冰楓論壇

標題: TWMS213.2 近战无延迟 [ICS] [打印本頁]

作者: ke90927    時間: 2019-1-20 19:37
標題: TWMS213.2 近战无延迟 [ICS]
本帖最後由 ke90927 於 2019-1-20 22:06 編輯
  1. //TWMS213.2 近战无延迟 [ICS]
  2. //原创:ke90927
  3. //此数据转自GMS近战无延迟CRC【近战技能普攻都可以用,远程无效果】
  4. [Enable]
  5. Alloc(WDhook, 1024)
  6. Label(WDHack1)
  7. Label(WDHack2)

  8. WDhook:
  9. CMP [ESP+10],02285E39
  10. jne RtlEnterCriticalSection
  11. MOV [ESP+10],WDHack1
  12. jmp RtlEnterCriticalSection

  13. WDHack1:
  14. mov eax,[eax]
  15. push eax
  16. mov ecx,[ebp-0000126C]
  17. call 00AA2690
  18. push eax
  19. mov ecx,[ebp-0000124C]
  20. push ecx
  21. mov ecx,[ebp-00001248]
  22. add ecx,00000120
  23. call 00D01090
  24. push eax
  25. mov edx,[ebp-00001270]
  26. push edx
  27. call 00820390
  28. add esp,1C
  29. mov [ebp-000012C8],eax
  30. mov eax,[ebp-00001288]
  31. shl eax,05
  32. add eax,0392B618
  33. mov [ebp-00001284],eax
  34. mov [ebp-00001294],00000000
  35. mov [ebp-00001360],00000000
  36. mov ecx,[ebp-0000124C]
  37. push ecx
  38. call 00825C80
  39. add esp,04
  40. test eax,eax
  41. jne 022865A0
  42. mov edx,[ebp-0000124C]
  43. push edx
  44. call 007B0560
  45. add esp,04
  46. test eax,eax
  47. jne 022865A0
  48. mov eax,[ebp-0000124C]
  49. push eax
  50. call 005AA370
  51. add esp,04
  52. movzx ecx,al
  53. test ecx,ecx
  54. jne 022865A0
  55. mov edx,[ebp-0000124C]
  56. push edx
  57. call 007AD170
  58. add esp,04
  59. movzx eax,al
  60. test eax,eax
  61. jne 022865A0
  62. mov ecx,[ebp-0000124C]
  63. push ecx
  64. call 00839670
  65. add esp,04
  66. test eax,eax
  67. jne 022865A0
  68. mov edx,[ebp-0000124C]
  69. push edx
  70. call 0083C850
  71. add esp,04
  72. movzx eax,al
  73. test eax,eax
  74. jne 022865A0
  75. cmp [ebp-0000124C],0606D158
  76. je 022865A0
  77. cmp [ebp-0000124C],060523A6
  78. je 022865A0
  79. cmp [ebp-0000124C],04C4BB28
  80. je 022865A0
  81. cmp dword ptr [ebp-00001348],00
  82. jne 022865A0
  83. lea ecx,[ebp-000012B0]
  84. call 00868090
  85. test eax,eax
  86. je 022865A0
  87. cmp [ebp-0000124C],027374F7
  88. je 022865A0
  89. cmp [ebp-0000124C],0280E26A
  90. je 022865A0
  91. cmp [ebp-0000124C],04C4DF26
  92. je 022865A0
  93. mov ecx,[ebp-0000124C]
  94. push ecx
  95. call 02350B80
  96. add esp,04
  97. movzx edx,al
  98. test edx,edx
  99. jne 022865A0
  100. cmp dword ptr [ebx+08],00
  101. je WDHack2
  102. mov ecx,[ebx+08]
  103. call 02347EB0
  104. test eax,eax
  105. jne 022865A0
  106. WDHack2:
  107. mov ecx,[ebp-00001248]
  108. call 02348010
  109. movzx eax,al
  110. test eax,eax
  111. jmp 022865A0
  112. cmp dword ptr [ebx+3C],00
  113. jmp 02285FFB

  114. 03916A34:
  115. DD WDhook

  116. [Disable]
  117. 03916A34:
  118. DD RtlEnterCriticalSection
  119. DeAlloc(WDGod)
複製代碼

作者: yutsaihsieh    時間: 2019-1-20 20:18
//crc
[ENABLE]
02285FF1:
jmp 022865A0
nop



[DISABLE]
02285FF1:
je 022865A0
作者: JK輔助    時間: 2019-1-20 20:43
會崩潰
作者: ke90927    時間: 2019-1-20 20:48
本帖最後由 ke90927 於 2019-1-20 20:51 編輯
JK輔助 發表於 2019-1-20 20:43
會崩潰


打开CE读取下 03916A34值,我这边是大陆电脑。可能API特征不一样

作者: wujohn    時間: 2019-1-21 10:50
打太快 很容易斷線 , 還是用接技 快又穩定 ..




歡迎光臨 冰楓論壇 (https://bingfong.com/) Powered by 冰楓