侧边栏壁纸
博主头像
个人心得分享博主等级

生命不息,折腾不止

  • 累计撰写 20 篇文章
  • 累计创建 19 个标签
  • 累计收到 1 条评论

目 录CONTENT

文章目录

热血江湖2.0基址

kloar博主
2024-05-03 / 0 评论 / 0 点赞 / 7 阅读 / 162000 字 / 正在检测是否收录...

目录

热血江湖2.0基址

人物信息

第一个角色名=client.exe+504C440

第二个角色名=client.exe+504C488

第三个角色名=client.exe+504C4D0

第四个角色名=client.exe+504C518

快捷物品栏

状态栏

状态栏1名称=[0544B278]0*4+33C]+58

背包

拾取物品

组队信息

NPC怪物信息

选中人物信息

喊话基址

辅助功能等等

NPC商店调用

窗口基址

关于技能

技能优化

穿墙打怪

无限视野

正邪不分

定点打怪NOP

定点远攻NOP (定点打怪类似)这个好点 自带距离加强

穿墙

Call目录

使用物品Call

拿起物品Call

使用快捷物品栏Call

选怪Call

走路Call

走路Call(新)

坐标写入位置

Call

打开关闭商店Call

打开NPC的Call

打开NPC的Call(发包类)

{00,00,01,00}(这里的1是NPC的代码)(详见怪物数值)

怪物数值

1  韦大宝

2  刀剑笑

3 平十指

4  银娇龙

5  金香玉

6  泫勃派门主

7 花有缺

8 温小余

9 三邪关关主翅娟

50  南宫絮

喊话Call

喊话间隔限制

喊话相同控制位置

原地复活CALL(发包)

复活数据(偷取来的和实际有差别)

CALL

死亡保护窗口=[Client.exe+1ED2CB8]+208]+40

金F复活窗口=[Client.exe+1ED0FAC]+40

复活CALL

Call(关于窗口,直接内存关闭,或汇编关闭数值即可)

买卖物品Call(发包)

卖出物品

买入物品

Call

存放仓库(发包)

存仓

出仓

Call

九泉移动CALL

九泉跳层CALL(还能打开某些窗口和泫勃派)

Call

关键数据

位置数据

攻击怪物Call(发包打怪)

CALL

获取信息基址

重要数据

使用背包物品CALL

Call

重要数据

使用武功CALL(轻功发包)

CALL

重要数据

关闭窗口CALL

Call

打坐Call

Call

召唤宠物CALL

Call

使用技能CALL(发包)

Call

重要数据

组队Call(发包)

重要数据

Call

组队接组(发包)外带组人返回

重要数据

CALL

组队委任队长(发包)

重要数据

CALL

拾取物品(发包)

重要数据

CALL

热血江湖关于登录

账号密码登录内存

角色登录call

序号位置=[0544C604]

CALL

send封包登录账号密码

send封包选线

 

 

 

 

热血江湖2.0基址

 

过保护

 

007422DB | B8 00000000               | mov eax,0x0                          |

007422E0 | 50                        | push eax                             |

007422E1 | FF15 24837B00             | call dword ptr ds:[<&CloseHandle>]   |

 

 

称号居中

------------------------------

 00451E42 - 39 BE 480F0000  - cmp [esi+00000F48],edi插件

 

004531B0 - 8B BF 480F0000  - mov edi,[edi+00000F48]插件2

 

00408588 - 89 96 480F0000  - mov [esi+00000F48],edx开启

关闭VIP七彩称号

---------------------------

开启关闭VIP七彩称号=[Client.exe+1ED4D50]+F4A(字节型)0开启 1关闭

VIP称号高度=[0x007B8778]

总体高度(超过35影响最高视距)=[0x007B8728]

名字和称号高度=[0x007B8AE0]

VIP称号左移右移=[0x007B8C38]

结婚称号左移右移=[0x007B86F8]

其他位置暂存

[0x007B8C5C]

[0x007B8C58]

[0x007B8C60]

 

 

 

 

人物信息

----------------------------------------------------------------------------------------

当前选中角色名=client.exe+5048420

第一个角色名=client.exe+504C440

第二个角色名=client.exe+504C488

第三个角色名=client.exe+504C4D0

第四个角色名=client.exe+504C518

 

角色ID=[00E43EC8]

角色库ID=[22D0BE8]

角色等级(等级+10)*10=client.exe+50484B4

当前血量=client.exe+50484A0

血量最大值=client.exe+50484AC

当前蓝量=client.exe+50484A4

蓝量最大值=client.exe+50484B0

攻击力=client.exe+50484E8

防御力=client.exe+50484EC

武勋=client.exe+50484E0

加入门派名=client.exe+5048434

坐标X=[Client.exe+1ED4D50]+1118

坐标Y=[Client.exe+1ED4D50]+1120

模型坐标X=[[Client.exe+1ED4D50]+19E4]+23C

模型坐标Y=[[Client.exe+1ED4D50]+19E4]+244

点击坐标X=Client.exe+1EDA3C8

点击坐标Y=client.exe+1EDA3D0

地图名基址=[Client.exe+1ED1EF8]+204

喊话基址=[Client.exe+1ED0D54]+13C

是否在走路=[Client.exe+1ED3238]+845

---------------------------------------------------------------------------------------

攻击锁

攻击判断=[Client.exe+1ED4D50]+f98   ==角色怪物ID 或 65535(未攻击)

 

 

 

移动位置控制锁

1坐标锁=[Client.exe+1ED4D50]+f9c ==1

 

2坐标锁=[Client.exe+1ED4D50]+FA0 ==1

 

3坐标锁=[Client.exe+1ED4D5]+FA4 ==0

 

 

 

坐标图标=[Client.exe+1ED334C]+194

 

 

 

---------------------------------------------------------------------------------------

人物模型

 

模型锁(3个模型锁1实现瞬移)=[Client.exe+A43ED0]+199

 

模型锁2=[Client.exe+1ED4D50]+19B8

 

模型锁3=[Client.exe+1ED4D50]+19B


快捷物品栏

--------------------------------------------------------------------------------------

物品栏1名称=[[client.exe+504B27C]0*4+33C]+58

物品栏1数量=[[client.exe+504B27C]0*4+33C]+204

物品栏1冷却时间=[[client.exe+504B27C]0*4+33C]+228

物品栏1物品标识=[[client.exe+504B27C]0*4+33C]+4C

 

 

物品栏2名称=[[client.exe+504B27C]1*4+340]+58

物品栏2数量=[[client.exe+504B27C]1*4+340]+204

物品栏2冷却时间=[[client.exe+504B27C]1*4+340]+228

物品栏2物品标识=[[client.exe+504B27C]1*4+33C]+4C

 

 

每级物品栏一级偏移加4

-------------------------------------------------------------------------------------

状态栏

-------------------------------------------------------------------------------------------

状态栏1名称=[0544B278]0*4+33C]+58

状态栏1冷却时间=[0544B278]0*4+33C]+228

状态栏1物品标识=[0544B278]0*4+33C]+4C

 

 

--------------------------------------------------------------------------------------

背包

-------------------------------------------------------------------------------------

拿起物品开关=[Client.exe+1ED0D5C]+20C

拿起物品开关2=[Client.exe+1EDD630]+20C

物品属性指针=[物品ID*4+022D0D50]

背包1物品石头属性=[[client.exe+1ED14B0]+33C]+528

背包1物品石头属性类型=[[client.exe+1ED14B0]+33C]+530

背包1疑似装备属性第一条=[[client.exe+1ED14B0]+33C]+4A4

背包1物品类型=[[client.exe+1ED14B0]+33C]+8

背包1物品ID=[[client.exe+1ED14B0]+33C]+c

背包1名称=[[client.exe+1ED14B0]+33C]+58

背包1数量=[[client.exe+1ED14B0]+33C]+49C

背包1物品信息=[[client.exe+1ED14B0]+33C]+ED

背包1武器名声=[[client.exe+1ED14B0]+33C]+AE

背包1武器属性最小值=[[client.exe+1ED14B0]+33C]+4BC

背包1武器属性最大值=[[client.exe+1ED14B0]+33C]+4B8

背包1物品标识=[22D14B0]0*4+33C]+4C

 

背包2名称=[[client.exe+1ED14B0]+340]+58

背包2数量=[[client.exe+1ED14B0]+340]+49C

背包2物品信息=[[client.exe+1ED14B0]+340]+ED

 

每级背包一级偏移加4

属性石属性=[22D14B0]+背包位置*4+33C]+528

--------------------------------

属性原石 800000027

属性石 800000028

属性石属性代码:2001000

火 1000

水 2000

风 3000

内功 4000

外功 5000

毒 6000

-------------------------------

拾取物品

鼠标指向基址=[00DD4310]

拾取物品指针=[98b*4+022D0D50]

拾取物品类型(0x32地上物品)=[90D*4+022D0D50]+8

拾取物品名称=[90D*4+022D0D50]+90

拾取物品地上ID=[90D*4+022D0D50]+6C

拾取物品ID=[90D*4+022D0D50]+C

拾取物品库ID=[90D*4+022D0D50]+78

拾取物品距离=[90D*4+022D0D50]+64

 

 

 

 

 

 

------------------------------------------------------------------------------------

组队信息

组队窗口=[22D1898]+40

 

队长库ID=[Client.exe+1ED1898]+25C

队长名=[Client.exe+1ED1898]+260

 

组队位置1名称=[0*4+0544B360]+20c

组队位置1库ID=[0*4+0544B360]+208

组队位置2名称=[1*4+0544B360]+20c

组队位置2库ID=[1*4+0544B360]+208

 

 

 

 

 

NPC怪物信息

------------------------------------------------------------------------------------

鼠标点击怪物ID=[client.exe+1ED4D50]+FC4

怪物属性指针=[怪物ID*4+022D0D50]

怪物ID=[怪物ID*4+022D0D50]+C

怪物类型(怪物2D)(人物30)(NPC 2D)=[怪物ID*4+022D0D50]+8

怪物名称=[怪物ID*4+022D0D50]+2cC

怪物等级=[怪物ID*4+022D0D50]+338

怪物的目标ID=[怪物ID*4+022D0D50]+320

怪物当前血量=[怪物ID*4+022D0D50]+334

怪物最大血量=[怪物ID*4+022D0D50]+350

怪物与人物距离=[怪物ID*4+022D0D50]+2C8

怪物坐标X=[怪物ID*4+022D0D50]+580

怪物坐标Y=[怪物ID*4+022D0D50]+588

怪物复活时间(秒)=[怪物ID*4+022D0D50]+328

怪物当前是否存活(存活0)(死了1)=[怪物ID*4+022D0D50]+32C

怪物库ID=[选中怪物ID*4+022D0D50]+14

 

NPC和怪物类型是一样的所以基址都是一样的  只是ID不一样  NPC等级一般为0 可以和野怪区分

------------------------------------------------------------------------------------

 

选中人物信息

------------------------------------------------------------------------------------

选中人物ID=[client.exe+1ED4D50]+FC4

人物ID=[人物ID*4+022D0D50]+c

人物名称=[人物ID*4+022D0D50]+8BC

人物等级=[人物ID*4+022D0D50]+98

人物门派=[人物ID*4+022D0D50]+90C

人物坐标X=[人物ID*4+022D0D50]+F84

人物坐标Y=[人物ID*4+022D0D50]+F8C

人物职业=[人物ID*4+022D0D50]+1164

 

------------------------------------------------------------------------------------

 

喊话基址

喊话基址=[Client.exe+1ED0D54]+13C

 

 

辅助功能等等

 

 

待测试 穿墙攻击=00454366  

待测试 正邪不分=00521D19

 

X坐标基址=022DA3C8

Y坐标基址=022DA3D0

装备栏基址=5974F681

任务包基址=5974F68D

快捷栏基址=0544B27C

状态栏基址=0544B278

 

 

 

 

 

 


NPC商店调用

关联打开关闭商店call使用

--------------------------------------------------------------------------------------------------------------------------------

是否打开过买卖窗口=[Client.exe+506C800]+5B*4+E4

是否打开NPC选项卡=[Client.exe+1ED1F5C]+40

是否打开商店窗口=[Client.exe+1ED1F8C]+40

打开商店位置=[Client.exe+1ED1F64]+224

关闭商店位置=[Client.exe+1ED1FE0]+224

打开商店=Client.exe+1ED1F58

关闭商店=Client.exe+1ED1F88

----------------------------------------------------------------------------------------------------------------------------------

窗口基址

 

死亡保护窗口=[Client.exe+1ED2CB8]+208]+40

窗口位置=005D880A    C741 40 01000000      mov dword ptr ds:[ecx+0x40],0x1(不想显示填充此段代码7个字节)

 

金F复活窗口=[Client.exe+1ED0FAC]+40

窗口位置=0056B838    C740 40 01000000    mov dword ptr ds:[eax+0x40],0x1(不想显示填充此段代码7个字节)

 

关于技能

 

技能库遍历ID=[23010A4]+技能位置*4+33C]+4C(技能位置每排4个)

物品栏技能库ID=[544B27C]+物品栏位置*4+33C]+4C

技能库遍历技能名称=[544B27C]+物品栏位置*4+33C]+58

 

对应技能表(目前还不知道获取方式)

CA CB CC

CE CF D0

D1 2C01 2D01

2E01 2F01 3001

3101 3201 3301

3401 3501 3601

对应10到97级技能

--------------------------------------------------------------------------------------------------------------------------------------------------------------

 

=========================================================================================================

 

技能优化

------------------------------------------------------------------------------------------------

特征码

004547BB  |. /75 1F         |jnz short Client.004547DC

004547BD  |> |8B45 CC       |mov eax,[local.13]

004547C0  |. |8B8B E4190000 |mov ecx,dword ptr ds:[ebx+0x19E4]

004547C6  |. |03C7          |add eax,edi

004547C8  |. |DB0410        |fild dword ptr ds:[eax+edx]

004547CB  |. |D899 E8020000 |fcomp dword ptr ds:[ecx+0x2E8]

004547D1  |. |DFE0          |fstsw ax

004547D3  |. |F6C4 01       |test ah,0x1

004547D6  |0F84 71040000 |je Client.00454C4D   //NOP位置

004547DC  |> \833F 00       |cmp dword ptr ds:[edi],0x0

004547DF  |.  0F85 68040000 |jnz Client.00454C4D

004547E5  |.  8B43 0C       |mov eax,dword ptr ds:[ebx+0xC]

004547E8  |.  8B93 780F0000 |mov edx,dword ptr ds:[ebx+0xF78]

004547EE  |.  8945 B8       |mov [local.18],eax

004547F1  |.  8B46 30       |mov eax,dword ptr ds:[esi+0x30]

------------------------------------------------------------------------------------------------

 

NOP位置

004547D6  0F84 71040000 |je Client.00454C4D   技能优化(六个字节)

 

===============================================================

穿墙打怪

00454366 | 75 22                    | jne client.45438A                       |

(改2个字节 EB 22)

Jne改jmp

==================================================================

无限视野

00406367 | 75 0A                    | jne client.406373                       |

(改2个字节 EB 0A)

Jne改jmp

 

========================================================================================================

正邪不分

 

00521D19 | 74 20                    | je client.521D3B                        |

(改2个字节 EB 20)

Je改jmp

 

========================================================================================================

 

 

 

定点打怪NOP

00454281 | 0F84 4D250000            | je client.4567D4                        |NOP(6个字节)

 

004542BA | 0F84 14250000            | je client.4567D4                        |NOP(6个字节)

 

定点远攻NOP (定点打怪类似)这个好点 自带距离加强

00452ADE | 75 09                    | jne client.452AE9                       |

 

=========================================================================================================

 

穿墙

 

004BE273 | 0F84 DD000000            | je client.4BE356                        |(6个字节)

{15,132,221,0,0,0}

 

(改6个字节 0F84 DD000000)

Je改jmp

004BE273 | E9 DE00000090              | jmp client.4BE356                       |

要补一个字节144

{233,222,0,0,0,144}

=========================================================================================================

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Call目录

======================================================================================================

使用物品Call

======================================================================================================

调用堆栈:     主线程

地址       堆栈       函数过程 / 参数                       调用来自                      结构

0018A48C   005553D6   Client.00559990                       Client.005553D1               0018A488

 

----------------------------------------------------------------------------------------------------

005553A6    E8 25640700     call Client.005CB7D0

005553AB    84C0            test al,al

005553AD    0F85 93000000   jnz Client.00555446

005553B3    803D 54964405 0>cmp byte ptr ds:[0x5449654],0x1

005553BA    0F84 86000000   je Client.00555446

005553C0    8B8F 1C0F0000   mov ecx,dword ptr ds:[edi+0xF1C]

005553C6    8B97 B4120000   mov edx,dword ptr ds:[edi+0x12B4]

 

005553CC    53              push ebx                                 ; 0使用物品的位置

005553CD    51              push ecx                                 ; 19235CB8==使用物品  192344B0==卸下装备

005553CE    52              push edx                                 ; 使用背包 物品栏等等 0==背包  4==物品栏

005553CF    8BCF            mov ecx,edi

005553D1    E8 BA450000     call Client.00559990

 

005553D6    83BF 1C0F0000 3>cmp dword ptr ds:[edi+0xF1C],0x35

005553DD    75 20           jnz short Client.005553FF

005553DF    8B849F 3C030000 mov eax,dword ptr ds:[edi+ebx*4+0x33C]

005553E6    85C0            test eax,eax

005553E8    74 15           je short Client.005553FF

----------------------------------------------------------------------------------------------------

push 0 使用物品在背包的位置

push 1 19235CB8==使用物品  192344B0==卸下装备

push 0 使用的背包或物品栏等等 0==背包  4==物品栏

mov ecx,19235CB8   这里给赋值

call 00559990    使用物品Call  使用技能

----------------------

19235CB8的基址

client.exe+1ED14B0

-----------------------

push 2

push 1

push 4

mov ecx,19235CB8

call 00559990

======================================================================================================


==================================================================================

拿起物品Call

-----------------------------------------------------------------------------------------------------------------

00554FE4  |.  8BE5          mov esp,ebp

00554FE6  |.  5D            pop ebp

00554FE7  |.  C2 0800       retn 0x8

00554FEA  |>  8B0D 30D62D02 mov ecx,dword ptr ds:[0x22DD630]         ;  开始

00554FF0  |.  8B849F 3C0300>mov eax,dword ptr ds:[edi+ebx*4+0x33C]

00554FF7  |.  8981 04020000 mov dword ptr ds:[ecx+0x204],eax

00554FFD  |.  8B15 30D62D02 mov edx,dword ptr ds:[0x22DD630]

00555003  |.  C682 0C020000>mov byte ptr ds:[edx+0x20C],0x1          ;  拿起

0055500A  |.  A1 30D62D02   mov eax,dword ptr ds:[0x22DD630]

0055500F  |.  8B88 04020000 mov ecx,dword ptr ds:[eax+0x204]

00555015  |.  39B1 00020000 cmp dword ptr ds:[ecx+0x200],esi

0055501B  |.  75 43         jnz short Client.00555060

0055501D  |.  8B71 4C       mov esi,dword ptr ds:[ecx+0x4C]

00555020  |.  BB A0860100   mov ebx,0x186A0

00555025  |.  8BC6          mov eax,esi

00555027  |.  99            cdq

00555028  |.  F7FB          idiv ebx

 

-----------------------------------------------------------------------------------------------------------------------------------------


 

 

 

mov edi,[22D14B0]

mov ebx,背包位置

mov ecx,dword ptr ds:[0x22DD630]

mov eax,dword ptr ds:[edi+ebx*4+0x33C]

mov dword ptr ds:[ecx+0x204],eax

mov edx,dword ptr ds:[0x22DD630]

mov byte ptr ds:[edx+0x20C],0x1移动物品Call

======================================================================================================

0018A48C   00555393   Client.005565C0                       Client.0055538E               0018A488

 

---------------------------------------------------------------------------------------------------------

0055535D    6A 09           push 0x9

0055535F    68 42050000     push 0x542

00555364    8B0D 40D62D02   mov ecx,dword ptr ds:[0x22DD640]

0055536A    E8 715E0100     call Client.0056B1E0

0055536F    A1 30D62D02     mov eax,dword ptr ds:[0x22DD630]

00555374    C780 04020000 0>mov dword ptr ds:[eax+0x204],0x0

0055537E  ^ E9 0CF0FFFF     jmp Client.0055438F

00555383    8B87 B4120000   mov eax,dword ptr ds:[edi+0x12B4]

00555389    53              push ebx                                 ; 放物品的位置

0055538A    51              push ecx                                 ; 00000001

0055538B    50              push eax                                 ; 00000000

0055538C    8BCF            mov ecx,edi                              ; 1536EDA8

0055538E    E8 2D120000     call Client.005565C0

00555393    5F              pop edi

00555394    5E              pop esi

00555395    5B              pop ebx

00555396    8B4D F4         mov ecx,dword ptr ss:[ebp-0xC]

00555399    64:890D 0000000>mov dword ptr fs:[0],ecx

005553A0    8BE5            mov esp,ebp

005553A2    5D              pop ebp

005553A3    C2 0800         retn 0x8

 

--------------------------------------------------------------------------------------------------------

mov edi,[22D14B0]

mov eax,[edi+0x12B4]

push 0  物品放到背包的位置

push 1  放到商店还是物品栏  1放背包里面  7为商店里面  D为物品栏  8为仓库里

push eax  

mov ecx,0x1536EDA8   应该是个基址地址 [22D14B0]

call 005565C0   放下物品CALL  买卖东西物品

 

-----------

 

0x1536EDA8基址应该是

Client.exe+1ED1F90 卖出

Client.exe+1ED14B0 买入

----------

 

例:

mov edi,[22D14B0]

mov eax,[edi+0x12B4]

push 0

push 1

push eax

mov ecx,edi

call 005565C0

======================================================================================================

 

 

 

 

 

使用快捷物品栏Call

======================================================================================================

 

00180090   0055B30E   Client.004362F0                       Client.0055B309   11             0018008C

001850E4   005B2F1E   Client.00559990                       Client.005B2F19  11           001850E0

0018A1C0   005AF18D   Client.005B2E30                       Client.005AF188  11             0018A1BC

--------------------------------------------------------------------------------------------------------

005AF155  |.  83FF 44       cmp edi,0x44

005AF158  |.  7F 33         jg short Client.005AF18D

005AF15A  |.  833D 1095B500>cmp dword ptr ds:[0xB59510],-0x1

005AF161  |.  0F85 4E0F0000 jnz Client.005B00B5

005AF167  |.  A0 84B34405   mov al,byte ptr ds:[0x544B384]

005AF16C  |.  84C0          test al,al

005AF16E  |.  0F85 410F0000 jnz Client.005B00B5

005AF174  |.  A1 74B24405   mov eax,dword ptr ds:[0x544B274]

005AF179  |.  25 FFFF0000   and eax,0xFFFF

005AF17E  |.  8D0C80        lea ecx,dword ptr ds:[eax+eax*4]

005AF181  |.  8D544F C5     lea edx,dword ptr ds:[edi+ecx*2-0x3B]

005AF185  |.  8BCB          mov ecx,ebx

005AF187  |.  52            push edx

005AF188  |.  E8 A33C0000   call Client.005B2E30   /////////////////快捷键物品栏

 

005AF18D  |>  83FF 38       cmp edi,0x38                             ;  Switch (cases 2..38)

005AF190  |.  75 15         jnz short Client.005AF1A7

005AF192  |.  5F            pop edi                                  ;  Case 38 of switch 005AF18D

005AF193  |.  C683 64030000>mov byte ptr ds:[ebx+0x364],0x1

005AF19A  |.  5E            pop esi

005AF19B  |.  B8 01000000   mov eax,0x1

005AF1A0  |.  5B            pop ebx

005AF1A1  |.  8BE5          mov esp,ebp

 

---------------------------------------------------------------------------------------------------

快捷键物品栏

push 4   物品栏位置

call 005B2E30

 

======================================================================================================


======================================================================================================

00180090   0055B30E   Client.004362F0                       Client.0055B309   11             0018008C

001850E4   005B2F1E   Client.00559990                       Client.005B2F19  11           001850E0

0018A1C0   005AF18D   Client.005B2E30                       Client.005AF188  11             0018A1BC

--------------------------------------------------------------------------------------------------------

005AF155  |.  83FF 44       cmp edi,0x44

005AF158  |.  7F 33         jg short Client.005AF18D

005AF15A  |.  833D 1095B500>cmp dword ptr ds:[0xB59510],-0x1

005AF161  |.  0F85 4E0F0000 jnz Client.005B00B5

005AF167  |.  A0 84B34405   mov al,byte ptr ds:[0x544B384]

005AF16C  |.  84C0          test al,al

005AF16E  |.  0F85 410F0000 jnz Client.005B00B5

005AF174  |.  A1 74B24405   mov eax,dword ptr ds:[0x544B274]

005AF179  |.  25 FFFF0000   and eax,0xFFFF

005AF17E  |.  8D0C80        lea ecx,dword ptr ds:[eax+eax*4]

005AF181  |.  8D544F C5     lea edx,dword ptr ds:[edi+ecx*2-0x3B]

005AF185  |.  8BCB          mov ecx,ebx

005AF187  |.  52            push edx

005AF188  |.  E8 A33C0000   call Client.005B2E30

005AF18D  |>  83FF 38       cmp edi,0x38                             ;  Switch (cases 2..38)

005AF190  |.  75 15         jnz short Client.005AF1A7

005AF192  |.  5F            pop edi                                  ;  Case 38 of switch 005AF18D

005AF193  |.  C683 64030000>mov byte ptr ds:[ebx+0x364],0x1

005AF19A  |.  5E            pop esi

005AF19B  |.  B8 01000000   mov eax,0x1

005AF1A0  |.  5B            pop ebx

005AF1A1  |.  8BE5          mov esp,ebp

 

---------------------------------------------------------------------------------------------------

快捷键物品栏

push 4   物品栏位置

call 005B2E30


选怪Call

===================================================================================================

 

---------------------------------------------------------------------------------------------------

0044A93A  |.  8B01          mov eax,dword ptr ds:[ecx]               ;  上一个怪物属性指针

0044A93C  |.  6A 00         push 0x0

0044A93E  |.  6A 00         push 0x0

0044A940  |.  68 4C040000   push 0x44C

0044A945  |.  FF50 04       call dword ptr ds:[eax+0x4]

0044A948  |>  3977 08       cmp dword ptr ds:[edi+0x8],esi

0044A94B  |.  75 56         jnz short Client.0044A9A3

0044A94D  |.  8B47 14       mov eax,dword ptr ds:[edi+0x14]

0044A950  |.  8B17          mov edx,dword ptr ds:[edi]

0044A952  |.  8B35 504D2D02 mov esi,dword ptr ds:[0x22D4D50]

0044A958  |.  6A 00         push 0x0

0044A95A  |.  50            push eax

0044A95B  |.  68 32040000   push 0x432

0044A960  |.  8BCF          mov ecx,edi

0044A962  |.  FF52 04       call dword ptr ds:[edx+0x4]

0044A965  |.  8B4F 14       mov ecx,dword ptr ds:[edi+0x14]

0044A968  |.  898E 40270000 mov dword ptr ds:[esi+0x2740],ecx

0044A96E  |.  8B57 14       mov edx,dword ptr ds:[edi+0x14]

0044A971  |.  8B0D 40D62D02 mov ecx,dword ptr ds:[0x22DD640]

0044A977  |.  52            push edx

0044A978  |.  E8 C31A1200   call Client.0056C440

0044A97D  |.  84C0          test al,al

0044A97F  |.  74 32         je short Client.0044A9B3

0044A981  |.  8B0D 40D62D02 mov ecx,dword ptr ds:[0x22DD640]

0044A987  |.  8B47 14       mov eax,dword ptr ds:[edi+0x14]

0044A98A  |.  6A 00         push 0x0

0044A98C  |.  50            push eax

0044A98D  |.  8B91 60020000 mov edx,dword ptr ds:[ecx+0x260]

0044A993  |.  68 36040000   push 0x436

0044A998  |.  52            push edx

0044A999  |.  E8 727BFFFF   call Client.00442510

0044A99E  |.  83C4 10       add esp,0x10

0044A9A1  |.  EB 10         jmp short Client.0044A9B3

0044A9A3  |>  8B07          mov eax,dword ptr ds:[edi]               ;  edi==怪物指针

0044A9A5  |.  6A 00         push 0x0

0044A9A7  |.  6A 01         push 0x1

0044A9A9  |.  68 4C040000   push 0x44C

0044A9AE  |.  8BCF          mov ecx,edi

0044A9B0  |.  FF50 04       call dword ptr ds:[eax+0x4]

0044A9B3  |>  8B15 504D2D02 mov edx,dword ptr ds:[0x22D4D50]         ;  选怪基址

0044A9B9  |.  8B4F 0C       mov ecx,dword ptr ds:[edi+0xC]           ;  edi==选中怪指针  传递怪物ID

0044A9BC  |.  898A C40F0000 mov dword ptr ds:[edx+0xFC4],ecx         ;  怪物ID传递到指针选中怪

 

----------------------------------------------------------------------------------------------------

mov ecx,(现在选中怪物属性指针)1C1B6618 [97C*4+022D0D50]

mov eax,[ecx]

push 0x0

push 0x0

push 0x44C

call [eax+0x4]   (取消之前选择的怪物)

mov edi,(要选中怪物属性指针)1C151178 [977*4+022D0D50]

mov eax,[edi]

push 0x0

push 0x1

push 0x44C

mov ecx,edi

call [eax+0x4]   (显示现在想选中得怪)

mov edx,[0x22D4D50]

mov ecx,[edi+0xC]

mov [edx+0xFC4],ecx   (改变选中怪的基址)

------------------------------------------------------------------------------------------------------

例:

mov ecx,0x1C151178

mov eax,[ecx]

push 0x0

push 0x0

push 0x44C

call [eax+0x4]

mov edi,0x19D2D560

mov eax,[edi]

push 0x0

push 0x1

push 0x44C

mov ecx,edi

call [eax+0x4]

mov edx,[0x22D4D50]

mov ecx,[edi+0xC]

mov [edx+0xFC4],ecx

===================================================================================================


走路Call

===============================================================================================================

00453B79  |> \89BB 3C080000 mov dword ptr ds:[ebx+0x83C],edi

00453B7F  |.  89BB 38080000 mov dword ptr ds:[ebx+0x838],edi

00453B85  |.  89BB BC010000 mov dword ptr ds:[ebx+0x1BC],edi

00453B8B  |.  89BB B8010000 mov dword ptr ds:[ebx+0x1B8],edi

00453B91  |.  C683 F5010000>mov byte ptr ds:[ebx+0x1F5],0x0

00453B98  |>  C683 C4260000>mov byte ptr ds:[ebx+0x26C4],0x0

00453B9F  |.  66:89BB D0100>mov word ptr ds:[ebx+0x10D0],di

00453BA6  |.  C683 F4000000>mov byte ptr ds:[ebx+0xF4],0x0

00453BAD  |.  8B13          mov edx,dword ptr ds:[ebx]               ;  edx==坐标指针基址

00453BAF  |.  57            push edi                                 ;  edi==0

00453BB0  |.  56            push esi                                 ;  esi==目标坐标指针

00453BB1  |.  68 F2030000   push 0x3F2

00453BB6  |.  8BCB          mov ecx,ebx

00453BB8  |.  FF52 04       call dword ptr ds:[edx+0x4]                   //本地移动Call

------------------------------------------------------------------------------------------------------------------------------------

二进制坐标数据

1D449D4C  F6 79 D7 C5 3E 3B E3 C2 6C 24 B0 41 00 00 00 00  鰕着>;懵l$癆....

-------------------------------------------------------------------------------------------------------------------------------------

004583A6  |.  8B86 C0190000 mov eax,dword ptr ds:[esi+0x19C0]        ;  esi=目标坐标指针

004583AC  |.  6A 02         push 0x2

004583AE  |.  8B8E C4190000 mov ecx,dword ptr ds:[esi+0x19C4]

004583B4  |.  83EC 0C       sub esp,0xC

004583B7  |.  8BD4          mov edx,esp

004583B9  |.  8902          mov dword ptr ds:[edx],eax

004583BB  |.  8B86 C8190000 mov eax,dword ptr ds:[esi+0x19C8]

004583C1  |.  894A 04       mov dword ptr ds:[edx+0x4],ecx

004583C4  |.  8BCE          mov ecx,esi                              ;  esi=坐标指针基址

004583C6  |.  8942 08       mov dword ptr ds:[edx+0x8],eax

004583C9  |.  E8 C29AFFFF   call Client.00451E90                       //发包移动Call

 

-------------------------------------------------------------------------------------------------------------------------------------------------

00453BEA  |.  66:898B CA100>mov word ptr ds:[ebx+0x10CA],cx

00453BF1  |>  8B93 E4190000 mov edx,dword ptr ds:[ebx+0x19E4]

00453BF7  |.  8B83 780F0000 mov eax,dword ptr ds:[ebx+0xF78]

00453BFD  |.  8B8B 700F0000 mov ecx,dword ptr ds:[ebx+0xF70]

00453C03  |.  57            push edi                               ;  edi=0

00453C04  |.  52            push edx                               ;  edx==1B62D7E0

00453C05  |.  33D2          xor edx,edx

00453C07  |.  8A9441 54D22D>mov dl,byte ptr ds:[ecx+eax*2+0x22DD25>

00453C0E  |.  8BCB          mov ecx,ebx

00453C10  |.  52            push edx                               ;  edx==1F

00453C11  |.  E8 DABCFFFF   call Client.0044F8F0 模型开关Call

 

 

--------------------------------------------------------------------------------------------------------------------------------------------------

坐标指针基址=[Client.exe+1ED4D50]

目标坐标指针基址X=[Client.exe+1ED4D50]+F84

目标坐标指针基址Z=[Client.exe+1ED4D50]+F88

目标坐标指针基址Y=[Client.exe+1ED4D50]+F8C

坐标开关1基址=[Client.exe+1ED4D50]+F9C

坐标开关2基址=[Client.exe+1ED4D50]+FA0

坐标开关2基址=[Client.exe+1ED4D50]+FA4

 

----------------------------------------------------------------------------------------------------------------------------------------------------

在坐标中内存写入X,Z,Y

Mov ebx,[0x22D4D50]

mov byte ptr ds:[ebx+0xF9C],0x1 (坐标开关1)

mov byte ptr ds:[ebx+0xFA0],0x1 (坐标开关2)

mov dword ptr ds:[ebx+0xFA4],0x0(坐标开关3)

 

mov ebx,[0x22D4D50](坐标指针基址)

lea esi,[ebx+0xF84](目标坐标指针)

 

mov edx,[ebx]

PUSH 0

PUSH esi

push 0x3F2

mov ecx,ebx

call [edx+0x4]//本地移动Call

 

mov esi,[0x22D4D50](坐标指针基址)

 

mov eax,[esi+0xF84](目标坐标指针)(坐标X)

push 0x2

mov ecx,[esi+0xF88](目标坐标指针+4)(坐标Z)

sub esp,0xC

mov edx,esp

mov [edx],eax

mov eax,[esi+0xF8C](坐标Y)

mov [edx+0x4],ecx

mov ecx,esi

mov [edx+8],eax

call 0x00451E90 //发包移动Call

 

 

-------------------------------------------------------------------------------

按需添加

mov edx,dword ptr ds:[ebx+0x19E4]    ebx==[0x22D4D50] 坐标指针基址

push 0

push edx

mov ecx,ebx

push 0x1F

call 0044F8F0(//模块开关Call)

 

======================================================================================================================

走路Call(新)

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

00453B79 | 89BB 3C080000            | mov dword ptr ds:[ebx+0x83C],edi        |

00453B7F | 89BB 38080000            | mov dword ptr ds:[ebx+0x838],edi        |

00453B85 | 89BB BC010000            | mov dword ptr ds:[ebx+0x1BC],edi        |

00453B8B | 89BB B8010000            | mov dword ptr ds:[ebx+0x1B8],edi        |

00453B91 | C683 F5010000 00         | mov byte ptr ds:[ebx+0x1F5],0x0         |

00453B98 | C683 C4260000 00         | mov byte ptr ds:[ebx+0x26C4],0x0        |

00453B9F | 66:89BB D0100000         | mov word ptr ds:[ebx+0x10D0],di         |

00453BA6 | C683 F4000000 00         | mov byte ptr ds:[ebx+0xF4],0x0          |

00453BAD | 8B13                     | mov edx,dword ptr ds:[ebx]              |

00453BAF | 57                       | push edi                                |

00453BB0 | 56                       | push esi                                |

00453BB1 | 68 F2030000              | push 0x3F2                              |

00453BB6 | 8BCB                     | mov ecx,ebx                             |

00453BB8 | FF52 04                  | call dword ptr ds:[edx+0x4]     走路CALL|

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 

坐标写入位置

坐标指针基址=[22D4D50]

目标坐标指针基址X=[22D4D50]+F84

目标坐标指针基址Z=[22D4D50]+F88

目标坐标指针基址Y=[22D4D50]+F8C

 

-----------------------------------------------------------------------------------------------------------------------------------------------------

Call

mov ebx,[22D4D50]

mov dword ptr ds:[ebx+0xf9c],0x1  坐标锁1

mov dword ptr ds:[ebx+0xFA0],0x1  坐标锁2

mov dword ptr ds:[ebx+0xFA4],0x0  坐标锁3

 

mov dword ptr ds:[ebx+0x83C],0x0

mov dword ptr ds:[ebx+0x838],0x0

mov dword ptr ds:[ebx+0x1BC],0x0

mov dword ptr ds:[ebx+0x1B8],0x0

mov byte ptr ds:[ebx+0x1F5],0x0

mov byte ptr ds:[ebx+0x26C4],0x0

mov word ptr ds:[ebx+0x10D0],0x0

mov byte ptr ds:[ebx+0xF4],0x0

mov edx,dword ptr ds:[ebx]

push 0x0

push esi            esi==(ebx+F84)

push 0x3F2

mov ecx,ebx

call dword ptr ds:[edx+0x4]

 

====================================================================================================================

 

 

 

 

 

 

 

 

 

 

 

 

 

======================================================================================

打开关闭商店Call

----------------------------------------------------------------------------------------------------------------------------------------------

00537A7F  |> \8B0D 30D62D02 mov ecx,dword ptr ds:[0x22DD630]

00537A85  |.  8B81 04020000 mov eax,dword ptr ds:[ecx+0x204]

00537A8B  |.  85C0          test eax,eax

00537A8D  |.  75 63         jnz short Client.00537AF2

00537A8F  |.  8B46 40       mov eax,dword ptr ds:[esi+0x40]

00537A92  |.  85C0          test eax,eax

00537A94  |.  74 5C         je short Client.00537AF2

00537A96  |.  8A86 04020000 mov al,byte ptr ds:[esi+0x204]

00537A9C  |.  84C0          test al,al

00537A9E  |.  74 1A         je short Client.00537ABA

00537AA0  |.  8B4E 04       mov ecx,dword ptr ds:[esi+0x4]

00537AA3  |.  85C9          test ecx,ecx

00537AA5  |.  74 13         je short Client.00537ABA

00537AA7  |.  8B86 24020000 mov eax,dword ptr ds:[esi+0x224]         ;  esi=位置基址  打开==[22D1F64]  关闭==[22D2074]

00537AAD  |.  8B11          mov edx,dword ptr ds:[ecx]               ;  edx==打开关闭基址  打开==[22D1F58] 关闭==[22D1FE4]

00537AAF  |.  6A 00         push 0x0

00537AB1  |.  50            push eax                                 ;  eax==第几个选项 1==5B  2==5C 3==5D 4==5E

00537AB2      68 F4030000   push 0x3F4

00537AB7  |.  FF52 04       call dword ptr ds:[edx+0x4]              ;  打开关闭商店Call

 

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

mov ecx,[22D1F58]  edx==打开关闭基址  打开==[22D1F58]    打开选项卡后关闭==[22D1FE4]

mov edx,[ecx]

push 0x0

push 第几个1==5B  2==5C 3==5D 4==5E   选项卡页面关闭==5A    打开选项卡后关闭==62

push 0x3F4

call [edx+0x4] //打开关闭商店Call

======================================================================================

打开商店Call (备用只能打开)

00521D76  |.  E8 151B0000   call Client.00523890

------------------------------------------------------------------------------------------------------------------------------------------

mov esi,[0x22D1F58] 基址

mov edi,0x5C (第几个选项5B 5C 5D 5E)

mov ecx,[esi+edi*4+0xE4]

push ecx (类型自动计算) (1买卖  2任务 3打开仓库 4合成 6强化  D移动银币 F移动村庄 11赋予属性)

mov ecx,esi

call 00523890

===============================================================================

实用的卡商店关闭代码

----------------------------------------------------------------------------------------------

mov ebx,[22D1F5C]’强制打开选项卡

mov dword ptr ds:[ebx+40],0x1

mov ebx,[22D1F8C]’强制打开商店

mov dword ptr ds:[ebx+40],0x1

mov esi,[22D1FE0]

mov ecx,[22D1F88]

mov eax,[esi+0x224]

mov edx,[ecx]

push 0x0

push eax   

push 0x3F4

call [edx+0x4]

--------------------------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

===========================================================================

打开NPC的Call

--------------------------------------------------------------------------------------------------------------------------------------

0043FA30  |.  8BF1          mov esi,ecx

0043FA32  |.  33DB          xor ebx,ebx

0043FA34  |.  57            push edi

0043FA35  |.  53            push ebx

0043FA36  |.  8B7E 24       mov edi,dword ptr ds:[esi+0x24]

0043FA39  |.  8B46 08       mov eax,dword ptr ds:[esi+0x8]

0043FA3C  |.  8D4E 08       lea ecx,dword ptr ds:[esi+0x8]

0043FA3F  |.  53            push ebx

0043FA40  |.  68 1F040000   push 0x41F

0043FA45  |.  897D E0       mov [local.8],edi

0043FA48  |.  FF50 04       call dword ptr ds:[eax+0x4]

0043FA4B  |.  83F8 01       cmp eax,0x1

0043FA4E  |.  75 2A         jnz short Client.0043FA7A

0043FA50  |.  8B0D 40D62D02 mov ecx,dword ptr ds:[0x22DD640]

0043FA56  |.  8B86 24030000 mov eax,dword ptr ds:[esi+0x324]

0043FA5C  |.  50            push eax

0043FA5D  |.  68 FFFF0000   push 0xFFFF

0043FA62  |.  8B11          mov edx,dword ptr ds:[ecx]

0043FA64  |.  6A 08         push 0x8

0043FA66  |.  FF52 04       call dword ptr ds:[edx+0x4]

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

mov ecx,[0x22DD640]

mov eax,0x94(怪物数值)(详见下面)

push eax

push 0xFFFF

mov edx,[ecx]

push 0x8

call [edx+0x4]

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------

联合使用(打开NPC 直接选取第几个)

mov ecx,[0x22DD640]

mov eax,0x94(怪物数值)

push eax

push 0xFFFF

mov edx,[ecx]

push 0x8

call [edx+0x4]

 

mov esi,[0x22D1F58]

mov edi,0x5B(选第几个)

mov ecx,[esi+edi*4+0xE4]

push ecx

mov ecx,esi

call 00523890

 

 

=======================================================

打开NPC的Call(发包类)

-------------------------------------------------------------------------------------------------

00566DF2    B9 000A0000     mov ecx,0xA00

00566DF7    33C0            xor eax,eax

00566DF9    8DBD FED7FFFF   lea edi,dword ptr ss:[ebp-0x2802]

00566DFF    66:C785 F8D7FFF>mov word ptr ss:[ebp-0x2808],0x0

00566E08    F3:AB           rep stos dword ptr es:[edi]

00566E0A    8B7D 10         mov edi,dword ptr ss:[ebp+0x10]

00566E0D    8B0D 68F7EA00   mov ecx,dword ptr ds:[0xEAF768]

00566E13    8D85 F8D7FFFF   lea eax,dword ptr ss:[ebp-0x2808]

00566E19    6A 16           push 0x16

00566E1B    50              push eax                                 ; 数据内存地址

00566E1C    66:C785 FAD7FFF>mov word ptr ss:[ebp-0x2806],0x90

00566E25    66:C785 FCD7FFF>mov word ptr ss:[ebp-0x2804],0x10

00566E2E    C785 FED7FFFF 0>mov dword ptr ss:[ebp-0x2802],0x1

00566E38    89BD 06D8FFFF   mov dword ptr ss:[ebp-0x27FA],edi

00566E3E    E8 ADF4ECFF     call Client.004362F0                     ; 打开NPC Call

-------------------------------------------------------------------------------------------------

Call自己申请内存里的数据

 

00184CC8  00 00 90 00 10 00 01 00 00 00 00 00  ......?_x0010_......

00184CD8  00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00  ...............

{00,00,90,00}(固定数据)

{10,00,01,00}(固定数据)

{00,00,00,00}(固定数据)

{00,00,01,00}(这里的1是NPC的代码)(详见怪物数值)

这里代码都是16进制

-------------------------------------------------------------------------------------------------

 

push 0x16

push 0x0FA50004  (这里自己申请内存地址)

mov ecx,[0xEAF768]

mov edx,0x4362F0  (放进去CALL)

call edx

==============================================================

打开关闭商店(发包)

----------------------------------------------------------------------------------------------------

关闭

00533345 | 6A 16                     | push 0x16                               |

00533347 | F3:AB                     | rep stosd                               |

00533349 | 8B8A 08020000             | mov ecx,dword ptr ds:[edx+0x208]        |

0053334F | 8D95 F8D7FFFF             | lea edx,dword ptr ss:[ebp-0x2808]       |

00533355 | 898D 06D8FFFF             | mov dword ptr ss:[ebp-0x27FA],ecx       |

0053335B | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

00533361 | 52                        | push edx                                |

00533362 | 66:C785 FAD7FFFF 9000     | mov word ptr ss:[ebp-0x2806],0x90       |

0053336B | 66:C785 FCD7FFFF 1000     | mov word ptr ss:[ebp-0x2804],0x10       |

00533374 | C785 FED7FFFF 02000000    | mov dword ptr ss:[ebp-0x2802],0x2       |

0053337E | E8 6D2FF0FF               | call <client.sub_4362F0>                |

----------------------------------------------------------------------------------------------------

打开

-------------------------------------------------------------------------------------------------

00523901 | 6A 16                     | push 0x16                               |

00523903 | 52                        | push edx                                |

00523904 | 66:C785 FAD7FFFF 9000     | mov word ptr ss:[ebp-0x2806],0x90       |

0052390D | 66:C785 FCD7FFFF 1000     | mov word ptr ss:[ebp-0x2804],0x10       |

00523916 | 89B5 FED7FFFF             | mov dword ptr ss:[ebp-0x2802],esi       |

0052391C | E8 CF29F1FF               | call <client.sub_4362F0>                |

--------------------------------------------------------------------------------------------------

重要数据

00 00 90 00 10 00 03 00 00 00 00 00 00 00 4E 00

------------------------------------------------------------------------------------------------

目录参数

02界面关闭

03买卖

 

04任务

05仓库

06合成

08强化

13赋予属性

1C灵兽仓库

0E再造合成石

---------------------------------------------------------------------------------------------------

call

 

push 0x16

push edx

mov ecx, dword ptr ds:[0x00EAF768]

call 0x004362F0

 

 

 

 

 

 

=======================================================

怪物数值

------------------------------------------------------------------------

泫勃派

1 韦大宝

2 刀剑笑

3 平十指

4 银娇龙

5 金香玉

6 泫勃派门主

7 花有缺 

8     温小余

4E 小香

---------------------------------------------------------------------------------------

九泉之下

91 张大成 1层 1000层

92 殷梨亭

93 张大成 长子 100层 200层 300层

94 张大成 次子 400层 500层 600层

95 张大成 长子 800层

96 张大成 长子 50层 100层

97 张大成 长子 200层 1层

98 张大成 长子 300层 100层

99 张大成 长子 400层 200层

9A 张大成 长子 500层 300层

9B 张大成 长子 600层 400层

9C 张大成 长子 700层 500层

9D 张大成 长子 800层 600层

9E 张大成 长子 900层 700层

9F 张大成 长子 800层

 

-----------------------------------------------------------------------------------------------------------

柳正关

10 胡银花(正塔)

1B 楚留情(正林)

C 柳正关关主柳絮

D 萧春水

E 红凤凰

 

 

 

 

-------------------------------------------------------------------------------------------------------------

三邪关

9 三邪关关主翅娟

A 陆小凰

B 周叔通

F 千晓生(邪塔)

1C 裘千米(邪林)

50 南宫絮

------------------------------------------------------------------------------------------

北海冰宫

7D 船夫金氏


==========================================================================

喊话Call

喊话基址=[Client.exe+1ED0D54]+13C

------------------------------------------------------------------------------------------------------------------------

00433825  |.  8BCB          mov ecx,ebx

00433827  |.  C645 0F 00    mov byte ptr ss:[ebp+0xF],0x0

0043382B  |.  E8 10020000   call Client.00433A40

00433830  |.  8B55 08       mov edx,[arg.1]

00433833  |.  E9 DF010000   jmp Client.00433A17

00433838  |>  817D 0C 01003>cmp [arg.2],0x320001                     ;  Cases 9,D of switch 004337EE

0043383F  |.  74 15         je short Client.00433856

00433841  |.  8B8B 2C030000 mov ecx,dword ptr ds:[ebx+0x32C]         ;  ebx==[22D0D54]

00433847  |.  52            push edx                                 ;  0xD

00433848  |.  52            push edx                                 ;  0xD

00433849  |.  68 ED030000   push 0x3ED                               ;  0x3ED

0043384E  |.  8B01          mov eax,dword ptr ds:[ecx]

00433850  |.  FF50 04       call dword ptr ds:[eax+0x4]              ;  喊话Call

 

 

 

mov ebx,[22D0D54](基址)

mov ecx,[ebx+0x32C]

push 0xD

push 0XD

push 0x3ED

mov eax,[ecx]

call [eax+0x4]

--------------------------------------------------------------------------------------------------------------------------

喊话间隔限制

 

00588967  |.  85C9          test ecx,ecx

00588969  |.  74 13         je short Client.0058897E

0058896B  |.  2B86 A0080000 sub eax,dword ptr ds:[esi+0x8A0]

00588971  |.  99            cdq

00588972  |.  33C2          xor eax,edx

00588974  |.  2BC2          sub eax,edx

00588976  |.  3BC1          cmp eax,ecx

→00588978      0F82 98020000 jb Client.00588C16          ;  喊话间隔

0058897E      8A86 0D020000 mov al,byte ptr ds:[esi+0x20D]

00588984  |.  8A0D 54844405 mov cl,byte ptr ds:[0x5448454]

0058898A  |.  3C 01         cmp al,0x1

0058898C  |.  75 1E         jnz short Client.005889AC

0058898E  |.  80F9 19       cmp cl,0x19

00588991  |.  73 19         jnb short Client.005889AC

 

 

------------------------------------------------------------------------------------------------------------------

喊话相同控制位置

00588A54  |.  83C6 02       |add esi,0x2

00588A57  |.  84C9          |test cl,cl

00588A59  |.^ 75 E0         \jnz short Client.00588A3B

00588A5B  |>  33C0          xor eax,eax

→00588A5D      EB 05         jmp short Client.00588A64’’’’’喊话相同控制位置

00588A5F  |>  1BC0          sbb eax,eax

00588A61  |.  83D8 FF       sbb eax,-0x1

00588A64  |>  85C0          test eax,eax

00588A66  |.  75 24         jnz short Client.00588A8C

00588A68  |.  8B4D FC       mov ecx,[local.1]

00588A6B  |.  8B45 DC       mov eax,[local.9]

00588A6E  |.  2B81 A0080000 sub eax,dword ptr ds:[ecx+0x8A0]

00588A74  |.  99            cdq

 

 

==================================================================

喊话Call(发包)

 

------------------------------------------------------------------------------------------------------------------------

00588B70 | C6843D 41D2FFFF 00        | mov byte ptr ss:[ebp+edi-0x2DBF],0x0    |

00588B78 | 8A85 40D2FFFF             | mov al,byte ptr ss:[ebp-0x2DC0]         |

00588B7E | FEC0                      | inc al                                  |

00588B80 | 8D95 24D2FFFF             | lea edx,dword ptr ss:[ebp-0x2DDC]       |

00588B86 | 8885 40D2FFFF             | mov byte ptr ss:[ebp-0x2DC0],al         |

00588B8C | 0FBEC0                    | movsx eax,al                            |

00588B8F | 8D48 17                   | lea ecx,dword ptr ds:[eax+0x17]         |

00588B92 | 83C0 1D                   | add eax,0x1D                            |

00588B95 | 66:898D 28D2FFFF          | mov word ptr ss:[ebp-0x2DD8],cx         |

00588B9C | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

00588BA2 | 50                        | push eax                                |

00588BA3 | 52                        | push edx                                |

00588BA4 | E8 47D7EAFF               | call <client.sub_4362F0>                |

00588BA9 | 8B5D FC                   | mov ebx,dword ptr ss:[ebp-0x4]          | [ebp-4]:&"€骔"

----------------------------------------------------------------------------------------------------------------------

重要数据

00 00 08 00 44 00 01 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 2D 31 31 31

31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31

31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31

31 31 31 31 31 31 31 31 31 00 00 00 00 00 00 00

 

---------------------------------------------------------------------------------------------------------------

Call

 

push eax==1F →  eax==eax+0x1D(29)+1  →   eax==内容长度+29+1

 

push 自己申请内存

 

mov ecx, dword ptr ds:[0x00EAF768]

 

call 0x004362F0

 

 

 

====================================================================

原地复活CALL(发包)

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 

 

0045200B    66:8955 FC            mov word ptr ss:[ebp-0x4],dx

0045200F    D9C0                  fld st

00452011    D8C9                  fmul st,st(1)

00452013    D9C2                  fld st(2)

00452015    D8CB                  fmul st,st(3)

00452017    66:8B46 14            mov ax,word ptr ds:[esi+0x14]

0045201B    B9 0A000000           mov ecx,0xA

00452020    8D75 D8               lea esi,dword ptr ss:[ebp-0x28]

00452023    8DBD D6D7FFFF         lea edi,dword ptr ss:[ebp-0x282A]

00452029    DEC1                  faddp st(1),st

0045202B    66:8985 D0D7FFFF      mov word ptr ss:[ebp-0x2830],ax

00452032    66:C785 D4D7FFFF 2800 mov word ptr ss:[ebp-0x282C],0x28

0045203B    6A 2E                 push 0x2E

0045203D    D9FA                  fsqrt

0045203F    DDDA                  fstp st(2)

00452041    DDD8                  fstp st

00452043    D95D F8               fstp dword ptr ss:[ebp-0x8]

00452046    F3:A5                 rep movs dword ptr es:[edi],dword ptr ds>

00452048    8D8D D0D7FFFF         lea ecx,dword ptr ss:[ebp-0x2830]

0045204E    51                    push ecx                                 ; ecx==00187B64

0045204F    8B0D 68F7EA00         mov ecx,dword ptr ds:[0xEAF768]

00452055    E8 9642FEFF           call Client.004362F0    //原地复活Call

 

------------------------------------------------------------------------------------------------------------------------------------------------------

复活数据(偷取来的和实际有差别)

08DA0000  0A 00 48 00 04 00 64 00 00 00 00 80 18 C4 59 D9  ..H..d....€腨?

08DA0010  3C C3 00 80 9A 43 35 08 00 00 00 00 00 00 00 00  <?€欳5........

08DA0020  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................

------------------------------------------------------------------------------------------------------------------------------------------------------

CALL

push 0x2E(偷取的参数== push 0x1A)(这个参数应该是数据量+2字节)

push 0x0FCF0000(自己申请内存)

mov ecx,dword ptr ds:[0xEAF768]

mov edx,0x4362F0

call edx

 

------------------------------------------------------------------------------------------------------------------------------------------------------------

死亡保护窗口=[Client.exe+1ED2CB8]+208]+40

窗口位置=005D880A    C741 40 01000000      mov dword ptr ds:[ecx+0x40],0x1(不想显示填充此段代码7个字节)

 

金F复活窗口=[Client.exe+1ED0FAC]+40

窗口位置=0056B838    C740 40 01000000    mov dword ptr ds:[eax+0x40],0x1(不想显示填充此段代码7个字节)

 

=====================================================

复活CALL

--------------------------------------------------------------------------------------------------------------------------------------

005AFE85 | E8 B62DEAFF              | call client.452C40                      |

------------------------------------------------------------------------------------------------------------------------------------

Call(关于窗口,直接内存关闭,或汇编关闭数值即可)

mov ecx,[0x022D4D50]

call 0x00452C40

=====================================================

 

 

=======================================================================================================

 

买卖物品Call(发包)

------------------------------------------------------------------------------------------------

列举其中一个

00553331  |. /76 39               jbe short Client.0055336C

00553333  |> |8DB3 340F0000       lea esi,dword ptr ds:[ebx+0xF34]

00553339  |. |B9 0C000000         mov ecx,0xC

0055333E  |. |8DBD FED7FFFF       lea edi,dword ptr ss:[ebp-0x2802]

00553344  |. |66:C785 FAD7FFFF 0E>mov word ptr ss:[ebp-0x2806],0xE

0055334D  |. |66:C785 FCD7FFFF 30>mov word ptr ss:[ebp-0x2804],0x30

00553356  |. |6A 36               push 0x36

00553358  |. |F3:A5               rep movs dword ptr es:[edi],dword ptr ds:[esi]

0055335A  |> |8D8D F8D7FFFF       lea ecx,[local.2562]

00553360  |. |51                  push ecx

00553361  |> |8B0D 68F7EA00       mov ecx,dword ptr ds:[0xEAF768]          // 买卖有数量物品Call

00553367  |. |E8 842FEEFF         call Client.004362F0         

0055336C  |> \8BCB                mov ecx,ebx                                       ;  Default case of switch 00552CAF

0055336E  |.  E8 3D9D0000         call Client.0055D0B0

------------------------------------------------------------------------------------------------

 

 

 

 

 

卖出物品

 

push 0x4E   卖有数量的物品

 

跳转位置==00552F83  |. /E9 D9030000         jmp Client.00553361

 

卖有数量的物品call==00553367  |.  E8 842FEEFF         call Client.004362F0

卖数量为1的物品call==005580D5  |.  E8 16E2EDFF         call Client.004362F0

 

 

物品单独标识==[22D1F90]+商店位置*4+33C]+50(字节型==E7)

物品单独标识==[22D1F90]+商店位置*4+33C]+50+1(字节型==00)

物品标识==[22D1F90]+商店位置*4+33C]+4c(字节型==61)

物品标识==[22D1F90]+商店位置*4+33C]+4c+1(字节型==0B)

物品标识==[22D1F90]+商店位置*4+33C]+4c+2(字节型==93)

物品标识==[22D1F90]+商店位置*4+33C]+4c+3(字节型==06)

(背包基址)

关键数据

0A 00 92 00 00 00 02 00 00 00 00 00 00 00 65 CA

9A 3B 01 00 00 00 00 00 00 00 00 00 00 00 E7 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 16 00 00 00 00 00 00 00 00 00 00 00 00

---------------------------------------------------------------------------------------------------------------------------------------------

 

 

 

买入物品

push 0x4E   买入有数量的

买入有数量的跳转位置==00552FE2  |. /E9 7A030000         jmp Client.00553361

买有数量物品call==00553367  |.  E8 842FEEFF         call Client.004362F0

买数量为1的物品Call==005583BC  |.  E8 2FDFEDFF         call Client.004362F0

 

物品单独标识==[22D1F90]+商店位置*4+33C]+50(字节型==E7)

物品单独标识==[22D1F90]+商店位置*4+33C]+50+1(字节型==00)

物品标识==[22D1F90]+商店位置*4+33C]+4c(字节型==61)

物品标识==[22D1F90]+商店位置*4+33C]+4c+1(字节型==0B)

物品标识==[22D1F90]+商店位置*4+33C]+4c+2(字节型==93)

物品标识==[22D1F90]+商店位置*4+33C]+4c+3(字节型==06)

(买卖商店物品栏基址)

关键数据

00 00 92 00 48 00 01 00 00 00 00 00 00 00 69 CA 

9A 3B 01 00 00 00 00 00 00 00 00 00 00 00 E7 00 

-----------------------------------------------------------------------------

Call

push 0x4E

push 0x07F40000(自己申请地址 数据在上面)

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0

 

 

=====================================================================

存放仓库(发包)

---------------------------------------------------------------------

存仓

存入call==00558FDA  |.  E8 11D3EDFF         call Client.004362F0

 

综合仓库基址=22D2078

个人仓库基址=22D1FEC

仓库物品单独标识==[仓库基址]+背包位置*4+33C]+50(字节型==00)

仓库物品单独标识==[仓库基址]+背包位置*4+33C]+50(字节型==00)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==24)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==A1)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==07)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==00)

 

0A 00 94 00 00 00 03 00 00 00 00 00 00 00 24 A1

07 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 01 0F 00 00 00 00 00 00 00 00 00 00 00 00

 

------------------------------------------------------------------------

出仓

出仓call=00558899  |.  E8 52DAEDFF         call Client.004362F0

 

 

综合仓库基址=22D2078

个人仓库基址=22D1FEC

仓库物品单独标识==[仓库基址]+背包位置*4+33C]+50(字节型==00)

仓库物品单独标识==[仓库基址]+背包位置*4+33C]+50(字节型==00)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==24)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==A1)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==07)

仓库物品标识==[仓库基址]+背包位置*4+33C]+49C(字节型==00)

 

0A 00 94 00 00 00 05 00 00 00 00 00 00 00 61 0B

93 06 01 00 00 00 00 00 00 00 00 00 00 00 1A 01

00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 08 08 00 00 00 00 00 00 00 00 00 00 00 00

 

------------------------------------------------------------------------------------

Call

push 0x4E

push 0x07F40000(自己申请地址 数据在上面)

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0

 

 

==============================================================================================================

九泉移动CALL

-------------------------------------------------------------------------------------

004DB484  |.  894D 10       mov [arg.3],ecx

004DB487  |.  8955 14       mov [arg.4],edx

004DB48A  |>  8B4D 0C       mov ecx,[arg.2]

004DB48D  |.  8B55 10       mov edx,[arg.3]

004DB490  |.  8B45 08       mov eax,[arg.1]                          ;  EAX==58

004DB493  |.  898D 02D8FFFF mov dword ptr ss:[ebp-0x27FE],ecx

004DB499  |.  8B4D 18       mov ecx,[arg.5]                          ;  ECX==1

004DB49C  |.  8995 06D8FFFF mov dword ptr ss:[ebp-0x27FA],edx

004DB4A2  |.  8985 FED7FFFF mov dword ptr ss:[ebp-0x2802],eax

004DB4A8  |.  8B45 14       mov eax,[arg.4]                          ;  EAX==[0x22EF598]

004DB4AB  |.  8D95 F8D7FFFF lea edx,[local.2562]

004DB4B1  |.  898D 0ED8FFFF mov dword ptr ss:[ebp-0x27F2],ecx

004DB4B7  |.  8B0D 68F7EA00 mov ecx,dword ptr ds:[0xEAF768]

004DB4BD  |.  6A 1A         push 0x1A

004DB4BF  |.  52            push edx

004DB4C0  |.  66:C785 FAD7F>mov word ptr ss:[ebp-0x2806],0x48

004DB4C9  |.  66:C785 FCD7F>mov word ptr ss:[ebp-0x2804],0x14

004DB4D2  |.  8985 0AD8FFFF mov dword ptr ss:[ebp-0x27F6],eax

004DB4D8  |.  E8 13AEF5FF   call Client.004362F0     //发包Call

 

--------------------------------------------------------------------------------------------

 

关键数据

0A 00 48 00 14 00 58 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00

------------------------------------------------------------------------------------------

push 0x1A

push 0x097F0000(自己申请内存)

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0

=====================================================

 

九泉跳层CALL(还能打开某些窗口和泫勃派)

 

-----------------------------------------------------------------------------------------------------------------------------------------

005238C3  |.  8B88 E8020000 mov ecx,dword ptr ds:[eax+0x2E8]

005238C9  |.  E8 025C0B00   call Client.005D94D0

005238CE  |.  B9 000A0000   mov ecx,0xA00

005238D3  |.  33C0          xor eax,eax                              ;  mss32.21110210

005238D5  |.  8DBD FED7FFFF lea edi,dword ptr ss:[ebp-0x2802]

005238DB  |.  66:C785 F8D7F>mov word ptr ss:[ebp-0x2808],0x0

005238E4  |.  F3:AB         rep stos dword ptr es:[edi]

005238E6  |.  8B0D A8103002 mov ecx,dword ptr ds:[0x23010A8]

005238EC  |.  8D95 F8D7FFFF lea edx,[local.2562]

005238F2  |.  83C6 02       add esi,0x2

005238F5  |.  898D 06D8FFFF mov dword ptr ss:[ebp-0x27FA],ecx

005238FB  |.  8B0D 68F7EA00 mov ecx,dword ptr ds:[0xEAF768]

00523901  |.  6A 16         push 0x16

00523903  |.  52            push edx

00523904  |.  66:C785 FAD7F>mov word ptr ss:[ebp-0x2806],0x90

0052390D  |.  66:C785 FCD7F>mov word ptr ss:[ebp-0x2804],0x10

00523916  |.  89B5 FED7FFFF mov dword ptr ss:[ebp-0x2802],esi

0052391C  |.  E8 CF29F1FF   call Client.004362F0//九泉Call

 

-------------------------------------------------------------------------------------------------------------------------------

Call

push 0x16

push 0x09160000

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0

-----------------------------------------------------------------------------------------------------------------------------

 

关键数据

00 00 90 00 10 00 43 00

---------------------------------------------------------------------------------------------------------------------------

位置数据

仓库窗口 5(十进制)

创建门派窗口 7

合成石头窗口 14

赋予属性窗口 19

对练场 21

合成窗口 26

伏魔洞 45

北海冰宫幻影 52

北海冰宫 53

泫勃派 63

-------------------

1层   42(十六进制)   66(十进制)

50层  5C 92

100层 41 65

200层 43 67

300层 45 69

400层 47 71

500层 49 73

600层 4B 75

700层 4D 77

800层 4F 79

900层 51 81

1000层5D  93

------

 

=================================================================================================

 

 

 

攻击怪物Call(发包打怪)

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

004599A6  |.  66:8B85 E8D7F>mov ax,word ptr ss:[ebp-0x2818]

004599AD  |.  66:05 0200    add ax,0x2

004599B1  |.  8B0D 68F7EA00 mov ecx,dword ptr ds:[0xEAF768]

004599B7  |.  0FBFD0        movsx edx,ax

004599BA  |.  66:8985 E8D7F>mov word ptr ss:[ebp-0x2818],ax

004599C1  |.  83C2 06       add edx,0x6

004599C4  |.  8D85 E4D7FFFF lea eax,[local.2567]

004599CA  |.  52            push edx

004599CB  |.  50            push eax

004599CC  |.  E8 1FC9FDFF   call Client.004362F0

004599D1  |.  5F            pop edi

004599D2  |.  5E            pop esi

004599D3  |.  5B            pop ebx

004599D4  |.  8BE5          mov esp,ebp

004599D6  |.  5D            pop ebp

004599D7  |.  C2 0800       retn 0x8

004599DA  |>  0FBF8D E8D7FF>movsx ecx,word ptr ss:[ebp-0x2818]

004599E1  |.  83C1 06       add ecx,0x6

004599E4  |.  8D95 E4D7FFFF lea edx,[local.2567]

004599EA  |.  51            push ecx                                 ;  ecx==1A

004599EB  |.  8B0D 68F7EA00 mov ecx,dword ptr ds:[0xEAF768]

004599F1  |.  52            push edx

004599F2  |.  E8 F9C8FDFF   call Client.004362F0     //攻击前的发包

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

0043FB4D  |.  66:8915 A8E02>mov word ptr ds:[0x22CE0A8],dx

0043FB54  |.  EB 0E         jmp short Client.0043FB64

0043FB56  |>  3BC3          cmp eax,ebx

0043FB58  |.  75 66         jnz short Client.0043FBC0

0043FB5A  |.  66:8B42 14    mov ax,word ptr ds:[edx+0x14]

0043FB5E  |.  66:A3 A8E02C0>mov word ptr ds:[0x22CE0A8],ax

0043FB64  |>  66:C705 AAE02>mov word ptr ds:[0x22CE0AA],0x25

0043FB6D  |.  66:C705 ACE02>mov word ptr ds:[0x22CE0AC],0x6

0043FB76  |.  C705 A0E02C02>mov dword ptr ds:[0x22CE0A0],Client.022C>

0043FB80  |.  66:8B4E 1C    mov cx,word ptr ds:[esi+0x1C]

0043FB84  |.  66:890D AEE02>mov word ptr ds:[0x22CE0AE],cx

0043FB8B  |.  66:8B57 34    mov dx,word ptr ds:[edi+0x34]

0043FB8F  |.  8B0D 68F7EA00 mov ecx,dword ptr ds:[0xEAF768]

0043FB95  |.  66:8915 B0E02>mov word ptr ds:[0x22CE0B0],dx

0043FB9C  |.  66:0FB647 39  movzx ax,byte ptr ds:[edi+0x39]

0043FBA1  |.  6A 0C         push 0xC

0043FBA3  |.  68 A8E02C02   push Client.022CE0A8                     ;  ASCII "\n"

0043FBA8  |.  66:A3 B2E02C0>mov word ptr ds:[0x22CE0B2],ax

0043FBAE  |.  E8 3D67FFFF   call Client.004362F0    //攻击怪物Call(要先发包才能使用)

 

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------

CALL

 

 

push 0x1A

push 0x10220000(自己申请内存)(数据1)

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0   //攻击前发包CALL

 

push 0xC

push 0x102200A0(自己申请内存)(数据2)

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0   //开始攻击CALL

 

------------------------------------------------------------------------------------------------------

获取信息基址

选中怪物ID=[client.exe+1ED4D50]+FC4

怪物库ID=[选中怪物ID*4+022D0D50]+14

 

技能库遍历ID=[23010A4]+技能位置*4+33C]+4C(技能位置每排4个)

物品栏技能库ID=[544B27C]+物品栏位置*4+33C]+4C

 

坐标X=[Client.exe+1ED4D50]+1118

坐标Y=[Client.exe+1ED4D50]+1120

坐标Z=不重要

--------------------------------------------------------------------------------------------------------

重要数据

数据(1)

0A 00 09 00 14 00 41 27 45 00 7A AE 01 00 7E 6B

52 C3 00 00 70 41 27 CA 14 C4 00 00 00 00 00 00

 

数据(2)

3C 27 25 00 06 00 3C 27 7E 00 00 00 00 00 00 00

数据(2)附加(对应技能表)

CA CB CC

CE CF D0

D1 2C01 2D01

2E01 2F01 3001

3101 3201 3301

3401 3501 3601

对应10到97级技能

------------------------------------------------------------------

=========================================================

使用背包物品CALL

 

 

0055B309    E8 E2AFEDFF     call client.004362F0  //使用背包物品CALL

 

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Call

 

push 0x1A

push 0x001E0000

mov ecx,dword ptr ds:[0xEAF768]

call 004362F0

----------------------------------------------------------------------------

重要数据

 

00 00 3A 00 14 00 01 17 00 00 2D DC 14 3C 00 00

  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

 

============================================================

使用武功CALL(轻功发包)

---------------------------------------------------------------------------------------------------

005B33FD | E8 EE2EE8FF              | call client.4362F0                      |

-------------------------------------------------------------------------------------------------------------------------

CALL

push 1E

push ecx

mov ecx,dword ptr ds:[EAF768]

call client.4362F0

-----------------------------------------------------------------------------------------------------------------------

重要数据

00 00 3C 00 18 00 0D 2C 09 00 00 00 00 00 00 00

 

========================================================================

关闭窗口CALL

-----------------------------------------------------------------------------------------------------------------------

00533029 | E8 E2020000              | call client.533310                      |

-----------------------------------------------------------------------------------------------------------------------

Call

mov ecx,[22D1F88]

call 533310

========================================================================

打坐Call

-----------------------------------------------------------------------------------------------------------------------

00567681 | E8 4AAB0400              | call client.5B21D0                      |

-----------------------------------------------------------------------------------------------------------------------

Call

 

mov ecx,[22D0E00]

call 5B21D0

========================================================================

NOP(6个字节)

======================================================================================================

召唤宠物CALL

 

======================================================================================================

0059AE57 | E8 14000000              | call client.59AE70                      |

======================================================================================================

Call

 

mov ecx,[22D0E00]

call 59AE70

======================================================================================================

使用技能CALL(发包)

--------------------------------------------------------------------------------------

004599DA | 0FBF8D E8D7FFFF           | movsx ecx,word ptr ss:[ebp-0x2818]      |

004599E1 | 83C1 06                   | add ecx,0x6                             |

004599E4 | 8D95 E4D7FFFF             | lea edx,dword ptr ss:[ebp-0x281C]       |

004599EA | 51                        | push ecx                                |

004599EB | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

004599F1 | 52                        | push edx                                |

004599F2 | E8 F9C8FDFF               | call <client.sub_4362F0>    /使用技能CAll            |

--------------------------------------------------------------------------------------

Call

push 1A

push (自己申请内存地址)

mov ecx, dword ptr ds:[0x00EAF768]

call 0x004362F0

 

--------------------------------------------------------------------------------------

重要数据

0A 00 09 00 14 00 0A 00 44 00 37 A6 07 00 81 4D

F9 C3 00 00 70 41 16 CB 65 C3 00 00 00 00 00 00

 

===============================================================

组队Call(发包)

------------------------------------------------------------------------------------------------------------

005B240C | A0 82B34405               | mov al,byte ptr ds:[0x544B382]          |

005B2411 | 3AC3                      | cmp al,bl                               |

005B2413 | 66:898D 02D8FFFF          | mov word ptr ss:[ebp-0x27FE],cx         |

005B241A | 66:C785 FCD7FFFF 0600     | mov word ptr ss:[ebp-0x2804],0x6        |

005B2423 | 75 23                     | jne client.5B2448                       |

005B2425 | 381D 81B34405             | cmp byte ptr ds:[0x544B381],bl          |

005B242B | 75 1B                     | jne client.5B2448                       |

005B242D | 8D8D F8D7FFFF             | lea ecx,dword ptr ss:[ebp-0x2808]       |

005B2433 | 6A 20                     | push 0x20                               |

005B2435 | 51                        | push ecx                                |

005B2436 | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

005B243C | E8 AF3EE8FF               | call <client.sub_4362F0>  /组队CALL              |

 

------------------------------------------------------------------------------------------------------------

重要数据

00 00 30 00 06 00 01 00 01 00 0B 00 00 00 00 00

------------------------------------------------------------------------------------------------------------

Call

push 0x20

push 自己申请内存

mov ecx, dword ptr ds:[0xEAF768]

call 0x4362F0

 

==================================================================

组队接组(发包)外带组人返回

-----------------------------------------------------------------------------------------------------------

005C4677 | 50                        | push eax                                |

005C4678 | EB 77                     | jmp client.5C46F1                       |

005C467A | 83F9 62                   | cmp ecx,0x62                            | 62:'b'

005C467D | 0F85 85000000             | jne client.5C4708                       |

005C4683 | 83B8 F4020000 01          | cmp dword ptr ds:[eax+0x2F4],0x1        |

005C468A | 0F85 6C050000             | jne client.5C4BFC                       |

005C4690 | B9 000A0000               | mov ecx,0xA00                           |

005C4695 | 33C0                      | xor eax,eax                             |

005C4697 | 8DBD 52D7FFFF             | lea edi,dword ptr ss:[ebp-0x28AE]       |

005C469D | 66:C785 4CD7FFFF 0000     | mov word ptr ss:[ebp-0x28B4],0x0        |

005C46A6 | F3:AB                     | rep stosd                               |

005C46A8 | 66:8B8B 4C020000          | mov cx,word ptr ds:[ebx+0x24C]          |

005C46AF | B8 01000000               | mov eax,0x1                             |

005C46B4 | 66:8985 52D7FFFF          | mov word ptr ss:[ebp-0x28AE],ax         |

005C46BB | 66:8985 54D7FFFF          | mov word ptr ss:[ebp-0x28AC],ax         |

005C46C2 | A0 82B34405               | mov al,byte ptr ds:[0x544B382]          |

005C46C7 | 66:C785 4ED7FFFF 3400     | mov word ptr ss:[ebp-0x28B2],0x34       | 34:'4'

005C46D0 | 84C0                      | test al,al                              |

005C46D2 | 66:898D 56D7FFFF          | mov word ptr ss:[ebp-0x28AA],cx         |

005C46D9 | 66:C785 50D7FFFF 0600     | mov word ptr ss:[ebp-0x28B0],0x6        |

005C46E2 | 0F85 14050000             | jne client.5C4BFC                       |

005C46E8 | 8D95 4CD7FFFF             | lea edx,dword ptr ss:[ebp-0x28B4]       |

005C46EE | 6A 0C                     | push 0xC                                |

005C46F0 | 52                        | push edx                 //接受调用            |

005C46F1 | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

005C46F7 | E8 F41BE7FF               | call <client.sub_4362F0> //接组CALL               |

005C46FC | C605 82B34405 01          | mov byte ptr ds:[0x544B382],0x1         |

005C4703 | E9 F4040000               | jmp client.5C4BFC                       |

005C4708 | 83F9 63                   | cmp ecx,0x63                            | 63:'c'

005C470B | 0F85 EB040000             | jne client.5C4BFC                       |

005C4711 | 83B8 F4020000 01          | cmp dword ptr ds:[eax+0x2F4],0x1        |

005C4718 | 0F85 DE040000             | jne client.5C4BFC                       |

005C471E | B9 000A0000               | mov ecx,0xA00                           |

005C4723 | 33C0                      | xor eax,eax                             |

005C4725 | 8DBD 52D7FFFF             | lea edi,dword ptr ss:[ebp-0x28AE]       |

005C472B | 66:C785 4CD7FFFF 0000     | mov word ptr ss:[ebp-0x28B4],0x0        |

005C4734 | F3:AB                     | rep stosd                               |

005C4736 | 66:8B83 4C020000          | mov ax,word ptr ds:[ebx+0x24C]          |

005C473D | 66:C785 4ED7FFFF 3400     | mov word ptr ss:[ebp-0x28B2],0x34       | 34:'4'

005C4746 | 66:8985 56D7FFFF          | mov word ptr ss:[ebp-0x28AA],ax         |

005C474D | A0 82B34405               | mov al,byte ptr ds:[0x544B382]          |

005C4752 | 84C0                      | test al,al                              |

005C4754 | 66:C785 52D7FFFF 0100     | mov word ptr ss:[ebp-0x28AE],0x1        |

005C475D | 66:C785 54D7FFFF 0200     | mov word ptr ss:[ebp-0x28AC],0x2        |

005C4766 | 66:C785 50D7FFFF 0600     | mov word ptr ss:[ebp-0x28B0],0x6        |

005C476F | 0F85 87040000             | jne client.5C4BFC                       |

005C4775 | 8D8D 4CD7FFFF             | lea ecx,dword ptr ss:[ebp-0x28B4]       |

005C477B | 6A 0C                     | push 0xC                                |

005C477D | 51                        | push ecx              //拒绝调用                  |

005C477E | E9 6EFFFFFF               | jmp client.5C46F1                       |

---------------------------------------------------------------------------------------------

重要数据

00 00 34 00 06 00 01 00 01 00 0B 00 00 00 00 00  接受 push C

 

00 00 34 00 06 00 01 00 02 00 0B 00 00 00 00 00  拒绝 push C

 

00 00 32 00 04 00 01 00 0A 00 00 00 00 00 00 00  发送组队返回 push A

----------------------------------------------------------------------------------------------

CALL

push 0xC(根据情况)

push 自己申请内存

mov ecx,dword ptr ds:[0xEAF768]

call <client.sub_4362F0>

=================================================================

组队委任队长(发包)

---------------------------------------------------------------------------------------------------

005B7FB8 | 81FF 80B34405             | cmp edi,client.544B380                  |

005B7FBE | 7C D2                     | jl client.5B7F92                        |

005B7FC0 | 66:898D FCD7FFFF          | mov word ptr ss:[ebp-0x2804],cx         |

005B7FC7 | 83C1 06                   | add ecx,0x6                             |

005B7FCA | 8D85 F8D7FFFF             | lea eax,dword ptr ss:[ebp-0x2808]       |

005B7FD0 | 51                        | push ecx                                |

005B7FD1 | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

005B7FD7 | 50                        | push eax                                |

005B7FD8 | E8 13E3E7FF               | call <client.sub_4362F0>                |

--------------------------------------------------------------------------------------------------

重要数据

00 00 28 00 12 00 01 00 0B 00 B5 D8 B7 BD CE EF

C8 A8 B7 A8 00 00 00 00 00 00 00 00 00 00 00 00

---------------------------------------------------------------------------------------------------

CALL

 

push 0x18

push 自己申请内存

mov ecx, dword ptr ds:[0x00EAF768]

call 0x004362F0

==============================================================

 

 

 

拾取物品(发包)

---------------------------------------------------------------------------------------------------------

00434DE6 | E8 05150000               | call <client.sub_4362F0>                |

 

----------------------------------------------------------------------------------------------------------

重要数据

00 00 0B 00 08 00 1C 35 00 00 00 00 00 00 00 00

----------------------------------------------------------------------------------------------------------

CALL

 

push 0xE

push 自己申请内存

mov ecx, dword ptr ds:[0x00EAF768]

call 0x004362F0

=============================================================

 

 

 

使用土灵符Call(发包)

-----------------------------------------------------------------------------------------------------------------------

005DAAAC | 66:8B86 18040000          | mov ax,word ptr ds:[esi+0x418]          |

005DAAB3 | 66:8996 46020000          | mov word ptr ds:[esi+0x246],dx          |

005DAABA | 66:C785 7AD7FFFF 0510     | mov word ptr ss:[ebp-0x2886],0x1005     |

005DAAC3 | 66:8985 7ED7FFFF          | mov word ptr ss:[ebp-0x2882],ax         |

005DAACA | 66:8995 80D7FFFF          | mov word ptr ss:[ebp-0x2880],dx         |

005DAAD1 | 66:C785 7CD7FFFF 0400     | mov word ptr ss:[ebp-0x2884],0x4        |

005DAADA | 6A 0A                     | push 0xA                                |

005DAADC | 8D8D 78D7FFFF             | lea ecx,dword ptr ss:[ebp-0x2888]       |

005DAAE2 | 51                        | push ecx                                |

005DAAE3 | 8B0D 68F7EA00             | mov ecx,dword ptr ds:[0xEAF768]         | 00EAF768:&"L妠"

005DAAE9 | E8 02B8E5FF               | call <client.sub_4362F0>                |

-------------------------------------------------------------------------------------------------------------

重要数据

00 00 05 10 04 00 06 00 0B 00 00 00 00 00 00 00

--------------------------------------------------------------------------------------------------------

保存1 == 0A

保存2 == 0B

保存3 == 0C

保存4 == 0D

保存5 == 0E

保存6 == 0F

保存7 == 10

保存8 == 11

保存9 == 12

保存0 == 13

--------------------------------------------------------------------------------------------------------

Call

push 0xA

push ecx

mov ecx, dword ptr ds:[0x00EAF768]

call 0x004362F0

 

 

 

 

 

==============================================================

热血江湖关于登录

==============================================================

账号密码登录内存

-----------------------------------------------------------------------------------------------

账号显示=[EB0760]

输入位置内存=[22D0D54]+13C

账号内存存储位置=[22D0D84]+214

密码内存存储位置=[22D0D84]+49C

----------------------------------------------------------------

角色登录call

=================================================================

需要ebx==[0x05469200]    eax==角色序号       [0544C604]==角色序号

005E6ED4 - 8D 8B 04020000        - lea ecx,[ebx+00000204]

005E6EDA - 8D 14 C0              - lea edx,[eax+eax*8]

005E6EDD - 8D 04 D5 40C44405     - lea eax,[edx*8+0544C440]

005E6EE4 - 8B 14 D5 40C44405     - mov edx,[edx*8+0544C440]

005E6EEB - 89 11                 - mov [ecx],edx

005E6EED - 8B 50 04              - mov edx,[eax+04]

005E6EF0 - 89 51 04              - mov [ecx+04],edx

005E6EF3 - 8B 50 08              - mov edx,[eax+08]

005E6EF6 - 89 51 08              - mov [ecx+08],edx

005E6EF9 - 66 8B 50 0C           - mov dx,[eax+0C]

005E6EFD - 66 89 51 0C           - mov [ecx+0C],dx

005E6F01 - 8A 40 0E              - mov al,[eax+0E]

005E6F04 - 88 41 0E              - mov [ecx+0E],al

005E6F07 - A1 04C64405           - mov eax,[0544C604]//内存值为角色序号0,1,2,3

005E6F0C - 8D 0C C0              - lea ecx,[eax+eax*8]

005E6F0F - 0FBE 14 CD 72C44405   - movsx edx,byte ptr [ecx*8+0544C472]

005E6F17 - 89 15 00C64405        - mov [0544C600],edx

005E6F1D - C7 83 10040000 01000000 - mov [ebx+00000410],00000001

005E6F27 - C7 83 14040000 00000000 - mov [ebx+00000414],00000000

-----------------------------------------------------------------------------------------------------

序号位置=[0544C604]

---------------------------------------------------------------------------------------------------

CALL

mov ebx,[0x05469200]

mov eax,0(角色序号)

mov dword ptr ds:[0x0544C604],eax

 

lea ecx, ds:[ebx+0x204]

lea edx, ds:[eax+eax*8]

lea eax, ds:[edx*8+0x544C440]

mov edx, dword ptr ds:[edx*8+0x544C440]

mov dword ptr ds:[ecx], edx

mov edx, dword ptr ds:[eax+0x4]

mov dword ptr ds:[ecx+0x4], edx

mov edx, dword ptr ds:[eax+0x8]

mov dword ptr ds:[ecx+0x8], edx

mov dx, word ptr ds:[eax+0xC]

mov word ptr ds:[ecx+0xC], dx

mov al, byte ptr ds:[eax+0xE]

mov byte ptr ds:[ecx+0xE], al

mov eax, dword ptr ds:[0x0544C604]

lea ecx, ds:[eax+eax*8]

movsx edx, byte ptr ds:[ecx*8+0x544C472]

mov dword ptr ds:[0x0544C600],edx

mov dword ptr ds:[ebx+0x410], 0x1

mov dword ptr ds:[ebx+0x414], 0x0

 

‘’’’’’’’’’’’lea ecx, ds:[ebx+0x204]   ----开始

{141,139,4,2,0,0,141,20,192,141,4,213,64,196,68,5,139,20,213,64,196,68,5,137,17,139,80,4,137,81,4,139,80,8,137,81,8,102,139,80,12,102,137,81,12,138,64,14,136,65,14,161,4,198,68,5,141,12,192,15,190,20,205,114,196,68,5,137,21,0,198,68,5,199,131,16,4,0,0,1,0,0,0,199,131,20,4,0,0,0,0,0,0}

‘’’’’’’’’’’’mov dword ptr ds:[ebx+0x414], 0x0 ---结束

===============================================================

2.0  5.0   8.0

角色登录界面特征码

 

八个星位置为选择角色的基地址

8B**6A006A016A02FF**04A1********3DFFFF0000

 

两个jne改为je (会直接进入游戏读条界面)

4683C70483C1**83FE04

 

 

===============================================================

send封包登录账号密码

-------------------------------------------------------------------------------------------------------

0080160001 003 1 0 1 003 2 

00000000000000000000000000000000

-----------------------------------------------------------------------------------------------------------

注意:发包前需要套接字的支持

Pc:关于账号密码未文本到十六进制的格式

=====================================================================

send封包选线

-------------------------------------------------------------------------------------------------------------

0C800900010000000100000001

----------------------------------------------------------------------------------------------------------------

Ps:关于加密猜想应该是加密文件替换发送选线包后自动发送封包会进行数据加密

=====================================================================

Send封包游戏角色小腿

--------------------------------------------------------------------------------------------------

AA550F00012C015600000000000000000

======================================

 

 

0

评论区