- UID
- 158075
- 帖子
- 262
- 主題
- 64
- 精華
- 0
- 積分
- 317
- 楓幣
- 9176
- 威望
- 307
- 存款
- 0
- 贊助金額
- 0
- 推廣
- 0
- GP
- 96
- 閱讀權限
- 30
- 性別
- 保密
- 在線時間
- 197 小時
- 註冊時間
- 2016-8-23
- 最後登入
- 2024-11-20
|
本帖最後由 ke90927 於 2019-1-20 22:06 編輯
- //TwMs213.2 近战无延迟 [ICS]
- //原创:ke90927
- //此数据转自GMS近战无延迟CRC【近战技能普攻都可以用,远程无效果】
- [Enable]
- Alloc(WDhook, 1024)
- Label(WDHack1)
- Label(WDHack2)
- WDhook:
- CMP [ESP+10],02285E39
- jne RtlEnterCriticalSection
- MOV [ESP+10],WDHack1
- jmp RtlEnterCriticalSection
- WDHack1:
- mov eax,[eax]
- push eax
- mov ecx,[ebp-0000126C]
- call 00AA2690
- push eax
- mov ecx,[ebp-0000124C]
- push ecx
- mov ecx,[ebp-00001248]
- add ecx,00000120
- call 00D01090
- push eax
- mov edx,[ebp-00001270]
- push edx
- call 00820390
- add esp,1C
- mov [ebp-000012C8],eax
- mov eax,[ebp-00001288]
- shl eax,05
- add eax,0392B618
- mov [ebp-00001284],eax
- mov [ebp-00001294],00000000
- mov [ebp-00001360],00000000
- mov ecx,[ebp-0000124C]
- push ecx
- call 00825C80
- add esp,04
- test eax,eax
- jne 022865A0
- mov edx,[ebp-0000124C]
- push edx
- call 007B0560
- add esp,04
- test eax,eax
- jne 022865A0
- mov eax,[ebp-0000124C]
- push eax
- call 005AA370
- add esp,04
- movzx ecx,al
- test ecx,ecx
- jne 022865A0
- mov edx,[ebp-0000124C]
- push edx
- call 007AD170
- add esp,04
- movzx eax,al
- test eax,eax
- jne 022865A0
- mov ecx,[ebp-0000124C]
- push ecx
- call 00839670
- add esp,04
- test eax,eax
- jne 022865A0
- mov edx,[ebp-0000124C]
- push edx
- call 0083C850
- add esp,04
- movzx eax,al
- test eax,eax
- jne 022865A0
- cmp [ebp-0000124C],0606D158
- je 022865A0
- cmp [ebp-0000124C],060523A6
- je 022865A0
- cmp [ebp-0000124C],04C4BB28
- je 022865A0
- cmp dword ptr [ebp-00001348],00
- jne 022865A0
- lea ecx,[ebp-000012B0]
- call 00868090
- test eax,eax
- je 022865A0
- cmp [ebp-0000124C],027374F7
- je 022865A0
- cmp [ebp-0000124C],0280E26A
- je 022865A0
- cmp [ebp-0000124C],04C4DF26
- je 022865A0
- mov ecx,[ebp-0000124C]
- push ecx
- call 02350B80
- add esp,04
- movzx edx,al
- test edx,edx
- jne 022865A0
- cmp dword ptr [ebx+08],00
- je WDHack2
- mov ecx,[ebx+08]
- call 02347EB0
- test eax,eax
- jne 022865A0
- WDHack2:
- mov ecx,[ebp-00001248]
- call 02348010
- movzx eax,al
- test eax,eax
- jmp 022865A0
- cmp dword ptr [ebx+3C],00
- jmp 02285FFB
- 03916A34:
- DD WDhook
- [Disable]
- 03916A34:
- DD RtlEnterCriticalSection
- DeAlloc(WDGod)
複製代碼 |
|