Binary stringlengths 25 43 | Addr stringlengths 8 8 | Name stringlengths 5 187 | Type int64 0 1 | Disassembly stringlengths 16 68.6k |
|---|---|---|---|---|
./vs2022/wpo/Debug/oopoly.exe | 0x401dc0 | invoke_main | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
e8 6b 1a 00 00 ?? call function 0x00403836
L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
e8 8d 1a 00 00 ?? call function 0x00403860
L3: 8b 00 ?? mov eax, dword ds:[eax]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
e8 7d 1a 00 00 ?? call function 0x0040385a
L4: 8b 08 ?? mov ecx, dword ds:[eax]
89 4d f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
52 ?? push edx
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
50 ?? push eax
8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
51 ?? push ecx
e8 bd 1c 00 00 ?? call function 0x00403ab0
L5: 83 c4 0c ?? add esp, 12
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x401e50 | _mainCRTStartup | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 08 fd ff ff ?? call function 0x00401b60
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x401e60 | ___raise_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 00 ?? push 0
ff 15 04 50 40 00 ?? call dword ds:[0x00405004<"Zo@">]
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
ff 15 58 50 40 00 ?? call dword ds:[0x00405058<">o@">]
L3: 68 09 04 00 c0 ?? push 0xc0000409
ff 15 08 50 40 00 ?? call dword ds:[0x00405008<"xo@">]
L4: 50 ?? push eax
ff 15 0c 50 40 00 ?? call dword ds:[0x0040500c]
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x401e90 | ___report_gsfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 24 03 00 00 ?? sub esp, 0x00000324<804>
6a 17 ?? push 0x17<23>
ff 15 10 50 40 00 ?? call dword ds:[0x00405010]
L2: 85 c0 ?? test eax, eax
74 07 ?? je basic block L4
L3: b9 02 00 00 00 ?? mov ecx, 2
cd 29 ?? int 0x29<41>
L4: a3 00 82 40 00 ?? mov dword ds:[0x00408200], eax
89 0d fc 81 40 00 ?? mov dword ds:[0x004081fc], ecx
89 15 f8 81 40 00 ?? mov dword ds:[0x004081f8], edx
89 1d f4 81 40 00 ?? mov dword ds:[0x004081f4], ebx
89 35 f0 81 40 00 ?? mov dword ds:[0x004081f0], esi
89 3d ec 81 40 00 ?? mov dword ds:[0x004081ec], edi
66 8c 15 18 82 40 00 ?? mov word ds:[0x00408218], ss
66 8c 0d 0c 82 40 00 ?? mov word ds:[0x0040820c], cs
66 8c 1d e8 81 40 00 ?? mov word ds:[0x004081e8], ds
66 8c 05 e4 81 40 00 ?? mov word ds:[0x004081e4], es
66 8c 25 e0 81 40 00 ?? mov word ds:[0x004081e0], fs
66 8c 2d dc 81 40 00 ?? mov word ds:[0x004081dc], gs
9c ?? pushfd
8f 05 10 82 40 00 ?? pop dword ds:[0x00408210]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 04 82 40 00 ?? mov dword ds:[0x00408204], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 08 82 40 00 ?? mov dword ds:[0x00408208], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 14 82 40 00 ?? mov dword ds:[0x00408214], eax
8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>]
c7 05 50 81 40 00 01 00 ?? mov dword ds:[0x00408150], 0x00010001
01 00
a1 08 82 40 00 ?? mov eax, dword ds:[0x00408208]
a3 0c 81 40 00 ?? mov dword ds:[0x0040810c], eax
c7 05 00 81 40 00 09 04 ?? mov dword ds:[0x00408100], 0xc0000409
00 c0
c7 05 04 81 40 00 01 00 ?? mov dword ds:[0x00408104], 1
00 00
c7 05 10 81 40 00 01 00 ?? mov dword ds:[0x00408110], 1
00 00
b9 04 00 00 00 ?? mov ecx, 4
6b d1 00 ?? imul edx, ecx, 0
c7 82 14 81 40 00 02 00 ?? mov dword ds:[edx + 0x00408114], 2
00 00
b8 04 00 00 00 ?? mov eax, 4
6b c8 00 ?? imul ecx, eax, 0
8b 15 04 80 40 00 ?? mov edx, dword ds:[0x00408004]
89 54 0d f8 ?? mov dword ss:[ebp + ecx + 0xf8<248,-8>], edx
b8 04 00 00 00 ?? mov eax, 4
c1 e0 00 ?? shl eax, 0
8b 0d 00 80 40 00 ?? mov ecx, dword ds:[0x00408000]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
68 c0 51 40 00 ?? push 0x004051c0
e8 d0 fe ff ff ?? call function 0x00401e60
L5: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x401fa0 | ___report_rangecheckfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 08 ?? push 8
e8 16 00 00 00 ?? call function 0x00401fc0
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x401fc0 | ___report_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796>
6a 17 ?? push 0x17<23>
ff 15 10 50 40 00 ?? call dword ds:[0x00405010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 00 82 40 00 ?? mov dword ds:[0x00408200], eax
89 0d fc 81 40 00 ?? mov dword ds:[0x004081fc], ecx
89 15 f8 81 40 00 ?? mov dword ds:[0x004081f8], edx
89 1d f4 81 40 00 ?? mov dword ds:[0x004081f4], ebx
89 35 f0 81 40 00 ?? mov dword ds:[0x004081f0], esi
89 3d ec 81 40 00 ?? mov dword ds:[0x004081ec], edi
66 8c 15 18 82 40 00 ?? mov word ds:[0x00408218], ss
66 8c 0d 0c 82 40 00 ?? mov word ds:[0x0040820c], cs
66 8c 1d e8 81 40 00 ?? mov word ds:[0x004081e8], ds
66 8c 05 e4 81 40 00 ?? mov word ds:[0x004081e4], es
66 8c 25 e0 81 40 00 ?? mov word ds:[0x004081e0], fs
66 8c 2d dc 81 40 00 ?? mov word ds:[0x004081dc], gs
9c ?? pushfd
8f 05 10 82 40 00 ?? pop dword ds:[0x00408210]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 04 82 40 00 ?? mov dword ds:[0x00408204], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 08 82 40 00 ?? mov dword ds:[0x00408208], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 14 82 40 00 ?? mov dword ds:[0x00408214], eax
8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>]
a1 08 82 40 00 ?? mov eax, dword ds:[0x00408208]
a3 0c 81 40 00 ?? mov dword ds:[0x0040810c], eax
c7 05 00 81 40 00 09 04 ?? mov dword ds:[0x00408100], 0xc0000409
00 c0
c7 05 04 81 40 00 01 00 ?? mov dword ds:[0x00408104], 1
00 00
c7 05 10 81 40 00 01 00 ?? mov dword ds:[0x00408110], 1
00 00
b9 04 00 00 00 ?? mov ecx, 4
6b d1 00 ?? imul edx, ecx, 0
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 82 14 81 40 00 ?? mov dword ds:[edx + 0x00408114], eax
68 c0 51 40 00 ?? push 0x004051c0
e8 d1 fd ff ff ?? call function 0x00401e60
L5: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4020a0 | ___report_securityfailureEx | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 20 03 00 00 ?? sub esp, 0x00000320<800>
6a 17 ?? push 0x17<23>
ff 15 10 50 40 00 ?? call dword ds:[0x00405010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 00 82 40 00 ?? mov dword ds:[0x00408200], eax
89 0d fc 81 40 00 ?? mov dword ds:[0x004081fc], ecx
89 15 f8 81 40 00 ?? mov dword ds:[0x004081f8], edx
89 1d f4 81 40 00 ?? mov dword ds:[0x004081f4], ebx
89 35 f0 81 40 00 ?? mov dword ds:[0x004081f0], esi
89 3d ec 81 40 00 ?? mov dword ds:[0x004081ec], edi
66 8c 15 18 82 40 00 ?? mov word ds:[0x00408218], ss
66 8c 0d 0c 82 40 00 ?? mov word ds:[0x0040820c], cs
66 8c 1d e8 81 40 00 ?? mov word ds:[0x004081e8], ds
66 8c 05 e4 81 40 00 ?? mov word ds:[0x004081e4], es
66 8c 25 e0 81 40 00 ?? mov word ds:[0x004081e0], fs
66 8c 2d dc 81 40 00 ?? mov word ds:[0x004081dc], gs
9c ?? pushfd
8f 05 10 82 40 00 ?? pop dword ds:[0x00408210]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 04 82 40 00 ?? mov dword ds:[0x00408204], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 08 82 40 00 ?? mov dword ds:[0x00408208], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 14 82 40 00 ?? mov dword ds:[0x00408214], eax
8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>]
a1 08 82 40 00 ?? mov eax, dword ds:[0x00408208]
a3 0c 81 40 00 ?? mov dword ds:[0x0040810c], eax
c7 05 00 81 40 00 09 04 ?? mov dword ds:[0x00408100], 0xc0000409
00 c0
c7 05 04 81 40 00 01 00 ?? mov dword ds:[0x00408104], 1
00 00
83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0
76 0d ?? jbe basic block L7
L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0
75 07 ?? jne basic block L7
L6: c7 45 0c 00 00 00 00 ?? mov dword ss:[ebp + 12], 0
L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14
76 09 ?? jbe basic block L9
L8: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
83 e9 01 ?? sub ecx, 1
89 4d 0c ?? mov dword ss:[ebp + 12], ecx
L9: 8b 55 0c ?? mov edx, dword ss:[ebp + 12]
83 c2 01 ?? add edx, 1
89 15 10 81 40 00 ?? mov dword ds:[0x00408110], edx
b8 04 00 00 00 ?? mov eax, 4
6b c8 00 ?? imul ecx, eax, 0
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
89 91 14 81 40 00 ?? mov dword ds:[ecx + 0x00408114], edx
c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
eb 09 ?? jmp basic block L10
L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
3b 4d 0c ?? cmp ecx, dword ss:[ebp + 12]
73 15 ?? jae basic block L12
L11: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>]
8b 04 81 ?? mov eax, dword ds:[ecx + eax * 4]
89 04 95 18 81 40 00 ?? mov dword ds:[0x00408118 + edx * 4], eax
eb da ?? jmp 0x00402192
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 c0 01 ?? add eax, 1
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L12: 68 c0 51 40 00 ?? push 0x004051c0
e8 9e fc ff ff ?? call function 0x00401e60
L13: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4021d0 | ??0bad_alloc@std@@AAE@QBD@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
6a 01 ?? push 1
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 1b 01 00 00 ?? call function 0x00402300
L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
c7 01 ec 51 40 00 ?? mov dword ds:[ecx], 0x004051ec
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402200 | ??0bad_alloc@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 ad 00 00 00 ?? call function 0x004022c0
L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
c7 01 ec 51 40 00 ?? mov dword ds:[ecx], 0x004051ec
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402230 | ??0bad_alloc@std@@QAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
6a 01 ?? push 1
68 f4 51 40 00 ?? push 0x004051f4<"bad allocation">
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 ba 00 00 00 ?? call function 0x00402300
L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
c7 00 ec 51 40 00 ?? mov dword ds:[eax], 0x004051ec
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402260 | ??0bad_array_new_length@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 8d ff ff ff ?? call function 0x00402200
L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
c7 01 08 52 40 00 ?? mov dword ds:[ecx], 0x00405208
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402290 | ??0bad_array_new_length@std@@QAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
68 10 52 40 00 ?? push 0x00405210<"bad array new length">
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 2c ff ff ff ?? call function 0x004021d0
L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
c7 00 08 52 40 00 ?? mov dword ds:[eax], 0x00405208
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4022c0 | ??0exception@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
c7 00 cc 51 40 00 ?? mov dword ds:[eax], 0x004051cc
33 c9 ?? xor ecx, ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
83 c2 04 ?? add edx, 4
89 0a ?? mov dword ds:[edx], ecx
89 4a 04 ?? mov dword ds:[edx + 4], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 c0 04 ?? add eax, 4
50 ?? push eax
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
83 c1 04 ?? add ecx, 4
51 ?? push ecx
e8 e6 14 00 00 ?? call function 0x004037d6
L2: 83 c4 08 ?? add esp, 8
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402300 | ??0exception@std@@QAE@QBDH@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
c7 00 cc 51 40 00 ?? mov dword ds:[eax], 0x004051cc
33 c9 ?? xor ecx, ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
83 c2 04 ?? add edx, 4
89 0a ?? mov dword ds:[edx], ecx
89 4a 04 ?? mov dword ds:[edx + 4], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 48 04 ?? mov dword ds:[eax + 4], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 08 00 ?? ret 8
|
./vs2022/wpo/Debug/oopoly.exe | 0x402330 | ??1bad_alloc@std@@UAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 31 00 00 00 ?? call function 0x00402370
L2: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402350 | ??1bad_array_new_length@std@@UAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 d1 ff ff ff ?? call function 0x00402330
L2: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402370 | ??1exception@std@@UAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
c7 00 cc 51 40 00 ?? mov dword ds:[eax], 0x004051cc
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
83 c1 04 ?? add ecx, 4
51 ?? push ecx
e8 50 14 00 00 ?? call function 0x004037dc
L2: 83 c4 04 ?? add esp, 4
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4023a0 | ??_Ebad_alloc@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 81 ff ff ff ?? call function 0x00402330
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 e0 01 ?? and eax, 1
74 0e ?? je basic block L5
L3: 6a 0c ?? push 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
51 ?? push ecx
e8 4e f6 ff ff ?? call function 0x00401a10
L4: 83 c4 08 ?? add esp, 8
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x4023a0 | ??_Gbad_alloc@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 81 ff ff ff ?? call function 0x00402330
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 e0 01 ?? and eax, 1
74 0e ?? je basic block L5
L3: 6a 0c ?? push 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
51 ?? push ecx
e8 4e f6 ff ff ?? call function 0x00401a10
L4: 83 c4 08 ?? add esp, 8
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x4023d0 | ??_Ebad_array_new_length@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 71 ff ff ff ?? call function 0x00402350
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 e0 01 ?? and eax, 1
74 0e ?? je basic block L5
L3: 6a 0c ?? push 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
51 ?? push ecx
e8 1e f6 ff ff ?? call function 0x00401a10
L4: 83 c4 08 ?? add esp, 8
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x4023d0 | ??_Gbad_array_new_length@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 71 ff ff ff ?? call function 0x00402350
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 e0 01 ?? and eax, 1
74 0e ?? je basic block L5
L3: 6a 0c ?? push 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
51 ?? push ecx
e8 1e f6 ff ff ?? call function 0x00401a10
L4: 83 c4 08 ?? add esp, 8
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402400 | ??_Eexception@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 61 ff ff ff ?? call function 0x00402370
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 e0 01 ?? and eax, 1
74 0e ?? je basic block L5
L3: 6a 0c ?? push 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
51 ?? push ecx
e8 ee f5 ff ff ?? call function 0x00401a10
L4: 83 c4 08 ?? add esp, 8
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402400 | ??_Gexception@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
e8 61 ff ff ff ?? call function 0x00402370
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 e0 01 ?? and eax, 1
74 0e ?? je basic block L5
L3: 6a 0c ?? push 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
51 ?? push ecx
e8 ee f5 ff ff ?? call function 0x00401a10
L4: 83 c4 08 ?? add esp, 8
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x402430 | ?__scrt_throw_std_bad_alloc@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
e8 f2 fd ff ff ?? call function 0x00402230
L2: 68 4c 65 40 00 ?? push 0x0040654c
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
e8 96 13 00 00 ?? call function 0x004037e2
L3: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402450 | ?__scrt_throw_std_bad_array_new_length@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
e8 32 fe ff ff ?? call function 0x00402290
L2: 68 a0 65 40 00 ?? push 0x004065a0
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
e8 76 13 00 00 ?? call function 0x004037e2
L3: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402470 | ?what@exception@std@@UBEPBDXZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 78 04 00 ?? cmp dword ds:[eax + 4], 0
74 0b ?? je basic block L3
L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b 51 04 ?? mov edx, dword ds:[ecx + 4]
89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx
eb 07 ?? jmp basic block L4
L3: c7 45 f8 d4 51 40 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0x004051d4<"Unknown exception">
L4: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4024a0 | ??3@YAXPAX@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 dc 13 00 00 ?? call function 0x0040388a
L2: 83 c4 08 ?? add esp, 8
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4024c0 | find_pe_section | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 18 ?? sub esp, 0x18<24>
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>]
03 51 3c ?? add edx, dword ds:[ecx + 0x3c<60>]
89 55 ec ?? mov dword ss:[ebp + 0xec<236,-20>], edx
8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
0f b7 51 14 ?? movzx edx, word ds:[ecx + 0x14<20>]
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
8d 4c 10 18 ?? lea ecx, ds:[eax + edx + 0x18<24>]
89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx
8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>]
0f b7 42 06 ?? movzx eax, word ds:[edx + 6]
6b c8 28 ?? imul ecx, eax, 0x28<40>
03 4d f0 ?? add ecx, dword ss:[ebp + 0xf0<240,-16>]
89 4d e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], ecx
8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>]
89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx
eb 09 ?? jmp basic block L2
L2: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
3b 4d e8 ?? cmp ecx, dword ss:[ebp + 0xe8<232,-24>]
74 23 ?? je basic block L7
L3: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
8b 45 0c ?? mov eax, dword ss:[ebp + 12]
3b 42 0c ?? cmp eax, dword ds:[edx + 12]
72 16 ?? jb basic block L6
L4: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b 51 0c ?? mov edx, dword ds:[ecx + 12]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
03 50 08 ?? add edx, dword ds:[eax + 8]
39 55 0c ?? cmp dword ss:[ebp + 12], edx
73 05 ?? jae basic block L6
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
eb 04 ?? jmp basic block L8
L6: eb cc ?? jmp 0x00402507
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 c0 28 ?? add eax, 0x28<40>
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L7: 33 c0 ?? xor eax, eax
L8: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402550 | is_potentially_valid_image_base | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 10 ?? sub esp, 0x10<16>
83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0
75 04 ?? jne basic block L3
L2: 32 c0 ?? xor al, al
eb 55 ?? jmp basic block L10
L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
0f b7 11 ?? movzx edx, word ds:[ecx]
81 fa 4d 5a 00 00 ?? cmp edx, 0x00005a4d<23117>
74 04 ?? je basic block L5
L4: 32 c0 ?? xor al, al
eb 3d ?? jmp basic block L10
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
03 48 3c ?? add ecx, dword ds:[eax + 0x3c<60>]
89 4d f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], ecx
8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>]
89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
81 38 50 45 00 00 ?? cmp dword ds:[eax], 0x00004550<17744>
74 04 ?? je basic block L7
L6: 32 c0 ?? xor al, al
eb 1c ?? jmp basic block L10
L7: 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
83 c1 18 ?? add ecx, 0x18<24>
89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx
8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>]
0f b7 02 ?? movzx eax, word ds:[edx]
3d 0b 01 00 00 ?? cmp eax, 0x0000010b<267>
74 04 ?? je basic block L9
L8: 32 c0 ?? xor al, al
eb 02 ?? jmp basic block L10
L9: b0 01 ?? mov al, 1
L10: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4025c0 | _NtCurrentTeb | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>]
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4025d0 | ___scrt_acquire_startup_lock | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
e8 c5 11 00 00 ?? call function 0x004037a0
L2: 85 c0 ?? test eax, eax
75 04 ?? jne basic block L4
L3: 32 c0 ?? xor al, al
eb 32 ?? jmp basic block L11
L4: e8 d8 ff ff ff ?? call function 0x004025c0
L5: 8b 40 04 ?? mov eax, dword ds:[eax + 4]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
ba 20 84 40 00 ?? mov edx, 0x00408420
33 c0 ?? xor eax, eax
f0 0f b1 0a ?? lock cmpxchg dword ds:[edx], ecx
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
83 7d f8 00 ?? cmp dword ss:[ebp + 0xf8<248,-8>], 0
74 0e ?? je basic block L10
L7: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
3b 45 f8 ?? cmp eax, dword ss:[ebp + 0xf8<248,-8>]
75 04 ?? jne basic block L9
L8: b0 01 ?? mov al, 1
eb 04 ?? jmp basic block L11
L9: eb db ?? jmp basic block L6
L10: 32 c0 ?? xor al, al
L11: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402620 | ___scrt_dllmain_after_initialize_c | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 78 11 00 00 ?? call function 0x004037a0
L2: 85 c0 ?? test eax, eax
74 07 ?? je basic block L5
L3: e8 2f 0e 00 00 ?? call function 0x00403460
L4: eb 12 ?? jmp basic block L9
L5: e8 58 f7 ff ff ?? call function 0x00401d90
L6: 85 c0 ?? test eax, eax
74 04 ?? je basic block L8
L7: 32 c0 ?? xor al, al
eb 07 ?? jmp basic block L10
L8: e8 6b f7 ff ff ?? call function 0x00401db0
L9: b0 01 ?? mov al, 1
L10: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402650 | ___scrt_dllmain_before_initialize_c | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 00 ?? push 0
e8 56 01 00 00 ?? call function 0x004027b0
L2: 83 c4 04 ?? add esp, 4
0f b6 c0 ?? movzx eax, al
85 c0 ?? test eax, eax
75 04 ?? jne basic block L4
L3: 32 c0 ?? xor al, al
eb 02 ?? jmp basic block L5
L4: b0 01 ?? mov al, 1
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402670 | ___scrt_dllmain_crt_thread_attach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 a8 12 00 00 ?? call function 0x00403920
L2: 0f b6 c0 ?? movzx eax, al
85 c0 ?? test eax, eax
75 04 ?? jne basic block L4
L3: 32 c0 ?? xor al, al
eb 17 ?? jmp basic block L9
L4: e8 98 12 00 00 ?? call function 0x00403920
L5: 0f b6 c8 ?? movzx ecx, al
85 c9 ?? test ecx, ecx
75 09 ?? jne basic block L8
L6: e8 9c 12 00 00 ?? call function 0x00403930
L7: 32 c0 ?? xor al, al
eb 02 ?? jmp basic block L9
L8: b0 01 ?? mov al, 1
L9: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4026a0 | ___scrt_dllmain_crt_thread_detach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 88 12 00 00 ?? call function 0x00403930
L2: e8 83 12 00 00 ?? call function 0x00403930
L3: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4026c0 | ___scrt_dllmain_exception_filter | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
e8 d5 10 00 00 ?? call function 0x004037a0
L2: 85 c0 ?? test eax, eax
75 28 ?? jne basic block L6
L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1
75 22 ?? jne basic block L6
L4: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>]
51 ?? push ecx
6a 00 ?? push 0
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
52 ?? push edx
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L5: ff 55 fc ?? call dword ss:[ebp + 0xfc<252,-4>]
L6: 8b 4d 1c ?? mov ecx, dword ss:[ebp + 0x1c<28>]
51 ?? push ecx
8b 55 18 ?? mov edx, dword ss:[ebp + 0x18<24>]
52 ?? push edx
e8 8c 11 00 00 ?? call function 0x00403890
L7: 83 c4 08 ?? add esp, 8
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402710 | ___scrt_dllmain_uninitialize_c | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 88 10 00 00 ?? call function 0x004037a0
L2: 85 c0 ?? test eax, eax
74 0f ?? je basic block L5
L3: 68 28 84 40 00 ?? push 0x00408428
e8 7c 11 00 00 ?? call function 0x004038a2
L4: 83 c4 04 ?? add esp, 4
eb 0e ?? jmp basic block L8
L5: e8 30 12 00 00 ?? call function 0x00403960
L6: 85 c0 ?? test eax, eax
75 05 ?? jne basic block L8
L7: e8 2d 11 00 00 ?? call function 0x00403866
L8: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402740 | ___scrt_dllmain_uninitialize_critical | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 00 ?? push 0
e8 06 12 00 00 ?? call function 0x00403950
L2: 83 c4 04 ?? add esp, 4
e8 fe 11 00 00 ?? call function 0x00403950
L3: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402760 | ___scrt_initialize_crt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0
75 07 ?? jne basic block L3
L2: c6 05 24 84 40 00 01 ?? mov byte ds:[0x00408424], 1
L3: e8 eb 0c 00 00 ?? call function 0x00403460
L4: e8 96 11 00 00 ?? call function 0x00403910
L5: 0f b6 c0 ?? movzx eax, al
85 c0 ?? test eax, eax
75 04 ?? jne basic block L7
L6: 32 c0 ?? xor al, al
eb 1c ?? jmp basic block L12
L7: e8 86 11 00 00 ?? call function 0x00403910
L8: 0f b6 c8 ?? movzx ecx, al
85 c9 ?? test ecx, ecx
75 0e ?? jne basic block L11
L9: 6a 00 ?? push 0
e8 a8 11 00 00 ?? call function 0x00403940
L10: 83 c4 04 ?? add esp, 4
32 c0 ?? xor al, al
eb 02 ?? jmp basic block L12
L11: b0 01 ?? mov al, 1
L12: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4027b0 | ___scrt_initialize_onexit_tables | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 1c ?? sub esp, 0x1c<28>
0f b6 05 25 84 40 00 ?? movzx eax, byte ds:[0x00408425]
85 c0 ?? test eax, eax
74 07 ?? je basic block L3
L2: b0 01 ?? mov al, 1
e9 b6 00 00 00 ?? jmp basic block L18
L3: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0
74 0d ?? je basic block L6
L4: 83 7d 08 01 ?? cmp dword ss:[ebp + 8], 1
74 07 ?? je basic block L6
L5: 6a 05 ?? push 5
e8 c5 05 00 00 ?? call function 0x00402da0
L6: e8 c0 0f 00 00 ?? call function 0x004037a0
L7: 85 c0 ?? test eax, eax
74 32 ?? je basic block L16
L8: 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0
75 2c ?? jne basic block L16
L9: 68 28 84 40 00 ?? push 0x00408428
e8 a2 10 00 00 ?? call function 0x00403896
L10: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 04 ?? je basic block L12
L11: 32 c0 ?? xor al, al
eb 7f ?? jmp basic block L18
L12: 68 34 84 40 00 ?? push 0x00408434
e8 8d 10 00 00 ?? call function 0x00403896
L13: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 04 ?? je basic block L15
L14: 32 c0 ?? xor al, al
eb 6a ?? jmp basic block L18
L15: eb 5f ?? jmp basic block L17
L16: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1>
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
89 4d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
89 55 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], edx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
89 0d 28 84 40 00 ?? mov dword ds:[0x00408428], ecx
8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>]
89 15 2c 84 40 00 ?? mov dword ds:[0x0040842c], edx
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
a3 30 84 40 00 ?? mov dword ds:[0x00408430], eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
89 55 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], edx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax
8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>]
89 0d 34 84 40 00 ?? mov dword ds:[0x00408434], ecx
8b 55 e8 ?? mov edx, dword ss:[ebp + 0xe8<232,-24>]
89 15 38 84 40 00 ?? mov dword ds:[0x00408438], edx
8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>]
a3 3c 84 40 00 ?? mov dword ds:[0x0040843c], eax
L17: c6 05 25 84 40 00 01 ?? mov byte ds:[0x00408425], 1
b0 01 ?? mov al, 1
L18: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402890 | ___scrt_is_nonwritable_in_current_image | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a fe ?? push 0xfe<254,-2>
68 e0 65 40 00 ?? push 0x004065e0
68 e0 30 40 00 ?? push function 0x004030e0
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
83 c4 d8 ?? add esp, 0xd8<216,-40>
53 ?? push ebx
56 ?? push esi
57 ?? push edi
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 45 d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], eax
c7 45 dc 00 00 40 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x00400000
c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>]
51 ?? push ecx
e8 70 fc ff ff ?? call function 0x00402550
L2: 83 c4 04 ?? add esp, 4
0f b6 d0 ?? movzx edx, al
85 d2 ?? test edx, edx
75 13 ?? jne basic block L4
L3: c6 45 e7 00 ?? mov byte ss:[ebp + 0xe7<231,-25>], 0
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8a 45 e7 ?? mov al, byte ss:[ebp + 0xe7<231,-25>]
e9 aa 00 00 00 ?? jmp basic block L17
L4: 8b 45 d0 ?? mov eax, dword ss:[ebp + 0xd0<208,-48>]
2b 45 dc ?? sub eax, dword ss:[ebp + 0xdc<220,-36>]
89 45 cc ?? mov dword ss:[ebp + 0xcc<204,-52>], eax
8b 4d cc ?? mov ecx, dword ss:[ebp + 0xcc<204,-52>]
51 ?? push ecx
8b 55 dc ?? mov edx, dword ss:[ebp + 0xdc<220,-36>]
52 ?? push edx
e8 ad fb ff ff ?? call function 0x004024c0
L5: 83 c4 08 ?? add esp, 8
89 45 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], eax
83 7d d8 00 ?? cmp dword ss:[ebp + 0xd8<216,-40>], 0
75 10 ?? jne basic block L7
L6: c6 45 e6 00 ?? mov byte ss:[ebp + 0xe6<230,-26>], 0
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8a 45 e6 ?? mov al, byte ss:[ebp + 0xe6<230,-26>]
eb 78 ?? jmp basic block L17
L7: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>]
8b 48 24 ?? mov ecx, dword ds:[eax + 0x24<36>]
81 e1 00 00 00 80 ?? and ecx, 0x80000000
74 10 ?? je basic block L9
L8: c6 45 e5 00 ?? mov byte ss:[ebp + 0xe5<229,-27>], 0
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8a 45 e5 ?? mov al, byte ss:[ebp + 0xe5<229,-27>]
eb 5a ?? jmp basic block L17
L9: c6 45 e4 01 ?? mov byte ss:[ebp + 0xe4<228,-28>], 1
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8a 45 e4 ?? mov al, byte ss:[ebp + 0xe4<228,-28>]
eb 4a ?? jmp basic block L17
L10: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
eb 41 ?? jmp basic block L17
L11: 8b 55 ec ?? mov edx, dword ss:[ebp + 0xec<236,-20>]
8b 02 ?? mov eax, dword ds:[edx]
8b 08 ?? mov ecx, dword ds:[eax]
89 4d c8 ?? mov dword ss:[ebp + 0xc8<200,-56>], ecx
81 7d c8 05 00 00 c0 ?? cmp dword ss:[ebp + 0xc8<200,-56>], 0xc0000005
75 09 ?? jne basic block L13
L12: c7 45 d4 01 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 1
eb 07 ?? jmp basic block L14
L13: c7 45 d4 00 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0
L14: 8b 45 d4 ?? mov eax, dword ss:[ebp + 0xd4<212,-44>]
c3 ?? ret
L15: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
c6 45 e3 00 ?? mov byte ss:[ebp + 0xe3<227,-29>], 0
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8a 45 e3 ?? mov al, byte ss:[ebp + 0xe3<227,-29>]
eb 07 ?? jmp basic block L17
L16: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
L17: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4029c0 | ___scrt_release_startup_lock | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 d8 0d 00 00 ?? call function 0x004037a0
L2: 85 c0 ?? test eax, eax
75 02 ?? jne basic block L4
L3: eb 13 ?? jmp basic block L7
L4: 0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8]
85 c0 ?? test eax, eax
74 02 ?? je basic block L6
L5: eb 09 ?? jmp basic block L7
L6: 33 c9 ?? xor ecx, ecx
ba 20 84 40 00 ?? mov edx, 0x00408420
87 0a ?? xchg dword ds:[edx], ecx
L7: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4029f0 | ___scrt_uninitialize_crt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
0f b6 05 24 84 40 00 ?? movzx eax, byte ds:[0x00408424]
85 c0 ?? test eax, eax
74 0c ?? je basic block L4
L2: 0f b6 4d 0c ?? movzx ecx, byte ss:[ebp + 12]
85 c9 ?? test ecx, ecx
74 04 ?? je basic block L4
L3: b0 01 ?? mov al, 1
eb 1c ?? jmp basic block L7
L4: 0f b6 55 08 ?? movzx edx, byte ss:[ebp + 8]
52 ?? push edx
e8 2c 0f 00 00 ?? call function 0x00403940
L5: 83 c4 04 ?? add esp, 4
0f b6 45 08 ?? movzx eax, byte ss:[ebp + 8]
50 ?? push eax
e8 1f 0f 00 00 ?? call function 0x00403940
L6: 83 c4 04 ?? add esp, 4
b0 01 ?? mov al, 1
L7: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402a30 | __onexit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
a1 28 84 40 00 ?? mov eax, dword ds:[0x00408428]
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
83 7d f4 ff ?? cmp dword ss:[ebp + 0xf4<244,-12>], 0xff<255,-1>
75 26 ?? jne basic block L8
L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
e8 5b 0e 00 00 ?? call function 0x004038a8
L3: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
75 08 ?? jne basic block L5
L4: 8b 55 08 ?? mov edx, dword ss:[ebp + 8]
89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx
eb 07 ?? jmp basic block L6
L5: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
L6: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
eb 29 ?? jmp basic block L13
L7: eb 27 ?? jmp basic block L13
L8: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
68 28 84 40 00 ?? push 0x00408428
e8 24 0e 00 00 ?? call function 0x0040389c
L9: 83 c4 08 ?? add esp, 8
85 c0 ?? test eax, eax
75 08 ?? jne basic block L11
L10: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 4d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ecx
eb 07 ?? jmp basic block L12
L11: c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0
L12: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
L13: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402aa0 | _at_quick_exit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
a1 34 84 40 00 ?? mov eax, dword ds:[0x00408434]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
83 7d fc ff ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xff<255,-1>
75 10 ?? jne basic block L5
L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
e8 f1 0d 00 00 ?? call function 0x004038ae
L3: 83 c4 04 ?? add esp, 4
eb 19 ?? jmp basic block L7
L4: eb 17 ?? jmp basic block L7
L5: 8b 55 08 ?? mov edx, dword ss:[ebp + 8]
89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
50 ?? push eax
68 34 84 40 00 ?? push 0x00408434
e8 c4 0d 00 00 ?? call function 0x0040389c
L6: 83 c4 08 ?? add esp, 8
L7: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402ae0 | _atexit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 43 ff ff ff ?? call function 0x00402a30
L2: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 09 ?? je basic block L4
L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
eb 07 ?? jmp basic block L5
L4: c7 45 fc ff ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xffffffff<4294967295,-1>
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402b10 | __get_entropy | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 14 ?? sub esp, 0x14<20>
33 c0 ?? xor eax, eax
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
51 ?? push ecx
ff 15 20 50 40 00 ?? call dword ds:[0x00405020]
L2: 8b 55 f4 ?? mov edx, dword ss:[ebp + 0xf4<244,-12>]
89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
33 45 f8 ?? xor eax, dword ss:[ebp + 0xf8<248,-8>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
ff 15 1c 50 40 00 ?? call dword ds:[0x0040501c]
L3: 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
ff 15 18 50 40 00 ?? call dword ds:[0x00405018]
L4: 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8d 4d ec ?? lea ecx, ss:[ebp + 0xec<236,-20>]
51 ?? push ecx
ff 15 14 50 40 00 ?? call dword ds:[0x00405014]
L5: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
33 55 ec ?? xor edx, dword ss:[ebp + 0xec<236,-20>]
89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
33 45 f0 ?? xor eax, dword ss:[ebp + 0xf0<240,-16>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8d 55 fc ?? lea edx, ss:[ebp + 0xfc<252,-4>]
33 ca ?? xor ecx, edx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402b80 | ___security_init_cookie | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
81 3d 04 80 40 00 4e e6 ?? cmp dword ds:[0x00408004], 0xbb40e64e
40 bb
74 1c ?? je basic block L4
L2: a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
25 00 00 ff ff ?? and eax, 0xffff0000<4294901760,-65536>
74 10 ?? je basic block L4
L3: 8b 0d 04 80 40 00 ?? mov ecx, dword ds:[0x00408004]
f7 d1 ?? not ecx
89 0d 00 80 40 00 ?? mov dword ds:[0x00408000], ecx
eb 4a ?? jmp basic block L10
L4: e8 5f ff ff ff ?? call function 0x00402b10
L5: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
81 7d fc 4e e6 40 bb ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0xbb40e64e
75 09 ?? jne basic block L7
L6: c7 45 fc 4f e6 40 bb ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xbb40e64f
eb 1c ?? jmp basic block L9
L7: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 e2 00 00 ff ff ?? and edx, 0xffff0000<4294901760,-65536>
75 11 ?? jne basic block L9
L8: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
0d 11 47 00 00 ?? or eax, 0x00004711<18193>
c1 e0 10 ?? shl eax, 0x10<16>
0b 45 fc ?? or eax, dword ss:[ebp + 0xfc<252,-4>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L9: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
89 0d 04 80 40 00 ?? mov dword ds:[0x00408004], ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
f7 d2 ?? not edx
89 15 00 80 40 00 ?? mov dword ds:[0x00408000], edx
L10: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c00 | __matherr | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c10 | __get_startup_argv_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b8 01 00 00 00 ?? mov eax, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c20 | __get_startup_commit_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c30 | __get_startup_file_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b8 00 40 00 00 ?? mov eax, 0x00004000<16384>
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c40 | __get_startup_new_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c50 | __get_startup_thread_locale_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c60 | ?__scrt_initialize_type_info@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
68 40 84 40 00 ?? push 0x00408440
ff 15 24 50 40 00 ?? call dword ds:[0x00405024]
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c70 | ?__scrt_uninitialize_type_info@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
68 40 84 40 00 ?? push 0x00408440
e8 6b 0b 00 00 ?? call function 0x004037e8
L2: 83 c4 04 ?? add esp, 4
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402c90 | __should_initialize_environment | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402ca0 | __initialize_default_precision | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
68 00 00 03 00 ?? push 0x00030000
68 00 00 01 00 ?? push 0x00010000
6a 00 ?? push 0
e8 00 0c 00 00 ?? call function 0x004038b4
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 07 ?? je basic block L4
L3: 6a 07 ?? push 7
e8 de 00 00 00 ?? call function 0x00402da0
L4: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402cd0 | __initialize_invalid_parameter_handler | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402ce0 | __initialize_denormal_control | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402cf0 | ___local_stdio_printf_options | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b8 48 84 40 00 ?? mov eax, 0x00408448
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402d00 | ___local_stdio_scanf_options | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b8 50 84 40 00 ?? mov eax, 0x00408450
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402d10 | ___scrt_initialize_default_local_stdio_options | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
e8 d5 ff ff ff ?? call function 0x00402cf0
L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 08 ?? mov ecx, dword ds:[eax]
83 c9 24 ?? or ecx, 0x24<36>
8b 50 04 ?? mov edx, dword ds:[eax + 4]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
89 08 ?? mov dword ds:[eax], ecx
89 50 04 ?? mov dword ds:[eax + 4], edx
e8 ca ff ff ff ?? call function 0x00402d00
L3: 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
8b 11 ?? mov edx, dword ds:[ecx]
83 ca 02 ?? or edx, 2
8b 41 04 ?? mov eax, dword ds:[ecx + 4]
8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
89 11 ?? mov dword ds:[ecx], edx
89 41 04 ?? mov dword ds:[ecx + 4], eax
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402d50 | ___scrt_is_user_matherr_present | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
83 3d 0c 80 40 00 00 ?? cmp dword ds:[0x0040800c], 0
75 09 ?? jne basic block L3
L2: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1
eb 07 ?? jmp basic block L4
L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402d80 | ___scrt_get_dyn_tls_init_callback | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b8 7c 84 40 00 ?? mov eax, 0x0040847c
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402d90 | ___scrt_get_dyn_tls_dtor_callback | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b8 78 84 40 00 ?? mov eax, 0x00408478
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402da0 | ___scrt_fastfail | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 2c 03 00 00 ?? sub esp, 0x0000032c<812>
6a 17 ?? push 0x17<23>
ff 15 10 50 40 00 ?? call dword ds:[0x00405010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: 6a 03 ?? push 3
e8 af 02 00 00 ?? call function 0x00403070
L5: 83 c4 04 ?? add esp, 4
68 cc 02 00 00 ?? push 0x000002cc<716>
6a 00 ?? push 0
8d 85 d4 fc ff ff ?? lea eax, ss:[ebp + 0xfffffcd4<4294966484,-812>]
50 ?? push eax
e8 23 0a 00 00 ?? call function 0x004037fa
L6: 83 c4 0c ?? add esp, 12
89 85 84 fd ff ff ?? mov dword ss:[ebp + 0xfffffd84<4294966660,-636>], eax
89 8d 80 fd ff ff ?? mov dword ss:[ebp + 0xfffffd80<4294966656,-640>], ecx
89 95 7c fd ff ff ?? mov dword ss:[ebp + 0xfffffd7c<4294966652,-644>], edx
89 9d 78 fd ff ff ?? mov dword ss:[ebp + 0xfffffd78<4294966648,-648>], ebx
89 b5 74 fd ff ff ?? mov dword ss:[ebp + 0xfffffd74<4294966644,-652>], esi
89 bd 70 fd ff ff ?? mov dword ss:[ebp + 0xfffffd70<4294966640,-656>], edi
66 8c 95 9c fd ff ff ?? mov word ss:[ebp + 0xfffffd9c<4294966684,-612>], ss
66 8c 8d 90 fd ff ff ?? mov word ss:[ebp + 0xfffffd90<4294966672,-624>], cs
66 8c 9d 6c fd ff ff ?? mov word ss:[ebp + 0xfffffd6c<4294966636,-660>], ds
66 8c 85 68 fd ff ff ?? mov word ss:[ebp + 0xfffffd68<4294966632,-664>], es
66 8c a5 64 fd ff ff ?? mov word ss:[ebp + 0xfffffd64<4294966628,-668>], fs
66 8c ad 60 fd ff ff ?? mov word ss:[ebp + 0xfffffd60<4294966624,-672>], gs
9c ?? pushfd
8f 85 94 fd ff ff ?? pop dword ss:[ebp + 0xfffffd94<4294966676,-620>]
c7 85 d4 fc ff ff 01 00 ?? mov dword ss:[ebp + 0xfffffcd4<4294966484,-812>], 0x00010001
01 00
8b 4d 04 ?? mov ecx, dword ss:[ebp + 4]
89 8d 8c fd ff ff ?? mov dword ss:[ebp + 0xfffffd8c<4294966668,-628>], ecx
8d 55 04 ?? lea edx, ss:[ebp + 4]
89 95 98 fd ff ff ?? mov dword ss:[ebp + 0xfffffd98<4294966680,-616>], edx
8d 45 04 ?? lea eax, ss:[ebp + 4]
8b 48 fc ?? mov ecx, dword ds:[eax + 0xfc<252,-4>]
89 8d 88 fd ff ff ?? mov dword ss:[ebp + 0xfffffd88<4294966664,-632>], ecx
6a 50 ?? push 0x50<80>
6a 00 ?? push 0
8d 55 a0 ?? lea edx, ss:[ebp + 0xa0<160,-96>]
52 ?? push edx
e8 96 09 00 00 ?? call function 0x004037fa
L7: 83 c4 0c ?? add esp, 12
c7 45 a0 15 00 00 40 ?? mov dword ss:[ebp + 0xa0<160,-96>], 0x40000015
c7 45 a4 01 00 00 00 ?? mov dword ss:[ebp + 0xa4<164,-92>], 1
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
89 45 ac ?? mov dword ss:[ebp + 0xac<172,-84>], eax
ff 15 28 50 40 00 ?? call dword ds:[0x00405028<"2p@">]
L8: 83 f8 01 ?? cmp eax, 1
75 06 ?? jne basic block L10
L9: c6 45 ff 01 ?? mov byte ss:[ebp + 0xff<255,-1>], 1
eb 04 ?? jmp basic block L11
L10: c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0
L11: 8a 4d ff ?? mov cl, byte ss:[ebp + 0xff<255,-1>]
88 4d fe ?? mov byte ss:[ebp + 0xfe<254,-2>], cl
8d 55 a0 ?? lea edx, ss:[ebp + 0xa0<160,-96>]
89 55 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edx
8d 85 d4 fc ff ff ?? lea eax, ss:[ebp + 0xfffffcd4<4294966484,-812>]
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
6a 00 ?? push 0
ff 15 04 50 40 00 ?? call dword ds:[0x00405004<"Zo@">]
L12: 8d 4d f0 ?? lea ecx, ss:[ebp + 0xf0<240,-16>]
51 ?? push ecx
ff 15 58 50 40 00 ?? call dword ds:[0x00405058<">o@">]
L13: 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
83 7d f8 00 ?? cmp dword ss:[ebp + 0xf8<248,-8>], 0
75 12 ?? jne basic block L17
L14: 0f b6 55 fe ?? movzx edx, byte ss:[ebp + 0xfe<254,-2>]
85 d2 ?? test edx, edx
75 0a ?? jne basic block L17
L15: 6a 03 ?? push 3
e8 a1 01 00 00 ?? call function 0x00403070
L16: 83 c4 04 ?? add esp, 4
L17: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402ee0 | ___scrt_get_show_window_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 48 ?? sub esp, 0x48<72>
6a 44 ?? push 0x44<68>
6a 00 ?? push 0
8d 45 b8 ?? lea eax, ss:[ebp + 0xb8<184,-72>]
50 ?? push eax
e8 07 09 00 00 ?? call function 0x004037fa
L2: 83 c4 0c ?? add esp, 12
8d 4d b8 ?? lea ecx, ss:[ebp + 0xb8<184,-72>]
51 ?? push ecx
ff 15 2c 50 40 00 ?? call dword ds:[0x0040502c<"Fp@">]
L3: 8b 55 e4 ?? mov edx, dword ss:[ebp + 0xe4<228,-28>]
83 e2 01 ?? and edx, 1
74 09 ?? je basic block L5
L4: 0f b7 45 e8 ?? movzx eax, word ss:[ebp + 0xe8<232,-24>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
eb 07 ?? jmp basic block L6
L5: c7 45 fc 0a 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 10
L6: 0f b7 45 fc ?? movzx eax, word ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402f20 | ___scrt_initialize_mta | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 b8 00 00 00 ?? call function 0x00402fe0
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402f30 | ___scrt_initialize_winrt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402f40 | ___scrt_is_managed_app | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
6a 00 ?? push 0
ff 15 30 50 40 00 ?? call dword ds:[0x00405030<"Xp@">]
L2: 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0
75 04 ?? jne basic block L4
L3: 32 c0 ?? xor al, al
eb 64 ?? jmp basic block L15
L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
0f b7 08 ?? movzx ecx, word ds:[eax]
81 f9 4d 5a 00 00 ?? cmp ecx, 0x00005a4d<23117>
74 04 ?? je basic block L6
L5: 32 c0 ?? xor al, al
eb 52 ?? jmp basic block L15
L6: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
03 42 3c ?? add eax, dword ds:[edx + 0x3c<60>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744>
74 04 ?? je basic block L8
L7: 32 c0 ?? xor al, al
eb 37 ?? jmp basic block L15
L8: 8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>]
0f b7 42 18 ?? movzx eax, word ds:[edx + 0x18<24>]
3d 0b 01 00 00 ?? cmp eax, 0x0000010b<267>
74 04 ?? je basic block L10
L9: 32 c0 ?? xor al, al
eb 25 ?? jmp basic block L15
L10: 8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
83 79 74 0e ?? cmp dword ds:[ecx + 0x74<116>], 14
77 04 ?? ja basic block L12
L11: 32 c0 ?? xor al, al
eb 18 ?? jmp basic block L15
L12: ba 08 00 00 00 ?? mov edx, 8
6b c2 0e ?? imul eax, edx, 14
8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
83 7c 01 78 00 ?? cmp dword ds:[ecx + eax + 0x78<120>], 0
75 04 ?? jne basic block L14
L13: 32 c0 ?? xor al, al
eb 02 ?? jmp basic block L15
L14: b0 01 ?? mov al, 1
L15: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402fd0 | ___scrt_set_unhandled_exception_filter | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
68 f0 2f 40 00 ?? push function 0x00402ff0
ff 15 04 50 40 00 ?? call dword ds:[0x00405004<"Zo@">]
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402fe0 | ___scrt_exe_initialize_mta | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402fe0 | ___scrt_stub_for_initialize_mta | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x402ff0 | ___scrt_unhandled_exception_filter@4 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
8b 08 ?? mov ecx, dword ds:[eax]
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 3a 63 73 6d e0 ?? cmp dword ds:[edx], 0xe06d7363
75 5b ?? jne basic block L10
L2: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 78 10 03 ?? cmp dword ds:[eax + 0x10<16>], 3
75 52 ?? jne basic block L10
L3: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
81 79 14 20 05 93 19 ?? cmp dword ds:[ecx + 0x14<20>], 0x19930520
74 24 ?? je basic block L7
L4: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 7a 14 21 05 93 19 ?? cmp dword ds:[edx + 0x14<20>], 0x19930521
74 18 ?? je basic block L7
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
81 78 14 22 05 93 19 ?? cmp dword ds:[eax + 0x14<20>], 0x19930522
74 0c ?? je basic block L7
L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
81 79 14 00 40 99 01 ?? cmp dword ds:[ecx + 0x14<20>], 0x01994000
75 22 ?? jne basic block L10
L7: e8 a7 07 00 00 ?? call function 0x004037ee
L8: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
89 10 ?? mov dword ds:[eax], edx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
89 4d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ecx
e8 9a 07 00 00 ?? call function 0x004037f4
L9: 8b 55 f8 ?? mov edx, dword ss:[ebp + 0xf8<248,-8>]
89 10 ?? mov dword ds:[eax], edx
e8 56 08 00 00 ?? call function 0x004038ba
L10: 33 c0 ?? xor eax, eax
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x403070 | __crt_debugger_hook | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
c7 05 58 84 40 00 00 00 ?? mov dword ds:[0x00408458], 0
00 00
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403080 | __RTC_Initialize | 0 |
L1: 56 ?? push esi
be 74 64 40 00 ?? mov esi, 0x00406474
8b c6 ?? mov eax, esi
3d 74 64 40 00 ?? cmp eax, 0x00406474
73 1d ?? jae basic block L8
L2: 57 ?? push edi
L3: 8b 3e ?? mov edi, dword ds:[esi]
85 ff ?? test edi, edi
74 0a ?? je basic block L6
L4: 8b cf ?? mov ecx, edi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L5: ff d7 ?? call edi
L6: 83 c6 04 ?? add esi, 4
81 fe 74 64 40 00 ?? cmp esi, 0x00406474
72 e5 ?? jb basic block L3
L7: 5f ?? pop edi
L8: 5e ?? pop esi
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4030b0 | __RTC_Terminate | 0 |
L1: 56 ?? push esi
be 7c 64 40 00 ?? mov esi, 0x0040647c
8b c6 ?? mov eax, esi
3d 7c 64 40 00 ?? cmp eax, 0x0040647c
73 1d ?? jae basic block L8
L2: 57 ?? push edi
L3: 8b 3e ?? mov edi, dword ds:[esi]
85 ff ?? test edi, edi
74 0a ?? je basic block L6
L4: 8b cf ?? mov ecx, edi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L5: ff d7 ?? call edi
L6: 83 c6 04 ?? add esi, 4
81 fe 7c 64 40 00 ?? cmp esi, 0x0040647c
72 e5 ?? jb basic block L3
L7: 5f ?? pop edi
L8: 5e ?? pop esi
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4030e0 | __except_handler4 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
8b 08 ?? mov ecx, dword ds:[eax]
51 ?? push ecx
e8 82 08 00 00 ?? call function 0x00403970
L2: 83 c4 04 ?? add esp, 4
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
89 02 ?? mov dword ds:[edx], eax
8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>]
50 ?? push eax
8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>]
51 ?? push ecx
8b 55 0c ?? mov edx, dword ss:[ebp + 12]
52 ?? push edx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
68 b0 19 40 00 ?? push function 0x004019b0
68 04 80 40 00 ?? push 0x00408004
e8 eb 06 00 00 ?? call function 0x00403800
L3: 83 c4 18 ?? add esp, 0x18<24>
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403120 | @_guard_check_icall_nop@4 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403130 | _ReadNoFence | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
8b 08 ?? mov ecx, dword ds:[eax]
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403150 | _ReadPointerNoFence | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 d4 ff ff ff ?? call function 0x00403130
L2: 83 c4 04 ?? add esp, 4
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403170 | __InlineInterlockedExchangePointer | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 0c ?? mov eax, dword ss:[ebp + 12]
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
87 01 ?? xchg dword ds:[ecx], eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403180 | ___castguard_check_failure_debugbreak | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 04 01 00 00 ?? call function 0x00403290
L2: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 01 ?? je basic block L4
L3: cc ?? int3
L4: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4031a0 | ___castguard_check_failure_fastfail | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 e4 00 00 00 ?? call function 0x00403290
L2: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 07 ?? je basic block L4
L3: b9 41 00 00 00 ?? mov ecx, 0x00000041<65>
cd 29 ?? int 0x29<41>
L4: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4031c0 | ___castguard_check_failure_nop | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4031d0 | ___castguard_check_failure_os_handled | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 b4 00 00 00 ?? call function 0x00403290
L2: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 0c ?? je basic block L5
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
e8 14 00 00 00 ?? call function 0x00403200
L4: 83 c4 04 ?? add esp, 4
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403200 | __castguard_check_failure_os_handled_wrapper | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 3d 84 51 40 00 00 ?? cmp dword ds:[0x00405184], 0
74 0f ?? je basic block L4
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
8b 0d 84 51 40 00 ?? mov ecx, dword ds:[0x00405184]
ff d1 ?? call ecx
L3: 83 c4 04 ?? add esp, 4
L4: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403220 | ___castguard_check_failure_user_handled | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 64 00 00 00 ?? call function 0x00403290
L2: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 0c ?? je basic block L5
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
e8 14 00 00 00 ?? call function 0x00403250
L4: 83 c4 04 ?? add esp, 4
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403250 | __castguard_check_failure_user_handled_wrapper | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
a1 5c 84 40 00 ?? mov eax, dword ds:[0x0040845c]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
83 7d fc 00 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 0
74 19 ?? je basic block L5
L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
89 55 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], edx
8b 4d f8 ?? mov ecx, dword ss:[ebp + 0xf8<248,-8>]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L3: ff 55 f8 ?? call dword ss:[ebp + 0xf8<248,-8>]
L4: 83 c4 04 ?? add esp, 4
L5: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403290 | __castguard_compat_check | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 10 ?? sub esp, 0x10<16>
c7 45 fc 00 5e 40 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0x00405e00
c7 45 f4 00 5e 40 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 0x00405e00
8b 45 f4 ?? mov eax, dword ss:[ebp + 0xf4<244,-12>]
2b 45 fc ?? sub eax, dword ss:[ebp + 0xfc<252,-4>]
89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
2b 4d fc ?? sub ecx, dword ss:[ebp + 0xfc<252,-4>]
3b 4d f0 ?? cmp ecx, dword ss:[ebp + 0xf0<240,-16>]
77 09 ?? ja basic block L3
L2: c7 45 f8 01 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 1
eb 07 ?? jmp basic block L4
L3: c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0
L4: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4032d0 | ___castguard_set_user_handler | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
68 5c 84 40 00 ?? push 0x0040845c
e8 8e fe ff ff ?? call function 0x00403170
L2: 83 c4 08 ?? add esp, 8
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4032f0 | ___castguard_slow_path_check_debugbreak | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>]
50 ?? push eax
8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
51 ?? push ecx
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
52 ?? push edx
e8 ec 00 00 00 ?? call function 0x004033f0
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 11 ?? je basic block L6
L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 7c ff ff ff ?? call function 0x00403290
L4: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 01 ?? je basic block L6
L5: cc ?? int3
L6: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403320 | ___castguard_slow_path_check_fastfail | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>]
50 ?? push eax
8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
51 ?? push ecx
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
52 ?? push edx
e8 bc 00 00 00 ?? call function 0x004033f0
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 17 ?? je basic block L6
L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 4c ff ff ff ?? call function 0x00403290
L4: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 07 ?? je basic block L6
L5: b9 41 00 00 00 ?? mov ecx, 0x00000041<65>
cd 29 ?? int 0x29<41>
L6: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403360 | ___castguard_slow_path_check_nop | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403370 | ___castguard_slow_path_check_os_handled | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>]
50 ?? push eax
8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
51 ?? push ecx
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
52 ?? push edx
e8 6c 00 00 00 ?? call function 0x004033f0
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 1c ?? je basic block L7
L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 fc fe ff ff ?? call function 0x00403290
L4: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 0c ?? je basic block L7
L5: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
e8 5c fe ff ff ?? call function 0x00403200
L6: 83 c4 04 ?? add esp, 4
L7: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4033b0 | ___castguard_slow_path_check_user_handled | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>]
50 ?? push eax
8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
51 ?? push ecx
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
52 ?? push edx
e8 2c 00 00 00 ?? call function 0x004033f0
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 1c ?? je basic block L7
L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 bc fe ff ff ?? call function 0x00403290
L4: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 0c ?? je basic block L7
L5: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
51 ?? push ecx
e8 6c fe ff ff ?? call function 0x00403250
L6: 83 c4 04 ?? add esp, 4
L7: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4033f0 | __castguard_slow_path_compat_check | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
c7 45 f8 00 5e 40 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0x00405e00
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
03 45 0c ?? add eax, dword ss:[ebp + 12]
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
2b 4d f4 ?? sub ecx, dword ss:[ebp + 0xf4<244,-12>]
3b 4d 10 ?? cmp ecx, dword ss:[ebp + 0x10<16>]
76 09 ?? jbe basic block L3
L2: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1
eb 07 ?? jmp basic block L4
L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403430 | __guard_icall_checks_enforced | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
68 7c 51 40 00 ?? push 0x0040517c<" 1@">
e8 12 fd ff ff ?? call function 0x00403150
L2: 83 c4 04 ?? add esp, 4
3d 20 31 40 00 ?? cmp eax, function 0x00403120
74 09 ?? je basic block L4
L3: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1
eb 07 ?? jmp basic block L5
L4: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
L5: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403460 | ___isa_available_init | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 48 ?? sub esp, 0x48<72>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
53 ?? push ebx
56 ?? push esi
c7 05 60 84 40 00 00 00 ?? mov dword ds:[0x00408460], 0
00 00
a1 10 80 40 00 ?? mov eax, dword ds:[0x00408010]
83 c8 01 ?? or eax, 1
a3 10 80 40 00 ?? mov dword ds:[0x00408010], eax
6a 0a ?? push 10
ff 15 10 50 40 00 ?? call dword ds:[0x00405010]
L2: 85 c0 ?? test eax, eax
75 07 ?? jne basic block L4
L3: 33 c0 ?? xor eax, eax
e9 e7 02 00 00 ?? jmp basic block L29
L4: c7 45 f0 00 00 00 00 ?? mov dword ss:[ebp + 0xf0<240,-16>], 0
c7 45 f4 00 00 00 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 0
c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0
8d 75 e0 ?? lea esi, ss:[ebp + 0xe0<224,-32>]
33 c0 ?? xor eax, eax
33 c9 ?? xor ecx, ecx
0f a2 ?? cpuid
89 06 ?? mov dword ds:[esi], eax
89 5e 04 ?? mov dword ds:[esi + 4], ebx
89 4e 08 ?? mov dword ds:[esi + 8], ecx
89 56 0c ?? mov dword ds:[esi + 12], edx
b9 04 00 00 00 ?? mov ecx, 4
6b d1 00 ?? imul edx, ecx, 0
8b 44 15 e0 ?? mov eax, dword ss:[ebp + edx + 0xe0<224,-32>]
89 45 c8 ?? mov dword ss:[ebp + 0xc8<200,-56>], eax
b9 04 00 00 00 ?? mov ecx, 4
c1 e1 00 ?? shl ecx, 0
8b 54 0d e0 ?? mov edx, dword ss:[ebp + ecx + 0xe0<224,-32>]
81 f2 47 65 6e 75 ?? xor edx, 0x756e6547
b8 04 00 00 00 ?? mov eax, 4
6b c8 03 ?? imul ecx, eax, 3
8b 44 0d e0 ?? mov eax, dword ss:[ebp + ecx + 0xe0<224,-32>]
35 69 6e 65 49 ?? xor eax, 0x49656e69
0b d0 ?? or edx, eax
b9 04 00 00 00 ?? mov ecx, 4
d1 e1 ?? shl ecx, 1
8b 44 0d e0 ?? mov eax, dword ss:[ebp + ecx + 0xe0<224,-32>]
35 6e 74 65 6c ?? xor eax, 0x6c65746e
0b d0 ?? or edx, eax
75 09 ?? jne basic block L6
L5: c7 45 d4 01 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 1
eb 07 ?? jmp basic block L7
L6: c7 45 d4 00 00 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0
L7: 8a 4d d4 ?? mov cl, byte ss:[ebp + 0xd4<212,-44>]
88 4d df ?? mov byte ss:[ebp + 0xdf<223,-33>], cl
8d 75 e0 ?? lea esi, ss:[ebp + 0xe0<224,-32>]
b8 01 00 00 00 ?? mov eax, 1
33 c9 ?? xor ecx, ecx
0f a2 ?? cpuid
89 06 ?? mov dword ds:[esi], eax
89 5e 04 ?? mov dword ds:[esi + 4], ebx
89 4e 08 ?? mov dword ds:[esi + 8], ecx
89 56 0c ?? mov dword ds:[esi + 12], edx
ba 04 00 00 00 ?? mov edx, 4
6b c2 00 ?? imul eax, edx, 0
8b 4c 05 e0 ?? mov ecx, dword ss:[ebp + eax + 0xe0<224,-32>]
89 4d d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], ecx
0f b6 55 df ?? movzx edx, byte ss:[ebp + 0xdf<223,-33>]
85 d2 ?? test edx, edx
74 6f ?? je basic block L15
L8: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>]
25 f0 3f ff 0f ?? and eax, 0x0fff3ff0
3d c0 06 01 00 ?? cmp eax, 0x000106c0
74 53 ?? je basic block L14
L9: 8b 4d d8 ?? mov ecx, dword ss:[ebp + 0xd8<216,-40>]
81 e1 f0 3f ff 0f ?? and ecx, 0x0fff3ff0
81 f9 60 06 02 00 ?? cmp ecx, 0x00020660
74 42 ?? je basic block L14
L10: 8b 55 d8 ?? mov edx, dword ss:[ebp + 0xd8<216,-40>]
81 e2 f0 3f ff 0f ?? and edx, 0x0fff3ff0
81 fa 70 06 02 00 ?? cmp edx, 0x00020670
74 31 ?? je basic block L14
L11: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>]
25 f0 3f ff 0f ?? and eax, 0x0fff3ff0
3d 50 06 03 00 ?? cmp eax, 0x00030650
74 22 ?? je basic block L14
L12: 8b 4d d8 ?? mov ecx, dword ss:[ebp + 0xd8<216,-40>]
81 e1 f0 3f ff 0f ?? and ecx, 0x0fff3ff0
81 f9 60 06 03 00 ?? cmp ecx, 0x00030660
74 11 ?? je basic block L14
L13: 8b 55 d8 ?? mov edx, dword ss:[ebp + 0xd8<216,-40>]
81 e2 f0 3f ff 0f ?? and edx, 0x0fff3ff0
81 fa 70 06 03 00 ?? cmp edx, 0x00030670
75 0d ?? jne basic block L15
L14: a1 64 84 40 00 ?? mov eax, dword ds:[0x00408464]
83 c8 01 ?? or eax, 1
a3 64 84 40 00 ?? mov dword ds:[0x00408464], eax
L15: b9 04 00 00 00 ?? mov ecx, 4
6b d1 03 ?? imul edx, ecx, 3
b8 04 00 00 00 ?? mov eax, 4
6b c8 00 ?? imul ecx, eax, 0
8b 54 15 e0 ?? mov edx, dword ss:[ebp + edx + 0xe0<224,-32>]
89 54 0d f0 ?? mov dword ss:[ebp + ecx + 0xf0<240,-16>], edx
b8 04 00 00 00 ?? mov eax, 4
d1 e0 ?? shl eax, 1
b9 04 00 00 00 ?? mov ecx, 4
c1 e1 00 ?? shl ecx, 0
8b 54 05 e0 ?? mov edx, dword ss:[ebp + eax + 0xe0<224,-32>]
89 54 0d f0 ?? mov dword ss:[ebp + ecx + 0xf0<240,-16>], edx
83 7d c8 07 ?? cmp dword ss:[ebp + 0xc8<200,-56>], 7
7c 51 ?? jl basic block L18
L16: 8d 75 e0 ?? lea esi, ss:[ebp + 0xe0<224,-32>]
b8 07 00 00 00 ?? mov eax, 7
33 c9 ?? xor ecx, ecx
0f a2 ?? cpuid
89 06 ?? mov dword ds:[esi], eax
89 5e 04 ?? mov dword ds:[esi + 4], ebx
89 4e 08 ?? mov dword ds:[esi + 8], ecx
89 56 0c ?? mov dword ds:[esi + 12], edx
b8 04 00 00 00 ?? mov eax, 4
c1 e0 00 ?? shl eax, 0
b9 04 00 00 00 ?? mov ecx, 4
d1 e1 ?? shl ecx, 1
8b 54 05 e0 ?? mov edx, dword ss:[ebp + eax + 0xe0<224,-32>]
89 54 0d f0 ?? mov dword ss:[ebp + ecx + 0xf0<240,-16>], edx
b8 04 00 00 00 ?? mov eax, 4
c1 e0 00 ?? shl eax, 0
8b 4c 05 e0 ?? mov ecx, dword ss:[ebp + eax + 0xe0<224,-32>]
81 e1 00 02 00 00 ?? and ecx, 0x00000200<512>
74 0f ?? je basic block L18
L17: 8b 15 64 84 40 00 ?? mov edx, dword ds:[0x00408464]
83 ca 02 ?? or edx, 2
89 15 64 84 40 00 ?? mov dword ds:[0x00408464], edx
L18: c7 05 60 84 40 00 01 00 ?? mov dword ds:[0x00408460], 1
00 00
a1 10 80 40 00 ?? mov eax, dword ds:[0x00408010]
83 c8 02 ?? or eax, 2
a3 10 80 40 00 ?? mov dword ds:[0x00408010], eax
b9 04 00 00 00 ?? mov ecx, 4
c1 e1 00 ?? shl ecx, 0
8b 54 0d f0 ?? mov edx, dword ss:[ebp + ecx + 0xf0<240,-16>]
81 e2 00 00 10 00 ?? and edx, 0x00100000
0f 84 0c 01 00 00 ?? je basic block L28
L19: c7 05 60 84 40 00 02 00 ?? mov dword ds:[0x00408460], 2
00 00
a1 10 80 40 00 ?? mov eax, dword ds:[0x00408010]
83 c8 04 ?? or eax, 4
a3 10 80 40 00 ?? mov dword ds:[0x00408010], eax
b9 04 00 00 00 ?? mov ecx, 4
c1 e1 00 ?? shl ecx, 0
8b 54 0d f0 ?? mov edx, dword ss:[ebp + ecx + 0xf0<240,-16>]
81 e2 00 00 00 08 ?? and edx, 0x08000000
0f 84 dd 00 00 00 ?? je basic block L28
L20: b8 04 00 00 00 ?? mov eax, 4
c1 e0 00 ?? shl eax, 0
8b 4c 05 f0 ?? mov ecx, dword ss:[ebp + eax + 0xf0<240,-16>]
81 e1 00 00 00 10 ?? and ecx, 0x10000000
0f 84 c5 00 00 00 ?? je basic block L28
L21: 33 c9 ?? xor ecx, ecx
0f 01 d0 ?? xgetbv
89 45 cc ?? mov dword ss:[ebp + 0xcc<204,-52>], eax
89 55 d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], edx
8b 55 cc ?? mov edx, dword ss:[ebp + 0xcc<204,-52>]
8b 45 d0 ?? mov eax, dword ss:[ebp + 0xd0<208,-48>]
83 e2 06 ?? and edx, 6
83 e0 00 ?? and eax, 0
89 55 c0 ?? mov dword ss:[ebp + 0xc0<192,-64>], edx
89 45 c4 ?? mov dword ss:[ebp + 0xc4<196,-60>], eax
83 7d c0 06 ?? cmp dword ss:[ebp + 0xc0<192,-64>], 6
0f 85 9e 00 00 00 ?? jne basic block L28
L22: 83 7d c4 00 ?? cmp dword ss:[ebp + 0xc4<196,-60>], 0
0f 85 94 00 00 00 ?? jne basic block L28
L23: c7 05 60 84 40 00 03 00 ?? mov dword ds:[0x00408460], 3
00 00
8b 0d 10 80 40 00 ?? mov ecx, dword ds:[0x00408010]
83 c9 08 ?? or ecx, 8
89 0d 10 80 40 00 ?? mov dword ds:[0x00408010], ecx
ba 04 00 00 00 ?? mov edx, 4
d1 e2 ?? shl edx, 1
8b 44 15 f0 ?? mov eax, dword ss:[ebp + edx + 0xf0<240,-16>]
83 e0 20 ?? and eax, 0x20<32>
74 6b ?? je basic block L28
L24: c7 05 60 84 40 00 05 00 ?? mov dword ds:[0x00408460], 5
00 00
8b 0d 10 80 40 00 ?? mov ecx, dword ds:[0x00408010]
83 c9 20 ?? or ecx, 0x20<32>
89 0d 10 80 40 00 ?? mov dword ds:[0x00408010], ecx
ba 04 00 00 00 ?? mov edx, 4
d1 e2 ?? shl edx, 1
8b 44 15 f0 ?? mov eax, dword ss:[ebp + edx + 0xf0<240,-16>]
25 00 00 03 d0 ?? and eax, 0xd0030000
3d 00 00 03 d0 ?? cmp eax, 0xd0030000
75 3b ?? jne basic block L28
L25: 8b 4d cc ?? mov ecx, dword ss:[ebp + 0xcc<204,-52>]
8b 55 d0 ?? mov edx, dword ss:[ebp + 0xd0<208,-48>]
81 e1 e0 00 00 00 ?? and ecx, 0x000000e0<224>
83 e2 00 ?? and edx, 0
89 4d b8 ?? mov dword ss:[ebp + 0xb8<184,-72>], ecx
89 55 bc ?? mov dword ss:[ebp + 0xbc<188,-68>], edx
81 7d b8 e0 00 00 00 ?? cmp dword ss:[ebp + 0xb8<184,-72>], 0x000000e0<224>
75 1d ?? jne basic block L28
L26: 83 7d bc 00 ?? cmp dword ss:[ebp + 0xbc<188,-68>], 0
75 17 ?? jne basic block L28
L27: c7 05 60 84 40 00 06 00 ?? mov dword ds:[0x00408460], 6
00 00
a1 10 80 40 00 ?? mov eax, dword ds:[0x00408010]
83 c8 40 ?? or eax, 0x40<64>
a3 10 80 40 00 ?? mov dword ds:[0x00408010], eax
L28: 33 c0 ?? xor eax, eax
L29: 5e ?? pop esi
5b ?? pop ebx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 21 e2 ff ff ?? call function 0x004019b0
L30: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.