Binary stringlengths 25 43 | Addr stringlengths 8 8 | Name stringlengths 5 187 | Type int64 0 1 | Disassembly stringlengths 16 68.6k |
|---|---|---|---|---|
./vs2022/wpo/Debug/oopoly.exe | 0x4037a0 | ___scrt_is_ucrt_dll_in_use | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
83 3d 14 80 40 00 00 ?? cmp dword ds:[0x00408014], 0
74 09 ?? je basic block L3
L2: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1
eb 07 ?? jmp basic block L4
L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
L4: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403910 | ___acrt_initialize | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403910 | ___scrt_stub_for_acrt_initialize | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403910 | ___vcrt_initialize | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403920 | ___acrt_thread_attach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403920 | ___scrt_stub_for_acrt_thread_attach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403920 | ___vcrt_thread_attach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403930 | ___acrt_thread_detach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403930 | ___scrt_stub_for_acrt_thread_detach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403930 | ___vcrt_thread_detach | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403940 | ___acrt_uninitialize | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403940 | ___scrt_stub_for_acrt_uninitialize | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403940 | ___vcrt_uninitialize | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403950 | ___acrt_uninitialize_critical | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403950 | ___scrt_stub_for_acrt_uninitialize_critical | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403950 | ___vcrt_uninitialize_critical | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403960 | ___scrt_stub_for_is_c_termination_complete | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403960 | __is_c_termination_complete | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403970 | __filter_x86_sse2_floating_point_exception | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 54 ?? sub esp, 0x54<84>
83 3d 60 84 40 00 01 ?? cmp dword ds:[0x00408460], 1
7d 08 ?? jge basic block L3
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
e9 19 01 00 00 ?? jmp basic block L19
L3: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4
74 11 ?? je basic block L6
L4: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5
74 08 ?? je basic block L6
L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
e9 ff 00 00 00 ?? jmp basic block L19
L6: c7 45 f4 01 00 00 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 1
c7 45 f0 02 00 00 00 ?? mov dword ss:[ebp + 0xf0<240,-16>], 2
c7 45 ec 04 00 00 00 ?? mov dword ss:[ebp + 0xec<236,-20>], 4
c7 45 e8 08 00 00 00 ?? mov dword ss:[ebp + 0xe8<232,-24>], 8
c7 45 e4 10 00 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00000010<16>
c7 45 e0 20 00 00 00 ?? mov dword ss:[ebp + 0xe0<224,-32>], 0x00000020<32>
c7 45 dc 3f 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x0000003f<63>
c7 45 d8 80 00 00 00 ?? mov dword ss:[ebp + 0xd8<216,-40>], 0x00000080<128>
c7 45 d4 00 01 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0x00000100<256>
c7 45 d0 00 02 00 00 ?? mov dword ss:[ebp + 0xd0<208,-48>], 0x00000200<512>
c7 45 cc 00 04 00 00 ?? mov dword ss:[ebp + 0xcc<204,-52>], 0x00000400<1024>
c7 45 c8 00 08 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0x00000800<2048>
c7 45 c4 00 10 00 00 ?? mov dword ss:[ebp + 0xc4<196,-60>], 0x00001000<4096>
c7 45 c0 81 00 00 00 ?? mov dword ss:[ebp + 0xc0<192,-64>], 0x00000081<129>
c7 45 bc 02 01 00 00 ?? mov dword ss:[ebp + 0xbc<188,-68>], 0x00000102<258>
c7 45 b8 04 02 00 00 ?? mov dword ss:[ebp + 0xb8<184,-72>], 0x00000204<516>
c7 45 b4 08 04 00 00 ?? mov dword ss:[ebp + 0xb4<180,-76>], 0x00000408<1032>
c7 45 b0 10 08 00 00 ?? mov dword ss:[ebp + 0xb0<176,-80>], 0x00000810<2064>
c7 45 ac 20 10 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 0x00001020<4128>
0f ae 5d f8 ?? stmxcsr dword ss:[ebp + 0xf8<248,-8>]
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
83 f0 3f ?? xor eax, 0x3f<63>
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
81 e1 81 00 00 00 ?? and ecx, 0x00000081<129>
75 07 ?? jne basic block L8
L7: b8 90 00 00 c0 ?? mov eax, 0xc0000090
eb 5b ?? jmp basic block L19
L8: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 e2 04 02 00 00 ?? and edx, 0x00000204<516>
75 07 ?? jne basic block L10
L9: b8 8e 00 00 c0 ?? mov eax, 0xc000008e
eb 49 ?? jmp basic block L19
L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
25 02 01 00 00 ?? and eax, 0x00000102<258>
75 07 ?? jne basic block L12
L11: b8 90 00 00 c0 ?? mov eax, 0xc0000090
eb 38 ?? jmp basic block L19
L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
81 e1 08 04 00 00 ?? and ecx, 0x00000408<1032>
75 07 ?? jne basic block L14
L13: b8 91 00 00 c0 ?? mov eax, 0xc0000091
eb 26 ?? jmp basic block L19
L14: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 e2 10 08 00 00 ?? and edx, 0x00000810<2064>
75 07 ?? jne basic block L16
L15: b8 93 00 00 c0 ?? mov eax, 0xc0000093
eb 14 ?? jmp basic block L19
L16: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
25 20 10 00 00 ?? and eax, 0x00001020<4128>
75 07 ?? jne basic block L18
L17: b8 8f 00 00 c0 ?? mov eax, 0xc000008f
eb 03 ?? jmp basic block L19
L18: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
L19: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403970 | __filter_x86_sse2_floating_point_exception_default | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 54 ?? sub esp, 0x54<84>
83 3d 60 84 40 00 01 ?? cmp dword ds:[0x00408460], 1
7d 08 ?? jge basic block L3
L2: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
e9 19 01 00 00 ?? jmp basic block L19
L3: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4
74 11 ?? je basic block L6
L4: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5
74 08 ?? je basic block L6
L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
e9 ff 00 00 00 ?? jmp basic block L19
L6: c7 45 f4 01 00 00 00 ?? mov dword ss:[ebp + 0xf4<244,-12>], 1
c7 45 f0 02 00 00 00 ?? mov dword ss:[ebp + 0xf0<240,-16>], 2
c7 45 ec 04 00 00 00 ?? mov dword ss:[ebp + 0xec<236,-20>], 4
c7 45 e8 08 00 00 00 ?? mov dword ss:[ebp + 0xe8<232,-24>], 8
c7 45 e4 10 00 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00000010<16>
c7 45 e0 20 00 00 00 ?? mov dword ss:[ebp + 0xe0<224,-32>], 0x00000020<32>
c7 45 dc 3f 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0x0000003f<63>
c7 45 d8 80 00 00 00 ?? mov dword ss:[ebp + 0xd8<216,-40>], 0x00000080<128>
c7 45 d4 00 01 00 00 ?? mov dword ss:[ebp + 0xd4<212,-44>], 0x00000100<256>
c7 45 d0 00 02 00 00 ?? mov dword ss:[ebp + 0xd0<208,-48>], 0x00000200<512>
c7 45 cc 00 04 00 00 ?? mov dword ss:[ebp + 0xcc<204,-52>], 0x00000400<1024>
c7 45 c8 00 08 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0x00000800<2048>
c7 45 c4 00 10 00 00 ?? mov dword ss:[ebp + 0xc4<196,-60>], 0x00001000<4096>
c7 45 c0 81 00 00 00 ?? mov dword ss:[ebp + 0xc0<192,-64>], 0x00000081<129>
c7 45 bc 02 01 00 00 ?? mov dword ss:[ebp + 0xbc<188,-68>], 0x00000102<258>
c7 45 b8 04 02 00 00 ?? mov dword ss:[ebp + 0xb8<184,-72>], 0x00000204<516>
c7 45 b4 08 04 00 00 ?? mov dword ss:[ebp + 0xb4<180,-76>], 0x00000408<1032>
c7 45 b0 10 08 00 00 ?? mov dword ss:[ebp + 0xb0<176,-80>], 0x00000810<2064>
c7 45 ac 20 10 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 0x00001020<4128>
0f ae 5d f8 ?? stmxcsr dword ss:[ebp + 0xf8<248,-8>]
8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
83 f0 3f ?? xor eax, 0x3f<63>
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
81 e1 81 00 00 00 ?? and ecx, 0x00000081<129>
75 07 ?? jne basic block L8
L7: b8 90 00 00 c0 ?? mov eax, 0xc0000090
eb 5b ?? jmp basic block L19
L8: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 e2 04 02 00 00 ?? and edx, 0x00000204<516>
75 07 ?? jne basic block L10
L9: b8 8e 00 00 c0 ?? mov eax, 0xc000008e
eb 49 ?? jmp basic block L19
L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
25 02 01 00 00 ?? and eax, 0x00000102<258>
75 07 ?? jne basic block L12
L11: b8 90 00 00 c0 ?? mov eax, 0xc0000090
eb 38 ?? jmp basic block L19
L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
81 e1 08 04 00 00 ?? and ecx, 0x00000408<1032>
75 07 ?? jne basic block L14
L13: b8 91 00 00 c0 ?? mov eax, 0xc0000091
eb 26 ?? jmp basic block L19
L14: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 e2 10 08 00 00 ?? and edx, 0x00000810<2064>
75 07 ?? jne basic block L16
L15: b8 93 00 00 c0 ?? mov eax, 0xc0000093
eb 14 ?? jmp basic block L19
L16: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
25 20 10 00 00 ?? and eax, 0x00001020<4128>
75 07 ?? jne basic block L18
L17: b8 8f 00 00 c0 ?? mov eax, 0xc000008f
eb 03 ?? jmp basic block L19
L18: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
L19: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403ab0 | _main | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 3c ?? sub esp, 0x3c<60>
56 ?? push esi
57 ?? push edi
8d 7d c4 ?? lea edi, ss:[ebp + 0xc4<196,-60>]
b9 0f 00 00 00 ?? mov ecx, 15
b8 cc cc cc cc ?? mov eax, 0xcccccccc
f3 ab ?? rep_stosd
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
6a 04 ?? push 4
e8 e8 de ff ff ?? call function 0x004019c0
L2: 83 c4 04 ?? add esp, 4
89 45 dc ?? mov dword ss:[ebp + 0xdc<220,-36>], eax
83 7d dc 00 ?? cmp dword ss:[ebp + 0xdc<220,-36>], 0
74 14 ?? je basic block L5
L3: 33 c0 ?? xor eax, eax
8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>]
89 01 ?? mov dword ds:[ecx], eax
8b 4d dc ?? mov ecx, dword ss:[ebp + 0xdc<220,-36>]
e8 fd d5 ff ff ?? call function 0x004010f0
L4: 89 45 cc ?? mov dword ss:[ebp + 0xcc<204,-52>], eax
eb 07 ?? jmp basic block L6
L5: c7 45 cc 00 00 00 00 ?? mov dword ss:[ebp + 0xcc<204,-52>], 0
L6: ba 04 00 00 00 ?? mov edx, 4
6b c2 00 ?? imul eax, edx, 0
8b 4d cc ?? mov ecx, dword ss:[ebp + 0xcc<204,-52>]
89 4c 05 ec ?? mov dword ss:[ebp + eax + 0xec<236,-20>], ecx
6a 04 ?? push 4
e8 ab de ff ff ?? call function 0x004019c0
L7: 83 c4 04 ?? add esp, 4
89 45 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], eax
83 7d d8 00 ?? cmp dword ss:[ebp + 0xd8<216,-40>], 0
74 14 ?? je basic block L10
L8: 33 d2 ?? xor edx, edx
8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>]
89 10 ?? mov dword ds:[eax], edx
8b 4d d8 ?? mov ecx, dword ss:[ebp + 0xd8<216,-40>]
e8 10 d6 ff ff ?? call function 0x00401140
L9: 89 45 c8 ?? mov dword ss:[ebp + 0xc8<200,-56>], eax
eb 07 ?? jmp basic block L11
L10: c7 45 c8 00 00 00 00 ?? mov dword ss:[ebp + 0xc8<200,-56>], 0
L11: b9 04 00 00 00 ?? mov ecx, 4
c1 e1 00 ?? shl ecx, 0
8b 55 c8 ?? mov edx, dword ss:[ebp + 0xc8<200,-56>]
89 54 0d ec ?? mov dword ss:[ebp + ecx + 0xec<236,-20>], edx
6a 04 ?? push 4
e8 6e de ff ff ?? call function 0x004019c0
L12: 83 c4 04 ?? add esp, 4
89 45 d4 ?? mov dword ss:[ebp + 0xd4<212,-44>], eax
83 7d d4 00 ?? cmp dword ss:[ebp + 0xd4<212,-44>], 0
74 14 ?? je basic block L15
L13: 33 c0 ?? xor eax, eax
8b 4d d4 ?? mov ecx, dword ss:[ebp + 0xd4<212,-44>]
89 01 ?? mov dword ds:[ecx], eax
8b 4d d4 ?? mov ecx, dword ss:[ebp + 0xd4<212,-44>]
e8 03 d6 ff ff ?? call function 0x00401170
L14: 89 45 c4 ?? mov dword ss:[ebp + 0xc4<196,-60>], eax
eb 07 ?? jmp basic block L16
L15: c7 45 c4 00 00 00 00 ?? mov dword ss:[ebp + 0xc4<196,-60>], 0
L16: ba 04 00 00 00 ?? mov edx, 4
d1 e2 ?? shl edx, 1
8b 45 c4 ?? mov eax, dword ss:[ebp + 0xc4<196,-60>]
89 44 15 ec ?? mov dword ss:[ebp + edx + 0xec<236,-20>], eax
c7 45 e4 00 00 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0
eb 09 ?? jmp basic block L17
L17: 83 7d e4 03 ?? cmp dword ss:[ebp + 0xe4<228,-28>], 3
7d 1f ?? jge basic block L21
L18: 8b 55 e4 ?? mov edx, dword ss:[ebp + 0xe4<228,-28>]
8b 44 95 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20> + edx * 4]
8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>]
8b 10 ?? mov edx, dword ds:[eax]
8b f4 ?? mov esi, esp
8b 4c 8d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20> + ecx * 4]
8b 02 ?? mov eax, dword ds:[edx]
ff d0 ?? call eax
L19: 3b f4 ?? cmp esi, esp
e8 04 02 00 00 ?? call function 0x00403dc0
L20: eb d2 ?? jmp 0x00403b90
8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>]
83 c1 01 ?? add ecx, 1
89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx
L21: c7 45 e0 00 00 00 00 ?? mov dword ss:[ebp + 0xe0<224,-32>], 0
eb 09 ?? jmp basic block L22
L22: 83 7d e0 03 ?? cmp dword ss:[ebp + 0xe0<224,-32>], 3
7d 1a ?? jge basic block L25
L23: 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>]
8b 44 95 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20> + edx * 4]
89 45 d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], eax
6a 04 ?? push 4
8b 4d d0 ?? mov ecx, dword ss:[ebp + 0xd0<208,-48>]
51 ?? push ecx
e8 25 de ff ff ?? call function 0x00401a10
L24: 83 c4 08 ?? add esp, 8
eb d7 ?? jmp 0x00403bc7
8b 4d e0 ?? mov ecx, dword ss:[ebp + 0xe0<224,-32>]
83 c1 01 ?? add ecx, 1
89 4d e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], ecx
L25: 33 c0 ?? xor eax, eax
52 ?? push edx
8b cd ?? mov ecx, ebp
50 ?? push eax
8d 15 20 3c 40 00 ?? lea edx, ds:[0x00403c20]
e8 5f 01 00 00 ?? call function 0x00403d60
L26: 58 ?? pop eax
5a ?? pop edx
5f ?? pop edi
5e ?? pop esi
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 a1 dd ff ff ?? call function 0x004019b0
L27: 83 c4 3c ?? add esp, 0x3c<60>
3b ec ?? cmp ebp, esp
e8 a7 01 00 00 ?? call function 0x00403dc0
L28: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403c40 | @_RTC_AllocaHelper@12 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
53 ?? push ebx
56 ?? push esi
8b f1 ?? mov esi, ecx
8b da ?? mov ebx, edx
85 f6 ?? test esi, esi
74 1f ?? je basic block L5
L2: 85 db ?? test ebx, ebx
74 1b ?? je basic block L5
L3: 8b 55 08 ?? mov edx, dword ss:[ebp + 8]
85 d2 ?? test edx, edx
74 14 ?? je basic block L5
L4: 57 ?? push edi
b0 cc ?? mov al, 0xcc<204,-52>
8b fe ?? mov edi, esi
8b cb ?? mov ecx, ebx
f3 aa ?? rep_stosb
8b 02 ?? mov eax, dword ds:[edx]
89 46 04 ?? mov dword ds:[esi + 4], eax
89 5e 0c ?? mov dword ds:[esi + 12], ebx
89 32 ?? mov dword ds:[edx], esi
5f ?? pop edi
L5: 5e ?? pop esi
5b ?? pop ebx
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x403c80 | @_RTC_CheckStackVars2@12 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
57 ?? push edi
85 d2 ?? test edx, edx
74 4f ?? je basic block L10
L2: 33 ff ?? xor edi, edi
39 3a ?? cmp dword ds:[edx], edi
7e 49 ?? jle basic block L10
L3: 53 ?? push ebx
33 db ?? xor ebx, ebx
8b f2 ?? mov esi, edx
8d 49 00 ?? lea ecx, ds:[ecx + 0]
L4: 8b 4e 04 ?? mov ecx, dword ds:[esi + 4]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 14 19 ?? mov edx, dword ds:[ecx + ebx]
81 7c 02 fc cc cc cc cc ?? cmp dword ds:[edx + eax + 0xfc<252,-4>], 0xcccccccc
75 12 ?? jne basic block L6
L5: 8b 44 19 04 ?? mov eax, dword ds:[ecx + ebx + 4]
03 c2 ?? add eax, edx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 3c 10 cc cc cc cc ?? cmp dword ds:[eax + edx], 0xcccccccc
74 10 ?? je basic block L8
L6: ff 74 19 08 ?? push dword ds:[ecx + ebx + 8]
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
50 ?? push eax
e8 ee 02 00 00 ?? call function 0x00403fc0
L7: 83 c4 08 ?? add esp, 8
L8: 47 ?? inc edi
83 c3 0c ?? add ebx, 12
3b 3e ?? cmp edi, dword ds:[esi]
7c c3 ?? jl basic block L4
L9: 8b 75 08 ?? mov esi, dword ss:[ebp + 8]
5b ?? pop ebx
L10: 33 ff ?? xor edi, edi
8b c6 ?? mov eax, esi
85 f6 ?? test esi, esi
74 63 ?? je basic block L24
L11: 8d a4 24 00 00 00 00 ?? lea esp, ss:[esp + 0]
L12: 8b 40 04 ?? mov eax, dword ds:[eax + 4]
47 ?? inc edi
85 c0 ?? test eax, eax
L13: 75 f8 ?? jne basic block L12
L14: 81 3e cc cc cc cc ?? cmp dword ds:[esi], 0xcccccccc
75 1b ?? jne basic block L18
L15: 81 7e 14 cc cc cc cc ?? cmp dword ds:[esi + 0x14<20>], 0xcccccccc
75 12 ?? jne basic block L18
L16: 81 7e 18 cc cc cc cc ?? cmp dword ds:[esi + 0x18<24>], 0xcccccccc
75 09 ?? jne basic block L18
L17: 81 7e 1c cc cc cc cc ?? cmp dword ds:[esi + 0x1c<28>], 0xcccccccc
74 0e ?? je basic block L20
L18: 8b 45 04 ?? mov eax, dword ss:[ebp + 4]
57 ?? push edi
56 ?? push esi
50 ?? push eax
e8 5a 01 00 00 ?? call function 0x00403e80
L19: 83 c4 0c ?? add esp, 12
L20: 8b 46 0c ?? mov eax, dword ds:[esi + 12]
81 7c 30 fc cc cc cc cc ?? cmp dword ds:[eax + esi + 0xfc<252,-4>], 0xcccccccc
74 0e ?? je basic block L23
L21: 8b 45 04 ?? mov eax, dword ss:[ebp + 4]
57 ?? push edi
56 ?? push esi
50 ?? push eax
e8 3f 01 00 00 ?? call function 0x00403e80
L22: 83 c4 0c ?? add esp, 12
L23: 8b 76 04 ?? mov esi, dword ds:[esi + 4]
4f ?? dec edi
85 f6 ?? test esi, esi
75 ac ?? jne basic block L14
L24: 5f ?? pop edi
5e ?? pop esi
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/Debug/oopoly.exe | 0x403d60 | @_RTC_CheckStackVars@8 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
53 ?? push ebx
8b da ?? mov ebx, edx
89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx
56 ?? push esi
33 f6 ?? xor esi, esi
39 33 ?? cmp dword ds:[ebx], esi
7e 41 ?? jle basic block L9
L2: 57 ?? push edi
33 ff ?? xor edi, edi
L3: 8b 4b 04 ?? mov ecx, dword ds:[ebx + 4]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 14 39 ?? mov edx, dword ds:[ecx + edi]
81 7c 02 fc cc cc cc cc ?? cmp dword ds:[edx + eax + 0xfc<252,-4>], 0xcccccccc
75 12 ?? jne basic block L5
L4: 8b 44 39 04 ?? mov eax, dword ds:[ecx + edi + 4]
03 c2 ?? add eax, edx
8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
81 3c 10 cc cc cc cc ?? cmp dword ds:[eax + edx], 0xcccccccc
74 10 ?? je basic block L7
L5: ff 74 39 08 ?? push dword ds:[ecx + edi + 8]
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
50 ?? push eax
e8 1a 02 00 00 ?? call function 0x00403fc0
L6: 83 c4 08 ?? add esp, 8
L7: 46 ?? inc esi
83 c7 0c ?? add edi, 12
3b 33 ?? cmp esi, dword ds:[ebx]
7c c3 ?? jl basic block L3
L8: 5f ?? pop edi
L9: 5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403dc0 | __RTC_CheckEsp | 0 |
L1: 75 01 ?? jne basic block L3
L2: c3 ?? ret
L3: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 00 ?? sub esp, 0
50 ?? push eax
52 ?? push edx
53 ?? push ebx
56 ?? push esi
57 ?? push edi
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
6a 00 ?? push 0
50 ?? push eax
e8 97 01 00 00 ?? call function 0x00403f70
L4: 83 c4 08 ?? add esp, 8
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
5a ?? pop edx
58 ?? pop eax
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403df0 | DebuggerProbe | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 1c ?? sub esp, 0x1c<28>
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax
8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>]
89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax
8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>]
50 ?? push eax
c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0
c7 45 e4 01 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001001<4097>
e8 ea 04 00 00 ?? call function 0x00404300
L2: 83 c4 04 ?? add esp, 4
80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0
0f 95 c0 ?? setne al
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403e30 | DebuggerRuntime | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 1c ?? sub esp, 0x1c<28>
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax
8b 45 0c ?? mov eax, dword ss:[ebp + 12]
89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax
8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>]
89 45 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], eax
8d 45 ff ?? lea eax, ss:[ebp + 0xff<255,-1>]
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>]
50 ?? push eax
c6 45 ff 00 ?? mov byte ss:[ebp + 0xff<255,-1>], 0
c7 45 e4 02 10 00 00 ?? mov dword ss:[ebp + 0xe4<228,-28>], 0x00001002<4098>
e8 98 04 00 00 ?? call function 0x00404300
L2: 83 c4 04 ?? add esp, 4
80 7d ff 00 ?? cmp byte ss:[ebp + 0xff<255,-1>], 0
0f 95 c0 ?? setne al
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403e80 | ?_RTC_AllocaFailure@@YAXPAXPAU_RTC_ALLOCA_NODE@@H@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 44 01 00 00 ?? sub esp, 0x00000144<324>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
53 ?? push ebx
8b 5d 0c ?? mov ebx, dword ss:[ebp + 12]
57 ?? push edi
8b 3d 28 80 40 00 ?? mov edi, dword ds:[0x00408028]
89 85 bc fe ff ff ?? mov dword ss:[ebp + 0xfffffebc<4294966972,-324>], eax
83 ff ff ?? cmp edi, 0xff<255,-1>
0f 84 a6 00 00 00 ?? je basic block L10
L2: 85 db ?? test ebx, ebx
75 21 ?? jne basic block L6
L3: 68 c8 58 40 00 ?? push 0x004058c8<"Stack area around _alloca"+47 more>
6a 04 ?? push 4
57 ?? push edi
50 ?? push eax
e8 3e 02 00 00 ?? call function 0x00404100
L4: 83 c4 10 ?? add esp, 0x10<16>
5f ?? pop edi
5b ?? pop ebx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 df da ff ff ?? call function 0x004019b0
L5: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
L6: 8b 43 0c ?? mov eax, dword ds:[ebx + 12]
56 ?? push esi
83 e8 24 ?? sub eax, 0x24<36>
8d 73 20 ?? lea esi, ds:[ebx + 0x20<32>]
50 ?? push eax
56 ?? push esi
8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>]
50 ?? push eax
8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>]
50 ?? push eax
e8 82 01 00 00 ?? call function 0x00404070
L7: 68 14 59 40 00 ?? push 0x00405914<"\n">
8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>]
50 ?? push eax
68 18 59 40 00 ?? push 0x00405918<"> ">
8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>]
50 ?? push eax
8b 43 0c ?? mov eax, dword ds:[ebx + 12]
68 1c 59 40 00 ?? push 0x0040591c<"\nData: <">
ff 75 10 ?? push dword ss:[ebp + 0x10<16>]
83 e8 24 ?? sub eax, 0x24<36>
68 28 59 40 00 ?? push 0x00405928<"\nAllocation number within"+16 more>
50 ?? push eax
68 54 59 40 00 ?? push 0x00405954<"\nSize: ">
56 ?? push esi
68 5c 59 40 00 ?? push 0x0040595c<"\nAddress: 0x">
68 70 59 40 00 ?? push 0x00405970<"Stack area around _alloca"+46 more>
68 b8 59 40 00 ?? push 0x004059b8<"%s%s%p%s%zd%s%d%s%s%s%s%s">
8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>]
68 f4 00 00 00 ?? push 0x000000f4<244>
50 ?? push eax
e8 26 05 00 00 ?? call function 0x00404460
L8: 83 c4 4c ?? add esp, 0x4c<76>
8d 85 c0 fe ff ff ?? lea eax, ss:[ebp + 0xfffffec0<4294966976,-320>]
50 ?? push eax
6a 04 ?? push 4
57 ?? push edi
ff b5 bc fe ff ff ?? push dword ss:[ebp + 0xfffffebc<4294966972,-324>]
e8 ae 01 00 00 ?? call function 0x00404100
L9: 83 c4 10 ?? add esp, 0x10<16>
5e ?? pop esi
L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
5f ?? pop edi
33 cd ?? xor ecx, ebp
5b ?? pop ebx
e8 4e da ff ff ?? call function 0x004019b0
L11: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403f70 | ?_RTC_Failure@@YAXPAXH@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 0c ?? mov eax, dword ss:[ebp + 12]
83 f8 04 ?? cmp eax, 4
77 23 ?? ja basic block L5
L2: 8b 0c 85 18 80 40 00 ?? mov ecx, dword ds:[0x00408018 + eax * 4]
8b 14 85 58 54 40 00 ?? mov edx, dword ds:[0x00405458 + eax * 4]
83 f9 ff ?? cmp ecx, 0xff<255,-1>
74 2e ?? je basic block L7
L3: 52 ?? push edx
50 ?? push eax
51 ?? push ecx
ff 75 08 ?? push dword ss:[ebp + 8]
e8 67 01 00 00 ?? call function 0x00404100
L4: 83 c4 10 ?? add esp, 0x10<16>
5d ?? pop ebp
c3 ?? ret
L5: 8b 15 6c 54 40 00 ?? mov edx, dword ds:[0x0040546c<"|W@">]
b8 05 00 00 00 ?? mov eax, 5
52 ?? push edx
50 ?? push eax
b9 01 00 00 00 ?? mov ecx, 1
51 ?? push ecx
ff 75 08 ?? push dword ss:[ebp + 8]
e8 47 01 00 00 ?? call function 0x00404100
L6: 83 c4 10 ?? add esp, 0x10<16>
L7: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x403fc0 | ?_RTC_StackFailure@@YAXPAXPBD@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
53 ?? push ebx
8b 5d 08 ?? mov ebx, dword ss:[ebp + 8]
56 ?? push esi
8b 75 0c ?? mov esi, dword ss:[ebp + 12]
57 ?? push edi
8b 3d 20 80 40 00 ?? mov edi, dword ds:[0x00408020]
83 ff ff ?? cmp edi, 0xff<255,-1>
74 73 ?? je basic block L12
L2: 80 3e 00 ?? cmp byte ds:[esi], 0
74 5c ?? je basic block L9
L3: 56 ?? push esi
e8 ee 00 00 00 ?? call function 0x004040e0
L4: 83 c0 2d ?? add eax, 0x2d<45>
83 c4 04 ?? add esp, 4
3d 00 04 00 00 ?? cmp eax, 0x00000400<1024>
77 49 ?? ja basic block L9
L5: 68 88 54 40 00 ?? push 0x00405488<"Stack around the variable '">
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
68 00 04 00 00 ?? push 0x00000400<1024>
50 ?? push eax
e8 98 0d 00 00 ?? call function 0x00404dad
L6: 56 ?? push esi
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
68 00 04 00 00 ?? push 0x00000400<1024>
50 ?? push eax
e8 8c 0d 00 00 ?? call function 0x00404db3
L7: 68 a4 54 40 00 ?? push 0x004054a4<"' was corrupted.">
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
68 00 04 00 00 ?? push 0x00000400<1024>
50 ?? push eax
e8 76 0d 00 00 ?? call function 0x00404db3
L8: 83 c4 24 ?? add esp, 0x24<36>
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
eb 05 ?? jmp basic block L10
L9: b8 98 58 40 00 ?? mov eax, 0x00405898<"Stack corrupted near unkn"+12 more>
L10: 50 ?? push eax
6a 02 ?? push 2
57 ?? push edi
53 ?? push ebx
e8 a9 00 00 00 ?? call function 0x00404100
L11: 83 c4 10 ?? add esp, 0x10<16>
L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
5f ?? pop edi
5e ?? pop esi
33 cd ?? xor ecx, ebp
5b ?? pop ebx
e8 49 d9 ff ff ?? call function 0x004019b0
L13: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404070 | _getMemBlockDataString | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
53 ?? push ebx
8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>]
33 d2 ?? xor edx, edx
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
57 ?? push edi
33 ff ?? xor edi, edi
2b de ?? sub ebx, esi
89 5d 10 ?? mov dword ss:[ebp + 0x10<16>], ebx
L2: 8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>]
89 55 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edx
83 f8 10 ?? cmp eax, 0x10<16>
72 05 ?? jb basic block L4
L3: b8 10 00 00 00 ?? mov eax, 0x00000010<16>
L4: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
03 cf ?? add ecx, edi
3b d0 ?? cmp edx, eax
73 2c ?? jae basic block L7
L5: 8a 1c 33 ?? mov bl, byte ds:[ebx + esi]
0f b6 c3 ?? movzx eax, bl
50 ?? push eax
b8 31 00 00 00 ?? mov eax, 0x00000031<49>
68 c0 58 40 00 ?? push 0x004058c0<"%.2X ">
2b c7 ?? sub eax, edi
50 ?? push eax
51 ?? push ecx
e8 a7 03 00 00 ?? call function 0x00404460
L6: 8b 55 fc ?? mov edx, dword ss:[ebp + 0xfc<252,-4>]
83 c4 10 ?? add esp, 0x10<16>
88 1e ?? mov byte ds:[esi], bl
42 ?? inc edx
8b 5d 10 ?? mov ebx, dword ss:[ebp + 0x10<16>]
46 ?? inc esi
83 c7 03 ?? add edi, 3
eb bb ?? jmp basic block L2
L7: 5f ?? pop edi
c6 06 00 ?? mov byte ds:[esi], 0
5e ?? pop esi
c6 01 00 ?? mov byte ds:[ecx], 0
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4040e0 | _strlen_priv | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
8b c2 ?? mov eax, edx
L2: 8a 08 ?? mov cl, byte ds:[eax]
40 ?? inc eax
84 c9 ?? test cl, cl
L3: 75 f9 ?? jne basic block L2
L4: 2b c2 ?? sub eax, edx
48 ?? dec eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404100 | failwithmessage | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 3c 0e 00 00 ?? sub esp, 0x00000e3c<3644>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 45 10 ?? mov eax, dword ss:[ebp + 0x10<16>]
53 ?? push ebx
8b 5d 14 ?? mov ebx, dword ss:[ebp + 0x14<20>]
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
57 ?? push edi
56 ?? push esi
89 85 d0 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1d0<4294963664,-3632>], eax
89 9d c4 f1 ff ff ?? mov dword ss:[ebp + 0xfffff1c4<4294963652,-3644>], ebx
c7 85 cc f1 ff ff 00 00 ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0
00 00
e8 55 03 00 00 ?? call function 0x00404490
L2: 8b f8 ?? mov edi, eax
83 c4 04 ?? add esp, 4
85 ff ?? test edi, edi
75 0f ?? jne basic block L5
L3: 56 ?? push esi
e8 36 03 00 00 ?? call function 0x00404480
L4: 83 c4 04 ?? add esp, 4
89 85 cc f1 ff ff ?? mov dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], eax
L5: 6a 00 ?? push 0
6a 00 ?? push 0
6a ff ?? push 0xff<255,-1>
53 ?? push ebx
6a 00 ?? push 0
68 e9 fd 00 00 ?? push 0x0000fde9<65001>
ff 15 38 50 40 00 ?? call dword ds:[0x00405038<":q@">]
L6: 3d 00 02 00 00 ?? cmp eax, 0x00000200<512>
73 22 ?? jae basic block L9
L7: 50 ?? push eax
8d 85 d4 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1d4<4294963668,-3628>]
50 ?? push eax
6a ff ?? push 0xff<255,-1>
53 ?? push ebx
6a 00 ?? push 0
68 e9 fd 00 00 ?? push 0x0000fde9<65001>
ff 15 38 50 40 00 ?? call dword ds:[0x00405038<":q@">]
L8: 8d 9d d4 f1 ff ff ?? lea ebx, ss:[ebp + 0xfffff1d4<4294963668,-3628>]
85 c0 ?? test eax, eax
75 05 ?? jne basic block L10
L9: bb a0 57 40 00 ?? mov ebx, 0x004057a0<"Runtime Check Error.\r\n Un"+28 more>
L10: 68 02 10 00 00 ?? push 0x00001002<4098>
e8 51 fc ff ff ?? call function 0x00403df0
L11: 83 c4 04 ?? add esp, 4
84 c0 ?? test al, al
74 22 ?? je basic block L15
L12: 8b 85 d0 f1 ff ff ?? mov eax, dword ss:[ebp + 0xfffff1d0<4294963664,-3632>]
53 ?? push ebx
56 ?? push esi
ff 34 85 70 54 40 00 ?? push dword ds:[0x00405470 + eax * 4]
50 ?? push eax
e8 75 fc ff ff ?? call function 0x00403e30
L13: 83 c4 10 ?? add esp, 0x10<16>
84 c0 ?? test al, al
0f 85 27 01 00 00 ?? jne basic block L36
L14: eb 02 ?? jmp basic block L16
L15: b0 01 ?? mov al, 1
L16: 83 bd cc f1 ff ff 00 ?? cmp dword ss:[ebp + 0xfffff1cc<4294963660,-3636>], 0
75 08 ?? jne basic block L18
L17: 85 ff ?? test edi, edi
0f 84 11 01 00 00 ?? je basic block L35
L18: 84 c0 ?? test al, al
74 0e ?? je basic block L21
L19: ff 15 28 50 40 00 ?? call dword ds:[0x00405028<"2p@">]
L20: 85 c0 ?? test eax, eax
0f 85 ff 00 00 00 ?? jne basic block L35
L21: 68 04 01 00 00 ?? push 0x00000104<260>
8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>]
50 ?? push eax
8d 85 c8 f1 ff ff ?? lea eax, ss:[ebp + 0xfffff1c8<4294963656,-3640>]
50 ?? push eax
68 04 01 00 00 ?? push 0x00000104<260>
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
50 ?? push eax
8d 46 fb ?? lea eax, ds:[esi + 0xfb<251,-5>]
50 ?? push eax
e8 ab 07 00 00 ?? call function 0x004049c0
L22: 83 c4 18 ?? add esp, 0x18<24>
85 ff ?? test edi, edi
74 32 ?? je basic block L26
L23: 53 ?? push ebx
ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>]
8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>]
8b cf ?? mov ecx, edi
68 10 58 40 00 ?? push 0x00405810<"Run-Time Check Failure #%d - %s">
50 ?? push eax
ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>]
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
50 ?? push eax
ff 75 0c ?? push dword ss:[ebp + 12]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L24: ff d7 ?? call edi
L25: e9 96 00 00 00 ?? jmp basic block L34
L26: 6a 00 ?? push 0
6a 00 ?? push 0
68 0a 03 00 00 ?? push 0x0000030a<778>
8d 85 e0 f8 ff ff ?? lea eax, ss:[ebp + 0xfffff8e0<4294965472,-1824>]
be 50 58 40 00 ?? mov esi, 0x00405850<"Unknown Filename">
50 ?? push eax
6a ff ?? push 0xff<255,-1>
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
50 ?? push eax
6a 00 ?? push 0
68 e9 fd 00 00 ?? push 0x0000fde9<65001>
ff 15 3c 50 40 00 ?? call dword ds:[0x0040503c<"Pq@">]
L27: 85 c0 ?? test eax, eax
74 06 ?? je basic block L29
L28: 8d b5 e0 f8 ff ff ?? lea esi, ss:[ebp + 0xfffff8e0<4294965472,-1824>]
L29: 6a 00 ?? push 0
6a 00 ?? push 0
68 0a 03 00 00 ?? push 0x0000030a<778>
8d 85 d4 f5 ff ff ?? lea eax, ss:[ebp + 0xfffff5d4<4294964692,-2604>]
bf 64 58 40 00 ?? mov edi, 0x00405864<"Unknown Module Name">
50 ?? push eax
6a ff ?? push 0xff<255,-1>
8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>]
50 ?? push eax
6a 00 ?? push 0
68 e9 fd 00 00 ?? push 0x0000fde9<65001>
ff 15 3c 50 40 00 ?? call dword ds:[0x0040503c<"Pq@">]
L30: 85 c0 ?? test eax, eax
74 06 ?? je basic block L32
L31: 8d bd d4 f5 ff ff ?? lea edi, ss:[ebp + 0xfffff5d4<4294964692,-2604>]
L32: ff b5 c4 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c4<4294963652,-3644>]
8b 9d cc f1 ff ff ?? mov ebx, dword ss:[ebp + 0xfffff1cc<4294963660,-3636>]
8b cb ?? mov ecx, ebx
ff b5 d0 f1 ff ff ?? push dword ss:[ebp + 0xfffff1d0<4294963664,-3632>]
68 78 58 40 00 ?? push 0x00405878<"Run-Time Check Failure #%d - %s">
57 ?? push edi
ff b5 c8 f1 ff ff ?? push dword ss:[ebp + 0xfffff1c8<4294963656,-3640>]
56 ?? push esi
ff 75 0c ?? push dword ss:[ebp + 12]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L33: ff d3 ?? call ebx
L34: 83 c4 1c ?? add esp, 0x1c<28>
83 f8 01 ?? cmp eax, 1
75 01 ?? jne basic block L36
L35: cc ?? int3
L36: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
5f ?? pop edi
5e ?? pop esi
33 cd ?? xor ecx, ebp
5b ?? pop ebx
e8 b6 d6 ff ff ?? call function 0x004019b0
L37: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404300 | notify_debugger | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a fe ?? push 0xfe<254,-2>
68 00 66 40 00 ?? push 0x00406600
68 40 4d 40 00 ?? push function 0x00404d40
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
83 ec 08 ?? sub esp, 8
53 ?? push ebx
56 ?? push esi
57 ?? push edi
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
31 45 f8 ?? xor dword ss:[ebp + 0xf8<248,-8>], eax
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp
c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
ff 75 08 ?? push dword ss:[ebp + 8]
6a 06 ?? push 6
6a 00 ?? push 0
68 88 13 6d 40 ?? push 0x406d1388
ff 15 34 50 40 00 ?? call dword ds:[0x00405034<"(q@">]
L2: eb 16 ?? jmp basic block L5
L3: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>]
8b 00 ?? mov eax, dword ds:[eax]
33 c9 ?? xor ecx, ecx
81 38 88 13 6d 40 ?? cmp dword ds:[eax], 0x406d1388
0f 94 c1 ?? sete cl
8b c1 ?? mov eax, ecx
c3 ?? ret
L4: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
L5: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404380 | __RTC_UninitUse | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 04 04 00 00 ?? sub esp, 0x00000404<1028>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
57 ?? push edi
8b 3d 24 80 40 00 ?? mov edi, dword ds:[0x00408024]
83 ff ff ?? cmp edi, 0xff<255,-1>
74 75 ?? je basic block L12
L2: 85 f6 ?? test esi, esi
74 5c ?? je basic block L9
L3: 56 ?? push esi
e8 33 fd ff ff ?? call function 0x004040e0
L4: 83 c0 3a ?? add eax, 0x3a<58>
83 c4 04 ?? add esp, 4
3d 00 04 00 00 ?? cmp eax, 0x00000400<1024>
77 49 ?? ja basic block L9
L5: 68 b8 54 40 00 ?? push 0x004054b8<"The variable '">
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
68 00 04 00 00 ?? push 0x00000400<1024>
50 ?? push eax
e8 dd 09 00 00 ?? call function 0x00404dad
L6: 56 ?? push esi
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
68 00 04 00 00 ?? push 0x00000400<1024>
50 ?? push eax
e8 d1 09 00 00 ?? call function 0x00404db3
L7: 68 c8 54 40 00 ?? push 0x004054c8<"' is being used without b"+17 more>
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
68 00 04 00 00 ?? push 0x00000400<1024>
50 ?? push eax
e8 bb 09 00 00 ?? call function 0x00404db3
L8: 83 c4 24 ?? add esp, 0x24<36>
8d 85 fc fb ff ff ?? lea eax, ss:[ebp + 0xfffffbfc<4294966268,-1028>]
eb 05 ?? jmp basic block L10
L9: b8 d4 59 40 00 ?? mov eax, 0x004059d4<"A variable is being used "+26 more>
L10: 50 ?? push eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
6a 03 ?? push 3
57 ?? push edi
50 ?? push eax
e8 eb fc ff ff ?? call function 0x00404100
L11: 83 c4 10 ?? add esp, 0x10<16>
L12: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
5f ?? pop edi
33 cd ?? xor ecx, ebp
5e ?? pop esi
e8 8c d5 ff ff ?? call function 0x004019b0
L13: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404430 | __vsprintf_s_l | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 b8 e8 ff ff ?? call function 0x00402cf0
L2: ff 75 18 ?? push dword ss:[ebp + 0x18<24>]
ff 75 14 ?? push dword ss:[ebp + 0x14<20>]
ff 75 10 ?? push dword ss:[ebp + 0x10<16>]
ff 75 0c ?? push dword ss:[ebp + 12]
ff 75 08 ?? push dword ss:[ebp + 8]
ff 70 04 ?? push dword ds:[eax + 4]
ff 30 ?? push dword ds:[eax]
e8 68 09 00 00 ?? call function 0x00404db9
L3: 83 c4 1c ?? add esp, 0x1c<28>
85 c0 ?? test eax, eax
79 03 ?? jns basic block L5
L4: 83 c8 ff ?? or eax, 0xff<255,-1>
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404460 | _sprintf_s | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8d 45 14 ?? lea eax, ss:[ebp + 0x14<20>]
50 ?? push eax
6a 00 ?? push 0
ff 75 10 ?? push dword ss:[ebp + 0x10<16>]
ff 75 0c ?? push dword ss:[ebp + 12]
ff 75 08 ?? push dword ss:[ebp + 8]
e8 b9 ff ff ff ?? call function 0x00404430
L2: 83 c4 14 ?? add esp, 0x14<20>
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404480 | ?_RTC_GetErrorFunc@@YAP6AHHPBDH00ZZPBX@Z | 0 |
L1: a1 68 84 40 00 ?? mov eax, dword ds:[0x00408468]
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404490 | ?_RTC_GetErrorFuncW@@YAP6AHHPB_WH00ZZPBX@Z | 0 |
L1: a1 6c 84 40 00 ?? mov eax, dword ds:[0x0040846c]
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4044a0 | __RTC_GetErrDesc | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 f8 04 ?? cmp eax, 4
77 09 ?? ja basic block L3
L2: 8b 04 85 08 5a 40 00 ?? mov eax, dword ds:[0x00405a08 + eax * 4]
5d ?? pop ebp
c3 ?? ret
L3: 33 c0 ?? xor eax, eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4044c0 | __RTC_NumErrors | 0 |
L1: b8 05 00 00 00 ?? mov eax, 5
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4044d0 | __RTC_SetErrorFunc | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
a1 68 84 40 00 ?? mov eax, dword ds:[0x00408468]
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 0d 68 84 40 00 ?? mov dword ds:[0x00408468], ecx
c7 05 6c 84 40 00 00 00 ?? mov dword ds:[0x0040846c], 0
00 00
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4044f0 | __RTC_SetErrorFuncW | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
a1 6c 84 40 00 ?? mov eax, dword ds:[0x0040846c]
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 0d 6c 84 40 00 ?? mov dword ds:[0x0040846c], ecx
c7 05 68 84 40 00 00 00 ?? mov dword ds:[0x00408468], 0
00 00
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404510 | __RTC_SetErrorType | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
83 fa 04 ?? cmp edx, 4
77 13 ?? ja basic block L3
L2: 8b 04 95 18 80 40 00 ?? mov eax, dword ds:[0x00408018 + edx * 4]
8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
89 0c 95 18 80 40 00 ?? mov dword ds:[0x00408018 + edx * 4], ecx
5d ?? pop ebp
c3 ?? ret
L3: 83 c8 ff ?? or eax, 0xff<255,-1>
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404540 | GetPdbDll | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 14 04 00 00 ?? sub esp, 0x00000414<1044>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
80 3d 74 84 40 00 00 ?? cmp byte ds:[0x00408474], 0
0f 85 1a 01 00 00 ?? jne basic block L27
L2: c6 05 74 84 40 00 01 ?? mov byte ds:[0x00408474], 1
e8 24 01 00 00 ?? call function 0x00404690
L3: 85 c0 ?? test eax, eax
0f 85 08 01 00 00 ?? jne basic block L28
L4: 68 ec 5a 40 00 ?? push 0x00405aec<"VCRUNTIME140D.dll">
e8 23 08 00 00 ?? call function 0x00404da1
L5: 83 c4 04 ?? add esp, 4
85 c0 ?? test eax, eax
74 78 ?? je basic block L16
L6: 68 04 01 00 00 ?? push 0x00000104<260>
8d 8d ec fb ff ff ?? lea ecx, ss:[ebp + 0xfffffbec<4294966252,-1044>]
51 ?? push ecx
50 ?? push eax
e8 04 08 00 00 ?? call function 0x00404d9b
L7: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 5f ?? je basic block L16
L8: 68 04 01 00 00 ?? push 0x00000104<260>
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
50 ?? push eax
8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>]
50 ?? push eax
e8 3a 03 00 00 ?? call function 0x004048f0
L9: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 40 ?? je basic block L16
L10: 68 00 09 00 00 ?? push 0x00000900<2304>
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
6a 00 ?? push 0
50 ?? push eax
e8 d7 07 00 00 ?? call function 0x00404da7
L11: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
0f 85 a1 00 00 00 ?? jne basic block L28
L12: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">]
L13: 83 f8 57 ?? cmp eax, 0x57<87>
75 17 ?? jne basic block L16
L14: 6a 08 ?? push 8
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
6a 00 ?? push 0
50 ?? push eax
e8 b1 07 00 00 ?? call function 0x00404da7
L15: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
75 7f ?? jne basic block L28
L16: 68 00 0a 00 00 ?? push 0x00000a00<2560>
6a 00 ?? push 0
68 50 5c 40 00 ?? push 0x00405c50<"MSPDB140">
e8 99 07 00 00 ?? call function 0x00404da7
L17: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
75 67 ?? jne basic block L28
L18: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">]
L19: 83 f8 57 ?? cmp eax, 0x57<87>
75 5a ?? jne basic block L27
L20: 68 04 01 00 00 ?? push 0x00000104<260>
8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>]
50 ?? push eax
6a 00 ?? push 0
e8 68 07 00 00 ?? call function 0x00404d9b
L21: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 40 ?? je basic block L27
L22: 68 04 01 00 00 ?? push 0x00000104<260>
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
50 ?? push eax
8d 85 ec fb ff ff ?? lea eax, ss:[ebp + 0xfffffbec<4294966252,-1044>]
50 ?? push eax
e8 9e 02 00 00 ?? call function 0x004048f0
L23: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
74 21 ?? je basic block L27
L24: 6a 08 ?? push 8
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
6a 00 ?? push 0
50 ?? push eax
e8 3e 07 00 00 ?? call function 0x00404da7
L25: 83 c4 0c ?? add esp, 12
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 3a d3 ff ff ?? call function 0x004019b0
L26: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
L27: 33 c0 ?? xor eax, eax
L28: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 2a d3 ff ff ?? call function 0x004019b0
L29: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404690 | GetPdbDllFromInstallPath | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 1c 02 00 00 ?? sub esp, 0x0000021c<540>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
53 ?? push ebx
56 ?? push esi
57 ?? push edi
68 00 08 00 00 ?? push 0x00000800<2048>
6a 00 ?? push 0
68 10 5b 40 00 ?? push 0x00405b10<"api-ms-win-core-registry-"+10 more>
e8 f0 06 00 00 ?? call function 0x00404da7
L2: 8b f8 ?? mov edi, eax
83 c4 0c ?? add esp, 12
85 ff ?? test edi, edi
75 39 ?? jne basic block L9
L3: 68 00 08 00 00 ?? push 0x00000800<2048>
50 ?? push eax
68 58 5b 40 00 ?? push 0x00405b58<"advapi32.dll">
e8 d7 06 00 00 ?? call function 0x00404da7
L4: 8b f8 ?? mov edi, eax
83 c4 0c ?? add esp, 12
85 ff ?? test edi, edi
75 20 ?? jne basic block L9
L5: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">]
L6: 83 f8 57 ?? cmp eax, 0x57<87>
75 79 ?? jne basic block L19
L7: 57 ?? push edi
57 ?? push edi
68 58 5b 40 00 ?? push 0x00405b58<"advapi32.dll">
e8 b7 06 00 00 ?? call function 0x00404da7
L8: 8b f8 ?? mov edi, eax
83 c4 0c ?? add esp, 12
85 ff ?? test edi, edi
74 64 ?? je basic block L19
L9: 68 74 5b 40 00 ?? push 0x00405b74<"RegOpenKeyExW">
57 ?? push edi
ff 15 00 50 40 00 ?? call dword ds:[0x00405000]
L10: 8b f0 ?? mov esi, eax
85 f6 ?? test esi, esi
74 52 ?? je basic block L19
L11: 68 84 5b 40 00 ?? push 0x00405b84<"RegQueryValueExW">
57 ?? push edi
ff 15 00 50 40 00 ?? call dword ds:[0x00405000]
L12: 8b d8 ?? mov ebx, eax
85 db ?? test ebx, ebx
74 40 ?? je basic block L19
L13: 68 98 5b 40 00 ?? push 0x00405b98<"RegCloseKey">
57 ?? push edi
ff 15 00 50 40 00 ?? call dword ds:[0x00405000]
L14: 89 85 e8 fd ff ff ?? mov dword ss:[ebp + 0xfffffde8<4294966760,-536>], eax
85 c0 ?? test eax, eax
74 2a ?? je basic block L19
L15: 8d 85 f0 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf0<4294966768,-528>]
8b ce ?? mov ecx, esi
50 ?? push eax
6a 01 ?? push 1
6a 00 ?? push 0
68 a8 5b 40 00 ?? push 0x00405ba8<"SOFTWARE\\Wow6432Node\\Micr"+32 more>
68 02 00 00 80 ?? push 0x80000002
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L16: ff d6 ?? call esi
L17: 85 c0 ?? test eax, eax
74 1a ?? je basic block L21
L18: 57 ?? push edi
ff 15 44 50 40 00 ?? call dword ds:[0x00405044]
L19: 5f ?? pop edi
5e ?? pop esi
33 c0 ?? xor eax, eax
5b ?? pop ebx
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 44 d2 ff ff ?? call function 0x004019b0
L20: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
L21: 8d 85 ec fd ff ff ?? lea eax, ss:[ebp + 0xfffffdec<4294966764,-532>]
c7 85 ec fd ff ff 08 02 ?? mov dword ss:[ebp + 0xfffffdec<4294966764,-532>], 0x00000208<520>
00 00
50 ?? push eax
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
8b cb ?? mov ecx, ebx
50 ?? push eax
8d 85 e4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffde4<4294966756,-540>]
50 ?? push eax
6a 00 ?? push 0
68 1c 5c 40 00 ?? push 0x00405c1c<"ProductDir">
ff b5 f0 fd ff ff ?? push dword ss:[ebp + 0xfffffdf0<4294966768,-528>]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L22: ff d3 ?? call ebx
L23: ff b5 f0 fd ff ff ?? push dword ss:[ebp + 0xfffffdf0<4294966768,-528>]
8b 9d e8 fd ff ff ?? mov ebx, dword ss:[ebp + 0xfffffde8<4294966760,-536>]
8b f0 ?? mov esi, eax
8b cb ?? mov ecx, ebx
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L24: ff d3 ?? call ebx
L25: 57 ?? push edi
ff 15 44 50 40 00 ?? call dword ds:[0x00405044]
L26: 85 f6 ?? test esi, esi
75 94 ?? jne basic block L19
L27: 83 bd e4 fd ff ff 01 ?? cmp dword ss:[ebp + 0xfffffde4<4294966756,-540>], 1
75 8b ?? jne basic block L19
L28: 8b 8d ec fd ff ff ?? mov ecx, dword ss:[ebp + 0xfffffdec<4294966764,-532>]
f6 c1 01 ?? test cl, 1
75 80 ?? jne basic block L19
L29: d1 e9 ?? shr ecx, 1
8b d1 ?? mov edx, ecx
83 f9 02 ?? cmp ecx, 2
0f 82 73 ff ff ff ?? jb basic block L19
L30: 49 ?? dec ecx
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
66 39 34 48 ?? cmp word ds:[eax + ecx * 2], si
8d 04 48 ?? lea eax, ds:[eax + ecx * 2]
0f 85 5f ff ff ff ?? jne basic block L19
L31: 66 83 78 fe 5c ?? cmp word ds:[eax + 0xfe<254,-2>], 0x5c<92>
74 0a ?? je basic block L33
L32: b9 5c 00 00 00 ?? mov ecx, 0x0000005c<92>
66 89 08 ?? mov word ds:[eax], cx
8b ca ?? mov ecx, edx
L33: 8b c1 ?? mov eax, ecx
f7 d0 ?? not eax
83 f8 12 ?? cmp eax, 0x12<18>
0f 82 41 ff ff ff ?? jb basic block L19
L34: 8d 41 11 ?? lea eax, ds:[ecx + 0x11<17>]
3d 04 01 00 00 ?? cmp eax, 0x00000104<260>
0f 87 33 ff ff ff ?? ja basic block L19
L35: a1 c8 5a 40 00 ?? mov eax, dword ds:[0x00405ac8<"bin\\MSPDB140.DLL">]
89 84 4d f4 fd ff ff ?? mov dword ss:[ebp + 0xfffffdf4<4294966772,-524> + ecx * 2], eax
a1 cc 5a 40 00 ?? mov eax, dword ds:[0x00405acc<"n\\MSPDB140.DLL">]
89 84 4d f8 fd ff ff ?? mov dword ss:[ebp + 0xfffffdf8<4294966776,-520> + ecx * 2], eax
a1 d0 5a 40 00 ?? mov eax, dword ds:[0x00405ad0<"MSPDB140.DLL">]
89 84 4d fc fd ff ff ?? mov dword ss:[ebp + 0xfffffdfc<4294966780,-516> + ecx * 2], eax
a1 d4 5a 40 00 ?? mov eax, dword ds:[0x00405ad4<"PDB140.DLL">]
89 84 4d 00 fe ff ff ?? mov dword ss:[ebp + 0xfffffe00<4294966784,-512> + ecx * 2], eax
a1 d8 5a 40 00 ?? mov eax, dword ds:[0x00405ad8<"B140.DLL">]
89 84 4d 04 fe ff ff ?? mov dword ss:[ebp + 0xfffffe04<4294966788,-508> + ecx * 2], eax
a1 dc 5a 40 00 ?? mov eax, dword ds:[0x00405adc<"40.DLL">]
89 84 4d 08 fe ff ff ?? mov dword ss:[ebp + 0xfffffe08<4294966792,-504> + ecx * 2], eax
a1 e0 5a 40 00 ?? mov eax, dword ds:[0x00405ae0<".DLL">]
89 84 4d 0c fe ff ff ?? mov dword ss:[ebp + 0xfffffe0c<4294966796,-500> + ecx * 2], eax
a1 e4 5a 40 00 ?? mov eax, dword ds:[0x00405ae4<"LL">]
89 84 4d 10 fe ff ff ?? mov dword ss:[ebp + 0xfffffe10<4294966800,-496> + ecx * 2], eax
66 a1 e8 5a 40 00 ?? mov ax, word ds:[0x00405ae8]
68 00 09 00 00 ?? push 0x00000900<2304>
66 89 84 4d 14 fe ff ff ?? mov word ss:[ebp + 0xfffffe14<4294966804,-492> + ecx * 2], ax
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
6a 00 ?? push 0
50 ?? push eax
e8 fc 04 00 00 ?? call function 0x00404da7
L36: 8b f0 ?? mov esi, eax
83 c4 0c ?? add esp, 12
85 f6 ?? test esi, esi
75 1f ?? jne basic block L41
L37: ff 15 40 50 40 00 ?? call dword ds:[0x00405040<"fq@">]
L38: 83 f8 57 ?? cmp eax, 0x57<87>
75 14 ?? jne basic block L41
L39: 6a 08 ?? push 8
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
56 ?? push esi
50 ?? push eax
e8 d9 04 00 00 ?? call function 0x00404da7
L40: 83 c4 0c ?? add esp, 12
8b f0 ?? mov esi, eax
L41: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b c6 ?? mov eax, esi
5f ?? pop edi
5e ?? pop esi
33 cd ?? xor ecx, ebp
5b ?? pop ebx
e8 ce d0 ff ff ?? call function 0x004019b0
L42: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4048f0 | GetPdbDllPathFromFilePath | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 0c 06 00 00 ?? sub esp, 0x0000060c<1548>
a1 04 80 40 00 ?? mov eax, dword ds:[0x00408004]
33 c5 ?? xor eax, ebp
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
8d 8d f4 fd ff ff ?? lea ecx, ss:[ebp + 0xfffffdf4<4294966772,-524>]
56 ?? push esi
8b 75 0c ?? mov esi, dword ss:[ebp + 12]
68 00 01 00 00 ?? push 0x00000100<256>
51 ?? push ecx
68 00 01 00 00 ?? push 0x00000100<256>
8d 8d f4 fb ff ff ?? lea ecx, ss:[ebp + 0xfffffbf4<4294966260,-1036>]
51 ?? push ecx
68 00 01 00 00 ?? push 0x00000100<256>
8d 8d f4 f9 ff ff ?? lea ecx, ss:[ebp + 0xfffff9f4<4294965748,-1548>]
51 ?? push ecx
6a 03 ?? push 3
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
51 ?? push ecx
50 ?? push eax
e8 8b 04 00 00 ?? call function 0x00404dc5
L2: 83 c4 24 ?? add esp, 0x24<36>
85 c0 ?? test eax, eax
75 6d ?? jne basic block L10
L3: 68 3c 5c 40 00 ?? push 0x00405c3c<"MSPDB140">
8d 85 f4 fb ff ff ?? lea eax, ss:[ebp + 0xfffffbf4<4294966260,-1036>]
6a 09 ?? push 9
50 ?? push eax
e8 77 04 00 00 ?? call function 0x00404dcb
L4: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
75 53 ?? jne basic block L10
L5: 68 34 5c 40 00 ?? push 0x00405c34<"DLL">
8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
6a 04 ?? push 4
50 ?? push eax
e8 5d 04 00 00 ?? call function 0x00404dcb
L6: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
75 39 ?? jne basic block L10
L7: 8d 85 f4 fd ff ff ?? lea eax, ss:[ebp + 0xfffffdf4<4294966772,-524>]
50 ?? push eax
8d 85 f4 fb ff ff ?? lea eax, ss:[ebp + 0xfffffbf4<4294966260,-1036>]
50 ?? push eax
8d 85 f4 f9 ff ff ?? lea eax, ss:[ebp + 0xfffff9f4<4294965748,-1548>]
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
ff 75 10 ?? push dword ss:[ebp + 0x10<16>]
56 ?? push esi
e8 28 04 00 00 ?? call function 0x00404dbf
L8: 83 c4 18 ?? add esp, 0x18<24>
f7 d8 ?? neg eax
1b c0 ?? sbb eax, eax
40 ?? inc eax
5e ?? pop esi
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 cd ?? xor ecx, ebp
e8 06 d0 ff ff ?? call function 0x004019b0
L9: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
L10: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
33 c0 ?? xor eax, eax
33 cd ?? xor ecx, ebp
5e ?? pop esi
e8 f5 cf ff ff ?? call function 0x004019b0
L11: 8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x4049c0 | ?_RTC_GetSrcLine@@YAHPAEPA_WKPAH1K@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>]
83 ec 4c ?? sub esp, 0x4c<76>
33 c9 ?? xor ecx, ecx
53 ?? push ebx
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
c7 00 00 00 00 00 ?? mov dword ds:[eax], 0
4e ?? dec esi
8b 45 0c ?? mov eax, dword ss:[ebp + 12]
57 ?? push edi
6a 1c ?? push 0x1c<28>
66 89 08 ?? mov word ds:[eax], cx
8d 45 b4 ?? lea eax, ss:[ebp + 0xb4<180,-76>]
50 ?? push eax
56 ?? push esi
ff 15 48 50 40 00 ?? call dword ds:[0x00405048]
L2: 85 c0 ?? test eax, eax
0f 84 44 03 00 00 ?? je basic block L78
L3: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>]
ff 75 18 ?? push dword ss:[ebp + 0x18<24>]
ff 75 b8 ?? push dword ss:[ebp + 0xb8<184,-72>]
e8 9a 03 00 00 ?? call function 0x00404d9b
L4: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
0f 84 2b 03 00 00 ?? je basic block L78
L5: 8b 45 b8 ?? mov eax, dword ss:[ebp + 0xb8<184,-72>]
b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117>
66 39 08 ?? cmp word ds:[eax], cx
0f 85 1a 03 00 00 ?? jne basic block L78
L6: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
85 c9 ?? test ecx, ecx
0f 8e 0f 03 00 00 ?? jle basic block L78
L7: 03 c8 ?? add ecx, eax
81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744>
0f 85 01 03 00 00 ?? jne basic block L78
L8: 0f b7 51 14 ?? movzx edx, word ds:[ecx + 0x14<20>]
2b f0 ?? sub esi, eax
0f b7 79 06 ?? movzx edi, word ds:[ecx + 6]
83 c2 20 ?? add edx, 0x20<32>
33 db ?? xor ebx, ebx
33 c0 ?? xor eax, eax
85 ff ?? test edi, edi
74 1c ?? je basic block L13
L9: 03 ca ?? add ecx, edx
8d 49 00 ?? lea ecx, ds:[ecx + 0]
L10: 8b 51 04 ?? mov edx, dword ds:[ecx + 4]
3b f2 ?? cmp esi, edx
72 08 ?? jb basic block L12
L11: 8b de ?? mov ebx, esi
2b da ?? sub ebx, edx
3b 31 ?? cmp esi, dword ds:[ecx]
72 08 ?? jb basic block L13
L12: 40 ?? inc eax
83 c1 28 ?? add ecx, 0x28<40>
3b c7 ?? cmp eax, edi
72 e9 ?? jb basic block L10
L13: 3b c7 ?? cmp eax, edi
0f 84 c8 02 00 00 ?? je basic block L78
L14: 40 ?? inc eax
80 3d 75 84 40 00 00 ?? cmp byte ds:[0x00408475], 0
89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
75 28 ?? jne basic block L19
L15: 83 3d 70 84 40 00 00 ?? cmp dword ds:[0x00408470], 0
0f 85 ae 02 00 00 ?? jne basic block L78
L16: e8 b2 fa ff ff ?? call function 0x00404540
L17: a3 70 84 40 00 ?? mov dword ds:[0x00408470], eax
85 c0 ?? test eax, eax
0f 84 9c 02 00 00 ?? je basic block L78
L18: c6 05 75 84 40 00 01 ?? mov byte ds:[0x00408475], 1
eb 05 ?? jmp basic block L20
L19: a1 70 84 40 00 ?? mov eax, dword ds:[0x00408470]
L20: 68 64 5c 40 00 ?? push 0x00405c64<"PDBOpenValidate5">
50 ?? push eax
ff 15 00 50 40 00 ?? call dword ds:[0x00405000]
L21: 8b f0 ?? mov esi, eax
85 f6 ?? test esi, esi
0f 84 78 02 00 00 ?? je basic block L78
L22: 8d 45 e8 ?? lea eax, ss:[ebp + 0xe8<232,-24>]
8b ce ?? mov ecx, esi
50 ?? push eax
6a 00 ?? push 0
6a 00 ?? push 0
8d 45 d0 ?? lea eax, ss:[ebp + 0xd0<208,-48>]
50 ?? push eax
6a 00 ?? push 0
6a 00 ?? push 0
6a 00 ?? push 0
ff 75 18 ?? push dword ss:[ebp + 0x18<24>]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L23: ff d6 ?? call esi
L24: 83 c4 20 ?? add esp, 0x20<32>
85 c0 ?? test eax, eax
0f 84 4e 02 00 00 ?? je basic block L78
L25: 8b 7d e8 ?? mov edi, dword ss:[ebp + 0xe8<232,-24>]
c7 45 f8 00 00 00 00 ?? mov dword ss:[ebp + 0xf8<248,-8>], 0
c7 45 dc 00 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 0
8b 07 ?? mov eax, dword ds:[edi]
8b 30 ?? mov esi, dword ds:[eax]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L26: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L27: 3d 41 91 32 01 ?? cmp eax, 0x01329141
0f 85 3f 01 00 00 ?? jne basic block L59
L28: 8b 7d e8 ?? mov edi, dword ss:[ebp + 0xe8<232,-24>]
8b 07 ?? mov eax, dword ds:[edi]
8b 70 1c ?? mov esi, dword ds:[eax + 0x1c<28>]
8d 45 e0 ?? lea eax, ss:[ebp + 0xe0<224,-32>]
50 ?? push eax
68 78 5c 40 00 ?? push 0x00405c78<"r">
6a 00 ?? push 0
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L29: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L30: 85 c0 ?? test eax, eax
0f 84 18 01 00 00 ?? je basic block L59
L31: 8b 7d e0 ?? mov edi, dword ss:[ebp + 0xe0<224,-32>]
6a 00 ?? push 0
6a 00 ?? push 0
6a 00 ?? push 0
8b 07 ?? mov eax, dword ds:[edi]
8b 70 20 ?? mov esi, dword ds:[eax + 0x20<32>]
8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>]
50 ?? push eax
53 ?? push ebx
ff 75 f4 ?? push dword ss:[ebp + 0xf4<244,-12>]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L32: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L33: 85 c0 ?? test eax, eax
0f 84 da 00 00 00 ?? je basic block L57
L34: 8b 7d ec ?? mov edi, dword ss:[ebp + 0xec<236,-20>]
8b 07 ?? mov eax, dword ds:[edi]
8b 70 68 ?? mov esi, dword ds:[eax + 0x68<104>]
8d 45 f8 ?? lea eax, ss:[ebp + 0xf8<248,-8>]
50 ?? push eax
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L35: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L36: 84 c0 ?? test al, al
0f 84 a6 00 00 00 ?? je basic block L55
L37: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>]
85 ff ?? test edi, edi
0f 84 9b 00 00 00 ?? je basic block L55
L38: 8b 07 ?? mov eax, dword ds:[edi]
8b 70 08 ?? mov esi, dword ds:[eax + 8]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L39: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L40: 85 c0 ?? test eax, eax
74 61 ?? je basic block L50
L41: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>]
6a 00 ?? push 0
8b 07 ?? mov eax, dword ds:[edi]
8b 70 0c ?? mov esi, dword ds:[eax + 12]
8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>]
50 ?? push eax
8d 45 d8 ?? lea eax, ss:[ebp + 0xd8<216,-40>]
8b ce ?? mov ecx, esi
50 ?? push eax
8d 45 fc ?? lea eax, ss:[ebp + 0xfc<252,-4>]
50 ?? push eax
8d 45 e4 ?? lea eax, ss:[ebp + 0xe4<228,-28>]
50 ?? push eax
6a 00 ?? push 0
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L42: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L43: 84 c0 ?? test al, al
74 47 ?? je basic block L53
L44: 0f b7 45 fc ?? movzx eax, word ss:[ebp + 0xfc<252,-4>]
3b 45 f4 ?? cmp eax, dword ss:[ebp + 0xf4<244,-12>]
75 14 ?? jne basic block L47
L45: 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>]
3b cb ?? cmp ecx, ebx
77 0d ?? ja basic block L47
L46: 8b 45 d8 ?? mov eax, dword ss:[ebp + 0xd8<216,-40>]
03 c1 ?? add eax, ecx
3b d8 ?? cmp ebx, eax
0f 82 83 00 00 00 ?? jb basic block L62
L47: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>]
8b 07 ?? mov eax, dword ds:[edi]
8b 70 08 ?? mov esi, dword ds:[eax + 8]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L48: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L49: 85 c0 ?? test eax, eax
75 9f ?? jne basic block L41
L50: 33 c9 ?? xor ecx, ecx
L51: 51 ?? push ecx
6a 00 ?? push 0
ff 15 4c 50 40 00 ?? call dword ds:[0x0040504c]
L52: 50 ?? push eax
ff 15 50 50 40 00 ?? call dword ds:[0x00405050]
L53: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>]
8b 07 ?? mov eax, dword ds:[edi]
8b 30 ?? mov esi, dword ds:[eax]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L54: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L55: 8b 7d ec ?? mov edi, dword ss:[ebp + 0xec<236,-20>]
8b 07 ?? mov eax, dword ds:[edi]
8b 70 40 ?? mov esi, dword ds:[eax + 0x40<64>]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L56: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L57: 8b 7d e0 ?? mov edi, dword ss:[ebp + 0xe0<224,-32>]
8b 07 ?? mov eax, dword ds:[edi]
8b 70 38 ?? mov esi, dword ds:[eax + 0x38<56>]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L58: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L59: 8b 7d e8 ?? mov edi, dword ss:[ebp + 0xe8<232,-24>]
8b 17 ?? mov edx, dword ds:[edi]
8b 72 2c ?? mov esi, dword ds:[edx + 0x2c<44>]
8b ce ?? mov ecx, esi
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L60: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L61: 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>]
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
L62: 8b 75 f0 ?? mov esi, dword ss:[ebp + 0xf0<240,-16>]
85 f6 ?? test esi, esi
74 a0 ?? je basic block L53
L63: 81 fe ff ff ff 1f ?? cmp esi, 0x1fffffff
73 98 ?? jae basic block L53
L64: c1 e6 03 ?? shl esi, 3
ff 15 4c 50 40 00 ?? call dword ds:[0x0040504c]
L65: 56 ?? push esi
6a 00 ?? push 0
50 ?? push eax
ff 15 54 50 40 00 ?? call dword ds:[0x00405054<"vq@">]
L66: 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax
85 c0 ?? test eax, eax
0f 84 7a ff ff ff ?? je basic block L53
L67: 8b 7d f8 ?? mov edi, dword ss:[ebp + 0xf8<248,-8>]
50 ?? push eax
8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>]
50 ?? push eax
8b 0f ?? mov ecx, dword ds:[edi]
8d 45 d4 ?? lea eax, ss:[ebp + 0xd4<212,-44>]
6a 00 ?? push 0
6a 00 ?? push 0
6a 00 ?? push 0
8b 71 0c ?? mov esi, dword ds:[ecx + 12]
8b ce ?? mov ecx, esi
50 ?? push eax
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L68: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L69: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
84 c0 ?? test al, al
0f 84 3c ff ff ff ?? je basic block L51
L70: 2b 5d e4 ?? sub ebx, dword ss:[ebp + 0xe4<228,-28>]
3b 19 ?? cmp ebx, dword ds:[ecx]
0f 82 31 ff ff ff ?? jb basic block L51
L71: 8b 55 f0 ?? mov edx, dword ss:[ebp + 0xf0<240,-16>]
b8 01 00 00 00 ?? mov eax, 1
3b d0 ?? cmp edx, eax
76 0a ?? jbe basic block L74
L72: 3b 1c c1 ?? cmp ebx, dword ds:[ecx + eax * 8]
72 05 ?? jb basic block L74
L73: 40 ?? inc eax
3b c2 ?? cmp eax, edx
72 f6 ?? jb basic block L72
L74: 8b 44 c1 fc ?? mov eax, dword ds:[ecx + eax * 8 + 0xfc<252,-4>]
8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>]
25 ff ff ff 00 ?? and eax, 0x00ffffff
8b 7d ec ?? mov edi, dword ss:[ebp + 0xec<236,-20>]
6a 00 ?? push 0
6a 00 ?? push 0
89 01 ?? mov dword ds:[ecx], eax
8b 07 ?? mov eax, dword ds:[edi]
6a 00 ?? push 0
8b 70 70 ?? mov esi, dword ds:[eax + 0x70<112>]
8d 45 10 ?? lea eax, ss:[ebp + 0x10<16>]
50 ?? push eax
ff 75 0c ?? push dword ss:[ebp + 12]
8b ce ?? mov ecx, esi
ff 75 d4 ?? push dword ss:[ebp + 0xd4<212,-44>]
ff 15 7c 51 40 00 ?? call dword ds:[0x0040517c<" 1@">]
L75: 8b cf ?? mov ecx, edi
ff d6 ?? call esi
L76: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
84 c0 ?? test al, al
0f 84 de fe ff ff ?? je basic block L51
L77: c7 45 dc 01 00 00 00 ?? mov dword ss:[ebp + 0xdc<220,-36>], 1
e9 d2 fe ff ff ?? jmp basic block L51
L78: 5f ?? pop edi
5e ?? pop esi
33 c0 ?? xor eax, eax
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x404d40 | __except_handler4_noexcept | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
8b 45 14 ?? mov eax, dword ss:[ebp + 0x14<20>]
50 ?? push eax
8b 4d 10 ?? mov ecx, dword ss:[ebp + 0x10<16>]
51 ?? push ecx
8b 55 0c ?? mov edx, dword ss:[ebp + 12]
52 ?? push edx
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
50 ?? push eax
e8 87 e3 ff ff ?? call function 0x004030e0
L2: 83 c4 10 ?? add esp, 0x10<16>
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
8b 51 04 ?? mov edx, dword ds:[ecx + 4]
83 e2 66 ?? and edx, 0x66<102>
75 2a ?? jne basic block L8
L3: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
81 38 63 73 6d e0 ?? cmp dword ds:[eax], 0xe06d7363
75 1f ?? jne basic block L8
L4: 83 7d fc 01 ?? cmp dword ss:[ebp + 0xfc<252,-4>], 1
75 19 ?? jne basic block L8
L5: e8 6e ea ff ff ?? call function 0x004037ee
L6: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 08 ?? mov dword ds:[eax], ecx
e8 6a ea ff ff ?? call function 0x004037f4
L7: 8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>]
89 10 ?? mov dword ds:[eax], edx
e8 26 eb ff ff ?? call function 0x004038ba
L8: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/Debug/oopoly.exe | 0x405060 | __imp_?width@ios_base@std@@QAE_J_J@Z | 1 |
0x00405060: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405064 | __imp_?width@ios_base@std@@QBE_JXZ | 1 |
0x00405064: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405068 | __imp_?flags@ios_base@std@@QBEHXZ | 1 |
0x00405068: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x40506c | __imp_??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z | 1 |
0x0040506c: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405070 | __imp_?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z | 1 |
0x00405070: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405074 | __imp_?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ | 1 |
0x00405074: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405078 | __imp_?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z | 1 |
0x00405078: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x40507c | __imp_?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z | 1 |
0x0040507c: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405080 | __imp_?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ | 1 |
0x00405080: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405084 | __imp_?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ | 1 |
0x00405084: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405088 | __imp_?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z | 1 |
0x00405088: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x40508c | __imp_?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z | 1 |
0x0040508c: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405090 | __imp_?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ | 1 |
0x00405090: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x405094 | __imp_?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ | 1 |
0x00405094: no instructions
|
./vs2022/wpo/Debug/oopoly.exe | 0x40509c | __imp_?good@ios_base@std@@QBE_NXZ | 1 |
0x0040509c: no instructions
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401000 | ?func1@Cls1@@UAEXXZ | 1 |
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
ba e0 31 40 00 ?? mov edx, 0x004031e0<"Cls1::func1()">
68 40 14 40 00 ?? push function 0x00401440
e8 0b 02 00 00 ?? call function 0x00401220
L2: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401020 | ?func2@Cls1@@QAEXXZ | 1 |
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
ba f0 31 40 00 ?? mov edx, 0x004031f0<"Cls1::func2()">
68 40 14 40 00 ?? push function 0x00401440
e8 eb 01 00 00 ?? call function 0x00401220
L2: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401040 | ?func3@Cls2@@UAEXXZ | 1 |
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
ba 00 32 40 00 ?? mov edx, 0x00403200<"Cls2::func3()">
68 40 14 40 00 ?? push function 0x00401440
e8 cb 01 00 00 ?? call function 0x00401220
L2: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401060 | ?func4@Cls2@@UAEXXZ | 1 |
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
ba 10 32 40 00 ?? mov edx, 0x00403210<"Cls2::func4()">
68 40 14 40 00 ?? push function 0x00401440
e8 ab 01 00 00 ?? call function 0x00401220
L2: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401080 | ??0Cls3@@QAE@XZ | 1 |
L1: c7 01 60 32 40 00 ?? mov dword ds:[ecx], 0x00403260
8b c1 ?? mov eax, ecx
c7 41 0c 44 32 40 00 ?? mov dword ds:[ecx + 12], 0x00403244
c7 41 50 2a 00 00 00 ?? mov dword ds:[ecx + 0x50<80>], 0x0000002a<42>
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4010a0 | ?func1@Cls3@@UAEXXZ | 1 |
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
ba 20 32 40 00 ?? mov edx, 0x00403220<"Cls3::func1()">
68 40 14 40 00 ?? push function 0x00401440
e8 6b 01 00 00 ?? call function 0x00401220
L2: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4010c0 | ?func3@Cls3@@UAEXXZ | 1 |
L1: 8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
ba 30 32 40 00 ?? mov edx, 0x00403230<"Cls3::func3()">
68 40 14 40 00 ?? push function 0x00401440
e8 4b 01 00 00 ?? call function 0x00401220
L2: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4010e0 | ??0Cls1@@QAE@XZ | 1 |
L1: c7 01 68 32 40 00 ?? mov dword ds:[ecx], 0x00403268
8b c1 ?? mov eax, ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4010f0 | ??0Cls2@@QAE@XZ | 1 |
L1: c7 01 50 32 40 00 ?? mov dword ds:[ecx], 0x00403250
8b c1 ?? mov eax, ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401100 | _main | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 08 ?? sub esp, 8
53 ?? push ebx
56 ?? push esi
57 ?? push edi
6a 54 ?? push 0x54<84>
e8 62 05 00 00 ?? call function 0x00401672
L2: c7 40 0c 50 32 40 00 ?? mov dword ds:[eax + 12], 0x00403250
6a 54 ?? push 0x54<84>
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
8d 78 0c ?? lea edi, ds:[eax + 12]
c7 00 60 32 40 00 ?? mov dword ds:[eax], 0x00403260
c7 07 44 32 40 00 ?? mov dword ds:[edi], 0x00403244
c7 40 50 2a 00 00 00 ?? mov dword ds:[eax + 0x50<80>], 0x0000002a<42>
e8 3b 05 00 00 ?? call function 0x00401672
L3: 8b d8 ?? mov ebx, eax
6a 0c ?? push 12
89 5d f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], ebx
c7 43 0c 50 32 40 00 ?? mov dword ds:[ebx + 12], 0x00403250
c7 03 60 32 40 00 ?? mov dword ds:[ebx], 0x00403260
c7 43 0c 44 32 40 00 ?? mov dword ds:[ebx + 12], 0x00403244
c7 43 50 2a 00 00 00 ?? mov dword ds:[ebx + 0x50<80>], 0x0000002a<42>
e8 14 05 00 00 ?? call function 0x00401672
L4: 8b f0 ?? mov esi, eax
83 c4 0c ?? add esp, 12
ba f0 31 40 00 ?? mov edx, 0x004031f0<"Cls1::func2()">
c7 46 04 00 00 00 00 ?? mov dword ds:[esi + 4], 0
c7 46 08 00 00 00 00 ?? mov dword ds:[esi + 8], 0
c7 06 68 32 40 00 ?? mov dword ds:[esi], 0x00403268
8b 0d 78 30 40 00 ?? mov ecx, dword ds:[0x00403078<"8>@">]
68 40 14 40 00 ?? push function 0x00401440
e8 94 00 00 00 ?? call function 0x00401220
L5: 8b c8 ?? mov ecx, eax
ff 15 44 30 40 00 ?? call dword ds:[function 0x00403044<"\\A@">]
L6: 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b 01 ?? mov eax, dword ds:[ecx]
ff 10 ?? call dword ds:[eax]
L7: 8b 07 ?? mov eax, dword ds:[edi]
8b cf ?? mov ecx, edi
ff 10 ?? call dword ds:[eax]
L8: 8b 07 ?? mov eax, dword ds:[edi]
8b cf ?? mov ecx, edi
ff 50 04 ?? call dword ds:[eax + 4]
L9: 8b 03 ?? mov eax, dword ds:[ebx]
8b cb ?? mov ecx, ebx
ff 10 ?? call dword ds:[eax]
L10: 6a 54 ?? push 0x54<84>
ff 75 fc ?? push dword ss:[ebp + 0xfc<252,-4>]
e8 ea 04 00 00 ?? call function 0x004016a2
L11: 6a 0c ?? push 12
53 ?? push ebx
e8 e2 04 00 00 ?? call function 0x004016a2
L12: 6a 0c ?? push 12
56 ?? push esi
e8 da 04 00 00 ?? call function 0x004016a2
L13: 83 c4 18 ?? add esp, 0x18<24>
33 c0 ?? xor eax, eax
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401220 | ??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 05 2c 40 00 ?? push 0x00402c05
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
83 ec 24 ?? sub esp, 0x24<36>
53 ?? push ebx
56 ?? push esi
57 ?? push edi
a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
89 65 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], esp
89 55 d8 ?? mov dword ss:[ebp + 0xd8<216,-40>], edx
8b d9 ?? mov ebx, ecx
89 5d e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], ebx
8b ca ?? mov ecx, edx
33 c0 ?? xor eax, eax
89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax
89 45 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], eax
8d 71 01 ?? lea esi, ds:[ecx + 1]
L2: 8a 01 ?? mov al, byte ds:[ecx]
41 ?? inc ecx
84 c0 ?? test al, al
L3: 75 f9 ?? jne basic block L2
L4: 8b 03 ?? mov eax, dword ds:[ebx]
2b ce ?? sub ecx, esi
89 4d e4 ?? mov dword ss:[ebp + 0xe4<228,-28>], ecx
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 7c 18 24 ?? mov edi, dword ds:[eax + ebx + 0x24<36>]
8b 74 18 20 ?? mov esi, dword ds:[eax + ebx + 0x20<32>]
85 ff ?? test edi, edi
7c 17 ?? jl basic block L11
L5: 7f 0e ?? jg basic block L10
L6: 85 f6 ?? test esi, esi
74 11 ?? je basic block L11
L7: 85 ff ?? test edi, edi
7c 0d ?? jl basic block L11
L8: 7f 04 ?? jg basic block L10
L9: 3b f1 ?? cmp esi, ecx
76 07 ?? jbe basic block L11
L10: 2b f1 ?? sub esi, ecx
83 df 00 ?? sbb edi, 0
eb 0e ?? jmp basic block L12
L11: 0f 57 c0 ?? xorps xmm0, xmm0
66 0f 13 45 d0 ?? movlpd double ss:[ebp + 0xd0<208,-48>], xmm0
8b 7d d4 ?? mov edi, dword ss:[ebp + 0xd4<212,-44>]
8b 75 d0 ?? mov esi, dword ss:[ebp + 0xd0<208,-48>]
L12: 8b 4c 18 38 ?? mov ecx, dword ds:[eax + ebx + 0x38<56>]
89 5d d0 ?? mov dword ss:[ebp + 0xd0<208,-48>], ebx
85 c9 ?? test ecx, ecx
74 05 ?? je basic block L14
L13: 8b 01 ?? mov eax, dword ds:[ecx]
ff 50 04 ?? call dword ds:[eax + 4]
L14: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">]
L15: 84 c0 ?? test al, al
74 28 ?? je basic block L22
L16: 8b 03 ?? mov eax, dword ds:[ebx]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 18 3c ?? mov ecx, dword ds:[eax + ebx + 0x3c<60>]
85 c9 ?? test ecx, ecx
74 19 ?? je basic block L21
L17: 3b cb ?? cmp ecx, ebx
74 15 ?? je basic block L21
L18: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c]
L19: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">]
L20: eb 02 ?? jmp basic block L22
L21: b0 01 ?? mov al, 1
L22: 88 45 d4 ?? mov byte ss:[ebp + 0xd4<212,-44>], al
c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1
84 c0 ?? test al, al
75 0a ?? jne basic block L24
L23: b9 04 00 00 00 ?? mov ecx, 4
e9 e4 00 00 00 ?? jmp basic block L49
L24: c6 45 fc 02 ?? mov byte ss:[ebp + 0xfc<252,-4>], 2
8b 03 ?? mov eax, dword ds:[ebx]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 44 18 14 ?? mov eax, dword ds:[eax + ebx + 0x14<20>]
25 c0 01 00 00 ?? and eax, 0x000001c0<448>
83 f8 40 ?? cmp eax, 0x40<64>
74 35 ?? je basic block L32
L25: 85 ff ?? test edi, edi
7c 31 ?? jl basic block L32
L26: 7f 04 ?? jg basic block L28
L27: 85 f6 ?? test esi, esi
74 2b ?? je basic block L32
L28: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
8a 44 19 40 ?? mov al, byte ds:[ecx + ebx + 0x40<64>]
8b 4c 19 38 ?? mov ecx, dword ds:[ecx + ebx + 0x38<56>]
88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al
ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>]
ff 15 48 30 40 00 ?? call dword ds:[function 0x00403048]
L29: 83 f8 ff ?? cmp eax, 0xff<255,-1>
75 05 ?? jne basic block L31
L30: 8d 48 05 ?? lea ecx, ds:[eax + 5]
eb 2d ?? jmp basic block L37
L31: 83 c6 ff ?? add esi, 0xff<255,-1>
83 d7 ff ?? adc edi, 0xff<255,-1>
eb cb ?? jmp basic block L25
L32: 8b 03 ?? mov eax, dword ds:[ebx]
6a 00 ?? push 0
ff 75 e4 ?? push dword ss:[ebp + 0xe4<228,-28>]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
ff 75 d8 ?? push dword ss:[ebp + 0xd8<216,-40>]
8b 4c 18 38 ?? mov ecx, dword ds:[eax + ebx + 0x38<56>]
ff 15 64 30 40 00 ?? call dword ds:[function 0x00403064<"8?@">]
L33: 3b 45 e4 ?? cmp eax, dword ss:[ebp + 0xe4<228,-28>]
75 04 ?? jne basic block L35
L34: 85 d2 ?? test edx, edx
74 1c ?? je basic block L38
L35: 33 c9 ?? xor ecx, ecx
L36: 83 c9 04 ?? or ecx, 4
L37: 8b 03 ?? mov eax, dword ds:[ebx]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
c7 44 18 20 00 00 00 00 ?? mov dword ds:[eax + ebx + 0x20<32>], 0
c7 44 18 24 00 00 00 00 ?? mov dword ds:[eax + ebx + 0x24<36>], 0
eb 55 ?? jmp basic block L48
L38: 33 c9 ?? xor ecx, ecx
L39: 85 ff ?? test edi, edi
7c e3 ?? jl basic block L37
L40: 7f 04 ?? jg basic block L42
L41: 85 f6 ?? test esi, esi
74 dd ?? je basic block L37
L42: 8b 03 ?? mov eax, dword ds:[ebx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
8a 44 19 40 ?? mov al, byte ds:[ecx + ebx + 0x40<64>]
8b 4c 19 38 ?? mov ecx, dword ds:[ecx + ebx + 0x38<56>]
88 45 d8 ?? mov byte ss:[ebp + 0xd8<216,-40>], al
ff 75 d8 ?? push dword ss:[ebp + 0xd8<216,-40>]
ff 15 48 30 40 00 ?? call dword ds:[function 0x00403048]
L43: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>]
83 f8 ff ?? cmp eax, 0xff<255,-1>
74 b9 ?? je basic block L36
L44: 83 c6 ff ?? add esi, 0xff<255,-1>
83 d7 ff ?? adc edi, 0xff<255,-1>
eb cd ?? jmp basic block L39
L45: 8b 55 e0 ?? mov edx, dword ss:[ebp + 0xe0<224,-32>]
6a 01 ?? push 1
6a 04 ?? push 4
8b 02 ?? mov eax, dword ds:[edx]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ca ?? add ecx, edx
ff 15 60 30 40 00 ?? call dword ds:[function 0x00403060<"~?@">]
L46: b8 e1 13 40 00 ?? mov eax, basic block L47
c3 ?? ret
L47: 8b 5d e0 ?? mov ebx, dword ss:[ebp + 0xe0<224,-32>]
8b 4d e8 ?? mov ecx, dword ss:[ebp + 0xe8<232,-24>]
L48: c7 45 fc 01 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 1
L49: 8b 03 ?? mov eax, dword ds:[ebx]
6a 00 ?? push 0
51 ?? push ecx
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 cb ?? add ecx, ebx
ff 15 60 30 40 00 ?? call dword ds:[function 0x00403060<"~?@">]
L50: ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"t>@">]
L51: 8b 75 d0 ?? mov esi, dword ss:[ebp + 0xd0<208,-48>]
84 c0 ?? test al, al
75 08 ?? jne basic block L53
L52: 8b ce ?? mov ecx, esi
ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068]
L53: c7 45 fc 04 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 4
8b 06 ?? mov eax, dword ds:[esi]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>]
85 c9 ?? test ecx, ecx
74 05 ?? je basic block L55
L54: 8b 01 ?? mov eax, dword ds:[ecx]
ff 50 08 ?? call dword ds:[eax + 8]
L55: 8b c3 ?? mov eax, ebx
8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401440 | ??$endl@DU?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
6a 0a ?? push 10
8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 54 30 40 00 ?? call dword ds:[function 0x00403054<"^@@">]
L2: 0f b6 c8 ?? movzx ecx, al
51 ?? push ecx
8b ce ?? mov ecx, esi
ff 15 50 30 40 00 ?? call dword ds:[function 0x00403050]
L3: 8b ce ?? mov ecx, esi
ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c]
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401470 | ??Bsentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QBE_NXZ | 1 |
L1: 8a 41 04 ?? mov al, byte ds:[ecx + 4]
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401480 | ??1sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 30 2c 40 00 ?? push 0x00402c30
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
56 ?? push esi
a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
8b f1 ?? mov esi, ecx
ff 15 70 30 40 00 ?? call dword ds:[0x00403070<"t>@">]
L2: 84 c0 ?? test al, al
75 08 ?? jne basic block L4
L3: 8b 0e ?? mov ecx, dword ds:[esi]
ff 15 68 30 40 00 ?? call dword ds:[function 0x00403068]
L4: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
8b 0e ?? mov ecx, dword ds:[esi]
8b 01 ?? mov eax, dword ds:[ecx]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>]
85 c9 ?? test ecx, ecx
74 05 ?? je basic block L6
L5: 8b 01 ?? mov eax, dword ds:[ecx]
ff 50 08 ?? call dword ds:[eax + 8]
L6: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5e ?? pop esi
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4014f0 | ??0sentry@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 5d 2c 40 00 ?? push 0x00402c5d
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
51 ?? push ecx
56 ?? push esi
57 ?? push edi
a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
8b f9 ?? mov edi, ecx
89 7d f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
89 37 ?? mov dword ds:[edi], esi
8b 06 ?? mov eax, dword ds:[esi]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 30 38 ?? mov ecx, dword ds:[eax + esi + 0x38<56>]
85 c9 ?? test ecx, ecx
74 05 ?? je basic block L3
L2: 8b 01 ?? mov eax, dword ds:[ecx]
ff 50 04 ?? call dword ds:[eax + 4]
L3: c7 45 fc 00 00 00 00 ?? mov dword ss:[ebp + 0xfc<252,-4>], 0
8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">]
L4: 84 c0 ?? test al, al
74 28 ?? je basic block L11
L5: 8b 06 ?? mov eax, dword ds:[esi]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 30 3c ?? mov ecx, dword ds:[eax + esi + 0x3c<60>]
85 c9 ?? test ecx, ecx
74 19 ?? je basic block L10
L6: 3b ce ?? cmp ecx, esi
74 15 ?? je basic block L10
L7: ff 15 4c 30 40 00 ?? call dword ds:[function 0x0040304c]
L8: 8b 06 ?? mov eax, dword ds:[esi]
8b 48 04 ?? mov ecx, dword ds:[eax + 4]
03 ce ?? add ecx, esi
ff 15 40 30 40 00 ?? call dword ds:[function 0x00403040<"\fB@">]
L9: eb 02 ?? jmp basic block L11
L10: b0 01 ?? mov al, 1
L11: 88 47 04 ?? mov byte ds:[edi + 4], al
8b c7 ?? mov eax, edi
8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401590 | ??1_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@XZ | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a ff ?? push 0xff<255,-1>
68 80 2c 40 00 ?? push 0x00402c80
64 a1 00 00 00 00 ?? mov eax, dword fs:[0]
50 ?? push eax
a1 04 50 40 00 ?? mov eax, dword ds:[0x00405004]
33 c5 ?? xor eax, ebp
50 ?? push eax
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
64 a3 00 00 00 00 ?? mov dword fs:[0], eax
8b 09 ?? mov ecx, dword ds:[ecx]
8b 01 ?? mov eax, dword ds:[ecx]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 08 38 ?? mov ecx, dword ds:[eax + ecx + 0x38<56>]
85 c9 ?? test ecx, ecx
74 05 ?? je basic block L3
L2: 8b 01 ?? mov eax, dword ds:[ecx]
ff 50 08 ?? call dword ds:[eax + 8]
L3: 8b 4d f4 ?? mov ecx, dword ss:[ebp + 0xf4<244,-12>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4015e0 | ??0_Sentry_base@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@AAV12@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 55 08 ?? mov edx, dword ss:[ebp + 8]
56 ?? push esi
8b f1 ?? mov esi, ecx
89 16 ?? mov dword ds:[esi], edx
8b 02 ?? mov eax, dword ds:[edx]
8b 40 04 ?? mov eax, dword ds:[eax + 4]
8b 4c 10 38 ?? mov ecx, dword ds:[eax + edx + 0x38<56>]
85 c9 ?? test ecx, ecx
74 05 ?? je basic block L3
L2: 8b 01 ?? mov eax, dword ds:[ecx]
ff 50 04 ?? call dword ds:[eax + 4]
L3: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401664 | @__security_check_cookie@4 | 0 |
L1: 3b 0d 04 50 40 00 ?? cmp ecx, dword ds:[0x00405004]
75 01 ?? jne basic block L3
L2: c3 ?? ret
L3: e9 48 03 00 00 ?? jmp function 0x004019ba
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401672 | ??2@YAPAXI@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
eb 0d ?? jmp basic block L4
L2: ff 75 08 ?? push dword ss:[ebp + 8]
e8 e4 13 00 00 ?? call function 0x00402a63
L3: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 0f ?? je basic block L7
L4: ff 75 08 ?? push dword ss:[ebp + 8]
e8 dd 13 00 00 ?? call function 0x00402a69
L5: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 e6 ?? je basic block L2
L6: 5d ?? pop ebp
c3 ?? ret
L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1>
0f 84 aa 07 00 00 ?? je function 0x00401e47
L8: e9 88 07 00 00 ?? jmp function 0x00401e2a
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4016a2 | ??3@YAXPAXI@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
ff 75 08 ?? push dword ss:[ebp + 8]
e8 c4 07 00 00 ?? call function 0x00401e71
L2: 59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4016b0 | ??1type_info@@UAE@XZ | 1 |
L1: c7 01 74 31 40 00 ?? mov dword ds:[ecx], 0x00403174
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4016b7 | ??_Etype_info@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
f6 45 08 01 ?? test byte ss:[ebp + 8], 1
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 06 74 31 40 00 ?? mov dword ds:[esi], 0x00403174
74 0a ?? je basic block L4
L2: 6a 0c ?? push 12
56 ?? push esi
e8 d1 ff ff ff ?? call function 0x004016a2
L3: 59 ?? pop ecx
59 ?? pop ecx
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4016b7 | ??_Gtype_info@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
f6 45 08 01 ?? test byte ss:[ebp + 8], 1
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 06 74 31 40 00 ?? mov dword ds:[esi], 0x00403174
74 0a ?? je basic block L4
L2: 6a 0c ?? push 12
56 ?? push esi
e8 d1 ff ff ff ?? call function 0x004016a2
L3: 59 ?? pop ecx
59 ?? pop ecx
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4016da | pre_c_initialization | 0 |
L1: 56 ?? push esi
6a 01 ?? push 1
e8 93 13 00 00 ?? call function 0x00402a75
L2: e8 a8 0b 00 00 ?? call function 0x0040228f
L3: 50 ?? push eax
e8 be 13 00 00 ?? call function 0x00402aab
L4: e8 9a 0b 00 00 ?? call function 0x0040228c
L5: 8b f0 ?? mov esi, eax
e8 e2 13 00 00 ?? call function 0x00402adb
L6: 6a 01 ?? push 1
89 30 ?? mov dword ds:[eax], esi
e8 26 09 00 00 ?? call function 0x00402028
L7: 83 c4 0c ?? add esp, 12
5e ?? pop esi
84 c0 ?? test al, al
74 73 ?? je basic block L30
L8: db e2 ?? fnclex
e8 10 0e 00 00 ?? call function 0x00402521
L9: 68 4d 25 40 00 ?? push function 0x0040254d
e8 bd 0a 00 00 ?? call function 0x004021d8
L10: e8 68 0b 00 00 ?? call function 0x00402288
L11: 50 ?? push eax
e8 5b 13 00 00 ?? call function 0x00402a81
L12: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
75 51 ?? jne basic block L30
L13: e8 6a 0b 00 00 ?? call function 0x0040229b
L14: e8 d0 0b 00 00 ?? call function 0x00402306
L15: 85 c0 ?? test eax, eax
74 0b ?? je basic block L18
L16: 68 85 22 40 00 ?? push function 0x00402285
e8 37 13 00 00 ?? call function 0x00402a7b
L17: 59 ?? pop ecx
L18: e8 8d 0b 00 00 ?? call function 0x004022d7
L19: e8 8b 0b 00 00 ?? call function 0x004022da
L20: e8 62 0b 00 00 ?? call function 0x004022b6
L21: e8 3f 0b 00 00 ?? call function 0x00402298
L22: 50 ?? push eax
e8 70 13 00 00 ?? call function 0x00402acf
L23: 59 ?? pop ecx
e8 4e 0b 00 00 ?? call function 0x004022b3
L24: 84 c0 ?? test al, al
74 05 ?? je basic block L26
L25: e8 19 13 00 00 ?? call function 0x00402a87
L26: e8 fc 0c 00 00 ?? call function 0x0040246f
L27: e8 f2 0c 00 00 ?? call function 0x0040246a
L28: 85 c0 ?? test eax, eax
75 01 ?? jne basic block L30
L29: c3 ?? ret
L30: 6a 07 ?? push 7
e8 9a 0b 00 00 ?? call function 0x0040231e
L31: cc ?? int3
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401785 | post_pgo_initialization | 0 |
L1: e8 5f 0b 00 00 ?? call function 0x004022e9
L2: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x40178d | pre_cpp_initialization | 0 |
L1: e8 22 0d 00 00 ?? call function 0x004024b4
L2: e8 fe 0a 00 00 ?? call function 0x00402295
L3: 50 ?? push eax
e8 38 13 00 00 ?? call function 0x00402ad5
L4: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x40179f | __scrt_common_main | 0 |
L1: e8 96 0a 00 00 ?? call function 0x0040223a
L2: e9 00 00 00 00 ?? jmp function 0x004017a9
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4017a9 | __scrt_common_main_seh | 0 |
L1: 6a 14 ?? push 0x14<20>
68 80 3b 40 00 ?? push 0x00403b80
e8 cb 0d 00 00 ?? call function 0x00402580
L2: 6a 01 ?? push 1
e8 33 08 00 00 ?? call function 0x00401fef
L3: 59 ?? pop ecx
84 c0 ?? test al, al
0f 84 50 01 00 00 ?? je basic block L44
L4: 32 db ?? xor bl, bl
88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl
83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
e8 21 07 00 00 ?? call function 0x00401ef4
L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al
a1 ec 53 40 00 ?? mov eax, dword ds:[0x004053ec]
33 c9 ?? xor ecx, ecx
41 ?? inc ecx
3b c1 ?? cmp eax, ecx
0f 84 2f 01 00 00 ?? je basic block L44
L6: 85 c0 ?? test eax, eax
75 49 ?? jne basic block L12
L7: 89 0d ec 53 40 00 ?? mov dword ds:[0x004053ec], ecx
68 5c 31 40 00 ?? push 0x0040315c
68 50 31 40 00 ?? push 0x00403150
e8 9a 12 00 00 ?? call function 0x00402a99
L8: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
74 11 ?? je basic block L10
L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
b8 ff 00 00 00 ?? mov eax, 0x000000ff<255>
e9 ef 00 00 00 ?? jmp basic block L43
L10: 68 4c 31 40 00 ?? push 0x0040314c
68 44 31 40 00 ?? push 0x00403144
e8 6e 12 00 00 ?? call function 0x00402a93
L11: 59 ?? pop ecx
59 ?? pop ecx
c7 05 ec 53 40 00 02 00 ?? mov dword ds:[0x004053ec], 2
00 00
eb 05 ?? jmp basic block L13
L12: 8a d9 ?? mov bl, cl
88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl
L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>]
e8 03 09 00 00 ?? call function 0x00402143
L14: 59 ?? pop ecx
e8 cc 0a 00 00 ?? call function 0x00402312
L15: 8b f0 ?? mov esi, eax
33 ff ?? xor edi, edi
39 3e ?? cmp dword ds:[esi], edi
74 1b ?? je basic block L20
L16: 56 ?? push esi
e8 5b 08 00 00 ?? call function 0x004020af
L17: 59 ?? pop ecx
84 c0 ?? test al, al
74 10 ?? je basic block L20
L18: 8b 36 ?? mov esi, dword ds:[esi]
57 ?? push edi
6a 02 ?? push 2
57 ?? push edi
8b ce ?? mov ecx, esi
ff 15 38 31 40 00 ?? call dword ds:[0x00403138]
L19: ff d6 ?? call esi
L20: e8 aa 0a 00 00 ?? call function 0x00402318
L21: 8b f0 ?? mov esi, eax
39 3e ?? cmp dword ds:[esi], edi
74 13 ?? je basic block L26
L22: 56 ?? push esi
e8 35 08 00 00 ?? call function 0x004020af
L23: 59 ?? pop ecx
84 c0 ?? test al, al
74 08 ?? je basic block L26
L24: ff 36 ?? push dword ds:[esi]
e8 43 12 00 00 ?? call function 0x00402ac9
L25: 59 ?? pop ecx
L26: e8 01 12 00 00 ?? call function 0x00402a8d
L27: 8b f8 ?? mov edi, eax
e8 24 12 00 00 ?? call function 0x00402ab7
L28: 8b 30 ?? mov esi, dword ds:[eax]
e8 17 12 00 00 ?? call function 0x00402ab1
L29: 57 ?? push edi
56 ?? push esi
ff 30 ?? push dword ds:[eax]
e8 5d f8 ff ff ?? call function 0x00401100
L30: 83 c4 0c ?? add esp, 12
8b f0 ?? mov esi, eax
e8 c5 0b 00 00 ?? call function 0x00402472
L31: 84 c0 ?? test al, al
74 6b ?? je basic block L45
L32: 84 db ?? test bl, bl
75 05 ?? jne basic block L34
L33: e8 03 12 00 00 ?? call function 0x00402abd
L34: 6a 00 ?? push 0
6a 01 ?? push 1
e8 9d 08 00 00 ?? call function 0x00402160
L35: 59 ?? pop ecx
59 ?? pop ecx
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b c6 ?? mov eax, esi
eb 35 ?? jmp basic block L43
L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>]
8b 01 ?? mov eax, dword ds:[ecx]
8b 00 ?? mov eax, dword ds:[eax]
89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax
51 ?? push ecx
50 ?? push eax
e8 8e 11 00 00 ?? call function 0x00402a6f
L37: 59 ?? pop ecx
59 ?? pop ecx
c3 ?? ret
L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
e8 86 0b 00 00 ?? call function 0x00402472
L39: 84 c0 ?? test al, al
74 32 ?? je basic block L46
L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0
75 05 ?? jne basic block L42
L41: e8 c8 11 00 00 ?? call function 0x00402ac3
L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>]
L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
c9 ?? leave
c3 ?? ret
L44: 6a 07 ?? push 7
e8 02 0a 00 00 ?? call function 0x0040231e
L45: 56 ?? push esi
e8 7d 11 00 00 ?? call function 0x00402a9f
L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>]
e8 7b 11 00 00 ?? call function 0x00402aa5
L47: cc ?? int3
L48: e8 58 09 00 00 ?? call function 0x00402288
L49: 50 ?? push eax
e8 4b 11 00 00 ?? call function 0x00402a81
L50: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x40193d | invoke_main | 0 |
L1: 56 ?? push esi
57 ?? push edi
e8 49 11 00 00 ?? call function 0x00402a8d
L2: 8b f8 ?? mov edi, eax
e8 6c 11 00 00 ?? call function 0x00402ab7
L3: 8b 30 ?? mov esi, dword ds:[eax]
e8 5f 11 00 00 ?? call function 0x00402ab1
L4: 57 ?? push edi
56 ?? push esi
ff 30 ?? push dword ds:[eax]
e8 a5 f7 ff ff ?? call function 0x00401100
L5: 83 c4 0c ?? add esp, 12
5f ?? pop edi
5e ?? pop esi
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401988 | _mainCRTStartup | 0 |
L1: e8 ad 08 00 00 ?? call function 0x0040223a
L2: e9 17 fe ff ff ?? jmp function 0x004017a9
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401992 | ___raise_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 00 ?? push 0
ff 15 04 30 40 00 ?? call dword ds:[0x00403004]
L2: ff 75 08 ?? push dword ss:[ebp + 8]
ff 15 00 30 40 00 ?? call dword ds:[0x00403000]
L3: 68 09 04 00 c0 ?? push 0xc0000409
ff 15 08 30 40 00 ?? call dword ds:[0x00403008<"0F@">]
L4: 50 ?? push eax
ff 15 0c 30 40 00 ?? call dword ds:[0x0040300c<"DF@">]
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x4019ba | ___report_gsfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 24 03 00 00 ?? sub esp, 0x00000324<804>
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"XF@">]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 6a 02 ?? push 2
59 ?? pop ecx
cd 29 ?? int 0x29<41>
L4: a3 d0 51 40 00 ?? mov dword ds:[0x004051d0], eax
89 0d cc 51 40 00 ?? mov dword ds:[0x004051cc], ecx
89 15 c8 51 40 00 ?? mov dword ds:[0x004051c8], edx
89 1d c4 51 40 00 ?? mov dword ds:[0x004051c4], ebx
89 35 c0 51 40 00 ?? mov dword ds:[0x004051c0], esi
89 3d bc 51 40 00 ?? mov dword ds:[0x004051bc], edi
66 8c 15 e8 51 40 00 ?? mov word ds:[0x004051e8], ss
66 8c 0d dc 51 40 00 ?? mov word ds:[0x004051dc], cs
66 8c 1d b8 51 40 00 ?? mov word ds:[0x004051b8], ds
66 8c 05 b4 51 40 00 ?? mov word ds:[0x004051b4], es
66 8c 25 b0 51 40 00 ?? mov word ds:[0x004051b0], fs
66 8c 2d ac 51 40 00 ?? mov word ds:[0x004051ac], gs
9c ?? pushfd
8f 05 e0 51 40 00 ?? pop dword ds:[0x004051e0]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 d8 51 40 00 ?? mov dword ds:[0x004051d8], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 e4 51 40 00 ?? mov dword ds:[0x004051e4], eax
8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>]
c7 05 20 51 40 00 01 00 ?? mov dword ds:[0x00405120], 0x00010001
01 00
a1 d8 51 40 00 ?? mov eax, dword ds:[0x004051d8]
a3 dc 50 40 00 ?? mov dword ds:[0x004050dc], eax
c7 05 d0 50 40 00 09 04 ?? mov dword ds:[0x004050d0], 0xc0000409
00 c0
c7 05 d4 50 40 00 01 00 ?? mov dword ds:[0x004050d4], 1
00 00
c7 05 e0 50 40 00 01 00 ?? mov dword ds:[0x004050e0], 1
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
c7 80 e4 50 40 00 02 00 ?? mov dword ds:[eax + 0x004050e4], 2
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
6a 04 ?? push 4
58 ?? pop eax
c1 e0 00 ?? shl eax, 0
8b 0d 00 50 40 00 ?? mov ecx, dword ds:[0x00405000]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
68 78 31 40 00 ?? push 0x00403178
e8 e0 fe ff ff ?? call function 0x00401992
L5: c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401ab4 | ___report_rangecheckfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 08 ?? push 8
e8 02 00 00 00 ?? call function 0x00401ac0
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401ac0 | ___report_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796>
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"XF@">]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 d0 51 40 00 ?? mov dword ds:[0x004051d0], eax
89 0d cc 51 40 00 ?? mov dword ds:[0x004051cc], ecx
89 15 c8 51 40 00 ?? mov dword ds:[0x004051c8], edx
89 1d c4 51 40 00 ?? mov dword ds:[0x004051c4], ebx
89 35 c0 51 40 00 ?? mov dword ds:[0x004051c0], esi
89 3d bc 51 40 00 ?? mov dword ds:[0x004051bc], edi
66 8c 15 e8 51 40 00 ?? mov word ds:[0x004051e8], ss
66 8c 0d dc 51 40 00 ?? mov word ds:[0x004051dc], cs
66 8c 1d b8 51 40 00 ?? mov word ds:[0x004051b8], ds
66 8c 05 b4 51 40 00 ?? mov word ds:[0x004051b4], es
66 8c 25 b0 51 40 00 ?? mov word ds:[0x004051b0], fs
66 8c 2d ac 51 40 00 ?? mov word ds:[0x004051ac], gs
9c ?? pushfd
8f 05 e0 51 40 00 ?? pop dword ds:[0x004051e0]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 d8 51 40 00 ?? mov dword ds:[0x004051d8], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 e4 51 40 00 ?? mov dword ds:[0x004051e4], eax
8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>]
a1 d8 51 40 00 ?? mov eax, dword ds:[0x004051d8]
a3 dc 50 40 00 ?? mov dword ds:[0x004050dc], eax
c7 05 d0 50 40 00 09 04 ?? mov dword ds:[0x004050d0], 0xc0000409
00 c0
c7 05 d4 50 40 00 01 00 ?? mov dword ds:[0x004050d4], 1
00 00
c7 05 e0 50 40 00 01 00 ?? mov dword ds:[0x004050e0], 1
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 88 e4 50 40 00 ?? mov dword ds:[eax + 0x004050e4], ecx
68 78 31 40 00 ?? push 0x00403178
e8 05 fe ff ff ?? call function 0x00401992
L5: c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401b8f | ___report_securityfailureEx | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 20 03 00 00 ?? sub esp, 0x00000320<800>
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010<"XF@">]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 d0 51 40 00 ?? mov dword ds:[0x004051d0], eax
89 0d cc 51 40 00 ?? mov dword ds:[0x004051cc], ecx
89 15 c8 51 40 00 ?? mov dword ds:[0x004051c8], edx
89 1d c4 51 40 00 ?? mov dword ds:[0x004051c4], ebx
89 35 c0 51 40 00 ?? mov dword ds:[0x004051c0], esi
89 3d bc 51 40 00 ?? mov dword ds:[0x004051bc], edi
66 8c 15 e8 51 40 00 ?? mov word ds:[0x004051e8], ss
66 8c 0d dc 51 40 00 ?? mov word ds:[0x004051dc], cs
66 8c 1d b8 51 40 00 ?? mov word ds:[0x004051b8], ds
66 8c 05 b4 51 40 00 ?? mov word ds:[0x004051b4], es
66 8c 25 b0 51 40 00 ?? mov word ds:[0x004051b0], fs
66 8c 2d ac 51 40 00 ?? mov word ds:[0x004051ac], gs
9c ?? pushfd
8f 05 e0 51 40 00 ?? pop dword ds:[0x004051e0]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 d8 51 40 00 ?? mov dword ds:[0x004051d8], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 e4 51 40 00 ?? mov dword ds:[0x004051e4], eax
8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>]
a1 d8 51 40 00 ?? mov eax, dword ds:[0x004051d8]
a3 dc 50 40 00 ?? mov dword ds:[0x004050dc], eax
c7 05 d0 50 40 00 09 04 ?? mov dword ds:[0x004050d0], 0xc0000409
00 c0
c7 05 d4 50 40 00 01 00 ?? mov dword ds:[0x004050d4], 1
00 00
83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0
76 0a ?? jbe basic block L7
L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0
75 04 ?? jne basic block L7
L6: 83 65 0c 00 ?? and dword ss:[ebp + 12], 0
L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14
76 07 ?? jbe basic block L9
L8: 8b 45 0c ?? mov eax, dword ss:[ebp + 12]
48 ?? dec eax
89 45 0c ?? mov dword ss:[ebp + 12], eax
L9: 8b 45 0c ?? mov eax, dword ss:[ebp + 12]
40 ?? inc eax
a3 e0 50 40 00 ?? mov dword ds:[0x004050e0], eax
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 88 e4 50 40 00 ?? mov dword ds:[eax + 0x004050e4], ecx
83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
eb 07 ?? jmp basic block L10
L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
3b 45 0c ?? cmp eax, dword ss:[ebp + 12]
73 15 ?? jae basic block L12
L11: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>]
8b 0c 8a ?? mov ecx, dword ds:[edx + ecx * 4]
89 0c 85 e8 50 40 00 ?? mov dword ds:[0x004050e8 + eax * 4], ecx
eb dc ?? jmp 0x00401c74
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
40 ?? inc eax
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L12: 68 78 31 40 00 ?? push 0x00403178
e8 f0 fc ff ff ?? call function 0x00401992
L13: c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/oo.exe | 0x401ca4 | ??0bad_alloc@std@@AAE@QBD@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 61 04 00 ?? and dword ds:[ecx + 4], 0
83 61 08 00 ?? and dword ds:[ecx + 8], 0
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 41 04 ?? mov dword ds:[ecx + 4], eax
8b c1 ?? mov eax, ecx
c7 01 a4 31 40 00 ?? mov dword ds:[ecx], 0x004031a4
5d ?? pop ebp
c2 04 00 ?? ret 4
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.