Binary stringlengths 25 43 | Addr stringlengths 8 8 | Name stringlengths 5 187 | Type int64 0 1 | Disassembly stringlengths 16 68.6k |
|---|---|---|---|---|
./vs2022/normal/RelWithDebInfo/oonewdel.exe | 0x4037a6 | ___vcrt_uninitialize_critical | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oonewdel.exe | 0x4037a9 | ___scrt_stub_for_is_c_termination_complete | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oonewdel.exe | 0x4037a9 | __is_c_termination_complete | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401540 | ??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 3d 48 40 00 ?? push 0x0040483d
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
83 ec 20 ?? sub esp, 0x20<32>
53 ?? push ebx
56 ?? push esi
57 ?? push edi
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
89 65 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], esp
8b 75 0c ?? mov esi, dword ss:[ebp + 12]
33 c0 ?? xor eax, eax
89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax
89 45 e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], eax
8d 4e 01 ?? lea ecx, ds:[esi + 1]
0f 1f 80 00 00 00 00 ?? nop dword ds:[eax + 0]
L2: 8a 06 ?? mov al, byte ds:[esi]
46 ?? inc esi
84 c0 ?? test al, al
L3: 75 f9 ?? jne basic block L2
L4: 8b 5d 08 ?? mov ebx, dword ss:[ebp + 8]
2b f1 ?? sub esi, ecx
89 75 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esi
8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 98 90 40 00 ?? call dword ds:[function 0x00409098]
L5: 85 d2 ?? test edx, edx
7c 36 ?? jl basic block L14
L6: 7f 04 ?? jg basic block L8
L7: 85 c0 ?? test eax, eax
74 30 ?? je basic block L14
L8: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 98 90 40 00 ?? call dword ds:[function 0x00409098]
L9: 85 d2 ?? test edx, edx
7c 1f ?? jl basic block L14
L10: 7f 04 ?? jg basic block L12
L11: 3b c6 ?? cmp eax, esi
76 19 ?? jbe basic block L14
L12: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 98 90 40 00 ?? call dword ds:[function 0x00409098]
L13: 8b f0 ?? mov esi, eax
8b fa ?? mov edi, edx
2b 75 e8 ?? sub esi, dword ss:[ebp + 0xe8<232,-24>]
83 df 00 ?? sbb edi, 0
eb 0e ?? jmp basic block L15
L14: 0f 57 c0 ?? xorps xmm0, xmm0
66 0f 13 45 d4 ?? movlpd double ss:[ebp + 0xd4<212,-44>], xmm0
8b 7d d8 ?? mov edi, dword ss:[ebp + 0xd8<216,-40>]
8b 75 d4 ?? mov esi, dword ss:[ebp + 0xd4<212,-44>]
L15: 53 ?? push ebx
8d 4d dc ?? lea ecx, ss:[ebp + 0xdc<220,-36>]
e8 76 fb ff ff ?? call function 0x00401163
L16: 80 7d e0 00 ?? cmp byte ss:[ebp + 0xe0<224,-32>], 0
c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
75 0a ?? jne basic block L18
L17: be 04 00 00 00 ?? mov esi, 4
e9 12 01 00 00 ?? jmp basic block L51
L18: 8b 03 ?? mov eax, dword ds:[ebx]
c6 45 fc 01 ?? mov byte ss:[ebp + 0xfc<252,-4>], 1
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 9c 90 40 00 ?? call dword ds:[function 0x0040909c]
L19: 25 c0 01 00 00 ?? and eax, 0x000001c0<448>
83 f8 40 ?? cmp eax, 0x40<64>
74 46 ?? je basic block L30
L20: 90 ?? nop
L21: 85 ff ?? test edi, edi
7c 41 ?? jl basic block L30
L22: 7f 04 ?? jg basic block L24
L23: 85 f6 ?? test esi, esi
74 3b ?? je basic block L30
L24: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 7c 90 40 00 ?? call dword ds:[function 0x0040907c]
L25: 0f b6 c0 ?? movzx eax, al
50 ?? push eax
8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L26: 8b c8 ?? mov ecx, eax
ff 15 90 90 40 00 ?? call dword ds:[function 0x00409090]
L27: 83 f8 ff ?? cmp eax, 0xff<255,-1>
75 08 ?? jne basic block L29
L28: 8d 70 05 ?? lea esi, ds:[eax + 5]
e9 7f 00 00 00 ?? jmp basic block L45
L29: 83 c6 ff ?? add esi, 0xff<255,-1>
83 d7 ff ?? adc edi, 0xff<255,-1>
eb bb ?? jmp basic block L21
L30: 8b 03 ?? mov eax, dword ds:[ebx]
6a 00 ?? push 0
ff 75 e8 ?? push dword ss:[ebp + 0xe8<232,-24>]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
ff 75 0c ?? push dword ss:[ebp + 12]
03 cb ?? add ecx, ebx
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L31: 8b c8 ?? mov ecx, eax
ff 15 8c 90 40 00 ?? call dword ds:[function 0x0040908c]
L32: 3b 45 e8 ?? cmp eax, dword ss:[ebp + 0xe8<232,-24>]
75 04 ?? jne basic block L34
L33: 85 d2 ?? test edx, edx
74 09 ?? je basic block L35
L34: 33 c0 ?? xor eax, eax
83 c8 04 ?? or eax, 4
8b f0 ?? mov esi, eax
eb 48 ?? jmp basic block L45
L35: 85 ff ?? test edi, edi
7c 41 ?? jl basic block L44
L36: 7f 04 ?? jg basic block L38
L37: 85 f6 ?? test esi, esi
74 3b ?? je basic block L44
L38: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 7c 90 40 00 ?? call dword ds:[function 0x0040907c]
L39: 0f b6 c0 ?? movzx eax, al
50 ?? push eax
8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L40: 8b c8 ?? mov ecx, eax
ff 15 90 90 40 00 ?? call dword ds:[function 0x00409090]
L41: 83 f8 ff ?? cmp eax, 0xff<255,-1>
75 08 ?? jne basic block L43
L42: 8b 75 ec ?? mov esi, dword ss:[ebp + 0xec<236,-20>]
83 ce 04 ?? or esi, 4
eb 0b ?? jmp basic block L45
L43: 83 c6 ff ?? add esi, 0xff<255,-1>
83 d7 ff ?? adc edi, 0xff<255,-1>
eb bb ?? jmp basic block L35
L44: 8b 75 ec ?? mov esi, dword ss:[ebp + 0xec<236,-20>]
L45: 8b 03 ?? mov eax, dword ds:[ebx]
6a 00 ?? push 0
6a 00 ?? push 0
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 94 90 40 00 ?? call dword ds:[function 0x00409094]
L46: eb 20 ?? jmp basic block L50
L47: 8b 55 08 ?? mov edx, dword ss:[ebp + 8]
6a 01 ?? push 1
6a 04 ?? push 4
8b 02 ?? mov eax, dword ds:[edx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ca ?? add ecx, edx
ff 15 88 90 40 00 ?? call dword ds:[function 0x00409088]
L48: b8 09 17 40 00 ?? mov eax, basic block L49
c3 ?? ret
L49: 8b 5d 08 ?? mov ebx, dword ss:[ebp + 8]
8b 75 e4 ?? mov esi, dword ss:[ebp + 0xe4<228,-28>]
L50: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
L51: 8b 03 ?? mov eax, dword ds:[ebx]
6a 00 ?? push 0
56 ?? push esi
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 88 90 40 00 ?? call dword ds:[function 0x00409088]
L52: e8 34 04 00 00 ?? call function 0x00401b5f
L53: 84 c0 ?? test al, al
75 09 ?? jne basic block L55
L54: 8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>]
ff 15 74 90 40 00 ?? call dword ds:[function 0x00409074]
L55: 8b 55 dc ?? mov edx, dword ss:[ebp + 0xdc<220,-36>]
c7 45 fc 03 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 3
8b 02 ?? mov eax, dword ds:[edx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ca ?? add ecx, edx
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L56: 85 c0 ?? test eax, eax
74 07 ?? je basic block L58
L57: 8b 10 ?? mov edx, dword ds:[eax]
8b c8 ?? mov ecx, eax
ff 52 08 ?? call dword ds:[edx + 8]
L58: 8b c3 ?? mov eax, ebx
8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401800 | ??$endl@DU?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
6a 0a ?? push 10
8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 78 90 40 00 ?? call dword ds:[function 0x00409078]
L2: 0f b6 c8 ?? movzx ecx, al
51 ?? push ecx
8b ce ?? mov ecx, esi
ff 15 68 90 40 00 ?? call dword ds:[function 0x00409068]
L3: 8b ce ?? mov ecx, esi
ff 15 a4 90 40 00 ?? call dword ds:[function 0x004090a4]
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401840 | ??0sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 7d 48 40 00 ?? push 0x0040487d
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
51 ?? push ecx
56 ?? push esi
57 ?? push edi
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
8b f9 ?? mov edi, ecx
89 7d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
89 37 ?? mov dword ds:[edi], esi
8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L2: 85 c0 ?? test eax, eax
74 07 ?? je basic block L4
L3: 8b 10 ?? mov edx, dword ds:[eax]
8b c8 ?? mov ecx, eax
ff 52 04 ?? call dword ds:[edx + 4]
L4: 8b 06 ?? mov eax, dword ds:[esi]
c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 a0 90 40 00 ?? call dword ds:[function 0x004090a0]
L5: 84 c0 ?? test al, al
74 2e ?? je basic block L13
L6: 8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 84 90 40 00 ?? call dword ds:[function 0x00409084]
L7: 85 c0 ?? test eax, eax
74 1b ?? je basic block L12
L8: 3b c6 ?? cmp eax, esi
74 17 ?? je basic block L12
L9: 8b c8 ?? mov ecx, eax
ff 15 a4 90 40 00 ?? call dword ds:[function 0x004090a4]
L10: 8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 a0 90 40 00 ?? call dword ds:[function 0x004090a0]
L11: eb 02 ?? jmp basic block L13
L12: b0 01 ?? mov al, 1
L13: 88 47 04 ?? mov byte ds:[edi + 4], al
8b c7 ?? mov eax, edi
8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401910 | ??1_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 b0 48 40 00 ?? push 0x004048b0
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
8b 11 ?? mov edx, dword ds:[ecx]
8b 02 ?? mov eax, dword ds:[edx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ca ?? add ecx, edx
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L2: 85 c0 ?? test eax, eax
74 07 ?? je basic block L4
L3: 8b 10 ?? mov edx, dword ds:[eax]
8b c8 ?? mov ecx, eax
ff 52 08 ?? call dword ds:[edx + 8]
L4: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401980 | ??1sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 e0 48 40 00 ?? push 0x004048e0
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
56 ?? push esi
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
8b f1 ?? mov esi, ecx
e8 b5 01 00 00 ?? call function 0x00401b5f
L2: 84 c0 ?? test al, al
75 08 ?? jne basic block L4
L3: 8b 0e ?? mov ecx, dword ds:[esi]
ff 15 74 90 40 00 ?? call dword ds:[function 0x00409074]
L4: 8b 16 ?? mov edx, dword ds:[esi]
c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
8b 02 ?? mov eax, dword ds:[edx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ca ?? add ecx, edx
ff 15 80 90 40 00 ?? call dword ds:[function 0x00409080]
L5: 85 c0 ?? test eax, eax
74 07 ?? je basic block L7
L6: 8b 10 ?? mov edx, dword ds:[eax]
8b c8 ?? mov ecx, eax
ff 52 08 ?? call dword ds:[edx + 8]
L7: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5e ?? pop esi
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401a10 | ?draw@Circle@@UAEXXZ | 1 |
L1: 68 28 10 40 00 ?? push 0x00401028
68 70 6b 40 00 ?? push 0x00406b70<"Drawing Circle">
ff 35 70 90 40 00 ?? push dword ds:[0x00409070]
e8 f3 f6 ff ff ?? call function 0x00401118
L2: 83 c4 08 ?? add esp, 8
8b c8 ?? mov ecx, eax
ff 15 6c 90 40 00 ?? call dword ds:[function 0x0040906c]
L3: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401a40 | ?draw@Rectangle@@UAEXXZ | 1 |
L1: 68 28 10 40 00 ?? push 0x00401028
68 4c 6b 40 00 ?? push 0x00406b4c<"Drawing Rectangle">
ff 35 70 90 40 00 ?? push dword ds:[0x00409070]
e8 c3 f6 ff ff ?? call function 0x00401118
L2: 83 c4 08 ?? add esp, 8
8b c8 ?? mov ecx, eax
ff 15 6c 90 40 00 ?? call dword ds:[function 0x0040906c]
L3: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401a70 | ?draw@Triangle@@UAEXXZ | 1 |
L1: 68 28 10 40 00 ?? push 0x00401028
68 90 6b 40 00 ?? push 0x00406b90<"Drawing Triangle">
ff 35 70 90 40 00 ?? push dword ds:[0x00409070]
e8 93 f6 ff ff ?? call function 0x00401118
L2: 83 c4 08 ?? add esp, 8
8b c8 ?? mov ecx, eax
ff 15 6c 90 40 00 ?? call dword ds:[function 0x0040906c]
L3: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401aa0 | _main | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 10 ?? sub esp, 0x10<16>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
6a 04 ?? push 4
e8 02 f6 ff ff ?? call function 0x004010b9
L2: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 08 ?? je basic block L4
L3: c7 00 44 6b 40 00 ?? mov dword ds:[eax], 0x00406b44
eb 02 ?? jmp basic block L5
L4: 33 c0 ?? xor eax, eax
L5: 6a 04 ?? push 4
89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax
e8 e7 f5 ff ff ?? call function 0x004010b9
L6: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 08 ?? je basic block L8
L7: c7 00 68 6b 40 00 ?? mov dword ds:[eax], 0x00406b68
eb 02 ?? jmp basic block L9
L8: 33 c0 ?? xor eax, eax
L9: 6a 04 ?? push 4
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
e8 cc f5 ff ff ?? call function 0x004010b9
L10: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 08 ?? je basic block L12
L11: c7 00 88 6b 40 00 ?? mov dword ds:[eax], 0x00406b88
eb 02 ?? jmp basic block L13
L12: 33 c0 ?? xor eax, eax
L13: 56 ?? push esi
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
33 f6 ?? xor esi, esi
L14: 8b 4c b5 f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16> + esi * 4]
8b 01 ?? mov eax, dword ds:[ecx]
ff 10 ?? call dword ds:[eax]
L15: 46 ?? inc esi
83 fe 03 ?? cmp esi, 3
7c f2 ?? jl basic block L14
L16: 33 f6 ?? xor esi, esi
L17: 6a 04 ?? push 4
ff 74 b5 f0 ?? push dword ss:[ebp + 0xf0<240,-16> + esi * 4]
e8 36 f5 ff ff ?? call function 0x00401055
L18: 46 ?? inc esi
83 c4 08 ?? add esp, 8
83 fe 03 ?? cmp esi, 3
7c ec ?? jl basic block L17
L19: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 c0 ?? xor eax, eax
33 cd ?? xor ecx, ebp
5e ?? pop esi
e8 d9 f5 ff ff ?? call function 0x0040110e
L20: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401bbf | ??2@YAPAXI@Z | 0 |
L1: e9 2e 0f 00 00 ?? jmp function 0x004021b8
L2: 55 ?? push ebp
8b ec ?? mov ebp, esp
eb 0d ?? jmp basic block L5
L3: ff 75 08 ?? push dword ss:[ebp + 8]
e8 a7 18 00 00 ?? call function 0x00403473
L4: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 0f ?? je basic block L8
L5: ff 75 08 ?? push dword ss:[ebp + 8]
e8 a0 18 00 00 ?? call function 0x00403479
L6: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 e6 ?? je basic block L3
L7: 5d ?? pop ebp
c3 ?? ret
L8: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1>
0f 84 9b f6 ff ff ?? je basic block L1
L9: e9 c5 f4 ff ff ?? jmp 0x004010b4
e9 db 10 00 00 ?? jmp function 0x00402194
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401bfb | ??3@YAXPAXI@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
ff 75 08 ?? push dword ss:[ebp + 8]
e8 6d f4 ff ff ?? call function 0x00401073
L2: 59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401c0c | @__security_check_cookie@4 | 0 |
L1: 3b 0d 04 80 40 00 ?? cmp ecx, dword ds:[0x00408004]
75 01 ?? jne basic block L3
L2: c3 ?? ret
L3: e9 ff f3 ff ff ?? jmp 0x00401019
e9 05 12 00 00 ?? jmp function 0x00402223
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401c1d | ??1type_info@@UAE@XZ | 1 |
L1: c7 01 a8 6b 40 00 ?? mov dword ds:[ecx], 0x00406ba8
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401c24 | ??_Etype_info@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
f6 45 08 01 ?? test byte ss:[ebp + 8], 1
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 06 a8 6b 40 00 ?? mov dword ds:[esi], 0x00406ba8
74 0a ?? je basic block L4
L2: 6a 0c ?? push 12
56 ?? push esi
e8 17 f4 ff ff ?? call function 0x00401055
L3: 59 ?? pop ecx
59 ?? pop ecx
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401c24 | ??_Gtype_info@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
f6 45 08 01 ?? test byte ss:[ebp + 8], 1
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 06 a8 6b 40 00 ?? mov dword ds:[esi], 0x00406ba8
74 0a ?? je basic block L4
L2: 6a 0c ?? push 12
56 ?? push esi
e8 17 f4 ff ff ?? call function 0x00401055
L3: 59 ?? pop ecx
59 ?? pop ecx
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401c4f | pre_c_initialization | 0 |
L1: 56 ?? push esi
6a 01 ?? push 1
e8 2e 18 00 00 ?? call function 0x00403485
L2: e8 49 f4 ff ff ?? call function 0x004010a5
L3: 50 ?? push eax
e8 59 18 00 00 ?? call function 0x004034bb
L4: e8 75 f4 ff ff ?? call function 0x004010dc
L5: 8b f0 ?? mov esi, eax
e8 7d 18 00 00 ?? call function 0x004034eb
L6: 6a 01 ?? push 1
89 30 ?? mov dword ds:[eax], esi
e8 79 f4 ff ff ?? call function 0x004010f0
L7: 83 c4 0c ?? add esp, 12
5e ?? pop esi
84 c0 ?? test al, al
74 73 ?? je basic block L30
L8: db e2 ?? fnclex
e8 7f f3 ff ff ?? call function 0x00401005
L9: 68 2c 11 40 00 ?? push 0x0040112c
e8 c4 f4 ff ff ?? call function 0x00401154
L10: e8 50 f5 ff ff ?? call function 0x004011e5
L11: 50 ?? push eax
e8 f6 17 00 00 ?? call function 0x00403491
L12: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
75 51 ?? jne basic block L30
L13: e8 c8 f3 ff ff ?? call function 0x0040106e
L14: e8 c2 f4 ff ff ?? call function 0x0040116d
L15: 85 c0 ?? test eax, eax
74 0b ?? je basic block L18
L16: 68 c8 10 40 00 ?? push 0x004010c8
e8 d2 17 00 00 ?? call function 0x0040348b
L17: 59 ?? pop ecx
L18: e8 bc f5 ff ff ?? call function 0x0040127b
L19: e8 69 f3 ff ff ?? call function 0x0040102d
L20: e8 7b f5 ff ff ?? call function 0x00401244
L21: e8 fe f4 ff ff ?? call function 0x004011cc
L22: 50 ?? push eax
e8 0b 18 00 00 ?? call function 0x004034df
L23: 59 ?? pop ecx
e8 4c f5 ff ff ?? call function 0x00401226
L24: 84 c0 ?? test al, al
74 05 ?? je basic block L26
L25: e8 b4 17 00 00 ?? call function 0x00403497
L26: e8 e9 f4 ff ff ?? call function 0x004011d1
L27: e8 8a f4 ff ff ?? call function 0x00401177
L28: 85 c0 ?? test eax, eax
75 01 ?? jne basic block L30
L29: c3 ?? ret
L30: 6a 07 ?? push 7
e8 51 f4 ff ff ?? call function 0x0040114a
L31: cc ?? int3
L32: cc ?? int3
L33: cc ?? int3
L34: cc ?? int3
L35: cc ?? int3
L36: cc ?? int3
L37: cc ?? int3
L38: cc ?? int3
L39: cc ?? int3
L40: cc ?? int3
L41: cc ?? int3
L42: cc ?? int3
L43: cc ?? int3
L44: cc ?? int3
L45: cc ?? int3
L46: cc ?? int3
L47: cc ?? int3
L48: cc ?? int3
L49: cc ?? int3
L50: cc ?? int3
L51: cc ?? int3
L52: cc ?? int3
L53: cc ?? int3
L54: cc ?? int3
L55: cc ?? int3
L56: cc ?? int3
L57: cc ?? int3
L58: cc ?? int3
L59: cc ?? int3
L60: cc ?? int3
L61: cc ?? int3
L62: cc ?? int3
L63: cc ?? int3
L64: cc ?? int3
L65: cc ?? int3
L66: cc ?? int3
L67: cc ?? int3
L68: cc ?? int3
L69: cc ?? int3
L70: cc ?? int3
L71: cc ?? int3
L72: cc ?? int3
L73: cc ?? int3
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401d24 | post_pgo_initialization | 0 |
L1: e8 ea f3 ff ff ?? call function 0x00401113
L2: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401d2e | pre_cpp_initialization | 0 |
L1: e8 16 f5 ff ff ?? call function 0x00401249
L2: e8 d1 f3 ff ff ?? call function 0x00401109
L3: 50 ?? push eax
e8 a7 17 00 00 ?? call function 0x004034e5
L4: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401d44 | __scrt_common_main | 0 |
L1: e8 41 f5 ff ff ?? call function 0x0040128a
L2: e9 02 00 00 00 ?? jmp function 0x00401d50
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401d50 | __scrt_common_main_seh | 0 |
L1: 6a 14 ?? push 0x14<20>
68 e0 7c 40 00 ?? push 0x00407ce0
e8 3f f3 ff ff ?? call function 0x0040109b
L2: 6a 01 ?? push 1
e8 96 f4 ff ff ?? call function 0x004011f9
L3: 59 ?? pop ecx
84 c0 ?? test al, al
0f 84 50 01 00 00 ?? je basic block L44
L4: 32 db ?? xor bl, bl
88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl
83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
e8 a7 f4 ff ff ?? call function 0x00401221
L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al
a1 f4 87 40 00 ?? mov eax, dword ds:[0x004087f4]
33 c9 ?? xor ecx, ecx
41 ?? inc ecx
3b c1 ?? cmp eax, ecx
0f 84 2f 01 00 00 ?? je basic block L44
L6: 85 c0 ?? test eax, eax
75 49 ?? jne basic block L12
L7: 89 0d f4 87 40 00 ?? mov dword ds:[0x004087f4], ecx
68 18 66 40 00 ?? push 0x00406618
68 0c 63 40 00 ?? push 0x0040630c
e8 03 17 00 00 ?? call function 0x004034a9
L8: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
74 11 ?? je basic block L10
L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
b8 ff 00 00 00 ?? mov eax, 0x000000ff<255>
e9 ef 00 00 00 ?? jmp basic block L43
L10: 68 08 62 40 00 ?? push 0x00406208
68 00 60 40 00 ?? push 0x00406000
e8 d7 16 00 00 ?? call function 0x004034a3
L11: 59 ?? pop ecx
59 ?? pop ecx
c7 05 f4 87 40 00 02 00 ?? mov dword ds:[0x004087f4], 2
00 00
eb 05 ?? jmp basic block L13
L12: 8a d9 ?? mov bl, cl
88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl
L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>]
e8 36 f3 ff ff ?? call function 0x0040111d
L14: 59 ?? pop ecx
e8 4a f2 ff ff ?? call function 0x00401037
L15: 8b f0 ?? mov esi, eax
33 ff ?? xor edi, edi
39 3e ?? cmp dword ds:[esi], edi
74 1b ?? je basic block L20
L16: 56 ?? push esi
e8 e6 f2 ff ff ?? call function 0x004010e1
L17: 59 ?? pop ecx
84 c0 ?? test al, al
74 10 ?? je basic block L20
L18: 8b 36 ?? mov esi, dword ds:[esi]
57 ?? push edi
6a 02 ?? push 2
57 ?? push edi
8b ce ?? mov ecx, esi
ff 15 00 b0 40 00 ?? call dword ds:[0x0040b000]
L19: ff d6 ?? call esi
L20: e8 0e f2 ff ff ?? call function 0x00401023
L21: 8b f0 ?? mov esi, eax
39 3e ?? cmp dword ds:[esi], edi
74 13 ?? je basic block L26
L22: 56 ?? push esi
e8 c0 f2 ff ff ?? call function 0x004010e1
L23: 59 ?? pop ecx
84 c0 ?? test al, al
74 08 ?? je basic block L26
L24: ff 36 ?? push dword ds:[esi]
e8 ac 16 00 00 ?? call function 0x004034d9
L25: 59 ?? pop ecx
L26: e8 6a 16 00 00 ?? call function 0x0040349d
L27: 8b f8 ?? mov edi, eax
e8 8d 16 00 00 ?? call function 0x004034c7
L28: 8b 30 ?? mov esi, dword ds:[eax]
e8 80 16 00 00 ?? call function 0x004034c1
L29: 57 ?? push edi
56 ?? push esi
ff 30 ?? push dword ds:[eax]
e8 cd f3 ff ff ?? call function 0x00401217
L30: 83 c4 0c ?? add esp, 12
8b f0 ?? mov esi, eax
e8 d7 f3 ff ff ?? call function 0x0040122b
L31: 84 c0 ?? test al, al
74 6b ?? je basic block L45
L32: 84 db ?? test bl, bl
75 05 ?? jne basic block L34
L33: e8 6c 16 00 00 ?? call function 0x004034cd
L34: 6a 00 ?? push 0
6a 01 ?? push 1
e8 b8 f2 ff ff ?? call function 0x00401122
L35: 59 ?? pop ecx
59 ?? pop ecx
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b c6 ?? mov eax, esi
eb 35 ?? jmp basic block L43
L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>]
8b 01 ?? mov eax, dword ds:[ecx]
8b 00 ?? mov eax, dword ds:[eax]
89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax
51 ?? push ecx
50 ?? push eax
e8 f7 15 00 00 ?? call function 0x0040347f
L37: 59 ?? pop ecx
59 ?? pop ecx
c3 ?? ret
L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
e8 98 f3 ff ff ?? call function 0x0040122b
L39: 84 c0 ?? test al, al
74 32 ?? je basic block L46
L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0
75 05 ?? jne basic block L42
L41: e8 31 16 00 00 ?? call function 0x004034d3
L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>]
L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
c9 ?? leave
c3 ?? ret
L44: 6a 07 ?? push 7
e8 87 f2 ff ff ?? call function 0x0040114a
L45: 56 ?? push esi
e8 e6 15 00 00 ?? call function 0x004034af
L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>]
e8 e4 15 00 00 ?? call function 0x004034b5
L47: cc ?? int3
L48: cc ?? int3
L49: cc ?? int3
L50: cc ?? int3
L51: cc ?? int3
L52: cc ?? int3
L53: cc ?? int3
L54: cc ?? int3
L55: cc ?? int3
L56: cc ?? int3
L57: cc ?? int3
L58: cc ?? int3
L59: cc ?? int3
L60: cc ?? int3
L61: cc ?? int3
L62: cc ?? int3
L63: cc ?? int3
L64: cc ?? int3
L65: cc ?? int3
L66: cc ?? int3
L67: cc ?? int3
L68: cc ?? int3
L69: cc ?? int3
L70: cc ?? int3
L71: cc ?? int3
L72: cc ?? int3
L73: cc ?? int3
L74: cc ?? int3
L75: cc ?? int3
L76: cc ?? int3
L77: cc ?? int3
L78: cc ?? int3
L79: cc ?? int3
L80: cc ?? int3
L81: cc ?? int3
L82: cc ?? int3
L83: cc ?? int3
L84: cc ?? int3
L85: cc ?? int3
L86: cc ?? int3
L87: cc ?? int3
L88: cc ?? int3
L89: cc ?? int3
L90: cc ?? int3
L91: cc ?? int3
L92: cc ?? int3
L93: cc ?? int3
L94: cc ?? int3
L95: cc ?? int3
L96: cc ?? int3
L97: cc ?? int3
L98: cc ?? int3
L99: cc ?? int3
L100: cc ?? int3
L101: cc ?? int3
L102: cc ?? int3
L103: cc ?? int3
L104: cc ?? int3
L105: cc ?? int3
L106: cc ?? int3
L107: cc ?? int3
L108: cc ?? int3
L109: cc ?? int3
L110: cc ?? int3
L111: cc ?? int3
L112: cc ?? int3
L113: cc ?? int3
L114: cc ?? int3
L115: cc ?? int3
L116: cc ?? int3
L117: cc ?? int3
L118: cc ?? int3
L119: cc ?? int3
L120: cc ?? int3
L121: cc ?? int3
L122: cc ?? int3
L123: cc ?? int3
L124: cc ?? int3
L125: cc ?? int3
L126: cc ?? int3
L127: cc ?? int3
L128: cc ?? int3
L129: cc ?? int3
L130: cc ?? int3
L131: cc ?? int3
L132: cc ?? int3
L133: cc ?? int3
L134: cc ?? int3
L135: cc ?? int3
L136: cc ?? int3
L137: cc ?? int3
L138: cc ?? int3
L139: cc ?? int3
L140: cc ?? int3
L141: cc ?? int3
L142: cc ?? int3
L143: cc ?? int3
L144: e8 ae f2 ff ff ?? call function 0x004011e5
L145: 50 ?? push eax
e8 54 15 00 00 ?? call function 0x00403491
L146: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401f47 | invoke_main | 0 |
L1: 56 ?? push esi
57 ?? push edi
e8 4f 15 00 00 ?? call function 0x0040349d
L2: 8b f8 ?? mov edi, eax
e8 72 15 00 00 ?? call function 0x004034c7
L3: 8b 30 ?? mov esi, dword ds:[eax]
e8 65 15 00 00 ?? call function 0x004034c1
L4: 57 ?? push edi
56 ?? push esi
ff 30 ?? push dword ds:[eax]
e8 b2 f2 ff ff ?? call function 0x00401217
L5: 83 c4 0c ?? add esp, 12
5f ?? pop edi
5e ?? pop esi
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401fa4 | _mainCRTStartup | 0 |
L1: e8 e1 f2 ff ff ?? call function 0x0040128a
L2: e9 a2 fd ff ff ?? jmp function 0x00401d50
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401fb0 | ??0bad_alloc@std@@AAE@QBD@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 61 04 00 ?? and dword ds:[ecx + 4], 0
83 61 08 00 ?? and dword ds:[ecx + 8], 0
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 41 04 ?? mov dword ds:[ecx + 4], eax
8b c1 ?? mov eax, ecx
c7 01 dc 6b 40 00 ?? mov dword ds:[ecx], 0x00406bdc
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401fd4 | ??0bad_alloc@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
ff 75 08 ?? push dword ss:[ebp + 8]
8b f1 ?? mov esi, ecx
e8 b8 f1 ff ff ?? call function 0x0040119a
L2: c7 06 dc 6b 40 00 ?? mov dword ds:[esi], 0x00406bdc
8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x401ff5 | ??0bad_alloc@std@@QAE@XZ | 1 |
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0
8b c1 ?? mov eax, ecx
83 61 08 00 ?? and dword ds:[ecx + 8], 0
c7 41 04 e8 6b 40 00 ?? mov dword ds:[ecx + 4], 0x00406be8<"bad allocation">
c7 01 dc 6b 40 00 ?? mov dword ds:[ecx], 0x00406bdc
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402013 | ??0bad_array_new_length@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
ff 75 08 ?? push dword ss:[ebp + 8]
8b f1 ?? mov esi, ecx
e8 79 f1 ff ff ?? call function 0x0040119a
L2: c7 06 00 6c 40 00 ?? mov dword ds:[esi], 0x00406c00
8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402034 | ??0bad_array_new_length@std@@QAE@XZ | 1 |
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0
8b c1 ?? mov eax, ecx
83 61 08 00 ?? and dword ds:[ecx + 8], 0
c7 41 04 0c 6c 40 00 ?? mov dword ds:[ecx + 4], 0x00406c0c<"bad array new length">
c7 01 00 6c 40 00 ?? mov dword ds:[ecx], 0x00406c00
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402052 | ??0exception@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
83 20 00 ?? and dword ds:[eax], 0
83 60 04 00 ?? and dword ds:[eax + 4], 0
50 ?? push eax
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 c0 04 ?? add eax, 4
50 ?? push eax
e8 ce 13 00 00 ?? call function 0x00403443
L2: 59 ?? pop ecx
59 ?? pop ecx
8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402089 | ??0exception@std@@QAE@QBDH@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
c7 01 b4 6b 40 00 ?? mov dword ds:[ecx], 0x00406bb4
83 61 04 00 ?? and dword ds:[ecx + 4], 0
83 61 08 00 ?? and dword ds:[ecx + 8], 0
89 41 04 ?? mov dword ds:[ecx + 4], eax
8b c1 ?? mov eax, ecx
5d ?? pop ebp
c2 08 00 ?? ret 8
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4020ad | ??1bad_alloc@std@@UAE@XZ | 1 |
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4]
c7 01 b4 6b 40 00 ?? mov dword ds:[ecx], 0x00406bb4
50 ?? push eax
e8 8d 13 00 00 ?? call function 0x00403449
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4020c2 | ??1bad_array_new_length@std@@UAE@XZ | 1 |
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4]
c7 01 b4 6b 40 00 ?? mov dword ds:[ecx], 0x00406bb4
50 ?? push eax
e8 78 13 00 00 ?? call function 0x00403449
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4020d7 | ??1exception@std@@UAE@XZ | 1 |
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4]
c7 01 b4 6b 40 00 ?? mov dword ds:[ecx], 0x00406bb4
50 ?? push eax
e8 63 13 00 00 ?? call function 0x00403449
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4020ec | ??_Ebad_alloc@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
50 ?? push eax
e8 48 13 00 00 ?? call function 0x00403449
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 45 ef ff ff ?? call function 0x00401055
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4020ec | ??_Gbad_alloc@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
50 ?? push eax
e8 48 13 00 00 ?? call function 0x00403449
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 45 ef ff ff ?? call function 0x00401055
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402124 | ??_Ebad_array_new_length@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
50 ?? push eax
e8 10 13 00 00 ?? call function 0x00403449
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 0d ef ff ff ?? call function 0x00401055
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402124 | ??_Gbad_array_new_length@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
50 ?? push eax
e8 10 13 00 00 ?? call function 0x00403449
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 0d ef ff ff ?? call function 0x00401055
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40215c | ??_Eexception@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
50 ?? push eax
e8 d8 12 00 00 ?? call function 0x00403449
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 d5 ee ff ff ?? call function 0x00401055
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40215c | ??_Gexception@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 b4 6b 40 00 ?? mov dword ds:[esi], 0x00406bb4
50 ?? push eax
e8 d8 12 00 00 ?? call function 0x00403449
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 d5 ee ff ff ?? call function 0x00401055
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402194 | ?__scrt_throw_std_bad_alloc@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
e8 ee ef ff ff ?? call function 0x00401190
L2: 68 00 7d 40 00 ?? push 0x00407d00
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
e8 9f 12 00 00 ?? call function 0x0040344f
L3: cc ?? int3
L4: cc ?? int3
L5: cc ?? int3
L6: cc ?? int3
L7: cc ?? int3
L8: cc ?? int3
L9: cc ?? int3
L10: cc ?? int3
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4021b8 | ?__scrt_throw_std_bad_array_new_length@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
e8 94 ee ff ff ?? call function 0x0040105a
L2: 68 64 7d 40 00 ?? push 0x00407d64
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
e8 7b 12 00 00 ?? call function 0x0040344f
L3: cc ?? int3
L4: cc ?? int3
L5: cc ?? int3
L6: cc ?? int3
L7: cc ?? int3
L8: cc ?? int3
L9: cc ?? int3
L10: cc ?? int3
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4021dc | ?what@exception@std@@UBEPBDXZ | 1 |
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4]
85 c0 ?? test eax, eax
75 05 ?? jne basic block L3
L2: b8 c0 6b 40 00 ?? mov eax, 0x00406bc0<"Unknown exception">
L3: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4021ec | ??3@YAXPAX@Z | 0 |
L1: e9 00 13 00 00 ?? jmp 0x004034f1
ff 25 44 91 40 00 ?? jmp dword ds:[0x00409144]
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4021f1 | ___raise_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 00 ?? push 0
ff 15 04 90 40 00 ?? call dword ds:[0x00409004]
L2: ff 75 08 ?? push dword ss:[ebp + 8]
ff 15 00 90 40 00 ?? call dword ds:[0x00409000]
L3: 68 09 04 00 c0 ?? push 0xc0000409
ff 15 08 90 40 00 ?? call dword ds:[0x00409008]
L4: 50 ?? push eax
ff 15 0c 90 40 00 ?? call dword ds:[0x0040900c]
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402223 | ___report_gsfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 24 03 00 00 ?? sub esp, 0x00000324<804>
6a 17 ?? push 0x17<23>
ff 15 10 90 40 00 ?? call dword ds:[0x00409010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 6a 02 ?? push 2
59 ?? pop ecx
cd 29 ?? int 0x29<41>
L4: a3 38 85 40 00 ?? mov dword ds:[0x00408538], eax
89 0d 34 85 40 00 ?? mov dword ds:[0x00408534], ecx
89 15 30 85 40 00 ?? mov dword ds:[0x00408530], edx
89 1d 2c 85 40 00 ?? mov dword ds:[0x0040852c], ebx
89 35 28 85 40 00 ?? mov dword ds:[0x00408528], esi
89 3d 24 85 40 00 ?? mov dword ds:[0x00408524], edi
66 8c 15 50 85 40 00 ?? mov word ds:[0x00408550], ss
66 8c 0d 44 85 40 00 ?? mov word ds:[0x00408544], cs
66 8c 1d 20 85 40 00 ?? mov word ds:[0x00408520], ds
66 8c 05 1c 85 40 00 ?? mov word ds:[0x0040851c], es
66 8c 25 18 85 40 00 ?? mov word ds:[0x00408518], fs
66 8c 2d 14 85 40 00 ?? mov word ds:[0x00408514], gs
9c ?? pushfd
8f 05 48 85 40 00 ?? pop dword ds:[0x00408548]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 3c 85 40 00 ?? mov dword ds:[0x0040853c], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 40 85 40 00 ?? mov dword ds:[0x00408540], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 4c 85 40 00 ?? mov dword ds:[0x0040854c], eax
8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>]
c7 05 88 84 40 00 01 00 ?? mov dword ds:[0x00408488], 0x00010001
01 00
a1 40 85 40 00 ?? mov eax, dword ds:[0x00408540]
a3 44 84 40 00 ?? mov dword ds:[0x00408444], eax
c7 05 38 84 40 00 09 04 ?? mov dword ds:[0x00408438], 0xc0000409
00 c0
c7 05 3c 84 40 00 01 00 ?? mov dword ds:[0x0040843c], 1
00 00
c7 05 48 84 40 00 01 00 ?? mov dword ds:[0x00408448], 1
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
c7 80 4c 84 40 00 02 00 ?? mov dword ds:[eax + 0x0040844c], 2
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 0d 04 80 40 00 ?? mov ecx, dword ds:[0x00408004]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
6a 04 ?? push 4
58 ?? pop eax
c1 e0 00 ?? shl eax, 0
8b 0d 00 80 40 00 ?? mov ecx, dword ds:[0x00408000]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
68 28 6c 40 00 ?? push 0x00406c28
e8 7e ef ff ff ?? call function 0x00401299
L5: c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40235b | ___report_rangecheckfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 08 ?? push 8
e8 02 ef ff ff ?? call function 0x00401267
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40236a | ___report_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796>
6a 17 ?? push 0x17<23>
ff 15 10 90 40 00 ?? call dword ds:[0x00409010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 38 85 40 00 ?? mov dword ds:[0x00408538], eax
89 0d 34 85 40 00 ?? mov dword ds:[0x00408534], ecx
89 15 30 85 40 00 ?? mov dword ds:[0x00408530], edx
89 1d 2c 85 40 00 ?? mov dword ds:[0x0040852c], ebx
89 35 28 85 40 00 ?? mov dword ds:[0x00408528], esi
89 3d 24 85 40 00 ?? mov dword ds:[0x00408524], edi
66 8c 15 50 85 40 00 ?? mov word ds:[0x00408550], ss
66 8c 0d 44 85 40 00 ?? mov word ds:[0x00408544], cs
66 8c 1d 20 85 40 00 ?? mov word ds:[0x00408520], ds
66 8c 05 1c 85 40 00 ?? mov word ds:[0x0040851c], es
66 8c 25 18 85 40 00 ?? mov word ds:[0x00408518], fs
66 8c 2d 14 85 40 00 ?? mov word ds:[0x00408514], gs
9c ?? pushfd
8f 05 48 85 40 00 ?? pop dword ds:[0x00408548]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 3c 85 40 00 ?? mov dword ds:[0x0040853c], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 40 85 40 00 ?? mov dword ds:[0x00408540], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 4c 85 40 00 ?? mov dword ds:[0x0040854c], eax
8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>]
a1 40 85 40 00 ?? mov eax, dword ds:[0x00408540]
a3 44 84 40 00 ?? mov dword ds:[0x00408444], eax
c7 05 38 84 40 00 09 04 ?? mov dword ds:[0x00408438], 0xc0000409
00 c0
c7 05 3c 84 40 00 01 00 ?? mov dword ds:[0x0040843c], 1
00 00
c7 05 48 84 40 00 01 00 ?? mov dword ds:[0x00408448], 1
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 88 4c 84 40 00 ?? mov dword ds:[eax + 0x0040844c], ecx
68 28 6c 40 00 ?? push 0x00406c28
e8 62 ee ff ff ?? call function 0x00401299
L5: c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40246c | ___report_securityfailureEx | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 20 03 00 00 ?? sub esp, 0x00000320<800>
6a 17 ?? push 0x17<23>
ff 15 10 90 40 00 ?? call dword ds:[0x00409010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 38 85 40 00 ?? mov dword ds:[0x00408538], eax
89 0d 34 85 40 00 ?? mov dword ds:[0x00408534], ecx
89 15 30 85 40 00 ?? mov dword ds:[0x00408530], edx
89 1d 2c 85 40 00 ?? mov dword ds:[0x0040852c], ebx
89 35 28 85 40 00 ?? mov dword ds:[0x00408528], esi
89 3d 24 85 40 00 ?? mov dword ds:[0x00408524], edi
66 8c 15 50 85 40 00 ?? mov word ds:[0x00408550], ss
66 8c 0d 44 85 40 00 ?? mov word ds:[0x00408544], cs
66 8c 1d 20 85 40 00 ?? mov word ds:[0x00408520], ds
66 8c 05 1c 85 40 00 ?? mov word ds:[0x0040851c], es
66 8c 25 18 85 40 00 ?? mov word ds:[0x00408518], fs
66 8c 2d 14 85 40 00 ?? mov word ds:[0x00408514], gs
9c ?? pushfd
8f 05 48 85 40 00 ?? pop dword ds:[0x00408548]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 3c 85 40 00 ?? mov dword ds:[0x0040853c], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 40 85 40 00 ?? mov dword ds:[0x00408540], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 4c 85 40 00 ?? mov dword ds:[0x0040854c], eax
8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>]
a1 40 85 40 00 ?? mov eax, dword ds:[0x00408540]
a3 44 84 40 00 ?? mov dword ds:[0x00408444], eax
c7 05 38 84 40 00 09 04 ?? mov dword ds:[0x00408438], 0xc0000409
00 c0
c7 05 3c 84 40 00 01 00 ?? mov dword ds:[0x0040843c], 1
00 00
83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0
76 0a ?? jbe basic block L7
L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0
75 04 ?? jne basic block L7
L6: 83 65 0c 00 ?? and dword ss:[ebp + 12], 0
L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14
76 07 ?? jbe basic block L9
L8: 8b 45 0c ?? mov eax, dword ss:[ebp + 12]
48 ?? dec eax
89 45 0c ?? mov dword ss:[ebp + 12], eax
L9: 8b 45 0c ?? mov eax, dword ss:[ebp + 12]
40 ?? inc eax
a3 48 84 40 00 ?? mov dword ds:[0x00408448], eax
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 88 4c 84 40 00 ?? mov dword ds:[eax + 0x0040844c], ecx
83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
eb 07 ?? jmp basic block L10
L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
3b 45 0c ?? cmp eax, dword ss:[ebp + 12]
73 15 ?? jae basic block L12
L11: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>]
8b 0c 8a ?? mov ecx, dword ds:[edx + ecx * 4]
89 0c 85 50 84 40 00 ?? mov dword ds:[0x00408450 + eax * 4], ecx
eb dc ?? jmp 0x00402551
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
40 ?? inc eax
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L12: 68 28 6c 40 00 ?? push 0x00406c28
e8 1a ed ff ff ?? call function 0x00401299
L13: c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4025c6 | find_pe_section | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
56 ?? push esi
8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
03 c8 ?? add ecx, eax
0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>]
8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>]
03 d0 ?? add edx, eax
0f b7 41 06 ?? movzx eax, word ds:[ecx + 6]
6b f0 28 ?? imul esi, eax, 0x28<40>
03 f2 ?? add esi, edx
3b d6 ?? cmp edx, esi
74 19 ?? je basic block L6
L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12]
72 0a ?? jb basic block L5
L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8]
03 42 0c ?? add eax, dword ds:[edx + 12]
3b c8 ?? cmp ecx, eax
72 0c ?? jb basic block L8
L5: 83 c2 28 ?? add edx, 0x28<40>
3b d6 ?? cmp edx, esi
75 ea ?? jne basic block L3
L6: 33 c0 ?? xor eax, eax
L7: 5e ?? pop esi
5d ?? pop ebp
c3 ?? ret
L8: 8b c2 ?? mov eax, edx
eb f9 ?? jmp basic block L7
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40261b | is_potentially_valid_image_base | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
85 c0 ?? test eax, eax
74 25 ?? je basic block L5
L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117>
66 39 08 ?? cmp word ds:[eax], cx
75 1b ?? jne basic block L5
L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
03 c8 ?? add ecx, eax
81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744>
75 0e ?? jne basic block L5
L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267>
66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax
0f 94 c0 ?? sete al
5d ?? pop ebp
c3 ?? ret
L5: 32 c0 ?? xor al, al
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40265a | _NtCurrentTeb | 0 |
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>]
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402661 | ___scrt_acquire_startup_lock | 0 |
L1: 56 ?? push esi
e8 ca ea ff ff ?? call function 0x00401131
L2: 85 c0 ?? test eax, eax
74 20 ?? je basic block L6
L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>]
be f8 87 40 00 ?? mov esi, 0x004087f8
8b 50 04 ?? mov edx, dword ds:[eax + 4]
eb 04 ?? jmp basic block L5
L4: 3b d0 ?? cmp edx, eax
74 10 ?? je basic block L7
L5: 33 c0 ?? xor eax, eax
8b ca ?? mov ecx, edx
f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx
85 c0 ?? test eax, eax
75 f0 ?? jne basic block L4
L6: 32 c0 ?? xor al, al
5e ?? pop esi
c3 ?? ret
L7: b0 01 ?? mov al, 1
5e ?? pop esi
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40269f | ___scrt_dllmain_after_initialize_c | 0 |
L1: e8 8d ea ff ff ?? call function 0x00401131
L2: 85 c0 ?? test eax, eax
74 07 ?? je basic block L5
L3: e8 89 ea ff ff ?? call function 0x00401136
L4: eb 18 ?? jmp basic block L10
L5: e8 31 eb ff ff ?? call function 0x004011e5
L6: 50 ?? push eax
e8 d7 0d 00 00 ?? call function 0x00403491
L7: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 03 ?? je basic block L9
L8: 32 c0 ?? xor al, al
c3 ?? ret
L9: e8 d0 0d 00 00 ?? call function 0x00403497
L10: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4026d4 | ___scrt_dllmain_before_initialize_c | 0 |
L1: 6a 00 ?? push 0
e8 15 ea ff ff ?? call function 0x004010f0
L2: 84 c0 ?? test al, al
59 ?? pop ecx
0f 95 c0 ?? setne al
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4026e5 | ___scrt_dllmain_crt_thread_attach | 0 |
L1: e8 ab ea ff ff ?? call function 0x00401195
L2: 84 c0 ?? test al, al
75 03 ?? jne basic block L4
L3: 32 c0 ?? xor al, al
c3 ?? ret
L4: e8 cc ea ff ff ?? call function 0x004011c2
L5: 84 c0 ?? test al, al
75 07 ?? jne basic block L8
L6: e8 d3 e9 ff ff ?? call function 0x004010d2
L7: eb ed ?? jmp basic block L3
L8: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40270b | ___scrt_dllmain_crt_thread_detach | 0 |
L1: e8 17 ea ff ff ?? call function 0x00401127
L2: e8 bd e9 ff ff ?? call function 0x004010d2
L3: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40271b | ___scrt_dllmain_exception_filter | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 0e ea ff ff ?? call function 0x00401131
L2: 85 c0 ?? test eax, eax
75 19 ?? jne basic block L6
L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1
75 13 ?? jne basic block L6
L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>]
8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>]
50 ?? push eax
ff 75 08 ?? push dword ss:[ebp + 8]
ff 15 00 b0 40 00 ?? call dword ds:[0x0040b000]
L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>]
L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>]
ff 75 18 ?? push dword ss:[ebp + 0x18<24>]
e8 ac 0d 00 00 ?? call function 0x004034f7
L7: 59 ?? pop ecx
59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40275c | ___scrt_dllmain_uninitialize_c | 0 |
L1: e8 d0 e9 ff ff ?? call function 0x00401131
L2: 85 c0 ?? test eax, eax
74 0c ?? je basic block L5
L3: 68 00 88 40 00 ?? push 0x00408800
e8 9a 0d 00 00 ?? call function 0x00403509
L4: 59 ?? pop ecx
c3 ?? ret
L5: e8 d9 e9 ff ff ?? call function 0x0040114f
L6: 85 c0 ?? test eax, eax
0f 84 4f 0d 00 00 ?? je function 0x004034cd
L7: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402787 | ___scrt_dllmain_uninitialize_critical | 0 |
L1: 6a 00 ?? push 0
e8 06 eb ff ff ?? call function 0x00401294
L2: 59 ?? pop ecx
e9 10 ea ff ff ?? jmp 0x004011a4
e9 d8 23 00 00 ?? jmp function 0x00403581
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402797 | ___scrt_initialize_crt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0
75 07 ?? jne basic block L3
L2: c6 05 fc 87 40 00 01 ?? mov byte ds:[0x004087fc], 1
L3: e8 8a e9 ff ff ?? call function 0x00401136
L4: e8 25 ea ff ff ?? call function 0x004011d6
L5: 84 c0 ?? test al, al
75 04 ?? jne basic block L7
L6: 32 c0 ?? xor al, al
5d ?? pop ebp
c3 ?? ret
L7: e8 1d ea ff ff ?? call function 0x004011db
L8: 84 c0 ?? test al, al
75 0a ?? jne basic block L11
L9: 6a 00 ?? push 0
e8 46 e8 ff ff ?? call function 0x0040100f
L10: 59 ?? pop ecx
eb e9 ?? jmp basic block L6
L11: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4027de | ___scrt_initialize_onexit_tables | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
80 3d fd 87 40 00 00 ?? cmp byte ds:[0x004087fd], 0
74 04 ?? je basic block L3
L2: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
L3: 56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
85 f6 ?? test esi, esi
74 05 ?? je basic block L5
L4: 83 fe 01 ?? cmp esi, 1
75 62 ?? jne basic block L16
L5: e8 31 e9 ff ff ?? call function 0x00401131
L6: 85 c0 ?? test eax, eax
74 26 ?? je basic block L13
L7: 85 f6 ?? test esi, esi
75 22 ?? jne basic block L13
L8: 68 00 88 40 00 ?? push 0x00408800
e8 eb 0c 00 00 ?? call function 0x004034fd
L9: 59 ?? pop ecx
85 c0 ?? test eax, eax
75 0f ?? jne basic block L12
L10: 68 0c 88 40 00 ?? push 0x0040880c
e8 dc 0c 00 00 ?? call function 0x004034fd
L11: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 2b ?? je basic block L14
L12: 32 c0 ?? xor al, al
eb 30 ?? jmp basic block L15
L13: 83 c9 ff ?? or ecx, 0xff<255,-1>
89 0d 00 88 40 00 ?? mov dword ds:[0x00408800], ecx
89 0d 04 88 40 00 ?? mov dword ds:[0x00408804], ecx
89 0d 08 88 40 00 ?? mov dword ds:[0x00408808], ecx
89 0d 0c 88 40 00 ?? mov dword ds:[0x0040880c], ecx
89 0d 10 88 40 00 ?? mov dword ds:[0x00408810], ecx
89 0d 14 88 40 00 ?? mov dword ds:[0x00408814], ecx
L14: c6 05 fd 87 40 00 01 ?? mov byte ds:[0x004087fd], 1
b0 01 ?? mov al, 1
L15: 5e ?? pop esi
5d ?? pop ebp
c3 ?? ret
L16: 6a 05 ?? push 5
e8 e6 e8 ff ff ?? call function 0x0040114a
L17: cc ?? int3
L18: cc ?? int3
L19: cc ?? int3
L20: cc ?? int3
L21: cc ?? int3
L22: cc ?? int3
L23: cc ?? int3
L24: cc ?? int3
L25: cc ?? int3
L26: cc ?? int3
L27: cc ?? int3
L28: cc ?? int3
L29: cc ?? int3
L30: cc ?? int3
L31: cc ?? int3
L32: cc ?? int3
L33: cc ?? int3
L34: cc ?? int3
L35: cc ?? int3
L36: cc ?? int3
L37: cc ?? int3
L38: cc ?? int3
L39: cc ?? int3
L40: cc ?? int3
L41: cc ?? int3
L42: cc ?? int3
L43: cc ?? int3
L44: cc ?? int3
L45: cc ?? int3
L46: cc ?? int3
L47: cc ?? int3
L48: cc ?? int3
L49: cc ?? int3
L50: cc ?? int3
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402886 | ___scrt_is_nonwritable_in_current_image | 0 |
L1: 6a 08 ?? push 8
68 b0 7d 40 00 ?? push 0x00407db0
e8 09 e8 ff ff ?? call function 0x0040109b
L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117>
66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax
75 5d ?? jne basic block L11
L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c]
81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744>
00 00
75 4c ?? jne basic block L11
L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267>
66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx
75 3e ?? jne basic block L11
L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
b9 00 00 40 00 ?? mov ecx, 0x00400000
2b c1 ?? sub eax, ecx
50 ?? push eax
51 ?? push ecx
e8 f2 fc ff ff ?? call function 0x004025c6
L6: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
74 27 ?? je basic block L11
L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0
7c 21 ?? jl basic block L11
L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
b0 01 ?? mov al, 1
eb 1f ?? jmp basic block L12
L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>]
8b 00 ?? mov eax, dword ds:[eax]
33 c9 ?? xor ecx, ecx
81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005
0f 94 c1 ?? sete cl
8b c1 ?? mov eax, ecx
c3 ?? ret
L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
32 c0 ?? xor al, al
L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x40293f | ___scrt_release_startup_lock | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 ea e7 ff ff ?? call function 0x00401131
L2: 85 c0 ?? test eax, eax
74 0f ?? je basic block L5
L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0
75 09 ?? jne basic block L5
L4: 33 c0 ?? xor eax, eax
b9 f8 87 40 00 ?? mov ecx, 0x004087f8
87 01 ?? xchg dword ds:[ecx], eax
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402963 | ___scrt_uninitialize_crt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
80 3d fc 87 40 00 00 ?? cmp byte ds:[0x004087fc], 0
74 06 ?? je basic block L3
L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0
75 12 ?? jne basic block L6
L3: ff 75 08 ?? push dword ss:[ebp + 8]
e8 69 e7 ff ff ?? call function 0x004010e6
L4: ff 75 08 ?? push dword ss:[ebp + 8]
e8 8a e6 ff ff ?? call function 0x0040100f
L5: 59 ?? pop ecx
59 ?? pop ecx
L6: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402995 | __onexit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 3d 00 88 40 00 ff ?? cmp dword ds:[0x00408800], 0xff<255,-1>
ff 75 08 ?? push dword ss:[ebp + 8]
75 07 ?? jne basic block L4
L2: e8 66 0b 00 00 ?? call function 0x0040350f
L3: eb 0b ?? jmp basic block L6
L4: 68 00 88 40 00 ?? push 0x00408800
e8 4e 0b 00 00 ?? call function 0x00403503
L5: 59 ?? pop ecx
L6: f7 d8 ?? neg eax
59 ?? pop ecx
1b c0 ?? sbb eax, eax
f7 d0 ?? not eax
23 45 08 ?? and eax, dword ss:[ebp + 8]
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4029cd | _at_quick_exit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 3d 0c 88 40 00 ff ?? cmp dword ds:[0x0040880c], 0xff<255,-1>
75 06 ?? jne basic block L3
L2: 5d ?? pop ebp
e9 36 0b 00 00 ?? jmp 0x00403515
ff 25 f0 91 40 00 ?? jmp dword ds:[0x004091f0]
L3: ff 75 08 ?? push dword ss:[ebp + 8]
68 0c 88 40 00 ?? push 0x0040880c
e8 17 0b 00 00 ?? call function 0x00403503
L4: 59 ?? pop ecx
59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x4029f8 | _atexit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
ff 75 08 ?? push dword ss:[ebp + 8]
e8 6f e7 ff ff ?? call function 0x00401172
L2: f7 d8 ?? neg eax
59 ?? pop ecx
1b c0 ?? sbb eax, eax
f7 d8 ?? neg eax
48 ?? dec eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402a12 | __get_entropy | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 14 ?? sub esp, 0x14<20>
83 65 f4 00 ?? and dword ss:[ebp + 0xf4<244,-12>], 0
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
83 65 f8 00 ?? and dword ss:[ebp + 0xf8<248,-8>], 0
50 ?? push eax
ff 15 20 90 40 00 ?? call dword ds:[0x00409020]
L2: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
33 45 f4 ?? xor eax, dword ss:[ebp + 0xf4<244,-12>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
ff 15 1c 90 40 00 ?? call dword ds:[0x0040901c]
L3: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax
ff 15 18 90 40 00 ?? call dword ds:[0x00409018]
L4: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax
8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>]
50 ?? push eax
ff 15 14 90 40 00 ?? call dword ds:[0x00409014]
L5: 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>]
8d 4d fc ?? lea ecx, ss:[ebp + 0xfc<252,-4>]
33 45 ec ?? xor eax, dword ss:[ebp + 0xec<236,-20>]
33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>]
33 c1 ?? xor eax, ecx
c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402a72 | ___security_init_cookie | 0 |
L1: 8b 0d 04 80 40 00 ?? mov ecx, dword ds:[0x00408004]
56 ?? push esi
57 ?? push edi
bf 4e e6 40 bb ?? mov edi, 0xbb40e64e
be 00 00 ff ff ?? mov esi, 0xffff0000<4294901760,-65536>
3b cf ?? cmp ecx, edi
74 04 ?? je basic block L3
L2: 85 ce ?? test esi, ecx
75 26 ?? jne basic block L9
L3: e8 81 ff ff ff ?? call function 0x00402a12
L4: 8b c8 ?? mov ecx, eax
3b cf ?? cmp ecx, edi
75 07 ?? jne basic block L6
L5: b9 4f e6 40 bb ?? mov ecx, 0xbb40e64f
eb 0e ?? jmp basic block L8
L6: 85 ce ?? test esi, ecx
75 0a ?? jne basic block L8
L7: 0d 11 47 00 00 ?? or eax, 0x00004711<18193>
c1 e0 10 ?? shl eax, 0x10<16>
0b c8 ?? or ecx, eax
L8: 89 0d 04 80 40 00 ?? mov dword ds:[0x00408004], ecx
L9: f7 d1 ?? not ecx
5f ?? pop edi
89 0d 00 80 40 00 ?? mov dword ds:[0x00408000], ecx
5e ?? pop esi
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402acf | __matherr | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402ad2 | __get_startup_argv_mode | 0 |
L1: 33 c0 ?? xor eax, eax
40 ?? inc eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402ad6 | __get_startup_commit_mode | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402ad9 | __get_startup_file_mode | 0 |
L1: b8 00 40 00 00 ?? mov eax, 0x00004000<16384>
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402adf | __get_startup_new_mode | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402ae2 | __get_startup_thread_locale_mode | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402ae5 | ?__scrt_initialize_type_info@@YAXXZ | 0 |
L1: 68 20 88 40 00 ?? push 0x00408820
ff 15 24 90 40 00 ?? call dword ds:[0x00409024]
L2: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402af4 | ?__scrt_uninitialize_type_info@@YAXXZ | 0 |
L1: 68 20 88 40 00 ?? push 0x00408820
e8 57 09 00 00 ?? call function 0x00403455
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b03 | __should_initialize_environment | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b06 | __initialize_default_precision | 0 |
L1: 68 00 00 03 00 ?? push 0x00030000
68 00 00 01 00 ?? push 0x00010000
6a 00 ?? push 0
e8 04 0a 00 00 ?? call function 0x0040351b
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
75 01 ?? jne basic block L4
L3: c3 ?? ret
L4: 6a 07 ?? push 7
e8 24 e6 ff ff ?? call function 0x0040114a
L5: cc ?? int3
L6: cc ?? int3
L7: cc ?? int3
L8: cc ?? int3
L9: cc ?? int3
L10: cc ?? int3
L11: cc ?? int3
L12: cc ?? int3
L13: cc ?? int3
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b2f | __initialize_invalid_parameter_handler | 0 |
L1: c2 00 00 ?? ret 0
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b32 | __initialize_denormal_control | 0 |
L1: c2 00 00 ?? ret 0
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b35 | ___local_stdio_printf_options | 0 |
L1: b8 30 88 40 00 ?? mov eax, 0x00408830
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b3b | ___local_stdio_scanf_options | 0 |
L1: b8 40 88 40 00 ?? mov eax, 0x00408840
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b41 | ___scrt_initialize_default_local_stdio_options | 0 |
L1: e8 ea e6 ff ff ?? call function 0x00401230
L2: 8b 48 04 ?? mov ecx, dword ds:[eax + 4]
83 08 24 ?? or dword ds:[eax], 0x24<36>
89 48 04 ?? mov dword ds:[eax + 4], ecx
e8 09 e7 ff ff ?? call function 0x0040125d
L3: 8b 48 04 ?? mov ecx, dword ds:[eax + 4]
83 08 02 ?? or dword ds:[eax], 2
89 48 04 ?? mov dword ds:[eax + 4], ecx
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b65 | ___scrt_is_user_matherr_present | 0 |
L1: 33 c0 ?? xor eax, eax
39 05 10 80 40 00 ?? cmp dword ds:[0x00408010], eax
0f 94 c0 ?? sete al
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b74 | ___scrt_get_dyn_tls_init_callback | 0 |
L1: b8 6c 88 40 00 ?? mov eax, 0x0040886c
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b7a | ___scrt_get_dyn_tls_dtor_callback | 0 |
L1: b8 60 88 40 00 ?? mov eax, 0x00408860
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402b80 | ___scrt_fastfail | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 24 03 00 00 ?? sub esp, 0x00000324<804>
53 ?? push ebx
6a 17 ?? push 0x17<23>
ff 15 10 90 40 00 ?? call dword ds:[0x00409010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: 6a 03 ?? push 3
e8 52 e6 ff ff ?? call function 0x004011f4
L5: c7 04 24 cc 02 00 00 ?? mov dword ss:[esp], 0x000002cc<716>
8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>]
6a 00 ?? push 0
50 ?? push eax
e8 b0 08 00 00 ?? call function 0x00403467
L6: 83 c4 0c ?? add esp, 12
89 85 8c fd ff ff ?? mov dword ss:[ebp + 0xfffffd8c<4294966668,-628>], eax
89 8d 88 fd ff ff ?? mov dword ss:[ebp + 0xfffffd88<4294966664,-632>], ecx
89 95 84 fd ff ff ?? mov dword ss:[ebp + 0xfffffd84<4294966660,-636>], edx
89 9d 80 fd ff ff ?? mov dword ss:[ebp + 0xfffffd80<4294966656,-640>], ebx
89 b5 7c fd ff ff ?? mov dword ss:[ebp + 0xfffffd7c<4294966652,-644>], esi
89 bd 78 fd ff ff ?? mov dword ss:[ebp + 0xfffffd78<4294966648,-648>], edi
66 8c 95 a4 fd ff ff ?? mov word ss:[ebp + 0xfffffda4<4294966692,-604>], ss
66 8c 8d 98 fd ff ff ?? mov word ss:[ebp + 0xfffffd98<4294966680,-616>], cs
66 8c 9d 74 fd ff ff ?? mov word ss:[ebp + 0xfffffd74<4294966644,-652>], ds
66 8c 85 70 fd ff ff ?? mov word ss:[ebp + 0xfffffd70<4294966640,-656>], es
66 8c a5 6c fd ff ff ?? mov word ss:[ebp + 0xfffffd6c<4294966636,-660>], fs
66 8c ad 68 fd ff ff ?? mov word ss:[ebp + 0xfffffd68<4294966632,-664>], gs
9c ?? pushfd
8f 85 9c fd ff ff ?? pop dword ss:[ebp + 0xfffffd9c<4294966684,-612>]
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
89 85 94 fd ff ff ?? mov dword ss:[ebp + 0xfffffd94<4294966676,-620>], eax
8d 45 04 ?? lea eax, ss:[ebp + 4]
89 85 a0 fd ff ff ?? mov dword ss:[ebp + 0xfffffda0<4294966688,-608>], eax
c7 85 dc fc ff ff 01 00 ?? mov dword ss:[ebp + 0xfffffcdc<4294966492,-804>], 0x00010001
01 00
8b 40 fc ?? mov eax, dword ds:[eax + 0xfc<252,-4>]
6a 50 ?? push 0x50<80>
89 85 90 fd ff ff ?? mov dword ss:[ebp + 0xfffffd90<4294966672,-624>], eax
8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>]
6a 00 ?? push 0
50 ?? push eax
e8 26 08 00 00 ?? call function 0x00403467
L7: 8b 45 04 ?? mov eax, dword ss:[ebp + 4]
83 c4 0c ?? add esp, 12
c7 45 a8 15 00 00 40 ?? mov dword ss:[ebp + 0xa8<168,-88>], 0x40000015
c7 45 ac 01 00 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 1
89 45 b4 ?? mov dword ss:[ebp + 0xb4<180,-76>], eax
ff 15 28 90 40 00 ?? call dword ds:[0x00409028]
L8: 6a 00 ?? push 0
8d 58 ff ?? lea ebx, ds:[eax + 0xff<255,-1>]
f7 db ?? neg ebx
8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>]
1a db ?? sbb bl, bl
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
fe c3 ?? inc bl
ff 15 04 90 40 00 ?? call dword ds:[0x00409004]
L9: 8d 45 f8 ?? lea eax, ss:[ebp + 0xf8<248,-8>]
50 ?? push eax
ff 15 00 90 40 00 ?? call dword ds:[0x00409000]
L10: 85 c0 ?? test eax, eax
75 0c ?? jne basic block L14
L11: 84 db ?? test bl, bl
75 08 ?? jne basic block L14
L12: 6a 03 ?? push 3
e8 5d e5 ff ff ?? call function 0x004011f4
L13: 59 ?? pop ecx
L14: 5b ?? pop ebx
c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402ce1 | ___scrt_get_show_window_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 44 ?? sub esp, 0x44<68>
6a 44 ?? push 0x44<68>
8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>]
6a 00 ?? push 0
50 ?? push eax
e8 73 07 00 00 ?? call function 0x00403467
L2: 83 c4 0c ?? add esp, 12
8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>]
50 ?? push eax
ff 15 2c 90 40 00 ?? call dword ds:[0x0040902c]
L3: f6 45 e8 01 ?? test byte ss:[ebp + 0xe8<232,-24>], 1
74 06 ?? je basic block L5
L4: 0f b7 45 ec ?? movzx eax, word ss:[ebp + 0xec<236,-20>]
c9 ?? leave
c3 ?? ret
L5: 6a 0a ?? push 10
58 ?? pop eax
c9 ?? leave
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d1e | ___scrt_initialize_mta | 0 |
L1: e9 1e e3 ff ff ?? jmp 0x00401041
e9 41 1d 00 00 ?? jmp function 0x00402d87
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d23 | ___scrt_initialize_winrt | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d26 | ___scrt_is_managed_app | 0 |
L1: 6a 00 ?? push 0
ff 15 30 90 40 00 ?? call dword ds:[0x00409030]
L2: 85 c0 ?? test eax, eax
74 33 ?? je basic block L8
L3: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117>
66 39 08 ?? cmp word ds:[eax], cx
75 29 ?? jne basic block L8
L4: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
03 c8 ?? add ecx, eax
81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744>
75 1c ?? jne basic block L8
L5: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267>
66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax
75 11 ?? jne basic block L8
L6: 83 79 74 0e ?? cmp dword ds:[ecx + 0x74<116>], 14
76 0b ?? jbe basic block L8
L7: 83 b9 e8 00 00 00 00 ?? cmp dword ds:[ecx + 0x000000e8<232>], 0
0f 95 c0 ?? setne al
c3 ?? ret
L8: 32 c0 ?? xor al, al
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d78 | ___scrt_set_unhandled_exception_filter | 0 |
L1: 68 3a 12 40 00 ?? push 0x0040123a
ff 15 04 90 40 00 ?? call dword ds:[0x00409004]
L2: c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d87 | ___scrt_exe_initialize_mta | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d87 | ___scrt_stub_for_initialize_mta | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402d8a | ___scrt_unhandled_exception_filter@4 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
57 ?? push edi
8b 7d 08 ?? mov edi, dword ss:[ebp + 8]
8b 37 ?? mov esi, dword ds:[edi]
81 3e 63 73 6d e0 ?? cmp dword ds:[esi], 0xe06d7363
75 25 ?? jne basic block L7
L2: 83 7e 10 03 ?? cmp dword ds:[esi + 0x10<16>], 3
75 1f ?? jne basic block L7
L3: 8b 46 14 ?? mov eax, dword ds:[esi + 0x14<20>]
3d 20 05 93 19 ?? cmp eax, 0x19930520
74 1d ?? je basic block L8
L4: 3d 21 05 93 19 ?? cmp eax, 0x19930521
74 16 ?? je basic block L8
L5: 3d 22 05 93 19 ?? cmp eax, 0x19930522
74 0f ?? je basic block L8
L6: 3d 00 40 99 01 ?? cmp eax, 0x01994000
74 08 ?? je basic block L8
L7: 5f ?? pop edi
33 c0 ?? xor eax, eax
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
L8: e8 8d 06 00 00 ?? call function 0x0040345b
L9: 89 30 ?? mov dword ds:[eax], esi
8b 77 04 ?? mov esi, dword ds:[edi + 4]
e8 89 06 00 00 ?? call function 0x00403461
L10: 89 30 ?? mov dword ds:[eax], esi
e8 42 07 00 00 ?? call function 0x00403521
L11: cc ?? int3
L12: cc ?? int3
L13: cc ?? int3
L14: cc ?? int3
L15: cc ?? int3
L16: cc ?? int3
L17: cc ?? int3
L18: cc ?? int3
L19: cc ?? int3
L20: cc ?? int3
L21: cc ?? int3
L22: cc ?? int3
L23: cc ?? int3
L24: cc ?? int3
L25: cc ?? int3
L26: cc ?? int3
L27: cc ?? int3
L28: cc ?? int3
L29: cc ?? int3
L30: cc ?? int3
L31: cc ?? int3
L32: cc ?? int3
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402df5 | __crt_debugger_hook | 0 |
L1: 83 25 4c 88 40 00 00 ?? and dword ds:[0x0040884c], 0
c3 ?? ret
|
./vs2022/normal/RelWithDebInfo/oopoly.exe | 0x402dff | __RTC_Initialize | 0 |
L1: 53 ?? push ebx
56 ?? push esi
be d4 77 40 00 ?? mov esi, 0x004077d4
bb d4 78 40 00 ?? mov ebx, 0x004078d4
3b f3 ?? cmp esi, ebx
73 19 ?? jae basic block L8
L2: 57 ?? push edi
L3: 8b 3e ?? mov edi, dword ds:[esi]
85 ff ?? test edi, edi
74 0a ?? je basic block L6
L4: 8b cf ?? mov ecx, edi
ff 15 00 b0 40 00 ?? call dword ds:[0x0040b000]
L5: ff d7 ?? call edi
L6: 83 c6 04 ?? add esi, 4
3b f3 ?? cmp esi, ebx
72 e9 ?? jb basic block L3
L7: 5f ?? pop edi
L8: 5e ?? pop esi
5b ?? pop ebx
c3 ?? ret
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.