00473014 > B8 00000000 MOV EAX,0
00473019 60 PUSHAD
0047301A 0BC0 OR EAX,EAX
0047301C 74 68 JE SHORT ACKnight.00473086
0047301E E8 00000000 CALL ACKnight.00473023
00473023 58 POP EAX
00473024 05 53000000 ADD EAX,53
00473029 8038 E9 CMP BYTE PTR DS:[EAX],0E9
0047302C 75 13 JNZ SHORT ACKnight.00473041
0047302E 61 POPAD
0047302F EB 45 JMP SHORT ACKnight.00473076
00473031 DB2D 37304700 FLD TBYTE PTR DS:[473037]
00473037 FFFF ??? ; 未知命令
00473039 FFFF ??? ; 未知命令
0047303B FFFF ??? ; 未知命令
0047303D FFFF ??? ; 未知命令
0047303F 3D 40E80000 CMP EAX,0E840
00473044 0000 ADD BYTE PTR DS:[EAX],AL
00473046 58 POP EAX
00473047 25 00F0FFFF AND EAX,FFFFF000
0047304C 33FF XOR EDI,EDI
0047304E 66:BB 195A MOV BX,5A19
00473052 66:83C3 34 ADD BX,34
00473056 66:3918 CMP WORD PTR DS:[EAX],BX
00473059 75 12 JNZ SHORT XXXX.0047306D
0047305B 0FB750 3C MOVZX EDX,WORD PTR DS:[EAX+3C]
0047305F 03D0 ADD EDX,EAX
00473061 BB E9440000 MOV EBX,44E9
00473066 83C3 67 ADD EBX,67
00473069 391A CMP DWORD PTR DS:[EDX],EBX
0047306B 74 07 JE SHORT XXXX.00473074
0047306D 2D 00100000 SUB EAX,1000
00473072 ^ EB DA JMP SHORT XXXX.0047304E
00473074 8BF8 MOV EDI,EAX
00473076 B8 73C91A00 MOV EAX,1AC973
0047307B 03C7 ADD EAX,EDI
0047307D B9 6A320700 MOV ECX,7326A
00473082 03CF ADD ECX,EDI
00473084 EB 0A JMP SHORT XXXX.00473090
00473086 B8 73C95A00 MOV EAX,XXXX.005AC973
0047308B B9 6A324700 MOV ECX,XXXX.0047326A
00473090 50 PUSH EAX
00473091 51 PUSH ECX
00473092 E8 84000000 CALL XXXX.0047311B
00473097 E8 00000000 CALL XXXX.0047309C
0047309C 58 POP EAX
查了N多资料,还是没弄明白
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)