奇迹S6 客户端附魔系统ASM代码
__declspec(naked) void AddItemText()
{
const char * gMsg="【www.itg.world】";
__asm{
PUSH gMsg
MOV EAX,DWORD PTR DS:[0x7BB0894]
LEA EAX,DWORD PTR DS:[EAX+EAX*0x4]
LEA EDX,DWORD PTR DS:[EAX+EAX*0x4]
LEA EAX,DWORD PTR DS:[EDX*0x4+0x7B7DE78]
PUSH EAX
MOV ESI,0x0836EB8
CALL ESI
MOV EAX,DWORD PTR DS:[0x7BB0894]
MOV ESI,0x1
ADD ESP,0x8
MOV DWORD PTR DS:[EAX*0x4+0x7B7EFDC],ESI
MOV DWORD PTR DS:[EAX*0x4+0x7BAE0A8],EBX
INC EAX
PUSH 0x8F9
MOV DWORD PTR DS:[0x7BB0894],EAX
MOV ECX,0x7A50230
MOV ESI,0x0402F50
CALL ESI
PUSH EAX
MOV EAX,DWORD PTR DS:[0x7BB0894]
LEA EAX,DWORD PTR DS:[EAX+EAX*0x4]
LEA ECX,DWORD PTR DS:[EAX+EAX*0x4]
LEA EDX,DWORD PTR DS:[ECX*0x4+0x7B7DE78]
PUSH EDX
MOV ESI,0x0836EB8
CALL ESI
MOV EAX,DWORD PTR DS:[0x7BB0894]
ADD ESP,0x8
MOV ECX,0x7A50230
MOV DWORD PTR DS:[EAX*0x4+0x7B7EFDC],ESI
MOV DWORD PTR DS:[EAX*0x4+0x7BAE0A8],EBX
INC EAX
PUSH 0xA07
MOV DWORD PTR DS:[0x7BB0894],EAX
MOV ESI,0x0402F50
CALL ESI
PUSH EAX
MOV EAX,DWORD PTR DS:[0x7BB0894]
LEA EAX,DWORD PTR DS:[EAX+EAX*0x4]
LEA EAX,DWORD PTR DS:[EAX+EAX*0x4]
LEA ECX,DWORD PTR DS:[EAX*0x4+0x7B7DE78]
PUSH ECX
MOV ESI,0x0836EB8
CALL ESI
MOV EAX,DWORD PTR DS:[0x7BB0894]
MOV ESI,0x3
ADD ESP,0x8
MOV DWORD PTR DS:[EAX*0x4+0x7B7EFDC],ESI
MOV DWORD PTR DS:[EAX*0x4+0x7BAE0A8],EBX
INC EAX
MOV DWORD PTR DS:[0x7BB0894],EAX
CMP CX,0x1A2C
MOV EAX,0x0058D6C5
JMP EAX
}
}//0058D6C5 |. /0F85 E0000000 JNZ 0058D7AB