最初由 0cat0 发布
多谢老大,辛苦了
不知道除了这些,哪里还有修改代码了?
0057F100 837D F0 00 cmp dword ptr [ebp-10], 0
0057F104 74 50 je short 0057F156
0057F106 60 pushad
0057F107 E8 00000000 call 0057F10C
0057F10C 5D pop ebp
0057F10D 81ED 450F0B00 sub ebp, 0B0F45
0057F113 8B45 00 mov eax, dword ptr [ebp]
0057F116 6A 03 push 3
0057F118 6A 04 push 4
0057F11A 50 push eax
0057F11B 8D85 19CE0300 lea eax, dword ptr [ebp+3CE19]
0057F121 50 push eax
0057F122 E8 E521EEFF call _Readmemory
0057F127 83C4 10 add esp, 10
0057F12A FFB5 19CE0300 push dword ptr [ebp+3CE19]
0057F130 E8 1329EEFF call _Findmemory
0057F135 59 pop ecx
0057F136 85C0 test eax, eax
0057F138 74 16 je short 0057F150
0057F13A 6A 30 push 30
0057F13C 6A 00 push 0
0057F13E FFB5 19CE0300 push dword ptr [ebp+3CE19]
0057F144 6A 00 push 0
0057F146 6A 00 push 0
0057F148 E8 CBE4EAFF call _Setcpu
0057F14D 83C4 14 add esp, 14
0057F150 61 popad
0057F151 - E9 8276EAFF jmp 004267D8
0057F156 - E9 BB75EAFF jmp 00426716
0057F15B 0000 add byte ptr [eax], al
0057F15D 0000 add byte ptr [eax], al
0057F15F 0000 add byte ptr [eax], al
0057F161 0000 add byte ptr [eax], al
0057F163 0000 add byte ptr [eax], al
0057F165 0000 add byte ptr [eax], al
0057F167 0000 add byte ptr [eax], al
0057F169 0000 add byte ptr [eax], al
0057F16B 90 nop
0057F16C 60 pushad
0057F16D 8BC6 mov eax, esi
0057F16F 83F8 0D cmp eax, 0D
0057F172 75 63 jnz short 0057F1D7
0057F174 E8 00000000 call 0057F179
0057F179 5D pop ebp
0057F17A 8B85 81ECF4FF mov eax, dword ptr [ebp+FFF4EC81]
0057F180 6A 01 push 1
0057F182 6A 04 push 4
0057F184 50 push eax
0057F185 E8 00000000 call 0057F18A
0057F18A 5D pop ebp
0057F18B 8D85 56BEF8FF lea eax, dword ptr [ebp+FFF8BE56]
0057F191 50 push eax
0057F192 E8 7521EEFF call _Readmemory
0057F197 83C4 10 add esp, 10
0057F19A FFB5 56BEF8FF push dword ptr [ebp+FFF8BE56]
0057F1A0 E8 A328EEFF call _Findmemory
0057F1A5 59 pop ecx
0057F1A6 85C0 test eax, eax
0057F1A8 74 2D je short 0057F1D7
0057F1AA 6A 10 push 10
0057F1AC E8 B102F3FF call <jmp.&USER32.GetKeyState>
0057F1B1 66:A9 0080 test ax, 8000
0057F1B5 6A 30 push 30
0057F1B7 6A 00 push 0
0057F1B9 74 0A je short 0057F1C5
0057F1BB FFB5 56BEF8FF push dword ptr [ebp+FFF8BE56]
0057F1C1 6A 00 push 0
0057F1C3 EB 08 jmp short 0057F1CD
0057F1C5 6A 00 push 0
0057F1C7 FFB5 56BEF8FF push dword ptr [ebp+FFF8BE56]
0057F1CD 6A 00 push 0
0057F1CF E8 44E4EAFF call _Setcpu
0057F1D4 83C4 14 add esp, 14
0057F1D7 61 popad
0057F1D8 55 push ebp
0057F1D9 E8 00000000 call 0057F1DE
0057F1DE 5D pop ebp
0057F1DF 8B85 1DECF4FF mov eax, dword ptr [ebp+FFF4EC1D]
0057F1E5 3B85 21ECF4FF cmp eax, dword ptr [ebp+FFF4EC21]
0057F1EB 5D pop ebp
0057F1EC - E9 B46EEAFF jmp 004260A5
0057F1F1 90 nop
004AF781 6A 10 push 10
004AF783 E8 DAFCFFFF call <jmp.&USER32.GetKeyState>
004AF788 90 nop
004AF789 . 66:A9 0080 test ax, 8000
004AF78D 74 20 je short 004AF7AF
004AF78F . 8B45 10 mov eax, dword ptr [ebp+10]
004AF792 . 0C 20 or al, 20
004AF794 . 83F8 63 cmp eax, 63
004AF797 . 75 07 jnz short 004AF7A0
004AF799 . BB 13000000 mov ebx, 13
004AF79E . EB 0A jmp short 004AF7AA
004AF7A0 > 83F8 76 cmp eax, 76
004AF7A3 . 75 0A jnz short 004AF7AF
004AF7A5 . BB 14000000 mov ebx, 14
004AF7AA >^ E9 A239F7FF jmp 00423151
004AF7AF > 833D 44274E00>cmp dword ptr [4E2744], 1
004AF7B6 .^ E9 7B0CF7FF jmp 00420436
004AF7BB 00 db 00
004AF7BC 6A 10 push 10
004AF7BE E8 9FFCFFFF call <jmp.&USER32.GetKeyState>
004AF7C3 90 nop
004AF7C4 66:A9 0080 test ax, 8000
004AF7C8 74 26 je short 004AF7F0
004AF7CA 837D 10 43 cmp dword ptr [ebp+10], 43
004AF7CE 75 07 jnz short 004AF7D7
004AF7D0 BF 76000000 mov edi, 76
004AF7D5 EB 14 jmp short 004AF7EB
004AF7D7 837D 10 56 cmp dword ptr [ebp+10], 56
004AF7DB 75 13 jnz short 004AF7F0
004AF7DD BF 77000000 mov edi, 77
004AF7E2 FFB3 85030000 push dword ptr [ebx+385]
004AF7E8 8F45 B0 pop dword ptr [ebp-50]
004AF7EB ^ E9 211CFAFF jmp 00451411
004AF7F0 E8 5B84FFFF call 004A7C50
004AF7F5 ^ E9 93F7F9FF jmp 0044EF8D