The functions are in there. If the exe is not encrypted or otherwise cannot be disassembled to straight assembler code (exepackers, encryption, dongles), you could find the functions.
But their naming, and exact bounderies and other annotations are gone, which makes it hard to do this automated, since there is nothing to identify the functions anymore.
In other words this is something for an assembler wizard or for professional reverse engineering services.
If your code is very valuable, and your compiler relatively common, there are reverse engineering services that might do it for you. But be prepared for a hefty price. Even just analysis of how easy it will be might be expensive. (*)
In most situations, the price of extraction (either your own time, or hired) is bigger than the worth of the functions, and it is cheaper to rewrite them
(*) RTTI or internal debug info might make it easier.