Binary stringlengths 25 43 | Addr stringlengths 8 8 | Name stringlengths 5 187 | Type int64 0 1 | Disassembly stringlengths 16 68.6k |
|---|---|---|---|---|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x402648 | ___vcrt_uninitialize | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x40264b | ___acrt_uninitialize_critical | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x40264b | ___scrt_stub_for_acrt_uninitialize_critical | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x40264b | ___vcrt_uninitialize_critical | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x40264e | ___scrt_stub_for_is_c_termination_complete | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x40264e | __is_c_termination_complete | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x402651 | __filter_x86_sse2_floating_point_exception | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
83 3d f0 53 40 00 01 ?? cmp dword ds:[0x004053f0], 1
7c 66 ?? jl basic block L15
L2: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4
74 09 ?? je basic block L4
L3: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5
75 54 ?? jne basic block L15
L4: 0f ae 5d fc ?? stmxcsr dword ss:[ebp + 0xfc<252,-4>]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 f0 3f ?? xor eax, 0x3f<63>
a8 81 ?? test al, 0x81<129,-127>
74 3f ?? je basic block L14
L5: a9 04 02 00 00 ?? test eax, 0x00000204<516>
75 07 ?? jne basic block L7
L6: b8 8e 00 00 c0 ?? mov eax, 0xc000008e
c9 ?? leave
c3 ?? ret
L7: a9 02 01 00 00 ?? test eax, 0x00000102<258>
74 2a ?? je basic block L14
L8: a9 08 04 00 00 ?? test eax, 0x00000408<1032>
75 07 ?? jne basic block L10
L9: b8 91 00 00 c0 ?? mov eax, 0xc0000091
c9 ?? leave
c3 ?? ret
L10: a9 10 08 00 00 ?? test eax, 0x00000810<2064>
75 07 ?? jne basic block L12
L11: b8 93 00 00 c0 ?? mov eax, 0xc0000093
c9 ?? leave
c3 ?? ret
L12: a9 20 10 00 00 ?? test eax, 0x00001020<4128>
75 0e ?? jne basic block L15
L13: b8 8f 00 00 c0 ?? mov eax, 0xc000008f
c9 ?? leave
c3 ?? ret
L14: b8 90 00 00 c0 ?? mov eax, 0xc0000090
c9 ?? leave
c3 ?? ret
L15: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex3.exe | 0x402651 | __filter_x86_sse2_floating_point_exception_default | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
83 3d f0 53 40 00 01 ?? cmp dword ds:[0x004053f0], 1
7c 66 ?? jl basic block L15
L2: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4
74 09 ?? je basic block L4
L3: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5
75 54 ?? jne basic block L15
L4: 0f ae 5d fc ?? stmxcsr dword ss:[ebp + 0xfc<252,-4>]
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
83 f0 3f ?? xor eax, 0x3f<63>
a8 81 ?? test al, 0x81<129,-127>
74 3f ?? je basic block L14
L5: a9 04 02 00 00 ?? test eax, 0x00000204<516>
75 07 ?? jne basic block L7
L6: b8 8e 00 00 c0 ?? mov eax, 0xc000008e
c9 ?? leave
c3 ?? ret
L7: a9 02 01 00 00 ?? test eax, 0x00000102<258>
74 2a ?? je basic block L14
L8: a9 08 04 00 00 ?? test eax, 0x00000408<1032>
75 07 ?? jne basic block L10
L9: b8 91 00 00 c0 ?? mov eax, 0xc0000091
c9 ?? leave
c3 ?? ret
L10: a9 10 08 00 00 ?? test eax, 0x00000810<2064>
75 07 ?? jne basic block L12
L11: b8 93 00 00 c0 ?? mov eax, 0xc0000093
c9 ?? leave
c3 ?? ret
L12: a9 20 10 00 00 ?? test eax, 0x00001020<4128>
75 0e ?? jne basic block L15
L13: b8 8f 00 00 c0 ?? mov eax, 0xc000008f
c9 ?? leave
c3 ?? ret
L14: b8 90 00 00 c0 ?? mov eax, 0xc0000090
c9 ?? leave
c3 ?? ret
L15: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401000 | ??0Base@@QAE@XZ | 1 |
L1: c7 01 a4 31 40 00 ?? mov dword ds:[ecx], 0x004031a4
8b c1 ?? mov eax, ecx
c7 41 04 01 00 00 00 ?? mov dword ds:[ecx + 4], 1
c6 41 08 61 ?? mov byte ds:[ecx + 8], 0x61<97>
c7 41 0c ff ff ff ff ?? mov dword ds:[ecx + 12], 0xffffffff<4294967295,-1>
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401020 | ?func1@Base@@UAEHXZ | 1 |
L1: c7 41 04 02 00 00 00 ?? mov dword ds:[ecx + 4], 2
b8 62 00 00 00 ?? mov eax, 0x00000062<98>
c6 41 08 62 ?? mov byte ds:[ecx + 8], 0x62<98>
c7 41 0c fe ff ff ff ?? mov dword ds:[ecx + 12], 0xfffffffe<4294967294,-2>
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401040 | ?func2@Base@@UAEHXZ | 1 |
L1: c7 41 04 03 00 00 00 ?? mov dword ds:[ecx + 4], 3
b8 03 00 00 00 ?? mov eax, 3
c6 41 08 63 ?? mov byte ds:[ecx + 8], 0x63<99>
c7 41 0c fd ff ff ff ?? mov dword ds:[ecx + 12], 0xfffffffd<4294967293,-3>
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401060 | ??0Derived@@QAE@XZ | 1 |
L1: 53 ?? push ebx
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 46 04 01 00 00 00 ?? mov dword ds:[esi + 4], 1
c6 46 08 61 ?? mov byte ds:[esi + 8], 0x61<97>
c7 46 0c ff ff ff ff ?? mov dword ds:[esi + 12], 0xffffffff<4294967295,-1>
c7 06 b4 31 40 00 ?? mov dword ds:[esi], 0x004031b4
ff 15 f0 30 40 00 ?? call dword ds:[0x004030f0]
L2: 99 ?? cdq
b9 0a 00 00 00 ?? mov ecx, 10
f7 f9 ?? idiv ecx
b8 03 00 00 00 ?? mov eax, 3
b9 62 00 00 00 ?? mov ecx, 0x00000062<98>
85 d2 ?? test edx, edx
0f 94 c3 ?? sete bl
80 c3 62 ?? add bl, 0x62<98>
85 d2 ?? test edx, edx
0f 44 c8 ?? cmove ecx, eax
33 c0 ?? xor eax, eax
85 d2 ?? test edx, edx
0f 95 c0 ?? setne al
83 c0 fd ?? add eax, 0xfd<253,-3>
f7 da ?? neg edx
1b d2 ?? sbb edx, edx
83 c2 03 ?? add edx, 3
89 56 04 ?? mov dword ds:[esi + 4], edx
88 5e 08 ?? mov byte ds:[esi + 8], bl
89 46 0c ?? mov dword ds:[esi + 12], eax
8b c6 ?? mov eax, esi
89 4e 10 ?? mov dword ds:[esi + 0x10<16>], ecx
5e ?? pop esi
5b ?? pop ebx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4010d0 | ?func3@Derived@@UAEHXZ | 1 |
L1: 8b 41 10 ?? mov eax, dword ds:[ecx + 0x10<16>]
40 ?? inc eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4010e0 | _main | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
51 ?? push ecx
56 ?? push esi
57 ?? push edi
6a 14 ?? push 0x14<20>
e8 83 00 00 00 ?? call function 0x00401170
L2: 8b f8 ?? mov edi, eax
83 c4 04 ?? add esp, 4
89 7d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edi
c7 47 04 01 00 00 00 ?? mov dword ds:[edi + 4], 1
c6 47 08 61 ?? mov byte ds:[edi + 8], 0x61<97>
c7 47 0c ff ff ff ff ?? mov dword ds:[edi + 12], 0xffffffff<4294967295,-1>
c7 07 b4 31 40 00 ?? mov dword ds:[edi], 0x004031b4
ff 15 f0 30 40 00 ?? call dword ds:[0x004030f0]
L3: 99 ?? cdq
b9 0a 00 00 00 ?? mov ecx, 10
f7 f9 ?? idiv ecx
85 d2 ?? test edx, edx
74 0f ?? je basic block L5
L4: b8 62 00 00 00 ?? mov eax, 0x00000062<98>
8a d0 ?? mov dl, al
8d 48 9c ?? lea ecx, ds:[eax + 0x9c<156,-100>]
8d 70 a0 ?? lea esi, ds:[eax + 0xa0<160,-96>]
eb 0c ?? jmp basic block L6
L5: b8 03 00 00 00 ?? mov eax, 3
b2 63 ?? mov dl, 0x63<99>
8b f0 ?? mov esi, eax
8d 48 fa ?? lea ecx, ds:[eax + 0xfa<250,-6>]
L6: 89 77 04 ?? mov dword ds:[edi + 4], esi
88 57 08 ?? mov byte ds:[edi + 8], dl
89 4f 0c ?? mov dword ds:[edi + 12], ecx
8b cf ?? mov ecx, edi
89 47 10 ?? mov dword ds:[edi + 0x10<16>], eax
8b 07 ?? mov eax, dword ds:[edi]
ff 50 08 ?? call dword ds:[eax + 8]
L7: 6a 10 ?? push 0x10<16>
57 ?? push edi
8b f0 ?? mov esi, eax
e8 49 00 00 00 ?? call function 0x004011a0
L8: 83 c4 08 ?? add esp, 8
8b c6 ?? mov eax, esi
5f ?? pop edi
5e ?? pop esi
8b e5 ?? mov esp, ebp
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401162 | @__security_check_cookie@4 | 0 |
L1: 3b 0d 04 50 40 00 ?? cmp ecx, dword ds:[0x00405004]
75 01 ?? jne basic block L3
L2: c3 ?? ret
L3: e9 48 03 00 00 ?? jmp function 0x004014b8
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401170 | ??2@YAPAXI@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
eb 0d ?? jmp basic block L4
L2: ff 75 08 ?? push dword ss:[ebp + 8]
e8 ec 13 00 00 ?? call function 0x00402569
L3: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 0f ?? je basic block L7
L4: ff 75 08 ?? push dword ss:[ebp + 8]
e8 e5 13 00 00 ?? call function 0x0040256f
L5: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 e6 ?? je basic block L2
L6: 5d ?? pop ebp
c3 ?? ret
L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1>
0f 84 aa 07 00 00 ?? je function 0x00401945
L8: e9 88 07 00 00 ?? jmp function 0x00401928
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4011a0 | ??3@YAXPAXI@Z | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
ff 75 08 ?? push dword ss:[ebp + 8]
e8 c4 07 00 00 ?? call function 0x0040196f
L2: 59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4011ae | ??1type_info@@UAE@XZ | 1 |
L1: c7 01 34 31 40 00 ?? mov dword ds:[ecx], 0x00403134
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4011b5 | ??_Etype_info@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
f6 45 08 01 ?? test byte ss:[ebp + 8], 1
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134
74 0a ?? je basic block L4
L2: 6a 0c ?? push 12
56 ?? push esi
e8 d1 ff ff ff ?? call function 0x004011a0
L3: 59 ?? pop ecx
59 ?? pop ecx
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4011b5 | ??_Gtype_info@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
f6 45 08 01 ?? test byte ss:[ebp + 8], 1
56 ?? push esi
8b f1 ?? mov esi, ecx
c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134
74 0a ?? je basic block L4
L2: 6a 0c ?? push 12
56 ?? push esi
e8 d1 ff ff ff ?? call function 0x004011a0
L3: 59 ?? pop ecx
59 ?? pop ecx
L4: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4011d8 | pre_c_initialization | 0 |
L1: 56 ?? push esi
6a 01 ?? push 1
e8 9b 13 00 00 ?? call function 0x0040257b
L2: e8 a8 0b 00 00 ?? call function 0x00401d8d
L3: 50 ?? push eax
e8 c6 13 00 00 ?? call function 0x004025b1
L4: e8 9a 0b 00 00 ?? call function 0x00401d8a
L5: 8b f0 ?? mov esi, eax
e8 ea 13 00 00 ?? call function 0x004025e1
L6: 6a 01 ?? push 1
89 30 ?? mov dword ds:[eax], esi
e8 26 09 00 00 ?? call function 0x00401b26
L7: 83 c4 0c ?? add esp, 12
5e ?? pop esi
84 c0 ?? test al, al
74 73 ?? je basic block L30
L8: db e2 ?? fnclex
e8 10 0e 00 00 ?? call function 0x0040201f
L9: 68 4b 20 40 00 ?? push function 0x0040204b
e8 bd 0a 00 00 ?? call function 0x00401cd6
L10: e8 68 0b 00 00 ?? call function 0x00401d86
L11: 50 ?? push eax
e8 63 13 00 00 ?? call function 0x00402587
L12: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
75 51 ?? jne basic block L30
L13: e8 6a 0b 00 00 ?? call function 0x00401d99
L14: e8 d0 0b 00 00 ?? call function 0x00401e04
L15: 85 c0 ?? test eax, eax
74 0b ?? je basic block L18
L16: 68 83 1d 40 00 ?? push function 0x00401d83
e8 3f 13 00 00 ?? call function 0x00402581
L17: 59 ?? pop ecx
L18: e8 8d 0b 00 00 ?? call function 0x00401dd5
L19: e8 8b 0b 00 00 ?? call function 0x00401dd8
L20: e8 62 0b 00 00 ?? call function 0x00401db4
L21: e8 3f 0b 00 00 ?? call function 0x00401d96
L22: 50 ?? push eax
e8 78 13 00 00 ?? call function 0x004025d5
L23: 59 ?? pop ecx
e8 4e 0b 00 00 ?? call function 0x00401db1
L24: 84 c0 ?? test al, al
74 05 ?? je basic block L26
L25: e8 21 13 00 00 ?? call function 0x0040258d
L26: e8 fc 0c 00 00 ?? call function 0x00401f6d
L27: e8 f2 0c 00 00 ?? call function 0x00401f68
L28: 85 c0 ?? test eax, eax
75 01 ?? jne basic block L30
L29: c3 ?? ret
L30: 6a 07 ?? push 7
e8 9a 0b 00 00 ?? call function 0x00401e1c
L31: cc ?? int3
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401283 | post_pgo_initialization | 0 |
L1: e8 5f 0b 00 00 ?? call function 0x00401de7
L2: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40128b | pre_cpp_initialization | 0 |
L1: e8 22 0d 00 00 ?? call function 0x00401fb2
L2: e8 fe 0a 00 00 ?? call function 0x00401d93
L3: 50 ?? push eax
e8 40 13 00 00 ?? call function 0x004025db
L4: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40129d | __scrt_common_main | 0 |
L1: e8 96 0a 00 00 ?? call function 0x00401d38
L2: e9 00 00 00 00 ?? jmp function 0x004012a7
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4012a7 | __scrt_common_main_seh | 0 |
L1: 6a 14 ?? push 0x14<20>
68 38 39 40 00 ?? push 0x00403938
e8 cd 0d 00 00 ?? call function 0x00402080
L2: 6a 01 ?? push 1
e8 33 08 00 00 ?? call function 0x00401aed
L3: 59 ?? pop ecx
84 c0 ?? test al, al
0f 84 50 01 00 00 ?? je basic block L44
L4: 32 db ?? xor bl, bl
88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl
83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
e8 21 07 00 00 ?? call function 0x004019f2
L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al
a1 dc 53 40 00 ?? mov eax, dword ds:[0x004053dc]
33 c9 ?? xor ecx, ecx
41 ?? inc ecx
3b c1 ?? cmp eax, ecx
0f 84 2f 01 00 00 ?? je basic block L44
L6: 85 c0 ?? test eax, eax
75 49 ?? jne basic block L12
L7: 89 0d dc 53 40 00 ?? mov dword ds:[0x004053dc], ecx
68 1c 31 40 00 ?? push 0x0040311c
68 10 31 40 00 ?? push 0x00403110
e8 a2 12 00 00 ?? call function 0x0040259f
L8: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
74 11 ?? je basic block L10
L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
b8 ff 00 00 00 ?? mov eax, 0x000000ff<255>
e9 ef 00 00 00 ?? jmp basic block L43
L10: 68 0c 31 40 00 ?? push 0x0040310c
68 04 31 40 00 ?? push 0x00403104
e8 76 12 00 00 ?? call function 0x00402599
L11: 59 ?? pop ecx
59 ?? pop ecx
c7 05 dc 53 40 00 02 00 ?? mov dword ds:[0x004053dc], 2
00 00
eb 05 ?? jmp basic block L13
L12: 8a d9 ?? mov bl, cl
88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl
L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>]
e8 03 09 00 00 ?? call function 0x00401c41
L14: 59 ?? pop ecx
e8 cc 0a 00 00 ?? call function 0x00401e10
L15: 8b f0 ?? mov esi, eax
33 ff ?? xor edi, edi
39 3e ?? cmp dword ds:[esi], edi
74 1b ?? je basic block L20
L16: 56 ?? push esi
e8 5b 08 00 00 ?? call function 0x00401bad
L17: 59 ?? pop ecx
84 c0 ?? test al, al
74 10 ?? je basic block L20
L18: 8b 36 ?? mov esi, dword ds:[esi]
57 ?? push edi
6a 02 ?? push 2
57 ?? push edi
8b ce ?? mov ecx, esi
ff 15 f8 30 40 00 ?? call dword ds:[0x004030f8]
L19: ff d6 ?? call esi
L20: e8 aa 0a 00 00 ?? call function 0x00401e16
L21: 8b f0 ?? mov esi, eax
39 3e ?? cmp dword ds:[esi], edi
74 13 ?? je basic block L26
L22: 56 ?? push esi
e8 35 08 00 00 ?? call function 0x00401bad
L23: 59 ?? pop ecx
84 c0 ?? test al, al
74 08 ?? je basic block L26
L24: ff 36 ?? push dword ds:[esi]
e8 4b 12 00 00 ?? call function 0x004025cf
L25: 59 ?? pop ecx
L26: e8 09 12 00 00 ?? call function 0x00402593
L27: 8b f8 ?? mov edi, eax
e8 2c 12 00 00 ?? call function 0x004025bd
L28: 8b 30 ?? mov esi, dword ds:[eax]
e8 1f 12 00 00 ?? call function 0x004025b7
L29: 57 ?? push edi
56 ?? push esi
ff 30 ?? push dword ds:[eax]
e8 3f fd ff ff ?? call function 0x004010e0
L30: 83 c4 0c ?? add esp, 12
8b f0 ?? mov esi, eax
e8 c5 0b 00 00 ?? call function 0x00401f70
L31: 84 c0 ?? test al, al
74 6b ?? je basic block L45
L32: 84 db ?? test bl, bl
75 05 ?? jne basic block L34
L33: e8 0b 12 00 00 ?? call function 0x004025c3
L34: 6a 00 ?? push 0
6a 01 ?? push 1
e8 9d 08 00 00 ?? call function 0x00401c5e
L35: 59 ?? pop ecx
59 ?? pop ecx
c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b c6 ?? mov eax, esi
eb 35 ?? jmp basic block L43
L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>]
8b 01 ?? mov eax, dword ds:[ecx]
8b 00 ?? mov eax, dword ds:[eax]
89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax
51 ?? push ecx
50 ?? push eax
e8 96 11 00 00 ?? call function 0x00402575
L37: 59 ?? pop ecx
59 ?? pop ecx
c3 ?? ret
L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
e8 86 0b 00 00 ?? call function 0x00401f70
L39: 84 c0 ?? test al, al
74 32 ?? je basic block L46
L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0
75 05 ?? jne basic block L42
L41: e8 d0 11 00 00 ?? call function 0x004025c9
L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>]
L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
c9 ?? leave
c3 ?? ret
L44: 6a 07 ?? push 7
e8 02 0a 00 00 ?? call function 0x00401e1c
L45: 56 ?? push esi
e8 85 11 00 00 ?? call function 0x004025a5
L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>]
e8 83 11 00 00 ?? call function 0x004025ab
L47: cc ?? int3
L48: e8 58 09 00 00 ?? call function 0x00401d86
L49: 50 ?? push eax
e8 53 11 00 00 ?? call function 0x00402587
L50: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40143b | invoke_main | 0 |
L1: 56 ?? push esi
57 ?? push edi
e8 51 11 00 00 ?? call function 0x00402593
L2: 8b f8 ?? mov edi, eax
e8 74 11 00 00 ?? call function 0x004025bd
L3: 8b 30 ?? mov esi, dword ds:[eax]
e8 67 11 00 00 ?? call function 0x004025b7
L4: 57 ?? push edi
56 ?? push esi
ff 30 ?? push dword ds:[eax]
e8 87 fc ff ff ?? call function 0x004010e0
L5: 83 c4 0c ?? add esp, 12
5f ?? pop edi
5e ?? pop esi
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401486 | _mainCRTStartup | 0 |
L1: e8 ad 08 00 00 ?? call function 0x00401d38
L2: e9 17 fe ff ff ?? jmp function 0x004012a7
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401490 | ___raise_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 00 ?? push 0
ff 15 04 30 40 00 ?? call dword ds:[0x00403004]
L2: ff 75 08 ?? push dword ss:[ebp + 8]
ff 15 2c 30 40 00 ?? call dword ds:[0x0040302c]
L3: 68 09 04 00 c0 ?? push 0xc0000409
ff 15 08 30 40 00 ?? call dword ds:[0x00403008]
L4: 50 ?? push eax
ff 15 0c 30 40 00 ?? call dword ds:[0x0040300c]
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4014b8 | ___report_gsfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 24 03 00 00 ?? sub esp, 0x00000324<804>
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 6a 02 ?? push 2
59 ?? pop ecx
cd 29 ?? int 0x29<41>
L4: a3 c0 51 40 00 ?? mov dword ds:[0x004051c0], eax
89 0d bc 51 40 00 ?? mov dword ds:[0x004051bc], ecx
89 15 b8 51 40 00 ?? mov dword ds:[0x004051b8], edx
89 1d b4 51 40 00 ?? mov dword ds:[0x004051b4], ebx
89 35 b0 51 40 00 ?? mov dword ds:[0x004051b0], esi
89 3d ac 51 40 00 ?? mov dword ds:[0x004051ac], edi
66 8c 15 d8 51 40 00 ?? mov word ds:[0x004051d8], ss
66 8c 0d cc 51 40 00 ?? mov word ds:[0x004051cc], cs
66 8c 1d a8 51 40 00 ?? mov word ds:[0x004051a8], ds
66 8c 05 a4 51 40 00 ?? mov word ds:[0x004051a4], es
66 8c 25 a0 51 40 00 ?? mov word ds:[0x004051a0], fs
66 8c 2d 9c 51 40 00 ?? mov word ds:[0x0040519c], gs
9c ?? pushfd
8f 05 d0 51 40 00 ?? pop dword ds:[0x004051d0]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 c4 51 40 00 ?? mov dword ds:[0x004051c4], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 c8 51 40 00 ?? mov dword ds:[0x004051c8], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax
8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>]
c7 05 10 51 40 00 01 00 ?? mov dword ds:[0x00405110], 0x00010001
01 00
a1 c8 51 40 00 ?? mov eax, dword ds:[0x004051c8]
a3 cc 50 40 00 ?? mov dword ds:[0x004050cc], eax
c7 05 c0 50 40 00 09 04 ?? mov dword ds:[0x004050c0], 0xc0000409
00 c0
c7 05 c4 50 40 00 01 00 ?? mov dword ds:[0x004050c4], 1
00 00
c7 05 d0 50 40 00 01 00 ?? mov dword ds:[0x004050d0], 1
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
c7 80 d4 50 40 00 02 00 ?? mov dword ds:[eax + 0x004050d4], 2
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
6a 04 ?? push 4
58 ?? pop eax
c1 e0 00 ?? shl eax, 0
8b 0d 00 50 40 00 ?? mov ecx, dword ds:[0x00405000]
89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx
68 38 31 40 00 ?? push 0x00403138
e8 e0 fe ff ff ?? call function 0x00401490
L5: c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4015b2 | ___report_rangecheckfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
6a 08 ?? push 8
e8 02 00 00 00 ?? call function 0x004015be
L2: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4015be | ___report_securityfailure | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796>
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 c0 51 40 00 ?? mov dword ds:[0x004051c0], eax
89 0d bc 51 40 00 ?? mov dword ds:[0x004051bc], ecx
89 15 b8 51 40 00 ?? mov dword ds:[0x004051b8], edx
89 1d b4 51 40 00 ?? mov dword ds:[0x004051b4], ebx
89 35 b0 51 40 00 ?? mov dword ds:[0x004051b0], esi
89 3d ac 51 40 00 ?? mov dword ds:[0x004051ac], edi
66 8c 15 d8 51 40 00 ?? mov word ds:[0x004051d8], ss
66 8c 0d cc 51 40 00 ?? mov word ds:[0x004051cc], cs
66 8c 1d a8 51 40 00 ?? mov word ds:[0x004051a8], ds
66 8c 05 a4 51 40 00 ?? mov word ds:[0x004051a4], es
66 8c 25 a0 51 40 00 ?? mov word ds:[0x004051a0], fs
66 8c 2d 9c 51 40 00 ?? mov word ds:[0x0040519c], gs
9c ?? pushfd
8f 05 d0 51 40 00 ?? pop dword ds:[0x004051d0]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 c4 51 40 00 ?? mov dword ds:[0x004051c4], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 c8 51 40 00 ?? mov dword ds:[0x004051c8], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax
8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>]
a1 c8 51 40 00 ?? mov eax, dword ds:[0x004051c8]
a3 cc 50 40 00 ?? mov dword ds:[0x004050cc], eax
c7 05 c0 50 40 00 09 04 ?? mov dword ds:[0x004050c0], 0xc0000409
00 c0
c7 05 c4 50 40 00 01 00 ?? mov dword ds:[0x004050c4], 1
00 00
c7 05 d0 50 40 00 01 00 ?? mov dword ds:[0x004050d0], 1
00 00
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 88 d4 50 40 00 ?? mov dword ds:[eax + 0x004050d4], ecx
68 38 31 40 00 ?? push 0x00403138
e8 05 fe ff ff ?? call function 0x00401490
L5: c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40168d | ___report_securityfailureEx | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 20 03 00 00 ?? sub esp, 0x00000320<800>
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: a3 c0 51 40 00 ?? mov dword ds:[0x004051c0], eax
89 0d bc 51 40 00 ?? mov dword ds:[0x004051bc], ecx
89 15 b8 51 40 00 ?? mov dword ds:[0x004051b8], edx
89 1d b4 51 40 00 ?? mov dword ds:[0x004051b4], ebx
89 35 b0 51 40 00 ?? mov dword ds:[0x004051b0], esi
89 3d ac 51 40 00 ?? mov dword ds:[0x004051ac], edi
66 8c 15 d8 51 40 00 ?? mov word ds:[0x004051d8], ss
66 8c 0d cc 51 40 00 ?? mov word ds:[0x004051cc], cs
66 8c 1d a8 51 40 00 ?? mov word ds:[0x004051a8], ds
66 8c 05 a4 51 40 00 ?? mov word ds:[0x004051a4], es
66 8c 25 a0 51 40 00 ?? mov word ds:[0x004051a0], fs
66 8c 2d 9c 51 40 00 ?? mov word ds:[0x0040519c], gs
9c ?? pushfd
8f 05 d0 51 40 00 ?? pop dword ds:[0x004051d0]
8b 45 00 ?? mov eax, dword ss:[ebp + 0]
a3 c4 51 40 00 ?? mov dword ds:[0x004051c4], eax
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
a3 c8 51 40 00 ?? mov dword ds:[0x004051c8], eax
8d 45 08 ?? lea eax, ss:[ebp + 8]
a3 d4 51 40 00 ?? mov dword ds:[0x004051d4], eax
8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>]
a1 c8 51 40 00 ?? mov eax, dword ds:[0x004051c8]
a3 cc 50 40 00 ?? mov dword ds:[0x004050cc], eax
c7 05 c0 50 40 00 09 04 ?? mov dword ds:[0x004050c0], 0xc0000409
00 c0
c7 05 c4 50 40 00 01 00 ?? mov dword ds:[0x004050c4], 1
00 00
83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0
76 0a ?? jbe basic block L7
L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0
75 04 ?? jne basic block L7
L6: 83 65 0c 00 ?? and dword ss:[ebp + 12], 0
L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14
76 07 ?? jbe basic block L9
L8: 8b 45 0c ?? mov eax, dword ss:[ebp + 12]
48 ?? dec eax
89 45 0c ?? mov dword ss:[ebp + 12], eax
L9: 8b 45 0c ?? mov eax, dword ss:[ebp + 12]
40 ?? inc eax
a3 d0 50 40 00 ?? mov dword ds:[0x004050d0], eax
6a 04 ?? push 4
58 ?? pop eax
6b c0 00 ?? imul eax, eax, 0
8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
89 88 d4 50 40 00 ?? mov dword ds:[eax + 0x004050d4], ecx
83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
eb 07 ?? jmp basic block L10
L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
3b 45 0c ?? cmp eax, dword ss:[ebp + 12]
73 15 ?? jae basic block L12
L11: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>]
8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>]
8b 0c 8a ?? mov ecx, dword ds:[edx + ecx * 4]
89 0c 85 d8 50 40 00 ?? mov dword ds:[0x004050d8 + eax * 4], ecx
eb dc ?? jmp 0x00401772
8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>]
40 ?? inc eax
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
L12: 68 38 31 40 00 ?? push 0x00403138
e8 f0 fc ff ff ?? call function 0x00401490
L13: c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4017a2 | ??0bad_alloc@std@@AAE@QBD@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 61 04 00 ?? and dword ds:[ecx + 4], 0
83 61 08 00 ?? and dword ds:[ecx + 8], 0
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
89 41 04 ?? mov dword ds:[ecx + 4], eax
8b c1 ?? mov eax, ecx
c7 01 64 31 40 00 ?? mov dword ds:[ecx], 0x00403164
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4017bf | ??0bad_alloc@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
ff 75 08 ?? push dword ss:[ebp + 8]
8b f1 ?? mov esi, ecx
e8 58 00 00 00 ?? call function 0x00401825
L2: c7 06 64 31 40 00 ?? mov dword ds:[esi], 0x00403164
8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4017da | ??0bad_alloc@std@@QAE@XZ | 1 |
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0
8b c1 ?? mov eax, ecx
83 61 08 00 ?? and dword ds:[ecx + 8], 0
c7 41 04 6c 31 40 00 ?? mov dword ds:[ecx + 4], 0x0040316c<"bad allocation">
c7 01 64 31 40 00 ?? mov dword ds:[ecx], 0x00403164
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4017f2 | ??0bad_array_new_length@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
ff 75 08 ?? push dword ss:[ebp + 8]
8b f1 ?? mov esi, ecx
e8 25 00 00 00 ?? call function 0x00401825
L2: c7 06 80 31 40 00 ?? mov dword ds:[esi], 0x00403180
8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40180d | ??0bad_array_new_length@std@@QAE@XZ | 1 |
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0
8b c1 ?? mov eax, ecx
83 61 08 00 ?? and dword ds:[ecx + 8], 0
c7 41 04 88 31 40 00 ?? mov dword ds:[ecx + 4], 0x00403188<"bad array new length">
c7 01 80 31 40 00 ?? mov dword ds:[ecx], 0x00403180
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401825 | ??0exception@std@@QAE@ABV01@@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
83 20 00 ?? and dword ds:[eax], 0
83 60 04 00 ?? and dword ds:[eax + 4], 0
50 ?? push eax
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
83 c0 04 ?? add eax, 4
50 ?? push eax
e8 eb 0c 00 00 ?? call function 0x00402533
L2: 59 ?? pop ecx
59 ?? pop ecx
8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401851 | ??0exception@std@@QAE@QBDH@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
c7 01 44 31 40 00 ?? mov dword ds:[ecx], 0x00403144
83 61 04 00 ?? and dword ds:[ecx + 4], 0
83 61 08 00 ?? and dword ds:[ecx + 8], 0
89 41 04 ?? mov dword ds:[ecx + 4], eax
8b c1 ?? mov eax, ecx
5d ?? pop ebp
c2 08 00 ?? ret 8
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40186e | ??1bad_alloc@std@@UAE@XZ | 1 |
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4]
c7 01 44 31 40 00 ?? mov dword ds:[ecx], 0x00403144
50 ?? push eax
e8 bc 0c 00 00 ?? call function 0x00402539
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40187f | ??1bad_array_new_length@std@@UAE@XZ | 1 |
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4]
c7 01 44 31 40 00 ?? mov dword ds:[ecx], 0x00403144
50 ?? push eax
e8 ab 0c 00 00 ?? call function 0x00402539
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401890 | ??1exception@std@@UAE@XZ | 1 |
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4]
c7 01 44 31 40 00 ?? mov dword ds:[ecx], 0x00403144
50 ?? push eax
e8 9a 0c 00 00 ?? call function 0x00402539
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4018a1 | ??_Ebad_alloc@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
50 ?? push eax
e8 83 0c 00 00 ?? call function 0x00402539
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 db f8 ff ff ?? call function 0x004011a0
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4018a1 | ??_Gbad_alloc@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
50 ?? push eax
e8 83 0c 00 00 ?? call function 0x00402539
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 db f8 ff ff ?? call function 0x004011a0
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4018ce | ??_Ebad_array_new_length@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
50 ?? push eax
e8 56 0c 00 00 ?? call function 0x00402539
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 ae f8 ff ff ?? call function 0x004011a0
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4018ce | ??_Gbad_array_new_length@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
50 ?? push eax
e8 56 0c 00 00 ?? call function 0x00402539
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 ae f8 ff ff ?? call function 0x004011a0
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4018fb | ??_Eexception@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
50 ?? push eax
e8 29 0c 00 00 ?? call function 0x00402539
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 81 f8 ff ff ?? call function 0x004011a0
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4018fb | ??_Gexception@std@@UAEPAXI@Z | 1 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
8b f1 ?? mov esi, ecx
8d 46 04 ?? lea eax, ds:[esi + 4]
c7 06 44 31 40 00 ?? mov dword ds:[esi], 0x00403144
50 ?? push eax
e8 29 0c 00 00 ?? call function 0x00402539
L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1
59 ?? pop ecx
74 0a ?? je basic block L5
L3: 6a 0c ?? push 12
56 ?? push esi
e8 81 f8 ff ff ?? call function 0x004011a0
L4: 59 ?? pop ecx
59 ?? pop ecx
L5: 8b c6 ?? mov eax, esi
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401928 | ?__scrt_throw_std_bad_alloc@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
e8 a4 fe ff ff ?? call function 0x004017da
L2: 68 54 39 40 00 ?? push 0x00403954
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
e8 fb 0b 00 00 ?? call function 0x0040253f
L3: cc ?? int3
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401945 | ?__scrt_throw_std_bad_array_new_length@@YAXXZ | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 0c ?? sub esp, 12
8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>]
e8 ba fe ff ff ?? call function 0x0040180d
L2: 68 a8 39 40 00 ?? push 0x004039a8
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
50 ?? push eax
e8 de 0b 00 00 ?? call function 0x0040253f
L3: cc ?? int3
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401962 | ?what@exception@std@@UBEPBDXZ | 1 |
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4]
85 c0 ?? test eax, eax
75 05 ?? jne basic block L3
L2: b8 4c 31 40 00 ?? mov eax, 0x0040314c<"Unknown exception">
L3: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x40196f | ??3@YAXPAX@Z | 0 |
L1: e9 73 0c 00 00 ?? jmp 0x004025e7
ff 25 6c 30 40 00 ?? jmp dword ds:[0x0040306c<"\">@">]
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401974 | find_pe_section | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
56 ?? push esi
8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
03 c8 ?? add ecx, eax
0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>]
8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>]
03 d0 ?? add edx, eax
0f b7 41 06 ?? movzx eax, word ds:[ecx + 6]
6b f0 28 ?? imul esi, eax, 0x28<40>
03 f2 ?? add esi, edx
3b d6 ?? cmp edx, esi
74 19 ?? je basic block L6
L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12]
L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12]
72 0a ?? jb basic block L5
L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8]
03 42 0c ?? add eax, dword ds:[edx + 12]
3b c8 ?? cmp ecx, eax
72 0c ?? jb basic block L8
L5: 83 c2 28 ?? add edx, 0x28<40>
3b d6 ?? cmp edx, esi
75 ea ?? jne basic block L3
L6: 33 c0 ?? xor eax, eax
L7: 5e ?? pop esi
5d ?? pop ebp
c3 ?? ret
L8: 8b c2 ?? mov eax, edx
eb f9 ?? jmp basic block L7
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4019b8 | is_potentially_valid_image_base | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
8b 45 08 ?? mov eax, dword ss:[ebp + 8]
85 c0 ?? test eax, eax
74 25 ?? je basic block L5
L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117>
66 39 08 ?? cmp word ds:[eax], cx
75 1b ?? jne basic block L5
L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
03 c8 ?? add ecx, eax
81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744>
75 0e ?? jne basic block L5
L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267>
66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax
0f 94 c0 ?? sete al
5d ?? pop ebp
c3 ?? ret
L5: 32 c0 ?? xor al, al
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4019eb | _NtCurrentTeb | 0 |
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>]
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x4019f2 | ___scrt_acquire_startup_lock | 0 |
L1: 56 ?? push esi
e8 23 0b 00 00 ?? call function 0x0040251b
L2: 85 c0 ?? test eax, eax
74 20 ?? je basic block L6
L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>]
be e0 53 40 00 ?? mov esi, 0x004053e0
8b 50 04 ?? mov edx, dword ds:[eax + 4]
eb 04 ?? jmp basic block L5
L4: 3b d0 ?? cmp edx, eax
74 10 ?? je basic block L7
L5: 33 c0 ?? xor eax, eax
8b ca ?? mov ecx, edx
f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx
85 c0 ?? test eax, eax
75 f0 ?? jne basic block L4
L6: 32 c0 ?? xor al, al
5e ?? pop esi
c3 ?? ret
L7: b0 01 ?? mov al, 1
5e ?? pop esi
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401a24 | ___scrt_dllmain_after_initialize_c | 0 |
L1: e8 f2 0a 00 00 ?? call function 0x0040251b
L2: 85 c0 ?? test eax, eax
74 07 ?? je basic block L5
L3: e8 15 09 00 00 ?? call function 0x00402347
L4: eb 18 ?? jmp basic block L10
L5: e8 4d 03 00 00 ?? call function 0x00401d86
L6: 50 ?? push eax
e8 48 0b 00 00 ?? call function 0x00402587
L7: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 03 ?? je basic block L9
L8: 32 c0 ?? xor al, al
c3 ?? ret
L9: e8 41 0b 00 00 ?? call function 0x0040258d
L10: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401a4f | ___scrt_dllmain_before_initialize_c | 0 |
L1: 6a 00 ?? push 0
e8 d0 00 00 00 ?? call function 0x00401b26
L2: 84 c0 ?? test al, al
59 ?? pop ecx
0f 95 c0 ?? setne al
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401a5d | ___scrt_dllmain_crt_thread_attach | 0 |
L1: e8 0c 0c 00 00 ?? call function 0x0040266e
L2: 84 c0 ?? test al, al
75 03 ?? jne basic block L4
L3: 32 c0 ?? xor al, al
c3 ?? ret
L4: e8 00 0c 00 00 ?? call function 0x0040266e
L5: 84 c0 ?? test al, al
75 07 ?? jne basic block L8
L6: e8 fa 0b 00 00 ?? call function 0x00402671
L7: eb ed ?? jmp basic block L3
L8: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401a7c | ___scrt_dllmain_crt_thread_detach | 0 |
L1: e8 f0 0b 00 00 ?? call function 0x00402671
L2: e8 eb 0b 00 00 ?? call function 0x00402671
L3: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401a89 | ___scrt_dllmain_exception_filter | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 8a 0a 00 00 ?? call function 0x0040251b
L2: 85 c0 ?? test eax, eax
75 19 ?? jne basic block L6
L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1
75 13 ?? jne basic block L6
L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>]
8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>]
50 ?? push eax
ff 75 08 ?? push dword ss:[ebp + 8]
ff 15 f8 30 40 00 ?? call dword ds:[0x004030f8]
L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>]
L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>]
ff 75 18 ?? push dword ss:[ebp + 0x18<24>]
e8 34 0b 00 00 ?? call function 0x004025ed
L7: 59 ?? pop ecx
59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401abd | ___scrt_dllmain_uninitialize_c | 0 |
L1: e8 59 0a 00 00 ?? call function 0x0040251b
L2: 85 c0 ?? test eax, eax
74 0c ?? je basic block L5
L3: 68 e8 53 40 00 ?? push 0x004053e8
e8 2f 0b 00 00 ?? call function 0x004025ff
L4: 59 ?? pop ecx
c3 ?? ret
L5: e8 a3 0b 00 00 ?? call function 0x0040267a
L6: 85 c0 ?? test eax, eax
0f 84 e4 0a 00 00 ?? je function 0x004025c3
L7: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401ae0 | ___scrt_dllmain_uninitialize_critical | 0 |
L1: 6a 00 ?? push 0
e8 90 0b 00 00 ?? call function 0x00402677
L2: 59 ?? pop ecx
e9 8a 0b 00 00 ?? jmp function 0x00402677
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401aed | ___scrt_initialize_crt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0
75 07 ?? jne basic block L3
L2: c6 05 e4 53 40 00 01 ?? mov byte ds:[0x004053e4], 1
L3: e8 45 08 00 00 ?? call function 0x00402347
L4: e8 64 0b 00 00 ?? call function 0x0040266b
L5: 84 c0 ?? test al, al
75 04 ?? jne basic block L7
L6: 32 c0 ?? xor al, al
5d ?? pop ebp
c3 ?? ret
L7: e8 57 0b 00 00 ?? call function 0x0040266b
L8: 84 c0 ?? test al, al
75 0a ?? jne basic block L11
L9: 6a 00 ?? push 0
e8 55 0b 00 00 ?? call function 0x00402674
L10: 59 ?? pop ecx
eb e9 ?? jmp basic block L6
L11: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401b26 | ___scrt_initialize_onexit_tables | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
80 3d e5 53 40 00 00 ?? cmp byte ds:[0x004053e5], 0
74 04 ?? je basic block L3
L2: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
L3: 56 ?? push esi
8b 75 08 ?? mov esi, dword ss:[ebp + 8]
85 f6 ?? test esi, esi
74 05 ?? je basic block L5
L4: 83 fe 01 ?? cmp esi, 1
75 62 ?? jne basic block L16
L5: e8 d3 09 00 00 ?? call function 0x0040251b
L6: 85 c0 ?? test eax, eax
74 26 ?? je basic block L13
L7: 85 f6 ?? test esi, esi
75 22 ?? jne basic block L13
L8: 68 e8 53 40 00 ?? push 0x004053e8
e8 99 0a 00 00 ?? call function 0x004025f3
L9: 59 ?? pop ecx
85 c0 ?? test eax, eax
75 0f ?? jne basic block L12
L10: 68 f4 53 40 00 ?? push 0x004053f4
e8 8a 0a 00 00 ?? call function 0x004025f3
L11: 59 ?? pop ecx
85 c0 ?? test eax, eax
74 2b ?? je basic block L14
L12: 32 c0 ?? xor al, al
eb 30 ?? jmp basic block L15
L13: 83 c9 ff ?? or ecx, 0xff<255,-1>
89 0d e8 53 40 00 ?? mov dword ds:[0x004053e8], ecx
89 0d ec 53 40 00 ?? mov dword ds:[0x004053ec], ecx
89 0d f0 53 40 00 ?? mov dword ds:[0x004053f0], ecx
89 0d f4 53 40 00 ?? mov dword ds:[0x004053f4], ecx
89 0d f8 53 40 00 ?? mov dword ds:[0x004053f8], ecx
89 0d fc 53 40 00 ?? mov dword ds:[0x004053fc], ecx
L14: c6 05 e5 53 40 00 01 ?? mov byte ds:[0x004053e5], 1
b0 01 ?? mov al, 1
L15: 5e ?? pop esi
5d ?? pop ebp
c3 ?? ret
L16: 6a 05 ?? push 5
e8 70 02 00 00 ?? call function 0x00401e1c
L17: cc ?? int3
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401bad | ___scrt_is_nonwritable_in_current_image | 0 |
L1: 6a 08 ?? push 8
68 e8 39 40 00 ?? push 0x004039e8
e8 c7 04 00 00 ?? call function 0x00402080
L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0
b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117>
66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax
75 5d ?? jne basic block L11
L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c]
81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744>
00 00
75 4c ?? jne basic block L11
L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267>
66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx
75 3e ?? jne basic block L11
L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8]
b9 00 00 40 00 ?? mov ecx, 0x00400000
2b c1 ?? sub eax, ecx
50 ?? push eax
51 ?? push ecx
e8 79 fd ff ff ?? call function 0x00401974
L6: 59 ?? pop ecx
59 ?? pop ecx
85 c0 ?? test eax, eax
74 27 ?? je basic block L11
L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0
7c 21 ?? jl basic block L11
L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
b0 01 ?? mov al, 1
eb 1f ?? jmp basic block L12
L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>]
8b 00 ?? mov eax, dword ds:[eax]
33 c9 ?? xor ecx, ecx
81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005
0f 94 c1 ?? sete cl
8b c1 ?? mov eax, ecx
c3 ?? ret
L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>]
L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2>
32 c0 ?? xor al, al
L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>]
64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx
59 ?? pop ecx
5f ?? pop edi
5e ?? pop esi
5b ?? pop ebx
c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401c41 | ___scrt_release_startup_lock | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
e8 d2 08 00 00 ?? call function 0x0040251b
L2: 85 c0 ?? test eax, eax
74 0f ?? je basic block L5
L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0
75 09 ?? jne basic block L5
L4: 33 c0 ?? xor eax, eax
b9 e0 53 40 00 ?? mov ecx, 0x004053e0
87 01 ?? xchg dword ds:[ecx], eax
L5: 5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401c5e | ___scrt_uninitialize_crt | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
80 3d e4 53 40 00 00 ?? cmp byte ds:[0x004053e4], 0
74 06 ?? je basic block L3
L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0
75 12 ?? jne basic block L6
L3: ff 75 08 ?? push dword ss:[ebp + 8]
e8 fc 09 00 00 ?? call function 0x00402674
L4: ff 75 08 ?? push dword ss:[ebp + 8]
e8 f4 09 00 00 ?? call function 0x00402674
L5: 59 ?? pop ecx
59 ?? pop ecx
L6: b0 01 ?? mov al, 1
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401c86 | __onexit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 3d e8 53 40 00 ff ?? cmp dword ds:[0x004053e8], 0xff<255,-1>
ff 75 08 ?? push dword ss:[ebp + 8]
75 07 ?? jne basic block L4
L2: e8 6b 09 00 00 ?? call function 0x00402605
L3: eb 0b ?? jmp basic block L6
L4: 68 e8 53 40 00 ?? push 0x004053e8
e8 53 09 00 00 ?? call function 0x004025f9
L5: 59 ?? pop ecx
L6: f7 d8 ?? neg eax
59 ?? pop ecx
1b c0 ?? sbb eax, eax
f7 d0 ?? not eax
23 45 08 ?? and eax, dword ss:[ebp + 8]
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401cb3 | _at_quick_exit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 3d f4 53 40 00 ff ?? cmp dword ds:[0x004053f4], 0xff<255,-1>
75 06 ?? jne basic block L3
L2: 5d ?? pop ebp
e9 46 09 00 00 ?? jmp 0x0040260b
ff 25 9c 30 40 00 ?? jmp dword ds:[0x0040309c]
L3: ff 75 08 ?? push dword ss:[ebp + 8]
68 f4 53 40 00 ?? push 0x004053f4
e8 27 09 00 00 ?? call function 0x004025f9
L4: 59 ?? pop ecx
59 ?? pop ecx
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401cd6 | _atexit | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
ff 75 08 ?? push dword ss:[ebp + 8]
e8 a5 ff ff ff ?? call function 0x00401c86
L2: f7 d8 ?? neg eax
59 ?? pop ecx
1b c0 ?? sbb eax, eax
f7 d8 ?? neg eax
48 ?? dec eax
5d ?? pop ebp
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401ceb | __get_entropy | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 14 ?? sub esp, 0x14<20>
83 65 f4 00 ?? and dword ss:[ebp + 0xf4<244,-12>], 0
8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>]
83 65 f8 00 ?? and dword ss:[ebp + 0xf8<248,-8>], 0
50 ?? push eax
ff 15 20 30 40 00 ?? call dword ds:[0x00403020<"V@@">]
L2: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>]
33 45 f4 ?? xor eax, dword ss:[ebp + 0xf4<244,-12>]
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
ff 15 1c 30 40 00 ?? call dword ds:[0x0040301c<"@@@">]
L3: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax
ff 15 18 30 40 00 ?? call dword ds:[0x00403018<"*@@">]
L4: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax
8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>]
50 ?? push eax
ff 15 14 30 40 00 ?? call dword ds:[0x00403014]
L5: 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>]
8d 4d fc ?? lea ecx, ss:[ebp + 0xfc<252,-4>]
33 45 ec ?? xor eax, dword ss:[ebp + 0xec<236,-20>]
33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>]
33 c1 ?? xor eax, ecx
c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d38 | ___security_init_cookie | 0 |
L1: 8b 0d 04 50 40 00 ?? mov ecx, dword ds:[0x00405004]
56 ?? push esi
57 ?? push edi
bf 4e e6 40 bb ?? mov edi, 0xbb40e64e
be 00 00 ff ff ?? mov esi, 0xffff0000<4294901760,-65536>
3b cf ?? cmp ecx, edi
74 04 ?? je basic block L3
L2: 85 ce ?? test esi, ecx
75 26 ?? jne basic block L9
L3: e8 94 ff ff ff ?? call function 0x00401ceb
L4: 8b c8 ?? mov ecx, eax
3b cf ?? cmp ecx, edi
75 07 ?? jne basic block L6
L5: b9 4f e6 40 bb ?? mov ecx, 0xbb40e64f
eb 0e ?? jmp basic block L8
L6: 85 ce ?? test esi, ecx
75 0a ?? jne basic block L8
L7: 0d 11 47 00 00 ?? or eax, 0x00004711<18193>
c1 e0 10 ?? shl eax, 0x10<16>
0b c8 ?? or ecx, eax
L8: 89 0d 04 50 40 00 ?? mov dword ds:[0x00405004], ecx
L9: f7 d1 ?? not ecx
5f ?? pop edi
89 0d 00 50 40 00 ?? mov dword ds:[0x00405000], ecx
5e ?? pop esi
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d83 | __matherr | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d86 | __get_startup_argv_mode | 0 |
L1: 33 c0 ?? xor eax, eax
40 ?? inc eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d8a | __get_startup_commit_mode | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d8d | __get_startup_file_mode | 0 |
L1: b8 00 40 00 00 ?? mov eax, 0x00004000<16384>
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d93 | __get_startup_new_mode | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d96 | __get_startup_thread_locale_mode | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401d99 | ?__scrt_initialize_type_info@@YAXXZ | 0 |
L1: 68 00 54 40 00 ?? push 0x00405400
ff 15 24 30 40 00 ?? call dword ds:[0x00403024<"p@@">]
L2: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401da5 | ?__scrt_uninitialize_type_info@@YAXXZ | 0 |
L1: 68 00 54 40 00 ?? push 0x00405400
e8 96 07 00 00 ?? call function 0x00402545
L2: 59 ?? pop ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401db1 | __should_initialize_environment | 0 |
L1: b0 01 ?? mov al, 1
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401db4 | __initialize_default_precision | 0 |
L1: 68 00 00 03 00 ?? push 0x00030000
68 00 00 01 00 ?? push 0x00010000
6a 00 ?? push 0
e8 4c 08 00 00 ?? call function 0x00402611
L2: 83 c4 0c ?? add esp, 12
85 c0 ?? test eax, eax
75 01 ?? jne basic block L4
L3: c3 ?? ret
L4: 6a 07 ?? push 7
e8 48 00 00 00 ?? call function 0x00401e1c
L5: cc ?? int3
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401dd5 | __initialize_invalid_parameter_handler | 0 |
L1: c2 00 00 ?? ret 0
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401dd8 | __initialize_denormal_control | 0 |
L1: c2 00 00 ?? ret 0
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401ddb | ___local_stdio_printf_options | 0 |
L1: b8 08 54 40 00 ?? mov eax, 0x00405408
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401de1 | ___local_stdio_scanf_options | 0 |
L1: b8 10 54 40 00 ?? mov eax, 0x00405410
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401de7 | ___scrt_initialize_default_local_stdio_options | 0 |
L1: e8 ef ff ff ff ?? call function 0x00401ddb
L2: 8b 48 04 ?? mov ecx, dword ds:[eax + 4]
83 08 24 ?? or dword ds:[eax], 0x24<36>
89 48 04 ?? mov dword ds:[eax + 4], ecx
e8 e7 ff ff ff ?? call function 0x00401de1
L3: 8b 48 04 ?? mov ecx, dword ds:[eax + 4]
83 08 02 ?? or dword ds:[eax], 2
89 48 04 ?? mov dword ds:[eax + 4], ecx
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401e04 | ___scrt_is_user_matherr_present | 0 |
L1: 33 c0 ?? xor eax, eax
39 05 0c 50 40 00 ?? cmp dword ds:[0x0040500c], eax
0f 94 c0 ?? sete al
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401e10 | ___scrt_get_dyn_tls_init_callback | 0 |
L1: b8 2c 54 40 00 ?? mov eax, 0x0040542c
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401e16 | ___scrt_get_dyn_tls_dtor_callback | 0 |
L1: b8 28 54 40 00 ?? mov eax, 0x00405428
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401e1c | ___scrt_fastfail | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
81 ec 24 03 00 00 ?? sub esp, 0x00000324<804>
53 ?? push ebx
6a 17 ?? push 0x17<23>
ff 15 10 30 40 00 ?? call dword ds:[0x00403010]
L2: 85 c0 ?? test eax, eax
74 05 ?? je basic block L4
L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8]
cd 29 ?? int 0x29<41>
L4: 6a 03 ?? push 3
e8 d9 01 00 00 ?? call function 0x00402017
L5: c7 04 24 cc 02 00 00 ?? mov dword ss:[esp], 0x000002cc<716>
8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>]
6a 00 ?? push 0
50 ?? push eax
e8 04 07 00 00 ?? call function 0x00402557
L6: 83 c4 0c ?? add esp, 12
89 85 8c fd ff ff ?? mov dword ss:[ebp + 0xfffffd8c<4294966668,-628>], eax
89 8d 88 fd ff ff ?? mov dword ss:[ebp + 0xfffffd88<4294966664,-632>], ecx
89 95 84 fd ff ff ?? mov dword ss:[ebp + 0xfffffd84<4294966660,-636>], edx
89 9d 80 fd ff ff ?? mov dword ss:[ebp + 0xfffffd80<4294966656,-640>], ebx
89 b5 7c fd ff ff ?? mov dword ss:[ebp + 0xfffffd7c<4294966652,-644>], esi
89 bd 78 fd ff ff ?? mov dword ss:[ebp + 0xfffffd78<4294966648,-648>], edi
66 8c 95 a4 fd ff ff ?? mov word ss:[ebp + 0xfffffda4<4294966692,-604>], ss
66 8c 8d 98 fd ff ff ?? mov word ss:[ebp + 0xfffffd98<4294966680,-616>], cs
66 8c 9d 74 fd ff ff ?? mov word ss:[ebp + 0xfffffd74<4294966644,-652>], ds
66 8c 85 70 fd ff ff ?? mov word ss:[ebp + 0xfffffd70<4294966640,-656>], es
66 8c a5 6c fd ff ff ?? mov word ss:[ebp + 0xfffffd6c<4294966636,-660>], fs
66 8c ad 68 fd ff ff ?? mov word ss:[ebp + 0xfffffd68<4294966632,-664>], gs
9c ?? pushfd
8f 85 9c fd ff ff ?? pop dword ss:[ebp + 0xfffffd9c<4294966684,-612>]
8b 45 04 ?? mov eax, dword ss:[ebp + 4]
89 85 94 fd ff ff ?? mov dword ss:[ebp + 0xfffffd94<4294966676,-620>], eax
8d 45 04 ?? lea eax, ss:[ebp + 4]
89 85 a0 fd ff ff ?? mov dword ss:[ebp + 0xfffffda0<4294966688,-608>], eax
c7 85 dc fc ff ff 01 00 ?? mov dword ss:[ebp + 0xfffffcdc<4294966492,-804>], 0x00010001
01 00
8b 40 fc ?? mov eax, dword ds:[eax + 0xfc<252,-4>]
6a 50 ?? push 0x50<80>
89 85 90 fd ff ff ?? mov dword ss:[ebp + 0xfffffd90<4294966672,-624>], eax
8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>]
6a 00 ?? push 0
50 ?? push eax
e8 7a 06 00 00 ?? call function 0x00402557
L7: 8b 45 04 ?? mov eax, dword ss:[ebp + 4]
83 c4 0c ?? add esp, 12
c7 45 a8 15 00 00 40 ?? mov dword ss:[ebp + 0xa8<168,-88>], 0x40000015
c7 45 ac 01 00 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 1
89 45 b4 ?? mov dword ss:[ebp + 0xb4<180,-76>], eax
ff 15 30 30 40 00 ?? call dword ds:[0x00403030]
L8: 6a 00 ?? push 0
8d 58 ff ?? lea ebx, ds:[eax + 0xff<255,-1>]
f7 db ?? neg ebx
8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>]
89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax
8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>]
1a db ?? sbb bl, bl
89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax
fe c3 ?? inc bl
ff 15 04 30 40 00 ?? call dword ds:[0x00403004]
L9: 8d 45 f8 ?? lea eax, ss:[ebp + 0xf8<248,-8>]
50 ?? push eax
ff 15 2c 30 40 00 ?? call dword ds:[0x0040302c]
L10: 85 c0 ?? test eax, eax
75 0c ?? jne basic block L14
L11: 84 db ?? test bl, bl
75 08 ?? jne basic block L14
L12: 6a 03 ?? push 3
e8 e4 00 00 00 ?? call function 0x00402017
L13: 59 ?? pop ecx
L14: 5b ?? pop ebx
c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401f37 | ___scrt_get_show_window_mode | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
83 ec 44 ?? sub esp, 0x44<68>
6a 44 ?? push 0x44<68>
8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>]
6a 00 ?? push 0
50 ?? push eax
e8 0d 06 00 00 ?? call function 0x00402557
L2: 83 c4 0c ?? add esp, 12
8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>]
50 ?? push eax
ff 15 00 30 40 00 ?? call dword ds:[0x00403000]
L3: f6 45 e8 01 ?? test byte ss:[ebp + 0xe8<232,-24>], 1
74 06 ?? je basic block L5
L4: 0f b7 45 ec ?? movzx eax, word ss:[ebp + 0xec<236,-20>]
c9 ?? leave
c3 ?? ret
L5: 6a 0a ?? push 10
58 ?? pop eax
c9 ?? leave
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401f68 | ___scrt_initialize_mta | 0 |
L1: e9 51 00 00 00 ?? jmp function 0x00401fbe
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401f6d | ___scrt_initialize_winrt | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401f70 | ___scrt_is_managed_app | 0 |
L1: 6a 00 ?? push 0
ff 15 28 30 40 00 ?? call dword ds:[0x00403028]
L2: 85 c0 ?? test eax, eax
74 33 ?? je basic block L8
L3: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117>
66 39 08 ?? cmp word ds:[eax], cx
75 29 ?? jne basic block L8
L4: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>]
03 c8 ?? add ecx, eax
81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744>
75 1c ?? jne basic block L8
L5: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267>
66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax
75 11 ?? jne basic block L8
L6: 83 79 74 0e ?? cmp dword ds:[ecx + 0x74<116>], 14
76 0b ?? jbe basic block L8
L7: 83 b9 e8 00 00 00 00 ?? cmp dword ds:[ecx + 0x000000e8<232>], 0
0f 95 c0 ?? setne al
c3 ?? ret
L8: 32 c0 ?? xor al, al
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401fb2 | ___scrt_set_unhandled_exception_filter | 0 |
L1: 68 c1 1f 40 00 ?? push function 0x00401fc1
ff 15 04 30 40 00 ?? call dword ds:[0x00403004]
L2: c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401fbe | ___scrt_exe_initialize_mta | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401fbe | ___scrt_stub_for_initialize_mta | 0 |
L1: 33 c0 ?? xor eax, eax
c3 ?? ret
|
./vs2022/wpo/RelWithDebInfo/ooex4.exe | 0x401fc1 | ___scrt_unhandled_exception_filter@4 | 0 |
L1: 55 ?? push ebp
8b ec ?? mov ebp, esp
56 ?? push esi
57 ?? push edi
8b 7d 08 ?? mov edi, dword ss:[ebp + 8]
8b 37 ?? mov esi, dword ds:[edi]
81 3e 63 73 6d e0 ?? cmp dword ds:[esi], 0xe06d7363
75 25 ?? jne basic block L7
L2: 83 7e 10 03 ?? cmp dword ds:[esi + 0x10<16>], 3
75 1f ?? jne basic block L7
L3: 8b 46 14 ?? mov eax, dword ds:[esi + 0x14<20>]
3d 20 05 93 19 ?? cmp eax, 0x19930520
74 1d ?? je basic block L8
L4: 3d 21 05 93 19 ?? cmp eax, 0x19930521
74 16 ?? je basic block L8
L5: 3d 22 05 93 19 ?? cmp eax, 0x19930522
74 0f ?? je basic block L8
L6: 3d 00 40 99 01 ?? cmp eax, 0x01994000
74 08 ?? je basic block L8
L7: 5f ?? pop edi
33 c0 ?? xor eax, eax
5e ?? pop esi
5d ?? pop ebp
c2 04 00 ?? ret 4
L8: e8 46 05 00 00 ?? call function 0x0040254b
L9: 89 30 ?? mov dword ds:[eax], esi
8b 77 04 ?? mov esi, dword ds:[edi + 4]
e8 42 05 00 00 ?? call function 0x00402551
L10: 89 30 ?? mov dword ds:[eax], esi
e8 01 06 00 00 ?? call function 0x00402617
L11: cc ?? int3
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.