004018A4 8D45 F8 lea eax, dword ptr ss:[ebp-8]
004018A7 0385 A0FEFFFF add eax, dword ptr ss:[ebp-160]
004018AD 2D E0000000 sub eax, 0E0
004018B2 8038 00 cmp byte ptr ds:[eax], 0
004018B5 74 3F je short D3Scene.004018F6 ; T#Csu~u0Bufuq|ub0ri0Dibq~_0v b0Gqbsbqvd0YYY0!>"$"
004018B7 8D45 F8 lea eax, dword ptr ss:[ebp-8]
004018BA 0385 A0FEFFFF add eax, dword ptr ss:[ebp-160]
004018C0 8D90 20FFFFFF lea edx, dword ptr ds:[eax-E0]
004018C6 8B85 A4FEFFFF mov eax, dword ptr ss:[ebp-15C]
004018CC 3202 xor al, byte ptr ds:[edx]
004018CE 8885 9FFEFFFF mov byte ptr ss:[ebp-161], al
004018D4 8D45 F8 lea eax, dword ptr ss:[ebp-8]
004018D7 0385 A0FEFFFF add eax, dword ptr ss:[ebp-160]
004018DD 8D90 B0FEFFFF lea edx, dword ptr ds:[eax-150]
004018E3 0FB685 9FFEFFFF movzx eax, byte ptr ss:[ebp-161]
004018EA 8802 mov byte ptr ds:[edx], al
004018EC 8D85 A0FEFFFF lea eax, dword ptr ss:[ebp-160]
004018F2 FF00 inc dword ptr ds:[eax]
004018F4 ^ EB AE jmp short D3Scene.004018A4
T#Csu~u0Bufuq|ub0ri0Dibq~_0v b0Gqbsbqvd0YYY0!>"$"
逐位与0X10异或就能解密了.
"D3Scene Revealer by TyranO f0r Warcraft III 1.24"