|

提醒:若下载的软件是收费的"请不要付款",可能是骗子,请立即联系本站举报,执意要付款被骗后本站概不负责。(任何交易请走第三方中介,请勿直接付款交易以免被骗!切记).
dd [[0x18FDFE8+0x10]+0x4]+0xD 标志位 BYTE +0 左叉
+8 右叉 +0x10 ID
+0x14 指针对象
对象 +0x08 ID 整数
+0xC x 浮点 +0x10 z
+0x14 y
006580C5 C706 00000000 MOV DWORD PTR DS:[ESI],0
006580CB A1 CC9B7601 MOV EAX,DWORD PTR DS:[1769BCC]006580D0 83F8 FF CMP EAX,-1
006580D3 75 30 JNZ SHORT tianyu.00658105006580D5 A1 D0048C01 MOV EAX,DWORD PTR DS:[18C04D0]
006580DA A8 01 TEST AL,1006580DC 75 1F JNZ SHORT tianyu.006580FD
006580DE 83C8 01 OR EAX,1006580E1 B9 60048C01 MOV ECX,tianyu.018C0460
006580E6 A3 D0048C01 MOV DWORD PTR DS:[18C04D0],EAX006580EB E8 A0DBFFFF CALL tianyu.00655C90
006580F0 68 00F33B01 PUSH tianyu.013BF300006580F5 E8 1564E8FF CALL tianyu.004DE50F
006580FA 83C4 04 ADD ESP,4006580FD 8B1D 6C048C01 MOV EBX,DWORD PTR DS:[18C046C]
00658103 EB 11 JMP SHORT tianyu.0065811600658105 6A 00 PUSH 0
00658107 50 PUSH EAX00658108 E8 831C0400 CALL tianyu.00699D90 ; 得到基地址
0065810D 8BC8 MOV ECX,EAX0065810F E8 6C1B0400 CALL tianyu.00699C80 ; 遍历对象二叉
00658114 8BD8 MOV EBX,EAX00658116 85DB TEST EBX,EBX
00658118 0F84 D5020000 JE tianyu.006583F30065811E 8B43 58 MOV EAX,DWORD PTR DS:[EBX+58]
00658121 85C0 TEST EAX,EAX00658123 0F84 CA020000 JE tianyu.006583F3
00658129 8B40 58 MOV EAX,DWORD PTR DS:[EAX+58]0065812C 85C0 TEST EAX,EAX
0065812E 0F84 BF020000 JE tianyu.006583F300658134 8B40 04 MOV EAX,DWORD PTR DS:[EAX+4]
00658137 3D 80647701 CMP EAX,tianyu.017764800065813C 74 16 JE SHORT tianyu.00658154
0065813E 68 80647701 PUSH tianyu.01776480 ; \n00658143 50 PUSH EAX
00658144 E8 77604500 CALL tianyu.00AAE1C000658149 83C4 08 ADD ESP,8
0065814C 85C0 TEST EAX,EAX0065814E 0F84 9F020000 JE tianyu.006583F3
00658154 8B43 58 MOV EAX,DWORD PTR DS:[EBX+58]00658157 8B40 58 MOV EAX,DWORD PTR DS:[EAX+58]
0065815A 85C0 TEST EAX,EAX0065815C 0F84 91020000 JE tianyu.006583F3
00699D90 64:A1 00000000 MOV EAX,DWORD PTR FS:[0]00699D96 6A FF PUSH -1
00699D98 68 BE263301 PUSH tianyu.013326BE00699D9D 50 PUSH EAX
00699D9E 64:8925 00000000 MOV DWORD PTR FS:[0],ESP00699DA5 A1 004B8C01 MOV EAX,DWORD PTR DS:[18C4B00]
00699DAA A8 01 TEST AL,100699DAC 75 27 JNZ SHORT tianyu.00699DD5
00699DAE 83C8 01 OR EAX,100699DB1 A3 004B8C01 MOV DWORD PTR DS:[18C4B00],EAX
00699DB6 B9 784A8C01 MOV ECX,tianyu.018C4A7800699DBB C74424 08 000000>MOV DWORD PTR SS:[ESP+8],0
00699DC3 E8 38BBFFFF CALL tianyu.0069590000699DC8 68 80153C01 PUSH tianyu.013C1580
00699DCD E8 3D47E4FF CALL tianyu.004DE50F00699DD2 83C4 04 ADD ESP,4
00699DD5 8B0C24 MOV ECX,DWORD PTR SS:[ESP]00699DD8 B8 784A8C01 MOV EAX,tianyu.018C4A78 ; 基地址
00699DDD 64:890D 00000000 MOV DWORD PTR FS:[0],ECX00699DE4 83C4 0C ADD ESP,0C
00699DE7 C3 RETN
00699C80 51 PUSH ECX ; 遍历二叉00699C81 56 PUSH ESI
00699C82 8B7424 0C MOV ESI,DWORD PTR SS:[ESP+C]00699C86 57 PUSH EDI
00699C87 8B79 10 MOV EDI,DWORD PTR DS:[ECX+10] ; --------00699C8A 8BD7 MOV EDX,EDI
00699C8C 8B47 04 MOV EAX,DWORD PTR DS:[EDI+4] ; --------00699C8F 8078 0D 00 CMP BYTE PTR DS:[EAX+D],0 ; ------标识
00699C93 75 14 JNZ SHORT tianyu.00699CA900699C95 3970 10 CMP DWORD PTR DS:[EAX+10],ESI
00699C98 7D 05 JGE SHORT tianyu.00699C9F00699C9A 8B40 08 MOV EAX,DWORD PTR DS:[EAX+8]
00699C9D EB 04 JMP SHORT tianyu.00699CA300699C9F 8BD0 MOV EDX,EAX
00699CA1 8B00 MOV EAX,DWORD PTR DS:[EAX]00699CA3 8078 0D 00 CMP BYTE PTR DS:[EAX+D],0
00699CA7 ^74 EC JE SHORT tianyu.00699C9500699CA9 3BD7 CMP EDX,EDI
00699CAB 74 09 JE SHORT tianyu.00699CB600699CAD 895424 08 MOV DWORD PTR SS:[ESP+8],EDX
00699CB1 3B72 10 CMP ESI,DWORD PTR DS:[EDX+10]00699CB4 7D 04 JGE SHORT tianyu.00699CBA
00699CB6 897C24 08 MOV DWORD PTR SS:[ESP+8],EDI00699CBA 8D4424 08 LEA EAX,DWORD PTR SS:[ESP+8]
00699CBE 8B00 MOV EAX,DWORD PTR DS:[EAX]00699CC0 3BC7 CMP EAX,EDI
00699CC2 74 09 JE SHORT tianyu.00699CCD00699CC4 8B40 14 MOV EAX,DWORD PTR DS:[EAX+14]
00699CC7 5F POP EDI00699CC8 5E POP ESI
00699CC9 59 POP ECX00699CCA C2 0800 RETN 8
00699CCD 807C24 14 00 CMP BYTE PTR SS:[ESP+14],000699CD2 74 1A JE SHORT tianyu.00699CEE
00699CD4 8D4424 10 LEA EAX,DWORD PTR SS:[ESP+10]00699CD8 50 PUSH EAX
00699CD9 8D71 18 LEA ESI,DWORD PTR DS:[ECX+18]00699CDC 8D4424 18 LEA EAX,DWORD PTR SS:[ESP+18]
00699CE0 50 PUSH EAX00699CE1 8BCE MOV ECX,ESI
00699CE3 E8 68640B00 CALL tianyu.0075015000699CE8 8B00 MOV EAX,DWORD PTR DS:[EAX]
00699CEA 3B06 CMP EAX,DWORD PTR DS:[ESI]00699CEC ^75 D6 JNZ SHORT tianyu.00699CC4
00699CEE 5F POP EDI00699CEF 33C0 XOR EAX,EAX
00699XF1 5E POP ESI00699XF2 59 POP ECX
00699XF3 C2 0800 RETN 8
00716AC0 64:A1 00000000 mov eax, dword ptr fs:[0] ; f_tick00716AC6 6A FF push -0x1
00716AC8 68 68903701 push tianyu.0137906800716ACD 50 push eax
00716ACE 64:8925 0000000>mov dword ptr fs:[0], esp00716AD5 83EC 2C sub esp, 0x2C
00716AD8 E8 E35AFAFF call tianyu.006BC5C000716ADD 84C0 test al, al
00716ADF 74 05 je short tianyu.00716AE600716AE1 E8 BA53FAFF call tianyu.006BBEA0
00716AE6 A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716AEB A8 01 test al, 0x1
00716AED 75 08 jnz short tianyu.00716AF700716AEF 83C8 01 or eax, 0x1
00716AF2 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716AF7 FF35 149A8F01 push dword ptr [0x18F9A14] ; g_pApp 基地址
00716AFD B9 E8A99001 mov ecx, tianyu.0190A9E800716B02 E8 C98A1900 call tianyu.008AF5D0
00716B07 A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716B0C A8 02 test al, 0x2
00716B0E 75 08 jnz short tianyu.00716B1800716B10 83C8 02 or eax, 0x2
00716B13 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716B18 E8 E3B50600 call tianyu.00782100
00716B1D 8338 02 cmp dword ptr [eax], 0x200716B20 75 0B jnz short tianyu.00716B2D
00716B22 8B0D 149A8F01 mov ecx, dword ptr [0x18F9A14] ; g_pApp00716B28 E8 F391F4FF call tianyu.0065FD20
00716B2D A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716B32 A8 04 test al, 0x4
00716B34 75 08 jnz short tianyu.00716B3E00716B36 83C8 04 or eax, 0x4
00716B39 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716B3E E8 BD5BFEFF call tianyu.006FC700 ; f_Get_ConnectionControl
00716B43 8BC8 mov ecx, eax00716B45 E8 A663FEFF call tianyu.006FCEF0 ; f_ConnectionControl_tick
00716B4A A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716B4F A8 08 test al, 0x8
00716B51 75 08 jnz short tianyu.00716B5B00716B53 83C8 08 or eax, 0x8
00716B56 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716B5B E8 803AF8FF call tianyu.0069A5E0 ; f_GetEntityManager
00716B60 8BC8 mov ecx, eax00716B62 E8 C938F8FF call tianyu.0069A430 ; f_EntityManager_tick
00716B67 A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716B6C A8 10 test al, 0x10
00716B6E 75 08 jnz short tianyu.00716B7800716B70 83C8 10 or eax, 0x10
00716B73 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716B78 E8 339F2C00 call tianyu.009E0AB0
00716B7D 8D48 04 lea ecx, dword ptr [eax+0x4]00716B80 E8 BB9B2C00 call tianyu.009E0740
00716B85 A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716B8A A8 20 test al, 0x20
00716B8C 75 08 jnz short tianyu.00716B9600716B8E 83C8 20 or eax, 0x20
00716B91 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716B96 F3:0F104424 3C movss xmm0, dword ptr [esp+0x3C]
00716B9C 51 push ecx00716B9D 8B0D C8499001 mov ecx, dword ptr [0x19049C8]
00716BA3 F3:0F110424 movss dword ptr [esp], xmm000716BA8 E8 93DE0600 call tianyu.00784A40
00716BAD A1 B40F9001 mov eax, dword ptr [0x1900FB4]00716BB2 A8 40 test al, 0x40
00716BB4 75 08 jnz short tianyu.00716BBE00716BB6 83C8 40 or eax, 0x40
00716BB9 A3 B40F9001 mov dword ptr [0x1900FB4], eax00716BBE F3:0F104424 3C movss xmm0, dword ptr [esp+0x3C]
00716BC4 51 push ecx00716BC5 F3:0F110424 movss dword ptr [esp], xmm0
00716BCA E8 919D1800 call tianyu.008A096000716BXF 8BC8 mov ecx, eax
00716BD1 E8 3A9E1800 call tianyu.008A0A1000716BD6 A1 B40F9001 mov eax, dword ptr [0x1900FB4]
00716BDB 84C0 test al, al00716BDD 78 0A js short tianyu.00716BE9
00716BDF 0D 80000000 or eax, 0x8000716BE4 A3 B40F9001 mov dword ptr [0x1900FB4], eax
00716BE9 803D 58E28F01 0>cmp byte ptr [0x18FE258], 0x000716BF0 74 3B je short tianyu.00716C2D
00716BF2 803D 59E28F01 0>cmp byte ptr [0x18FE259], 0x000716BF9 74 32 je short tianyu.00716C2D
00716BFB A9 00010000 test eax, 0x10000716C00 75 0A jnz short tianyu.00716C0C
00716C02 0D 00010000 or eax, 0x10000716C07 A3 B40F9001 mov dword ptr [0x1900FB4], eax
00716C0C E8 7F193500 call tianyu.00A6859000716C11 6A 00 push 0x0
00716C13 6A 00 push 0x000716C15 6A 00 push 0x0
00716C17 6A 00 push 0x000716C19 B9 38E89001 mov ecx, tianyu.0190E838
00716C1E E8 0D751E00 call tianyu.008FE13000716C23 E8 B85EFAFF call tianyu.006BCAE0
00716C28 E8 93093500 call tianyu.00A675C000716C2D 53 push ebx
00716C2E 56 push esi00716C2F 57 push edi
00716C30 B9 80F99001 mov ecx, tianyu.0190F98000716C35 E8 96DE1F00 call tianyu.00914AD0
00716C3A 8B0D 5CE68E01 mov ecx, dword ptr [0x18EE65C]00716C40 F3:0F104424 48 movss xmm0, dword ptr [esp+0x48]
00716C46 85C0 test eax, eax00716C48 64:A1 2C000000 mov eax, dword ptr fs:[0x2C]
00716C4E 0F9905 83E18F01 setns byte ptr [0x18FE183]00716C55 8B3C88 mov edi, dword ptr [eax+ecx*4]
00716C58 BE 100C9101 mov esi, tianyu.01910C1000716C5D 80BF 22000000 0>cmp byte ptr [edi+0x22], 0x0
00716C64 8BCE mov ecx, esi00716C66 BB C02F9101 mov ebx, tianyu.01912FC0
00716C6B 0F44CB cmove ecx, ebx00716C6E 51 push ecx
00716C6F F3:0F110424 movss dword ptr [esp], xmm000716C74 E8 878D2500 call tianyu.0096FA00
00716C79 803D C8FF9001 0>cmp byte ptr [0x190FFC8], 0x000716C80 0F84 E3000000 je tianyu.00716D69
00716C86 80BF 23000000 0>cmp byte ptr [edi+0x23], 0x000716C8D 0F85 D6000000 jnz tianyu.00716D69
00716C93 6A 0C push 0xC00716C95 68 C8777B01 push tianyu.017B77C8
00716C9A 8D4C24 20 lea ecx, dword ptr [esp+0x20]00716C9E E8 9D112000 call tianyu.00917E40
00716CA3 8B4424 24 mov eax, dword ptr [esp+0x24]00716CA7 2B4424 20 sub eax, dword ptr [esp+0x20]
00716CAB C74424 40 00000>mov dword ptr [esp+0x40], 0x000716CB3 8D4C24 18 lea ecx, dword ptr [esp+0x18]
00716CB7 83F8 0C cmp eax, 0xC00716CBA 73 79 jnb short tianyu.00716D35
00716CBC C605 00000000 0>mov byte ptr [0], 0x000716CC3 E8 58142000 call tianyu.00918120
00716CC8 85C0 test eax, eax00716CCA 74 18 je short tianyu.00716CE4
00716CCC 8B4C24 24 mov ecx, dword ptr [esp+0x24]00716CD0 2B4C24 20 sub ecx, dword ptr [esp+0x20]
00716CD4 C740 04 7856341>mov dword ptr [eax+0x4], 0x1234567>00716CDB C700 54D04301 mov dword ptr [eax], tianyu.0143D0>
00716CE1 8948 08 mov dword ptr [eax+0x8], ecx00716CE4 8D4C24 18 lea ecx, dword ptr [esp+0x18]
00716CE8 E8 63132000 call tianyu.0091805000716CED 6A 0C push 0xC
00716CEF 68 C8777B01 push tianyu.017B77C800716XF4 8D4C24 30 lea ecx, dword ptr [esp+0x30]
00716XF8 E8 43112000 call tianyu.00917E4000716XFD 8BC8 mov ecx, eax
00716XFF C64424 40 01 mov byte ptr [esp+0x40], 0x100716D04 E8 17142000 call tianyu.00918120
00716D09 85C0 test eax, eax00716D0B 74 18 je short tianyu.00716D25
00716D0D F3:0F104424 48 movss xmm0, dword ptr [esp+0x48]00716D13 C740 04 7856341>mov dword ptr [eax+0x4], 0x1234567>
00716D1A C700 E0684401 mov dword ptr [eax], tianyu.014468>00716D20 F3:0F1140 08 movss dword ptr [eax+0x8], xmm0
00716D25 8D4C24 28 lea ecx, dword ptr [esp+0x28]00716D29 C64424 40 00 mov byte ptr [esp+0x40], 0x0
00716D2E E8 1D132000 call tianyu.0091805000716D33 EB 21 jmp short tianyu.00716D56
00716D35 E8 E6132000 call tianyu.0091812000716D3A 85C0 test eax, eax
00716D3C 74 18 je short tianyu.00716D5600716D3E F3:0F104424 48 movss xmm0, dword ptr [esp+0x48]
00716D44 C740 04 7856341>mov dword ptr [eax+0x4], 0x1234567>00716D4B C700 E0684401 mov dword ptr [eax], tianyu.014468>
00716D51 F3:0F1140 08 movss dword ptr [eax+0x8], xmm000716D56 8D4C24 18 lea ecx, dword ptr [esp+0x18]
00716D5A C74424 40 FFFFF>mov dword ptr [esp+0x40], -0x100716D62 E8 E9122000 call tianyu.00918050
00716D67 EB 43 jmp short tianyu.00716DAC00716D69 F3:0F104424 48 movss xmm0, dword ptr [esp+0x48]
00716D6F C74424 10 78563>mov dword ptr [esp+0x10], 0x123456>00716D77 C74424 0C E0684>mov dword ptr [esp+0xC], tianyu.01>
00716D7F F3:0F114424 14 movss dword ptr [esp+0x14], xmm000716D85 80BF 22000000 0>cmp byte ptr [edi+0x22], 0x0
00716D8C 51 push ecx00716D8D 0F44F3 cmove esi, ebx
00716D90 8BCE mov ecx, esi00716D92 C74424 44 02000>mov dword ptr [esp+0x44], 0x2
00716D9A F3:0F110424 movss dword ptr [esp], xmm000716D9F E8 5C8C2500 call tianyu.0096FA00
00716DA4 C74424 40 FFFFF>mov dword ptr [esp+0x40], -0x100716DAC 803D 83E18F01 0>cmp byte ptr [0x18FE183], 0x0
00716DB3 0F84 DB000000 je tianyu.00716E9400716DB9 0FB605 5AE28F01 movzx eax, byte ptr [0x18FE25A]
00716DC0 50 push eax00716DC1 E8 BA0D2400 call tianyu.00957B80
00716DC6 0FB605 5BE28F01 movzx eax, byte ptr [0x18FE25B]00716DCD 50 push eax
00716DCE E8 0DA42400 call tianyu.009611E000716DD3 E8 48B62400 call tianyu.00962420
00716DD8 0FB605 5BE28F01 movzx eax, byte ptr [0x18FE25B]00716DDF 50 push eax
00716DE0 E8 8BA42400 call tianyu.0096127000716DE5 0FB605 5CE28F01 movzx eax, byte ptr [0x18FE25C]
00716DEC 83C4 0C add esp, 0xC00716DEF 803D FC7F7A01 0>cmp byte ptr [0x17A7FFC], 0x0
00716DF6 50 push eax00716DF7 74 0E je short tianyu.00716E07
00716DF9 E8 22115F00 call tianyu.00D07F2000716DFE 8BC8 mov ecx, eax
00716E00 E8 CB0D5F00 call tianyu.00D07BD000716E05 EB 20 jmp short tianyu.00716E27
00716E07 E8 D4E35E00 call tianyu.00D051E000716E0C 8BC8 mov ecx, eax
00716E0E E8 5DDE5E00 call tianyu.00D04C7000716E13 0FB605 5CE28F01 movzx eax, byte ptr [0x18FE25C]
00716E1A 50 push eax00716E1B E8 C0E35E00 call tianyu.00D051E0
00716E20 8BC8 mov ecx, eax00716E22 E8 39DF5E00 call tianyu.00D04D60
00716E27 B3 01 mov bl, 0x100716E29 E8 42AB0900 call tianyu.007B1970
00716E2E 8BC8 mov ecx, eax00716E30 E8 1B880900 call tianyu.007AF650
00716E35 8338 00 cmp dword ptr [eax], 0x000716E38 74 0B je short tianyu.00716E45
00716E3A E8 D18A6300 call tianyu.00D4F91000716E3F 8A98 40010000 mov bl, byte ptr [eax+0x140]
00716E45 803D 5DE28F01 0>cmp byte ptr [0x18FE25D], 0x000716E4C 74 08 je short tianyu.00716E56
00716E4E 84DB test bl, bl00716E50 74 04 je short tianyu.00716E56
00716E52 B0 01 mov al, 0x100716E54 EB 02 jmp short tianyu.00716E58
00716E56 32C0 xor al, al00716E58 50 push eax
00716E59 E8 62A16400 call tianyu.00D60FC000716E5E 83C4 04 add esp, 0x4
00716E61 803D 5BE28F01 0>cmp byte ptr [0x18FE25B], 0x000716E68 75 0E jnz short tianyu.00716E78
00716E6A B9 80F99001 mov ecx, tianyu.0190F98000716E6F E8 1C052000 call tianyu.00917390
00716E74 84C0 test al, al00716E76 74 0D je short tianyu.00716E85
00716E78 803D 5CE28F01 0>cmp byte ptr [0x18FE25C], 0x000716E7F 74 04 je short tianyu.00716E85
00716E81 B0 01 mov al, 0x100716E83 EB 02 jmp short tianyu.00716E87
00716E85 32C0 xor al, al00716E87 50 push eax
00716E88 E8 43A36400 call tianyu.00D611D000716E8D 8BC8 mov ecx, eax
00716E8F E8 1CA36400 call tianyu.00D611B000716E94 8B4C24 38 mov ecx, dword ptr [esp+0x38]
00716E98 5F pop edi00716E99 5E pop esi
00716E9A 5B pop ebx00716E9B 64:890D 0000000>mov dword ptr fs:[0], ecx
00716EA2 83C4 38 add esp, 0x3800716EA5 C3 retn
006FC700 64:A1 00000000 mov eax, dword ptr fs:[0]006FC706 6A FF push -0x1
006FC708 68 5E0E3601 push tianyu.01360E5E006FC70D 50 push eax
006FC70E 64:8925 0000000>mov dword ptr fs:[0], esp006FC715 A1 500C9001 mov eax, dword ptr [0x1900C50]
006FC71A A8 01 test al, 0x1006FC71C 75 27 jnz short tianyu.006FC745
006FC71E 83C8 01 or eax, 0x1006FC721 A3 500C9001 mov dword ptr [0x1900C50], eax
006FC726 B9 F00B9001 mov ecx, tianyu.01900BF0006FC72B C74424 08 00000>mov dword ptr [esp+0x8], 0x0
006FC733 E8 18EEFFFF call tianyu.006FB550006FC738 68 20003F01 push tianyu.013F0020
006FC73D E8 1D28DEFF call tianyu.004DEF5F006FC742 83C4 04 add esp, 0x4
006FC745 8B0C24 mov ecx, dword ptr [esp]006FC748 B8 F00B9001 mov eax, tianyu.01900BF0 ; ----CollectionObj
006FC74D 64:890D 0000000>mov dword ptr fs:[0], ecx006FC754 83C4 0C add esp, 0xC
006FC757 C3 retn
0069A5E0 64:A1 00000000 mov eax, dword ptr fs:[0]0069A5E6 6A FF push -0x1
0069A5E8 68 DED33501 push tianyu.0135D3DE0069A5ED 50 push eax
0069A5EE 64:8925 0000000>mov dword ptr fs:[0], esp0069A5F5 A1 70E08F01 mov eax, dword ptr [0x18FE070]
0069A5FA A8 01 test al, 0x10069A5FC 75 27 jnz short tianyu.0069A625
0069A5FE 83C8 01 or eax, 0x10069A601 A3 70E08F01 mov dword ptr [0x18FE070], eax
0069A606 B9 E8DF8F01 mov ecx, tianyu.018FDFE80069A60B C74424 08 00000>mov dword ptr [esp+0x8], 0x0
0069A613 E8 78B9FFFF call tianyu.00695F900069A618 68 40E63E01 push tianyu.013EE640
0069A61D E8 3D49E4FF call tianyu.004DEF5F0069A622 83C4 04 add esp, 0x4
0069A625 8B0C24 mov ecx, dword ptr [esp]0069A628 B8 E8DF8F01 mov eax, tianyu.018FDFE8 ; -----EntityManager
0069A62D 64:890D 0000000>mov dword ptr fs:[0], ecx0069A634 83C4 0C add esp, 0xC
0069A637 C3 retn
00716AF7 FF35 149A8F01 push dword ptr [0x18F9A14] ; g_pApp 基地址 +0x4EC是 窗口句柄
联系我时,请说是在 挂海论坛 上看到的,谢谢! |
上一篇: 笑傲江湖技能CALL 最新分享下一篇: 求教游戏优化
免责声明:
1、本主题所有言论和图片纯属会员个人意见,与本论坛立场无关。一切关于该内容及资源商业行为与www.52ghai.com无关。
2、本站提供的一切资源内容信息仅限用于学习和研究目的;不得将上述内容用于商业或者非法用途,否则,一切后果请用户自负。
3、本站信息来自第三方用户,非本站自制,版权归原作者享有,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑或手机中彻底删除上述内容。
4、如果您喜欢该程序,请支持正版,购买注册,得到更好的正版服务。如有侵犯你版权的,请邮件与我们联系删除(邮箱:xhzlw@foxmail.com),本站将立即改正。
|