游戏反汇编 武林走路call
2009-09-05 13:20
288 查看
0046627D |. D81D 98098800 FCOMP DWORD PTR DS:[880998]
00466283 |. DFE0 FSTSW AX
00466285 |. F6C4 41 TEST AH,41
00466288 |. 0F85 3C040000 JNZ ElementC.004666CA
0046628E |. 8B8B 18090000 MOV ECX,DWORD PTR DS:[EBX+918]
00466294 |. 6A 01 PUSH 1
00466296 |. E8 E56A0000 CALL ElementC.0046CD80
0046629B |. 8D4C24 50 LEA ECX,DWORD PTR SS:[ESP+50]
0046629F |. 8BF0 MOV ESI,EAX
004662A1 |. 33FF XOR EDI,EDI
004662A3 |. 51 PUSH ECX ; /Arg2
004662A4 |. 57 PUSH EDI ; |Arg1 => 00000000
004662A5 |. 8BCE MOV ECX,ESI ; |
004662A7 |. E8 64B20000 CALL ElementC.00471510 ; /elementc.00471510
004662AC |. 8D9424 900000>LEA EDX,DWORD PTR SS:[ESP+90]
004662B3 |. 8D8424 840000>LEA EAX,DWORD PTR SS:[ESP+84]
004662BA |. 52 PUSH EDX ; /Arg2
004662BB |. 50 PUSH EAX ; |Arg1
004662BC |. 8BCE MOV ECX,ESI ; |
004662BE |. E8 7DB30000 CALL ElementC.00471640 ; /elementc.00471640
004662C3 |. 8B8B 18090000 MOV ECX,DWORD PTR DS:[EBX+918]
004662C9 |. 57 PUSH EDI
004662CA |. 6A 01 PUSH 1
004662CC |. 56 PUSH ESI
004662CD |. 6A 01 PUSH 1
004662CF |. E8 1C6F0000 CALL ElementC.0046D1F0
004662D4 |. 833D B04F9500>CMP DWORD PTR DS:[954FB0],1
004662DB |. 0F85 E9030000 JNZ ElementC.004666CA
目标x,y坐标为浮点数!
Function Call_RunTO()
Dim asm As New clsASM '自动走路!
Const W1_Address = &H46CD80
Const W2_Address = &H471510
Const W3_Address = &H46D1F0
With asm
.Pushad
.Mov_EAX_DWORD_Ptr jizi
.Mov_EAX_DWORD_Ptr_EAX_Add &H1C
.Mov_EBX_DWORD_Ptr_EAX_Add &H24
.Mov_ECX_DWORD_Ptr_EBX_Add &H918
.Push 1
.Mov_EAX W1_Address
.Call_EAX
.Lea_ECX_DWORD_Ptr_ESP_Add &H50
.Mov_ESI_EAX
.Push_ECX
.Push 0
.Mov_ECX_ESI
.Mov_EAX W2_Address
.Call_EAX
.Mov_ECX_DWORD_Ptr_EBX_Add &H918
.Push 0
.Push 1
.Push_ESI
.Push 1
.Mov_EAX W3_Address
.Call_EAX
.Mov_EAX_DWORD_Ptr jizi
.Mov_EAX_DWORD_Ptr_EAX_Add &H1C
.Mov_EAX_DWORD_Ptr_EAX_Add &H24
.Mov_EAX_DWORD_Ptr_EAX_Add &H918
.Mov_EAX_DWORD_Ptr_EAX_Add &H30
.Mov_ECX_DWORD_Ptr_EAX_Add &H4
.Mov_EAX_ECX
.Mov_DWORD_Ptr_EAX_ADD &H20, Float2Int(X)
.Mov_DWORD_Ptr_EAX_ADD &H28, Float2Int(Y)
.Popad
.Ret
End With
asm.Run_ASM pid
End Function
00466283 |. DFE0 FSTSW AX
00466285 |. F6C4 41 TEST AH,41
00466288 |. 0F85 3C040000 JNZ ElementC.004666CA
0046628E |. 8B8B 18090000 MOV ECX,DWORD PTR DS:[EBX+918]
00466294 |. 6A 01 PUSH 1
00466296 |. E8 E56A0000 CALL ElementC.0046CD80
0046629B |. 8D4C24 50 LEA ECX,DWORD PTR SS:[ESP+50]
0046629F |. 8BF0 MOV ESI,EAX
004662A1 |. 33FF XOR EDI,EDI
004662A3 |. 51 PUSH ECX ; /Arg2
004662A4 |. 57 PUSH EDI ; |Arg1 => 00000000
004662A5 |. 8BCE MOV ECX,ESI ; |
004662A7 |. E8 64B20000 CALL ElementC.00471510 ; /elementc.00471510
004662AC |. 8D9424 900000>LEA EDX,DWORD PTR SS:[ESP+90]
004662B3 |. 8D8424 840000>LEA EAX,DWORD PTR SS:[ESP+84]
004662BA |. 52 PUSH EDX ; /Arg2
004662BB |. 50 PUSH EAX ; |Arg1
004662BC |. 8BCE MOV ECX,ESI ; |
004662BE |. E8 7DB30000 CALL ElementC.00471640 ; /elementc.00471640
004662C3 |. 8B8B 18090000 MOV ECX,DWORD PTR DS:[EBX+918]
004662C9 |. 57 PUSH EDI
004662CA |. 6A 01 PUSH 1
004662CC |. 56 PUSH ESI
004662CD |. 6A 01 PUSH 1
004662CF |. E8 1C6F0000 CALL ElementC.0046D1F0
004662D4 |. 833D B04F9500>CMP DWORD PTR DS:[954FB0],1
004662DB |. 0F85 E9030000 JNZ ElementC.004666CA
目标x,y坐标为浮点数!
Function Call_RunTO()
Dim asm As New clsASM '自动走路!
Const W1_Address = &H46CD80
Const W2_Address = &H471510
Const W3_Address = &H46D1F0
With asm
.Pushad
.Mov_EAX_DWORD_Ptr jizi
.Mov_EAX_DWORD_Ptr_EAX_Add &H1C
.Mov_EBX_DWORD_Ptr_EAX_Add &H24
.Mov_ECX_DWORD_Ptr_EBX_Add &H918
.Push 1
.Mov_EAX W1_Address
.Call_EAX
.Lea_ECX_DWORD_Ptr_ESP_Add &H50
.Mov_ESI_EAX
.Push_ECX
.Push 0
.Mov_ECX_ESI
.Mov_EAX W2_Address
.Call_EAX
.Mov_ECX_DWORD_Ptr_EBX_Add &H918
.Push 0
.Push 1
.Push_ESI
.Push 1
.Mov_EAX W3_Address
.Call_EAX
.Mov_EAX_DWORD_Ptr jizi
.Mov_EAX_DWORD_Ptr_EAX_Add &H1C
.Mov_EAX_DWORD_Ptr_EAX_Add &H24
.Mov_EAX_DWORD_Ptr_EAX_Add &H918
.Mov_EAX_DWORD_Ptr_EAX_Add &H30
.Mov_ECX_DWORD_Ptr_EAX_Add &H4
.Mov_EAX_ECX
.Mov_DWORD_Ptr_EAX_ADD &H20, Float2Int(X)
.Mov_DWORD_Ptr_EAX_ADD &H28, Float2Int(Y)
.Popad
.Ret
End With
asm.Run_ASM pid
End Function
相关文章推荐
- 一款游戏的喊话CALL的解决新思路
- 汇编语言笔记10-CALL和RET指令
- 汇编call 和retn
- 武林外传点击选怪call
- 170410 汇编-ret和call,OD-基本操作
- [置顶] [汇编学习笔记][第十章 CALL和RET指令]
- 汇编语言学习第十章-CALL和RET指令
- 忍不住为游戏音乐疯狂打Call!
- 汇编: 以实例分析 INVOKE 和 call区别
- 简单谈下 怎么避免游戏检测非法调用call
- 汇编学习---子程序之call的四种参数传递
- 网络游戏中,对于无法使用封包断点进行分析找call的一种方法[以背包整理为例]
- 找游戏关键CALL入门
- 游戏注入CALL
- __stdcall 与 __cdecl 区别 (汇编 call ret 时,栈的变化)
- 汇编利用call后续区传递参数
- 武林(117版)发言Call(VC版)
- 汇编笔记 CALL(1)
- 从游戏中得到动态内存数据(汇编+VC 例子:疯狂坦克的X坐标)
- 一步步学习汇编(11)之Call和ret指令(破解软件的必修课二)