• 6759阅读
  • 8回复

郁金香YY公开课20141123录像 [复制链接]

上一主题 下一主题
在线啊冲
 

只看楼主 倒序阅读 使用道具 楼主  发表于: 2014-11-24
— 本帖被 啊冲 执行加亮操作(2014-11-24) —


郁金香老师的YY公开课,由于网速问题,老师多次断网,整体课程只由啊冲录制了片段。另外,教程中的内容郁金香老师自己又单独录制了一遍。


顺便说一句:该死的破网



http://yunpan.cn/cA2GxpkX9jAnh  提取码 6cd6



链接:http://pan.baidu.com/s/172iF8 密码:9u8o


http://cloud.189.cn/t/bM7RVrbia2yi  (郁金香老师)



20141123
115网盘礼包码:5lbclth018hw
http://115.com/lb/5lbclth018hw

善者 慈悲心常在 无怨无恨 以苦为乐
默认压缩密码www.hifyl.com
文件分享密码问题:http://www.hifyl.com/read-htm-tid-4444.html
在线啊冲

只看该作者 沙发  发表于: 2014-11-24
http://www.hifyl.com
http://www.yjxsoft.com


QQ 150330575
选怪:
  
  选怪CALL //自动选怪
  {    
       call //自动取怪物ID
        {
          
       CALL call //选怪
           {
             id=1122;//换怪物 标志 身份证
           }
         }
  }
  

0041F57E - CC - int 3
0041F57F - CC - int 3
0041F580 - A1 BC1A9B00 - mov eax,[Game.exe+5B1ABC] <<
0041F585 - 40 - inc eax
0041F586 - 3D 00020000 - cmp eax,00000200


00303777 - 89 48 04  - mov [eax+04],ecx
0030377A - 8B 57 08  - mov edx,[edi+08]
0030377D - 89 50 08  - mov [eax+08],edx <<
00303780 - E9 9BFCFFFF - jmp luaplus.luaopen_table+1D10
00303785 - 8B C6  - mov eax,esi


0070DFA1    8B55 14         MOV EDX,DWORD PTR SS:[EBP+0x14]
0070DFA4    52              PUSH EDX
0070DFA5    8B55 10         MOV EDX,DWORD PTR SS:[EBP+0x10]
0070DFA8    52              PUSH EDX
0070DFA9    C705 EC123201 0>MOV DWORD PTR DS:[0x13212EC],0x5208
0070DFB3    8B49 40         MOV ECX,DWORD PTR DS:[ECX+0x40]
0070DFB6    50              PUSH EAX
0070DFB7    E8 E4170000     CALL Game.0070F7A0                       ; 按键处理CALL //
0070DFBC    C705 EC123201 F>MOV DWORD PTR DS:[0x13212EC],0x55F0
0070DFC6    33C0            XOR EAX,EAX
0070DFC8    5D              POP EBP
0070DFC9    C2 1000         RETN 0x10


007121CF    8B48 14         MOV ECX,DWORD PTR DS:[EAX+0x14]
007121D2    85C9            TEST ECX,ECX
007121D4    74 0C           JE SHORT Game.007121E2
007121D6    8B10            MOV EDX,DWORD PTR DS:[EAX]
007121D8    52              PUSH EDX
007121D9    8D45 FC         LEA EAX,DWORD PTR SS:[EBP-0x4]
007121DC    50              PUSH EAX
007121DD    FFD1            CALL ECX                                 ; CTRL+TAB
007121DF    83C4 08         ADD ESP,0x8
007121E2    C705 EC123201 D>MOV DWORD PTR DS:[0x13212EC],0x52D0
007121EC    5F              POP EDI

int i;
i=10009 //&i


sub esp,4
mov ecx,esp
push 19
push ecx
mov ecx,007134B0
call ecx
add esp,0c


Breakpoints
地址       模块       激活                       反汇编                                注释
0041F580   Game       已禁止                        MOV EAX,DWORD PTR DS:[0x9B1ABC]
0042295F   Game       已禁止                        CALL DWORD PTR DS:[EAX+0x64]
00425988   Game       已禁止                        CALL DWORD PTR DS:[EBX+0x50]
007121DD   Game       始终                          CALL ECX                              CTRL+TAB
007357A4   Game       已禁止                        CALL Game.0041F580



007121A6   /75 04           JNZ SHORT Game.007121AC
007121A8   |84DB            TEST BL,BL
007121AA   |74 0A           JE SHORT Game.007121B6
007121AC   \8B4F 10         MOV ECX,DWORD PTR DS:[EDI+0x10]
007121AF    8A41 19         MOV AL,BYTE PTR DS:[ECX+0x19]
007121B2    84C0            TEST AL,AL
007121B4    74 36           JE SHORT Game.007121EC
007121B6    8A45 0B         MOV AL,BYTE PTR SS:[EBP+0xB]
007121B9    C705 EC123201 6>MOV DWORD PTR DS:[0x13212EC],0x526C
007121C3    84C0            TEST AL,AL
007121C5    8B47 10         MOV EAX,DWORD PTR DS:[EDI+0x10]
007121C8    74 05           JE SHORT Game.007121CF
007121CA    8B48 10         MOV ECX,DWORD PTR DS:[EAX+0x10]
007121CD    EB 03           JMP SHORT Game.007121D2
007121CF    8B48 14         MOV ECX,DWORD PTR DS:[EAX+0x14]
007121D2    85C9            TEST ECX,ECX
007121D4    74 0C           JE SHORT Game.007121E2
007121D6    8B10            MOV EDX,DWORD PTR DS:[EAX]
007121D8    52              PUSH EDX                                 ; 19
007121D9    8D45 FC         LEA EAX,DWORD PTR SS:[EBP-0x4]           ; [018FAE0]==00010009
007121DC    50              PUSH EAX
007121DD    FFD1            CALL ECX                                 ; CTRL+TAB
007121DF    83C4 08         ADD ESP,0x8
007121E2    C705 EC123201 D>MOV DWORD PTR DS:[0x13212EC],0x52D0
007121EC    5F              POP EDI
007121ED    5E              POP ESI
007121EE    5B              POP EBX
007121EF    8BE5            MOV ESP,EBP
007121F1    5D              POP EBP
007121F2    C2 0C00         RETN 0xC

善者 慈悲心常在 无怨无恨 以苦为乐
默认压缩密码www.hifyl.com
文件分享密码问题:http://www.hifyl.com/read-htm-tid-4444.html
在线啊冲

只看该作者 板凳  发表于: 2014-11-24
http://www.hifyl.com
http://www.yjxsoft.com


QQ 150330575


0607B1F5 - 53 - push ebx
0607B1F6 - 8D 8E DC000000  - lea ecx,[esi+000000DC]
0607B1FC - 89 5E 14  - mov [esi+14],ebx <<  pass
0607B1FF - 88 9E D0000000  - mov [esi+000000D0],bl
0607B205 - 89 9E D4000000  - mov [esi+000000D4],ebx

06076EC0 - 8B 44 24 04  - mov eax,[esp+04]
06076EC4 - 8A 54 24 08  - mov dl,[esp+08]
06076EC8 - 89 41 14  - mov [ecx+14],eax <<
06076ECB - 88 91 D9000000  - mov [ecx+000000D9],dl
06076ED1 - C2 0800 - ret 0008


0050282F - 8D 04 40   - lea eax,[eax+eax*2]
00502832 - 8D 04 C2   - lea eax,[edx+eax*8]
00502835 - 8B 40 08  - mov eax,[eax+08] <<
00502838 - 8B 11  - mov edx,[ecx]
0050283A - 56 - push esi
..

0C4A33BB - 8B 4C 24 08  - mov ecx,[esp+08]
0C4A33BF - 83 C4 04 - add esp,04
0C4A33C2 - 88 81 95050000  - mov [ecx+00000595],al <<
0C4A33C8 - C2 0800 - ret 0008
0C4A33CB - CC - int 3


005024E5 - 8B F1  - mov esi,ecx
005024E7 - 8B 4E 44  - mov ecx,[esi+44]
005024EA - 8B 01  - mov eax,[ecx] <<
005024EC - 3B C1  - cmp eax,ecx
005024EE - 89 45 FC  - mov [ebp-04],eax



006F2731
00887CE8
00839E3C
0081A6F1
006EF301
004228C1

006F26CE
00887CE8
00839E3C


003B3495 - 8B 48 04  - mov ecx,[eax+04]
003B3498 - 89 4F 04  - mov [edi+04],ecx
003B349B - 8B 50 08  - mov edx,[eax+08] <<
003B349E - 89 57 08  - mov [edi+08],edx
003B34A1 - E9 7AFFFFFF - jmp luaplus.luaopen_table+1D10

003B3777 - 89 48 04  - mov [eax+04],ecx
003B377A - 8B 57 08  - mov edx,[edi+08]
003B377D - 89 50 08  - mov [eax+08],edx <<
003B3780 - E9 9BFCFFFF - jmp luaplus.luaopen_table+1D10
003B3785 - 8B C6  - mov eax,esi


00714E46
00766E45
0081CA69
00715008
0089F76C
004023FB
00402483
007F39D2
00715227


00714E1F   C645 FC 01       MOV BYTE PTR SS:[EBP-0x4],0x1
00714E23   FF15 28848300    CALL DWORD PTR DS:[0x838428]             ; msvcp71.?data@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
00714E29   50               PUSH EAX
00714E2A   8BCF             MOV ECX,EDI
00714E2C   E8 CFF8FFFF      CALL Game.00714700
00714E31   8B0D BC2F3201    MOV ECX,DWORD PTR DS:[0x1322FBC]
00714E37   8B11             MOV EDX,DWORD PTR DS:[ECX]
00714E39   FF52 3C          CALL DWORD PTR DS:[EDX+0x3C]
00714E3C   8B00             MOV EAX,DWORD PTR DS:[EAX]
00714E3E   53               PUSH EBX
00714E3F   50               PUSH EAX
00714E40   FF15 5C838300    CALL DWORD PTR DS:[0x83835C]             ; LuaPlus.lua_dostring
00714E46   8B45 E4          MOV EAX,DWORD PTR SS:[EBP-0x1C]
00714E49   83C4 08          ADD ESP,0x8
00714E4C   85C0             TEST EAX,EAX
00714E4E   74 17            JE SHORT Game.00714E67
00714E50   8B35 BC2F3201    MOV ESI,DWORD PTR DS:[0x1322FBC]



00714E46
00766E45
0081CA69
00715008
0089F76C
004023FB
00402483
007F39D2
0088BA90
00715227
0088B9DC
0081CA92
007145CF
0096A338
0074696C
006F104B
00839924
006F24BC
00882214
00746E65
00839924
00839924
00839924
00882214
006F285B
006F2872
00881594
008509BC
008509BC
008509BC
00734594
007372AE
006C4A32
008183F8
006C4DAD
00408047

(pointer)Game.exe+314E46
(pointer)Game.exe+366E45
(pointer)Game.exe+41CA69
(pointer)Game.exe+315008
(pointer)Game.exe+49F76C
(pointer)Game.exe+23FB
(pointer)Game.exe+2483
(pointer)Game.exe+3F39D2
(pointer)Game.exe+48BA90
(pointer)Game.exe+315227
(pointer)Game.exe+48B9DC
(pointer)Game.exe+41CA92
(pointer)Game.exe+3145CF
(pointer)Game.exe+56A338
(pointer)Game.exe+34696C
(pointer)Game.exe+2F104B
(pointer)Game.exe+439924
(pointer)Game.exe+2F24BC
(pointer)Game.exe+482214
(pointer)Game.exe+346E65
(pointer)Game.exe+439924
(pointer)Game.exe+439924
(pointer)Game.exe+439924
(pointer)Game.exe+482214
(pointer)Game.exe+2F285B
(pointer)Game.exe+2F2872
(pointer)Game.exe+481594
(pointer)Game.exe+4509BC
(pointer)Game.exe+4509BC
(pointer)Game.exe+4509BC
(pointer)Game.exe+334594
(pointer)Game.exe+3372AE
(pointer)Game.exe+2C4A32
(pointer)Game.exe+4183F8
(pointer)Game.exe+2C4DAD
(pointer)Game.exe+8047

通过选怪ID回溯
006F2731
00887CE8
00839E3C
006EF301 //006EF2FE   FF52 40          CALL DWORD PTR DS:[EDX+0x40]             ; 选怪CALL


0081A4F9
004228C1
008414E8
00EC0251
00EC0251
006C433E
007F6CC0
00457EAD
008414E8
004236F7
0042237C
007F6C95
007F88AB
006E7024
006E734F
0070F787
00402390
006C2E03
006E75C2
00839920
00839920
00839920
006F24BC
00882220
00839920
00839920
00882220
006F285B
006F2872
006C4A80
006C4A80
006F104B
00839924
006F24BC
0088220C


0070DF81   3D 00020000      CMP EAX,0x200
0070DF86   73 44            JNB SHORT Game.0070DFCC
0070DF88   8D90 00FFFFFF    LEA EDX,DWORD PTR DS:[EAX-0x100]
0070DF8E   83FA 05          CMP EDX,0x5
0070DF91   77 70            JA SHORT Game.0070E003
0070DF93   0FB692 54E07000  MOVZX EDX,BYTE PTR DS:[EDX+0x70E054]
0070DF9A   FF2495 4CE07000  JMP DWORD PTR DS:[EDX*4+0x70E04C]
0070DFA1   8B55 14          MOV EDX,DWORD PTR SS:[EBP+0x14]
0070DFA4   52               PUSH EDX
0070DFA5   8B55 10          MOV EDX,DWORD PTR SS:[EBP+0x10]
0070DFA8   52               PUSH EDX
0070DFA9   C705 EC123201 08>MOV DWORD PTR DS:[0x13212EC],0x5208
0070DFB3   8B49 40          MOV ECX,DWORD PTR DS:[ECX+0x40]
0070DFB6   50               PUSH EAX
0070DFB7   E8 E4170000      CALL Game.0070F7A0                       ; 按键CALL F1—F10等
0070DFBC   C705 EC123201 F0>MOV DWORD PTR DS:[0x13212EC],0x55F0
0070DFC6   33C0             XOR EAX,EAX
0070DFC8   5D               POP EBP
0070DFC9   C2 1000          RETN 0x10
0070DFCC   8B45 14          MOV EAX,DWORD PTR SS:[EBP+0x14]
0070DFCF   0FBFD0           MOVSX EDX,AX

00425982   FF50 40          CALL DWORD PTR DS:[EAX+0x40]
00425985   50               PUSH EAX                                 ; 怪物下标
00425986   8BCE             MOV ECX,ESI
00425988   FF53 50          CALL DWORD PTR DS:[EBX+0x50]             ; 自动选怪
0042598B   8D4D D4          LEA ECX,DWORD PTR SS:[EBP-0x2C]
0042598E   C647 73 01       MOV BYTE PTR DS:[EDI+0x73],0x1
00425992   C645 FC 00       MOV BYTE PTR SS:[EBP-0x4],0x0
00425996   FF15 B0838300    CALL DWORD PTR DS:[0x8383B0]             ; msvcp71.??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
0042599C   8B5D B0          MOV EBX,DWORD PTR SS:[EBP-0x50]
0042599F   85DB             TEST EBX,EBX
004259A1   5E               POP ESI
004259A2   74 09            JE SHORT Game.004259AD
004259A4   53               PUSH EBX
004259A5   E8 86DF3C00      CALL Game.007F3930                       ; JMP 到 msvcr71.??3@YAXPAX@Z
004259AA   83C4 04          ADD ESP,0x4
004259AD   8BC7             MOV EAX,EDI
004259AF   5B               POP EBX
004259B0   8B4D F4          MOV ECX,DWORD PTR SS:[EBP-0xC]
004259B3   64:890D 00000000 MOV DWORD PTR FS:[0],ECX
004259BA   8B4D F0          MOV ECX,DWORD PTR SS:[EBP-0x10]
004259BD   33CD             XOR ECX,EBP
004259BF   5F               POP EDI


0071215D   FF12             CALL DWORD PTR DS:[EDX]
0071215F   8338 4D          CMP DWORD PTR DS:[EAX],0x4D
00712162   75 04            JNZ SHORT Game.00712168
00712164   B3 01            MOV BL,0x1
00712166   EB 2E            JMP SHORT Game.00712196
00712168   8B0D 10199B00    MOV ECX,DWORD PTR DS:[0x9B1910]
0071216E   8B01             MOV EAX,DWORD PTR DS:[ECX]
00712170   FF50 40          CALL DWORD PTR DS:[EAX+0x40]
00712173   85C0             TEST EAX,EAX
00712175   74 1D            JE SHORT Game.00712194
00712177   8B0D 10199B00    MOV ECX,DWORD PTR DS:[0x9B1910]
0071217D   8B11             MOV EDX,DWORD PTR DS:[ECX]
0071217F   FF52 40          CALL DWORD PTR DS:[EDX+0x40]
00712182   8B10             MOV EDX,DWORD PTR DS:[EAX]
00712184   8BC8             MOV ECX,EAX
00712186   FF12             CALL DWORD PTR DS:[EDX]
00712188   8138 42020000    CMP DWORD PTR DS:[EAX],0x242
0071218E   75 04            JNZ SHORT Game.00712194
00712190   B3 01            MOV BL,0x1
00712192   EB 02            JMP SHORT Game.00712196
00712194   32DB             XOR BL,BL
00712196   85F6             TEST ESI,ESI
00712198   74 1C            JE SHORT Game.007121B6
0071219A   8B06             MOV EAX,DWORD PTR DS:[ESI]
0071219C   8BCE             MOV ECX,ESI
0071219E   FF90 80010000    CALL DWORD PTR DS:[EAX+0x180]
007121A4   85C0             TEST EAX,EAX
007121A6   75 04            JNZ SHORT Game.007121AC
007121A8   84DB             TEST BL,BL
007121AA   74 0A            JE SHORT Game.007121B6
007121AC   8B4F 10          MOV ECX,DWORD PTR DS:[EDI+0x10]
007121AF   8A41 19          MOV AL,BYTE PTR DS:[ECX+0x19]
007121B2   84C0             TEST AL,AL
007121B4   74 36            JE SHORT Game.007121EC
007121B6   8A45 0B          MOV AL,BYTE PTR SS:[EBP+0xB]
007121B9   C705 EC123201 6C>MOV DWORD PTR DS:[0x13212EC],0x526C
007121C3   84C0             TEST AL,AL
007121C5   8B47 10          MOV EAX,DWORD PTR DS:[EDI+0x10]
007121C8   74 05            JE SHORT Game.007121CF
007121CA   8B48 10          MOV ECX,DWORD PTR DS:[EAX+0x10]
007121CD   EB 03            JMP SHORT Game.007121D2
007121CF   8B48 14          MOV ECX,DWORD PTR DS:[EAX+0x14]
007121D2   85C9             TEST ECX,ECX
007121D4   74 0C            JE SHORT Game.007121E2
007121D6   8B10             MOV EDX,DWORD PTR DS:[EAX]               ; 9
007121D8   52               PUSH EDX                                 ; 19
007121D9   8D45 FC          LEA EAX,DWORD PTR SS:[EBP-0x4]
007121DC   50               PUSH EAX                                 ; VK_??的地址
007121DD   FFD1             CALL ECX                                 ; 键盘按钮CALL TAB F1_F10
007121DF   83C4 08          ADD ESP,0x8                              ; 2个参数
007121E2   C705 EC123201 D0>MOV DWORD PTR DS:[0x13212EC],0x52D0
007121EC   5F               POP EDI
007121ED   5E               POP ESI
007121EE   5B               POP EBX
007121EF   8BE5             MOV ESP,EBP
007121F1   5D               POP EBP
007121F2   C2 0C00          RETN 0xC
007121F5   CC               INT3

//选怪CALL
PUSH 70
MOV EAX,ESP
PUSH 1
PUSH EAX
MOV ECX,00712EC0
CALL ECX
ADD ESP,0C

ctrl+Tab 选怪 CALL 测试OK
push 10009
mov eax,esp
push 19
push eax
mov ecx,007134B0
call ecx
add esp,0c


00500C47 - 57 - push edi
00500C48 - 8B F9  - mov edi,ecx
00500C4A - 8B 4F 3C  - mov ecx,[edi+3C] << F1攻击
00500C4D - 3B CE  - cmp ecx,esi
00500C4F - 74 0B - je Game.exe+100C5C


00528EF1 - 8B EC  - mov ebp,esp
00528EF3 - 8B 45 08  - mov eax,[ebp+08]
00528EF6 - 89 41 38  - mov [ecx+38],eax <<F1攻击对象
00528EF9 - 8B 0D B48E3101  - mov ecx,[Game.exe+F18EB4]
00528EFF - 8B 11  - mov edx,[ecx]


00524B77   8BF0                   MOV ESI,EAX
00524B79   85F6                   TEST ESI,ESI
00524B7B   74 50                  JE SHORT Game.00524BCD
00524B7D   8B4E 04                MOV ECX,DWORD PTR DS:[ESI+0x4]
00524B80   8B81 BC000000          MOV EAX,DWORD PTR DS:[ECX+0xBC]
00524B86   85C0                   TEST EAX,EAX
00524B88   74 43                  JE SHORT Game.00524BCD
00524B8A   8B0D 3C903101          MOV ECX,DWORD PTR DS:[0x131903C]
00524B90   8B11                   MOV EDX,DWORD PTR DS:[ECX]
00524B92   57                     PUSH EDI
00524B93   FF92 B4000000          CALL DWORD PTR DS:[EDX+0xB4]
00524B99   A1 C41A9B00            MOV EAX,DWORD PTR DS:[0x9B1AC4]
00524B9E   8B48 70                MOV ECX,DWORD PTR DS:[EAX+0x70]
00524BA1   8B11                   MOV EDX,DWORD PTR DS:[ECX]
00524BA3   FF92 D8020000          CALL DWORD PTR DS:[EDX+0x2D8]
00524BA9   85C0                   TEST EAX,EAX
00524BAB   7D 18                  JGE SHORT Game.00524BC5
00524BAD   8B56 04                MOV EDX,DWORD PTR DS:[ESI+0x4]
00524BB0   8B12                   MOV EDX,DWORD PTR DS:[EDX]
00524BB2   8B0D 98123201          MOV ECX,DWORD PTR DS:[0x1321298]
00524BB8   8B01                   MOV EAX,DWORD PTR DS:[ECX]
00524BBA   6A 01                  PUSH 0x1
00524BBC   52                     PUSH EDX
00524BBD   68 F0B08300            PUSH Game.0083B0F0                                  ; ASCII "DefaultSkill"
00524BC2   FF50 48                CALL DWORD PTR DS:[EAX+0x48]
00524BC5   5F                     POP EDI
00524BC6   B8 01000000            MOV EAX,0x1
00524BCB   5E                     POP ESI



00712EEC   5E                     POP ESI
00712EED   5D                     POP EBP
00712EEE   C3                     RETN
00712EEF   CC                     INT3
00712EF0   55                     PUSH EBP
00712EF1   8BEC                   MOV EBP,ESP
00712EF3   A1 30123201            MOV EAX,DWORD PTR DS:[0x1321230]
00712EF8   3B05 4C123201          CMP EAX,DWORD PTR DS:[0x132124C]
00712EFE   75 1D                  JNZ SHORT Game.00712F1D
00712F00   8B0D B48E3101          MOV ECX,DWORD PTR DS:[0x1318EB4]
00712F06   8B41 58                MOV EAX,DWORD PTR DS:[ECX+0x58]
00712F09   8B11                   MOV EDX,DWORD PTR DS:[ECX]
00712F0B   56                     PUSH ESI
00712F0C   8B75 0C                MOV ESI,DWORD PTR SS:[EBP+0xC]
00712F0F   8D0480                 LEA EAX,DWORD PTR DS:[EAX+EAX*4]
00712F12   6A 00                  PUSH 0x0                                            ; 0
00712F14   8D4446 FF              LEA EAX,DWORD PTR DS:[ESI+EAX*2-0x1]
00712F18   50                     PUSH EAX                                            ; 0..9 F1-F10
00712F19   FF52 64                CALL DWORD PTR DS:[EDX+0x64]
00712F1C   5E                     POP ESI
00712F1D   5D                     POP EBP
00712F1E   C3                     RETN
00712F1F   CC                     INT3
00712F20   55                     PUSH EBP
00712F21   8BEC                   MOV EBP,ESP

//F2 测试OK
push 0
push 1
MOV ECX,DWORD PTR DS:[0x1318EB4]
MOV EAX,DWORD PTR DS:[ECX+0x58]
MOV EDX,DWORD PTR DS:[ECX]
CALL DWORD PTR DS:[EDX+0x64]

//F1 测度OK
push 0
push 0
MOV ECX,DWORD PTR DS:[0x1318EB4]
MOV EAX,DWORD PTR DS:[ECX+0x58]
MOV EDX,DWORD PTR DS:[ECX]
CALL DWORD PTR DS:[EDX+0x64]
善者 慈悲心常在 无怨无恨 以苦为乐
默认压缩密码www.hifyl.com
文件分享密码问题:http://www.hifyl.com/read-htm-tid-4444.html
离线kender

只看该作者 地板  发表于: 2014-11-30
支持
离线ccdy8023

只看该作者 4楼 发表于: 2015-01-04
好是挺好,郁金香就是贵了点
离线750823

只看该作者 5楼 发表于: 2015-01-15
有点贵
离线baby20189

只看该作者 6楼 发表于: 2015-01-23
呃嗯 我来看看了哈
离线上天战地

只看该作者 7楼 发表于: 2015-02-09
好是挺好,郁金香就是贵了点
离线lixping

只看该作者 8楼 发表于: 2015-03-10
打个标签方便以后浏览!!!!!!!!!!!!!!!!!!!!!!!!
没有
快速回复
限100 字节
如果您提交过一次失败了,可以用”恢复数据”来恢复帖子内容
 
上一个 下一个