求大虾帮忙看看这代码是不是错了,怎么在反汇编点这个注释:OllyDBG工具和程序就关闭了!正确的应该怎么写?
004CA5E4 C74424 1C 00500010 mov dword ptr ss:[esp+1C],10005000 ; 烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫烫 ...
004CA5EC 8B08 mov ecx,dword ptr ds:[eax]
004CA5EE 50 push eax
004CA5EF FF51 5C call dword ptr ds:[ecx+5C]
004CA5F2 8B4424 0C mov eax,dword ptr ss:[esp+C]
004CA5F6 8B08 mov ecx,dword ptr ds:[eax]
004CA5F8 50 push eax
004CA5F9 FF51 08 call dword ptr ds:[ecx+8]
004CA5FC 8B8C24 14090000 mov ecx,dword ptr ss:[esp+914]
004CA603 5E pop esi
004CA604 5D pop ebp
004CA605 5B pop ebx
004CA606 E8 21A00000 call region_s.004D462C
004CA60B 81C4 0C090000 add esp,90C
004CA611 C3 retn
004CA612 CC int3
004CA613 CC int3
004CA614 CC int3
004CA615 CC int3
004CA616 CC int3
004CA617 CC int3
004CA618 CC int3
004CA619 CC int3
004CA61A CC int3
004CA61B CC int3
004CA61C CC int3
004CA61D CC int3
004CA61E CC int3
004CA61F CC int3
004CA620 51 push ecx
004CA621 53 push ebx
004CA622 56 push esi
004CA623 8BF1 mov esi,ecx
004CA625 8B86 E4010000 mov eax,dword ptr ds:[esi+1E4]
004CA62B 33DB xor ebx,ebx
004CA62D 3BC3 cmp eax,ebx
004CA62F 0F84 EC000000 je region_s.004CA721
004CA635 399E 4C010000 cmp dword ptr ds:[esi+14C],ebx
004CA63B 74 13 je short region_s.004CA650
004CA63D 83BE 64010000 05 cmp dword ptr ds:[esi+164],5
004CA644 73 1D jnb short region_s.004CA663
004CA646 899E D8010000 mov dword ptr ds:[esi+1D8],ebx
004CA64C 5E pop esi
004CA64D 5B pop ebx
004CA64E 59 pop ecx
004CA64F C3 retn
004CA650 83BE 60010000 0A cmp dword ptr ds:[esi+160],0A
004CA657 73 0A jnb short region_s.004CA663
004CA659 899E D8010000 mov dword ptr ds:[esi+1D8],ebx
004CA65F 5E pop esi
004CA660 5B pop ebx
004CA661 59 pop ecx
004CA662 C3 retn
004CA663 399E E8010000 cmp dword ptr ds:[esi+1E8],ebx
004CA669 C786 D8010000 010000>mov dword ptr ds:[esi+1D8],1
004CA673 74 15 je short region_s.004CA68A
004CA675 8B86 F8010000 mov eax,dword ptr ds:[esi+1F8]
004CA67B 50 push eax
004CA67C E8 E5A90000 call region_s.004D5066
004CA681 83C4 04 add esp,4
004CA684 899E E8010000 mov dword ptr ds:[esi+1E8],ebx
004CA68A 57 push edi
004CA68B 8D4C24 0C lea ecx,dword ptr ss:[esp+C]
004CA68F 51 push ecx
004CA690 53 push ebx
004CA691 895C24 14 mov dword ptr ss:[esp+14],ebx
004CA695 899E F8010000 mov dword ptr ds:[esi+1F8],ebx
004CA69B FF96 E4010000 call dword ptr ds:[esi+1E4]
004CA6A1 8B5424 0C mov edx,dword ptr ss:[esp+C]
004CA6A5 42 inc edx
004CA6A6 52 push edx
004CA6A7 E8 F4B80000 call region_s.004D5FA0
004CA6AC 8BF8 mov edi,eax
004CA6AE 83C4 04 add esp,4
004CA6B1 3BFB cmp edi,ebx
004CA6B3 89BE F8010000 mov dword ptr ds:[esi+1F8],edi
004CA6B9 74 65 je short region_s.004CA720
004CA6BB 8B4C24 0C mov ecx,dword ptr ss:[esp+C]
004CA6BF 41 inc ecx
004CA6C0 8BD1 mov edx,ecx
004CA6C2 C1E9 02 shr ecx,2
004CA6C5 33C0 xor eax,eax
004CA6C7 C786 E8010000 010000>mov dword ptr ds:[esi+1E8],1
004CA6D1 F3:AB rep stos dword ptr es:[edi]
004CA6D3 8BCA mov ecx,edx
004CA6D5 83E1 03 and ecx,3
004CA6D8 F3:AA rep stos byte ptr es:[edi]
004CA6DA 8B8E F8010000 mov ecx,dword ptr ds:[esi+1F8]
004CA6E0 8D4424 0C lea eax,dword ptr ss:[esp+C]
004CA6E4 50 push eax
004CA6E5 51 push ecx
004CA6E6 FF96 E4010000 call dword ptr ds:[esi+1E4]
004CA6EC 85C0 test eax,eax
004CA6EE 75 30 jnz short region_s.004CA720
004CA6F0 8BBE DC010000 mov edi,dword ptr ds:[esi+1DC]
004CA6F6 8B86 F8010000 mov eax,dword ptr ds:[esi+1F8]
004CA6FC 47 inc edi
004CA6FD C786 EC010000 010000>mov dword ptr ds:[esi+1EC],1
004CA707 89BE DC010000 mov dword ptr ds:[esi+1DC],edi
004CA70D 3918 cmp dword ptr ds:[eax],ebx
004CA70F 8BCF mov ecx,edi
004CA711 74 0D je short region_s.004CA720
004CA713 41 inc ecx
004CA714 898E DC010000 mov dword ptr ds:[esi+1DC],ecx
004CA71A 8B00 mov eax,dword ptr ds:[eax]
004CA71C 3918 cmp dword ptr ds:[eax],ebx
004CA71E ^ 75 F3 jnz short region_s.004CA713
004CA720 5F pop edi
004CA721 5E pop esi
004CA722 5B pop ebx
004CA723 59 pop ecx
004CA724 C3 retn
004CA725 CC int3
004CA726 CC int3
004CA727 CC int3
004CA728 CC int3
004CA729 CC int3
004CA72A CC int3
004CA72B CC int3
004CA72C CC int3
004CA72D CC int3
004CA72E CC int3
004CA72F CC int3
004CA730 8B81 DC010000 mov eax,dword ptr ds:[ecx+1DC]
004CA736 85C0 test eax,eax
004CA738 7E 40 jle short region_s.004CA77A
004CA73A 8B5424 04 mov edx,dword ptr ss:[esp+4]
004CA73E 3BC2 cmp eax,edx
004CA740 7E 38 jle short region_s.004CA77A
004CA742 8B89 F8010000 mov ecx,dword ptr ds:[ecx+1F8]
004CA748 33C0 xor eax,eax
004CA74A 85D2 test edx,edx
004CA74C 74 0D je short region_s.004CA75B
004CA74E 8BFF mov edi,edi
004CA750 8B09 mov ecx,dword ptr ds:[ecx]
004CA752 40 inc eax
004CA753 85C9 test ecx,ecx
004CA755 74 23 je short region_s.004CA77A
004CA757 3BC2 cmp eax,edx
004CA759 ^ 75 F5 jnz short region_s.004CA750
004CA75B 85C9 test ecx,ecx
004CA75D 74 1B je short region_s.004CA77A
004CA75F 8B89 AC010000 mov ecx,dword ptr ds:[ecx+1AC]
004CA765 85C9 test ecx,ecx
004CA767 B8 01000000 mov eax,1
004CA76C 74 0E je short region_s.004CA77C
004CA76E 8BFF mov edi,edi
004CA770 8B09 mov ecx,dword ptr ds:[ecx]
004CA772 40 inc eax
004CA773 85C9 test ecx,ecx
004CA775 ^ 75 F9 jnz short region_s.004CA770
004CA777 C2 0400 retn 4
004CA77A 33C0 xor eax,eax
004CA77C C2 0400 retn 4
004CA77F CC int3
004CA780 83EC 74 sub esp,74
004CA783 A1 F04A5200 mov eax,dword ptr ds:[524AF0]
004CA788 56 push esi
004CA789 894424 74 mov dword ptr ss:[esp+74],eax
004CA78D 8D4424 08 lea eax,dword ptr ss:[esp+8]
004CA791 50 push eax
004CA792 68 19000200 push 20019
004CA797 6A 00 push 0
[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法