::00454A3A:: 898D 44F3FFFF MOV [EBP-CBC],ECX
::00454A40:: 898D 38F3FFFF MOV [EBP-CC8],ECX
::00454A46:: 898D 34F3FFFF MOV [EBP-CCC],ECX
::00454A4C:: 898D 30F3FFFF MOV [EBP-CD0],ECX
::00454A52:: 894D E0 MOV [EBP-20],ECX
::00454A55:: 894D DC MOV [EBP-24],ECX
::00454A58:: 894D D8 MOV [EBP-28],ECX
::00454A5B:: 894D D4 MOV [EBP-2C],ECX
::00454A5E:: 8945 FC MOV [EBP-4],EAX
::00454A61:: BF D8694600 MOV EDI,4669D8
::00454A66:: BB A8664600 MOV EBX,4666A8
::00454A6B:: 33C0 XOR EAX,EAX
::00454A6D:: 55 PUSH EBP
::00454A6E:: 68 FA544500 PUSH 4554FA \->: ?邡?羞^[?]???x07
::00454A73:: 64:FF30 PUSH DWORD PTR FS:[EAX]
::00454A76:: 64:8920 MOV FS:[EAX],ESP
::00454A79:: 813B 202A0100 CMP DWORD PTR [EBX],12A20
::00454A7F:: 0F8E C7000000 JLE 00454B4C \:JMPDOWN
::00454A85:: 8B45 FC MOV EAX,[EBP-4]
::00454A88:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454A8E:: BA 10554500 MOV EDX,455510 \->: 还剩7天
::00454A93:: E8 DCE6FBFF CALL 00413174 \:JMPUP
::00454A98:: 8B45 FC MOV EAX,[EBP-4]
::00454A9B:: 8B80 8C080000 MOV EAX,[EAX+88C]
::00454AA1:: B2 01 MOV DL,1
::00454AA3:: E8 F8E5FBFF CALL 004130A0 \:JMPUP
::00454AA8:: 813B C02F0100 CMP DWORD PTR [EBX],12FC0
::00454AAE:: 7E 13 JLE SHORT 00454AC3 \:JMPDOWN
::00454AB0:: 8B45 FC MOV EAX,[EBP-4]
::00454AB3:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454AB9:: BA 20554500 MOV EDX,455520 \->: 还剩6天
::00454ABE:: E8 B1E6FBFF CALL 00413174 \:JMPUP
::00454AC3:: 813B 60350100 CMP DWORD PTR [EBX],13560 \:BYJMP JmpBy:00454AAE,
::00454AC9:: 7E 13 JLE SHORT 00454ADE \:JMPDOWN
::00454ACB:: 8B45 FC MOV EAX,[EBP-4]
::00454ACE:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454AD4:: BA 30554500 MOV EDX,455530 \->: 还剩5天
::00454AD9:: E8 96E6FBFF CALL 00413174 \:JMPUP
::00454ADE:: 813B 003B0100 CMP DWORD PTR [EBX],13B00 \:BYJMP JmpBy:00454AC9,
::00454AE4:: 7E 13 JLE SHORT 00454AF9 \:JMPDOWN
::00454AE6:: 8B45 FC MOV EAX,[EBP-4]
::00454AE9:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454AEF:: BA 40554500 MOV EDX,455540 \->: 还剩4天
::00454AF4:: E8 7BE6FBFF CALL 00413174 \:JMPUP
::00454AF9:: 813B A0400100 CMP DWORD PTR [EBX],140A0 \:BYJMP JmpBy:00454AE4,
::00454AFF:: 7E 13 JLE SHORT 00454B14 \:JMPDOWN
::00454B01:: 8B45 FC MOV EAX,[EBP-4]
::00454B04:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454B0A:: BA 50554500 MOV EDX,455550 \->: 还剩3天
::00454B0F:: E8 60E6FBFF CALL 00413174 \:JMPUP
::00454B14:: 813B 40460100 CMP DWORD PTR [EBX],14640 \:BYJMP JmpBy:00454AFF,
::00454B1A:: 7E 13 JLE SHORT 00454B2F \:JMPDOWN
::00454B1C:: 8B45 FC MOV EAX,[EBP-4]
::00454B1F:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454B25:: BA 60554500 MOV EDX,455560 \->: 还剩2天
::00454B2A:: E8 45E6FBFF CALL 00413174 \:JMPUP
::00454B2F:: 813B E04B0100 CMP DWORD PTR [EBX],14BE0 \:BYJMP JmpBy:00454B1A,
::00454B35:: 7E 25 JLE SHORT 00454B5C \:JMPDOWN
::00454B37:: 8B45 FC MOV EAX,[EBP-4]
::00454B3A:: 8B80 28100000 MOV EAX,[EAX+1028]
::00454B40:: BA 70554500 MOV EDX,455570 \->: 还剩1天
::00454B45:: E8 2AE6FBFF CALL 00413174 \:JMPUP
::00454B4A:: EB 10 JMP SHORT 00454B5C \:JMPDOWN
::00454B4C:: 8B45 FC MOV EAX,[EBP-4] \:BYJMP JmpBy:00454A7F,
::00454B4F:: 8B80 8C080000 MOV EAX,[EAX+88C]
::00454B55:: 33D2 XOR EDX,EDX
::00454B57:: E8 44E5FBFF CALL 004130A0 \:JMPUP
::00454B5C:: 813B 80510100 CMP DWORD PTR [EBX],15180 \:BYJMP JmpBy:00454B35,00454B4A,
::00454B62:: 7E 12 JLE SHORT 00454B76 \:JMPDOWN
::00454B64:: 8B45 FC MOV EAX,[EBP-4]
::00454B67:: 8B80 0C070000 MOV EAX,[EAX+70C]
::00454B6D:: B2 01 MOV DL,1
::00454B6F:: E8 2CE5FBFF CALL 004130A0 \:JMPUP
[招生]系统0day安全班,企业级设备固件漏洞挖掘,Linux平台漏洞挖掘!