20269000 1.<ModuleEntryPoin> 8925 04202820 mov dword ptr ds:[20282004],esp
20269006 EB 03 jmp short 1.2026900B
20269008 33DB xor ebx,ebx
2026900A A3 68279026 mov dword ptr ds:[26902768],eax
2026900F 2064FF 35 and byte ptr ds:[edi+edi*8+35],ah
20269013 0000 add byte ptr ds:[eax],al
20269015 0000 add byte ptr ds:[eax],al
20269017 64:8925 0000000>mov dword ptr fs:[0],esp
2026901E EB 02 jmp short 1.20269022
20269020 69B1 E9D80400 0>imul esi,dword ptr ds:[ecx+4D8E9],6795500
2026902A 8D3F lea edi,dword ptr ds:[edi]
2026902C 78 02 js short 1.20269030
2026902E EB FF jmp short 1.2026902F
20269030 89E5 mov ebp,esp
20269032 8B45 08 mov eax,dword ptr ss:[ebp+8]
20269035 8B00 mov eax,dword ptr ds:[eax]
20269037 3D 03000080 cmp eax,80000003
2026903C EB 03 jmp short 1.20269041
2026903E 31ED xor ebp,ebp
20269040 A2 750831C0 mov byte ptr ds:[C0310875],al
20269045 EB 30 jmp short 1.20269077
20269047 EB 02 jmp short 1.2026904B
20269049 FF143D 04000080 call dword ptr ds:[edi+80000004]
20269050 EB 02 jmp short 1.20269054
20269052 80F4 75 xor ah,75
20269055 1831 sbb byte ptr ds:[ecx],dh
[课程]Android-CTF解题方法汇总!