Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
class label
2 classes
Disassembly
stringlengths
16
68.6k
Dirname
stringlengths
16
28
Exename
stringclasses
17 values
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x40403c
__imp_?width@ios_base@std@@QAE_J_J@Z
1method
0x0040403c: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404040
__imp_?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ
1method
0x00404040: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404044
__imp_?flags@ios_base@std@@QBEHXZ
1method
0x00404044: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404048
__imp_?good@ios_base@std@@QBE_NXZ
1method
0x00404048: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404050
__imp_?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
1method
0x00404050: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x40405c
__imp_?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
1method
0x0040405c: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404060
__imp_?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
1method
0x00404060: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404064
__imp_?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
1method
0x00404064: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404070
__imp_?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
1method
0x00404070: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404078
__imp_??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
1method
0x00404078: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex7.exe
0x404080
__imp_?width@ios_base@std@@QBE_JXZ
1method
0x00404080: no instructions
vs2022/wpo/RelWithDebInfo
ooex7.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401000
??0A@@QAE@XZ
1method
L1: b8 0b 00 00 00 ?? mov eax, 11 c7 01 0a 00 00 00 ?? mov dword ds:[ecx], 10 66 89 41 04 ?? mov word ds:[ecx + 4], ax 8b c1 ?? mov eax, ecx c6 41 06 63 ?? mov byte ds:[ecx + 6], 0x63<99> c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401060
??0C@@QAE@XZ
1method
L1: c7 41 04 0c 00 00 00 ?? mov dword ds:[ecx + 4], 12 8b c1 ?? mov eax, ecx c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401070
??0D@@QAE@XZ
1method
L1: b8 0b 00 00 00 ?? mov eax, 11 c7 41 14 0a 00 00 00 ?? mov dword ds:[ecx + 0x14<20>], 10 66 89 41 18 ?? mov word ds:[ecx + 0x18<24>], ax c6 41 1a 63 ?? mov byte ds:[ecx + 0x1a<26>], 0x63<99> 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 a0 31 40 00 ?? mov dword ds:[ecx], 0x004031a0 c7 41 08 b0 31 40 00 ?? mov dword ds:[ecx + 8], 0x004031b0 c7 41 0c 0c 00 00 00 ?? mov dword ds:[ecx + 12], 12 c7 41 10 0d 00 00 00 ?? mov dword ds:[ecx + 0x10<16>], 13 c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4010b0
_main
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi 6a 1c ?? push 0x1c<28> e8 bf 00 00 00 ?? call function 0x0040117b L2: 8b c8 ?? mov ecx, eax be 0b 00 00 00 ?? mov esi, 11 6a 1c ?? push 0x1c<28> 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx c7 01 a0 31 40 00 ?? mov dword ds:[ecx], 0x004031a0 c7 41 08 b0 31 40 00 ?? mov dword ds:[ecx + 8], 0x004031b0 c7 41 14 0a 00 00 00 ?? mov dword ds:[ecx + 0x14<20>], 10 66 89 71 18 ?? mov word ds:[ecx + 0x18<24>], si c6 41 1a 63 ?? mov byte ds:[ecx + 0x1a<26>], 0x63<99> 89 71 04 ?? mov dword ds:[ecx + 4], esi c7 41 0c 0c 00 00 00 ?? mov dword ds:[ecx + 12], 12 c7 41 10 0d 00 00 00 ?? mov dword ds:[ecx + 0x10<16>], 13 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 04 01 29 00 00 00 ?? mov dword ds:[ecx + eax], 0x00000029<41> c7 41 04 2a 00 00 00 ?? mov dword ds:[ecx + 4], 0x0000002a<42> c7 41 0c 2b 00 00 00 ?? mov dword ds:[ecx + 12], 0x0000002b<43> c7 41 10 2c 00 00 00 ?? mov dword ds:[ecx + 0x10<16>], 0x0000002c<44> e8 8f 00 00 00 ?? call function 0x004011ab L3: 6a 10 ?? push 0x10<16> e8 58 00 00 00 ?? call function 0x0040117b L4: 8b c8 ?? mov ecx, eax ba f5 ff ff ff ?? mov edx, 0xfffffff5<4294967285,-11> 6a 10 ?? push 0x10<16> 51 ?? push ecx 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx c7 01 a8 31 40 00 ?? mov dword ds:[ecx], 0x004031a8 c7 41 08 0a 00 00 00 ?? mov dword ds:[ecx + 8], 10 66 89 71 0c ?? mov word ds:[ecx + 12], si c6 41 0e 63 ?? mov byte ds:[ecx + 14], 0x63<99> 89 71 04 ?? mov dword ds:[ecx + 4], esi 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] c7 04 01 28 00 00 00 ?? mov dword ds:[ecx + eax], 0x00000028<40> 8b 01 ?? mov eax, dword ds:[ecx] 8b 40 04 ?? mov eax, dword ds:[eax + 4] 66 89 54 08 04 ?? mov word ds:[eax + ecx + 4], dx e8 48 00 00 00 ?? call function 0x004011ab L5: 83 c4 18 ?? add esp, 0x18<24> 33 c0 ?? xor eax, eax 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40116d
@__security_check_cookie@4
0func
L1: 3b 0d 04 40 40 00 ?? cmp ecx, dword ds:[0x00404004] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 1e 03 00 00 ?? jmp function 0x00401499
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40117b
??2@YAPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp eb 0d ?? jmp basic block L4 L2: ff 75 08 ?? push dword ss:[ebp + 8] e8 df 13 00 00 ?? call function 0x00402567 L3: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 0f ?? je basic block L7 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 d8 13 00 00 ?? call function 0x0040256d L5: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 e6 ?? je basic block L2 L6: 5d ?? pop ebp c3 ?? ret L7: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 0f 84 80 07 00 00 ?? je function 0x00401926 L8: e9 5e 07 00 00 ?? jmp function 0x00401909
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4011ab
??3@YAXPAXI@Z
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 9a 07 00 00 ?? call function 0x00401950 L2: 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4011b9
pre_c_initialization
0func
L1: 56 ?? push esi 6a 01 ?? push 1 e8 b8 13 00 00 ?? call function 0x00402579 L2: e8 a8 0b 00 00 ?? call function 0x00401d6e L3: 50 ?? push eax e8 e3 13 00 00 ?? call function 0x004025af L4: e8 9a 0b 00 00 ?? call function 0x00401d6b L5: 8b f0 ?? mov esi, eax e8 07 14 00 00 ?? call function 0x004025df L6: 6a 01 ?? push 1 89 30 ?? mov dword ds:[eax], esi e8 26 09 00 00 ?? call function 0x00401b07 L7: 83 c4 0c ?? add esp, 12 5e ?? pop esi 84 c0 ?? test al, al 74 73 ?? je basic block L30 L8: db e2 ?? fnclex e8 10 0e 00 00 ?? call function 0x00402000 L9: 68 2c 20 40 00 ?? push function 0x0040202c e8 bd 0a 00 00 ?? call function 0x00401cb7 L10: e8 68 0b 00 00 ?? call function 0x00401d67 L11: 50 ?? push eax e8 80 13 00 00 ?? call function 0x00402585 L12: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 75 51 ?? jne basic block L30 L13: e8 6a 0b 00 00 ?? call function 0x00401d7a L14: e8 d0 0b 00 00 ?? call function 0x00401de5 L15: 85 c0 ?? test eax, eax 74 0b ?? je basic block L18 L16: 68 64 1d 40 00 ?? push function 0x00401d64 e8 5c 13 00 00 ?? call function 0x0040257f L17: 59 ?? pop ecx L18: e8 8d 0b 00 00 ?? call function 0x00401db6 L19: e8 8b 0b 00 00 ?? call function 0x00401db9 L20: e8 62 0b 00 00 ?? call function 0x00401d95 L21: e8 3f 0b 00 00 ?? call function 0x00401d77 L22: 50 ?? push eax e8 95 13 00 00 ?? call function 0x004025d3 L23: 59 ?? pop ecx e8 4e 0b 00 00 ?? call function 0x00401d92 L24: 84 c0 ?? test al, al 74 05 ?? je basic block L26 L25: e8 3e 13 00 00 ?? call function 0x0040258b L26: e8 fc 0c 00 00 ?? call function 0x00401f4e L27: e8 f2 0c 00 00 ?? call function 0x00401f49 L28: 85 c0 ?? test eax, eax 75 01 ?? jne basic block L30 L29: c3 ?? ret L30: 6a 07 ?? push 7 e8 9a 0b 00 00 ?? call function 0x00401dfd L31: cc ?? int3
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401264
post_pgo_initialization
0func
L1: e8 5f 0b 00 00 ?? call function 0x00401dc8 L2: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40126c
pre_cpp_initialization
0func
L1: e8 22 0d 00 00 ?? call function 0x00401f93 L2: e8 fe 0a 00 00 ?? call function 0x00401d74 L3: 50 ?? push eax e8 5d 13 00 00 ?? call function 0x004025d9 L4: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40127e
__scrt_common_main
0func
L1: e8 96 0a 00 00 ?? call function 0x00401d19 L2: e9 00 00 00 00 ?? jmp function 0x00401288
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401288
__scrt_common_main_seh
0func
L1: 6a 14 ?? push 0x14<20> 68 a0 38 40 00 ?? push 0x004038a0 e8 cc 0d 00 00 ?? call function 0x00402060 L2: 6a 01 ?? push 1 e8 33 08 00 00 ?? call function 0x00401ace L3: 59 ?? pop ecx 84 c0 ?? test al, al 0f 84 50 01 00 00 ?? je basic block L44 L4: 32 db ?? xor bl, bl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 e8 21 07 00 00 ?? call function 0x004019d3 L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al a1 ac 43 40 00 ?? mov eax, dword ds:[0x004043ac] 33 c9 ?? xor ecx, ecx 41 ?? inc ecx 3b c1 ?? cmp eax, ecx 0f 84 2f 01 00 00 ?? je basic block L44 L6: 85 c0 ?? test eax, eax 75 49 ?? jne basic block L12 L7: 89 0d ac 43 40 00 ?? mov dword ds:[0x004043ac], ecx 68 10 31 40 00 ?? push 0x00403110 68 04 31 40 00 ?? push 0x00403104 e8 bf 12 00 00 ?? call function 0x0040259d L8: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 11 ?? je basic block L10 L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b8 ff 00 00 00 ?? mov eax, 0x000000ff<255> e9 ef 00 00 00 ?? jmp basic block L43 L10: 68 00 31 40 00 ?? push 0x00403100 68 f8 30 40 00 ?? push 0x004030f8 e8 93 12 00 00 ?? call function 0x00402597 L11: 59 ?? pop ecx 59 ?? pop ecx c7 05 ac 43 40 00 02 00 ?? mov dword ds:[0x004043ac], 2 00 00 eb 05 ?? jmp basic block L13 L12: 8a d9 ?? mov bl, cl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] e8 03 09 00 00 ?? call function 0x00401c22 L14: 59 ?? pop ecx e8 cc 0a 00 00 ?? call function 0x00401df1 L15: 8b f0 ?? mov esi, eax 33 ff ?? xor edi, edi 39 3e ?? cmp dword ds:[esi], edi 74 1b ?? je basic block L20 L16: 56 ?? push esi e8 5b 08 00 00 ?? call function 0x00401b8e L17: 59 ?? pop ecx 84 c0 ?? test al, al 74 10 ?? je basic block L20 L18: 8b 36 ?? mov esi, dword ds:[esi] 57 ?? push edi 6a 02 ?? push 2 57 ?? push edi 8b ce ?? mov ecx, esi ff 15 ec 30 40 00 ?? call dword ds:[0x004030ec] L19: ff d6 ?? call esi L20: e8 aa 0a 00 00 ?? call function 0x00401df7 L21: 8b f0 ?? mov esi, eax 39 3e ?? cmp dword ds:[esi], edi 74 13 ?? je basic block L26 L22: 56 ?? push esi e8 35 08 00 00 ?? call function 0x00401b8e L23: 59 ?? pop ecx 84 c0 ?? test al, al 74 08 ?? je basic block L26 L24: ff 36 ?? push dword ds:[esi] e8 68 12 00 00 ?? call function 0x004025cd L25: 59 ?? pop ecx L26: e8 26 12 00 00 ?? call function 0x00402591 L27: 8b f8 ?? mov edi, eax e8 49 12 00 00 ?? call function 0x004025bb L28: 8b 30 ?? mov esi, dword ds:[eax] e8 3c 12 00 00 ?? call function 0x004025b5 L29: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 2e fd ff ff ?? call function 0x004010b0 L30: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax e8 c5 0b 00 00 ?? call function 0x00401f51 L31: 84 c0 ?? test al, al 74 6b ?? je basic block L45 L32: 84 db ?? test bl, bl 75 05 ?? jne basic block L34 L33: e8 28 12 00 00 ?? call function 0x004025c1 L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 9d 08 00 00 ?? call function 0x00401c3f L35: 59 ?? pop ecx 59 ?? pop ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b c6 ?? mov eax, esi eb 35 ?? jmp basic block L43 L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 01 ?? mov eax, dword ds:[ecx] 8b 00 ?? mov eax, dword ds:[eax] 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 51 ?? push ecx 50 ?? push eax e8 b3 11 00 00 ?? call function 0x00402573 L37: 59 ?? pop ecx 59 ?? pop ecx c3 ?? ret L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] e8 86 0b 00 00 ?? call function 0x00401f51 L39: 84 c0 ?? test al, al 74 32 ?? je basic block L46 L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0 75 05 ?? jne basic block L42 L41: e8 ed 11 00 00 ?? call function 0x004025c7 L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret L44: 6a 07 ?? push 7 e8 02 0a 00 00 ?? call function 0x00401dfd L45: 56 ?? push esi e8 a2 11 00 00 ?? call function 0x004025a3 L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>] e8 a0 11 00 00 ?? call function 0x004025a9 L47: cc ?? int3 L48: e8 58 09 00 00 ?? call function 0x00401d67 L49: 50 ?? push eax e8 70 11 00 00 ?? call function 0x00402585 L50: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40141c
invoke_main
0func
L1: 56 ?? push esi 57 ?? push edi e8 6e 11 00 00 ?? call function 0x00402591 L2: 8b f8 ?? mov edi, eax e8 91 11 00 00 ?? call function 0x004025bb L3: 8b 30 ?? mov esi, dword ds:[eax] e8 84 11 00 00 ?? call function 0x004025b5 L4: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 76 fc ff ff ?? call function 0x004010b0 L5: 83 c4 0c ?? add esp, 12 5f ?? pop edi 5e ?? pop esi c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401467
_mainCRTStartup
0func
L1: e8 ad 08 00 00 ?? call function 0x00401d19 L2: e9 17 fe ff ff ?? jmp function 0x00401288
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401471
___raise_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 04 30 40 00 ?? call dword ds:[0x00403004] L2: ff 75 08 ?? push dword ss:[ebp + 8] ff 15 2c 30 40 00 ?? call dword ds:[0x0040302c] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 08 30 40 00 ?? call dword ds:[0x00403008] L4: 50 ?? push eax ff 15 0c 30 40 00 ?? call dword ds:[0x0040300c] L5: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401499
___report_gsfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 6a 02 ?? push 2 59 ?? pop ecx cd 29 ?? int 0x29<41> L4: a3 90 41 40 00 ?? mov dword ds:[0x00404190], eax 89 0d 8c 41 40 00 ?? mov dword ds:[0x0040418c], ecx 89 15 88 41 40 00 ?? mov dword ds:[0x00404188], edx 89 1d 84 41 40 00 ?? mov dword ds:[0x00404184], ebx 89 35 80 41 40 00 ?? mov dword ds:[0x00404180], esi 89 3d 7c 41 40 00 ?? mov dword ds:[0x0040417c], edi 66 8c 15 a8 41 40 00 ?? mov word ds:[0x004041a8], ss 66 8c 0d 9c 41 40 00 ?? mov word ds:[0x0040419c], cs 66 8c 1d 78 41 40 00 ?? mov word ds:[0x00404178], ds 66 8c 05 74 41 40 00 ?? mov word ds:[0x00404174], es 66 8c 25 70 41 40 00 ?? mov word ds:[0x00404170], fs 66 8c 2d 6c 41 40 00 ?? mov word ds:[0x0040416c], gs 9c ?? pushfd 8f 05 a0 41 40 00 ?? pop dword ds:[0x004041a0] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 94 41 40 00 ?? mov dword ds:[0x00404194], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 98 41 40 00 ?? mov dword ds:[0x00404198], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 a4 41 40 00 ?? mov dword ds:[0x004041a4], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 e0 40 40 00 01 00 ?? mov dword ds:[0x004040e0], 0x00010001 01 00 a1 98 41 40 00 ?? mov eax, dword ds:[0x00404198] a3 9c 40 40 00 ?? mov dword ds:[0x0040409c], eax c7 05 90 40 40 00 09 04 ?? mov dword ds:[0x00404090], 0xc0000409 00 c0 c7 05 94 40 40 00 01 00 ?? mov dword ds:[0x00404094], 1 00 00 c7 05 a0 40 40 00 01 00 ?? mov dword ds:[0x004040a0], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 c7 80 a4 40 40 00 02 00 ?? mov dword ds:[eax + 0x004040a4], 2 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 0d 04 40 40 00 ?? mov ecx, dword ds:[0x00404004] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 6a 04 ?? push 4 58 ?? pop eax c1 e0 00 ?? shl eax, 0 8b 0d 00 40 40 00 ?? mov ecx, dword ds:[0x00404000] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 28 31 40 00 ?? push 0x00403128 e8 e0 fe ff ff ?? call function 0x00401471 L5: c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40159f
___report_securityfailure
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 90 41 40 00 ?? mov dword ds:[0x00404190], eax 89 0d 8c 41 40 00 ?? mov dword ds:[0x0040418c], ecx 89 15 88 41 40 00 ?? mov dword ds:[0x00404188], edx 89 1d 84 41 40 00 ?? mov dword ds:[0x00404184], ebx 89 35 80 41 40 00 ?? mov dword ds:[0x00404180], esi 89 3d 7c 41 40 00 ?? mov dword ds:[0x0040417c], edi 66 8c 15 a8 41 40 00 ?? mov word ds:[0x004041a8], ss 66 8c 0d 9c 41 40 00 ?? mov word ds:[0x0040419c], cs 66 8c 1d 78 41 40 00 ?? mov word ds:[0x00404178], ds 66 8c 05 74 41 40 00 ?? mov word ds:[0x00404174], es 66 8c 25 70 41 40 00 ?? mov word ds:[0x00404170], fs 66 8c 2d 6c 41 40 00 ?? mov word ds:[0x0040416c], gs 9c ?? pushfd 8f 05 a0 41 40 00 ?? pop dword ds:[0x004041a0] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 94 41 40 00 ?? mov dword ds:[0x00404194], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 98 41 40 00 ?? mov dword ds:[0x00404198], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 a4 41 40 00 ?? mov dword ds:[0x004041a4], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 98 41 40 00 ?? mov eax, dword ds:[0x00404198] a3 9c 40 40 00 ?? mov dword ds:[0x0040409c], eax c7 05 90 40 40 00 09 04 ?? mov dword ds:[0x00404090], 0xc0000409 00 c0 c7 05 94 40 40 00 01 00 ?? mov dword ds:[0x00404094], 1 00 00 c7 05 a0 40 40 00 01 00 ?? mov dword ds:[0x004040a0], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 a4 40 40 00 ?? mov dword ds:[eax + 0x004040a4], ecx 68 28 31 40 00 ?? push 0x00403128 e8 05 fe ff ff ?? call function 0x00401471 L5: c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401783
??0bad_alloc@std@@AAE@QBD@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 54 31 40 00 ?? mov dword ds:[ecx], 0x00403154 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4017a0
??0bad_alloc@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 58 00 00 00 ?? call function 0x00401806 L2: c7 06 54 31 40 00 ?? mov dword ds:[esi], 0x00403154 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4017bb
??0bad_alloc@std@@QAE@XZ
1method
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 5c 31 40 00 ?? mov dword ds:[ecx + 4], 0x0040315c<"bad allocation"> c7 01 54 31 40 00 ?? mov dword ds:[ecx], 0x00403154 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4017ee
??0bad_array_new_length@std@@QAE@XZ
1method
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 78 31 40 00 ?? mov dword ds:[ecx + 4], 0x00403178<"bad array new length"> c7 01 70 31 40 00 ?? mov dword ds:[ecx], 0x00403170 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401806
??0exception@std@@QAE@ABV01@@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134 83 20 00 ?? and dword ds:[eax], 0 83 60 04 00 ?? and dword ds:[eax + 4], 0 50 ?? push eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 c0 04 ?? add eax, 4 50 ?? push eax e8 0e 0d 00 00 ?? call function 0x00402537 L2: 59 ?? pop ecx 59 ?? pop ecx 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401832
??0exception@std@@QAE@QBDH@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c7 01 34 31 40 00 ?? mov dword ds:[ecx], 0x00403134 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx 5d ?? pop ebp c2 08 00 ?? ret 8
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401860
??1bad_array_new_length@std@@UAE@XZ
1method
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 34 31 40 00 ?? mov dword ds:[ecx], 0x00403134 50 ?? push eax e8 ce 0c 00 00 ?? call function 0x0040253d L2: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401871
??1exception@std@@UAE@XZ
1method
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 34 31 40 00 ?? mov dword ds:[ecx], 0x00403134 50 ?? push eax e8 bd 0c 00 00 ?? call function 0x0040253d L2: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401882
??_Gbad_alloc@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134 50 ?? push eax e8 a6 0c 00 00 ?? call function 0x0040253d L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 05 f9 ff ff ?? call function 0x004011ab L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4018af
??_Ebad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134 50 ?? push eax e8 79 0c 00 00 ?? call function 0x0040253d L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 d8 f8 ff ff ?? call function 0x004011ab L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4018af
??_Gbad_array_new_length@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134 50 ?? push eax e8 79 0c 00 00 ?? call function 0x0040253d L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 d8 f8 ff ff ?? call function 0x004011ab L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4018dc
??_Eexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134 50 ?? push eax e8 4c 0c 00 00 ?? call function 0x0040253d L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 ab f8 ff ff ?? call function 0x004011ab L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4018dc
??_Gexception@std@@UAEPAXI@Z
1method
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 31 40 00 ?? mov dword ds:[esi], 0x00403134 50 ?? push eax e8 4c 0c 00 00 ?? call function 0x0040253d L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 ab f8 ff ff ?? call function 0x004011ab L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401909
?__scrt_throw_std_bad_alloc@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 a4 fe ff ff ?? call function 0x004017bb L2: 68 bc 38 40 00 ?? push 0x004038bc 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 1e 0c 00 00 ?? call function 0x00402543 L3: cc ?? int3
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401926
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 ba fe ff ff ?? call function 0x004017ee L2: 68 10 39 40 00 ?? push 0x00403910 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 01 0c 00 00 ?? call function 0x00402543 L3: cc ?? int3
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401943
?what@exception@std@@UBEPBDXZ
1method
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L3 L2: b8 3c 31 40 00 ?? mov eax, 0x0040313c<"Unknown exception"> L3: c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401950
??3@YAXPAX@Z
0func
L1: e9 90 0c 00 00 ?? jmp 0x004025e5 ff 25 6c 30 40 00 ?? jmp dword ds:[0x0040306c<"V=@">]
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401955
find_pe_section
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 56 ?? push esi 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>] 8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>] 03 d0 ?? add edx, eax 0f b7 41 06 ?? movzx eax, word ds:[ecx + 6] 6b f0 28 ?? imul esi, eax, 0x28<40> 03 f2 ?? add esi, edx 3b d6 ?? cmp edx, esi 74 19 ?? je basic block L6 L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12] 72 0a ?? jb basic block L5 L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8] 03 42 0c ?? add eax, dword ds:[edx + 12] 3b c8 ?? cmp ecx, eax 72 0c ?? jb basic block L8 L5: 83 c2 28 ?? add edx, 0x28<40> 3b d6 ?? cmp edx, esi 75 ea ?? jne basic block L3 L6: 33 c0 ?? xor eax, eax L7: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L8: 8b c2 ?? mov eax, edx eb f9 ?? jmp basic block L7
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401999
is_potentially_valid_image_base
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 85 c0 ?? test eax, eax 74 25 ?? je basic block L5 L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 75 1b ?? jne basic block L5 L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 75 0e ?? jne basic block L5 L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267> 66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax 0f 94 c0 ?? sete al 5d ?? pop ebp c3 ?? ret L5: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4019cc
_NtCurrentTeb
0func
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4019d3
___scrt_acquire_startup_lock
0func
L1: 56 ?? push esi e8 4c 0b 00 00 ?? call function 0x00402525 L2: 85 c0 ?? test eax, eax 74 20 ?? je basic block L6 L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] be b0 43 40 00 ?? mov esi, 0x004043b0 8b 50 04 ?? mov edx, dword ds:[eax + 4] eb 04 ?? jmp basic block L5 L4: 3b d0 ?? cmp edx, eax 74 10 ?? je basic block L7 L5: 33 c0 ?? xor eax, eax 8b ca ?? mov ecx, edx f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx 85 c0 ?? test eax, eax 75 f0 ?? jne basic block L4 L6: 32 c0 ?? xor al, al 5e ?? pop esi c3 ?? ret L7: b0 01 ?? mov al, 1 5e ?? pop esi c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401a05
___scrt_dllmain_after_initialize_c
0func
L1: e8 1b 0b 00 00 ?? call function 0x00402525 L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 3e 09 00 00 ?? call function 0x00402351 L4: eb 18 ?? jmp basic block L10 L5: e8 4d 03 00 00 ?? call function 0x00401d67 L6: 50 ?? push eax e8 65 0b 00 00 ?? call function 0x00402585 L7: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 03 ?? je basic block L9 L8: 32 c0 ?? xor al, al c3 ?? ret L9: e8 5e 0b 00 00 ?? call function 0x0040258b L10: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401a30
___scrt_dllmain_before_initialize_c
0func
L1: 6a 00 ?? push 0 e8 d0 00 00 00 ?? call function 0x00401b07 L2: 84 c0 ?? test al, al 59 ?? pop ecx 0f 95 c0 ?? setne al c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401a3e
___scrt_dllmain_crt_thread_attach
0func
L1: e8 29 0c 00 00 ?? call function 0x0040266c L2: 84 c0 ?? test al, al 75 03 ?? jne basic block L4 L3: 32 c0 ?? xor al, al c3 ?? ret L4: e8 1d 0c 00 00 ?? call function 0x0040266c L5: 84 c0 ?? test al, al 75 07 ?? jne basic block L8 L6: e8 17 0c 00 00 ?? call function 0x0040266f L7: eb ed ?? jmp basic block L3 L8: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401a5d
___scrt_dllmain_crt_thread_detach
0func
L1: e8 0d 0c 00 00 ?? call function 0x0040266f L2: e8 08 0c 00 00 ?? call function 0x0040266f L3: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401a6a
___scrt_dllmain_exception_filter
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 b3 0a 00 00 ?? call function 0x00402525 L2: 85 c0 ?? test eax, eax 75 19 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 13 ?? jne basic block L6 L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>] 50 ?? push eax ff 75 08 ?? push dword ss:[ebp + 8] ff 15 ec 30 40 00 ?? call dword ds:[0x004030ec] L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>] L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>] ff 75 18 ?? push dword ss:[ebp + 0x18<24>] e8 51 0b 00 00 ?? call function 0x004025eb L7: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401a9e
___scrt_dllmain_uninitialize_c
0func
L1: e8 82 0a 00 00 ?? call function 0x00402525 L2: 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 68 b8 43 40 00 ?? push 0x004043b8 e8 4c 0b 00 00 ?? call function 0x004025fd L4: 59 ?? pop ecx c3 ?? ret L5: e8 c0 0b 00 00 ?? call function 0x00402678 L6: 85 c0 ?? test eax, eax 0f 84 01 0b 00 00 ?? je function 0x004025c1 L7: c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401ac1
___scrt_dllmain_uninitialize_critical
0func
L1: 6a 00 ?? push 0 e8 ad 0b 00 00 ?? call function 0x00402675 L2: 59 ?? pop ecx e9 a7 0b 00 00 ?? jmp function 0x00402675
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401ace
___scrt_initialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 b4 43 40 00 01 ?? mov byte ds:[0x004043b4], 1 L3: e8 6e 08 00 00 ?? call function 0x00402351 L4: e8 81 0b 00 00 ?? call function 0x00402669 L5: 84 c0 ?? test al, al 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret L7: e8 74 0b 00 00 ?? call function 0x00402669 L8: 84 c0 ?? test al, al 75 0a ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 72 0b 00 00 ?? call function 0x00402672 L10: 59 ?? pop ecx eb e9 ?? jmp basic block L6 L11: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401b07
___scrt_initialize_onexit_tables
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d b5 43 40 00 00 ?? cmp byte ds:[0x004043b5], 0 74 04 ?? je basic block L3 L2: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret L3: 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 85 f6 ?? test esi, esi 74 05 ?? je basic block L5 L4: 83 fe 01 ?? cmp esi, 1 75 62 ?? jne basic block L16 L5: e8 fc 09 00 00 ?? call function 0x00402525 L6: 85 c0 ?? test eax, eax 74 26 ?? je basic block L13 L7: 85 f6 ?? test esi, esi 75 22 ?? jne basic block L13 L8: 68 b8 43 40 00 ?? push 0x004043b8 e8 b6 0a 00 00 ?? call function 0x004025f1 L9: 59 ?? pop ecx 85 c0 ?? test eax, eax 75 0f ?? jne basic block L12 L10: 68 c4 43 40 00 ?? push 0x004043c4 e8 a7 0a 00 00 ?? call function 0x004025f1 L11: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 2b ?? je basic block L14 L12: 32 c0 ?? xor al, al eb 30 ?? jmp basic block L15 L13: 83 c9 ff ?? or ecx, 0xff<255,-1> 89 0d b8 43 40 00 ?? mov dword ds:[0x004043b8], ecx 89 0d bc 43 40 00 ?? mov dword ds:[0x004043bc], ecx 89 0d c0 43 40 00 ?? mov dword ds:[0x004043c0], ecx 89 0d c4 43 40 00 ?? mov dword ds:[0x004043c4], ecx 89 0d c8 43 40 00 ?? mov dword ds:[0x004043c8], ecx 89 0d cc 43 40 00 ?? mov dword ds:[0x004043cc], ecx L14: c6 05 b5 43 40 00 01 ?? mov byte ds:[0x004043b5], 1 b0 01 ?? mov al, 1 L15: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L16: 6a 05 ?? push 5 e8 70 02 00 00 ?? call function 0x00401dfd L17: cc ?? int3
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401b8e
___scrt_is_nonwritable_in_current_image
0func
L1: 6a 08 ?? push 8 68 50 39 40 00 ?? push 0x00403950 e8 c6 04 00 00 ?? call function 0x00402060 L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117> 66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax 75 5d ?? jne basic block L11 L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c] 81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744> 00 00 75 4c ?? jne basic block L11 L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267> 66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx 75 3e ?? jne basic block L11 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] b9 00 00 40 00 ?? mov ecx, 0x00400000 2b c1 ?? sub eax, ecx 50 ?? push eax 51 ?? push ecx e8 79 fd ff ff ?? call function 0x00401955 L6: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 27 ?? je basic block L11 L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0 7c 21 ?? jl basic block L11 L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b0 01 ?? mov al, 1 eb 1f ?? jmp basic block L12 L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 32 c0 ?? xor al, al L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401c22
___scrt_release_startup_lock
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 fb 08 00 00 ?? call function 0x00402525 L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0 75 09 ?? jne basic block L5 L4: 33 c0 ?? xor eax, eax b9 b0 43 40 00 ?? mov ecx, 0x004043b0 87 01 ?? xchg dword ds:[ecx], eax L5: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401c3f
___scrt_uninitialize_crt
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d b4 43 40 00 00 ?? cmp byte ds:[0x004043b4], 0 74 06 ?? je basic block L3 L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0 75 12 ?? jne basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 19 0a 00 00 ?? call function 0x00402672 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 11 0a 00 00 ?? call function 0x00402672 L5: 59 ?? pop ecx 59 ?? pop ecx L6: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401c94
_at_quick_exit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d c4 43 40 00 ff ?? cmp dword ds:[0x004043c4], 0xff<255,-1> 75 06 ?? jne basic block L3 L2: 5d ?? pop ebp e9 63 09 00 00 ?? jmp 0x00402609 ff 25 94 30 40 00 ?? jmp dword ds:[0x00403094] L3: ff 75 08 ?? push dword ss:[ebp + 8] 68 c4 43 40 00 ?? push 0x004043c4 e8 44 09 00 00 ?? call function 0x004025f7 L4: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401cb7
_atexit
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 a5 ff ff ff ?? call function 0x00401c67 L2: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d8 ?? neg eax 48 ?? dec eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401ccc
__get_entropy
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 14 ?? sub esp, 0x14<20> 83 65 f4 00 ?? and dword ss:[ebp + 0xf4<244,-12>], 0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 83 65 f8 00 ?? and dword ss:[ebp + 0xf8<248,-8>], 0 50 ?? push eax ff 15 20 30 40 00 ?? call dword ds:[0x00403020<"h?@">] L2: 8b 45 f8 ?? mov eax, dword ss:[ebp + 0xf8<248,-8>] 33 45 f4 ?? xor eax, dword ss:[ebp + 0xf4<244,-12>] 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax ff 15 1c 30 40 00 ?? call dword ds:[0x0040301c<"R?@">] L3: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax ff 15 18 30 40 00 ?? call dword ds:[0x00403018<"<?@">] L4: 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 8d 45 ec ?? lea eax, ss:[ebp + 0xec<236,-20>] 50 ?? push eax ff 15 14 30 40 00 ?? call dword ds:[0x00403014<"\"?@">] L5: 8b 45 f0 ?? mov eax, dword ss:[ebp + 0xf0<240,-16>] 8d 4d fc ?? lea ecx, ss:[ebp + 0xfc<252,-4>] 33 45 ec ?? xor eax, dword ss:[ebp + 0xec<236,-20>] 33 45 fc ?? xor eax, dword ss:[ebp + 0xfc<252,-4>] 33 c1 ?? xor eax, ecx c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d19
___security_init_cookie
0func
L1: 8b 0d 04 40 40 00 ?? mov ecx, dword ds:[0x00404004] 56 ?? push esi 57 ?? push edi bf 4e e6 40 bb ?? mov edi, 0xbb40e64e be 00 00 ff ff ?? mov esi, 0xffff0000<4294901760,-65536> 3b cf ?? cmp ecx, edi 74 04 ?? je basic block L3 L2: 85 ce ?? test esi, ecx 75 26 ?? jne basic block L9 L3: e8 94 ff ff ff ?? call function 0x00401ccc L4: 8b c8 ?? mov ecx, eax 3b cf ?? cmp ecx, edi 75 07 ?? jne basic block L6 L5: b9 4f e6 40 bb ?? mov ecx, 0xbb40e64f eb 0e ?? jmp basic block L8 L6: 85 ce ?? test esi, ecx 75 0a ?? jne basic block L8 L7: 0d 11 47 00 00 ?? or eax, 0x00004711<18193> c1 e0 10 ?? shl eax, 0x10<16> 0b c8 ?? or ecx, eax L8: 89 0d 04 40 40 00 ?? mov dword ds:[0x00404004], ecx L9: f7 d1 ?? not ecx 5f ?? pop edi 89 0d 00 40 40 00 ?? mov dword ds:[0x00404000], ecx 5e ?? pop esi c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d64
__matherr
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d67
__get_startup_argv_mode
0func
L1: 33 c0 ?? xor eax, eax 40 ?? inc eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d6b
__get_startup_commit_mode
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d6e
__get_startup_file_mode
0func
L1: b8 00 40 00 00 ?? mov eax, 0x00004000<16384> c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d74
__get_startup_new_mode
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d7a
?__scrt_initialize_type_info@@YAXXZ
0func
L1: 68 d0 43 40 00 ?? push 0x004043d0 ff 15 30 30 40 00 ?? call dword ds:[0x00403030] L2: c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d86
?__scrt_uninitialize_type_info@@YAXXZ
0func
L1: 68 d0 43 40 00 ?? push 0x004043d0 e8 b9 07 00 00 ?? call function 0x00402549 L2: 59 ?? pop ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d92
__should_initialize_environment
0func
L1: b0 01 ?? mov al, 1 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401d95
__initialize_default_precision
0func
L1: 68 00 00 03 00 ?? push 0x00030000 68 00 00 01 00 ?? push 0x00010000 6a 00 ?? push 0 e8 69 08 00 00 ?? call function 0x0040260f L2: 83 c4 0c ?? add esp, 12 85 c0 ?? test eax, eax 75 01 ?? jne basic block L4 L3: c3 ?? ret L4: 6a 07 ?? push 7 e8 48 00 00 00 ?? call function 0x00401dfd L5: cc ?? int3
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401db6
__initialize_invalid_parameter_handler
0func
L1: c2 00 00 ?? ret 0
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401db9
__initialize_denormal_control
0func
L1: c2 00 00 ?? ret 0
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401dbc
___local_stdio_printf_options
0func
L1: b8 d8 43 40 00 ?? mov eax, 0x004043d8 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401dc2
___local_stdio_scanf_options
0func
L1: b8 e0 43 40 00 ?? mov eax, 0x004043e0 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401dc8
___scrt_initialize_default_local_stdio_options
0func
L1: e8 ef ff ff ff ?? call function 0x00401dbc L2: 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 83 08 24 ?? or dword ds:[eax], 0x24<36> 89 48 04 ?? mov dword ds:[eax + 4], ecx e8 e7 ff ff ff ?? call function 0x00401dc2 L3: 8b 48 04 ?? mov ecx, dword ds:[eax + 4] 83 08 02 ?? or dword ds:[eax], 2 89 48 04 ?? mov dword ds:[eax + 4], ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401de5
___scrt_is_user_matherr_present
0func
L1: 33 c0 ?? xor eax, eax 39 05 0c 40 40 00 ?? cmp dword ds:[0x0040400c], eax 0f 94 c0 ?? sete al c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401df1
___scrt_get_dyn_tls_init_callback
0func
L1: b8 fc 43 40 00 ?? mov eax, 0x004043fc c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401df7
___scrt_get_dyn_tls_dtor_callback
0func
L1: b8 f8 43 40 00 ?? mov eax, 0x004043f8 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401dfd
___scrt_fastfail
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 53 ?? push ebx 6a 17 ?? push 0x17<23> ff 15 10 30 40 00 ?? call dword ds:[0x00403010] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: 6a 03 ?? push 3 e8 d9 01 00 00 ?? call function 0x00401ff8 L5: c7 04 24 cc 02 00 00 ?? mov dword ss:[esp], 0x000002cc<716> 8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>] 6a 00 ?? push 0 50 ?? push eax e8 27 07 00 00 ?? call function 0x0040255b L6: 83 c4 0c ?? add esp, 12 89 85 8c fd ff ff ?? mov dword ss:[ebp + 0xfffffd8c<4294966668,-628>], eax 89 8d 88 fd ff ff ?? mov dword ss:[ebp + 0xfffffd88<4294966664,-632>], ecx 89 95 84 fd ff ff ?? mov dword ss:[ebp + 0xfffffd84<4294966660,-636>], edx 89 9d 80 fd ff ff ?? mov dword ss:[ebp + 0xfffffd80<4294966656,-640>], ebx 89 b5 7c fd ff ff ?? mov dword ss:[ebp + 0xfffffd7c<4294966652,-644>], esi 89 bd 78 fd ff ff ?? mov dword ss:[ebp + 0xfffffd78<4294966648,-648>], edi 66 8c 95 a4 fd ff ff ?? mov word ss:[ebp + 0xfffffda4<4294966692,-604>], ss 66 8c 8d 98 fd ff ff ?? mov word ss:[ebp + 0xfffffd98<4294966680,-616>], cs 66 8c 9d 74 fd ff ff ?? mov word ss:[ebp + 0xfffffd74<4294966644,-652>], ds 66 8c 85 70 fd ff ff ?? mov word ss:[ebp + 0xfffffd70<4294966640,-656>], es 66 8c a5 6c fd ff ff ?? mov word ss:[ebp + 0xfffffd6c<4294966636,-660>], fs 66 8c ad 68 fd ff ff ?? mov word ss:[ebp + 0xfffffd68<4294966632,-664>], gs 9c ?? pushfd 8f 85 9c fd ff ff ?? pop dword ss:[ebp + 0xfffffd9c<4294966684,-612>] 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 89 85 94 fd ff ff ?? mov dword ss:[ebp + 0xfffffd94<4294966676,-620>], eax 8d 45 04 ?? lea eax, ss:[ebp + 4] 89 85 a0 fd ff ff ?? mov dword ss:[ebp + 0xfffffda0<4294966688,-608>], eax c7 85 dc fc ff ff 01 00 ?? mov dword ss:[ebp + 0xfffffcdc<4294966492,-804>], 0x00010001 01 00 8b 40 fc ?? mov eax, dword ds:[eax + 0xfc<252,-4>] 6a 50 ?? push 0x50<80> 89 85 90 fd ff ff ?? mov dword ss:[ebp + 0xfffffd90<4294966672,-624>], eax 8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>] 6a 00 ?? push 0 50 ?? push eax e8 9d 06 00 00 ?? call function 0x0040255b L7: 8b 45 04 ?? mov eax, dword ss:[ebp + 4] 83 c4 0c ?? add esp, 12 c7 45 a8 15 00 00 40 ?? mov dword ss:[ebp + 0xa8<168,-88>], 0x40000015 c7 45 ac 01 00 00 00 ?? mov dword ss:[ebp + 0xac<172,-84>], 1 89 45 b4 ?? mov dword ss:[ebp + 0xb4<180,-76>], eax ff 15 00 30 40 00 ?? call dword ds:[0x00403000] L8: 6a 00 ?? push 0 8d 58 ff ?? lea ebx, ds:[eax + 0xff<255,-1>] f7 db ?? neg ebx 8d 45 a8 ?? lea eax, ss:[ebp + 0xa8<168,-88>] 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 85 dc fc ff ff ?? lea eax, ss:[ebp + 0xfffffcdc<4294966492,-804>] 1a db ?? sbb bl, bl 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax fe c3 ?? inc bl ff 15 04 30 40 00 ?? call dword ds:[0x00403004] L9: 8d 45 f8 ?? lea eax, ss:[ebp + 0xf8<248,-8>] 50 ?? push eax ff 15 2c 30 40 00 ?? call dword ds:[0x0040302c] L10: 85 c0 ?? test eax, eax 75 0c ?? jne basic block L14 L11: 84 db ?? test bl, bl 75 08 ?? jne basic block L14 L12: 6a 03 ?? push 3 e8 e4 00 00 00 ?? call function 0x00401ff8 L13: 59 ?? pop ecx L14: 5b ?? pop ebx c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401f18
___scrt_get_show_window_mode
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 44 ?? sub esp, 0x44<68> 6a 44 ?? push 0x44<68> 8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>] 6a 00 ?? push 0 50 ?? push eax e8 30 06 00 00 ?? call function 0x0040255b L2: 83 c4 0c ?? add esp, 12 8d 45 bc ?? lea eax, ss:[ebp + 0xbc<188,-68>] 50 ?? push eax ff 15 28 30 40 00 ?? call dword ds:[0x00403028] L3: f6 45 e8 01 ?? test byte ss:[ebp + 0xe8<232,-24>], 1 74 06 ?? je basic block L5 L4: 0f b7 45 ec ?? movzx eax, word ss:[ebp + 0xec<236,-20>] c9 ?? leave c3 ?? ret L5: 6a 0a ?? push 10 58 ?? pop eax c9 ?? leave c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401f4e
___scrt_initialize_winrt
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401f93
___scrt_set_unhandled_exception_filter
0func
L1: 68 a2 1f 40 00 ?? push function 0x00401fa2 ff 15 04 30 40 00 ?? call dword ds:[0x00403004] L2: c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401f9f
___scrt_stub_for_initialize_mta
0func
L1: 33 c0 ?? xor eax, eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401fa2
___scrt_unhandled_exception_filter@4
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 57 ?? push edi 8b 7d 08 ?? mov edi, dword ss:[ebp + 8] 8b 37 ?? mov esi, dword ds:[edi] 81 3e 63 73 6d e0 ?? cmp dword ds:[esi], 0xe06d7363 75 25 ?? jne basic block L7 L2: 83 7e 10 03 ?? cmp dword ds:[esi + 0x10<16>], 3 75 1f ?? jne basic block L7 L3: 8b 46 14 ?? mov eax, dword ds:[esi + 0x14<20>] 3d 20 05 93 19 ?? cmp eax, 0x19930520 74 1d ?? je basic block L8 L4: 3d 21 05 93 19 ?? cmp eax, 0x19930521 74 16 ?? je basic block L8 L5: 3d 22 05 93 19 ?? cmp eax, 0x19930522 74 0f ?? je basic block L8 L6: 3d 00 40 99 01 ?? cmp eax, 0x01994000 74 08 ?? je basic block L8 L7: 5f ?? pop edi 33 c0 ?? xor eax, eax 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4 L8: e8 69 05 00 00 ?? call function 0x0040254f L9: 89 30 ?? mov dword ds:[eax], esi 8b 77 04 ?? mov esi, dword ds:[edi + 4] e8 65 05 00 00 ?? call function 0x00402555 L10: 89 30 ?? mov dword ds:[eax], esi e8 1e 06 00 00 ?? call function 0x00402615 L11: cc ?? int3
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x401ff8
__crt_debugger_hook
0func
L1: 83 25 e8 43 40 00 00 ?? and dword ds:[0x004043e8], 0 c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x402000
__RTC_Initialize
0func
L1: 53 ?? push ebx 56 ?? push esi be 94 38 40 00 ?? mov esi, 0x00403894 bb 94 38 40 00 ?? mov ebx, 0x00403894 3b f3 ?? cmp esi, ebx 73 19 ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 ec 30 40 00 ?? call dword ds:[0x004030ec] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 3b f3 ?? cmp esi, ebx 72 e9 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi 5b ?? pop ebx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40202c
__RTC_Terminate
0func
L1: 53 ?? push ebx 56 ?? push esi be 9c 38 40 00 ?? mov esi, 0x0040389c bb 9c 38 40 00 ?? mov ebx, 0x0040389c 3b f3 ?? cmp esi, ebx 73 19 ?? jae basic block L8 L2: 57 ?? push edi L3: 8b 3e ?? mov edi, dword ds:[esi] 85 ff ?? test edi, edi 74 0a ?? je basic block L6 L4: 8b cf ?? mov ecx, edi ff 15 ec 30 40 00 ?? call dword ds:[0x004030ec] L5: ff d7 ?? call edi L6: 83 c6 04 ?? add esi, 4 3b f3 ?? cmp esi, ebx 72 e9 ?? jb basic block L3 L7: 5f ?? pop edi L8: 5e ?? pop esi 5b ?? pop ebx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x402060
__SEH_prolog4
0func
L1: 68 c4 20 40 00 ?? push function 0x004020c4 64 ff 35 00 00 00 00 ?? push dword fs:[0] 8b 44 24 10 ?? mov eax, dword ss:[esp + 0x10<16>] 89 6c 24 10 ?? mov dword ss:[esp + 0x10<16>], ebp 8d 6c 24 10 ?? lea ebp, ss:[esp + 0x10<16>] 2b e0 ?? sub esp, eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 04 40 40 00 ?? mov eax, dword ds:[0x00404004] 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp ff 75 f8 ?? push dword ss:[ebp + 0xf8<248,-8>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4020b0
__SEH_epilog4
0func
L1: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp 51 ?? push ecx c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4020c4
__except_handler4
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] ff 36 ?? push dword ds:[esi] e8 a9 05 00 00 ?? call function 0x0040267b L2: ff 75 14 ?? push dword ss:[ebp + 0x14<20>] 89 06 ?? mov dword ds:[esi], eax ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] 56 ?? push esi 68 6d 11 40 00 ?? push function 0x0040116d 68 04 40 40 00 ?? push 0x00404004 e8 74 04 00 00 ?? call function 0x00402561 L3: 83 c4 1c ?? add esp, 0x1c<28> 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4020f3
@_guard_check_icall_nop@4
0func
L1: c2 00 00 ?? ret 0
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x4020f6
_ReadNoFence
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 00 ?? mov eax, dword ds:[eax] 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x402100
_ReadPointerNoFence
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 00 ?? mov eax, dword ds:[eax] 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x40210a
__InlineInterlockedExchangePointer
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 87 01 ?? xchg dword ds:[ecx], eax 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x402132
___castguard_check_failure_fastfail
0func
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 40 33 40 00 ?? mov edx, 0x00403340 b9 40 33 40 00 ?? mov ecx, 0x00403340 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 05 ?? ja basic block L3 L2: 6a 41 ?? push 0x41<65> 59 ?? pop ecx cd 29 ?? int 0x29<41> L3: 5d ?? pop ebp c3 ?? ret
vs2022/wpo/RelWithDebInfo
ooex8.exe
./vs2022/wpo/RelWithDebInfo/ooex8.exe
0x402151
___castguard_check_failure_nop
0func
L1: c2 00 00 ?? ret 0
vs2022/wpo/RelWithDebInfo
ooex8.exe