- UID
- 158075
- 帖子
- 262
- 主題
- 64
- 精華
- 0
- 積分
- 317
- 楓幣
- 9134
- 威望
- 307
- 存款
- 0
- 贊助金額
- 0
- 推廣
- 0
- GP
- 96
- 閱讀權限
- 30
- 性別
- 保密
- 在線時間
- 197 小時
- 註冊時間
- 2016-8-23
- 最後登入
- 2024-11-12
|
本帖最後由 ke90927 於 2019-1-20 22:10 編輯
- //TwMs213.2 全职无延迟 [ICS]
- //原创:ke90927
- //此数据转自GMS全职无延迟CRC,貌似容易DC
- [ENABLE]
- alloc(hook,1024)
- Label(Hack1)
- Label(Hack2)
- Label(Hack3)
- Label(Hack4)
- Label(Hack5)
- Label(Hack6)
- Label(Hack7)
- hook:
- cmp [esp+C],0227D659
- jne Hack1
- mov [esp+C],Hack1
- jmp 00D63460
- //陆服SEP是C,对照CEM后。陆服大于台服8个字节。如C没效果,请用4或者8。因为没有客户端无法测试,还请见谅!
- Hack1:
- test eax,eax
- je Hack2
- mov [ebp-00002A78],00000000
- mov [ebp-04],FFFFFFFF
- lea ecx,[ebp-000012D4]
- call 00F3E1E0
- mov eax,[ebp-00002A78]
- jmp 0229F9D1
- Hack2:
- mov ecx,[ebp-00001248]
- add ecx,04
- mov edx,[ebp-00001248]
- mov eax,[edx+04]
- mov edx,[eax+24]
- call edx
- mov [ebp-00001320],eax
- mov [ebp-00001370],00000000
- movzx eax,byte ptr [ebx+44]
- test eax,eax
- je Hack3
- mov ecx,[ebp-00001248]
- mov edx,[ecx+00014E64]
- push edx
- call 02346840
- mov ecx,eax
- call 023B0BA0
- mov [ebp-00001370],eax
- cmp dword ptr [ebp-00001370],00
- jne Hack4
- mov [ebp-00002A7C],00000000
- mov [ebp-04],FFFFFFFF
- lea ecx,[ebp-000012D4]
- call 00F3E1E0
- mov eax,[ebp-00002A7C]
- jmp 0229F9D1
- Hack4:
- mov ecx,[ebp-00001370]
- add ecx,04
- mov eax,[ebp-00001370]
- mov edx,[eax+04]
- mov eax,[edx+24]
- call eax
- mov [ebp-00001320],eax
- Hack3:
- cmp dword ptr [ebp-0000124C],00
- je Hack5
- mov ecx,[ebp-00001248]
- mov edx,[ebp-0000124C]
- cmp edx,[ecx+00015268]
- je Hack6
- mov eax,[ebp-00001248]
- mov ecx,[ebp-0000124C]
- cmp ecx,[eax+000152CC]
- jne Hack5
- Hack6:
- mov [ebp-00002150],00000001
- jmp Hack7
- Hack5:
- mov [ebp-00002150],00000001
- Hack7:
- mov edx,[ebp-00002150]
- jmp 0227D76C
- 02E12D08:
- DD hook
- [DISABLE]
- 02E12D08:
- dd 00D63460
- dealloc(hook)
複製代碼 |
|