到0070701E处出现错误,不能继续。
00706F30 > $ 60 PUSHAD
00706F31 . BE 00406300 MOV ESI,h_client.00634000
00706F36 . 8DBE 00D0DCFF LEA EDI,DWORD PTR DS:[ESI+FFDCD000]
00706F3C . 57 PUSH EDI
00706F3D . 83CD FF OR EBP,FFFFFFFF
00706F40 . EB 10 JMP SHORT h_client.00706F52
00706F42 90 NOP
00706F43 90 NOP
00706F44 90 NOP
00706F45 90 NOP
00706F46 90 NOP
00706F47 90 NOP
00706F48 > 8A06 MOV AL,BYTE PTR DS:[ESI]
00706F4A . 46 INC ESI
00706F4B . 8807 MOV BYTE PTR DS:[EDI],AL
00706F4D . 47 INC EDI
00706F4E > 01DB ADD EBX,EBX
00706F50 . 75 07 JNZ SHORT h_client.00706F59
00706F52 > 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706F54 . 83EE FC SUB ESI,-4
00706F57 . 11DB ADC EBX,EBX
00706F59 >^72 ED JB SHORT h_client.00706F48
00706F5B . B8 01000000 MOV EAX,1
00706F60 > 01DB ADD EBX,EBX
00706F62 . 75 07 JNZ SHORT h_client.00706F6B
00706F64 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706F66 . 83EE FC SUB ESI,-4
00706F69 . 11DB ADC EBX,EBX
00706F6B > 11C0 ADC EAX,EAX
00706F6D . 01DB ADD EBX,EBX
00706F6F . 73 0B JNB SHORT h_client.00706F7C
00706F71 . 75 19 JNZ SHORT h_client.00706F8C
00706F73 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706F75 . 83EE FC SUB ESI,-4
00706F78 . 11DB ADC EBX,EBX
00706F7A . 72 10 JB SHORT h_client.00706F8C
00706F7C > 48 DEC EAX
00706F7D . 01DB ADD EBX,EBX
00706F7F . 75 07 JNZ SHORT h_client.00706F88
00706F81 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706F83 . 83EE FC SUB ESI,-4
00706F86 . 11DB ADC EBX,EBX
00706F88 > 11C0 ADC EAX,EAX
00706F8A .^EB D4 JMP SHORT h_client.00706F60
00706F8C > 31C9 XOR ECX,ECX
00706F8E . 83E8 03 SUB EAX,3
00706F91 . 72 11 JB SHORT h_client.00706FA4
00706F93 . C1E0 08 SHL EAX,8
00706F96 . 8A06 MOV AL,BYTE PTR DS:[ESI]
00706F98 . 46 INC ESI
00706F99 . 83F0 FF XOR EAX,FFFFFFFF
00706F9C . 74 78 JE SHORT h_client.00707016
00706F9E . D1F8 SAR EAX,1
00706FA0 . 89C5 MOV EBP,EAX
00706FA2 . EB 0B JMP SHORT h_client.00706FAF
00706FA4 > 01DB ADD EBX,EBX
00706FA6 . 75 07 JNZ SHORT h_client.00706FAF
00706FA8 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706FAA . 83EE FC SUB ESI,-4
00706FAD . 11DB ADC EBX,EBX
00706FAF > 11C9 ADC ECX,ECX
00706FB1 . 01DB ADD EBX,EBX
00706FB3 . 75 07 JNZ SHORT h_client.00706FBC
00706FB5 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706FB7 . 83EE FC SUB ESI,-4
00706FBA . 11DB ADC EBX,EBX
00706FBC > 11C9 ADC ECX,ECX
00706FBE . 75 20 JNZ SHORT h_client.00706FE0
00706FC0 . 41 INC ECX
00706FC1 > 01DB ADD EBX,EBX
00706FC3 . 75 07 JNZ SHORT h_client.00706FCC
00706FC5 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706FC7 . 83EE FC SUB ESI,-4
00706FCA . 11DB ADC EBX,EBX
00706FCC > 11C9 ADC ECX,ECX
00706FCE . 01DB ADD EBX,EBX
00706FD0 .^73 EF JNB SHORT h_client.00706FC1
00706FD2 . 75 09 JNZ SHORT h_client.00706FDD
00706FD4 . 8B1E MOV EBX,DWORD PTR DS:[ESI]
00706FD6 . 83EE FC SUB ESI,-4
00706FD9 . 11DB ADC EBX,EBX
00706FDB .^73 E4 JNB SHORT h_client.00706FC1
00706FDD > 83C1 02 ADD ECX,2
00706FE0 > 81FD 00FBFFFF CMP EBP,-500
00706FE6 . 83D1 01 ADC ECX,1
00706FE9 . 8D142F LEA EDX,DWORD PTR DS:[EDI+EBP]
00706FEC . 83FD FC CMP EBP,-4
00706FEF . 76 0F JBE SHORT h_client.00707000
00706FF1 > 8A02 MOV AL,BYTE PTR DS:[EDX]
00706FF3 . 42 INC EDX
00706FF4 . 8807 MOV BYTE PTR DS:[EDI],AL
00706FF6 . 47 INC EDI
00706FF7 . 49 DEC ECX
00706FF8 .^75 F7 JNZ SHORT h_client.00706FF1
00706FFA .^E9 4FFFFFFF JMP h_client.00706F4E
00706FFF 90 NOP
00707000 > 8B02 MOV EAX,DWORD PTR DS:[EDX]
00707002 . 83C2 04 ADD EDX,4
00707005 . 8907 MOV DWORD PTR DS:[EDI],EAX
00707007 . 83C7 04 ADD EDI,4
0070700A . 83E9 04 SUB ECX,4
0070700D .^77 F1 JA SHORT h_client.00707000
0070700F . 01CF ADD EDI,ECX
00707011 .^E9 38FFFFFF JMP h_client.00706F4E
00707016 > 5E POP ESI
00707017 . 89F7 MOV EDI,ESI
00707019 . B9 B8C60000 MOV ECX,0C6B8
0070701E > 8A07 MOV AL,BYTE PTR DS:[EDI](出现访问违反:读取[0070c000]
00707020 . 47 INC EDI
00707021 . 2C E8 SUB AL,0E8
00707023 > 3C 01 CMP AL,1
00707025 .^77 F7 JA SHORT h_client.0070701E
00707027 . 803F AA CMP BYTE PTR DS:[EDI],0AA
0070702A .^75 F2 JNZ SHORT h_client.0070701E
0070702C . 8B07 MOV EAX,DWORD PTR DS:[EDI]
0070702E . 8A5F 04 MOV BL,BYTE PTR DS:[EDI+4]
00707031 . 66:C1E8 08 SHR AX,8
00707035 . C1C0 10 ROL EAX,10
00707038 . 86C4 XCHG AH,AL
0070703A . 29F8 SUB EAX,EDI
0070703C . 80EB E8 SUB BL,0E8
0070703F . 01F0 ADD EAX,ESI
00707041 . 8907 MOV DWORD PTR DS:[EDI],EAX
00707043 . 83C7 05 ADD EDI,5
00707046 . 89D8 MOV EAX,EBX
00707048 .^E2 D9 LOOPD SHORT h_client.00707023
0070704A . 8DBE 00203000 LEA EDI,DWORD PTR DS:[ESI+302000]
00707050 > 8B07 MOV EAX,DWORD PTR DS:[EDI]
00707052 . 09C0 OR EAX,EAX
00707054 . 74 3C JE SHORT h_client.00707092
00707056 . 8B5F 04 MOV EBX,DWORD PTR DS:[EDI+4]
00707059 . 8D8430 B8A1300>LEA EAX,DWORD PTR DS:[EAX+ESI+30A1B8]
00707060 . 01F3 ADD EBX,ESI
00707062 . 50 PUSH EAX
00707063 . 83C7 08 ADD EDI,8
00707066 . FF96 0CA33000 CALL DWORD PTR DS:[ESI+30A30C]
0070706C . 95 XCHG EAX,EBP
0070706D > 8A07 MOV AL,BYTE PTR DS:[EDI]
0070706F . 47 INC EDI
00707070 . 08C0 OR AL,AL
00707072 .^74 DC JE SHORT h_client.00707050
00707074 . 89F9 MOV ECX,EDI
00707076 . 57 PUSH EDI
00707077 . 48 DEC EAX
00707078 . F2:AE REPNE SCAS BYTE PTR ES:[EDI]
0070707A . 55 PUSH EBP
0070707B . FF96 10A33000 CALL DWORD PTR DS:[ESI+30A310]
00707081 . 09C0 OR EAX,EAX
00707083 . 74 07 JE SHORT h_client.0070708C
00707085 . 8903 MOV DWORD PTR DS:[EBX],EAX
00707087 . 83C3 04 ADD EBX,4
0070708A .^EB E1 JMP SHORT h_client.0070706D
0070708C > FF96 14A33000 CALL DWORD PTR DS:[ESI+30A314]
00707092 > 61 POPAD
00707093 .-E9 0C3BEAFF JMP h_client.005AABA4
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)