Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
int64
0
1
Disassembly
stringlengths
16
68.6k
./vs2022/normal/Debug/oopoly.exe
0x401f30
??0sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 4d 76 40 00 ?? push 0x0040764d 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 08 ?? sub esp, 8 56 ?? push esi c7 45 ec cc cc cc cc ?? mov dword ss:[ebp + 0xec<236,-20>], 0xcccccccc c7 45 f0 cc cc cc cc ?? mov dword ss:[ebp + 0xf0<240,-16>], 0xcccccccc a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] e8 f0 f1 ff ff ?? call function 0x00401163 L2: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 8b 11 ?? mov edx, dword ds:[ecx] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 03 4a 04 ?? add ecx, dword ds:[edx + 4] 8b f4 ?? mov esi, esp ff 15 d0 d0 40 00 ?? call dword ds:[function 0x0040d0d0] L3: 3b f4 ?? cmp esi, esp e8 60 f2 ff ff ?? call function 0x004011f4 L4: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 09 ?? jne basic block L6 L5: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] c6 41 04 00 ?? mov byte ds:[ecx + 4], 0 eb 68 ?? jmp basic block L16 L6: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 8b 02 ?? mov eax, dword ds:[edx] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 03 48 04 ?? add ecx, dword ds:[eax + 4] 8b f4 ?? mov esi, esp ff 15 b4 d0 40 00 ?? call dword ds:[function 0x0040d0b4] L7: 3b f4 ?? cmp esi, esp e8 36 f2 ff ff ?? call function 0x004011f4 L8: 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 83 7d ec 00 ?? cmp dword ss:[ebp + 0xec<236,-20>], 0 74 08 ?? je basic block L10 L9: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 3b 4d 08 ?? cmp ecx, dword ss:[ebp + 8] 75 09 ?? jne basic block L11 L10: 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>] c6 42 04 01 ?? mov byte ds:[edx + 4], 1 eb 34 ?? jmp basic block L16 L11: 8b f4 ?? mov esi, esp 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] ff 15 98 d0 40 00 ?? call dword ds:[function 0x0040d098] L12: 3b f4 ?? cmp esi, esp e8 0a f2 ff ff ?? call function 0x004011f4 L13: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 08 ?? mov ecx, dword ds:[eax] 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 03 51 04 ?? add edx, dword ds:[ecx + 4] 8b f4 ?? mov esi, esp 8b ca ?? mov ecx, edx ff 15 d0 d0 40 00 ?? call dword ds:[function 0x0040d0d0] L14: 3b f4 ?? cmp esi, esp e8 ee f1 ff ff ?? call function 0x004011f4 L15: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 88 41 04 ?? mov byte ds:[ecx + 4], al L16: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1> 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>] 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5e ?? pop esi 83 c4 14 ?? add esp, 0x14<20> 3b ec ?? cmp ebp, esp e8 c8 f1 ff ff ?? call function 0x004011f4 L17: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402080
??1_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 80 76 40 00 ?? push 0x00407680 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 0c ?? sub esp, 12 56 ?? push esi c7 45 e8 cc cc cc cc ?? mov dword ss:[ebp + 0xe8<232,-24>], 0xcccccccc c7 45 ec cc cc cc cc ?? mov dword ss:[ebp + 0xec<236,-20>], 0xcccccccc c7 45 f0 cc cc cc cc ?? mov dword ss:[ebp + 0xf0<240,-16>], 0xcccccccc a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], ecx 8b 55 e8 ?? mov edx, dword ss:[ebp + 0xe8<232,-24>] 8b 02 ?? mov eax, dword ds:[edx] 8b 4d e8 ?? mov ecx, dword ss:[ebp + 0xe8<232,-24>] 03 48 04 ?? add ecx, dword ds:[eax + 4] 8b f4 ?? mov esi, esp ff 15 b0 d0 40 00 ?? call dword ds:[function 0x0040d0b0] L2: 3b f4 ?? cmp esi, esp e8 14 f1 ff ff ?? call function 0x004011f4 L3: 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 83 7d ec 00 ?? cmp dword ss:[ebp + 0xec<236,-20>], 0 74 16 ?? je basic block L6 L4: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 11 ?? mov edx, dword ds:[ecx] 8b f4 ?? mov esi, esp 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 42 08 ?? mov eax, dword ds:[edx + 8] ff d0 ?? call eax L5: 3b f4 ?? cmp esi, esp e8 f5 f0 ff ff ?? call function 0x004011f4 L6: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5e ?? pop esi 83 c4 18 ?? add esp, 0x18<24> 3b ec ?? cmp ebp, esp e8 df f0 ff ff ?? call function 0x004011f4 L7: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402150
??1sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 56 ?? push esi c7 45 f8 cc cc cc cc ?? mov dword ss:[ebp + 0xf8<248,-8>], 0xcccccccc c7 45 fc cc cc cc cc ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xcccccccc 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx e8 31 02 00 00 ?? call function 0x0040239e L2: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 06 ?? jne basic block L4 L3: c6 45 fa 01 ?? mov byte ss:[ebp + 0xfa<250,-6>], 1 eb 04 ?? jmp basic block L5 L4: c6 45 fa 00 ?? mov byte ss:[ebp + 0xfa<250,-6>], 0 L5: 8a 4d fa ?? mov cl, byte ss:[ebp + 0xfa<250,-6>] 88 4d fb ?? mov byte ss:[ebp + 0xfb<251,-5>], cl 0f b6 55 fb ?? movzx edx, byte ss:[ebp + 0xfb<251,-5>] 85 d2 ?? test edx, edx 74 14 ?? je basic block L8 L6: 8b f4 ?? mov esi, esp 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 08 ?? mov ecx, dword ds:[eax] ff 15 a4 d0 40 00 ?? call dword ds:[function 0x0040d0a4] L7: 3b f4 ?? cmp esi, esp e8 54 f0 ff ff ?? call function 0x004011f4 L8: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 37 f1 ff ff ?? call function 0x004012df L9: 5e ?? pop esi 83 c4 08 ?? add esp, 8 3b ec ?? cmp ebp, esp e8 41 f0 ff ff ?? call function 0x004011f4 L10: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4021d0
??Bsentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QBE_NXZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 0f b6 40 04 ?? movzx eax, byte ds:[eax + 4] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4021f0
?__empty_global_delete@@YAXPAX@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402200
?__empty_global_delete@@YAXPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402210
?draw@Circle@@UAEXXZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi c7 45 fc cc cc cc cc ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xcccccccc 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b f4 ?? mov esi, esp 68 2d 10 40 00 ?? push 0x0040102d 68 a0 9d 40 00 ?? push 0x00409da0<"Drawing Circle"> a1 d4 d0 40 00 ?? mov eax, dword ds:[0x0040d0d4] 50 ?? push eax e8 23 ef ff ff ?? call function 0x00401159 L2: 83 c4 08 ?? add esp, 8 8b c8 ?? mov ecx, eax ff 15 a0 d0 40 00 ?? call dword ds:[function 0x0040d0a0] L3: 3b f4 ?? cmp esi, esp e8 ac ef ff ff ?? call function 0x004011f4 L4: 5e ?? pop esi 83 c4 04 ?? add esp, 4 3b ec ?? cmp ebp, esp e8 a1 ef ff ff ?? call function 0x004011f4 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402270
?draw@Rectangle@@UAEXXZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi c7 45 fc cc cc cc cc ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xcccccccc 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b f4 ?? mov esi, esp 68 2d 10 40 00 ?? push 0x0040102d 68 7c 9d 40 00 ?? push 0x00409d7c<"Drawing Rectangle"> a1 d4 d0 40 00 ?? mov eax, dword ds:[0x0040d0d4] 50 ?? push eax e8 c3 ee ff ff ?? call function 0x00401159 L2: 83 c4 08 ?? add esp, 8 8b c8 ?? mov ecx, eax ff 15 a0 d0 40 00 ?? call dword ds:[function 0x0040d0a0] L3: 3b f4 ?? cmp esi, esp e8 4c ef ff ff ?? call function 0x004011f4 L4: 5e ?? pop esi 83 c4 04 ?? add esp, 4 3b ec ?? cmp ebp, esp e8 41 ef ff ff ?? call function 0x004011f4 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4022d0
?draw@Triangle@@UAEXXZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi c7 45 fc cc cc cc cc ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xcccccccc 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b f4 ?? mov esi, esp 68 2d 10 40 00 ?? push 0x0040102d 68 c0 9d 40 00 ?? push 0x00409dc0<"Drawing Triangle"> a1 d4 d0 40 00 ?? mov eax, dword ds:[0x0040d0d4] 50 ?? push eax e8 63 ee ff ff ?? call function 0x00401159 L2: 83 c4 08 ?? add esp, 8 8b c8 ?? mov ecx, eax ff 15 a0 d0 40 00 ?? call dword ds:[function 0x0040d0a0] L3: 3b f4 ?? cmp esi, esp e8 ec ee ff ff ?? call function 0x004011f4 L4: 5e ?? pop esi 83 c4 04 ?? add esp, 4 3b ec ?? cmp ebp, esp e8 e1 ee ff ff ?? call function 0x004011f4 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402400
??2@YAPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 da 3a 00 00 ?? call function 0x00405ee7 L3: 83 c4 04 ?? add esp, 4 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0 74 05 ?? je basic block L5 L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] eb 24 ?? jmp 0x00402442 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L5: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 ba 3a 00 00 ?? call function 0x00405ee1 L6: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 75 12 ?? jne basic block L11 L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 75 07 ?? jne basic block L10 L8: e8 e7 ee ff ff ?? call function 0x00401320 L9: eb 05 ?? jmp basic block L11 L10: e8 8d ec ff ff ?? call function 0x004010cd L11: eb c2 ?? jmp basic block L2
./vs2022/normal/Debug/oopoly.exe
0x402460
??3@YAXPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 25 ec ff ff ?? call function 0x00401091 L2: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402480
@_RTC_AllocaHelper@12
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 53 ?? push ebx 56 ?? push esi 8b f1 ?? mov esi, ecx 8b da ?? mov ebx, edx 85 f6 ?? test esi, esi 74 1f ?? je basic block L5 L2: 85 db ?? test ebx, ebx 74 1b ?? je basic block L5 L3: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 85 d2 ?? test edx, edx 74 14 ?? je basic block L5 L4: 57 ?? push edi b0 cc ?? mov al, 0xcc<204,-52> 8b fe ?? mov edi, esi 8b cb ?? mov ecx, ebx f3 aa ?? rep_stosb 8b 02 ?? mov eax, dword ds:[edx] 89 46 04 ?? mov dword ds:[esi + 4], eax 89 5e 0c ?? mov dword ds:[esi + 12], ebx 89 32 ?? mov dword ds:[edx], esi 5f ?? pop edi L5: 5e ?? pop esi 5b ?? pop ebx 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x4024c0
@_RTC_CheckStackVars2@12
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 85 d2 ?? test edx, edx 74 4f ?? je basic block L10 L2: 33 ff ?? xor edi, edi 39 3a ?? cmp dword ds:[edx], edi 7e 49 ?? jle basic block L10 L3: 53 ?? push ebx 33 db ?? xor ebx, ebx 8b f2 ?? mov esi, edx 8d 49 00 ?? lea ecx, ds:[ecx + 0] L4: 8b 4e 04 ?? mov ecx, dword ds:[esi + 4] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 14 19 ?? mov edx, dword ds:[ecx + ebx] 81 7c 02 fc cc cc cc cc ?? cmp dword ds:[edx + eax + 0xfc<252,-4>], 0xcccccccc 75 12 ?? jne basic block L6 L5: 8b 44 19 04 ?? mov eax, dword ds:[ecx + ebx + 4] 03 c2 ?? add eax, edx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 3c 10 cc cc cc cc ?? cmp dword ds:[eax + edx], 0xcccccccc 74 10 ?? je basic block L8 L6: ff 74 19 08 ?? push dword ds:[ecx + ebx + 8] 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 50 ?? push eax e8 c8 ed ff ff ?? call function 0x004012da L7: 83 c4 08 ?? add esp, 8 L8: 47 ?? inc edi 83 c3 0c ?? add ebx, 12 3b 3e ?? cmp edi, dword ds:[esi] 7c c3 ?? jl basic block L4 L9: 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 5b ?? pop ebx L10: 33 ff ?? xor edi, edi 8b c6 ?? mov eax, esi 85 f6 ?? test esi, esi 74 63 ?? je basic block L24 L11: 8d a4 24 00 00 00 00 ?? lea esp, ss:[esp + 0] L12: 8b 40 04 ?? mov eax, dword ds:[eax + 4] 47 ?? inc edi 85 c0 ?? test eax, eax L13: 75 f8 ?? jne basic block L12 L14: 81 3e cc cc cc cc ?? cmp dword ds:[esi], 0xcccccccc 75 1b ?? jne basic block L18 L15: 81 7e 14 cc cc cc cc ?? cmp dword ds:[esi + 0x14<20>], 0xcccccccc 75 12 ?? jne basic block L18 L16: 81 7e 18 cc cc cc cc ?? cmp dword ds:[esi + 0x18<24>], 0xcccccccc 75 09 ?? jne basic block L18 L17: 81 7e 1c cc cc cc cc ?? cmp dword ds:[esi + 0x1c<28>], 0xcccccccc 74 0e ?? je basic block L20 L18: 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 57 ?? push edi 56 ?? push esi 50 ?? push eax e8 07 ec ff ff ?? call function 0x0040116d L19: 83 c4 0c ?? add esp, 12 L20: 8b 46 0c ?? mov eax, dword ds:[esi + 12] 81 7c 30 fc cc cc cc cc ?? cmp dword ds:[eax + esi + 0xfc<252,-4>], 0xcccccccc 74 0e ?? je basic block L23 L21: 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 57 ?? push edi 56 ?? push esi 50 ?? push eax e8 ec eb ff ff ?? call function 0x0040116d L22: 83 c4 0c ?? add esp, 12 L23: 8b 76 04 ?? mov esi, dword ds:[esi + 4] 4f ?? dec edi 85 f6 ?? test esi, esi 75 ac ?? jne basic block L14 L24: 5f ?? pop edi 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x4025d0
@_RTC_CheckStackVars@8
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b da ?? mov ebx, edx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 56 ?? push esi 33 f6 ?? xor esi, esi 39 33 ?? cmp dword ds:[ebx], esi 7e 41 ?? jle basic block L9 L2: 57 ?? push edi 33 ff ?? xor edi, edi L3: 8b 4b 04 ?? mov ecx, dword ds:[ebx + 4] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 14 39 ?? mov edx, dword ds:[ecx + edi] 81 7c 02 fc cc cc cc cc ?? cmp dword ds:[edx + eax + 0xfc<252,-4>], 0xcccccccc 75 12 ?? jne basic block L5 L4: 8b 44 39 04 ?? mov eax, dword ds:[ecx + edi + 4] 03 c2 ?? add eax, edx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 3c 10 cc cc cc cc ?? cmp dword ds:[eax + edx], 0xcccccccc 74 10 ?? je basic block L7 L5: ff 74 39 08 ?? push dword ds:[ecx + edi + 8] 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 50 ?? push eax e8 c4 ec ff ff ?? call function 0x004012da L6: 83 c4 08 ?? add esp, 8 L7: 46 ?? inc esi 83 c7 0c ?? add edi, 12 3b 33 ?? cmp esi, dword ds:[ebx] 7c c3 ?? jl basic block L3 L8: 5f ?? pop edi L9: 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402640
__RTC_CheckEsp
0
L1: 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 00 ?? sub esp, 0 50 ?? push eax 52 ?? push edx 53 ?? push ebx 56 ?? push esi 57 ?? push edi 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 6a 00 ?? push 0 50 ?? push eax e8 7e ea ff ff ?? call function 0x004010d7 L4: 83 c4 08 ?? add esp, 8 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 5a ?? pop edx 58 ?? pop eax 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402670
@__security_check_cookie@4
0
L1: 3b 0d 04 c0 40 00 ?? cmp ecx, dword ds:[0x0040c004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 9b e9 ff ff ?? jmp 0x00401019 e9 12 28 00 00 ?? jmp function 0x00403830
./vs2022/normal/Debug/oopoly.exe
0x402690
__CRT_RTC_INIT
0
L1: b8 ed 5e 40 00 ?? mov eax, function 0x00405eed c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4026a0
__CRT_RTC_INITW
0
L1: b8 f3 5e 40 00 ?? mov eax, function 0x00405ef3 c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4026b0
__RTC_InitBase
0
L1: 80 3d 40 c4 40 00 00 ?? cmp byte ds:[0x0040c440], 0 75 1f ?? jne basic block L5 L2: 6a 00 ?? push 0 6a 01 ?? push 1 6a 00 ?? push 0 6a 00 ?? push 0 6a 00 ?? push 0 c6 05 40 c4 40 00 01 ?? mov byte ds:[0x0040c440], 1 e8 e5 e9 ff ff ?? call function 0x004010b4 L3: 50 ?? push eax e8 f6 eb ff ff ?? call function 0x004012cb L4: 83 c4 18 ?? add esp, 0x18<24> L5: c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4026f0
__RTC_Shutdown
0
L1: 6a 01 ?? push 1 6a 01 ?? push 1 6a 00 ?? push 0 6a 00 ?? push 0 6a 00 ?? push 0 e8 b5 e9 ff ff ?? call function 0x004010b4 L2: 83 c4 14 ?? add esp, 0x14<20> c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402710
??1type_info@@UAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 d8 9d 40 00 ?? mov dword ds:[eax], 0x00409dd8 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402730
??_Etype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ed e9 ff ff ?? call function 0x0040112c L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 17 e9 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402730
??_Gtype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 ed e9 ff ff ?? call function 0x0040112c L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 17 e9 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402770
pre_c_initialization
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 2d e9 ff ff ?? call function 0x004010a5 L2: e8 12 eb ff ff ?? call function 0x0040128f L3: e8 88 e8 ff ff ?? call function 0x0040100a L4: 6a 01 ?? push 1 e8 99 e9 ff ff ?? call function 0x00401122 L5: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 07 ?? jne basic block L7 L6: 6a 07 ?? push 7 e8 05 ea ff ff ?? call function 0x0040119f L7: db e2 ?? fnclex e8 64 e8 ff ff ?? call function 0x00401005 L8: 68 7c 11 40 00 ?? push 0x0040117c e8 03 ea ff ff ?? call function 0x004011ae L9: 83 c4 04 ?? add esp, 4 e8 0f ea ff ff ?? call function 0x004011c2 L10: 85 c0 ?? test eax, eax 74 07 ?? je basic block L12 L11: 6a 07 ?? push 7 e8 e1 e9 ff ff ?? call function 0x0040119f L12: e8 c9 e8 ff ff ?? call function 0x0040108c L13: e8 ff e9 ff ff ?? call function 0x004011c7 L14: 85 c0 ?? test eax, eax 74 0d ?? je basic block L17 L15: 68 f0 10 40 00 ?? push 0x004010f0 e8 2f 37 00 00 ?? call function 0x00405f05 L16: 83 c4 04 ?? add esp, 4 L17: e8 2e eb ff ff ?? call function 0x0040130c L18: e8 4f e8 ff ff ?? call function 0x00401032 L19: e8 d9 ea ff ff ?? call function 0x004012c1 L20: e8 43 ea ff ff ?? call function 0x00401230 L21: 50 ?? push eax e8 66 37 00 00 ?? call function 0x00405f59 L22: 83 c4 04 ?? add esp, 4 e8 9e ea ff ff ?? call function 0x00401299 L23: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L25 L24: e8 16 e9 ff ff ?? call function 0x0040111d L25: e8 29 ea ff ff ?? call function 0x00401235 L26: e8 c0 e9 ff ff ?? call function 0x004011d1 L27: 85 c0 ?? test eax, eax 74 07 ?? je basic block L29 L28: 6a 07 ?? push 7 e8 83 e9 ff ff ?? call function 0x0040119f L29: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402850
post_pgo_initialization
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 fc e8 ff ff ?? call function 0x00401154 L2: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402860
pre_cpp_initialization
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 5e ea ff ff ?? call function 0x004012c6 L2: e8 ce e8 ff ff ?? call function 0x0040113b L3: 50 ?? push eax e8 ec 36 00 00 ?? call function 0x00405f5f L4: 83 c4 04 ?? add esp, 4 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402880
__scrt_common_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 9d ea ff ff ?? call function 0x00401325 L2: e8 13 00 00 00 ?? call function 0x004028a0 L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4028a0
__scrt_common_main_seh
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 a0 ba 40 00 ?? push 0x0040baa0 68 b0 4b 40 00 ?? push function 0x00404bb0 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 cc ?? add esp, 0xcc<204,-52> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp 6a 01 ?? push 1 e8 88 e9 ff ff ?? call function 0x00401262 L2: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 07 ?? jne basic block L4 L3: 6a 07 ?? push 7 e8 b4 e8 ff ff ?? call function 0x0040119f L4: c6 45 e7 00 ?? mov byte ss:[ebp + 0xe7<231,-25>], 0 c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 e8 99 e9 ff ff ?? call function 0x00401294 L5: 88 45 e6 ?? mov byte ss:[ebp + 0xe6<230,-26>], al 83 3d 20 c8 40 00 01 ?? cmp dword ds:[0x0040c820], 1 75 09 ?? jne basic block L8 L6: 6a 07 ?? push 7 e8 91 e8 ff ff ?? call function 0x0040119f L7: eb 61 ?? jmp basic block L15 L8: 83 3d 20 c8 40 00 00 ?? cmp dword ds:[0x0040c820], 0 75 54 ?? jne basic block L14 L9: c7 05 20 c8 40 00 01 00 ?? mov dword ds:[0x0040c820], 1 00 00 68 18 96 40 00 ?? push 0x00409618 68 0c 93 40 00 ?? push 0x0040930c e8 f1 35 00 00 ?? call function 0x00405f23 L10: 83 c4 08 ?? add esp, 8 85 c0 ?? test eax, eax 74 16 ?? je basic block L12 L11: c7 45 c8 ff 00 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0x000000ff<255> c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 c8 ?? mov eax, dword ss:[ebp + 0xc8<200,-56>] e9 53 01 00 00 ?? jmp basic block L46 L12: 68 08 92 40 00 ?? push 0x00409208 68 00 90 40 00 ?? push 0x00409000 e8 bf 35 00 00 ?? call function 0x00405f1d L13: 83 c4 08 ?? add esp, 8 c7 05 20 c8 40 00 02 00 ?? mov dword ds:[0x0040c820], 2 00 00 eb 04 ?? jmp basic block L15 L14: c6 45 e7 01 ?? mov byte ss:[ebp + 0xe7<231,-25>], 1 L15: 0f b6 4d e6 ?? movzx ecx, byte ss:[ebp + 0xe6<230,-26>] 51 ?? push ecx e8 e3 e7 ff ff ?? call function 0x0040115e L16: 83 c4 04 ?? add esp, 4 e8 c3 e6 ff ff ?? call function 0x00401046 L17: 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>] 83 3a 00 ?? cmp dword ds:[edx], 0 74 33 ?? je basic block L22 L18: 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] 50 ?? push eax e8 77 e7 ff ff ?? call function 0x0040110e L19: 83 c4 04 ?? add esp, 4 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 74 20 ?? je basic block L22 L20: 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>] 8b 02 ?? mov eax, dword ds:[edx] 89 45 c4 ?? mov dword ss:[ebp + 0xc4<196,-60>], eax 6a 00 ?? push 0 6a 02 ?? push 2 6a 00 ?? push 0 8b 4d c4 ?? mov ecx, dword ss:[ebp + 0xc4<196,-60>] 89 4d d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], ecx 8b 4d d8 ?? mov ecx, dword ss:[ebp + 0xd8<216,-40>] ff 15 00 f0 40 00 ?? call dword ds:[0x0040f000] L21: ff 55 d8 ?? call dword ss:[ebp + 0xd8<216,-40>] L22: e8 62 e6 ff ff ?? call function 0x00401028 L23: 89 45 dc ?? mov dword ss:[ebp + 0xdc<220,-36>], eax 8b 55 dc ?? mov edx, dword ss:[ebp + 0xdc<220,-36>] 83 3a 00 ?? cmp dword ds:[edx], 0 74 21 ?? je basic block L28 L24: 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>] 50 ?? push eax e8 34 e7 ff ff ?? call function 0x0040110e L25: 83 c4 04 ?? add esp, 4 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 74 0e ?? je basic block L28 L26: 8b 55 dc ?? mov edx, dword ss:[ebp + 0xdc<220,-36>] 8b 02 ?? mov eax, dword ds:[edx] 50 ?? push eax e8 64 35 00 00 ?? call function 0x00405f53 L27: 83 c4 04 ?? add esp, 4 L28: e8 79 01 00 00 ?? call function 0x00402b70 L29: 89 45 d4 ?? mov dword ss:[ebp + 0xd4<212,-44>], eax e8 a4 e8 ff ff ?? call function 0x004012a3 L30: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 75 09 ?? jne basic block L32 L31: 8b 55 d4 ?? mov edx, dword ss:[ebp + 0xd4<212,-44>] 52 ?? push edx e8 1a 35 00 00 ?? call function 0x00405f29 L32: 0f b6 45 e7 ?? movzx eax, byte ss:[ebp + 0xe7<231,-25>] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L34 L33: e8 2b 35 00 00 ?? call function 0x00405f47 L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 43 e7 ff ff ?? call function 0x00401168 L35: 83 c4 08 ?? add esp, 8 8b 4d d4 ?? mov ecx, dword ss:[ebp + 0xd4<212,-44>] 89 4d c0 ?? mov dword ss:[ebp + 0xc0<192,-64>], ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 c0 ?? mov eax, dword ss:[ebp + 0xc0<192,-64>] eb 68 ?? jmp basic block L46 L36: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> eb 5f ?? jmp basic block L46 L37: 8b 55 ec ?? mov edx, dword ss:[ebp + 0xec<236,-20>] 8b 02 ?? mov eax, dword ds:[edx] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], ecx 8b 55 ec ?? mov edx, dword ss:[ebp + 0xec<236,-20>] 52 ?? push edx 8b 45 d0 ?? mov eax, dword ss:[ebp + 0xd0<208,-48>] 50 ?? push eax e8 9f 34 00 00 ?? call function 0x00405ef9 L38: 83 c4 08 ?? add esp, 8 c3 ?? ret L39: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] 8b 4d d0 ?? mov ecx, dword ss:[ebp + 0xd0<208,-48>] 89 4d cc ?? mov dword ss:[ebp + 0xcc<204,-52>], ecx e8 37 e8 ff ff ?? call function 0x004012a3 L40: 0f b6 d0 ?? movzx edx, al 85 d2 ?? test edx, edx 75 09 ?? jne basic block L42 L41: 8b 45 cc ?? mov eax, dword ss:[ebp + 0xcc<204,-52>] 50 ?? push eax e8 b3 34 00 00 ?? call function 0x00405f2f L42: 0f b6 4d e7 ?? movzx ecx, byte ss:[ebp + 0xe7<231,-25>] 85 c9 ?? test ecx, ecx 75 05 ?? jne basic block L44 L43: e8 c4 34 00 00 ?? call function 0x00405f4d L44: 8b 55 cc ?? mov edx, dword ss:[ebp + 0xcc<204,-52>] 89 55 bc ?? mov dword ss:[ebp + 0xbc<188,-68>], edx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 bc ?? mov eax, dword ss:[ebp + 0xbc<188,-68>] eb 07 ?? jmp basic block L46 L45: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> L46: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402b70
invoke_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 e8 9c 33 00 00 ?? call function 0x00405f17 L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax e8 be 33 00 00 ?? call function 0x00405f41 L3: 8b 00 ?? mov eax, dword ds:[eax] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax e8 ae 33 00 00 ?? call function 0x00405f3b L4: 8b 08 ?? mov ecx, dword ds:[eax] 89 4d f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 52 ?? push edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 50 ?? push eax 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 51 ?? push ecx e8 e7 e6 ff ff ?? call function 0x0040128a L5: 83 c4 0c ?? add esp, 12 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402c20
_mainCRTStartup
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 58 fc ff ff ?? call function 0x00402880 L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402c30
??0bad_alloc@std@@AAE@QBD@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 6a 01 ?? push 1 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 3d e4 ff ff ?? call function 0x00401082 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c7 01 0c 9e 40 00 ?? mov dword ds:[ecx], 0x00409e0c 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402c60
??0bad_alloc@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 8b e5 ff ff ?? call function 0x004011fe L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c7 01 0c 9e 40 00 ?? mov dword ds:[ecx], 0x00409e0c 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402c90
??0bad_alloc@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 6a 01 ?? push 1 68 18 9e 40 00 ?? push 0x00409e18<"bad allocation"> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 dc e3 ff ff ?? call function 0x00401082 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 0c 9e 40 00 ?? mov dword ds:[eax], 0x00409e0c 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402cc0
??0bad_array_new_length@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 85 e5 ff ff ?? call function 0x00401258 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] c7 01 30 9e 40 00 ?? mov dword ds:[ecx], 0x00409e30 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402cf0
??0bad_array_new_length@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 68 3c 9e 40 00 ?? push 0x00409e3c<"bad array new length"> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 bf e3 ff ff ?? call function 0x004010c3 L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 30 9e 40 00 ?? mov dword ds:[eax], 0x00409e30 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402d20
??0exception@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 e4 9d 40 00 ?? mov dword ds:[eax], 0x00409de4 33 c9 ?? xor ecx, ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c2 04 ?? add edx, 4 89 0a ?? mov dword ds:[edx], ecx 89 4a 04 ?? mov dword ds:[edx + 4], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 c0 04 ?? add eax, 4 50 ?? push eax 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 83 c1 04 ?? add ecx, 4 51 ?? push ecx e8 49 31 00 00 ?? call function 0x00405e99 L2: 83 c4 08 ?? add esp, 8 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402d70
??0exception@std@@QAE@QBDH@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 e4 9d 40 00 ?? mov dword ds:[eax], 0x00409de4 33 c9 ?? xor ecx, ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c2 04 ?? add edx, 4 89 0a ?? mov dword ds:[edx], ecx 89 4a 04 ?? mov dword ds:[edx + 4], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 48 04 ?? mov dword ds:[eax + 4], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 08 00 ?? ret 8
./vs2022/normal/Debug/oopoly.exe
0x402db0
??1bad_alloc@std@@UAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 39 e5 ff ff ?? call function 0x004012f8 L2: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402dd0
??1bad_array_new_length@std@@UAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 e9 e2 ff ff ?? call function 0x004010c8 L2: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402df0
??1exception@std@@UAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 00 e4 9d 40 00 ?? mov dword ds:[eax], 0x00409de4 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 83 c1 04 ?? add ecx, 4 51 ?? push ecx e8 93 30 00 00 ?? call function 0x00405e9f L2: 83 c4 04 ?? add esp, 4 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402e20
??_Ebad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 99 e2 ff ff ?? call function 0x004010c8 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 27 e2 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402e20
??_Gbad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 99 e2 ff ff ?? call function 0x004010c8 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 27 e2 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402e60
??_Ebad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 94 e3 ff ff ?? call function 0x00401203 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 e7 e1 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402e60
??_Gbad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 94 e3 ff ff ?? call function 0x00401203 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 e7 e1 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402ea0
??_Eexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 49 e4 ff ff ?? call function 0x004012f8 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 a7 e1 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402ea0
??_Gexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] e8 49 e4 ff ff ?? call function 0x004012f8 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 e0 01 ?? and eax, 1 74 0e ?? je basic block L5 L3: 6a 0c ?? push 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 51 ?? push ecx e8 a7 e1 ff ff ?? call function 0x00401069 L4: 83 c4 08 ?? add esp, 8 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/Debug/oopoly.exe
0x402ee0
?__scrt_throw_std_bad_alloc@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 fc e2 ff ff ?? call function 0x004011ea L2: 68 c0 ba 40 00 ?? push 0x0040bac0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 a9 2f 00 00 ?? call function 0x00405ea5 L3: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402f10
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 50 e1 ff ff ?? call function 0x0040106e L2: 68 24 bb 40 00 ?? push 0x0040bb24 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 79 2f 00 00 ?? call function 0x00405ea5 L3: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402f40
?what@exception@std@@UBEPBDXZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 78 04 00 ?? cmp dword ds:[eax + 4], 0 74 0b ?? je basic block L3 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 51 04 ?? mov edx, dword ds:[ecx + 4] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx eb 07 ?? jmp basic block L4 L3: c7 45 f8 f0 9d 40 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0x00409df0<"Unknown exception"> L4: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402f80
??3@YAXPAX@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 dd 2f 00 00 ?? call function 0x00405f6b L2: 83 c4 08 ?? add esp, 8 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402fa0
DebuggerProbe
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 c7 45 e4 01 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001001<4097> e8 2a 06 00 00 ?? call function 0x004035f0 L2: 83 c4 04 ?? add esp, 4 80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0 0f 95 c0 ?? setne al 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x402ff0
DebuggerRuntime
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 c7 45 e4 02 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001002<4098> e8 c8 05 00 00 ?? call function 0x004035f0 L2: 83 c4 04 ?? add esp, 4 80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0 0f 95 c0 ?? setne al 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403050
?_RTC_AllocaFailure@@YAXPAXPAU_RTC_ALLOCA_NODE@@H@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 44 01 00 00 ?? sub esp, 0x00000144<324> a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 53 ?? push ebx 8b 5d 0c ?? mov ebx, dword ss:[ebp + 12] 57 ?? push edi 8b 3d 1c c0 40 00 ?? mov edi, dword ds:[0x0040c01c] 89 85 bc fe ff ff ?? mov dword ss:[ebp + 0xfffffebc<4294966972,-324>], eax 83 ff ff ?? cmp edi, 0xff<255,-1> 0f 84 a6 00 00 00 ?? je basic block L10 L2: 85 db ?? test ebx, ebx 75 21 ?? jne basic block L6 L3: 68 a0 a3 40 00 ?? push 0x0040a3a0<"Stack area around _alloca"+47 more> 6a 04 ?? push 4 57 ?? push edi 50 ?? push eax e8 de 02 00 00 ?? call function 0x00403370 L4: 83 c4 10 ?? add esp, 0x10<16> 5f ?? pop edi 5b ?? pop ebx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 9f e0 ff ff ?? call function 0x00401140 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L6: 8b 43 0c ?? mov eax, dword ds:[ebx + 12] 56 ?? push esi 83 e8 24 ?? sub eax, 0x24<36> 8d 73 20 ?? lea esi, ds:[ebx + 0x20<32>] 50 ?? push eax 56 ?? push esi 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 50 ?? push eax e8 02 02 00 00 ?? call function 0x004032c0 L7: 68 f8 a3 40 00 ?? push 0x0040a3f8<"\n"> 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 68 fc a3 40 00 ?? push 0x0040a3fc<"> "> 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 50 ?? push eax 8b 43 0c ?? mov eax, dword ds:[ebx + 12] 68 00 a4 40 00 ?? push 0x0040a400<"\nData: <"> ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 83 e8 24 ?? sub eax, 0x24<36> 68 0c a4 40 00 ?? push 0x0040a40c<"\nAllocation number within"+16 more> 50 ?? push eax 68 40 a4 40 00 ?? push 0x0040a440<"\nSize: "> 56 ?? push esi 68 4c a4 40 00 ?? push 0x0040a44c<"\nAddress: 0x"> 68 60 a4 40 00 ?? push 0x0040a460<"Stack area around _alloca"+46 more> 68 b8 a4 40 00 ?? push 0x0040a4b8<"%s%s%p%s%zd%s%d%s%s%s%s%s"> 8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>] 68 f4 00 00 00 ?? push 0x000000f4<244> 50 ?? push eax e8 7b e1 ff ff ?? call function 0x00401285 L8: 83 c4 4c ?? add esp, 0x4c<76> 8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>] 50 ?? push eax 6a 04 ?? push 4 57 ?? push edi ff b5 bc fe ff ff ?? push dword ss:[ebp + 0xfffffebc<4294966972,-324>] e8 4e 02 00 00 ?? call function 0x00403370 L9: 83 c4 10 ?? add esp, 0x10<16> 5e ?? pop esi L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 0e e0 ff ff ?? call function 0x00401140 L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403170
?_RTC_Failure@@YAXPAXH@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 83 f8 04 ?? cmp eax, 4 77 23 ?? ja basic block L5 L2: 8b 0c 85 0c c0 40 00 ?? mov ecx, dword ds:[0x0040c00c + eax * 4] 8b 14 85 58 9e 40 00 ?? mov edx, dword ds:[0x00409e58 + eax * 4] 83 f9 ff ?? cmp ecx, 0xff<255,-1> 74 2e ?? je basic block L7 L3: 52 ?? push edx 50 ?? push eax 51 ?? push ecx ff 75 08 ?? push dword ss:[ebp + 8] e8 d7 01 00 00 ?? call function 0x00403370 L4: 83 c4 10 ?? add esp, 0x10<16> 5d ?? pop ebp c3 ?? ret L5: 8b 15 6c 9e 40 00 ?? mov edx, dword ds:[0x00409e6c] b8 05 00 00 00 ?? mov eax, 5 52 ?? push edx 50 ?? push eax b9 01 00 00 00 ?? mov ecx, 1 51 ?? push ecx ff 75 08 ?? push dword ss:[ebp + 8] e8 b7 01 00 00 ?? call function 0x00403370 L6: 83 c4 10 ?? add esp, 0x10<16> L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4031e0
?_RTC_StackFailure@@YAXPAXPBD@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 8b 5d 08 ?? mov ebx, dword ss:[ebp + 8] 56 ?? push esi 8b 75 0c ?? mov esi, dword ss:[ebp + 12] 57 ?? push edi 8b 3d 14 c0 40 00 ?? mov edi, dword ds:[0x0040c014] 83 ff ff ?? cmp edi, 0xff<255,-1> 74 73 ?? je basic block L12 L2: 80 3e 00 ?? cmp byte ds:[esi], 0 74 5c ?? je basic block L9 L3: 56 ?? push esi e8 3e 01 00 00 ?? call function 0x00403350 L4: 83 c0 2d ?? add eax, 0x2d<45> 83 c4 04 ?? add esp, 4 3d 00 04 00 00 ?? cmp eax, 0x00000400<1024> 77 49 ?? ja basic block L9 L5: 68 88 9e 40 00 ?? push 0x00409e88<"Stack around the variable '"> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 3c 2d 00 00 ?? call function 0x00405f71 L6: 56 ?? push esi 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 30 2d 00 00 ?? call function 0x00405f77 L7: 68 a4 9e 40 00 ?? push 0x00409ea4<"' was corrupted."> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 1a 2d 00 00 ?? call function 0x00405f77 L8: 83 c4 24 ?? add esp, 0x24<36> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] eb 05 ?? jmp basic block L10 L9: b8 68 a3 40 00 ?? mov eax, 0x0040a368<"Stack corrupted near unkn"+12 more> L10: 50 ?? push eax 6a 02 ?? push 2 57 ?? push edi 53 ?? push ebx e8 f9 00 00 00 ?? call function 0x00403370 L11: 83 c4 10 ?? add esp, 0x10<16> L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 b9 de ff ff ?? call function 0x00401140 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4032c0
_getMemBlockDataString
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 33 d2 ?? xor edx, edx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 33 ff ?? xor edi, edi 2b de ?? sub ebx, esi 89 5d 10 ?? mov dword ss:[ebp + 0x10<16>], ebx L2: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 83 f8 10 ?? cmp eax, 0x10<16> 72 05 ?? jb basic block L4 L3: b8 10 00 00 00 ?? mov eax, 0x00000010<16> L4: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 03 cf ?? add ecx, edi 3b d0 ?? cmp edx, eax 73 2c ?? jae basic block L7 L5: 8a 1c 33 ?? mov bl, byte ds:[ebx + esi] 0f b6 c3 ?? movzx eax, bl 50 ?? push eax b8 31 00 00 00 ?? mov eax, 0x00000031<49> 68 98 a3 40 00 ?? push 0x0040a398<"%.2X "> 2b c7 ?? sub eax, edi 50 ?? push eax 51 ?? push ecx e8 7c df ff ff ?? call function 0x00401285 L6: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c4 10 ?? add esp, 0x10<16> 88 1e ?? mov byte ds:[esi], bl 42 ?? inc edx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 46 ?? inc esi 83 c7 03 ?? add edi, 3 eb bb ?? jmp basic block L2 L7: 5f ?? pop edi c6 06 00 ?? mov byte ds:[esi], 0 5e ?? pop esi c6 01 00 ?? mov byte ds:[ecx], 0 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403350
_strlen_priv
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 8b c2 ?? mov eax, edx L2: 8a 08 ?? mov cl, byte ds:[eax] 40 ?? inc eax 84 c9 ?? test cl, cl L3: 75 f9 ?? jne basic block L2 L4: 2b c2 ?? sub eax, edx 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403370
failwithmessage
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 3c 0e 00 00 ?? sub esp, 0x00000e3c<3644> a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 53 ?? push ebx 8b 5d 14 ?? mov ebx, dword ss:[ebp + 0x14<20>] 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 56 ?? push esi 89 85 d0 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1d0<4294963664,-3632>], eax 89 9d c4 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1c4<4294963652,-3644>], ebx c7 85 cc f1 ff ff 00 00 ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0 00 00 e8 5c df ff ff ?? call function 0x00401307 L2: 8b f8 ?? mov edi, eax 83 c4 04 ?? add esp, 4 85 ff ?? test edi, edi 75 0f ?? jne basic block L5 L3: 56 ?? push esi e8 be dc ff ff ?? call function 0x00401078 L4: 83 c4 04 ?? add esp, 4 89 85 cc f1 ff ff ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], eax L5: 6a 00 ?? push 0 6a 00 ?? push 0 6a ff ?? push 0xff<255,-1> 53 ?? push ebx 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 08 d0 40 00 ?? call dword ds:[0x0040d008] L6: 3d 00 02 00 00 ?? cmp eax, 0x00000200<512> 73 22 ?? jae basic block L9 L7: 50 ?? push eax 8d 85 d4 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1d4<4294963668,-3628>] 50 ?? push eax 6a ff ?? push 0xff<255,-1> 53 ?? push ebx 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 08 d0 40 00 ?? call dword ds:[0x0040d008] L8: 8d 9d d4 f1 ff ff ?? lea ebx, ss:[ebp + 0xfffff1d4<4294963668,-3628>] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L10 L9: bb 40 a2 40 00 ?? mov ebx, 0x0040a240<"Runtime Check Error.\r\n Un"+28 more> L10: 68 02 10 00 00 ?? push 0x00001002<4098> e8 91 fb ff ff ?? call function 0x00402fa0 L11: 83 c4 04 ?? add esp, 4 84 c0 ?? test al, al 74 22 ?? je basic block L15 L12: 8b 85 d0 f1 ff ff ?? mov eax, dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 53 ?? push ebx 56 ?? push esi ff 34 85 70 9e 40 00 ?? push dword ds:[0x00409e70 + eax * 4] 50 ?? push eax e8 c5 fb ff ff ?? call function 0x00402ff0 L13: 83 c4 10 ?? add esp, 0x10<16> 84 c0 ?? test al, al 0f 85 27 01 00 00 ?? jne basic block L36 L14: eb 02 ?? jmp basic block L16 L15: b0 01 ?? mov al, 1 L16: 83 bd cc f1 ff ff 00 ?? cmp dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0 75 08 ?? jne basic block L18 L17: 85 ff ?? test edi, edi 0f 84 11 01 00 00 ?? je basic block L35 L18: 84 c0 ?? test al, al 74 0e ?? je basic block L21 L19: ff 15 50 d0 40 00 ?? call dword ds:[0x0040d050] L20: 85 c0 ?? test eax, eax 0f 85 ff 00 00 00 ?? jne basic block L35 L21: 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 8d 85 c8 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1c8<4294963656,-3640>] 50 ?? push eax 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 8d 46 fb ?? lea eax, ds:[esi + 0xfb<251,-5>] 50 ?? push eax e8 ee db ff ff ?? call function 0x00401073 L22: 83 c4 18 ?? add esp, 0x18<24> 85 ff ?? test edi, edi 74 32 ?? je basic block L26 L23: 53 ?? push ebx ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 8b cf ?? mov ecx, edi 68 c8 a2 40 00 ?? push 0x0040a2c8<"Run-Time Check Failure #%d - %s"> 50 ?? push eax ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>] 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax ff 75 0c ?? push dword ss:[ebp + 12] ff 15 00 f0 40 00 ?? call dword ds:[0x0040f000] L24: ff d7 ?? call edi L25: e9 96 00 00 00 ?? jmp basic block L34 L26: 6a 00 ?? push 0 6a 00 ?? push 0 68 0a 03 00 00 ?? push 0x0000030a<778> 8d 85 e0 f8 ff ff ?? lea eax, ss:[ebp + 0xfffff8e0<4294965472,-1824>] be 14 a3 40 00 ?? mov esi, 0x0040a314<"Unknown Filename"> 50 ?? push eax 6a ff ?? push 0xff<255,-1> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 0c d0 40 00 ?? call dword ds:[0x0040d00c] L27: 85 c0 ?? test eax, eax 74 06 ?? je basic block L29 L28: 8d b5 e0 f8 ff ff ?? lea esi, ss:[ebp + 0xfffff8e0<4294965472,-1824>] L29: 6a 00 ?? push 0 6a 00 ?? push 0 68 0a 03 00 00 ?? push 0x0000030a<778> 8d 85 d4 f5 ff ff ?? lea eax, ss:[ebp + 0xfffff5d4<4294964692,-2604>] bf 28 a3 40 00 ?? mov edi, 0x0040a328<"Unknown Module Name"> 50 ?? push eax 6a ff ?? push 0xff<255,-1> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 0c d0 40 00 ?? call dword ds:[0x0040d00c] L30: 85 c0 ?? test eax, eax 74 06 ?? je basic block L32 L31: 8d bd d4 f5 ff ff ?? lea edi, ss:[ebp + 0xfffff5d4<4294964692,-2604>] L32: ff b5 c4 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c4<4294963652,-3644>] 8b 9d cc f1 ff ff ?? mov ebx, dword ss:[ebp + 0xfffff1cc<4294963660,-3636>] 8b cb ?? mov ecx, ebx ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 68 40 a3 40 00 ?? push 0x0040a340<"Run-Time Check Failure #%d - %s"> 57 ?? push edi ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>] 56 ?? push esi ff 75 0c ?? push dword ss:[ebp + 12] ff 15 00 f0 40 00 ?? call dword ds:[0x0040f000] L33: ff d3 ?? call ebx L34: 83 c4 1c ?? add esp, 0x1c<28> 83 f8 01 ?? cmp eax, 1 75 01 ?? jne basic block L36 L35: cc ?? int3 L36: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 d6 db ff ff ?? call function 0x00401140 L37: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4035f0
notify_debugger
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 70 bb 40 00 ?? push 0x0040bb70 68 e0 59 40 00 ?? push function 0x004059e0 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 08 ?? sub esp, 8 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 ff 75 08 ?? push dword ss:[ebp + 8] 6a 06 ?? push 6 6a 00 ?? push 0 68 88 13 6d 40 ?? push 0x406d1388 ff 15 04 d0 40 00 ?? call dword ds:[0x0040d004] L2: eb 16 ?? jmp basic block L5 L3: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 88 13 6d 40 ?? cmp dword ds:[eax], 0x406d1388 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L4: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L5: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403690
__RTC_UninitUse
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 8b 3d 18 c0 40 00 ?? mov edi, dword ds:[0x0040c018] 83 ff ff ?? cmp edi, 0xff<255,-1> 74 75 ?? je basic block L12 L2: 85 f6 ?? test esi, esi 74 5c ?? je basic block L9 L3: 56 ?? push esi e8 93 fc ff ff ?? call function 0x00403350 L4: 83 c0 3a ?? add eax, 0x3a<58> 83 c4 04 ?? add esp, 4 3d 00 04 00 00 ?? cmp eax, 0x00000400<1024> 77 49 ?? ja basic block L9 L5: 68 b8 9e 40 00 ?? push 0x00409eb8<"The variable '"> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 91 28 00 00 ?? call function 0x00405f71 L6: 56 ?? push esi 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 85 28 00 00 ?? call function 0x00405f77 L7: 68 c8 9e 40 00 ?? push 0x00409ec8<"' is being used without b"+17 more> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 6f 28 00 00 ?? call function 0x00405f77 L8: 83 c4 24 ?? add esp, 0x24<36> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] eb 05 ?? jmp basic block L10 L9: b8 d8 a4 40 00 ?? mov eax, 0x0040a4d8<"A variable is being used "+26 more> L10: 50 ?? push eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 6a 03 ?? push 3 57 ?? push edi 50 ?? push eax e8 4b fc ff ff ?? call function 0x00403370 L11: 83 c4 10 ?? add esp, 0x10<16> L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 33 cd ?? xor ecx, ebp 5e ?? pop esi e8 0c da ff ff ?? call function 0x00401140 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403770
___local_stdio_printf_options
0
L1: b8 48 c4 40 00 ?? mov eax, 0x0040c448 c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403780
__vsprintf_s_l
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 20 db ff ff ?? call function 0x004012a8 L2: ff 75 18 ?? push dword ss:[ebp + 0x18<24>] ff 75 14 ?? push dword ss:[ebp + 0x14<20>] ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] ff 70 04 ?? push dword ds:[eax + 4] ff 30 ?? push dword ds:[eax] e8 dc 27 00 00 ?? call function 0x00405f7d L3: 83 c4 1c ?? add esp, 0x1c<28> 85 c0 ?? test eax, eax 79 03 ?? jns basic block L5 L4: 83 c8 ff ?? or eax, 0xff<255,-1> L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4037c0
_sprintf_s
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8d 45 14 ?? lea eax, ss:[ebp + 0x14<20>] 50 ?? push eax 6a 00 ?? push 0 ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] e8 c3 d9 ff ff ?? call function 0x0040119a L2: 83 c4 14 ?? add esp, 0x14<20> 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4037f0
___raise_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 14 d0 40 00 ?? call dword ds:[0x0040d014] L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax ff 15 10 d0 40 00 ?? call dword ds:[0x0040d010] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 18 d0 40 00 ?? call dword ds:[0x0040d018] L4: 50 ?? push eax ff 15 1c d0 40 00 ?? call dword ds:[0x0040d01c] L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403830
___report_gsfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 20 d0 40 00 ?? call dword ds:[0x0040d020] L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L4 L3: b9 02 00 00 00 ?? mov ecx, 2 cd 29 ?? int 0x29<41> L4: a3 58 c5 40 00 ?? mov dword ds:[0x0040c558], eax 89 0d 54 c5 40 00 ?? mov dword ds:[0x0040c554], ecx 89 15 50 c5 40 00 ?? mov dword ds:[0x0040c550], edx 89 1d 4c c5 40 00 ?? mov dword ds:[0x0040c54c], ebx 89 35 48 c5 40 00 ?? mov dword ds:[0x0040c548], esi 89 3d 44 c5 40 00 ?? mov dword ds:[0x0040c544], edi 66 8c 15 70 c5 40 00 ?? mov word ds:[0x0040c570], ss 66 8c 0d 64 c5 40 00 ?? mov word ds:[0x0040c564], cs 66 8c 1d 40 c5 40 00 ?? mov word ds:[0x0040c540], ds 66 8c 05 3c c5 40 00 ?? mov word ds:[0x0040c53c], es 66 8c 25 38 c5 40 00 ?? mov word ds:[0x0040c538], fs 66 8c 2d 34 c5 40 00 ?? mov word ds:[0x0040c534], gs 9c ?? pushfd 8f 05 68 c5 40 00 ?? pop dword ds:[0x0040c568] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 5c c5 40 00 ?? mov dword ds:[0x0040c55c], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 60 c5 40 00 ?? mov dword ds:[0x0040c560], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 6c c5 40 00 ?? mov dword ds:[0x0040c56c], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 a8 c4 40 00 01 00 ?? mov dword ds:[0x0040c4a8], 0x00010001 01 00 a1 60 c5 40 00 ?? mov eax, dword ds:[0x0040c560] a3 64 c4 40 00 ?? mov dword ds:[0x0040c464], eax c7 05 58 c4 40 00 09 04 ?? mov dword ds:[0x0040c458], 0xc0000409 00 c0 c7 05 5c c4 40 00 01 00 ?? mov dword ds:[0x0040c45c], 1 00 00 c7 05 68 c4 40 00 01 00 ?? mov dword ds:[0x0040c468], 1 00 00 b9 04 00 00 00 ?? mov ecx, 4 6b d1 00 ?? imul edx, ecx, 0 c7 82 6c c4 40 00 02 00 ?? mov dword ds:[edx + 0x0040c46c], 2 00 00 b8 04 00 00 00 ?? mov eax, 4 6b c8 00 ?? imul ecx, eax, 0 8b 15 04 c0 40 00 ?? mov edx, dword ds:[0x0040c004] 89 54 0d f8 ?? mov dword ss:[ebp + ecx + 0xf8<248,-8>], edx b8 04 00 00 00 ?? mov eax, 4 c1 e0 00 ?? shl eax, 0 8b 0d 00 c0 40 00 ?? mov ecx, dword ds:[0x0040c000] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 18 a5 40 00 ?? push 0x0040a518 e8 04 da ff ff ?? call function 0x00401334 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403980
___report_rangecheckfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 08 ?? push 8 e8 69 d9 ff ff ?? call function 0x004012f3 L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403990
___report_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 20 d0 40 00 ?? call dword ds:[0x0040d020] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 58 c5 40 00 ?? mov dword ds:[0x0040c558], eax 89 0d 54 c5 40 00 ?? mov dword ds:[0x0040c554], ecx 89 15 50 c5 40 00 ?? mov dword ds:[0x0040c550], edx 89 1d 4c c5 40 00 ?? mov dword ds:[0x0040c54c], ebx 89 35 48 c5 40 00 ?? mov dword ds:[0x0040c548], esi 89 3d 44 c5 40 00 ?? mov dword ds:[0x0040c544], edi 66 8c 15 70 c5 40 00 ?? mov word ds:[0x0040c570], ss 66 8c 0d 64 c5 40 00 ?? mov word ds:[0x0040c564], cs 66 8c 1d 40 c5 40 00 ?? mov word ds:[0x0040c540], ds 66 8c 05 3c c5 40 00 ?? mov word ds:[0x0040c53c], es 66 8c 25 38 c5 40 00 ?? mov word ds:[0x0040c538], fs 66 8c 2d 34 c5 40 00 ?? mov word ds:[0x0040c534], gs 9c ?? pushfd 8f 05 68 c5 40 00 ?? pop dword ds:[0x0040c568] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 5c c5 40 00 ?? mov dword ds:[0x0040c55c], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 60 c5 40 00 ?? mov dword ds:[0x0040c560], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 6c c5 40 00 ?? mov dword ds:[0x0040c56c], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 60 c5 40 00 ?? mov eax, dword ds:[0x0040c560] a3 64 c4 40 00 ?? mov dword ds:[0x0040c464], eax c7 05 58 c4 40 00 09 04 ?? mov dword ds:[0x0040c458], 0xc0000409 00 c0 c7 05 5c c4 40 00 01 00 ?? mov dword ds:[0x0040c45c], 1 00 00 c7 05 68 c4 40 00 01 00 ?? mov dword ds:[0x0040c468], 1 00 00 b9 04 00 00 00 ?? mov ecx, 4 6b d1 00 ?? imul edx, ecx, 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 82 6c c4 40 00 ?? mov dword ds:[edx + 0x0040c46c], eax 68 18 a5 40 00 ?? push 0x0040a518 e8 d5 d8 ff ff ?? call function 0x00401334 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403aa0
___report_securityfailureEx
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 20 03 00 00 ?? sub esp, 0x00000320<800> 6a 17 ?? push 0x17<23> ff 15 20 d0 40 00 ?? call dword ds:[0x0040d020] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 58 c5 40 00 ?? mov dword ds:[0x0040c558], eax 89 0d 54 c5 40 00 ?? mov dword ds:[0x0040c554], ecx 89 15 50 c5 40 00 ?? mov dword ds:[0x0040c550], edx 89 1d 4c c5 40 00 ?? mov dword ds:[0x0040c54c], ebx 89 35 48 c5 40 00 ?? mov dword ds:[0x0040c548], esi 89 3d 44 c5 40 00 ?? mov dword ds:[0x0040c544], edi 66 8c 15 70 c5 40 00 ?? mov word ds:[0x0040c570], ss 66 8c 0d 64 c5 40 00 ?? mov word ds:[0x0040c564], cs 66 8c 1d 40 c5 40 00 ?? mov word ds:[0x0040c540], ds 66 8c 05 3c c5 40 00 ?? mov word ds:[0x0040c53c], es 66 8c 25 38 c5 40 00 ?? mov word ds:[0x0040c538], fs 66 8c 2d 34 c5 40 00 ?? mov word ds:[0x0040c534], gs 9c ?? pushfd 8f 05 68 c5 40 00 ?? pop dword ds:[0x0040c568] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 5c c5 40 00 ?? mov dword ds:[0x0040c55c], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 60 c5 40 00 ?? mov dword ds:[0x0040c560], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 6c c5 40 00 ?? mov dword ds:[0x0040c56c], eax 8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>] a1 60 c5 40 00 ?? mov eax, dword ds:[0x0040c560] a3 64 c4 40 00 ?? mov dword ds:[0x0040c464], eax c7 05 58 c4 40 00 09 04 ?? mov dword ds:[0x0040c458], 0xc0000409 00 c0 c7 05 5c c4 40 00 01 00 ?? mov dword ds:[0x0040c45c], 1 00 00 83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0 76 0d ?? jbe basic block L7 L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0 75 07 ?? jne basic block L7 L6: c7 45 0c 00 00 00 00 ?? mov dword ss:[ebp + 12], 0 L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14 76 09 ?? jbe basic block L9 L8: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 83 e9 01 ?? sub ecx, 1 89 4d 0c ?? mov dword ss:[ebp + 12], ecx L9: 8b 55 0c ?? mov edx, dword ss:[ebp + 12] 83 c2 01 ?? add edx, 1 89 15 68 c4 40 00 ?? mov dword ds:[0x0040c468], edx b8 04 00 00 00 ?? mov eax, 4 6b c8 00 ?? imul ecx, eax, 0 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 91 6c c4 40 00 ?? mov dword ds:[ecx + 0x0040c46c], edx c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 eb 09 ?? jmp basic block L10 L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 3b 4d 0c ?? cmp ecx, dword ss:[ebp + 12] 73 15 ?? jae basic block L12 L11: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 8b 04 81 ?? mov eax, dword ds:[ecx + eax * 4] 89 04 95 70 c4 40 00 ?? mov dword ds:[0x0040c470 + edx * 4], eax eb da ?? jmp 0x00403b92 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 c0 01 ?? add eax, 1 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L12: 68 18 a5 40 00 ?? push 0x0040a518 e8 72 d7 ff ff ?? call function 0x00401334 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403c10
?_RTC_GetErrorFunc@@YAP6AHHPBDH00ZZPBX@Z
0
L1: a1 14 c8 40 00 ?? mov eax, dword ds:[0x0040c814] c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403c20
?_RTC_GetErrorFuncW@@YAP6AHHPB_WH00ZZPBX@Z
0
L1: a1 18 c8 40 00 ?? mov eax, dword ds:[0x0040c818] c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403c30
__RTC_GetErrDesc
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 f8 04 ?? cmp eax, 4 77 09 ?? ja basic block L3 L2: 8b 04 85 24 a5 40 00 ?? mov eax, dword ds:[0x0040a524 + eax * 4] 5d ?? pop ebp c3 ?? ret L3: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403c50
__RTC_NumErrors
0
L1: b8 05 00 00 00 ?? mov eax, 5 c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403c60
__RTC_SetErrorFunc
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 14 c8 40 00 ?? mov eax, dword ds:[0x0040c814] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 14 c8 40 00 ?? mov dword ds:[0x0040c814], ecx c7 05 18 c8 40 00 00 00 ?? mov dword ds:[0x0040c818], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403c90
__RTC_SetErrorFuncW
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 18 c8 40 00 ?? mov eax, dword ds:[0x0040c818] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 18 c8 40 00 ?? mov dword ds:[0x0040c818], ecx c7 05 14 c8 40 00 00 00 ?? mov dword ds:[0x0040c814], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403cc0
__RTC_SetErrorType
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 83 fa 04 ?? cmp edx, 4 77 13 ?? ja basic block L3 L2: 8b 04 95 0c c0 40 00 ?? mov eax, dword ds:[0x0040c00c + edx * 4] 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 89 0c 95 0c c0 40 00 ?? mov dword ds:[0x0040c00c + edx * 4], ecx 5d ?? pop ebp c3 ?? ret L3: 83 c8 ff ?? or eax, 0xff<255,-1> 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403cf0
find_pe_section
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 18 ?? sub esp, 0x18<24> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 03 51 3c ?? add edx, dword ds:[ecx + 0x3c<60>] 89 55 ec ?? mov dword ss:[ebp + 0xec<236,-20>], edx 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 0f b7 51 14 ?? movzx edx, word ds:[ecx + 0x14<20>] 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 8d 4c 10 18 ?? lea ecx, ds:[eax + edx + 0x18<24>] 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>] 0f b7 42 06 ?? movzx eax, word ds:[edx + 6] 6b c8 28 ?? imul ecx, eax, 0x28<40> 03 4d f0 ?? add ecx, dword ss:[ebp + 0xf0<240,-16>] 89 4d e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], ecx 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx eb 09 ?? jmp basic block L2 L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 3b 4d e8 ?? cmp ecx, dword ss:[ebp + 0xe8<232,-24>] 74 23 ?? je basic block L7 L3: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 3b 42 0c ?? cmp eax, dword ds:[edx + 12] 72 16 ?? jb basic block L6 L4: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 51 0c ?? mov edx, dword ds:[ecx + 12] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 03 50 08 ?? add edx, dword ds:[eax + 8] 39 55 0c ?? cmp dword ss:[ebp + 12], edx 73 05 ?? jae basic block L6 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] eb 04 ?? jmp basic block L8 L6: eb cc ?? jmp 0x00403d37 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 c0 28 ?? add eax, 0x28<40> 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L7: 33 c0 ?? xor eax, eax L8: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403da0
is_potentially_valid_image_base
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 10 ?? sub esp, 0x10<16> 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 04 ?? jne basic block L3 L2: 32 c0 ?? xor al, al eb 55 ?? jmp basic block L10 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 0f b7 11 ?? movzx edx, word ds:[ecx] 81 fa 4d 5a 00 00 ?? cmp edx, 0x00005a4d<23117> 74 04 ?? je basic block L5 L4: 32 c0 ?? xor al, al eb 3d ?? jmp basic block L10 L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 03 48 3c ?? add ecx, dword ds:[eax + 0x3c<60>] 89 4d f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], ecx 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 81 38 50 45 00 00 ?? cmp dword ds:[eax], 0x00004550<17744> 74 04 ?? je basic block L7 L6: 32 c0 ?? xor al, al eb 1c ?? jmp basic block L10 L7: 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>] 83 c1 18 ?? add ecx, 0x18<24> 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>] 0f b7 02 ?? movzx eax, word ds:[edx] 3d 0b 01 00 00 ?? cmp eax, 0x0000010b<267> 74 04 ?? je basic block L9 L8: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L10 L9: b0 01 ?? mov al, 1 L10: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403e30
_NtCurrentTeb
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403e40
___scrt_acquire_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 36 d3 ff ff ?? call function 0x00401181 L2: 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 32 ?? jmp basic block L11 L4: e8 aa d4 ff ff ?? call function 0x00401302 L5: 8b 40 04 ?? mov eax, dword ds:[eax + 4] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] ba 24 c8 40 00 ?? mov edx, 0x0040c824 33 c0 ?? xor eax, eax f0 0f b1 0a ?? lock cmpxchg dword ds:[edx], ecx 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 83 7d f8 00 ?? cmp dword ss:[ebp + 0xf8<248,-8>], 0 74 0e ?? je basic block L10 L7: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 3b 45 f8 ?? cmp eax, dword ss:[ebp + 0xf8<248,-8>] 75 04 ?? jne basic block L9 L8: b0 01 ?? mov al, 1 eb 04 ?? jmp basic block L11 L9: eb db ?? jmp basic block L6 L10: 32 c0 ?? xor al, al L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403ea0
___scrt_dllmain_after_initialize_c
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 d9 d2 ff ff ?? call function 0x00401181 L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 d5 d2 ff ff ?? call function 0x00401186 L4: eb 12 ?? jmp basic block L9 L5: e8 0a d3 ff ff ?? call function 0x004011c2 L6: 85 c0 ?? test eax, eax 74 04 ?? je basic block L8 L7: 32 c0 ?? xor al, al eb 07 ?? jmp basic block L10 L8: e8 58 d2 ff ff ?? call function 0x0040111d L9: b0 01 ?? mov al, 1 L10: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403ee0
___scrt_dllmain_before_initialize_c
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 38 d2 ff ff ?? call function 0x00401122 L2: 83 c4 04 ?? add esp, 4 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L5 L4: b0 01 ?? mov al, 1 L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403f10
___scrt_dllmain_crt_thread_attach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 e1 d2 ff ff ?? call function 0x004011f9 L2: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L4 L3: 32 c0 ?? xor al, al eb 17 ?? jmp basic block L9 L4: e8 fe d2 ff ff ?? call function 0x00401226 L5: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 75 09 ?? jne basic block L8 L6: e8 c6 d1 ff ff ?? call function 0x004010fa L7: 32 c0 ?? xor al, al eb 02 ?? jmp basic block L9 L8: b0 01 ?? mov al, 1 L9: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403f50
___scrt_dllmain_crt_thread_detach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 1a d2 ff ff ?? call function 0x00401172 L2: e8 9d d1 ff ff ?? call function 0x004010fa L3: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403f70
___scrt_dllmain_exception_filter
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 e8 06 d2 ff ff ?? call function 0x00401181 L2: 85 c0 ?? test eax, eax 75 28 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 22 ?? jne basic block L6 L4: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 51 ?? push ecx 6a 00 ?? push 0 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 52 ?? push edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] ff 15 00 f0 40 00 ?? call dword ds:[0x0040f000] L5: ff 55 fc ?? call dword ss:[ebp + 0xfc<252,-4>] L6: 8b 4d 1c ?? mov ecx, dword ss:[ebp + 0x1c<28>] 51 ?? push ecx 8b 55 18 ?? mov edx, dword ss:[ebp + 0x18<24>] 52 ?? push edx e8 cf 1f 00 00 ?? call function 0x00405f83 L7: 83 c4 08 ?? add esp, 8 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x403fd0
___scrt_dllmain_uninitialize_c
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 a9 d1 ff ff ?? call function 0x00401181 L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 68 2c c8 40 00 ?? push 0x0040c82c e8 af 1f 00 00 ?? call function 0x00405f95 L4: 83 c4 04 ?? add esp, 4 eb 0e ?? jmp basic block L8 L5: e8 b9 d1 ff ff ?? call function 0x004011a9 L6: 85 c0 ?? test eax, eax 75 05 ?? jne basic block L8 L7: e8 4e 1f 00 00 ?? call function 0x00405f47 L8: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404010
___scrt_dllmain_uninitialize_critical
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 e8 15 d3 ff ff ?? call function 0x0040132f L2: 83 c4 04 ?? add esp, 4 e8 e6 d1 ff ff ?? call function 0x00401208 L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404030
___scrt_initialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 28 c8 40 00 01 ?? mov byte ds:[0x0040c828], 1 L3: e8 41 d1 ff ff ?? call function 0x00401186 L4: e8 f0 d1 ff ff ?? call function 0x0040123a L5: 0f b6 c0 ?? movzx eax, al 85 c0 ?? test eax, eax 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al eb 1c ?? jmp basic block L12 L7: e8 e5 d1 ff ff ?? call function 0x0040123f L8: 0f b6 c8 ?? movzx ecx, al 85 c9 ?? test ecx, ecx 75 0e ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 a7 cf ff ff ?? call function 0x0040100f L10: 83 c4 04 ?? add esp, 4 32 c0 ?? xor al, al eb 02 ?? jmp basic block L12 L11: b0 01 ?? mov al, 1 L12: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404090
___scrt_initialize_onexit_tables
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 0f b6 05 29 c8 40 00 ?? movzx eax, byte ds:[0x0040c829] 85 c0 ?? test eax, eax 74 07 ?? je basic block L3 L2: b0 01 ?? mov al, 1 e9 b6 00 00 00 ?? jmp basic block L18 L3: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 74 0d ?? je basic block L6 L4: 83 7d 08 01 ?? cmp dword ss:[ebp + 8], 1 74 07 ?? je basic block L6 L5: 6a 05 ?? push 5 e8 e4 d0 ff ff ?? call function 0x0040119f L6: e8 c1 d0 ff ff ?? call function 0x00401181 L7: 85 c0 ?? test eax, eax 74 32 ?? je basic block L16 L8: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 2c ?? jne basic block L16 L9: 68 2c c8 40 00 ?? push 0x0040c82c e8 b5 1e 00 00 ?? call function 0x00405f89 L10: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 04 ?? je basic block L12 L11: 32 c0 ?? xor al, al eb 7f ?? jmp basic block L18 L12: 68 38 c8 40 00 ?? push 0x0040c838 e8 a0 1e 00 00 ?? call function 0x00405f89 L13: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 04 ?? je basic block L15 L14: 32 c0 ?? xor al, al eb 6a ?? jmp basic block L18 L15: eb 5f ?? jmp basic block L17 L16: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1> 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 89 55 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 89 0d 2c c8 40 00 ?? mov dword ds:[0x0040c82c], ecx 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 89 15 30 c8 40 00 ?? mov dword ds:[0x0040c830], edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] a3 34 c8 40 00 ?? mov dword ds:[0x0040c834], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 89 55 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 89 0d 38 c8 40 00 ?? mov dword ds:[0x0040c838], ecx 8b 55 e8 ?? mov edx, dword ss:[ebp + 0xe8<232,-24>] 89 15 3c c8 40 00 ?? mov dword ds:[0x0040c83c], edx 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] a3 40 c8 40 00 ?? mov dword ds:[0x0040c840], eax L17: c6 05 29 c8 40 00 01 ?? mov byte ds:[0x0040c829], 1 b0 01 ?? mov al, 1 L18: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4041a0
___scrt_is_nonwritable_in_current_image
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 90 bb 40 00 ?? push 0x0040bb90 68 b0 4b 40 00 ?? push function 0x00404bb0 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 c4 d8 ?? add esp, 0xd8<216,-40> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], eax c7 45 dc 00 00 40 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x00400000 c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>] 51 ?? push ecx e8 b0 fb ff ff ?? call function 0x00403da0 L2: 83 c4 04 ?? add esp, 4 0f b6 d0 ?? movzx edx, al 85 d2 ?? test edx, edx 75 13 ?? jne basic block L4 L3: c6 45 e7 00 ?? mov byte ss:[ebp + 0xe7<231,-25>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e7 ?? mov al, byte ss:[ebp + 0xe7<231,-25>] e9 aa 00 00 00 ?? jmp basic block L17 L4: 8b 45 d0 ?? mov eax, dword ss:[ebp + 0xd0<208,-48>] 2b 45 dc ?? sub eax, dword ss:[ebp + 0xdc<220,-36>] 89 45 cc ?? mov dword ss:[ebp + 0xcc<204,-52>], eax 8b 4d cc ?? mov ecx, dword ss:[ebp + 0xcc<204,-52>] 51 ?? push ecx 8b 55 dc ?? mov edx, dword ss:[ebp + 0xdc<220,-36>] 52 ?? push edx e8 cd fa ff ff ?? call function 0x00403cf0 L5: 83 c4 08 ?? add esp, 8 89 45 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], eax 83 7d d8 00 ?? cmp dword ss:[ebp + 0xd8<216,-40>], 0 75 10 ?? jne basic block L7 L6: c6 45 e6 00 ?? mov byte ss:[ebp + 0xe6<230,-26>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e6 ?? mov al, byte ss:[ebp + 0xe6<230,-26>] eb 78 ?? jmp basic block L17 L7: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>] 8b 48 24 ?? mov ecx, dword ds:[eax + 0x24<36>] 81 e1 00 00 00 80 ?? and ecx, 0x80000000 74 10 ?? je basic block L9 L8: c6 45 e5 00 ?? mov byte ss:[ebp + 0xe5<229,-27>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e5 ?? mov al, byte ss:[ebp + 0xe5<229,-27>] eb 5a ?? jmp basic block L17 L9: c6 45 e4 01 ?? mov byte ss:[ebp + 0xe4<228,-28>], 1 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e4 ?? mov al, byte ss:[ebp + 0xe4<228,-28>] eb 4a ?? jmp basic block L17 L10: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> eb 41 ?? jmp basic block L17 L11: 8b 55 ec ?? mov edx, dword ss:[ebp + 0xec<236,-20>] 8b 02 ?? mov eax, dword ds:[edx] 8b 08 ?? mov ecx, dword ds:[eax] 89 4d c8 ?? mov dword ss:[ebp + 0xc8<200,-56>], ecx 81 7d c8 05 00 00 c0 ?? cmp dword ss:[ebp + 0xc8<200,-56>], 0xc0000005 75 09 ?? jne basic block L13 L12: c7 45 d4 01 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 1 eb 07 ?? jmp basic block L14 L13: c7 45 d4 00 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0 L14: 8b 45 d4 ?? mov eax, dword ss:[ebp + 0xd4<212,-44>] c3 ?? ret L15: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] c6 45 e3 00 ?? mov byte ss:[ebp + 0xe3<227,-29>], 0 c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8a 45 e3 ?? mov al, byte ss:[ebp + 0xe3<227,-29>] eb 07 ?? jmp basic block L17 L16: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> L17: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404320
___scrt_release_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 59 ce ff ff ?? call function 0x00401181 L2: 85 c0 ?? test eax, eax 75 02 ?? jne basic block L4 L3: eb 13 ?? jmp basic block L7 L4: 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8] 85 c0 ?? test eax, eax 74 02 ?? je basic block L6 L5: eb 09 ?? jmp basic block L7 L6: 33 c9 ?? xor ecx, ecx ba 24 c8 40 00 ?? mov edx, 0x0040c824 87 0a ?? xchg dword ds:[edx], ecx L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404350
___scrt_uninitialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 0f b6 05 28 c8 40 00 ?? movzx eax, byte ds:[0x0040c828] 85 c0 ?? test eax, eax 74 0c ?? je basic block L4 L2: 0f b6 4d 0c ?? movzx ecx, byte ss:[ebp + 12] 85 c9 ?? test ecx, ecx 74 04 ?? je basic block L4 L3: b0 01 ?? mov al, 1 eb 1c ?? jmp basic block L7 L4: 0f b6 55 08 ?? movzx edx, byte ss:[ebp + 8] 52 ?? push edx e8 a4 cd ff ff ?? call function 0x00401118 L5: 83 c4 04 ?? add esp, 4 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8] 50 ?? push eax e8 8e cc ff ff ?? call function 0x0040100f L6: 83 c4 04 ?? add esp, 4 b0 01 ?? mov al, 1 L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4043a0
__onexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 a1 2c c8 40 00 ?? mov eax, dword ds:[0x0040c82c] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 83 7d f4 ff ?? cmp dword ss:[ebp + 0xf4<244,-12>], 0xff<255,-1> 75 26 ?? jne basic block L8 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 de 1b 00 00 ?? call function 0x00405f9b L3: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 75 08 ?? jne basic block L5 L4: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx eb 07 ?? jmp basic block L6 L5: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 L6: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] eb 29 ?? jmp basic block L13 L7: eb 27 ?? jmp basic block L13 L8: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax 68 2c c8 40 00 ?? push 0x0040c82c e8 a7 1b 00 00 ?? call function 0x00405f8f L9: 83 c4 08 ?? add esp, 8 85 c0 ?? test eax, eax 75 08 ?? jne basic block L11 L10: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 4d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ecx eb 07 ?? jmp basic block L12 L11: c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0 L12: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404420
_at_quick_exit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 a1 38 c8 40 00 ?? mov eax, dword ds:[0x0040c838] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 83 7d fc ff ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xff<255,-1> 75 10 ?? jne basic block L5 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 51 ?? push ecx e8 64 1b 00 00 ?? call function 0x00405fa1 L3: 83 c4 04 ?? add esp, 4 eb 19 ?? jmp basic block L7 L4: eb 17 ?? jmp basic block L7 L5: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 50 ?? push eax 68 38 c8 40 00 ?? push 0x0040c838 e8 37 1b 00 00 ?? call function 0x00405f8f L6: 83 c4 08 ?? add esp, 8 L7: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404470
_atexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 4f cd ff ff ?? call function 0x004011cc L2: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 09 ?? je basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp basic block L5 L4: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1> L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4044b0
__get_entropy
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 33 c0 ?? xor eax, eax 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] 51 ?? push ecx ff 15 30 d0 40 00 ?? call dword ds:[0x0040d030] L2: 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 33 45 f8 ?? xor eax, dword ss:[ebp + 0xf8<248,-8>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 2c d0 40 00 ?? call dword ds:[0x0040d02c] L3: 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 28 d0 40 00 ?? call dword ds:[0x0040d028] L4: 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8d 4d ec ?? lea ecx, ss:[ebp + 0xec<236,-20>] 51 ?? push ecx ff 15 24 d0 40 00 ?? call dword ds:[0x0040d024] L5: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 33 55 ec ?? xor edx, dword ss:[ebp + 0xec<236,-20>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 33 45 f0 ?? xor eax, dword ss:[ebp + 0xf0<240,-16>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8d 55 fc ?? lea edx, ss:[ebp + 0xfc<252,-4>] 33 ca ?? xor ecx, edx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404540
___security_init_cookie
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 81 3d 04 c0 40 00 4e e6 ?? cmp dword ds:[0x0040c004], 0xbb40e64e 40 bb 74 1c ?? je basic block L4 L2: a1 04 c0 40 00 ?? mov eax, dword ds:[0x0040c004] 25 00 00 ff ff ?? and eax, 0xffff0000<4294901760,-65536> 74 10 ?? je basic block L4 L3: 8b 0d 04 c0 40 00 ?? mov ecx, dword ds:[0x0040c004] f7 d1 ?? not ecx 89 0d 00 c0 40 00 ?? mov dword ds:[0x0040c000], ecx eb 4a ?? jmp basic block L10 L4: e8 3f ff ff ff ?? call function 0x004044b0 L5: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 81 7d fc 4e e6 40 bb ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xbb40e64e 75 09 ?? jne basic block L7 L6: c7 45 fc 4f e6 40 bb ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xbb40e64f eb 1c ?? jmp basic block L9 L7: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 e2 00 00 ff ff ?? and edx, 0xffff0000<4294901760,-65536> 75 11 ?? jne basic block L9 L8: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 0d 11 47 00 00 ?? or eax, 0x00004711<18193> c1 e0 10 ?? shl eax, 0x10<16> 0b 45 fc ?? or eax, dword ss:[ebp + 0xfc<252,-4>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L9: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 0d 04 c0 40 00 ?? mov dword ds:[0x0040c004], ecx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] f7 d2 ?? not edx 89 15 00 c0 40 00 ?? mov dword ds:[0x0040c000], edx L10: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4045e0
__matherr
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x4045f0
__get_startup_argv_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 01 00 00 00 ?? mov eax, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404600
__get_startup_commit_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/Debug/oopoly.exe
0x404610
__get_startup_file_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b8 00 40 00 00 ?? mov eax, 0x00004000<16384> 5d ?? pop ebp c3 ?? ret