Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
int64
0
1
Disassembly
stringlengths
16
68.6k
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401520
?get_b@B@@UAEHXZ
1
L1: 8b 41 08 ?? mov eax, dword ds:[ecx + 8] c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401530
?get_c@C@@UAEHXZ
1
L1: 8b 41 08 ?? mov eax, dword ds:[ecx + 8] c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401540
?get_d@D@@UAEHXZ
1
L1: 8b 41 18 ?? mov eax, dword ds:[ecx + 0x18<24>] c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401550
_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi 6a 24 ?? push 0x24<36> e8 58 fb ff ff ?? call function 0x004010b4 L2: 8b f0 ?? mov esi, eax 83 c4 04 ?? add esp, 4 89 75 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], esi 85 f6 ?? test esi, esi 74 77 ?? je basic block L4 L3: c7 46 04 ac 5b 40 00 ?? mov dword ds:[esi + 4], 0x00405bac c7 46 10 b8 5b 40 00 ?? mov dword ds:[esi + 0x10<16>], 0x00405bb8 c7 46 1c 34 5b 40 00 ?? mov dword ds:[esi + 0x1c<28>], 0x00405b34 c7 46 20 0a 00 00 00 ?? mov dword ds:[esi + 0x20<32>], 10 8b 46 04 ?? mov eax, dword ds:[esi + 4] c7 06 40 5b 40 00 ?? mov dword ds:[esi], 0x00405b40 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 44 30 04 4c 5b 40 00 ?? mov dword ds:[eax + esi + 4], 0x00405b4c c7 46 08 0b 00 00 00 ?? mov dword ds:[esi + 8], 11 8b 46 10 ?? mov eax, dword ds:[esi + 0x10<16>] c7 46 0c 64 5b 40 00 ?? mov dword ds:[esi + 12], 0x00405b64 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 44 30 10 70 5b 40 00 ?? mov dword ds:[eax + esi + 0x10<16>], 0x00405b70 c7 46 14 0c 00 00 00 ?? mov dword ds:[esi + 0x14<20>], 12 8b 46 04 ?? mov eax, dword ds:[esi + 4] c7 06 88 5b 40 00 ?? mov dword ds:[esi], 0x00405b88 c7 46 0c 98 5b 40 00 ?? mov dword ds:[esi + 12], 0x00405b98 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 44 30 04 a4 5b 40 00 ?? mov dword ds:[eax + esi + 4], 0x00405ba4 c7 46 18 0d 00 00 00 ?? mov dword ds:[esi + 0x18<24>], 13 eb 02 ?? jmp basic block L5 L4: 33 f6 ?? xor esi, esi L5: 8b 46 04 ?? mov eax, dword ds:[esi + 4] 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 44 30 08 29 00 00 00 ?? mov dword ds:[eax + esi + 8], 0x00000029<41> 8b 46 04 ?? mov eax, dword ds:[esi + 4] c7 46 14 2b 00 00 00 ?? mov dword ds:[esi + 0x14<20>], 0x0000002b<43> c7 46 08 2c 00 00 00 ?? mov dword ds:[esi + 8], 0x0000002c<44> 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 83 c1 04 ?? add ecx, 4 03 ce ?? add ecx, esi 8b 01 ?? mov eax, dword ds:[ecx] ff 10 ?? call dword ds:[eax] L6: 8b 06 ?? mov eax, dword ds:[esi] 8b ce ?? mov ecx, esi ff 10 ?? call dword ds:[eax] L7: 8b 46 0c ?? mov eax, dword ds:[esi + 12] 8d 4e 0c ?? lea ecx, ds:[esi + 12] ff 10 ?? call dword ds:[eax] L8: 8b 06 ?? mov eax, dword ds:[esi] 8b ce ?? mov ecx, esi ff 50 04 ?? call dword ds:[eax + 4] L9: 6a 24 ?? push 0x24<36> 56 ?? push esi e8 27 fa ff ff ?? call function 0x00401050 L10: 83 c4 08 ?? add esp, 8 33 c0 ?? xor eax, eax 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40166b
??2@YAPAXI@Z
0
L1: e9 dd 09 00 00 ?? jmp function 0x00401c53 L2: 55 ?? push ebp 8b ec ?? mov ebp, esp eb 0d ?? jmp basic block L5 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 9f 18 00 00 ?? call function 0x00402f17 L4: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 0f ?? je basic block L8 L5: ff 75 08 ?? push dword ss:[ebp + 8] e8 98 18 00 00 ?? call function 0x00402f1d L6: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 e6 ?? je basic block L3 L7: 5d ?? pop ebp c3 ?? ret L8: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 0f 84 db fb ff ff ?? je basic block L1 L9: e9 14 fa ff ff ?? jmp 0x004010af e9 7b 0b 00 00 ?? jmp function 0x00401c2f
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4016a7
??3@YAXPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 bc f9 ff ff ?? call function 0x0040106e L2: 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4016b8
??1type_info@@UAE@XZ
1
L1: c7 01 c8 5b 40 00 ?? mov dword ds:[ecx], 0x00405bc8 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4016bf
??_Etype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 c8 5b 40 00 ?? mov dword ds:[esi], 0x00405bc8 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 77 f9 ff ff ?? call function 0x00401050 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4016bf
??_Gtype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 c8 5b 40 00 ?? mov dword ds:[esi], 0x00405bc8 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 77 f9 ff ff ?? call function 0x00401050 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4016ea
pre_c_initialization
0
L1: 56 ?? push esi 6a 01 ?? push 1 e8 37 18 00 00 ?? call function 0x00402f29 L2: e8 a9 f9 ff ff ?? call function 0x004010a0 L3: 50 ?? push eax e8 62 18 00 00 ?? call function 0x00402f5f L4: e8 d5 f9 ff ff ?? call function 0x004010d7 L5: 8b f0 ?? mov esi, eax e8 86 18 00 00 ?? call function 0x00402f8f L6: 6a 01 ?? push 1 89 30 ?? mov dword ds:[eax], esi e8 d9 f9 ff ff ?? call function 0x004010eb L7: 83 c4 0c ?? add esp, 12 5e ?? pop esi 84 c0 ?? test al, al 74 73 ?? je basic block L30 L8: db e2 ?? fnclex e8 e4 f8 ff ff ?? call function 0x00401005 L9: 68 27 11 40 00 ?? push 0x00401127 e8 1f fa ff ff ?? call function 0x0040114a L10: e8 a6 fa ff ff ?? call function 0x004011d6 L11: 50 ?? push eax e8 ff 17 00 00 ?? call function 0x00402f35 L12: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 75 51 ?? jne basic block L30 L13: e8 28 f9 ff ff ?? call function 0x00401069 L14: e8 1d fa ff ff ?? call function 0x00401163 L15: 85 c0 ?? test eax, eax 74 0b ?? je basic block L18 L16: 68 c3 10 40 00 ?? push 0x004010c3 e8 db 17 00 00 ?? call function 0x00402f2f L17: 59 ?? pop ecx L18: e8 0d fb ff ff ?? call function 0x00401267 L19: e8 c9 f8 ff ff ?? call function 0x00401028 L20: e8 d6 fa ff ff ?? call function 0x0040123a L21: e8 54 fa ff ff ?? call function 0x004011bd L22: 50 ?? push eax e8 14 18 00 00 ?? call function 0x00402f83 L23: 59 ?? pop ecx e8 a7 fa ff ff ?? call function 0x0040121c L24: 84 c0 ?? test al, al 74 05 ?? je basic block L26 L25: e8 bd 17 00 00 ?? call function 0x00402f3b L26: e8 3f fa ff ff ?? call function 0x004011c2 L27: e8 e5 f9 ff ff ?? call function 0x0040116d L28: 85 c0 ?? test eax, eax 75 01 ?? jne basic block L30 L29: c3 ?? ret L30: 6a 07 ?? push 7 e8 ac f9 ff ff ?? call function 0x00401140 L31: cc ?? int3 L32: cc ?? int3 L33: cc ?? int3 L34: cc ?? int3 L35: cc ?? int3 L36: cc ?? int3 L37: cc ?? int3 L38: cc ?? int3 L39: cc ?? int3 L40: cc ?? int3 L41: cc ?? int3 L42: cc ?? int3 L43: cc ?? int3 L44: cc ?? int3 L45: cc ?? int3 L46: cc ?? int3 L47: cc ?? int3 L48: cc ?? int3 L49: cc ?? int3 L50: cc ?? int3 L51: cc ?? int3 L52: cc ?? int3 L53: cc ?? int3 L54: cc ?? int3 L55: cc ?? int3 L56: cc ?? int3 L57: cc ?? int3 L58: cc ?? int3 L59: cc ?? int3 L60: cc ?? int3 L61: cc ?? int3 L62: cc ?? int3 L63: cc ?? int3 L64: cc ?? int3 L65: cc ?? int3 L66: cc ?? int3 L67: cc ?? int3 L68: cc ?? int3 L69: cc ?? int3 L70: cc ?? int3 L71: cc ?? int3 L72: cc ?? int3 L73: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4017bf
post_pgo_initialization
0
L1: e8 4f f9 ff ff ?? call function 0x00401113 L2: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4017c9
pre_cpp_initialization
0
L1: e8 71 fa ff ff ?? call function 0x0040123f L2: e8 2c f9 ff ff ?? call function 0x004010ff L3: 50 ?? push eax e8 b0 17 00 00 ?? call function 0x00402f89 L4: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4017df
__scrt_common_main
0
L1: e8 92 fa ff ff ?? call function 0x00401276 L2: e9 02 00 00 00 ?? jmp function 0x004017eb
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4017eb
__scrt_common_main_seh
0
L1: 6a 14 ?? push 0x14<20> 68 c0 6c 40 00 ?? push 0x00406cc0 e8 9f f8 ff ff ?? call function 0x00401096 L2: 6a 01 ?? push 1 e8 ec f9 ff ff ?? call function 0x004011ea L3: 59 ?? pop ecx 84 c0 ?? test al, al 0f 84 50 01 00 00 ?? je basic block L44 L4: 32 db ?? xor bl, bl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 e8 02 fa ff ff ?? call function 0x00401217 L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al a1 18 74 40 00 ?? mov eax, dword ds:[0x00407418] 33 c9 ?? xor ecx, ecx 41 ?? inc ecx 3b c1 ?? cmp eax, ecx 0f 84 2f 01 00 00 ?? je basic block L44 L6: 85 c0 ?? test eax, eax 75 49 ?? jne basic block L12 L7: 89 0d 18 74 40 00 ?? mov dword ds:[0x00407418], ecx 68 18 56 40 00 ?? push 0x00405618 68 0c 53 40 00 ?? push 0x0040530c e8 0c 17 00 00 ?? call function 0x00402f4d L8: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 11 ?? je basic block L10 L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b8 ff 00 00 00 ?? mov eax, 0x000000ff<255> e9 ef 00 00 00 ?? jmp basic block L43 L10: 68 08 52 40 00 ?? push 0x00405208 68 00 50 40 00 ?? push 0x00405000 e8 e0 16 00 00 ?? call function 0x00402f47 L11: 59 ?? pop ecx 59 ?? pop ecx c7 05 18 74 40 00 02 00 ?? mov dword ds:[0x00407418], 2 00 00 eb 05 ?? jmp basic block L13 L12: 8a d9 ?? mov bl, cl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] e8 96 f8 ff ff ?? call function 0x00401118 L14: 59 ?? pop ecx e8 aa f7 ff ff ?? call function 0x00401032 L15: 8b f0 ?? mov esi, eax 33 ff ?? xor edi, edi 39 3e ?? cmp dword ds:[esi], edi 74 1b ?? je basic block L20 L16: 56 ?? push esi e8 46 f8 ff ff ?? call function 0x004010dc L17: 59 ?? pop ecx 84 c0 ?? test al, al 74 10 ?? je basic block L20 L18: 8b 36 ?? mov esi, dword ds:[esi] 57 ?? push edi 6a 02 ?? push 2 57 ?? push edi 8b ce ?? mov ecx, esi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L19: ff d6 ?? call esi L20: e8 73 f7 ff ff ?? call function 0x00401023 L21: 8b f0 ?? mov esi, eax 39 3e ?? cmp dword ds:[esi], edi 74 13 ?? je basic block L26 L22: 56 ?? push esi e8 20 f8 ff ff ?? call function 0x004010dc L23: 59 ?? pop ecx 84 c0 ?? test al, al 74 08 ?? je basic block L26 L24: ff 36 ?? push dword ds:[esi] e8 b5 16 00 00 ?? call function 0x00402f7d L25: 59 ?? pop ecx L26: e8 73 16 00 00 ?? call function 0x00402f41 L27: 8b f8 ?? mov edi, eax e8 96 16 00 00 ?? call function 0x00402f6b L28: 8b 30 ?? mov esi, dword ds:[eax] e8 89 16 00 00 ?? call function 0x00402f65 L29: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 28 f9 ff ff ?? call function 0x0040120d L30: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax e8 32 f9 ff ff ?? call function 0x00401221 L31: 84 c0 ?? test al, al 74 6b ?? je basic block L45 L32: 84 db ?? test bl, bl 75 05 ?? jne basic block L34 L33: e8 75 16 00 00 ?? call function 0x00402f71 L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 18 f8 ff ff ?? call function 0x0040111d L35: 59 ?? pop ecx 59 ?? pop ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b c6 ?? mov eax, esi eb 35 ?? jmp basic block L43 L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 01 ?? mov eax, dword ds:[ecx] 8b 00 ?? mov eax, dword ds:[eax] 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 51 ?? push ecx 50 ?? push eax e8 00 16 00 00 ?? call function 0x00402f23 L37: 59 ?? pop ecx 59 ?? pop ecx c3 ?? ret L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] e8 f3 f8 ff ff ?? call function 0x00401221 L39: 84 c0 ?? test al, al 74 32 ?? je basic block L46 L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0 75 05 ?? jne basic block L42 L41: e8 3a 16 00 00 ?? call function 0x00402f77 L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret L44: 6a 07 ?? push 7 e8 e2 f7 ff ff ?? call function 0x00401140 L45: 56 ?? push esi e8 ef 15 00 00 ?? call function 0x00402f53 L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>] e8 ed 15 00 00 ?? call function 0x00402f59 L47: cc ?? int3 L48: cc ?? int3 L49: cc ?? int3 L50: cc ?? int3 L51: cc ?? int3 L52: cc ?? int3 L53: cc ?? int3 L54: cc ?? int3 L55: cc ?? int3 L56: cc ?? int3 L57: cc ?? int3 L58: cc ?? int3 L59: cc ?? int3 L60: cc ?? int3 L61: cc ?? int3 L62: cc ?? int3 L63: cc ?? int3 L64: cc ?? int3 L65: cc ?? int3 L66: cc ?? int3 L67: cc ?? int3 L68: cc ?? int3 L69: cc ?? int3 L70: cc ?? int3 L71: cc ?? int3 L72: cc ?? int3 L73: cc ?? int3 L74: cc ?? int3 L75: cc ?? int3 L76: cc ?? int3 L77: cc ?? int3 L78: cc ?? int3 L79: cc ?? int3 L80: cc ?? int3 L81: cc ?? int3 L82: cc ?? int3 L83: cc ?? int3 L84: cc ?? int3 L85: cc ?? int3 L86: cc ?? int3 L87: cc ?? int3 L88: cc ?? int3 L89: cc ?? int3 L90: cc ?? int3 L91: cc ?? int3 L92: cc ?? int3 L93: cc ?? int3 L94: cc ?? int3 L95: cc ?? int3 L96: cc ?? int3 L97: cc ?? int3 L98: cc ?? int3 L99: cc ?? int3 L100: cc ?? int3 L101: cc ?? int3 L102: cc ?? int3 L103: cc ?? int3 L104: cc ?? int3 L105: cc ?? int3 L106: cc ?? int3 L107: cc ?? int3 L108: cc ?? int3 L109: cc ?? int3 L110: cc ?? int3 L111: cc ?? int3 L112: cc ?? int3 L113: cc ?? int3 L114: cc ?? int3 L115: cc ?? int3 L116: cc ?? int3 L117: cc ?? int3 L118: cc ?? int3 L119: cc ?? int3 L120: cc ?? int3 L121: cc ?? int3 L122: cc ?? int3 L123: cc ?? int3 L124: cc ?? int3 L125: cc ?? int3 L126: cc ?? int3 L127: cc ?? int3 L128: cc ?? int3 L129: cc ?? int3 L130: cc ?? int3 L131: cc ?? int3 L132: cc ?? int3 L133: cc ?? int3 L134: cc ?? int3 L135: cc ?? int3 L136: cc ?? int3 L137: cc ?? int3 L138: cc ?? int3 L139: cc ?? int3 L140: cc ?? int3 L141: cc ?? int3 L142: cc ?? int3 L143: cc ?? int3 L144: e8 04 f8 ff ff ?? call function 0x004011d6 L145: 50 ?? push eax e8 5d 15 00 00 ?? call function 0x00402f35 L146: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4019e2
invoke_main
0
L1: 56 ?? push esi 57 ?? push edi e8 58 15 00 00 ?? call function 0x00402f41 L2: 8b f8 ?? mov edi, eax e8 7b 15 00 00 ?? call function 0x00402f6b L3: 8b 30 ?? mov esi, dword ds:[eax] e8 6e 15 00 00 ?? call function 0x00402f65 L4: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 0d f8 ff ff ?? call function 0x0040120d L5: 83 c4 0c ?? add esp, 12 5f ?? pop edi 5e ?? pop esi c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401a3f
_mainCRTStartup
0
L1: e8 32 f8 ff ff ?? call function 0x00401276 L2: e9 a2 fd ff ff ?? jmp function 0x004017eb
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401a4b
??0bad_alloc@std@@AAE@QBD@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 fc 5b 40 00 ?? mov dword ds:[ecx], 0x00405bfc 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401a6f
??0bad_alloc@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 13 f7 ff ff ?? call function 0x00401190 L2: c7 06 fc 5b 40 00 ?? mov dword ds:[esi], 0x00405bfc 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401a90
??0bad_alloc@std@@QAE@XZ
1
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 08 5c 40 00 ?? mov dword ds:[ecx + 4], 0x00405c08<"bad allocation"> c7 01 fc 5b 40 00 ?? mov dword ds:[ecx], 0x00405bfc c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401aae
??0bad_array_new_length@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 d4 f6 ff ff ?? call function 0x00401190 L2: c7 06 20 5c 40 00 ?? mov dword ds:[esi], 0x00405c20 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401acf
??0bad_array_new_length@std@@QAE@XZ
1
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 2c 5c 40 00 ?? mov dword ds:[ecx + 4], 0x00405c2c<"bad array new length"> c7 01 20 5c 40 00 ?? mov dword ds:[ecx], 0x00405c20 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401aed
??0exception@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 83 20 00 ?? and dword ds:[eax], 0 83 60 04 00 ?? and dword ds:[eax + 4], 0 50 ?? push eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 c0 04 ?? add eax, 4 50 ?? push eax e8 d7 13 00 00 ?? call function 0x00402ee7 L2: 59 ?? pop ecx 59 ?? pop ecx 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401b24
??0exception@std@@QAE@QBDH@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c7 01 d4 5b 40 00 ?? mov dword ds:[ecx], 0x00405bd4 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx 5d ?? pop ebp c2 08 00 ?? ret 8
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401b48
??1bad_alloc@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 d4 5b 40 00 ?? mov dword ds:[ecx], 0x00405bd4 50 ?? push eax e8 96 13 00 00 ?? call function 0x00402eed L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401b5d
??1bad_array_new_length@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 d4 5b 40 00 ?? mov dword ds:[ecx], 0x00405bd4 50 ?? push eax e8 81 13 00 00 ?? call function 0x00402eed L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401b72
??1exception@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 d4 5b 40 00 ?? mov dword ds:[ecx], 0x00405bd4 50 ?? push eax e8 6c 13 00 00 ?? call function 0x00402eed L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401b87
??_Ebad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 50 ?? push eax e8 51 13 00 00 ?? call function 0x00402eed L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 a5 f4 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401b87
??_Gbad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 50 ?? push eax e8 51 13 00 00 ?? call function 0x00402eed L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 a5 f4 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401bbf
??_Ebad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 50 ?? push eax e8 19 13 00 00 ?? call function 0x00402eed L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 6d f4 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401bbf
??_Gbad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 50 ?? push eax e8 19 13 00 00 ?? call function 0x00402eed L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 6d f4 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401bf7
??_Eexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 50 ?? push eax e8 e1 12 00 00 ?? call function 0x00402eed L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 35 f4 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401bf7
??_Gexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 d4 5b 40 00 ?? mov dword ds:[esi], 0x00405bd4 50 ?? push eax e8 e1 12 00 00 ?? call function 0x00402eed L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 35 f4 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401c2f
?__scrt_throw_std_bad_alloc@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 49 f5 ff ff ?? call function 0x00401186 L2: 68 e0 6c 40 00 ?? push 0x00406ce0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 a8 12 00 00 ?? call function 0x00402ef3 L3: cc ?? int3 L4: cc ?? int3 L5: cc ?? int3 L6: cc ?? int3 L7: cc ?? int3 L8: cc ?? int3 L9: cc ?? int3 L10: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401c53
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 f4 f3 ff ff ?? call function 0x00401055 L2: 68 44 6d 40 00 ?? push 0x00406d44 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 84 12 00 00 ?? call function 0x00402ef3 L3: cc ?? int3 L4: cc ?? int3 L5: cc ?? int3 L6: cc ?? int3 L7: cc ?? int3 L8: cc ?? int3 L9: cc ?? int3 L10: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401c77
?what@exception@std@@UBEPBDXZ
1
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L3 L2: b8 e0 5b 40 00 ?? mov eax, 0x00405be0<"Unknown exception"> L3: c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401c87
??3@YAXPAX@Z
0
L1: e9 09 13 00 00 ?? jmp 0x00402f95 ff 25 c4 80 40 00 ?? jmp dword ds:[0x004080c4]
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401c8c
find_pe_section
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 56 ?? push esi 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>] 8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>] 03 d0 ?? add edx, eax 0f b7 41 06 ?? movzx eax, word ds:[ecx + 6] 6b f0 28 ?? imul esi, eax, 0x28<40> 03 f2 ?? add esi, edx 3b d6 ?? cmp edx, esi 74 19 ?? je basic block L6 L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12] 72 0a ?? jb basic block L5 L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8] 03 42 0c ?? add eax, dword ds:[edx + 12] 3b c8 ?? cmp ecx, eax 72 0c ?? jb basic block L8 L5: 83 c2 28 ?? add edx, 0x28<40> 3b d6 ?? cmp edx, esi 75 ea ?? jne basic block L3 L6: 33 c0 ?? xor eax, eax L7: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L8: 8b c2 ?? mov eax, edx eb f9 ?? jmp basic block L7
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401ce1
is_potentially_valid_image_base
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 85 c0 ?? test eax, eax 74 25 ?? je basic block L5 L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 75 1b ?? jne basic block L5 L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 75 0e ?? jne basic block L5 L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267> 66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax 0f 94 c0 ?? sete al 5d ?? pop ebp c3 ?? ret L5: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401d20
_NtCurrentTeb
0
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401d27
___scrt_acquire_startup_lock
0
L1: 56 ?? push esi e8 ff f3 ff ff ?? call function 0x0040112c L2: 85 c0 ?? test eax, eax 74 20 ?? je basic block L6 L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] be 1c 74 40 00 ?? mov esi, 0x0040741c 8b 50 04 ?? mov edx, dword ds:[eax + 4] eb 04 ?? jmp basic block L5 L4: 3b d0 ?? cmp edx, eax 74 10 ?? je basic block L7 L5: 33 c0 ?? xor eax, eax 8b ca ?? mov ecx, edx f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx 85 c0 ?? test eax, eax 75 f0 ?? jne basic block L4 L6: 32 c0 ?? xor al, al 5e ?? pop esi c3 ?? ret L7: b0 01 ?? mov al, 1 5e ?? pop esi c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401d65
___scrt_dllmain_after_initialize_c
0
L1: e8 c2 f3 ff ff ?? call function 0x0040112c L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 be f3 ff ff ?? call function 0x00401131 L4: eb 18 ?? jmp basic block L10 L5: e8 5c f4 ff ff ?? call function 0x004011d6 L6: 50 ?? push eax e8 b5 11 00 00 ?? call function 0x00402f35 L7: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 03 ?? je basic block L9 L8: 32 c0 ?? xor al, al c3 ?? ret L9: e8 ae 11 00 00 ?? call function 0x00402f3b L10: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401d9a
___scrt_dllmain_before_initialize_c
0
L1: 6a 00 ?? push 0 e8 4a f3 ff ff ?? call function 0x004010eb L2: 84 c0 ?? test al, al 59 ?? pop ecx 0f 95 c0 ?? setne al c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401dab
___scrt_dllmain_crt_thread_attach
0
L1: e8 db f3 ff ff ?? call function 0x0040118b L2: 84 c0 ?? test al, al 75 03 ?? jne basic block L4 L3: 32 c0 ?? xor al, al c3 ?? ret L4: e8 f7 f3 ff ff ?? call function 0x004011b3 L5: 84 c0 ?? test al, al 75 07 ?? jne basic block L8 L6: e8 08 f3 ff ff ?? call function 0x004010cd L7: eb ed ?? jmp basic block L3 L8: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401dd1
___scrt_dllmain_crt_thread_detach
0
L1: e8 4c f3 ff ff ?? call function 0x00401122 L2: e8 f2 f2 ff ff ?? call function 0x004010cd L3: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401de1
___scrt_dllmain_exception_filter
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 43 f3 ff ff ?? call function 0x0040112c L2: 85 c0 ?? test eax, eax 75 19 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 13 ?? jne basic block L6 L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>] 50 ?? push eax ff 75 08 ?? push dword ss:[ebp + 8] ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>] L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>] ff 75 18 ?? push dword ss:[ebp + 0x18<24>] e8 8a 11 00 00 ?? call function 0x00402f9b L7: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401e22
___scrt_dllmain_uninitialize_c
0
L1: e8 05 f3 ff ff ?? call function 0x0040112c L2: 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 68 24 74 40 00 ?? push 0x00407424 e8 78 11 00 00 ?? call function 0x00402fad L4: 59 ?? pop ecx c3 ?? ret L5: e8 09 f3 ff ff ?? call function 0x00401145 L6: 85 c0 ?? test eax, eax 0f 84 2d 11 00 00 ?? je function 0x00402f71 L7: c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401e4d
___scrt_dllmain_uninitialize_critical
0
L1: 6a 00 ?? push 0 e8 2c f4 ff ff ?? call function 0x00401280 L2: 59 ?? pop ecx e9 40 f3 ff ff ?? jmp 0x0040119a e9 86 1e 00 00 ?? jmp function 0x00403025
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401e5d
___scrt_initialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 20 74 40 00 01 ?? mov byte ds:[0x00407420], 1 L3: e8 bf f2 ff ff ?? call function 0x00401131 L4: e8 50 f3 ff ff ?? call function 0x004011c7 L5: 84 c0 ?? test al, al 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret L7: e8 48 f3 ff ff ?? call function 0x004011cc L8: 84 c0 ?? test al, al 75 0a ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 80 f1 ff ff ?? call function 0x0040100f L10: 59 ?? pop ecx eb e9 ?? jmp basic block L6 L11: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401ea4
___scrt_initialize_onexit_tables
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d 21 74 40 00 00 ?? cmp byte ds:[0x00407421], 0 74 04 ?? je basic block L3 L2: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret L3: 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 85 f6 ?? test esi, esi 74 05 ?? je basic block L5 L4: 83 fe 01 ?? cmp esi, 1 75 62 ?? jne basic block L16 L5: e8 66 f2 ff ff ?? call function 0x0040112c L6: 85 c0 ?? test eax, eax 74 26 ?? je basic block L13 L7: 85 f6 ?? test esi, esi 75 22 ?? jne basic block L13 L8: 68 24 74 40 00 ?? push 0x00407424 e8 c9 10 00 00 ?? call function 0x00402fa1 L9: 59 ?? pop ecx 85 c0 ?? test eax, eax 75 0f ?? jne basic block L12 L10: 68 30 74 40 00 ?? push 0x00407430 e8 ba 10 00 00 ?? call function 0x00402fa1 L11: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 2b ?? je basic block L14 L12: 32 c0 ?? xor al, al eb 30 ?? jmp basic block L15 L13: 83 c9 ff ?? or ecx, 0xff<255,-1> 89 0d 24 74 40 00 ?? mov dword ds:[0x00407424], ecx 89 0d 28 74 40 00 ?? mov dword ds:[0x00407428], ecx 89 0d 2c 74 40 00 ?? mov dword ds:[0x0040742c], ecx 89 0d 30 74 40 00 ?? mov dword ds:[0x00407430], ecx 89 0d 34 74 40 00 ?? mov dword ds:[0x00407434], ecx 89 0d 38 74 40 00 ?? mov dword ds:[0x00407438], ecx L14: c6 05 21 74 40 00 01 ?? mov byte ds:[0x00407421], 1 b0 01 ?? mov al, 1 L15: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L16: 6a 05 ?? push 5 e8 16 f2 ff ff ?? call function 0x00401140 L17: cc ?? int3 L18: cc ?? int3 L19: cc ?? int3 L20: cc ?? int3 L21: cc ?? int3 L22: cc ?? int3 L23: cc ?? int3 L24: cc ?? int3 L25: cc ?? int3 L26: cc ?? int3 L27: cc ?? int3 L28: cc ?? int3 L29: cc ?? int3 L30: cc ?? int3 L31: cc ?? int3 L32: cc ?? int3 L33: cc ?? int3 L34: cc ?? int3 L35: cc ?? int3 L36: cc ?? int3 L37: cc ?? int3 L38: cc ?? int3 L39: cc ?? int3 L40: cc ?? int3 L41: cc ?? int3 L42: cc ?? int3 L43: cc ?? int3 L44: cc ?? int3 L45: cc ?? int3 L46: cc ?? int3 L47: cc ?? int3 L48: cc ?? int3 L49: cc ?? int3 L50: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x401f4c
___scrt_is_nonwritable_in_current_image
0
L1: 6a 08 ?? push 8 68 90 6d 40 00 ?? push 0x00406d90 e8 3e f1 ff ff ?? call function 0x00401096 L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117> 66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax 75 5d ?? jne basic block L11 L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c] 81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744> 00 00 75 4c ?? jne basic block L11 L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267> 66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx 75 3e ?? jne basic block L11 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] b9 00 00 40 00 ?? mov ecx, 0x00400000 2b c1 ?? sub eax, ecx 50 ?? push eax 51 ?? push ecx e8 f2 fc ff ff ?? call function 0x00401c8c L6: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 27 ?? je basic block L11 L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0 7c 21 ?? jl basic block L11 L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b0 01 ?? mov al, 1 eb 1f ?? jmp basic block L12 L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 32 c0 ?? xor al, al L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402005
___scrt_release_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 1f f1 ff ff ?? call function 0x0040112c L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0 75 09 ?? jne basic block L5 L4: 33 c0 ?? xor eax, eax b9 1c 74 40 00 ?? mov ecx, 0x0040741c 87 01 ?? xchg dword ds:[ecx], eax L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402029
___scrt_uninitialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d 20 74 40 00 00 ?? cmp byte ds:[0x00407420], 0 74 06 ?? je basic block L3 L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0 75 12 ?? jne basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 9e f0 ff ff ?? call function 0x004010e1 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 c4 ef ff ff ?? call function 0x0040100f L5: 59 ?? pop ecx 59 ?? pop ecx L6: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40205b
__onexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 24 74 40 00 ff ?? cmp dword ds:[0x00407424], 0xff<255,-1> ff 75 08 ?? push dword ss:[ebp + 8] 75 07 ?? jne basic block L4 L2: e8 44 0f 00 00 ?? call function 0x00402fb3 L3: eb 0b ?? jmp basic block L6 L4: 68 24 74 40 00 ?? push 0x00407424 e8 2c 0f 00 00 ?? call function 0x00402fa7 L5: 59 ?? pop ecx L6: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d0 ?? not eax 23 45 08 ?? and eax, dword ss:[ebp + 8] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402093
_at_quick_exit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 30 74 40 00 ff ?? cmp dword ds:[0x00407430], 0xff<255,-1> 75 06 ?? jne basic block L3 L2: 5d ?? pop ebp e9 14 0f 00 00 ?? jmp 0x00402fb9 ff 25 64 81 40 00 ?? jmp dword ds:[0x00408164] L3: ff 75 08 ?? push dword ss:[ebp + 8] 68 30 74 40 00 ?? push 0x00407430 e8 f5 0e 00 00 ?? call function 0x00402fa7 L4: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4020be
_atexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 9f f0 ff ff ?? call function 0x00401168 L2: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d8 ?? neg eax 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4020d8
__get_entropy
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 83 65 f4 00 ?? and dword ss:[ebp + 0xf4<244,-12>], 0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 83 65 f8 00 ?? and dword ss:[ebp + 0xf8<248,-8>], 0 50 ?? push eax ff 15 0c 80 40 00 ?? call dword ds:[0x0040800c] L2: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 33 45 f4 ?? xor eax, dword ss:[ebp + 0xf4<244,-12>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 08 80 40 00 ?? call dword ds:[0x00408008] L3: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax ff 15 04 80 40 00 ?? call dword ds:[0x00408004] L4: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>] 50 ?? push eax ff 15 28 80 40 00 ?? call dword ds:[0x00408028] L5: 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>] 8d 4d fc ?? lea ecx, ss:[ebp + 0xfc<252,-4>] 33 45 ec ?? xor eax, dword ss:[ebp + 0xec<236,-20>] 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 33 c1 ?? xor eax, ecx c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402138
___security_init_cookie
0
L1: 8b 0d 18 70 40 00 ?? mov ecx, dword ds:[0x00407018] 56 ?? push esi 57 ?? push edi bf 4e e6 40 bb ?? mov edi, 0xbb40e64e be 00 00 ff ff ?? mov esi, 0xffff0000<4294901760,-65536> 3b cf ?? cmp ecx, edi 74 04 ?? je basic block L3 L2: 85 ce ?? test esi, ecx 75 26 ?? jne basic block L9 L3: e8 81 ff ff ff ?? call function 0x004020d8 L4: 8b c8 ?? mov ecx, eax 3b cf ?? cmp ecx, edi 75 07 ?? jne basic block L6 L5: b9 4f e6 40 bb ?? mov ecx, 0xbb40e64f eb 0e ?? jmp basic block L8 L6: 85 ce ?? test esi, ecx 75 0a ?? jne basic block L8 L7: 0d 11 47 00 00 ?? or eax, 0x00004711<18193> c1 e0 10 ?? shl eax, 0x10<16> 0b c8 ?? or ecx, eax L8: 89 0d 18 70 40 00 ?? mov dword ds:[0x00407018], ecx L9: f7 d1 ?? not ecx 5f ?? pop edi 89 0d 14 70 40 00 ?? mov dword ds:[0x00407014], ecx 5e ?? pop esi c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402195
__matherr
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402198
__get_startup_argv_mode
0
L1: 33 c0 ?? xor eax, eax 40 ?? inc eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40219c
__get_startup_commit_mode
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40219f
__get_startup_file_mode
0
L1: b8 00 40 00 00 ?? mov eax, 0x00004000<16384> c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021a5
__get_startup_new_mode
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021a8
__get_startup_thread_locale_mode
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021ab
?__scrt_initialize_type_info@@YAXXZ
0
L1: 68 48 74 40 00 ?? push 0x00407448 ff 15 10 80 40 00 ?? call dword ds:[0x00408010] L2: c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021ba
?__scrt_uninitialize_type_info@@YAXXZ
0
L1: 68 48 74 40 00 ?? push 0x00407448 e8 35 0d 00 00 ?? call function 0x00402ef9 L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021c9
__should_initialize_environment
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021cc
__initialize_default_precision
0
L1: 68 00 00 03 00 ?? push 0x00030000 68 00 00 01 00 ?? push 0x00010000 6a 00 ?? push 0 e8 e2 0d 00 00 ?? call function 0x00402fbf L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 01 ?? jne basic block L4 L3: c3 ?? ret L4: 6a 07 ?? push 7 e8 54 ef ff ff ?? call function 0x00401140 L5: cc ?? int3 L6: cc ?? int3 L7: cc ?? int3 L8: cc ?? int3 L9: cc ?? int3 L10: cc ?? int3 L11: cc ?? int3 L12: cc ?? int3 L13: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021f5
__initialize_invalid_parameter_handler
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021f8
__initialize_denormal_control
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4021fb
___local_stdio_printf_options
0
L1: b8 58 74 40 00 ?? mov eax, 0x00407458 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402201
___local_stdio_scanf_options
0
L1: b8 68 74 40 00 ?? mov eax, 0x00407468 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402207
___scrt_initialize_default_local_stdio_options
0
L1: e8 1a f0 ff ff ?? call function 0x00401226 L2: 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 83 08 24 ?? or dword ds:[eax], 0x24<36> 89 48 04 ?? mov dword ds:[eax + 4], ecx e8 34 f0 ff ff ?? call function 0x0040124e L3: 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 83 08 02 ?? or dword ds:[eax], 2 89 48 04 ?? mov dword ds:[eax + 4], ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40222b
___scrt_is_user_matherr_present
0
L1: 33 c0 ?? xor eax, eax 39 05 04 70 40 00 ?? cmp dword ds:[0x00407004], eax 0f 94 c0 ?? sete al c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40223a
___scrt_get_dyn_tls_init_callback
0
L1: b8 50 78 40 00 ?? mov eax, 0x00407850 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402240
___scrt_get_dyn_tls_dtor_callback
0
L1: b8 44 78 40 00 ?? mov eax, 0x00407844 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402246
___scrt_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 53 ?? push ebx 6a 17 ?? push 0x17<23> ff 15 2c 80 40 00 ?? call dword ds:[0x0040802c] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: 6a 03 ?? push 3 e8 7d ef ff ff ?? call function 0x004011e5 L5: c7 04 24 cc 02 00 00 ?? mov dword ss:[esp], 0x000002cc<716> 8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>] 6a 00 ?? push 0 50 ?? push eax e8 8e 0c 00 00 ?? call function 0x00402f0b L6: 83 c4 0c ?? add esp, 12 89 85 8c fd ff ff ?? mov dword ss:[ebp + 0xfffffd8c<4294966668,-628>], eax 89 8d 88 fd ff ff ?? mov dword ss:[ebp + 0xfffffd88<4294966664,-632>], ecx 89 95 84 fd ff ff ?? mov dword ss:[ebp + 0xfffffd84<4294966660,-636>], edx 89 9d 80 fd ff ff ?? mov dword ss:[ebp + 0xfffffd80<4294966656,-640>], ebx 89 b5 7c fd ff ff ?? mov dword ss:[ebp + 0xfffffd7c<4294966652,-644>], esi 89 bd 78 fd ff ff ?? mov dword ss:[ebp + 0xfffffd78<4294966648,-648>], edi 66 8c 95 a4 fd ff ff ?? mov word ss:[ebp + 0xfffffda4<4294966692,-604>], ss 66 8c 8d 98 fd ff ff ?? mov word ss:[ebp + 0xfffffd98<4294966680,-616>], cs 66 8c 9d 74 fd ff ff ?? mov word ss:[ebp + 0xfffffd74<4294966644,-652>], ds 66 8c 85 70 fd ff ff ?? mov word ss:[ebp + 0xfffffd70<4294966640,-656>], es 66 8c a5 6c fd ff ff ?? mov word ss:[ebp + 0xfffffd6c<4294966636,-660>], fs 66 8c ad 68 fd ff ff ?? mov word ss:[ebp + 0xfffffd68<4294966632,-664>], gs 9c ?? pushfd 8f 85 9c fd ff ff ?? pop dword ss:[ebp + 0xfffffd9c<4294966684,-612>] 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 89 85 94 fd ff ff ?? mov dword ss:[ebp + 0xfffffd94<4294966676,-620>], eax 8d 45 04 ?? lea eax, ss:[ebp + 4] 89 85 a0 fd ff ff ?? mov dword ss:[ebp + 0xfffffda0<4294966688,-608>], eax c7 85 dc fc ff ff 01 00 ?? mov dword ss:[ebp + 0xfffffcdc<4294966492,-804>], 0x00010001 01 00 8b 40 fc ?? mov eax, dword ds:[eax + 0xfc<252,-4>] 6a 50 ?? push 0x50<80> 89 85 90 fd ff ff ?? mov dword ss:[ebp + 0xfffffd90<4294966672,-624>], eax 8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>] 6a 00 ?? push 0 50 ?? push eax e8 04 0c 00 00 ?? call function 0x00402f0b L7: 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 83 c4 0c ?? add esp, 12 c7 45 a8 15 00 00 40 ?? mov dword ss:[ebp + 0xa8<168,-88>], 0x40000015 c7 45 ac 01 00 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 1 89 45 b4 ?? mov dword ss:[ebp + 0xb4<180,-76>], eax ff 15 14 80 40 00 ?? call dword ds:[0x00408014] L8: 6a 00 ?? push 0 8d 58 ff ?? lea ebx, ds:[eax + 0xff<255,-1>] f7 db ?? neg ebx 8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>] 1a db ?? sbb bl, bl 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax fe c3 ?? inc bl ff 15 1c 80 40 00 ?? call dword ds:[0x0040801c] L9: 8d 45 f8 ?? lea eax, ss:[ebp + 0xf8<248,-8>] 50 ?? push eax ff 15 18 80 40 00 ?? call dword ds:[0x00408018] L10: 85 c0 ?? test eax, eax 75 0c ?? jne basic block L14 L11: 84 db ?? test bl, bl 75 08 ?? jne basic block L14 L12: 6a 03 ?? push 3 e8 88 ee ff ff ?? call function 0x004011e5 L13: 59 ?? pop ecx L14: 5b ?? pop ebx c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4023a7
___scrt_get_show_window_mode
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 44 ?? sub esp, 0x44<68> 6a 44 ?? push 0x44<68> 8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>] 6a 00 ?? push 0 50 ?? push eax e8 51 0b 00 00 ?? call function 0x00402f0b L2: 83 c4 0c ?? add esp, 12 8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>] 50 ?? push eax ff 15 30 80 40 00 ?? call dword ds:[0x00408030] L3: f6 45 e8 01 ?? test byte ss:[ebp + 0xe8<232,-24>], 1 74 06 ?? je basic block L5 L4: 0f b7 45 ec ?? movzx eax, word ss:[ebp + 0xec<236,-20>] c9 ?? leave c3 ?? ret L5: 6a 0a ?? push 10 58 ?? pop eax c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4023e4
___scrt_initialize_mta
0
L1: e9 53 ec ff ff ?? jmp 0x0040103c e9 0c 14 00 00 ?? jmp function 0x0040244d
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4023e9
___scrt_initialize_winrt
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4023ec
___scrt_is_managed_app
0
L1: 6a 00 ?? push 0 ff 15 00 80 40 00 ?? call dword ds:[0x00408000] L2: 85 c0 ?? test eax, eax 74 33 ?? je basic block L8 L3: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 75 29 ?? jne basic block L8 L4: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 75 1c ?? jne basic block L8 L5: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267> 66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax 75 11 ?? jne basic block L8 L6: 83 79 74 0e ?? cmp dword ds:[ecx + 0x74<116>], 14 76 0b ?? jbe basic block L8 L7: 83 b9 e8 00 00 00 00 ?? cmp dword ds:[ecx + 0x000000e8<232>], 0 0f 95 c0 ?? setne al c3 ?? ret L8: 32 c0 ?? xor al, al c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40243e
___scrt_set_unhandled_exception_filter
0
L1: 68 30 12 40 00 ?? push 0x00401230 ff 15 1c 80 40 00 ?? call dword ds:[0x0040801c] L2: c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40244d
___scrt_exe_initialize_mta
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40244d
___scrt_stub_for_initialize_mta
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402450
___scrt_unhandled_exception_filter@4
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 57 ?? push edi 8b 7d 08 ?? mov edi, dword ss:[ebp + 8] 8b 37 ?? mov esi, dword ds:[edi] 81 3e 63 73 6d e0 ?? cmp dword ds:[esi], 0xe06d7363 75 25 ?? jne basic block L7 L2: 83 7e 10 03 ?? cmp dword ds:[esi + 0x10<16>], 3 75 1f ?? jne basic block L7 L3: 8b 46 14 ?? mov eax, dword ds:[esi + 0x14<20>] 3d 20 05 93 19 ?? cmp eax, 0x19930520 74 1d ?? je basic block L8 L4: 3d 21 05 93 19 ?? cmp eax, 0x19930521 74 16 ?? je basic block L8 L5: 3d 22 05 93 19 ?? cmp eax, 0x19930522 74 0f ?? je basic block L8 L6: 3d 00 40 99 01 ?? cmp eax, 0x01994000 74 08 ?? je basic block L8 L7: 5f ?? pop edi 33 c0 ?? xor eax, eax 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4 L8: e8 6b 0a 00 00 ?? call function 0x00402eff L9: 89 30 ?? mov dword ds:[eax], esi 8b 77 04 ?? mov esi, dword ds:[edi + 4] e8 67 0a 00 00 ?? call function 0x00402f05 L10: 89 30 ?? mov dword ds:[eax], esi e8 20 0b 00 00 ?? call function 0x00402fc5 L11: cc ?? int3 L12: cc ?? int3 L13: cc ?? int3 L14: cc ?? int3 L15: cc ?? int3 L16: cc ?? int3 L17: cc ?? int3 L18: cc ?? int3 L19: cc ?? int3 L20: cc ?? int3 L21: cc ?? int3 L22: cc ?? int3 L23: cc ?? int3 L24: cc ?? int3 L25: cc ?? int3 L26: cc ?? int3 L27: cc ?? int3 L28: cc ?? int3 L29: cc ?? int3 L30: cc ?? int3 L31: cc ?? int3 L32: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4024bb
__crt_debugger_hook
0
L1: 83 25 74 74 40 00 00 ?? and dword ds:[0x00407474], 0 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4024c5
__RTC_Initialize
0
L1: 53 ?? push ebx 56 ?? push esi be b4 68 40 00 ?? mov esi, 0x004068b4 bb b4 69 40 00 ?? mov ebx, 0x004069b4 3b f3 ?? cmp esi, ebx 73 19 ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 3b f3 ?? cmp esi, ebx 72 e9 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi 5b ?? pop ebx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4024fc
__RTC_Terminate
0
L1: 53 ?? push ebx 56 ?? push esi be bc 6a 40 00 ?? mov esi, 0x00406abc bb bc 6b 40 00 ?? mov ebx, 0x00406bbc 3b f3 ?? cmp esi, ebx 73 19 ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 3b f3 ?? cmp esi, ebx 72 e9 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi 5b ?? pop ebx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402540
__SEH_prolog4
0
L1: 68 b9 25 40 00 ?? push function 0x004025b9 64 ff 35 00 00 00 00 ?? push dword fs:[0] 8b 44 24 10 ?? mov eax, dword ss:[esp + 0x10<16>] 89 6c 24 10 ?? mov dword ss:[esp + 0x10<16>], ebp 8d 6c 24 10 ?? lea ebp, ss:[esp + 0x10<16>] 2b e0 ?? sub esp, eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 18 70 40 00 ?? mov eax, dword ds:[0x00407018] 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp ff 75 f8 ?? push dword ss:[ebp + 0xf8<248,-8>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4025a0
__SEH_epilog4
0
L1: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp 51 ?? push ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4025b9
__except_handler4
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] ff 36 ?? push dword ds:[esi] e8 a5 ec ff ff ?? call function 0x0040126c L2: ff 75 14 ?? push dword ss:[ebp + 0x14<20>] 89 06 ?? mov dword ds:[esi], eax ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] 56 ?? push esi 68 04 11 40 00 ?? push 0x00401104 68 18 70 40 00 ?? push 0x00407018 e8 2f 09 00 00 ?? call function 0x00402f11 L3: 83 c4 1c ?? add esp, 0x1c<28> 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4025f3
@_guard_check_icall_nop@4
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4025f6
_ReadNoFence
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 00 ?? mov eax, dword ds:[eax] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402602
_ReadPointerNoFence
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 00 ?? mov eax, dword ds:[eax] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40260e
__InlineInterlockedExchangePointer
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 87 01 ?? xchg dword ds:[ecx], eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40261e
___castguard_check_failure_debugbreak
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 00 5f 40 00 ?? mov edx, 0x00405f00 b9 40 60 40 00 ?? mov ecx, 0x00406040 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 01 ?? ja basic block L3 L2: cc ?? int3 L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40263f
___castguard_check_failure_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 00 5f 40 00 ?? mov edx, 0x00405f00 b9 40 60 40 00 ?? mov ecx, 0x00406040 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 05 ?? ja basic block L3 L2: 6a 41 ?? push 0x41<65> 59 ?? pop ecx cd 29 ?? int 0x29<41> L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402665
___castguard_check_failure_nop
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x402668
___castguard_check_failure_os_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 00 5f 40 00 ?? mov edx, 0x00405f00 b9 40 60 40 00 ?? mov ecx, 0x00406040 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 11 ?? ja basic block L4 L2: 83 3d 08 90 40 00 00 ?? cmp dword ds:[0x00409008], 0 74 08 ?? je basic block L4 L3: a1 08 90 40 00 ?? mov eax, dword ds:[0x00409008] 5d ?? pop ebp ff e0 ?? jmp eax L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x40269d
__castguard_check_failure_os_handled_wrapper
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 08 90 40 00 00 ?? cmp dword ds:[0x00409008], 0 74 08 ?? je basic block L3 L2: a1 08 90 40 00 ?? mov eax, dword ds:[0x00409008] 5d ?? pop ebp ff e0 ?? jmp eax L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex9.exe
0x4026b8
___castguard_check_failure_user_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 00 5f 40 00 ?? mov edx, 0x00405f00 b9 40 60 40 00 ?? mov ecx, 0x00406040 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 1a ?? ja basic block L7 L2: 56 ?? push esi 8b 35 78 74 40 00 ?? mov esi, dword ds:[0x00407478] 85 f6 ?? test esi, esi 74 0e ?? je basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] 8b ce ?? mov ecx, esi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L4: ff d6 ?? call esi L5: 59 ?? pop ecx L6: 5e ?? pop esi L7: 5d ?? pop ebp c3 ?? ret