|

提醒:若下载的软件是收费的"请不要付款",可能是骗子,请立即联系本站举报,执意要付款被骗后本站概不负责。(任何交易请走第三方中介,请勿直接付款交易以免被骗!切记).
0048AF70 $ 6A FF push -0x1 ; SendAddr
0048AF72 . 68 9B08A800 push KnightOn.00A8089B
0048AF77 . 64:A1 0000000>mov eax,dword ptr fs:[0]
0048AF7D . 50 push eax
0048AF7E . B8 14030800 mov eax,0x80314
0048AF83 . E8 389C5C00 call KnightOn.00A54BC0
0048AF88 . A1 2CXFC100 mov eax,dword ptr ds:[0xC1XF2C]
0048AF8D . 33C4 xor eax,esp
0048AF8F . 898424 100308>mov dword ptr ss:[esp+0x80310],eax
0048AF96 . 53 push ebx
0048AF97 . 55 push ebp
0048AF98 . 56 push esi
0048AF99 . 57 push edi
0048AF9A . A1 2CXFC100 mov eax,dword ptr ds:[0xC1XF2C]
0048AF9F . 33C4 xor eax,esp
0048AFA1 . 50 push eax
0048AFA2 . 8D8424 280308>lea eax,dword ptr ss:[esp+0x80328]
0048AFA9 . 64:A3 0000000>mov dword ptr fs:[0],eax
0048AFAF . 8BAC24 380308>mov ebp,dword ptr ss:[esp+0x80338]
0048AFB6 . 8BB424 3C0308>mov esi,dword ptr ss:[esp+0x8033C]
0048AFBD . 68 B8F2D200 push KnightOn.00D2F2B8
0048AFC2 . 8BF9 mov edi,ecx
0048AFC4 . FF15 30C2B000 call dword ptr ds:[0xB0C230] ; ntdll.RtlEnterCriticalSection
0048AFCA . 3B3D FC5DDB00 cmp edi,dword ptr ds:[0xDB5DFC]
0048AFD0 . 74 0C je short KnightOn.0048AFDE
0048AFD2 . 3B3D 005EDB00 cmp edi,dword ptr ds:[0xDB5E00]
0048AFD8 . 0F85 C9010000 jnz KnightOn.0048B1A7
0048AFDE > E8 1D504E02 call 02970000
0048AFE3 .^ E0 83 loopdne short KnightOn.0048AF68
0048AFE5 . BF DC000400 mov edi,0x400DC
0048AFEA . 000F add byte ptr ds:[edi],cl
0048AFEC . 84B6 01000083 test byte ptr ds:[esi-0x7XFFFFFF],dh
0048AFF2 . 7F 04 jg short KnightOn.0048AFF8
0048AFF4 . FF0F dec dword ptr ds:[edi]
0048AFF6 84 db 84
0048AFF7 . AC lods byte ptr ds:[esi]
0048AFF8 . 0100 add dword ptr ds:[eax],eax
0048AFFA . 0083 BF640004 add byte ptr ds:[ebx+0x40064BF],al
0048B000 . 0000 add byte ptr ds:[eax],al
0048B002 . 0F84 9F010000 je KnightOn.0048B1A7
0048B008 . 68 FFFF0300 push 0x3FFFF
0048B00D . 8D8424 290300>lea eax,dword ptr ss:[esp+0x329]
0048B014 . 6A 00 push 0x0
0048B016 . 50 push eax
0048B017 . C68424 300300>mov byte ptr ss:[esp+0x330],0x0
0048B01F . E8 DC8B5C00 call KnightOn.00A53C00
0048B024 . 68 FFFF0300 push 0x3FFFF
0048B029 . 8D8C24 350304>lea ecx,dword ptr ss:[esp+0x40335]
0048B030 . 6A 00 push 0x0
0048B032 . 51 push ecx
0048B033 . C68424 3C0304>mov byte ptr ss:[esp+0x4033C],0x0
0048B03B . E8 C08B5C00 call KnightOn.00A53C00
0048B040 . 83C4 18 add esp,0x18
0048B043 . 80BF 80000400>cmp byte ptr ds:[edi+0x40080],0x1
0048B04A . 75 35 jnz short KnightOn.0048B081
0048B04C . A0 9E5EDB00 mov al,byte ptr ds:[0xDB5E9E]
0048B051 . 04 01 add al,0x1
0048B053 . 3C FA cmp al,0xFA
0048B055 . 76 02 jbe short KnightOn.0048B059
0048B057 . B0 01 mov al,0x1
0048B059 > 56 push esi
0048B05A . 8D9424 290304>lea edx,dword ptr ss:[esp+0x40329]
0048B061 . 55 push ebp
0048B062 . 52 push edx
0048B063 . A2 9E5EDB00 mov byte ptr ds:[0xDB5E9E],al
0048B068 . 888424 300304>mov byte ptr ss:[esp+0x40330],al
0048B06F . E8 1C925C00 call KnightOn.00A54290
0048B074 . 83C4 0C add esp,0xC
0048B077 . 83C6 01 add esi,0x1
0048B07A . 8DAC24 240304>lea ebp,dword ptr ss:[esp+0x40324]
0048B081 > 83BF 84000400>cmp dword ptr ds:[edi+0x40084],0x0
0048B088 . 74 28 je short KnightOn.0048B0B2
0048B08A . 68 D800B100 push KnightOn.00B100D8 ; ASCII "S9*lO1mD"
0048B08F . 8D4C24 28 lea ecx,dword ptr ss:[esp+0x28]
0048B093 . E8 28133E00 call KnightOn.0086C3C0
0048B098 . 8B87 88000400 mov eax,dword ptr ds:[edi+0x40088]
0048B09E . 50 push eax
0048B09F . 56 push esi
0048B0A0 . 55 push ebp
0048B0A1 . 8D4C24 30 lea ecx,dword ptr ss:[esp+0x30]
0048B0A5 . E8 A6133E00 call KnightOn.0086C450
0048B0AA . 8BAF 88000400 mov ebp,dword ptr ds:[edi+0x40088]
0048B0B0 . 8BF0 mov esi,eax
0048B0B2 > 6A 01 push 0x1
0048B0B4 . 55 push ebp
0048B0B5 . 56 push esi
0048B0B6 . 8D4C24 24 lea ecx,dword ptr ss:[esp+0x24]
0048B0BA . E8 31FDFFFF call KnightOn.0048ADF0
0048B0BF . C78424 300308>mov dword ptr ss:[esp+0x80330],0x0
0048B0CA . 80BF 80000400>cmp byte ptr ds:[edi+0x40080],0x1
0048B0D1 . 8B7424 1C mov esi,dword ptr ss:[esp+0x1C]
0048B0D5 . 8B5C24 20 mov ebx,dword ptr ss:[esp+0x20]
0048B0D9 . 75 23 jnz short KnightOn.0048B0FE
0048B0DB . 6A 01 push 0x1
0048B0DD . 56 push esi
0048B0DE . 8D5424 1C lea edx,dword ptr ss:[esp+0x1C]
0048B0E2 . 52 push edx
0048B0E3 . 53 push ebx
0048B0E4 . 8D4E 2A lea ecx,dword ptr ds:[esi+0x2A]
0048B0E7 . 6A 00 push 0x0
0048B0E9 . 894C24 28 mov dword ptr ss:[esp+0x28],ecx
0048B0ED . E8 259B5B00 call KnightOn.00A44C17
0048B0F2 . 85C0 test eax,eax
0048B0F4 . 0F85 80000000 jnz KnightOn.0048B17A
0048B0FA . 8B7424 14 mov esi,dword ptr ss:[esp+0x14]
0048B0FE > 68 55AA0000 push 0xAA55 ; /NetShort = AA55
0048B103 . 8D6E 06 lea ebp,dword ptr ds:[esi+0x6] ; |
0048B106 . E8 49065B00 call KnightOn.00A3B754 ; \ntohs
0048B10B . 56 push esi
0048B10C . 66:898424 280>mov word ptr ss:[esp+0x328],ax
0048B114 . 8D8424 2C0300>lea eax,dword ptr ss:[esp+0x32C]
0048B11B . 53 push ebx
0048B11C . 50 push eax
0048B11D . 66:89B424 320>mov word ptr ss:[esp+0x332],si
0048B125 . E8 66915C00 call KnightOn.00A54290
0048B12A . 83C4 0C add esp,0xC
0048B12D . 68 AA550000 push 0x55AA ; /NetShort = 55AA
0048B132 . 8DB434 2C0300>lea esi,dword ptr ss:[esp+esi+0x32C] ; |
0048B139 . E8 16065B00 call KnightOn.00A3B754 ; \ntohs
0048B13E . 66:8906 mov word ptr ds:[esi],ax
0048B141 . 33F6 xor esi,esi
0048B143 . 85ED test ebp,ebp
0048B145 . 7E 33 jle short KnightOn.0048B17A
0048B147 . 8B1D F8C3B000 mov ebx,dword ptr ds:[0xB0C3F8] ; ntdll.RtlGetLastWin32Error
0048B14D . 8D49 00 lea ecx,dword ptr ds:[ecx]
0048B150 > 8B57 04 mov edx,dword ptr ds:[edi+0x4]
0048B153 . 6A 00 push 0x0 ; /Flags = 0
0048B155 . 55 push ebp ; |DataSize
0048B156 . 8D8C24 2C0300>lea ecx,dword ptr ss:[esp+0x32C] ; |
0048B15D . 51 push ecx ; |Data
0048B15E . 52 push edx ; |Socket
0048B15F . E8 EA055B00 call KnightOn.00A3B74E ; \send
0048B164 . 83F8 FF cmp eax,-0x1
0048B167 . 75 32 jnz short KnightOn.0048B19B
0048B169 . FFD3 call ebx
0048B16B . 3D 33270000 cmp eax,0x2733
0048B170 . 74 2F je short KnightOn.0048B1A1
0048B172 . 6A FF push -0x1 ; /ExitCode = FFFFFFFF (-1.)
0048B174 . FF15 B0C4B000 call dword ptr ds:[0xB0C4B0] ; \PostQuitMessage
0048B17A > 68 B8F2D200 push KnightOn.00D2F2B8
0048B17F . FF15 2CC2B000 call dword ptr ds:[0xB0C22C] ; ntdll.RtlLeaveCriticalSection
0048B185 . C78424 300308>mov dword ptr ss:[esp+0x80330],-0x1
0048B190 . 8D4C24 18 lea ecx,dword ptr ss:[esp+0x18]
0048B194 . E8 E7FBFFFF call KnightOn.0048AD80
0048B199 . EB 17 jmp short KnightOn.0048B1B2
0048B19B > 85C0 test eax,eax
0048B19D . 7E 02 jle short KnightOn.0048B1A1
0048B19F . 03F0 add esi,eax
0048B1A1 > 3BF5 cmp esi,ebp
0048B1A3 .^ 7C AB jl short KnightOn.0048B150
0048B1A5 .^ EB D3 jmp short KnightOn.0048B17A
0048B1A7 > 68 B8F2D200 push KnightOn.00D2F2B8
0048B1AC . FF15 2CC2B000 call dword ptr ds:[0xB0C22C] ; ntdll.RtlLeaveCriticalSection
0048B1B2 > 8B8C24 280308>mov ecx,dword ptr ss:[esp+0x80328]
0048B1B9 . 64:890D 00000>mov dword ptr fs:[0],ecx
0048B1C0 . 59 pop ecx
0048B1C1 . 5F pop edi
0048B1C2 . 5E pop esi
0048B1C3 . 5D pop ebp
0048B1C4 . 5B pop ebx
0048B1C5 . 8B8C24 100308>mov ecx,dword ptr ss:[esp+0x80310]
0048B1CC . 33CC xor ecx,esp
0048B1CE . E8 70845C00 call KnightOn.00A53643
0048B1D3 . 81C4 20030800 add esp,0x80320
0048B1D9 . C2 0800 retn 0x8
->
004A1DD0 /$ 6A FF push -0x1
004A1DD2 |. 68 921CA800 push KnightOn.00A81C92
004A1DD7 |. 64:A1 00000000 mov eax,dword ptr fs:[0]
004A1DDD |. 50 push eax
004A1DDE |. 81EC 28020000 sub esp,0x228
004A1DE4 |. A1 2CXFC100 mov eax,dword ptr ds:[0xC1XF2C]
004A1DE9 |. 33C4 xor eax,esp
004A1DEB |. 898424 24020000 mov dword ptr ss:[esp+0x224],eax
004A1DF2 |. 53 push ebx
004A1DF3 |. 56 push esi
004A1DF4 |. A1 2CXFC100 mov eax,dword ptr ds:[0xC1XF2C]
004A1DF9 |. 33C4 xor eax,esp
004A1DFB |. 50 push eax
004A1DFC |. 8D8424 34020000 lea eax,dword ptr ss:[esp+0x234]
004A1E03 |. 64:A3 00000000 mov dword ptr fs:[0],eax
004A1E09 |. 8BD1 mov edx,ecx
004A1E0B |. 895424 0C mov dword ptr ss:[esp+0xC],edx
004A1E0F |. 8B0D 845DDB00 mov ecx,dword ptr ds:[0xDB5D84]
004A1E15 |. 8BB424 48020000 mov esi,dword ptr ss:[esp+0x248]
004A1E1C |. 33DB xor ebx,ebx
004A1E1E |. 83B9 9C0B0000 5C cmp dword ptr ds:[ecx+0xB9C],0x5C
004A1E25 |. 75 23 jnz short KnightOn.004A1E4A
004A1E27 |. 3999 B8060000 cmp dword ptr ds:[ecx+0x6B8],ebx
004A1E2D |. 0F85 FE020000 jnz KnightOn.004A2131
004A1E33 |. 837E 18 10 cmp dword ptr ds:[esi+0x18],0x10
004A1E37 |. 72 05 jb short KnightOn.004A1E3E
004A1E39 |. 8B46 04 mov eax,dword ptr ds:[esi+0x4]
004A1E3C |. EB 03 jmp short KnightOn.004A1E41
004A1E3E |> 8D46 04 lea eax,dword ptr ds:[esi+0x4]
004A1E41 |> 8038 2B cmp byte ptr ds:[eax],0x2B
004A1E44 |. 0F85 E7020000 jnz KnightOn.004A2131
004A1E4A |> 8B8424 44020000 mov eax,dword ptr ss:[esp+0x244]
004A1E51 |. 83F8 06 cmp eax,0x6
004A1E54 |. 75 0E jnz short KnightOn.004A1E64
004A1E56 |. 3999 D8060000 cmp dword ptr ds:[ecx+0x6D8],ebx
004A1E5C |. 0F8E XF020000 jle KnightOn.004A2131
004A1E62 |. EB 1B jmp short KnightOn.004A1E7F
004A1E64 |> 83F8 02 cmp eax,0x2
004A1E67 |. 75 16 jnz short KnightOn.004A1E7F
004A1E69 |. 8B82 BC010000 mov eax,dword ptr ds:[edx+0x1BC]
004A1E6F |. 3BC3 cmp eax,ebx
004A1E71 |. 74 0C je short KnightOn.004A1E7F
004A1E73 |. 3898 1D080000 cmp byte ptr ds:[eax+0x81D],bl
004A1E79 |. 0F84 B2020000 je KnightOn.004A2131
004A1E7F |> 81B9 B8060000 FA000000 cmp dword ptr ds:[ecx+0x6B8],0xFA
004A1E89 |. 75 1E jnz short KnightOn.004A1EA9
004A1E8B |. 6A 0B push 0xB
004A1E8D |. 53 push ebx
004A1E8E |. 68 8802B100 push KnightOn.00B10288 ; ASCII "+zonechange"
004A1E93 |. 8BCE mov ecx,esi
004A1E95 |. E8 168FF7FF call KnightOn.0041ADB0
004A1E9A |. 83F8 FF cmp eax,-0x1
004A1E9D |. 0F84 8E020000 je KnightOn.004A2131
004A1EA3 |. 8B0D 845DDB00 mov ecx,dword ptr ds:[0xDB5D84]
004A1EA9 |> F605 F0F4DA00 01 test byte ptr ds:[0xDAF4F0],0x1
004A1EB0 |. 75 2A jnz short KnightOn.004A1EDC
004A1EB2 |. 830D F0F4DA00 01 or dword ptr ds:[0xDAF4F0],0x1
004A1EB9 |. 899C24 3C020000 mov dword ptr ss:[esp+0x23C],ebx
004A1EC0 |. E8 2B7XFAFF call KnightOn.00449AF0
004A1EC5 |. D91D EXF4DA00 fstp dword ptr ds:[0xDAF4EC]
004A1ECB |. C78424 3C020000 FFFFFF>mov dword ptr ss:[esp+0x23C],-0x1
004A1ED6 |. 8B0D 845DDB00 mov ecx,dword ptr ds:[0xDB5D84]
004A1EDC |> F605 F0F4DA00 02 test byte ptr ds:[0xDAF4F0],0x2
004A1EE3 |. 75 48 jnz short KnightOn.004A1F2D
004A1EE5 |. 830D F0F4DA00 02 or dword ptr ds:[0xDAF4F0],0x2
004A1EEC |. C78424 3C020000 010000>mov dword ptr ss:[esp+0x23C],0x1
004A1EF7 |. 68 701A4000 push KnightOn.00401A70 ; 入口地址
004A1EFC |. 68 802E4000 push KnightOn.00402E80 ; 入口地址
004A1F01 |. 6A 03 push 0x3
004A1F03 |. 6A 1C push 0x1C
004A1F05 |. 68 98F4DA00 push KnightOn.00DAF498
004A1F0A |. E8 1C2C5B00 call KnightOn.00A54B2B
004A1F0F |. 68 30A8AF00 push KnightOn.00AFA830
004A1F14 |. E8 A61B5B00 call KnightOn.00A53ABF
004A1F19 |. 83C4 04 add esp,0x4
004A1F1C |. C78424 3C020000 FFFFFF>mov dword ptr ss:[esp+0x23C],-0x1
004A1F27 |. 8B0D 845DDB00 mov ecx,dword ptr ds:[0xDB5D84]
004A1F2D |> 8B8424 44020000 mov eax,dword ptr ss:[esp+0x244]
004A1F34 |. 83F8 0E cmp eax,0xE
004A1F37 |. 74 73 je short KnightOn.004A1FAC
004A1F39 |. 3999 B8060000 cmp dword ptr ds:[ecx+0x6B8],ebx
004A1F3F |. 74 6B je short KnightOn.004A1FAC
004A1F41 |. 83F8 13 cmp eax,0x13
004A1F44 |. 74 66 je short KnightOn.004A1FAC
004A1F46 |. A1 94F4DA00 mov eax,dword ptr ds:[0xDAF494]
004A1F4B |. 6A FF push -0x1
004A1F4D |. 8D0CC5 00000000 lea ecx,dword ptr ds:[eax*8]
004A1F54 |. 2BC8 sub ecx,eax
004A1F56 |. 53 push ebx
004A1F57 |. 8D0C8D 98F4DA00 lea ecx,dword ptr ds:[ecx*4+0xDAF498]
004A1F5E |. 56 push esi
004A1F5F |. E8 3XFDF5FF call KnightOn.00401CA0
004A1F64 |. A1 94F4DA00 mov eax,dword ptr ds:[0xDAF494]
004A1F69 |. 83C0 01 add eax,0x1
004A1F6C |. 83F8 03 cmp eax,0x3
004A1F6F |. A3 94F4DA00 mov dword ptr ds:[0xDAF494],eax
004A1F74 |. 7C 06 jl short KnightOn.004A1F7C
004A1F76 |. 891D 94F4DA00 mov dword ptr ds:[0xDAF494],ebx
004A1F7C |> 68 B4F4DA00 push KnightOn.00DAF4B4
004A1F81 |. 68 98F4DA00 push KnightOn.00DAF498
004A1F86 |. E8 0548F8FF call KnightOn.00426790
004A1F8B |. 83C4 08 add esp,0x8
004A1F8E |. 84C0 test al,al
004A1F90 |. 74 1A je short KnightOn.004A1FAC
004A1F92 |. 68 D0F4DA00 push KnightOn.00DAF4D0
004A1F97 |. 68 B4F4DA00 push KnightOn.00DAF4B4
004A1F9C |. E8 EF47F8FF call KnightOn.00426790
004A1FA1 |. 83C4 08 add esp,0x8
004A1FA4 |. 84C0 test al,al
004A1FA6 |. 0F85 85010000 jnz KnightOn.004A2131
004A1FAC |> C74424 2C 0F000000 mov dword ptr ss:[esp+0x2C],0xF
004A1FB4 |. 895C24 28 mov dword ptr ss:[esp+0x28],ebx
004A1FB8 |. 885C24 18 mov byte ptr ss:[esp+0x18],bl
004A1FBC |. C78424 3C020000 020000>mov dword ptr ss:[esp+0x23C],0x2
004A1FC7 |. 6A FF push -0x1
004A1FC9 |. 53 push ebx
004A1FCA |. 56 push esi
004A1FCB |. 8D4C24 20 lea ecx,dword ptr ss:[esp+0x20]
004A1FXF |. E8 CXFXF5FF call KnightOn.00401CA0
004A1FD4 |. 8B4C24 28 mov ecx,dword ptr ss:[esp+0x28]
004A1FD8 |. 33F6 xor esi,esi
004A1FDA |. 3BCB cmp ecx,ebx
004A1FDC |. 76 49 jbe short KnightOn.004A2027
004A1FDE |. 3BF1 cmp esi,ecx
004A1FE0 |. 76 09 jbe short KnightOn.004A1FEB
004A1FE2 |. E8 D7185B00 call KnightOn.00A538BE
004A1FE7 |. 8B4C24 28 mov ecx,dword ptr ss:[esp+0x28]
004A1FEB |> 837C24 2C 10 /cmp dword ptr ss:[esp+0x2C],0x10
004A1FF0 |. 8B4424 18 |mov eax,dword ptr ss:[esp+0x18]
004A1FF4 |. 73 04 |jnb short KnightOn.004A1FFA
004A1FF6 |. 8D4424 18 |lea eax,dword ptr ss:[esp+0x18]
004A1FFA |> 803C30 0A |cmp byte ptr ds:[eax+esi],0xA
004A1FFE |. 75 20 |jnz short KnightOn.004A2020
004A2000 |. 3BF1 |cmp esi,ecx
004A2002 |. 76 05 |jbe short KnightOn.004A2009
004A2004 |. E8 B5185B00 |call KnightOn.00A538BE
004A2009 |> 837C24 2C 10 |cmp dword ptr ss:[esp+0x2C],0x10
004A200E |. 8B4424 18 |mov eax,dword ptr ss:[esp+0x18]
004A2012 |. 73 04 |jnb short KnightOn.004A2018
004A2014 |. 8D4424 18 |lea eax,dword ptr ss:[esp+0x18]
004A2018 |> C60430 5F |mov byte ptr ds:[eax+esi],0x5F
004A201C |. 8B4C24 28 |mov ecx,dword ptr ss:[esp+0x28]
004A2020 |> 83C6 01 |add esi,0x1
004A2023 |. 3BF1 |cmp esi,ecx
004A2025 |.^ 72 C4 \jb short KnightOn.004A1FEB
004A2027 |> 83EC 1C sub esp,0x1C
004A202A |. 8BCC mov ecx,esp
004A202C |. 896424 2C mov dword ptr ss:[esp+0x2C],esp
004A2030 |. 6A FF push -0x1
004A2032 |. 53 push ebx
004A2033 |. 8D4424 38 lea eax,dword ptr ss:[esp+0x38]
004A2037 |. C741 18 0F000000 mov dword ptr ds:[ecx+0x18],0xF
004A203E |. 8959 14 mov dword ptr ds:[ecx+0x14],ebx
004A2041 |. 50 push eax
004A2042 |. 8859 04 mov byte ptr ds:[ecx+0x4],bl
004A2045 |. E8 56FXF5FF call KnightOn.00401CA0
004A204A |. C68424 58020000 03 mov byte ptr ss:[esp+0x258],0x3
004A2052 |. C68424 58020000 02 mov byte ptr ss:[esp+0x258],0x2
004A205A |. 8B0D 8C5DDB00 mov ecx,dword ptr ds:[0xDB5D8C]
004A2060 |. E8 8BA62B00 call KnightOn.0075C6F0
004A2065 |. 8B7424 28 mov esi,dword ptr ss:[esp+0x28]
004A2069 |. 3BF3 cmp esi,ebx
004A206B |. 8B8C24 44020000 mov ecx,dword ptr ss:[esp+0x244]
004A2072 |. 66:8B5424 28 mov dx,word ptr ss:[esp+0x28]
004A2077 |. C64424 30 10 mov byte ptr ss:[esp+0x30],0x10
004A207C |. 884C24 31 mov byte ptr ss:[esp+0x31],cl
004A2080 |. 66:895424 32 mov word ptr ss:[esp+0x32],dx
004A2085 |. B8 04000000 mov eax,0x4
004A208A |. 74 28 je short KnightOn.004A20B4
004A208C |. 837C24 2C 10 cmp dword ptr ss:[esp+0x2C],0x10
004A2091 |. 8B4424 18 mov eax,dword ptr ss:[esp+0x18]
004A2095 |. 73 04 jnb short KnightOn.004A209B
004A2097 |. 8D4424 18 lea eax,dword ptr ss:[esp+0x18]
004A209B |> 56 push esi
004A209C |. 50 push eax
004A209D |. 8D4424 3C lea eax,dword ptr ss:[esp+0x3C]
004A20A1 |. 50 push eax
004A20A2 |. E8 E9215B00 call KnightOn.00A54290
004A20A7 |. 8B8C24 50020000 mov ecx,dword ptr ss:[esp+0x250]
004A20AE |. 83C4 0C add esp,0xC
004A20B1 |. 8D46 04 lea eax,dword ptr ds:[esi+0x4]
004A20B4 |> 83F9 13 cmp ecx,0x13
004A20B7 |. 75 1D jnz short KnightOn.004A20D6
004A20B9 |. 8B4C24 0C mov ecx,dword ptr ss:[esp+0xC]
004A20BD |. 8B89 1C020000 mov ecx,dword ptr ds:[ecx+0x21C]
004A20C3 |. 3BCB cmp ecx,ebx
004A20C5 |. 74 2A je short KnightOn.004A20F1
004A20C7 |. 8B89 EC030000 mov ecx,dword ptr ds:[ecx+0x3EC]
004A20CD |. 884C04 30 mov byte ptr ss:[esp+eax+0x30],cl
004A20D1 |. 83C0 01 add eax,0x1
004A20D4 |. EB 1B jmp short KnightOn.004A20F1
004A20D6 |> 83F9 21 cmp ecx,0x21
004A20D9 |. 75 16 jnz short KnightOn.004A20F1
004A20DB |. 66:8B8C24 4C020000 mov cx,word ptr ss:[esp+0x24C]
004A20E3 |. 66:83F9 FF cmp cx,0xFFFF
004A20E7 |. 7E 08 jle short KnightOn.004A20F1
004A20E9 |. 66:894C04 30 mov word ptr ss:[esp+eax+0x30],cx
004A20EE |. 83C0 02 add eax,0x2
004A20F1 |> 8B0D FC5DDB00 mov ecx,dword ptr ds:[0xDB5DFC]
004A20F7 |. 50 push eax
004A20F8 |. 8D5424 34 lea edx,dword ptr ss:[esp+0x34]
004A20FC |. 52 push edx
004A20FD |. E8 6E8EFEFF call KnightOn.0048AF70 ; 喊话调用。。。
004A2102 |. C78424 3C020000 FFFFFF>mov dword ptr ss:[esp+0x23C],-0x1
004A210D |. 837C24 2C 10 cmp dword ptr ss:[esp+0x2C],0x10
004A2112 |. 72 0D jb short KnightOn.004A2121
004A2114 |. 8B4424 18 mov eax,dword ptr ss:[esp+0x18]
004A2118 |. 50 push eax
004A2119 |. E8 79155B00 call KnightOn.00A53697
004A211E |. 83C4 04 add esp,0x4
004A2121 |> C74424 2C 0F000000 mov dword ptr ss:[esp+0x2C],0xF
004A2129 |. 895C24 28 mov dword ptr ss:[esp+0x28],ebx
004A212D |. 885C24 18 mov byte ptr ss:[esp+0x18],bl
004A2131 |> 8B8C24 34020000 mov ecx,dword ptr ss:[esp+0x234]
004A2138 |. 64:890D 00000000 mov dword ptr fs:[0],ecx
004A213F |. 59 pop ecx
004A2140 |. 5E pop esi
004A2141 |. 5B pop ebx
004A2142 |. 8B8C24 24020000 mov ecx,dword ptr ss:[esp+0x224]
004A2149 |. 33CC xor ecx,esp
004A214B |. E8 F3145B00 call KnightOn.00A53643
004A2150 |. 81C4 34020000 add esp,0x234
004A2156 \. C2 0C00 retn 0xC
联系我时,请说是在 挂海论坛 上看到的,谢谢! |
上一篇: 上古世纪明文发包CALL下一篇: 诛仙3关闭NPC菜单call
免责声明:
1、本主题所有言论和图片纯属会员个人意见,与本论坛立场无关。一切关于该内容及资源商业行为与www.52ghai.com无关。
2、本站提供的一切资源内容信息仅限用于学习和研究目的;不得将上述内容用于商业或者非法用途,否则,一切后果请用户自负。
3、本站信息来自第三方用户,非本站自制,版权归原作者享有,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑或手机中彻底删除上述内容。
4、如果您喜欢该程序,请支持正版,购买注册,得到更好的正版服务。如有侵犯你版权的,请邮件与我们联系删除(邮箱:xhzlw@foxmail.com),本站将立即改正。
|