能力值:
( LV9,RANK:370 )
|
-
-
2 楼
SOD 表示无压力。
啥年代了,楼主还在研究传奇,,,一个字“老”。我有传奇的官方源码,客户端,服务器全套。如果需要联系我。
下面是SOD打开1.dat:
006C4A18 >/$ 55 push ebp
006C4A19 |. 8BEC mov ebp, esp
006C4A1B |. 83C4 D0 add esp, -30
006C4A1E |. 33C0 xor eax, eax
006C4A20 |. 8945 E0 mov dword ptr [ebp-20], eax
006C4A23 |. 8945 EC mov dword ptr [ebp-14], eax
006C4A26 |. B8 201A6C00 mov eax, 006C1A20
006C4A2B |. E8 8029D4FF call 004073B0
006C4A30 |. 33C0 xor eax, eax
006C4A32 |. 55 push ebp
006C4A33 |. 68 CA4B6C00 push 006C4BCA
006C4A38 |. 64:FF30 push dword ptr fs:[eax]
006C4A3B |. 64:8920 mov dword ptr fs:[eax], esp
006C4A3E |. B8 E04B6C00 mov eax, 006C4BE0 ; ASCII "mir20"
006C4A43 |. E8 EC26DBFF call 00477134
006C4A48 |. A1 68066F00 mov eax, dword ptr [6F0668]
006C4A4D |. 8B00 mov eax, dword ptr [eax]
006C4A4F |. E8 845BD4FF call 0040A5D8
006C4A54 |. E8 7384E0FF call 004CCECC
006C4A59 |. E8 2A1CDBFF call 00476688
006C4A5E |. 84C0 test al, al
006C4A60 |. 0F84 32010000 je 006C4B98
006C4A66 |. A1 90026F00 mov eax, dword ptr [6F0290]
006C4A6B |. 8B00 mov eax, dword ptr [eax]
006C4A6D |. C680 A6000000>mov byte ptr [eax+A6], 0
006C4A74 |. A1 90026F00 mov eax, dword ptr [6F0290]
006C4A79 |. 8B00 mov eax, dword ptr [eax]
006C4A7B |. E8 5C4DDAFF call 004697DC
006C4A80 |. A1 90026F00 mov eax, dword ptr [6F0290]
006C4A85 |. 8B00 mov eax, dword ptr [eax]
006C4A87 |. BA F04B6C00 mov edx, 006C4BF0 ; ASCII "legend of mir2"
006C4A8C |. E8 0348DAFF call 00469294
006C4A91 |. E8 F216DBFF call 00476188
006C4A96 |. 8B15 14006F00 mov edx, dword ptr [6F0014] ; 1.006CCD34
006C4A9C |. 8902 mov dword ptr [edx], eax
006C4A9E |. E8 B92CF1FF call 005D775C
006C4AA3 |. 33D2 xor edx, edx
006C4AA5 |. B8 084C6C00 mov eax, 006C4C08 ; ASCII "FrmMain.Create"
006C4AAA |. E8 8126DBFF call 00477130
006C4AAF |. A1 90026F00 mov eax, dword ptr [6F0290]
006C4AB4 |. 8B00 mov eax, dword ptr [eax]
006C4AB6 |. B2 01 mov dl, 1
006C4AB8 |. E8 D76BDAFF call 0046B694
006C4ABD |. A1 90026F00 mov eax, dword ptr [6F0290]
006C4AC2 |. 8B00 mov eax, dword ptr [eax]
006C4AC4 |. C640 5B 00 mov byte ptr [eax+5B], 0
006C4AC8 |. 8B0D 78FF6E00 mov ecx, dword ptr [6EFF78] ; 1.0071C204
006C4ACE |. A1 90026F00 mov eax, dword ptr [6F0290]
006C4AD3 |. 8B00 mov eax, dword ptr [eax]
006C4AD5 |. 8B15 D8C45D00 mov edx, dword ptr [5DC4D8] ; 1.005DC524
006C4ADB |. E8 144DDAFF call 004697F4
006C4AE0 |. 8D45 EC lea eax, dword ptr [ebp-14]
006C4AE3 |. 50 push eax
006C4AE4 |. 6A F8 push -8
006C4AE6 |. A1 78FF6E00 mov eax, dword ptr [6EFF78]
006C4AEB |. 8B00 mov eax, dword ptr [eax]
006C4AED |. E8 C2DBD8FF call 004526B4
006C4AF2 |. 50 push eax ; ||hWnd
006C4AF3 |. E8 6033D4FF call <jmp.&user32.GetWindowLongA> ; |\GetWindowLongA
006C4AF8 |. 8945 E4 mov dword ptr [ebp-1C], eax ; |
006C4AFB |. C645 E8 00 mov byte ptr [ebp-18], 0 ; |
006C4AFF |. 8D55 E4 lea edx, dword ptr [ebp-1C] ; |
006C4B02 |. 33C9 xor ecx, ecx ; |
006C4B04 |. B8 204C6C00 mov eax, 006C4C20 ; |ASCII "CMTEST:MainForm.ParentX.Handle is %d"
006C4B09 |. E8 2E62D4FF call 0040AD3C ; \1.0040AD3C
006C4B0E |. 8B45 EC mov eax, dword ptr [ebp-14]
006C4B11 |. 33D2 xor edx, edx
006C4B13 |. E8 1826DBFF call 00477130
006C4B18 |. 8D45 E0 lea eax, dword ptr [ebp-20]
006C4B1B |. 50 push eax
006C4B1C |. A1 78FF6E00 mov eax, dword ptr [6EFF78]
006C4B21 |. 8B00 mov eax, dword ptr [eax]
006C4B23 |. E8 F0BFD9FF call 00460B18
006C4B28 |. 8945 D0 mov dword ptr [ebp-30], eax
006C4B2B |. C645 D4 00 mov byte ptr [ebp-2C], 0
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
问题自己已经处理好了.结贴.
|
能力值:
( LV2,RANK:10 )
|
-
-
4 楼
问题自己已经处理好了.结贴.
|