This visual execution shows a common vulnerability pattern called reentrancy in blockchain smart contracts. The contract lets users withdraw funds but sends money before updating their balance. This allows a user to call withdraw repeatedly before the balance is reduced, draining more funds than allowed. The execution table traces each step: user calls withdraw, funds are sent, fallback triggers another withdraw, and balance updates happen too late. The variable tracker shows balances and funds sent at each step. Key moments explain why sending funds before updating balance is dangerous and how updating balance first stops the attack. The quiz tests understanding of these steps. The snapshot summarizes key vulnerability patterns and best practices to avoid them.