原汇编
.text:0000000180058FA0 call sub_1800D87E0
.text:0000000180058FA5 mov rax, [rsp+138h+arg_0]
.text:0000000180058FAD mov rax, [rax+8]
.text:0000000180058FB1 mov [rsp+138h+var_110], rax
.text:0000000180058FB6 mov eax, dword ptr [rsp+138h+Size]
.text:0000000180058FBD mov [rsp+138h+var_118], eax
.text:0000000180058FC1 mov r9, [rsp+138h+arg_0]
.text:0000000180058FC9 mov r9, [r9+10h]
.text:0000000180058FCD mov r8d, 14h
.text:0000000180058FD3 lea rdx, [rsp+138h+var_F8]
.text:0000000180058FD8 xor ecx, ecx
.text:0000000180058FDA call sub_1800D8600
.text:0000000180058FDF mov dword ptr [rsp+138h+Size+4], eax
.text:0000000180058FE6 cmp dword ptr [rsp+138h+Size+4], 1
.text:0000000180058FEE jnz short loc_180058FFD
.text:0000000180058FF0 mov [rsp+138h+var_18], 0
.text:0000000180058FFB jmp short loc_180059008
.text:0000000180058FFD ; ---------------------------------------------------------------------------
.text:0000000180058FFD
.text:0000000180058FFD loc_180058FFD: ; CODE XREF: sub_180058D30+2BEj
.text:0000000180058FFD mov [rsp+138h+var_18], 27h
.text:0000000180059008
.text:0000000180059008 loc_180059008: ; CODE XREF: sub_180058D30+2CBj
.text:0000000180059008 mov eax, [rsp+138h+var_18]
.text:000000018005900F mov [rsp+138h+var_24], eax
.text:0000000180059016
.text:0000000180059016 loc_180059016: ; DATA XREF: .rdata:stru_18019DFD8o
.text:0000000180059016 lea rcx, [rsp+138h+var_60] ; this
.text:000000018005901E call ??1_Locimp@locale@std@@MEAA@XZ ; std::locale::_Locimp::~_Locimp(void)
.text:0000000180059023 mov eax, [rsp+138h+var_24]
.text:000000018005902A
.text:000000018005902A loc_18005902A: ; CODE XREF: sub_180058D30+7Bj
.text:000000018005902A ; sub_180058D30+E6j ...
.text:000000018005902A mov rcx, [rsp+138h+var_10]
.text:0000000180059032 xor rcx, rsp ; StackCookie
.text:0000000180059035 call __security_check_cookie
.text:000000018005903A add rsp, 138h
.text:0000000180059041 retn
.text:0000000180059041 sub_180058D30 endp
CR是对058FEE jnz short loc_180058FFD进行了nop。请问哪个是关键call?