp + 0xfffffd64<4294966628,-668>], fs 66 8c ad 60 fd ff ff ?? mov word ss:[ebp + 0xfffffd60<4294966624,-672>], gs 9c ?? pushfd 8f 85 94 fd ff ff ?? pop dword ss:[ebp + 0xfffffd94<4294966676,-620>] c7 85 d4 fc ff ff 01 00 ?? mov dword ss:[ebp + 0xfffffcd4<4294966484,-812>], 0x00010001 01 00 8b 4d 04 ?? mov ecx, dword ss:[ebp + 4] 89 8d 8c fd ff ff ?? mov dword ss:[ebp + 0xfffffd8c<4294966668,-628>], ecx 8d 55 04 ?? lea edx, ss:[ebp + 4] 89 95 98 fd ff ff ?? mov dword ss:[ebp + 0xfffffd98<4294966680,-616>], edx 8d 45 04 ?? lea eax, ss:[ebp + 4] 8b 48 fc ?? mov ecx, dword ds:[eax + 0xfc<252,-4>] 89 8d 88 fd ff ff ?? mov dword ss:[ebp + 0xfffffd88<4294966664,-632>], ecx 6a 50 ?? push 0x50<80> 6a 00 ?? push 0 8d 55 a0 ?? lea edx, ss:[ebp + 0xa0<160,-96>] 52 ?? push edx e8 c3 16 00 00 ?? call function 0x00405287 L7: 83 c4 0c ?? add esp, 12 c7 45 a0 15 00 00 40 ?? mov dword ss:[ebp + 0xa0<160,-96>], 0x40000015 c7 45 a4 01 00 00 00 ?? mov dword ss:[ebp + 0xa4<164,-92>], 1 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 89 45 ac ?? mov dword ss:[ebp + 0xac<172,-84>], eax ff 15 14 c0 40 00 ?? call dword ds:[0x0040c014] L8: 83 f8 01 ?? cmp eax, 1 75 06 ?? jne basic block L10 L9: c6 45 ff 01 ?? mov byte ss:[ebp + 0xff<255,-1>], 1 eb 04 ?? jmp basic block L11 L10: c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 L11: 8a 4d ff ?? mov cl, byte ss:[ebp + 0xff<255,-1>] 88 4d fe ?? mov byte ss:[ebp + 0xfe<254,-2>], cl 8d 55 a0 ?? lea edx, ss:[ebp + 0xa0<160,-96>] 89 55 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edx 8d 85 d4 fc ff ff ?? lea eax, ss:[ebp + 0xfffffcd4<4294966484,-812>] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 6a 00 ?? push 0 ff 15 04 c0 40 00 ?? call dword ds:[0x0040c004] L12: 8d 4d f0 ?? lea ecx, ss:[ebp + 0xf0<240,-16>] 51 ?? push ecx ff 15 44 c0 40 00 ?? call dword ds:[0x0040c044] L13: 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 83 7d f8 00 ?? cmp dword ss:[ebp + 0xf8<248,-8>], 0 75 12 ?? jne basic block L17 L14: 0f b6 55 fe ?? movzx edx, byte ss:[ebp + 0xfe<254,-2>] 85 d2 ?? test edx, edx 75 0a ?? jne basic block L17 L15: 6a 03 ?? push 3 e8 f2 d5 ff ff ?? call function 0x00401221 L16: 83 c4 04 ?? add esp, 4 L17: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403c90
___scrt_get_show_window_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 48 ?? sub esp, 0x48<72> 6a 44 ?? push 0x44<68> 6a 00 ?? push 0 8d 45 b8 ?? lea eax, ss:[ebp + 0xb8<184,-72>] 50 ?? push eax e8 e4 15 00 00 ?? call function 0x00405287 L2: 83 c4 0c ?? add esp, 12 8d 4d b8 ?? lea ecx, ss:[ebp + 0xb8<184,-72>] 51 ?? push ecx ff 15 50 c0 40 00 ?? call dword ds:[0x0040c050] L3: 8b 55 e4 ?? mov edx, dword ss:[ebp + 0xe4<228,-28>] 83 e2 01 ?? and edx, 1 74 09 ?? je basic block L5 L4: 0f b7 45 e8 ?? movzx eax, word ss:[ebp + 0xe8<232,-24>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax eb 07 ?? jmp basic block L6 L5: c7 45 fc 0a 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 10 L6: 0f b7 45 fc ?? movzx eax, word ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403ce0
___scrt_initialize_mta
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 59 d3 ff ff ?? call function 0x00401041 L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403cf0
___scrt_initialize_winrt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403d00
___scrt_is_managed_app
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 6a 00 ?? push 0 ff 15 4c c0 40 00 ?? call dword ds:[0x0040c04c] L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 64 ?? jmp basic block L15 L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 0f b7 08 ?? movzx ecx, word ds:[eax] 81 f9 4d 5a 00 00 ?? cmp ecx, 0x00005a4d<23117> 74 04 ?? je basic block L6 L5: 32 c0 ?? xor al, al eb 52 ?? jmp basic block L15 L6: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 03 42 3c ?? add eax, dword ds:[edx + 0x3c<60>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 74 04 ?? je basic block L8 L7: 32 c0 ?? xor al, al eb 37 ?? jmp basic block L15 L8: 8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>] 0f b7 42 18 ?? movzx eax, word ds:[edx + 0x18<24>] 3d 0b 01 00 00 ?? cmp eax, 0x0000010b<267> 74 04 ?? je basic block L10 L9: 32 c0 ?? xor al, al eb 25 ?? jmp basic block L15 L10: 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 83 79 74 0e ?? cmp dword ds:[ecx + 0x74<116>], 14 77 04 ?? ja basic block L12 L11: 32 c0 ?? xor al, al eb 18 ?? jmp basic block L15 L12: ba 08 00 00 00 ?? mov edx, 8 6b c2 0e ?? imul eax, edx, 14 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 83 7c 01 78 00 ?? cmp dword ds:[ecx + eax + 0x78<120>], 0 75 04 ?? jne basic block L14 L13: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L15 L14: b0 01 ?? mov al, 1 L15: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403db0
___scrt_set_unhandled_exception_filter
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 68 76 12 40 00 ?? push 0x00401276 ff 15 04 c0 40 00 ?? call dword ds:[0x0040c004] L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403dd0
___scrt_exe_initialize_mta
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403dd0
___scrt_stub_for_initialize_mta
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403de0
___scrt_unhandled_exception_filter@4
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 3a 63 73 6d e0 ?? cmp dword ds:[edx], 0xe06d7363 75 5b ?? jne basic block L10 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 78 10 03 ?? cmp dword ds:[eax + 0x10<16>], 3 75 52 ?? jne basic block L10 L3: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 81 79 14 20 05 93 19 ?? cmp dword ds:[ecx + 0x14<20>], 0x19930520 74 24 ?? je basic block L7 L4: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 7a 14 21 05 93 19 ?? cmp dword ds:[edx + 0x14<20>], 0x19930521 74 18 ?? je basic block L7 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 81 78 14 22 05 93 19 ?? cmp dword ds:[eax + 0x14<20>], 0x19930522 74 0c ?? je basic block L7 L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 81 79 14 00 40 99 01 ?? cmp dword ds:[ecx + 0x14<20>], 0x01994000 75 22 ?? jne basic block L10 L7: e8 44 14 00 00 ?? call function 0x0040527b L8: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 89 10 ?? mov dword ds:[eax], edx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 89 4d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ecx e8 37 14 00 00 ?? call function 0x00405281 L9: 8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>] 89 10 ?? mov dword ds:[eax], edx e8 23 15 00 00 ?? call function 0x00405377 L10: 33 c0 ?? xor eax, eax 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/ooex2.exe
0x403e80
__crt_debugger_hook
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp c7 05 fc b7 40 00 00 00 ?? mov dword ds:[0x0040b7fc], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403ea0
__RTC_Initialize
0
L1: 56 ?? push esi be 88 9f 40 00 ?? mov esi, 0x00409f88 8b c6 ?? mov eax, esi 3d 8c a1 40 00 ?? cmp eax, 0x0040a18c 73 1d ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 00 d0 40 00 ?? call dword ds:[0x0040d000] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 81 fe 8c a1 40 00 ?? cmp esi, 0x0040a18c 72 e5 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403ee0
__RTC_Terminate
0
L1: 56 ?? push esi be 94 a2 40 00 ?? mov esi, 0x0040a294 8b c6 ?? mov eax, esi 3d 98 a4 40 00 ?? cmp eax, 0x0040a498 73 1d ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 00 d0 40 00 ?? call dword ds:[0x0040d000] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 81 fe 98 a4 40 00 ?? cmp esi, 0x0040a498 72 e5 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403f20
__except_handler4
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 51 ?? push ecx e8 a2 d3 ff ff ?? call function 0x004012d0 L2: 83 c4 04 ?? add esp, 4 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 02 ?? mov dword ds:[edx], eax 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 50 ?? push eax 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 51 ?? push ecx 8b 55 0c ?? mov edx, dword ss:[ebp + 12] 52 ?? push edx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 68 18 11 40 00 ?? push function 0x00401118 68 04 b0 40 00 ?? push 0x0040b004 e8 38 13 00 00 ?? call function 0x0040528d L3: 83 c4 18 ?? add esp, 0x18<24> 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403f70
@_guard_check_icall_nop@4
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403f80
_ReadNoFence
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403fa0
_ReadPointerNoFence
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 cf d2 ff ff ?? call function 0x0040127b L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403fc0
__InlineInterlockedExchangePointer
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 87 01 ?? xchg dword ds:[ecx], eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403fd0
___castguard_check_failure_debugbreak
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 24 01 00 00 ?? call function 0x00404100 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 01 ?? je basic block L4 L3: cc ?? int3 L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x403ff0
___castguard_check_failure_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 04 01 00 00 ?? call function 0x00404100 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: b9 41 00 00 00 ?? mov ecx, 0x00000041<65> cd 29 ?? int 0x29<41> L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404020
___castguard_check_failure_nop
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404030
___castguard_check_failure_os_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 c4 00 00 00 ?? call function 0x00404100 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 14 00 00 00 ?? call function 0x00404060 L4: 83 c4 04 ?? add esp, 4 L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404060
__castguard_check_failure_os_handled_wrapper
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 08 d0 40 00 00 ?? cmp dword ds:[0x0040d008], 0 74 0f ?? je basic block L4 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 0d 08 d0 40 00 ?? mov ecx, dword ds:[0x0040d008] ff d1 ?? call ecx L3: 83 c4 04 ?? add esp, 4 L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404090
___castguard_check_failure_user_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 64 00 00 00 ?? call function 0x00404100 L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 14 00 00 00 ?? call function 0x004040c0 L4: 83 c4 04 ?? add esp, 4 L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4040c0
__castguard_check_failure_user_handled_wrapper
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 a1 00 b8 40 00 ?? mov eax, dword ds:[0x0040b800] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0 74 19 ?? je basic block L5 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] ff 15 00 d0 40 00 ?? call dword ds:[0x0040d000] L3: ff 55 f8 ?? call dword ss:[ebp + 0xf8<248,-8>] L4: 83 c4 04 ?? add esp, 4 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404100
__castguard_compat_check
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> c7 45 fc 00 98 40 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0x00409800 c7 45 f4 40 99 40 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 0x00409940 8b 45 f4 ?? mov eax, dword ss:[ebp + 0xf4<244,-12>] 2b 45 fc ?? sub eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 2b 4d fc ?? sub ecx, dword ss:[ebp + 0xfc<252,-4>] 3b 4d f0 ?? cmp ecx, dword ss:[ebp + 0xf0<240,-16>] 77 09 ?? ja basic block L3 L2: c7 45 f8 01 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 1 eb 07 ?? jmp basic block L4 L3: c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0 L4: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404150
___castguard_set_user_handler
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 68 00 b8 40 00 ?? push 0x0040b800 e8 1f d0 ff ff ?? call function 0x00401181 L2: 83 c4 08 ?? add esp, 8 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x404180
___castguard_slow_path_check_debugbreak
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 50 ?? push eax 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 51 ?? push ecx 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 52 ?? push edx e8 2c 01 00 00 ?? call function 0x004042c0 L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 11 ?? je basic block L6 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 5c ff ff ff ?? call function 0x00404100 L4: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 01 ?? je basic block L6 L5: cc ?? int3 L6: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/ooex2.exe
0x4041c0
___castguard_slow_path_check_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 50 ?? push eax 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 51 ?? push ecx 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 52 ?? push edx e8 ec 00 00 00 ?? call function 0x004042c0 L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 17 ?? je basic block L6 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 1c ff ff ff ?? call function 0x00404100 L4: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 07 ?? je basic block L6 L5: b9 41 00 00 00 ?? mov ecx, 0x00000041<65> cd 29 ?? int 0x29<41> L6: 5d ?? pop ebp c3 ?? ret