Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
int64
0
1
Disassembly
stringlengths
16
68.6k
./vs2022/wpo/Debug/oopoly.exe
0x4037a0
___scrt_is_ucrt_dll_in_use
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d 14 80 40 00 00 ?? cmp dword ds:[0x00408014], 0 74 09 ?? je basic block L3 L2: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 eb 07 ?? jmp basic block L4 L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403910
___acrt_initialize
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403910
___scrt_stub_for_acrt_initialize
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403910
___vcrt_initialize
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403920
___acrt_thread_attach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403920
___scrt_stub_for_acrt_thread_attach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403920
___vcrt_thread_attach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403930
___acrt_thread_detach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403930
___scrt_stub_for_acrt_thread_detach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403930
___vcrt_thread_detach
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403940
___acrt_uninitialize
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403940
___scrt_stub_for_acrt_uninitialize
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403940
___vcrt_uninitialize
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403950
___acrt_uninitialize_critical
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403950
___scrt_stub_for_acrt_uninitialize_critical
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403950
___vcrt_uninitialize_critical
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403960
___scrt_stub_for_is_c_termination_complete
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403960
__is_c_termination_complete
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403970
__filter_x86_sse2_floating_point_exception
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 54 ?? sub esp, 0x54<84> 83 3d 60 84 40 00 01 ?? cmp dword ds:[0x00408460], 1 7d 08 ?? jge basic block L3 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] e9 19 01 00 00 ?? jmp basic block L19 L3: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4 74 11 ?? je basic block L6 L4: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5 74 08 ?? je basic block L6 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] e9 ff 00 00 00 ?? jmp basic block L19 L6: c7 45 f4 01 00 00 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 1 c7 45 f0 02 00 00 00 ?? mov dword ss:[ebp + 0xf0<240,-16>], 2 c7 45 ec 04 00 00 00 ?? mov dword ss:[ebp + 0xec<236,-20>], 4 c7 45 e8 08 00 00 00 ?? mov dword ss:[ebp + 0xe8<232,-24>], 8 c7 45 e4 10 00 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00000010<16> c7 45 e0 20 00 00 00 ?? mov dword ss:[ebp + 0xe0<224,-32>], 0x00000020<32> c7 45 dc 3f 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x0000003f<63> c7 45 d8 80 00 00 00 ?? mov dword ss:[ebp + 0xd8<216,-40>], 0x00000080<128> c7 45 d4 00 01 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0x00000100<256> c7 45 d0 00 02 00 00 ?? mov dword ss:[ebp + 0xd0<208,-48>], 0x00000200<512> c7 45 cc 00 04 00 00 ?? mov dword ss:[ebp + 0xcc<204,-52>], 0x00000400<1024> c7 45 c8 00 08 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0x00000800<2048> c7 45 c4 00 10 00 00 ?? mov dword ss:[ebp + 0xc4<196,-60>], 0x00001000<4096> c7 45 c0 81 00 00 00 ?? mov dword ss:[ebp + 0xc0<192,-64>], 0x00000081<129> c7 45 bc 02 01 00 00 ?? mov dword ss:[ebp + 0xbc<188,-68>], 0x00000102<258> c7 45 b8 04 02 00 00 ?? mov dword ss:[ebp + 0xb8<184,-72>], 0x00000204<516> c7 45 b4 08 04 00 00 ?? mov dword ss:[ebp + 0xb4<180,-76>], 0x00000408<1032> c7 45 b0 10 08 00 00 ?? mov dword ss:[ebp + 0xb0<176,-80>], 0x00000810<2064> c7 45 ac 20 10 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 0x00001020<4128> 0f ae 5d f8 ?? stmxcsr dword ss:[ebp + 0xf8<248,-8>] 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 83 f0 3f ?? xor eax, 0x3f<63> 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 81 e1 81 00 00 00 ?? and ecx, 0x00000081<129> 75 07 ?? jne basic block L8 L7: b8 90 00 00 c0 ?? mov eax, 0xc0000090 eb 5b ?? jmp basic block L19 L8: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 e2 04 02 00 00 ?? and edx, 0x00000204<516> 75 07 ?? jne basic block L10 L9: b8 8e 00 00 c0 ?? mov eax, 0xc000008e eb 49 ?? jmp basic block L19 L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 25 02 01 00 00 ?? and eax, 0x00000102<258> 75 07 ?? jne basic block L12 L11: b8 90 00 00 c0 ?? mov eax, 0xc0000090 eb 38 ?? jmp basic block L19 L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 81 e1 08 04 00 00 ?? and ecx, 0x00000408<1032> 75 07 ?? jne basic block L14 L13: b8 91 00 00 c0 ?? mov eax, 0xc0000091 eb 26 ?? jmp basic block L19 L14: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 e2 10 08 00 00 ?? and edx, 0x00000810<2064> 75 07 ?? jne basic block L16 L15: b8 93 00 00 c0 ?? mov eax, 0xc0000093 eb 14 ?? jmp basic block L19 L16: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 25 20 10 00 00 ?? and eax, 0x00001020<4128> 75 07 ?? jne basic block L18 L17: b8 8f 00 00 c0 ?? mov eax, 0xc000008f eb 03 ?? jmp basic block L19 L18: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] L19: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403970
__filter_x86_sse2_floating_point_exception_default
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 54 ?? sub esp, 0x54<84> 83 3d 60 84 40 00 01 ?? cmp dword ds:[0x00408460], 1 7d 08 ?? jge basic block L3 L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] e9 19 01 00 00 ?? jmp basic block L19 L3: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4 74 11 ?? je basic block L6 L4: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5 74 08 ?? je basic block L6 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] e9 ff 00 00 00 ?? jmp basic block L19 L6: c7 45 f4 01 00 00 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 1 c7 45 f0 02 00 00 00 ?? mov dword ss:[ebp + 0xf0<240,-16>], 2 c7 45 ec 04 00 00 00 ?? mov dword ss:[ebp + 0xec<236,-20>], 4 c7 45 e8 08 00 00 00 ?? mov dword ss:[ebp + 0xe8<232,-24>], 8 c7 45 e4 10 00 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00000010<16> c7 45 e0 20 00 00 00 ?? mov dword ss:[ebp + 0xe0<224,-32>], 0x00000020<32> c7 45 dc 3f 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x0000003f<63> c7 45 d8 80 00 00 00 ?? mov dword ss:[ebp + 0xd8<216,-40>], 0x00000080<128> c7 45 d4 00 01 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0x00000100<256> c7 45 d0 00 02 00 00 ?? mov dword ss:[ebp + 0xd0<208,-48>], 0x00000200<512> c7 45 cc 00 04 00 00 ?? mov dword ss:[ebp + 0xcc<204,-52>], 0x00000400<1024> c7 45 c8 00 08 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0x00000800<2048> c7 45 c4 00 10 00 00 ?? mov dword ss:[ebp + 0xc4<196,-60>], 0x00001000<4096> c7 45 c0 81 00 00 00 ?? mov dword ss:[ebp + 0xc0<192,-64>], 0x00000081<129> c7 45 bc 02 01 00 00 ?? mov dword ss:[ebp + 0xbc<188,-68>], 0x00000102<258> c7 45 b8 04 02 00 00 ?? mov dword ss:[ebp + 0xb8<184,-72>], 0x00000204<516> c7 45 b4 08 04 00 00 ?? mov dword ss:[ebp + 0xb4<180,-76>], 0x00000408<1032> c7 45 b0 10 08 00 00 ?? mov dword ss:[ebp + 0xb0<176,-80>], 0x00000810<2064> c7 45 ac 20 10 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 0x00001020<4128> 0f ae 5d f8 ?? stmxcsr dword ss:[ebp + 0xf8<248,-8>] 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 83 f0 3f ?? xor eax, 0x3f<63> 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 81 e1 81 00 00 00 ?? and ecx, 0x00000081<129> 75 07 ?? jne basic block L8 L7: b8 90 00 00 c0 ?? mov eax, 0xc0000090 eb 5b ?? jmp basic block L19 L8: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 e2 04 02 00 00 ?? and edx, 0x00000204<516> 75 07 ?? jne basic block L10 L9: b8 8e 00 00 c0 ?? mov eax, 0xc000008e eb 49 ?? jmp basic block L19 L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 25 02 01 00 00 ?? and eax, 0x00000102<258> 75 07 ?? jne basic block L12 L11: b8 90 00 00 c0 ?? mov eax, 0xc0000090 eb 38 ?? jmp basic block L19 L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 81 e1 08 04 00 00 ?? and ecx, 0x00000408<1032> 75 07 ?? jne basic block L14 L13: b8 91 00 00 c0 ?? mov eax, 0xc0000091 eb 26 ?? jmp basic block L19 L14: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 e2 10 08 00 00 ?? and edx, 0x00000810<2064> 75 07 ?? jne basic block L16 L15: b8 93 00 00 c0 ?? mov eax, 0xc0000093 eb 14 ?? jmp basic block L19 L16: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 25 20 10 00 00 ?? and eax, 0x00001020<4128> 75 07 ?? jne basic block L18 L17: b8 8f 00 00 c0 ?? mov eax, 0xc000008f eb 03 ?? jmp basic block L19 L18: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] L19: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403ab0
_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 3c ?? sub esp, 0x3c<60> 56 ?? push esi 57 ?? push edi 8d 7d c4 ?? lea edi, ss:[ebp + 0xc4<196,-60>] b9 0f 00 00 00 ?? mov ecx, 15 b8 cc cc cc cc ?? mov eax, 0xcccccccc f3 ab ?? rep_stosd a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 6a 04 ?? push 4 e8 e8 de ff ff ?? call function 0x004019c0 L2: 83 c4 04 ?? add esp, 4 89 45 dc ?? mov dword ss:[ebp + 0xdc<220,-36>], eax 83 7d dc 00 ?? cmp dword ss:[ebp + 0xdc<220,-36>], 0 74 14 ?? je basic block L5 L3: 33 c0 ?? xor eax, eax 8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>] 89 01 ?? mov dword ds:[ecx], eax 8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>] e8 fd d5 ff ff ?? call function 0x004010f0 L4: 89 45 cc ?? mov dword ss:[ebp + 0xcc<204,-52>], eax eb 07 ?? jmp basic block L6 L5: c7 45 cc 00 00 00 00 ?? mov dword ss:[ebp + 0xcc<204,-52>], 0 L6: ba 04 00 00 00 ?? mov edx, 4 6b c2 00 ?? imul eax, edx, 0 8b 4d cc ?? mov ecx, dword ss:[ebp + 0xcc<204,-52>] 89 4c 05 ec ?? mov dword ss:[ebp + eax + 0xec<236,-20>], ecx 6a 04 ?? push 4 e8 ab de ff ff ?? call function 0x004019c0 L7: 83 c4 04 ?? add esp, 4 89 45 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], eax 83 7d d8 00 ?? cmp dword ss:[ebp + 0xd8<216,-40>], 0 74 14 ?? je basic block L10 L8: 33 d2 ?? xor edx, edx 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>] 89 10 ?? mov dword ds:[eax], edx 8b 4d d8 ?? mov ecx, dword ss:[ebp + 0xd8<216,-40>] e8 10 d6 ff ff ?? call function 0x00401140 L9: 89 45 c8 ?? mov dword ss:[ebp + 0xc8<200,-56>], eax eb 07 ?? jmp basic block L11 L10: c7 45 c8 00 00 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0 L11: b9 04 00 00 00 ?? mov ecx, 4 c1 e1 00 ?? shl ecx, 0 8b 55 c8 ?? mov edx, dword ss:[ebp + 0xc8<200,-56>] 89 54 0d ec ?? mov dword ss:[ebp + ecx + 0xec<236,-20>], edx 6a 04 ?? push 4 e8 6e de ff ff ?? call function 0x004019c0 L12: 83 c4 04 ?? add esp, 4 89 45 d4 ?? mov dword ss:[ebp + 0xd4<212,-44>], eax 83 7d d4 00 ?? cmp dword ss:[ebp + 0xd4<212,-44>], 0 74 14 ?? je basic block L15 L13: 33 c0 ?? xor eax, eax 8b 4d d4 ?? mov ecx, dword ss:[ebp + 0xd4<212,-44>] 89 01 ?? mov dword ds:[ecx], eax 8b 4d d4 ?? mov ecx, dword ss:[ebp + 0xd4<212,-44>] e8 03 d6 ff ff ?? call function 0x00401170 L14: 89 45 c4 ?? mov dword ss:[ebp + 0xc4<196,-60>], eax eb 07 ?? jmp basic block L16 L15: c7 45 c4 00 00 00 00 ?? mov dword ss:[ebp + 0xc4<196,-60>], 0 L16: ba 04 00 00 00 ?? mov edx, 4 d1 e2 ?? shl edx, 1 8b 45 c4 ?? mov eax, dword ss:[ebp + 0xc4<196,-60>] 89 44 15 ec ?? mov dword ss:[ebp + edx + 0xec<236,-20>], eax c7 45 e4 00 00 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0 eb 09 ?? jmp basic block L17 L17: 83 7d e4 03 ?? cmp dword ss:[ebp + 0xe4<228,-28>], 3 7d 1f ?? jge basic block L21 L18: 8b 55 e4 ?? mov edx, dword ss:[ebp + 0xe4<228,-28>] 8b 44 95 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20> + edx * 4] 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 8b 10 ?? mov edx, dword ds:[eax] 8b f4 ?? mov esi, esp 8b 4c 8d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20> + ecx * 4] 8b 02 ?? mov eax, dword ds:[edx] ff d0 ?? call eax L19: 3b f4 ?? cmp esi, esp e8 04 02 00 00 ?? call function 0x00403dc0 L20: eb d2 ?? jmp 0x00403b90 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 83 c1 01 ?? add ecx, 1 89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx L21: c7 45 e0 00 00 00 00 ?? mov dword ss:[ebp + 0xe0<224,-32>], 0 eb 09 ?? jmp basic block L22 L22: 83 7d e0 03 ?? cmp dword ss:[ebp + 0xe0<224,-32>], 3 7d 1a ?? jge basic block L25 L23: 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>] 8b 44 95 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20> + edx * 4] 89 45 d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], eax 6a 04 ?? push 4 8b 4d d0 ?? mov ecx, dword ss:[ebp + 0xd0<208,-48>] 51 ?? push ecx e8 25 de ff ff ?? call function 0x00401a10 L24: 83 c4 08 ?? add esp, 8 eb d7 ?? jmp 0x00403bc7 8b 4d e0 ?? mov ecx, dword ss:[ebp + 0xe0<224,-32>] 83 c1 01 ?? add ecx, 1 89 4d e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], ecx L25: 33 c0 ?? xor eax, eax 52 ?? push edx 8b cd ?? mov ecx, ebp 50 ?? push eax 8d 15 20 3c 40 00 ?? lea edx, ds:[0x00403c20] e8 5f 01 00 00 ?? call function 0x00403d60 L26: 58 ?? pop eax 5a ?? pop edx 5f ?? pop edi 5e ?? pop esi 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 a1 dd ff ff ?? call function 0x004019b0 L27: 83 c4 3c ?? add esp, 0x3c<60> 3b ec ?? cmp ebp, esp e8 a7 01 00 00 ?? call function 0x00403dc0 L28: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403c40
@_RTC_AllocaHelper@12
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 53 ?? push ebx 56 ?? push esi 8b f1 ?? mov esi, ecx 8b da ?? mov ebx, edx 85 f6 ?? test esi, esi 74 1f ?? je basic block L5 L2: 85 db ?? test ebx, ebx 74 1b ?? je basic block L5 L3: 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 85 d2 ?? test edx, edx 74 14 ?? je basic block L5 L4: 57 ?? push edi b0 cc ?? mov al, 0xcc<204,-52> 8b fe ?? mov edi, esi 8b cb ?? mov ecx, ebx f3 aa ?? rep_stosb 8b 02 ?? mov eax, dword ds:[edx] 89 46 04 ?? mov dword ds:[esi + 4], eax 89 5e 0c ?? mov dword ds:[esi + 12], ebx 89 32 ?? mov dword ds:[edx], esi 5f ?? pop edi L5: 5e ?? pop esi 5b ?? pop ebx 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/Debug/oopoly.exe
0x403c80
@_RTC_CheckStackVars2@12
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 85 d2 ?? test edx, edx 74 4f ?? je basic block L10 L2: 33 ff ?? xor edi, edi 39 3a ?? cmp dword ds:[edx], edi 7e 49 ?? jle basic block L10 L3: 53 ?? push ebx 33 db ?? xor ebx, ebx 8b f2 ?? mov esi, edx 8d 49 00 ?? lea ecx, ds:[ecx + 0] L4: 8b 4e 04 ?? mov ecx, dword ds:[esi + 4] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 14 19 ?? mov edx, dword ds:[ecx + ebx] 81 7c 02 fc cc cc cc cc ?? cmp dword ds:[edx + eax + 0xfc<252,-4>], 0xcccccccc 75 12 ?? jne basic block L6 L5: 8b 44 19 04 ?? mov eax, dword ds:[ecx + ebx + 4] 03 c2 ?? add eax, edx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 3c 10 cc cc cc cc ?? cmp dword ds:[eax + edx], 0xcccccccc 74 10 ?? je basic block L8 L6: ff 74 19 08 ?? push dword ds:[ecx + ebx + 8] 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 50 ?? push eax e8 ee 02 00 00 ?? call function 0x00403fc0 L7: 83 c4 08 ?? add esp, 8 L8: 47 ?? inc edi 83 c3 0c ?? add ebx, 12 3b 3e ?? cmp edi, dword ds:[esi] 7c c3 ?? jl basic block L4 L9: 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 5b ?? pop ebx L10: 33 ff ?? xor edi, edi 8b c6 ?? mov eax, esi 85 f6 ?? test esi, esi 74 63 ?? je basic block L24 L11: 8d a4 24 00 00 00 00 ?? lea esp, ss:[esp + 0] L12: 8b 40 04 ?? mov eax, dword ds:[eax + 4] 47 ?? inc edi 85 c0 ?? test eax, eax L13: 75 f8 ?? jne basic block L12 L14: 81 3e cc cc cc cc ?? cmp dword ds:[esi], 0xcccccccc 75 1b ?? jne basic block L18 L15: 81 7e 14 cc cc cc cc ?? cmp dword ds:[esi + 0x14<20>], 0xcccccccc 75 12 ?? jne basic block L18 L16: 81 7e 18 cc cc cc cc ?? cmp dword ds:[esi + 0x18<24>], 0xcccccccc 75 09 ?? jne basic block L18 L17: 81 7e 1c cc cc cc cc ?? cmp dword ds:[esi + 0x1c<28>], 0xcccccccc 74 0e ?? je basic block L20 L18: 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 57 ?? push edi 56 ?? push esi 50 ?? push eax e8 5a 01 00 00 ?? call function 0x00403e80 L19: 83 c4 0c ?? add esp, 12 L20: 8b 46 0c ?? mov eax, dword ds:[esi + 12] 81 7c 30 fc cc cc cc cc ?? cmp dword ds:[eax + esi + 0xfc<252,-4>], 0xcccccccc 74 0e ?? je basic block L23 L21: 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 57 ?? push edi 56 ?? push esi 50 ?? push eax e8 3f 01 00 00 ?? call function 0x00403e80 L22: 83 c4 0c ?? add esp, 12 L23: 8b 76 04 ?? mov esi, dword ds:[esi + 4] 4f ?? dec edi 85 f6 ?? test esi, esi 75 ac ?? jne basic block L14 L24: 5f ?? pop edi 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/Debug/oopoly.exe
0x403d60
@_RTC_CheckStackVars@8
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b da ?? mov ebx, edx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 56 ?? push esi 33 f6 ?? xor esi, esi 39 33 ?? cmp dword ds:[ebx], esi 7e 41 ?? jle basic block L9 L2: 57 ?? push edi 33 ff ?? xor edi, edi L3: 8b 4b 04 ?? mov ecx, dword ds:[ebx + 4] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 14 39 ?? mov edx, dword ds:[ecx + edi] 81 7c 02 fc cc cc cc cc ?? cmp dword ds:[edx + eax + 0xfc<252,-4>], 0xcccccccc 75 12 ?? jne basic block L5 L4: 8b 44 39 04 ?? mov eax, dword ds:[ecx + edi + 4] 03 c2 ?? add eax, edx 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 81 3c 10 cc cc cc cc ?? cmp dword ds:[eax + edx], 0xcccccccc 74 10 ?? je basic block L7 L5: ff 74 39 08 ?? push dword ds:[ecx + edi + 8] 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 50 ?? push eax e8 1a 02 00 00 ?? call function 0x00403fc0 L6: 83 c4 08 ?? add esp, 8 L7: 46 ?? inc esi 83 c7 0c ?? add edi, 12 3b 33 ?? cmp esi, dword ds:[ebx] 7c c3 ?? jl basic block L3 L8: 5f ?? pop edi L9: 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403dc0
__RTC_CheckEsp
0
L1: 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 00 ?? sub esp, 0 50 ?? push eax 52 ?? push edx 53 ?? push ebx 56 ?? push esi 57 ?? push edi 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 6a 00 ?? push 0 50 ?? push eax e8 97 01 00 00 ?? call function 0x00403f70 L4: 83 c4 08 ?? add esp, 8 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 5a ?? pop edx 58 ?? pop eax 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403df0
DebuggerProbe
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 c7 45 e4 01 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001001<4097> e8 ea 04 00 00 ?? call function 0x00404300 L2: 83 c4 04 ?? add esp, 4 80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0 0f 95 c0 ?? setne al 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403e30
DebuggerRuntime
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 1c ?? sub esp, 0x1c<28> 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax 8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0 c7 45 e4 02 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001002<4098> e8 98 04 00 00 ?? call function 0x00404300 L2: 83 c4 04 ?? add esp, 4 80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0 0f 95 c0 ?? setne al 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403e80
?_RTC_AllocaFailure@@YAXPAXPAU_RTC_ALLOCA_NODE@@H@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 44 01 00 00 ?? sub esp, 0x00000144<324> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 53 ?? push ebx 8b 5d 0c ?? mov ebx, dword ss:[ebp + 12] 57 ?? push edi 8b 3d 28 80 40 00 ?? mov edi, dword ds:[0x00408028] 89 85 bc fe ff ff ?? mov dword ss:[ebp + 0xfffffebc<4294966972,-324>], eax 83 ff ff ?? cmp edi, 0xff<255,-1> 0f 84 a6 00 00 00 ?? je basic block L10 L2: 85 db ?? test ebx, ebx 75 21 ?? jne basic block L6 L3: 68 c8 58 40 00 ?? push 0x004058c8<"Stack area around _alloca"+47 more> 6a 04 ?? push 4 57 ?? push edi 50 ?? push eax e8 3e 02 00 00 ?? call function 0x00404100 L4: 83 c4 10 ?? add esp, 0x10<16> 5f ?? pop edi 5b ?? pop ebx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 df da ff ff ?? call function 0x004019b0 L5: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L6: 8b 43 0c ?? mov eax, dword ds:[ebx + 12] 56 ?? push esi 83 e8 24 ?? sub eax, 0x24<36> 8d 73 20 ?? lea esi, ds:[ebx + 0x20<32>] 50 ?? push eax 56 ?? push esi 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 50 ?? push eax e8 82 01 00 00 ?? call function 0x00404070 L7: 68 14 59 40 00 ?? push 0x00405914<"\n"> 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 68 18 59 40 00 ?? push 0x00405918<"> "> 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 50 ?? push eax 8b 43 0c ?? mov eax, dword ds:[ebx + 12] 68 1c 59 40 00 ?? push 0x0040591c<"\nData: <"> ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 83 e8 24 ?? sub eax, 0x24<36> 68 28 59 40 00 ?? push 0x00405928<"\nAllocation number within"+16 more> 50 ?? push eax 68 54 59 40 00 ?? push 0x00405954<"\nSize: "> 56 ?? push esi 68 5c 59 40 00 ?? push 0x0040595c<"\nAddress: 0x"> 68 70 59 40 00 ?? push 0x00405970<"Stack area around _alloca"+46 more> 68 b8 59 40 00 ?? push 0x004059b8<"%s%s%p%s%zd%s%d%s%s%s%s%s"> 8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>] 68 f4 00 00 00 ?? push 0x000000f4<244> 50 ?? push eax e8 26 05 00 00 ?? call function 0x00404460 L8: 83 c4 4c ?? add esp, 0x4c<76> 8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>] 50 ?? push eax 6a 04 ?? push 4 57 ?? push edi ff b5 bc fe ff ff ?? push dword ss:[ebp + 0xfffffebc<4294966972,-324>] e8 ae 01 00 00 ?? call function 0x00404100 L9: 83 c4 10 ?? add esp, 0x10<16> 5e ?? pop esi L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 4e da ff ff ?? call function 0x004019b0 L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403f70
?_RTC_Failure@@YAXPAXH@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 83 f8 04 ?? cmp eax, 4 77 23 ?? ja basic block L5 L2: 8b 0c 85 18 80 40 00 ?? mov ecx, dword ds:[0x00408018 + eax * 4] 8b 14 85 58 54 40 00 ?? mov edx, dword ds:[0x00405458 + eax * 4] 83 f9 ff ?? cmp ecx, 0xff<255,-1> 74 2e ?? je basic block L7 L3: 52 ?? push edx 50 ?? push eax 51 ?? push ecx ff 75 08 ?? push dword ss:[ebp + 8] e8 67 01 00 00 ?? call function 0x00404100 L4: 83 c4 10 ?? add esp, 0x10<16> 5d ?? pop ebp c3 ?? ret L5: 8b 15 6c 54 40 00 ?? mov edx, dword ds:[0x0040546c<"|W@">] b8 05 00 00 00 ?? mov eax, 5 52 ?? push edx 50 ?? push eax b9 01 00 00 00 ?? mov ecx, 1 51 ?? push ecx ff 75 08 ?? push dword ss:[ebp + 8] e8 47 01 00 00 ?? call function 0x00404100 L6: 83 c4 10 ?? add esp, 0x10<16> L7: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x403fc0
?_RTC_StackFailure@@YAXPAXPBD@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 8b 5d 08 ?? mov ebx, dword ss:[ebp + 8] 56 ?? push esi 8b 75 0c ?? mov esi, dword ss:[ebp + 12] 57 ?? push edi 8b 3d 20 80 40 00 ?? mov edi, dword ds:[0x00408020] 83 ff ff ?? cmp edi, 0xff<255,-1> 74 73 ?? je basic block L12 L2: 80 3e 00 ?? cmp byte ds:[esi], 0 74 5c ?? je basic block L9 L3: 56 ?? push esi e8 ee 00 00 00 ?? call function 0x004040e0 L4: 83 c0 2d ?? add eax, 0x2d<45> 83 c4 04 ?? add esp, 4 3d 00 04 00 00 ?? cmp eax, 0x00000400<1024> 77 49 ?? ja basic block L9 L5: 68 88 54 40 00 ?? push 0x00405488<"Stack around the variable '"> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 98 0d 00 00 ?? call function 0x00404dad L6: 56 ?? push esi 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 8c 0d 00 00 ?? call function 0x00404db3 L7: 68 a4 54 40 00 ?? push 0x004054a4<"' was corrupted."> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 76 0d 00 00 ?? call function 0x00404db3 L8: 83 c4 24 ?? add esp, 0x24<36> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] eb 05 ?? jmp basic block L10 L9: b8 98 58 40 00 ?? mov eax, 0x00405898<"Stack corrupted near unkn"+12 more> L10: 50 ?? push eax 6a 02 ?? push 2 57 ?? push edi 53 ?? push ebx e8 a9 00 00 00 ?? call function 0x00404100 L11: 83 c4 10 ?? add esp, 0x10<16> L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 49 d9 ff ff ?? call function 0x004019b0 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404070
_getMemBlockDataString
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 53 ?? push ebx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 33 d2 ?? xor edx, edx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 33 ff ?? xor edi, edi 2b de ?? sub ebx, esi 89 5d 10 ?? mov dword ss:[ebp + 0x10<16>], ebx L2: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx 83 f8 10 ?? cmp eax, 0x10<16> 72 05 ?? jb basic block L4 L3: b8 10 00 00 00 ?? mov eax, 0x00000010<16> L4: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 03 cf ?? add ecx, edi 3b d0 ?? cmp edx, eax 73 2c ?? jae basic block L7 L5: 8a 1c 33 ?? mov bl, byte ds:[ebx + esi] 0f b6 c3 ?? movzx eax, bl 50 ?? push eax b8 31 00 00 00 ?? mov eax, 0x00000031<49> 68 c0 58 40 00 ?? push 0x004058c0<"%.2X "> 2b c7 ?? sub eax, edi 50 ?? push eax 51 ?? push ecx e8 a7 03 00 00 ?? call function 0x00404460 L6: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>] 83 c4 10 ?? add esp, 0x10<16> 88 1e ?? mov byte ds:[esi], bl 42 ?? inc edx 8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>] 46 ?? inc esi 83 c7 03 ?? add edi, 3 eb bb ?? jmp basic block L2 L7: 5f ?? pop edi c6 06 00 ?? mov byte ds:[esi], 0 5e ?? pop esi c6 01 00 ?? mov byte ds:[ecx], 0 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4040e0
_strlen_priv
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 8b c2 ?? mov eax, edx L2: 8a 08 ?? mov cl, byte ds:[eax] 40 ?? inc eax 84 c9 ?? test cl, cl L3: 75 f9 ?? jne basic block L2 L4: 2b c2 ?? sub eax, edx 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404100
failwithmessage
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 3c 0e 00 00 ?? sub esp, 0x00000e3c<3644> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>] 53 ?? push ebx 8b 5d 14 ?? mov ebx, dword ss:[ebp + 0x14<20>] 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 56 ?? push esi 89 85 d0 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1d0<4294963664,-3632>], eax 89 9d c4 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1c4<4294963652,-3644>], ebx c7 85 cc f1 ff ff 00 00 ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0 00 00 e8 55 03 00 00 ?? call function 0x00404490 L2: 8b f8 ?? mov edi, eax 83 c4 04 ?? add esp, 4 85 ff ?? test edi, edi 75 0f ?? jne basic block L5 L3: 56 ?? push esi e8 36 03 00 00 ?? call function 0x00404480 L4: 83 c4 04 ?? add esp, 4 89 85 cc f1 ff ff ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], eax L5: 6a 00 ?? push 0 6a 00 ?? push 0 6a ff ?? push 0xff<255,-1> 53 ?? push ebx 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 38 50 40 00 ?? call dword ds:[0x00405038<":q@">] L6: 3d 00 02 00 00 ?? cmp eax, 0x00000200<512> 73 22 ?? jae basic block L9 L7: 50 ?? push eax 8d 85 d4 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1d4<4294963668,-3628>] 50 ?? push eax 6a ff ?? push 0xff<255,-1> 53 ?? push ebx 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 38 50 40 00 ?? call dword ds:[0x00405038<":q@">] L8: 8d 9d d4 f1 ff ff ?? lea ebx, ss:[ebp + 0xfffff1d4<4294963668,-3628>] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L10 L9: bb a0 57 40 00 ?? mov ebx, 0x004057a0<"Runtime Check Error.\r\n Un"+28 more> L10: 68 02 10 00 00 ?? push 0x00001002<4098> e8 51 fc ff ff ?? call function 0x00403df0 L11: 83 c4 04 ?? add esp, 4 84 c0 ?? test al, al 74 22 ?? je basic block L15 L12: 8b 85 d0 f1 ff ff ?? mov eax, dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 53 ?? push ebx 56 ?? push esi ff 34 85 70 54 40 00 ?? push dword ds:[0x00405470 + eax * 4] 50 ?? push eax e8 75 fc ff ff ?? call function 0x00403e30 L13: 83 c4 10 ?? add esp, 0x10<16> 84 c0 ?? test al, al 0f 85 27 01 00 00 ?? jne basic block L36 L14: eb 02 ?? jmp basic block L16 L15: b0 01 ?? mov al, 1 L16: 83 bd cc f1 ff ff 00 ?? cmp dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0 75 08 ?? jne basic block L18 L17: 85 ff ?? test edi, edi 0f 84 11 01 00 00 ?? je basic block L35 L18: 84 c0 ?? test al, al 74 0e ?? je basic block L21 L19: ff 15 28 50 40 00 ?? call dword ds:[0x00405028<"2p@">] L20: 85 c0 ?? test eax, eax 0f 85 ff 00 00 00 ?? jne basic block L35 L21: 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 8d 85 c8 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1c8<4294963656,-3640>] 50 ?? push eax 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 8d 46 fb ?? lea eax, ds:[esi + 0xfb<251,-5>] 50 ?? push eax e8 ab 07 00 00 ?? call function 0x004049c0 L22: 83 c4 18 ?? add esp, 0x18<24> 85 ff ?? test edi, edi 74 32 ?? je basic block L26 L23: 53 ?? push ebx ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 8b cf ?? mov ecx, edi 68 10 58 40 00 ?? push 0x00405810<"Run-Time Check Failure #%d - %s"> 50 ?? push eax ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>] 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax ff 75 0c ?? push dword ss:[ebp + 12] ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L24: ff d7 ?? call edi L25: e9 96 00 00 00 ?? jmp basic block L34 L26: 6a 00 ?? push 0 6a 00 ?? push 0 68 0a 03 00 00 ?? push 0x0000030a<778> 8d 85 e0 f8 ff ff ?? lea eax, ss:[ebp + 0xfffff8e0<4294965472,-1824>] be 50 58 40 00 ?? mov esi, 0x00405850<"Unknown Filename"> 50 ?? push eax 6a ff ?? push 0xff<255,-1> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 3c 50 40 00 ?? call dword ds:[0x0040503c<"Pq@">] L27: 85 c0 ?? test eax, eax 74 06 ?? je basic block L29 L28: 8d b5 e0 f8 ff ff ?? lea esi, ss:[ebp + 0xfffff8e0<4294965472,-1824>] L29: 6a 00 ?? push 0 6a 00 ?? push 0 68 0a 03 00 00 ?? push 0x0000030a<778> 8d 85 d4 f5 ff ff ?? lea eax, ss:[ebp + 0xfffff5d4<4294964692,-2604>] bf 64 58 40 00 ?? mov edi, 0x00405864<"Unknown Module Name"> 50 ?? push eax 6a ff ?? push 0xff<255,-1> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 6a 00 ?? push 0 68 e9 fd 00 00 ?? push 0x0000fde9<65001> ff 15 3c 50 40 00 ?? call dword ds:[0x0040503c<"Pq@">] L30: 85 c0 ?? test eax, eax 74 06 ?? je basic block L32 L31: 8d bd d4 f5 ff ff ?? lea edi, ss:[ebp + 0xfffff5d4<4294964692,-2604>] L32: ff b5 c4 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c4<4294963652,-3644>] 8b 9d cc f1 ff ff ?? mov ebx, dword ss:[ebp + 0xfffff1cc<4294963660,-3636>] 8b cb ?? mov ecx, ebx ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>] 68 78 58 40 00 ?? push 0x00405878<"Run-Time Check Failure #%d - %s"> 57 ?? push edi ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>] 56 ?? push esi ff 75 0c ?? push dword ss:[ebp + 12] ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L33: ff d3 ?? call ebx L34: 83 c4 1c ?? add esp, 0x1c<28> 83 f8 01 ?? cmp eax, 1 75 01 ?? jne basic block L36 L35: cc ?? int3 L36: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 b6 d6 ff ff ?? call function 0x004019b0 L37: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404300
notify_debugger
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a fe ?? push 0xfe<254,-2> 68 00 66 40 00 ?? push 0x00406600 68 40 4d 40 00 ?? push function 0x00404d40 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 08 ?? sub esp, 8 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 ff 75 08 ?? push dword ss:[ebp + 8] 6a 06 ?? push 6 6a 00 ?? push 0 68 88 13 6d 40 ?? push 0x406d1388 ff 15 34 50 40 00 ?? call dword ds:[0x00405034<"(q@">] L2: eb 16 ?? jmp basic block L5 L3: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 88 13 6d 40 ?? cmp dword ds:[eax], 0x406d1388 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L4: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L5: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404380
__RTC_UninitUse
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 57 ?? push edi 8b 3d 24 80 40 00 ?? mov edi, dword ds:[0x00408024] 83 ff ff ?? cmp edi, 0xff<255,-1> 74 75 ?? je basic block L12 L2: 85 f6 ?? test esi, esi 74 5c ?? je basic block L9 L3: 56 ?? push esi e8 33 fd ff ff ?? call function 0x004040e0 L4: 83 c0 3a ?? add eax, 0x3a<58> 83 c4 04 ?? add esp, 4 3d 00 04 00 00 ?? cmp eax, 0x00000400<1024> 77 49 ?? ja basic block L9 L5: 68 b8 54 40 00 ?? push 0x004054b8<"The variable '"> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 dd 09 00 00 ?? call function 0x00404dad L6: 56 ?? push esi 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 d1 09 00 00 ?? call function 0x00404db3 L7: 68 c8 54 40 00 ?? push 0x004054c8<"' is being used without b"+17 more> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] 68 00 04 00 00 ?? push 0x00000400<1024> 50 ?? push eax e8 bb 09 00 00 ?? call function 0x00404db3 L8: 83 c4 24 ?? add esp, 0x24<36> 8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>] eb 05 ?? jmp basic block L10 L9: b8 d4 59 40 00 ?? mov eax, 0x004059d4<"A variable is being used "+26 more> L10: 50 ?? push eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 6a 03 ?? push 3 57 ?? push edi 50 ?? push eax e8 eb fc ff ff ?? call function 0x00404100 L11: 83 c4 10 ?? add esp, 0x10<16> L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 5f ?? pop edi 33 cd ?? xor ecx, ebp 5e ?? pop esi e8 8c d5 ff ff ?? call function 0x004019b0 L13: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404430
__vsprintf_s_l
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 b8 e8 ff ff ?? call function 0x00402cf0 L2: ff 75 18 ?? push dword ss:[ebp + 0x18<24>] ff 75 14 ?? push dword ss:[ebp + 0x14<20>] ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] ff 70 04 ?? push dword ds:[eax + 4] ff 30 ?? push dword ds:[eax] e8 68 09 00 00 ?? call function 0x00404db9 L3: 83 c4 1c ?? add esp, 0x1c<28> 85 c0 ?? test eax, eax 79 03 ?? jns basic block L5 L4: 83 c8 ff ?? or eax, 0xff<255,-1> L5: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404460
_sprintf_s
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8d 45 14 ?? lea eax, ss:[ebp + 0x14<20>] 50 ?? push eax 6a 00 ?? push 0 ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] ff 75 08 ?? push dword ss:[ebp + 8] e8 b9 ff ff ff ?? call function 0x00404430 L2: 83 c4 14 ?? add esp, 0x14<20> 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404480
?_RTC_GetErrorFunc@@YAP6AHHPBDH00ZZPBX@Z
0
L1: a1 68 84 40 00 ?? mov eax, dword ds:[0x00408468] c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404490
?_RTC_GetErrorFuncW@@YAP6AHHPB_WH00ZZPBX@Z
0
L1: a1 6c 84 40 00 ?? mov eax, dword ds:[0x0040846c] c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4044a0
__RTC_GetErrDesc
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 f8 04 ?? cmp eax, 4 77 09 ?? ja basic block L3 L2: 8b 04 85 08 5a 40 00 ?? mov eax, dword ds:[0x00405a08 + eax * 4] 5d ?? pop ebp c3 ?? ret L3: 33 c0 ?? xor eax, eax 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4044c0
__RTC_NumErrors
0
L1: b8 05 00 00 00 ?? mov eax, 5 c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4044d0
__RTC_SetErrorFunc
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 68 84 40 00 ?? mov eax, dword ds:[0x00408468] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 68 84 40 00 ?? mov dword ds:[0x00408468], ecx c7 05 6c 84 40 00 00 00 ?? mov dword ds:[0x0040846c], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4044f0
__RTC_SetErrorFuncW
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp a1 6c 84 40 00 ?? mov eax, dword ds:[0x0040846c] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 0d 6c 84 40 00 ?? mov dword ds:[0x0040846c], ecx c7 05 68 84 40 00 00 00 ?? mov dword ds:[0x00408468], 0 00 00 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404510
__RTC_SetErrorType
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 83 fa 04 ?? cmp edx, 4 77 13 ?? ja basic block L3 L2: 8b 04 95 18 80 40 00 ?? mov eax, dword ds:[0x00408018 + edx * 4] 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] 89 0c 95 18 80 40 00 ?? mov dword ds:[0x00408018 + edx * 4], ecx 5d ?? pop ebp c3 ?? ret L3: 83 c8 ff ?? or eax, 0xff<255,-1> 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404540
GetPdbDll
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 14 04 00 00 ?? sub esp, 0x00000414<1044> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 80 3d 74 84 40 00 00 ?? cmp byte ds:[0x00408474], 0 0f 85 1a 01 00 00 ?? jne basic block L27 L2: c6 05 74 84 40 00 01 ?? mov byte ds:[0x00408474], 1 e8 24 01 00 00 ?? call function 0x00404690 L3: 85 c0 ?? test eax, eax 0f 85 08 01 00 00 ?? jne basic block L28 L4: 68 ec 5a 40 00 ?? push 0x00405aec<"VCRUNTIME140D.dll"> e8 23 08 00 00 ?? call function 0x00404da1 L5: 83 c4 04 ?? add esp, 4 85 c0 ?? test eax, eax 74 78 ?? je basic block L16 L6: 68 04 01 00 00 ?? push 0x00000104<260> 8d 8d ec fb ff ff ?? lea ecx, ss:[ebp + 0xfffffbec<4294966252,-1044>] 51 ?? push ecx 50 ?? push eax e8 04 08 00 00 ?? call function 0x00404d9b L7: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 5f ?? je basic block L16 L8: 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax e8 3a 03 00 00 ?? call function 0x004048f0 L9: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 40 ?? je basic block L16 L10: 68 00 09 00 00 ?? push 0x00000900<2304> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 6a 00 ?? push 0 50 ?? push eax e8 d7 07 00 00 ?? call function 0x00404da7 L11: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 0f 85 a1 00 00 00 ?? jne basic block L28 L12: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">] L13: 83 f8 57 ?? cmp eax, 0x57<87> 75 17 ?? jne basic block L16 L14: 6a 08 ?? push 8 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 6a 00 ?? push 0 50 ?? push eax e8 b1 07 00 00 ?? call function 0x00404da7 L15: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 7f ?? jne basic block L28 L16: 68 00 0a 00 00 ?? push 0x00000a00<2560> 6a 00 ?? push 0 68 50 5c 40 00 ?? push 0x00405c50<"MSPDB140"> e8 99 07 00 00 ?? call function 0x00404da7 L17: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 67 ?? jne basic block L28 L18: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">] L19: 83 f8 57 ?? cmp eax, 0x57<87> 75 5a ?? jne basic block L27 L20: 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax 6a 00 ?? push 0 e8 68 07 00 00 ?? call function 0x00404d9b L21: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 40 ?? je basic block L27 L22: 68 04 01 00 00 ?? push 0x00000104<260> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>] 50 ?? push eax e8 9e 02 00 00 ?? call function 0x004048f0 L23: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 74 21 ?? je basic block L27 L24: 6a 08 ?? push 8 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 6a 00 ?? push 0 50 ?? push eax e8 3e 07 00 00 ?? call function 0x00404da7 L25: 83 c4 0c ?? add esp, 12 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 3a d3 ff ff ?? call function 0x004019b0 L26: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L27: 33 c0 ?? xor eax, eax L28: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 2a d3 ff ff ?? call function 0x004019b0 L29: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404690
GetPdbDllFromInstallPath
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 02 00 00 ?? sub esp, 0x0000021c<540> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi 68 00 08 00 00 ?? push 0x00000800<2048> 6a 00 ?? push 0 68 10 5b 40 00 ?? push 0x00405b10<"api-ms-win-core-registry-"+10 more> e8 f0 06 00 00 ?? call function 0x00404da7 L2: 8b f8 ?? mov edi, eax 83 c4 0c ?? add esp, 12 85 ff ?? test edi, edi 75 39 ?? jne basic block L9 L3: 68 00 08 00 00 ?? push 0x00000800<2048> 50 ?? push eax 68 58 5b 40 00 ?? push 0x00405b58<"advapi32.dll"> e8 d7 06 00 00 ?? call function 0x00404da7 L4: 8b f8 ?? mov edi, eax 83 c4 0c ?? add esp, 12 85 ff ?? test edi, edi 75 20 ?? jne basic block L9 L5: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">] L6: 83 f8 57 ?? cmp eax, 0x57<87> 75 79 ?? jne basic block L19 L7: 57 ?? push edi 57 ?? push edi 68 58 5b 40 00 ?? push 0x00405b58<"advapi32.dll"> e8 b7 06 00 00 ?? call function 0x00404da7 L8: 8b f8 ?? mov edi, eax 83 c4 0c ?? add esp, 12 85 ff ?? test edi, edi 74 64 ?? je basic block L19 L9: 68 74 5b 40 00 ?? push 0x00405b74<"RegOpenKeyExW"> 57 ?? push edi ff 15 00 50 40 00 ?? call dword ds:[0x00405000] L10: 8b f0 ?? mov esi, eax 85 f6 ?? test esi, esi 74 52 ?? je basic block L19 L11: 68 84 5b 40 00 ?? push 0x00405b84<"RegQueryValueExW"> 57 ?? push edi ff 15 00 50 40 00 ?? call dword ds:[0x00405000] L12: 8b d8 ?? mov ebx, eax 85 db ?? test ebx, ebx 74 40 ?? je basic block L19 L13: 68 98 5b 40 00 ?? push 0x00405b98<"RegCloseKey"> 57 ?? push edi ff 15 00 50 40 00 ?? call dword ds:[0x00405000] L14: 89 85 e8 fd ff ff ?? mov dword ss:[ebp + 0xfffffde8<4294966760,-536>], eax 85 c0 ?? test eax, eax 74 2a ?? je basic block L19 L15: 8d 85 f0 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf0<4294966768,-528>] 8b ce ?? mov ecx, esi 50 ?? push eax 6a 01 ?? push 1 6a 00 ?? push 0 68 a8 5b 40 00 ?? push 0x00405ba8<"SOFTWARE\\Wow6432Node\\Micr"+32 more> 68 02 00 00 80 ?? push 0x80000002 ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L16: ff d6 ?? call esi L17: 85 c0 ?? test eax, eax 74 1a ?? je basic block L21 L18: 57 ?? push edi ff 15 44 50 40 00 ?? call dword ds:[0x00405044] L19: 5f ?? pop edi 5e ?? pop esi 33 c0 ?? xor eax, eax 5b ?? pop ebx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 44 d2 ff ff ?? call function 0x004019b0 L20: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L21: 8d 85 ec fd ff ff ?? lea eax, ss:[ebp + 0xfffffdec<4294966764,-532>] c7 85 ec fd ff ff 08 02 ?? mov dword ss:[ebp + 0xfffffdec<4294966764,-532>], 0x00000208<520> 00 00 50 ?? push eax 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 8b cb ?? mov ecx, ebx 50 ?? push eax 8d 85 e4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffde4<4294966756,-540>] 50 ?? push eax 6a 00 ?? push 0 68 1c 5c 40 00 ?? push 0x00405c1c<"ProductDir"> ff b5 f0 fd ff ff ?? push dword ss:[ebp + 0xfffffdf0<4294966768,-528>] ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L22: ff d3 ?? call ebx L23: ff b5 f0 fd ff ff ?? push dword ss:[ebp + 0xfffffdf0<4294966768,-528>] 8b 9d e8 fd ff ff ?? mov ebx, dword ss:[ebp + 0xfffffde8<4294966760,-536>] 8b f0 ?? mov esi, eax 8b cb ?? mov ecx, ebx ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L24: ff d3 ?? call ebx L25: 57 ?? push edi ff 15 44 50 40 00 ?? call dword ds:[0x00405044] L26: 85 f6 ?? test esi, esi 75 94 ?? jne basic block L19 L27: 83 bd e4 fd ff ff 01 ?? cmp dword ss:[ebp + 0xfffffde4<4294966756,-540>], 1 75 8b ?? jne basic block L19 L28: 8b 8d ec fd ff ff ?? mov ecx, dword ss:[ebp + 0xfffffdec<4294966764,-532>] f6 c1 01 ?? test cl, 1 75 80 ?? jne basic block L19 L29: d1 e9 ?? shr ecx, 1 8b d1 ?? mov edx, ecx 83 f9 02 ?? cmp ecx, 2 0f 82 73 ff ff ff ?? jb basic block L19 L30: 49 ?? dec ecx 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 66 39 34 48 ?? cmp word ds:[eax + ecx * 2], si 8d 04 48 ?? lea eax, ds:[eax + ecx * 2] 0f 85 5f ff ff ff ?? jne basic block L19 L31: 66 83 78 fe 5c ?? cmp word ds:[eax + 0xfe<254,-2>], 0x5c<92> 74 0a ?? je basic block L33 L32: b9 5c 00 00 00 ?? mov ecx, 0x0000005c<92> 66 89 08 ?? mov word ds:[eax], cx 8b ca ?? mov ecx, edx L33: 8b c1 ?? mov eax, ecx f7 d0 ?? not eax 83 f8 12 ?? cmp eax, 0x12<18> 0f 82 41 ff ff ff ?? jb basic block L19 L34: 8d 41 11 ?? lea eax, ds:[ecx + 0x11<17>] 3d 04 01 00 00 ?? cmp eax, 0x00000104<260> 0f 87 33 ff ff ff ?? ja basic block L19 L35: a1 c8 5a 40 00 ?? mov eax, dword ds:[0x00405ac8<"bin\\MSPDB140.DLL">] 89 84 4d f4 fd ff ff ?? mov dword ss:[ebp + 0xfffffdf4<4294966772,-524> + ecx * 2], eax a1 cc 5a 40 00 ?? mov eax, dword ds:[0x00405acc<"n\\MSPDB140.DLL">] 89 84 4d f8 fd ff ff ?? mov dword ss:[ebp + 0xfffffdf8<4294966776,-520> + ecx * 2], eax a1 d0 5a 40 00 ?? mov eax, dword ds:[0x00405ad0<"MSPDB140.DLL">] 89 84 4d fc fd ff ff ?? mov dword ss:[ebp + 0xfffffdfc<4294966780,-516> + ecx * 2], eax a1 d4 5a 40 00 ?? mov eax, dword ds:[0x00405ad4<"PDB140.DLL">] 89 84 4d 00 fe ff ff ?? mov dword ss:[ebp + 0xfffffe00<4294966784,-512> + ecx * 2], eax a1 d8 5a 40 00 ?? mov eax, dword ds:[0x00405ad8<"B140.DLL">] 89 84 4d 04 fe ff ff ?? mov dword ss:[ebp + 0xfffffe04<4294966788,-508> + ecx * 2], eax a1 dc 5a 40 00 ?? mov eax, dword ds:[0x00405adc<"40.DLL">] 89 84 4d 08 fe ff ff ?? mov dword ss:[ebp + 0xfffffe08<4294966792,-504> + ecx * 2], eax a1 e0 5a 40 00 ?? mov eax, dword ds:[0x00405ae0<".DLL">] 89 84 4d 0c fe ff ff ?? mov dword ss:[ebp + 0xfffffe0c<4294966796,-500> + ecx * 2], eax a1 e4 5a 40 00 ?? mov eax, dword ds:[0x00405ae4<"LL">] 89 84 4d 10 fe ff ff ?? mov dword ss:[ebp + 0xfffffe10<4294966800,-496> + ecx * 2], eax 66 a1 e8 5a 40 00 ?? mov ax, word ds:[0x00405ae8] 68 00 09 00 00 ?? push 0x00000900<2304> 66 89 84 4d 14 fe ff ff ?? mov word ss:[ebp + 0xfffffe14<4294966804,-492> + ecx * 2], ax 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 6a 00 ?? push 0 50 ?? push eax e8 fc 04 00 00 ?? call function 0x00404da7 L36: 8b f0 ?? mov esi, eax 83 c4 0c ?? add esp, 12 85 f6 ?? test esi, esi 75 1f ?? jne basic block L41 L37: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">] L38: 83 f8 57 ?? cmp eax, 0x57<87> 75 14 ?? jne basic block L41 L39: 6a 08 ?? push 8 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 56 ?? push esi 50 ?? push eax e8 d9 04 00 00 ?? call function 0x00404da7 L40: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax L41: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b c6 ?? mov eax, esi 5f ?? pop edi 5e ?? pop esi 33 cd ?? xor ecx, ebp 5b ?? pop ebx e8 ce d0 ff ff ?? call function 0x004019b0 L42: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4048f0
GetPdbDllPathFromFilePath
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 0c 06 00 00 ?? sub esp, 0x0000060c<1548> a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004] 33 c5 ?? xor eax, ebp 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8d 8d f4 fd ff ff ?? lea ecx, ss:[ebp + 0xfffffdf4<4294966772,-524>] 56 ?? push esi 8b 75 0c ?? mov esi, dword ss:[ebp + 12] 68 00 01 00 00 ?? push 0x00000100<256> 51 ?? push ecx 68 00 01 00 00 ?? push 0x00000100<256> 8d 8d f4 fb ff ff ?? lea ecx, ss:[ebp + 0xfffffbf4<4294966260,-1036>] 51 ?? push ecx 68 00 01 00 00 ?? push 0x00000100<256> 8d 8d f4 f9 ff ff ?? lea ecx, ss:[ebp + 0xfffff9f4<4294965748,-1548>] 51 ?? push ecx 6a 03 ?? push 3 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] 51 ?? push ecx 50 ?? push eax e8 8b 04 00 00 ?? call function 0x00404dc5 L2: 83 c4 24 ?? add esp, 0x24<36> 85 c0 ?? test eax, eax 75 6d ?? jne basic block L10 L3: 68 3c 5c 40 00 ?? push 0x00405c3c<"MSPDB140"> 8d 85 f4 fb ff ff ?? lea eax, ss:[ebp + 0xfffffbf4<4294966260,-1036>] 6a 09 ?? push 9 50 ?? push eax e8 77 04 00 00 ?? call function 0x00404dcb L4: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 53 ?? jne basic block L10 L5: 68 34 5c 40 00 ?? push 0x00405c34<"DLL"> 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 6a 04 ?? push 4 50 ?? push eax e8 5d 04 00 00 ?? call function 0x00404dcb L6: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 39 ?? jne basic block L10 L7: 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>] 50 ?? push eax 8d 85 f4 fb ff ff ?? lea eax, ss:[ebp + 0xfffffbf4<4294966260,-1036>] 50 ?? push eax 8d 85 f4 f9 ff ff ?? lea eax, ss:[ebp + 0xfffff9f4<4294965748,-1548>] 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 56 ?? push esi e8 28 04 00 00 ?? call function 0x00404dbf L8: 83 c4 18 ?? add esp, 0x18<24> f7 d8 ?? neg eax 1b c0 ?? sbb eax, eax 40 ?? inc eax 5e ?? pop esi 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 cd ?? xor ecx, ebp e8 06 d0 ff ff ?? call function 0x004019b0 L9: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 33 c0 ?? xor eax, eax 33 cd ?? xor ecx, ebp 5e ?? pop esi e8 f5 cf ff ff ?? call function 0x004019b0 L11: 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x4049c0
?_RTC_GetSrcLine@@YAHPAEPA_WKPAH1K@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 83 ec 4c ?? sub esp, 0x4c<76> 33 c9 ?? xor ecx, ecx 53 ?? push ebx 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] c7 00 00 00 00 00 ?? mov dword ds:[eax], 0 4e ?? dec esi 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 57 ?? push edi 6a 1c ?? push 0x1c<28> 66 89 08 ?? mov word ds:[eax], cx 8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>] 50 ?? push eax 56 ?? push esi ff 15 48 50 40 00 ?? call dword ds:[0x00405048] L2: 85 c0 ?? test eax, eax 0f 84 44 03 00 00 ?? je basic block L78 L3: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>] ff 75 18 ?? push dword ss:[ebp + 0x18<24>] ff 75 b8 ?? push dword ss:[ebp + 0xb8<184,-72>] e8 9a 03 00 00 ?? call function 0x00404d9b L4: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 0f 84 2b 03 00 00 ?? je basic block L78 L5: 8b 45 b8 ?? mov eax, dword ss:[ebp + 0xb8<184,-72>] b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 0f 85 1a 03 00 00 ?? jne basic block L78 L6: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 85 c9 ?? test ecx, ecx 0f 8e 0f 03 00 00 ?? jle basic block L78 L7: 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 0f 85 01 03 00 00 ?? jne basic block L78 L8: 0f b7 51 14 ?? movzx edx, word ds:[ecx + 0x14<20>] 2b f0 ?? sub esi, eax 0f b7 79 06 ?? movzx edi, word ds:[ecx + 6] 83 c2 20 ?? add edx, 0x20<32> 33 db ?? xor ebx, ebx 33 c0 ?? xor eax, eax 85 ff ?? test edi, edi 74 1c ?? je basic block L13 L9: 03 ca ?? add ecx, edx 8d 49 00 ?? lea ecx, ds:[ecx + 0] L10: 8b 51 04 ?? mov edx, dword ds:[ecx + 4] 3b f2 ?? cmp esi, edx 72 08 ?? jb basic block L12 L11: 8b de ?? mov ebx, esi 2b da ?? sub ebx, edx 3b 31 ?? cmp esi, dword ds:[ecx] 72 08 ?? jb basic block L13 L12: 40 ?? inc eax 83 c1 28 ?? add ecx, 0x28<40> 3b c7 ?? cmp eax, edi 72 e9 ?? jb basic block L10 L13: 3b c7 ?? cmp eax, edi 0f 84 c8 02 00 00 ?? je basic block L78 L14: 40 ?? inc eax 80 3d 75 84 40 00 00 ?? cmp byte ds:[0x00408475], 0 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 75 28 ?? jne basic block L19 L15: 83 3d 70 84 40 00 00 ?? cmp dword ds:[0x00408470], 0 0f 85 ae 02 00 00 ?? jne basic block L78 L16: e8 b2 fa ff ff ?? call function 0x00404540 L17: a3 70 84 40 00 ?? mov dword ds:[0x00408470], eax 85 c0 ?? test eax, eax 0f 84 9c 02 00 00 ?? je basic block L78 L18: c6 05 75 84 40 00 01 ?? mov byte ds:[0x00408475], 1 eb 05 ?? jmp basic block L20 L19: a1 70 84 40 00 ?? mov eax, dword ds:[0x00408470] L20: 68 64 5c 40 00 ?? push 0x00405c64<"PDBOpenValidate5"> 50 ?? push eax ff 15 00 50 40 00 ?? call dword ds:[0x00405000] L21: 8b f0 ?? mov esi, eax 85 f6 ?? test esi, esi 0f 84 78 02 00 00 ?? je basic block L78 L22: 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>] 8b ce ?? mov ecx, esi 50 ?? push eax 6a 00 ?? push 0 6a 00 ?? push 0 8d 45 d0 ?? lea eax, ss:[ebp + 0xd0<208,-48>] 50 ?? push eax 6a 00 ?? push 0 6a 00 ?? push 0 6a 00 ?? push 0 ff 75 18 ?? push dword ss:[ebp + 0x18<24>] ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L23: ff d6 ?? call esi L24: 83 c4 20 ?? add esp, 0x20<32> 85 c0 ?? test eax, eax 0f 84 4e 02 00 00 ?? je basic block L78 L25: 8b 7d e8 ?? mov edi, dword ss:[ebp + 0xe8<232,-24>] c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0 c7 45 dc 00 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0 8b 07 ?? mov eax, dword ds:[edi] 8b 30 ?? mov esi, dword ds:[eax] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L26: 8b cf ?? mov ecx, edi ff d6 ?? call esi L27: 3d 41 91 32 01 ?? cmp eax, 0x01329141 0f 85 3f 01 00 00 ?? jne basic block L59 L28: 8b 7d e8 ?? mov edi, dword ss:[ebp + 0xe8<232,-24>] 8b 07 ?? mov eax, dword ds:[edi] 8b 70 1c ?? mov esi, dword ds:[eax + 0x1c<28>] 8d 45 e0 ?? lea eax, ss:[ebp + 0xe0<224,-32>] 50 ?? push eax 68 78 5c 40 00 ?? push 0x00405c78<"r"> 6a 00 ?? push 0 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L29: 8b cf ?? mov ecx, edi ff d6 ?? call esi L30: 85 c0 ?? test eax, eax 0f 84 18 01 00 00 ?? je basic block L59 L31: 8b 7d e0 ?? mov edi, dword ss:[ebp + 0xe0<224,-32>] 6a 00 ?? push 0 6a 00 ?? push 0 6a 00 ?? push 0 8b 07 ?? mov eax, dword ds:[edi] 8b 70 20 ?? mov esi, dword ds:[eax + 0x20<32>] 8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>] 50 ?? push eax 53 ?? push ebx ff 75 f4 ?? push dword ss:[ebp + 0xf4<244,-12>] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L32: 8b cf ?? mov ecx, edi ff d6 ?? call esi L33: 85 c0 ?? test eax, eax 0f 84 da 00 00 00 ?? je basic block L57 L34: 8b 7d ec ?? mov edi, dword ss:[ebp + 0xec<236,-20>] 8b 07 ?? mov eax, dword ds:[edi] 8b 70 68 ?? mov esi, dword ds:[eax + 0x68<104>] 8d 45 f8 ?? lea eax, ss:[ebp + 0xf8<248,-8>] 50 ?? push eax 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L35: 8b cf ?? mov ecx, edi ff d6 ?? call esi L36: 84 c0 ?? test al, al 0f 84 a6 00 00 00 ?? je basic block L55 L37: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>] 85 ff ?? test edi, edi 0f 84 9b 00 00 00 ?? je basic block L55 L38: 8b 07 ?? mov eax, dword ds:[edi] 8b 70 08 ?? mov esi, dword ds:[eax + 8] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L39: 8b cf ?? mov ecx, edi ff d6 ?? call esi L40: 85 c0 ?? test eax, eax 74 61 ?? je basic block L50 L41: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>] 6a 00 ?? push 0 8b 07 ?? mov eax, dword ds:[edi] 8b 70 0c ?? mov esi, dword ds:[eax + 12] 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 50 ?? push eax 8d 45 d8 ?? lea eax, ss:[ebp + 0xd8<216,-40>] 8b ce ?? mov ecx, esi 50 ?? push eax 8d 45 fc ?? lea eax, ss:[ebp + 0xfc<252,-4>] 50 ?? push eax 8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>] 50 ?? push eax 6a 00 ?? push 0 ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L42: 8b cf ?? mov ecx, edi ff d6 ?? call esi L43: 84 c0 ?? test al, al 74 47 ?? je basic block L53 L44: 0f b7 45 fc ?? movzx eax, word ss:[ebp + 0xfc<252,-4>] 3b 45 f4 ?? cmp eax, dword ss:[ebp + 0xf4<244,-12>] 75 14 ?? jne basic block L47 L45: 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 3b cb ?? cmp ecx, ebx 77 0d ?? ja basic block L47 L46: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>] 03 c1 ?? add eax, ecx 3b d8 ?? cmp ebx, eax 0f 82 83 00 00 00 ?? jb basic block L62 L47: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>] 8b 07 ?? mov eax, dword ds:[edi] 8b 70 08 ?? mov esi, dword ds:[eax + 8] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L48: 8b cf ?? mov ecx, edi ff d6 ?? call esi L49: 85 c0 ?? test eax, eax 75 9f ?? jne basic block L41 L50: 33 c9 ?? xor ecx, ecx L51: 51 ?? push ecx 6a 00 ?? push 0 ff 15 4c 50 40 00 ?? call dword ds:[0x0040504c] L52: 50 ?? push eax ff 15 50 50 40 00 ?? call dword ds:[0x00405050] L53: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>] 8b 07 ?? mov eax, dword ds:[edi] 8b 30 ?? mov esi, dword ds:[eax] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L54: 8b cf ?? mov ecx, edi ff d6 ?? call esi L55: 8b 7d ec ?? mov edi, dword ss:[ebp + 0xec<236,-20>] 8b 07 ?? mov eax, dword ds:[edi] 8b 70 40 ?? mov esi, dword ds:[eax + 0x40<64>] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L56: 8b cf ?? mov ecx, edi ff d6 ?? call esi L57: 8b 7d e0 ?? mov edi, dword ss:[ebp + 0xe0<224,-32>] 8b 07 ?? mov eax, dword ds:[edi] 8b 70 38 ?? mov esi, dword ds:[eax + 0x38<56>] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L58: 8b cf ?? mov ecx, edi ff d6 ?? call esi L59: 8b 7d e8 ?? mov edi, dword ss:[ebp + 0xe8<232,-24>] 8b 17 ?? mov edx, dword ds:[edi] 8b 72 2c ?? mov esi, dword ds:[edx + 0x2c<44>] 8b ce ?? mov ecx, esi ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L60: 8b cf ?? mov ecx, edi ff d6 ?? call esi L61: 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>] 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret L62: 8b 75 f0 ?? mov esi, dword ss:[ebp + 0xf0<240,-16>] 85 f6 ?? test esi, esi 74 a0 ?? je basic block L53 L63: 81 fe ff ff ff 1f ?? cmp esi, 0x1fffffff 73 98 ?? jae basic block L53 L64: c1 e6 03 ?? shl esi, 3 ff 15 4c 50 40 00 ?? call dword ds:[0x0040504c] L65: 56 ?? push esi 6a 00 ?? push 0 50 ?? push eax ff 15 54 50 40 00 ?? call dword ds:[0x00405054<"vq@">] L66: 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 85 c0 ?? test eax, eax 0f 84 7a ff ff ff ?? je basic block L53 L67: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>] 50 ?? push eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 50 ?? push eax 8b 0f ?? mov ecx, dword ds:[edi] 8d 45 d4 ?? lea eax, ss:[ebp + 0xd4<212,-44>] 6a 00 ?? push 0 6a 00 ?? push 0 6a 00 ?? push 0 8b 71 0c ?? mov esi, dword ds:[ecx + 12] 8b ce ?? mov ecx, esi 50 ?? push eax ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L68: 8b cf ?? mov ecx, edi ff d6 ?? call esi L69: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 84 c0 ?? test al, al 0f 84 3c ff ff ff ?? je basic block L51 L70: 2b 5d e4 ?? sub ebx, dword ss:[ebp + 0xe4<228,-28>] 3b 19 ?? cmp ebx, dword ds:[ecx] 0f 82 31 ff ff ff ?? jb basic block L51 L71: 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>] b8 01 00 00 00 ?? mov eax, 1 3b d0 ?? cmp edx, eax 76 0a ?? jbe basic block L74 L72: 3b 1c c1 ?? cmp ebx, dword ds:[ecx + eax * 8] 72 05 ?? jb basic block L74 L73: 40 ?? inc eax 3b c2 ?? cmp eax, edx 72 f6 ?? jb basic block L72 L74: 8b 44 c1 fc ?? mov eax, dword ds:[ecx + eax * 8 + 0xfc<252,-4>] 8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>] 25 ff ff ff 00 ?? and eax, 0x00ffffff 8b 7d ec ?? mov edi, dword ss:[ebp + 0xec<236,-20>] 6a 00 ?? push 0 6a 00 ?? push 0 89 01 ?? mov dword ds:[ecx], eax 8b 07 ?? mov eax, dword ds:[edi] 6a 00 ?? push 0 8b 70 70 ?? mov esi, dword ds:[eax + 0x70<112>] 8d 45 10 ?? lea eax, ss:[ebp + 0x10<16>] 50 ?? push eax ff 75 0c ?? push dword ss:[ebp + 12] 8b ce ?? mov ecx, esi ff 75 d4 ?? push dword ss:[ebp + 0xd4<212,-44>] ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">] L75: 8b cf ?? mov ecx, edi ff d6 ?? call esi L76: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 84 c0 ?? test al, al 0f 84 de fe ff ff ?? je basic block L51 L77: c7 45 dc 01 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 1 e9 d2 fe ff ff ?? jmp basic block L51 L78: 5f ?? pop edi 5e ?? pop esi 33 c0 ?? xor eax, eax 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x404d40
__except_handler4_noexcept
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>] 50 ?? push eax 8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>] 51 ?? push ecx 8b 55 0c ?? mov edx, dword ss:[ebp + 12] 52 ?? push edx 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 50 ?? push eax e8 87 e3 ff ff ?? call function 0x004030e0 L2: 83 c4 10 ?? add esp, 0x10<16> 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 8b 51 04 ?? mov edx, dword ds:[ecx + 4] 83 e2 66 ?? and edx, 0x66<102> 75 2a ?? jne basic block L8 L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 81 38 63 73 6d e0 ?? cmp dword ds:[eax], 0xe06d7363 75 1f ?? jne basic block L8 L4: 83 7d fc 01 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 1 75 19 ?? jne basic block L8 L5: e8 6e ea ff ff ?? call function 0x004037ee L6: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 08 ?? mov dword ds:[eax], ecx e8 6a ea ff ff ?? call function 0x004037f4 L7: 8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>] 89 10 ?? mov dword ds:[eax], edx e8 26 eb ff ff ?? call function 0x004038ba L8: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/Debug/oopoly.exe
0x405060
__imp_?width@ios_base@std@@QAE_J_J@Z
1
0x00405060: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405064
__imp_?width@ios_base@std@@QBE_JXZ
1
0x00405064: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405068
__imp_?flags@ios_base@std@@QBEHXZ
1
0x00405068: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x40506c
__imp_??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
1
0x0040506c: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405070
__imp_?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
1
0x00405070: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405074
__imp_?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
1
0x00405074: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405078
__imp_?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
1
0x00405078: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x40507c
__imp_?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
1
0x0040507c: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405080
__imp_?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ
1
0x00405080: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405084
__imp_?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
1
0x00405084: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405088
__imp_?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
1
0x00405088: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x40508c
__imp_?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
1
0x0040508c: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405090
__imp_?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
1
0x00405090: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x405094
__imp_?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
1
0x00405094: no instructions
./vs2022/wpo/Debug/oopoly.exe
0x40509c
__imp_?good@ios_base@std@@QBE_NXZ
1
0x0040509c: no instructions
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401000
?func1@Cls1@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] ba e0 31 40 00 ?? mov edx, 0x004031e0<"Cls1::func1()"> 68 40 14 40 00 ?? push function 0x00401440 e8 0b 02 00 00 ?? call function 0x00401220 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401020
?func2@Cls1@@QAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] ba f0 31 40 00 ?? mov edx, 0x004031f0<"Cls1::func2()"> 68 40 14 40 00 ?? push function 0x00401440 e8 eb 01 00 00 ?? call function 0x00401220 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401040
?func3@Cls2@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] ba 00 32 40 00 ?? mov edx, 0x00403200<"Cls2::func3()"> 68 40 14 40 00 ?? push function 0x00401440 e8 cb 01 00 00 ?? call function 0x00401220 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401060
?func4@Cls2@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] ba 10 32 40 00 ?? mov edx, 0x00403210<"Cls2::func4()"> 68 40 14 40 00 ?? push function 0x00401440 e8 ab 01 00 00 ?? call function 0x00401220 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401080
??0Cls3@@QAE@XZ
1
L1: c7 01 60 32 40 00 ?? mov dword ds:[ecx], 0x00403260 8b c1 ?? mov eax, ecx c7 41 0c 44 32 40 00 ?? mov dword ds:[ecx + 12], 0x00403244 c7 41 50 2a 00 00 00 ?? mov dword ds:[ecx + 0x50<80>], 0x0000002a<42> c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4010a0
?func1@Cls3@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] ba 20 32 40 00 ?? mov edx, 0x00403220<"Cls3::func1()"> 68 40 14 40 00 ?? push function 0x00401440 e8 6b 01 00 00 ?? call function 0x00401220 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4010c0
?func3@Cls3@@UAEXXZ
1
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] ba 30 32 40 00 ?? mov edx, 0x00403230<"Cls3::func3()"> 68 40 14 40 00 ?? push function 0x00401440 e8 4b 01 00 00 ?? call function 0x00401220 L2: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L3: c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4010e0
??0Cls1@@QAE@XZ
1
L1: c7 01 68 32 40 00 ?? mov dword ds:[ecx], 0x00403268 8b c1 ?? mov eax, ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4010f0
??0Cls2@@QAE@XZ
1
L1: c7 01 50 32 40 00 ?? mov dword ds:[ecx], 0x00403250 8b c1 ?? mov eax, ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401100
_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 08 ?? sub esp, 8 53 ?? push ebx 56 ?? push esi 57 ?? push edi 6a 54 ?? push 0x54<84> e8 62 05 00 00 ?? call function 0x00401672 L2: c7 40 0c 50 32 40 00 ?? mov dword ds:[eax + 12], 0x00403250 6a 54 ?? push 0x54<84> 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8d 78 0c ?? lea edi, ds:[eax + 12] c7 00 60 32 40 00 ?? mov dword ds:[eax], 0x00403260 c7 07 44 32 40 00 ?? mov dword ds:[edi], 0x00403244 c7 40 50 2a 00 00 00 ?? mov dword ds:[eax + 0x50<80>], 0x0000002a<42> e8 3b 05 00 00 ?? call function 0x00401672 L3: 8b d8 ?? mov ebx, eax 6a 0c ?? push 12 89 5d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ebx c7 43 0c 50 32 40 00 ?? mov dword ds:[ebx + 12], 0x00403250 c7 03 60 32 40 00 ?? mov dword ds:[ebx], 0x00403260 c7 43 0c 44 32 40 00 ?? mov dword ds:[ebx + 12], 0x00403244 c7 43 50 2a 00 00 00 ?? mov dword ds:[ebx + 0x50<80>], 0x0000002a<42> e8 14 05 00 00 ?? call function 0x00401672 L4: 8b f0 ?? mov esi, eax 83 c4 0c ?? add esp, 12 ba f0 31 40 00 ?? mov edx, 0x004031f0<"Cls1::func2()"> c7 46 04 00 00 00 00 ?? mov dword ds:[esi + 4], 0 c7 46 08 00 00 00 00 ?? mov dword ds:[esi + 8], 0 c7 06 68 32 40 00 ?? mov dword ds:[esi], 0x00403268 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">] 68 40 14 40 00 ?? push function 0x00401440 e8 94 00 00 00 ?? call function 0x00401220 L5: 8b c8 ?? mov ecx, eax ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">] L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 01 ?? mov eax, dword ds:[ecx] ff 10 ?? call dword ds:[eax] L7: 8b 07 ?? mov eax, dword ds:[edi] 8b cf ?? mov ecx, edi ff 10 ?? call dword ds:[eax] L8: 8b 07 ?? mov eax, dword ds:[edi] 8b cf ?? mov ecx, edi ff 50 04 ?? call dword ds:[eax + 4] L9: 8b 03 ?? mov eax, dword ds:[ebx] 8b cb ?? mov ecx, ebx ff 10 ?? call dword ds:[eax] L10: 6a 54 ?? push 0x54<84> ff 75 fc ?? push dword ss:[ebp + 0xfc<252,-4>] e8 ea 04 00 00 ?? call function 0x004016a2 L11: 6a 0c ?? push 12 53 ?? push ebx e8 e2 04 00 00 ?? call function 0x004016a2 L12: 6a 0c ?? push 12 56 ?? push esi e8 da 04 00 00 ?? call function 0x004016a2 L13: 83 c4 18 ?? add esp, 0x18<24> 33 c0 ?? xor eax, eax 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401220
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 05 2c 40 00 ?? push 0x00402c05 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 83 ec 24 ?? sub esp, 0x24<36> 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 89 65 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], esp 89 55 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], edx 8b d9 ?? mov ebx, ecx 89 5d e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], ebx 8b ca ?? mov ecx, edx 33 c0 ?? xor eax, eax 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax 8d 71 01 ?? lea esi, ds:[ecx + 1] L2: 8a 01 ?? mov al, byte ds:[ecx] 41 ?? inc ecx 84 c0 ?? test al, al L3: 75 f9 ?? jne basic block L2 L4: 8b 03 ?? mov eax, dword ds:[ebx] 2b ce ?? sub ecx, esi 89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 7c 18 24 ?? mov edi, dword ds:[eax + ebx + 0x24<36>] 8b 74 18 20 ?? mov esi, dword ds:[eax + ebx + 0x20<32>] 85 ff ?? test edi, edi 7c 17 ?? jl basic block L11 L5: 7f 0e ?? jg basic block L10 L6: 85 f6 ?? test esi, esi 74 11 ?? je basic block L11 L7: 85 ff ?? test edi, edi 7c 0d ?? jl basic block L11 L8: 7f 04 ?? jg basic block L10 L9: 3b f1 ?? cmp esi, ecx 76 07 ?? jbe basic block L11 L10: 2b f1 ?? sub esi, ecx 83 df 00 ?? sbb edi, 0 eb 0e ?? jmp basic block L12 L11: 0f 57 c0 ?? xorps xmm0, xmm0 66 0f 13 45 d0 ?? movlpd double ss:[ebp + 0xd0<208,-48>], xmm0 8b 7d d4 ?? mov edi, dword ss:[ebp + 0xd4<212,-44>] 8b 75 d0 ?? mov esi, dword ss:[ebp + 0xd0<208,-48>] L12: 8b 4c 18 38 ?? mov ecx, dword ds:[eax + ebx + 0x38<56>] 89 5d d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], ebx 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L14 L13: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L14: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 cb ?? add ecx, ebx ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">] L15: 84 c0 ?? test al, al 74 28 ?? je basic block L22 L16: 8b 03 ?? mov eax, dword ds:[ebx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 18 3c ?? mov ecx, dword ds:[eax + ebx + 0x3c<60>] 85 c9 ?? test ecx, ecx 74 19 ?? je basic block L21 L17: 3b cb ?? cmp ecx, ebx 74 15 ?? je basic block L21 L18: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L19: 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 cb ?? add ecx, ebx ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">] L20: eb 02 ?? jmp basic block L22 L21: b0 01 ?? mov al, 1 L22: 88 45 d4 ?? mov byte ss:[ebp + 0xd4<212,-44>], al c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 84 c0 ?? test al, al 75 0a ?? jne basic block L24 L23: b9 04 00 00 00 ?? mov ecx, 4 e9 e4 00 00 00 ?? jmp basic block L49 L24: c6 45 fc 02 ?? mov byte ss:[ebp + 0xfc<252,-4>], 2 8b 03 ?? mov eax, dword ds:[ebx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 44 18 14 ?? mov eax, dword ds:[eax + ebx + 0x14<20>] 25 c0 01 00 00 ?? and eax, 0x000001c0<448> 83 f8 40 ?? cmp eax, 0x40<64> 74 35 ?? je basic block L32 L25: 85 ff ?? test edi, edi 7c 31 ?? jl basic block L32 L26: 7f 04 ?? jg basic block L28 L27: 85 f6 ?? test esi, esi 74 2b ?? je basic block L32 L28: 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 8a 44 19 40 ?? mov al, byte ds:[ecx + ebx + 0x40<64>] 8b 4c 19 38 ?? mov ecx, dword ds:[ecx + ebx + 0x38<56>] 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] ff 15 48 30 40 00 ?? call dword ds:[function 0x00403048] L29: 83 f8 ff ?? cmp eax, 0xff<255,-1> 75 05 ?? jne basic block L31 L30: 8d 48 05 ?? lea ecx, ds:[eax + 5] eb 2d ?? jmp basic block L37 L31: 83 c6 ff ?? add esi, 0xff<255,-1> 83 d7 ff ?? adc edi, 0xff<255,-1> eb cb ?? jmp basic block L25 L32: 8b 03 ?? mov eax, dword ds:[ebx] 6a 00 ?? push 0 ff 75 e4 ?? push dword ss:[ebp + 0xe4<228,-28>] 8b 40 04 ?? mov eax, dword ds:[eax + 4] ff 75 d8 ?? push dword ss:[ebp + 0xd8<216,-40>] 8b 4c 18 38 ?? mov ecx, dword ds:[eax + ebx + 0x38<56>] ff 15 64 30 40 00 ?? call dword ds:[function 0x00403064<"8?@">] L33: 3b 45 e4 ?? cmp eax, dword ss:[ebp + 0xe4<228,-28>] 75 04 ?? jne basic block L35 L34: 85 d2 ?? test edx, edx 74 1c ?? je basic block L38 L35: 33 c9 ?? xor ecx, ecx L36: 83 c9 04 ?? or ecx, 4 L37: 8b 03 ?? mov eax, dword ds:[ebx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 44 18 20 00 00 00 00 ?? mov dword ds:[eax + ebx + 0x20<32>], 0 c7 44 18 24 00 00 00 00 ?? mov dword ds:[eax + ebx + 0x24<36>], 0 eb 55 ?? jmp basic block L48 L38: 33 c9 ?? xor ecx, ecx L39: 85 ff ?? test edi, edi 7c e3 ?? jl basic block L37 L40: 7f 04 ?? jg basic block L42 L41: 85 f6 ?? test esi, esi 74 dd ?? je basic block L37 L42: 8b 03 ?? mov eax, dword ds:[ebx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 8a 44 19 40 ?? mov al, byte ds:[ecx + ebx + 0x40<64>] 8b 4c 19 38 ?? mov ecx, dword ds:[ecx + ebx + 0x38<56>] 88 45 d8 ?? mov byte ss:[ebp + 0xd8<216,-40>], al ff 75 d8 ?? push dword ss:[ebp + 0xd8<216,-40>] ff 15 48 30 40 00 ?? call dword ds:[function 0x00403048] L43: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 83 f8 ff ?? cmp eax, 0xff<255,-1> 74 b9 ?? je basic block L36 L44: 83 c6 ff ?? add esi, 0xff<255,-1> 83 d7 ff ?? adc edi, 0xff<255,-1> eb cd ?? jmp basic block L39 L45: 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>] 6a 01 ?? push 1 6a 04 ?? push 4 8b 02 ?? mov eax, dword ds:[edx] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ca ?? add ecx, edx ff 15 60 30 40 00 ?? call dword ds:[function 0x00403060<"~?@">] L46: b8 e1 13 40 00 ?? mov eax, basic block L47 c3 ?? ret L47: 8b 5d e0 ?? mov ebx, dword ss:[ebp + 0xe0<224,-32>] 8b 4d e8 ?? mov ecx, dword ss:[ebp + 0xe8<232,-24>] L48: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1 L49: 8b 03 ?? mov eax, dword ds:[ebx] 6a 00 ?? push 0 51 ?? push ecx 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 cb ?? add ecx, ebx ff 15 60 30 40 00 ?? call dword ds:[function 0x00403060<"~?@">] L50: ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"t>@">] L51: 8b 75 d0 ?? mov esi, dword ss:[ebp + 0xd0<208,-48>] 84 c0 ?? test al, al 75 08 ?? jne basic block L53 L52: 8b ce ?? mov ecx, esi ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068] L53: c7 45 fc 04 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 4 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L55 L54: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L55: 8b c3 ?? mov eax, ebx 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401440
??$endl@DU?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 6a 0a ?? push 10 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 54 30 40 00 ?? call dword ds:[function 0x00403054<"^@@">] L2: 0f b6 c8 ?? movzx ecx, al 51 ?? push ecx 8b ce ?? mov ecx, esi ff 15 50 30 40 00 ?? call dword ds:[function 0x00403050] L3: 8b ce ?? mov ecx, esi ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401470
??Bsentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QBE_NXZ
1
L1: 8a 41 04 ?? mov al, byte ds:[ecx + 4] c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401480
??1sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 30 2c 40 00 ?? push 0x00402c30 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 56 ?? push esi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b f1 ?? mov esi, ecx ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"t>@">] L2: 84 c0 ?? test al, al 75 08 ?? jne basic block L4 L3: 8b 0e ?? mov ecx, dword ds:[esi] ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068] L4: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 0e ?? mov ecx, dword ds:[esi] 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L6 L5: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L6: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4014f0
??0sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 5d 2c 40 00 ?? push 0x00402c5d 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax 51 ?? push ecx 56 ?? push esi 57 ?? push edi a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b f9 ?? mov edi, ecx 89 7d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 89 37 ?? mov dword ds:[edi], esi 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">] L4: 84 c0 ?? test al, al 74 28 ?? je basic block L11 L5: 8b 06 ?? mov eax, dword ds:[esi] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 30 3c ?? mov ecx, dword ds:[eax + esi + 0x3c<60>] 85 c9 ?? test ecx, ecx 74 19 ?? je basic block L10 L6: 3b ce ?? cmp ecx, esi 74 15 ?? je basic block L10 L7: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c] L8: 8b 06 ?? mov eax, dword ds:[esi] 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 03 ce ?? add ecx, esi ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">] L9: eb 02 ?? jmp basic block L11 L10: b0 01 ?? mov al, 1 L11: 88 47 04 ?? mov byte ds:[edi + 4], al 8b c7 ?? mov eax, edi 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401590
??1_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a ff ?? push 0xff<255,-1> 68 80 2c 40 00 ?? push 0x00402c80 64 a1 00 00 00 00 ?? mov eax, dword fs:[0] 50 ?? push eax a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004] 33 c5 ?? xor eax, ebp 50 ?? push eax 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax 8b 09 ?? mov ecx, dword ds:[ecx] 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 08 ?? call dword ds:[eax + 8] L3: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4015e0
??0_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 55 08 ?? mov edx, dword ss:[ebp + 8] 56 ?? push esi 8b f1 ?? mov esi, ecx 89 16 ?? mov dword ds:[esi], edx 8b 02 ?? mov eax, dword ds:[edx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 8b 4c 10 38 ?? mov ecx, dword ds:[eax + edx + 0x38<56>] 85 c9 ?? test ecx, ecx 74 05 ?? je basic block L3 L2: 8b 01 ?? mov eax, dword ds:[ecx] ff 50 04 ?? call dword ds:[eax + 4] L3: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401664
@__security_check_cookie@4
0
L1: 3b 0d 04 50 40 00 ?? cmp ecx, dword ds:[0x00405004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 48 03 00 00 ?? jmp function 0x004019ba
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401672
??2@YAPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp eb 0d ?? jmp basic block L4 L2: ff 75 08 ?? push dword ss:[ebp + 8] e8 e4 13 00 00 ?? call function 0x00402a63 L3: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 0f ?? je basic block L7 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 dd 13 00 00 ?? call function 0x00402a69 L5: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 e6 ?? je basic block L2 L6: 5d ?? pop ebp c3 ?? ret L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 0f 84 aa 07 00 00 ?? je function 0x00401e47 L8: e9 88 07 00 00 ?? jmp function 0x00401e2a
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4016a2
??3@YAXPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 c4 07 00 00 ?? call function 0x00401e71 L2: 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4016b0
??1type_info@@UAE@XZ
1
L1: c7 01 74 31 40 00 ?? mov dword ds:[ecx], 0x00403174 c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4016b7
??_Etype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 74 31 40 00 ?? mov dword ds:[esi], 0x00403174 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 d1 ff ff ff ?? call function 0x004016a2 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4016b7
??_Gtype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 74 31 40 00 ?? mov dword ds:[esi], 0x00403174 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 d1 ff ff ff ?? call function 0x004016a2 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4016da
pre_c_initialization
0
L1: 56 ?? push esi 6a 01 ?? push 1 e8 93 13 00 00 ?? call function 0x00402a75 L2: e8 a8 0b 00 00 ?? call function 0x0040228f L3: 50 ?? push eax e8 be 13 00 00 ?? call function 0x00402aab L4: e8 9a 0b 00 00 ?? call function 0x0040228c L5: 8b f0 ?? mov esi, eax e8 e2 13 00 00 ?? call function 0x00402adb L6: 6a 01 ?? push 1 89 30 ?? mov dword ds:[eax], esi e8 26 09 00 00 ?? call function 0x00402028 L7: 83 c4 0c ?? add esp, 12 5e ?? pop esi 84 c0 ?? test al, al 74 73 ?? je basic block L30 L8: db e2 ?? fnclex e8 10 0e 00 00 ?? call function 0x00402521 L9: 68 4d 25 40 00 ?? push function 0x0040254d e8 bd 0a 00 00 ?? call function 0x004021d8 L10: e8 68 0b 00 00 ?? call function 0x00402288 L11: 50 ?? push eax e8 5b 13 00 00 ?? call function 0x00402a81 L12: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 75 51 ?? jne basic block L30 L13: e8 6a 0b 00 00 ?? call function 0x0040229b L14: e8 d0 0b 00 00 ?? call function 0x00402306 L15: 85 c0 ?? test eax, eax 74 0b ?? je basic block L18 L16: 68 85 22 40 00 ?? push function 0x00402285 e8 37 13 00 00 ?? call function 0x00402a7b L17: 59 ?? pop ecx L18: e8 8d 0b 00 00 ?? call function 0x004022d7 L19: e8 8b 0b 00 00 ?? call function 0x004022da L20: e8 62 0b 00 00 ?? call function 0x004022b6 L21: e8 3f 0b 00 00 ?? call function 0x00402298 L22: 50 ?? push eax e8 70 13 00 00 ?? call function 0x00402acf L23: 59 ?? pop ecx e8 4e 0b 00 00 ?? call function 0x004022b3 L24: 84 c0 ?? test al, al 74 05 ?? je basic block L26 L25: e8 19 13 00 00 ?? call function 0x00402a87 L26: e8 fc 0c 00 00 ?? call function 0x0040246f L27: e8 f2 0c 00 00 ?? call function 0x0040246a L28: 85 c0 ?? test eax, eax 75 01 ?? jne basic block L30 L29: c3 ?? ret L30: 6a 07 ?? push 7 e8 9a 0b 00 00 ?? call function 0x0040231e L31: cc ?? int3
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401785
post_pgo_initialization
0
L1: e8 5f 0b 00 00 ?? call function 0x004022e9 L2: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x40178d
pre_cpp_initialization
0
L1: e8 22 0d 00 00 ?? call function 0x004024b4 L2: e8 fe 0a 00 00 ?? call function 0x00402295 L3: 50 ?? push eax e8 38 13 00 00 ?? call function 0x00402ad5 L4: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x40179f
__scrt_common_main
0
L1: e8 96 0a 00 00 ?? call function 0x0040223a L2: e9 00 00 00 00 ?? jmp function 0x004017a9
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4017a9
__scrt_common_main_seh
0
L1: 6a 14 ?? push 0x14<20> 68 80 3b 40 00 ?? push 0x00403b80 e8 cb 0d 00 00 ?? call function 0x00402580 L2: 6a 01 ?? push 1 e8 33 08 00 00 ?? call function 0x00401fef L3: 59 ?? pop ecx 84 c0 ?? test al, al 0f 84 50 01 00 00 ?? je basic block L44 L4: 32 db ?? xor bl, bl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 e8 21 07 00 00 ?? call function 0x00401ef4 L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al a1 ec 53 40 00 ?? mov eax, dword ds:[0x004053ec] 33 c9 ?? xor ecx, ecx 41 ?? inc ecx 3b c1 ?? cmp eax, ecx 0f 84 2f 01 00 00 ?? je basic block L44 L6: 85 c0 ?? test eax, eax 75 49 ?? jne basic block L12 L7: 89 0d ec 53 40 00 ?? mov dword ds:[0x004053ec], ecx 68 5c 31 40 00 ?? push 0x0040315c 68 50 31 40 00 ?? push 0x00403150 e8 9a 12 00 00 ?? call function 0x00402a99 L8: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 11 ?? je basic block L10 L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b8 ff 00 00 00 ?? mov eax, 0x000000ff<255> e9 ef 00 00 00 ?? jmp basic block L43 L10: 68 4c 31 40 00 ?? push 0x0040314c 68 44 31 40 00 ?? push 0x00403144 e8 6e 12 00 00 ?? call function 0x00402a93 L11: 59 ?? pop ecx 59 ?? pop ecx c7 05 ec 53 40 00 02 00 ?? mov dword ds:[0x004053ec], 2 00 00 eb 05 ?? jmp basic block L13 L12: 8a d9 ?? mov bl, cl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] e8 03 09 00 00 ?? call function 0x00402143 L14: 59 ?? pop ecx e8 cc 0a 00 00 ?? call function 0x00402312 L15: 8b f0 ?? mov esi, eax 33 ff ?? xor edi, edi 39 3e ?? cmp dword ds:[esi], edi 74 1b ?? je basic block L20 L16: 56 ?? push esi e8 5b 08 00 00 ?? call function 0x004020af L17: 59 ?? pop ecx 84 c0 ?? test al, al 74 10 ?? je basic block L20 L18: 8b 36 ?? mov esi, dword ds:[esi] 57 ?? push edi 6a 02 ?? push 2 57 ?? push edi 8b ce ?? mov ecx, esi ff 15 38 31 40 00 ?? call dword ds:[0x00403138] L19: ff d6 ?? call esi L20: e8 aa 0a 00 00 ?? call function 0x00402318 L21: 8b f0 ?? mov esi, eax 39 3e ?? cmp dword ds:[esi], edi 74 13 ?? je basic block L26 L22: 56 ?? push esi e8 35 08 00 00 ?? call function 0x004020af L23: 59 ?? pop ecx 84 c0 ?? test al, al 74 08 ?? je basic block L26 L24: ff 36 ?? push dword ds:[esi] e8 43 12 00 00 ?? call function 0x00402ac9 L25: 59 ?? pop ecx L26: e8 01 12 00 00 ?? call function 0x00402a8d L27: 8b f8 ?? mov edi, eax e8 24 12 00 00 ?? call function 0x00402ab7 L28: 8b 30 ?? mov esi, dword ds:[eax] e8 17 12 00 00 ?? call function 0x00402ab1 L29: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 5d f8 ff ff ?? call function 0x00401100 L30: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax e8 c5 0b 00 00 ?? call function 0x00402472 L31: 84 c0 ?? test al, al 74 6b ?? je basic block L45 L32: 84 db ?? test bl, bl 75 05 ?? jne basic block L34 L33: e8 03 12 00 00 ?? call function 0x00402abd L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 9d 08 00 00 ?? call function 0x00402160 L35: 59 ?? pop ecx 59 ?? pop ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b c6 ?? mov eax, esi eb 35 ?? jmp basic block L43 L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 01 ?? mov eax, dword ds:[ecx] 8b 00 ?? mov eax, dword ds:[eax] 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 51 ?? push ecx 50 ?? push eax e8 8e 11 00 00 ?? call function 0x00402a6f L37: 59 ?? pop ecx 59 ?? pop ecx c3 ?? ret L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] e8 86 0b 00 00 ?? call function 0x00402472 L39: 84 c0 ?? test al, al 74 32 ?? je basic block L46 L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0 75 05 ?? jne basic block L42 L41: e8 c8 11 00 00 ?? call function 0x00402ac3 L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret L44: 6a 07 ?? push 7 e8 02 0a 00 00 ?? call function 0x0040231e L45: 56 ?? push esi e8 7d 11 00 00 ?? call function 0x00402a9f L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>] e8 7b 11 00 00 ?? call function 0x00402aa5 L47: cc ?? int3 L48: e8 58 09 00 00 ?? call function 0x00402288 L49: 50 ?? push eax e8 4b 11 00 00 ?? call function 0x00402a81 L50: 59 ?? pop ecx c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x40193d
invoke_main
0
L1: 56 ?? push esi 57 ?? push edi e8 49 11 00 00 ?? call function 0x00402a8d L2: 8b f8 ?? mov edi, eax e8 6c 11 00 00 ?? call function 0x00402ab7 L3: 8b 30 ?? mov esi, dword ds:[eax] e8 5f 11 00 00 ?? call function 0x00402ab1 L4: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 a5 f7 ff ff ?? call function 0x00401100 L5: 83 c4 0c ?? add esp, 12 5f ?? pop edi 5e ?? pop esi c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401988
_mainCRTStartup
0
L1: e8 ad 08 00 00 ?? call function 0x0040223a L2: e9 17 fe ff ff ?? jmp function 0x004017a9
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401992
___raise_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 30 40 00 ?? call dword ds:[0x00403004] L2: ff 75 08 ?? push dword ss:[ebp + 8] ff 15 00 30 40 00 ?? call dword ds:[0x00403000] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 30 40 00 ?? call dword ds:[0x00403008<"0F@">] L4: 50 ?? push eax ff 15 0c 30 40 00 ?? call dword ds:[0x0040300c<"DF@">] L5: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x4019ba
___report_gsfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"XF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 6a 02 ?? push 2 59 ?? pop ecx cd 29 ?? int 0x29<41> L4: a3 d0 51 40 00 ?? mov dword ds:[0x004051d0], eax 89 0d cc 51 40 00 ?? mov dword ds:[0x004051cc], ecx 89 15 c8 51 40 00 ?? mov dword ds:[0x004051c8], edx 89 1d c4 51 40 00 ?? mov dword ds:[0x004051c4], ebx 89 35 c0 51 40 00 ?? mov dword ds:[0x004051c0], esi 89 3d bc 51 40 00 ?? mov dword ds:[0x004051bc], edi 66 8c 15 e8 51 40 00 ?? mov word ds:[0x004051e8], ss 66 8c 0d dc 51 40 00 ?? mov word ds:[0x004051dc], cs 66 8c 1d b8 51 40 00 ?? mov word ds:[0x004051b8], ds 66 8c 05 b4 51 40 00 ?? mov word ds:[0x004051b4], es 66 8c 25 b0 51 40 00 ?? mov word ds:[0x004051b0], fs 66 8c 2d ac 51 40 00 ?? mov word ds:[0x004051ac], gs 9c ?? pushfd 8f 05 e0 51 40 00 ?? pop dword ds:[0x004051e0] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 d8 51 40 00 ?? mov dword ds:[0x004051d8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 e4 51 40 00 ?? mov dword ds:[0x004051e4], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 20 51 40 00 01 00 ?? mov dword ds:[0x00405120], 0x00010001 01 00 a1 d8 51 40 00 ?? mov eax, dword ds:[0x004051d8] a3 dc 50 40 00 ?? mov dword ds:[0x004050dc], eax c7 05 d0 50 40 00 09 04 ?? mov dword ds:[0x004050d0], 0xc0000409 00 c0 c7 05 d4 50 40 00 01 00 ?? mov dword ds:[0x004050d4], 1 00 00 c7 05 e0 50 40 00 01 00 ?? mov dword ds:[0x004050e0], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 c7 80 e4 50 40 00 02 00 ?? mov dword ds:[eax + 0x004050e4], 2 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 6a 04 ?? push 4 58 ?? pop eax c1 e0 00 ?? shl eax, 0 8b 0d 00 50 40 00 ?? mov ecx, dword ds:[0x00405000] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 78 31 40 00 ?? push 0x00403178 e8 e0 fe ff ff ?? call function 0x00401992 L5: c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401ab4
___report_rangecheckfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 08 ?? push 8 e8 02 00 00 00 ?? call function 0x00401ac0 L2: 5d ?? pop ebp c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401ac0
___report_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"XF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 d0 51 40 00 ?? mov dword ds:[0x004051d0], eax 89 0d cc 51 40 00 ?? mov dword ds:[0x004051cc], ecx 89 15 c8 51 40 00 ?? mov dword ds:[0x004051c8], edx 89 1d c4 51 40 00 ?? mov dword ds:[0x004051c4], ebx 89 35 c0 51 40 00 ?? mov dword ds:[0x004051c0], esi 89 3d bc 51 40 00 ?? mov dword ds:[0x004051bc], edi 66 8c 15 e8 51 40 00 ?? mov word ds:[0x004051e8], ss 66 8c 0d dc 51 40 00 ?? mov word ds:[0x004051dc], cs 66 8c 1d b8 51 40 00 ?? mov word ds:[0x004051b8], ds 66 8c 05 b4 51 40 00 ?? mov word ds:[0x004051b4], es 66 8c 25 b0 51 40 00 ?? mov word ds:[0x004051b0], fs 66 8c 2d ac 51 40 00 ?? mov word ds:[0x004051ac], gs 9c ?? pushfd 8f 05 e0 51 40 00 ?? pop dword ds:[0x004051e0] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 d8 51 40 00 ?? mov dword ds:[0x004051d8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 e4 51 40 00 ?? mov dword ds:[0x004051e4], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 d8 51 40 00 ?? mov eax, dword ds:[0x004051d8] a3 dc 50 40 00 ?? mov dword ds:[0x004050dc], eax c7 05 d0 50 40 00 09 04 ?? mov dword ds:[0x004050d0], 0xc0000409 00 c0 c7 05 d4 50 40 00 01 00 ?? mov dword ds:[0x004050d4], 1 00 00 c7 05 e0 50 40 00 01 00 ?? mov dword ds:[0x004050e0], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 e4 50 40 00 ?? mov dword ds:[eax + 0x004050e4], ecx 68 78 31 40 00 ?? push 0x00403178 e8 05 fe ff ff ?? call function 0x00401992 L5: c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401b8f
___report_securityfailureEx
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 20 03 00 00 ?? sub esp, 0x00000320<800> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"XF@">] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 d0 51 40 00 ?? mov dword ds:[0x004051d0], eax 89 0d cc 51 40 00 ?? mov dword ds:[0x004051cc], ecx 89 15 c8 51 40 00 ?? mov dword ds:[0x004051c8], edx 89 1d c4 51 40 00 ?? mov dword ds:[0x004051c4], ebx 89 35 c0 51 40 00 ?? mov dword ds:[0x004051c0], esi 89 3d bc 51 40 00 ?? mov dword ds:[0x004051bc], edi 66 8c 15 e8 51 40 00 ?? mov word ds:[0x004051e8], ss 66 8c 0d dc 51 40 00 ?? mov word ds:[0x004051dc], cs 66 8c 1d b8 51 40 00 ?? mov word ds:[0x004051b8], ds 66 8c 05 b4 51 40 00 ?? mov word ds:[0x004051b4], es 66 8c 25 b0 51 40 00 ?? mov word ds:[0x004051b0], fs 66 8c 2d ac 51 40 00 ?? mov word ds:[0x004051ac], gs 9c ?? pushfd 8f 05 e0 51 40 00 ?? pop dword ds:[0x004051e0] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 d8 51 40 00 ?? mov dword ds:[0x004051d8], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 e4 51 40 00 ?? mov dword ds:[0x004051e4], eax 8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>] a1 d8 51 40 00 ?? mov eax, dword ds:[0x004051d8] a3 dc 50 40 00 ?? mov dword ds:[0x004050dc], eax c7 05 d0 50 40 00 09 04 ?? mov dword ds:[0x004050d0], 0xc0000409 00 c0 c7 05 d4 50 40 00 01 00 ?? mov dword ds:[0x004050d4], 1 00 00 83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0 76 0a ?? jbe basic block L7 L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0 75 04 ?? jne basic block L7 L6: 83 65 0c 00 ?? and dword ss:[ebp + 12], 0 L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14 76 07 ?? jbe basic block L9 L8: 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 48 ?? dec eax 89 45 0c ?? mov dword ss:[ebp + 12], eax L9: 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 40 ?? inc eax a3 e0 50 40 00 ?? mov dword ds:[0x004050e0], eax 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 e4 50 40 00 ?? mov dword ds:[eax + 0x004050e4], ecx 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp basic block L10 L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 3b 45 0c ?? cmp eax, dword ss:[ebp + 12] 73 15 ?? jae basic block L12 L11: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>] 8b 0c 8a ?? mov ecx, dword ds:[edx + ecx * 4] 89 0c 85 e8 50 40 00 ?? mov dword ds:[0x004050e8 + eax * 4], ecx eb dc ?? jmp 0x00401c74 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 40 ?? inc eax 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L12: 68 78 31 40 00 ?? push 0x00403178 e8 f0 fc ff ff ?? call function 0x00401992 L13: c9 ?? leave c3 ?? ret
./vs2022/wpo/RelWithDebInfo/oo.exe
0x401ca4
??0bad_alloc@std@@AAE@QBD@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 a4 31 40 00 ?? mov dword ds:[ecx], 0x004031a4 5d ?? pop ebp c2 04 00 ?? ret 4