- 注册时间
- 2012-11-9
- 最后登录
- 1970-1-1
该用户从未签到
|
push一个是4个字节,而在以下的这段技能CALL代码中的004AA11C |83C4 10 add esp,0x10出现了10,请问10字节还有可能是代表其他什么参数的么?- 004AA0F9 /74 24 je Xasktao.004AA11F
- 004AA0FB |8B0D BC44AE00 mov ecx,dword ptr ds:[0xAE44BC]
- 004AA101 |8B11 mov edx,dword ptr ds:[ecx]
- 004AA103 |8B82 D8000000 mov eax,dword ptr ds:[edx+0xD8]
- 004AA109 |53 push ebx
- 004AA10A |FFD0 call eax
- 004AA10C |50 push eax ; eax=00031B64 [color=Red]这里的参数会变!目前没有去琢磨怎么变的[/color]
- 004AA10D |68 94879500 push asktao.00958794 ; ASCII "victim_id = %d, skill_no = %d" [color=Red]这里是技能CALL的引用技能ID,后面的SKILL_NO 不大清楚什么意思,应该是是否使用[/color]
- 004AA112 |68 32200000 push 0x2032
- 004AA117 |E8 14631600 call asktao.00610430
- 004AA11C |83C4 10 add esp,0x10
- 004AA11F \68 903D9400 push asktao.00943D90
- 004AA124 68 D0389500 push asktao.009538D0 ; ASCII "skill_name"
- 004AA129 8BCD mov ecx,ebp
- 004AA12B BF CC879500 mov edi,asktao.009587CC
- 004AA130 E8 CB4F1900 call asktao.0063F100
- 004AA135 8BF0 mov esi,eax
- 004AA137 B9 09000000 mov ecx,0x9
- 004AA13C 33D2 xor edx,edx
- 004AA13E F3:A6 repe cmps byte ptr es:[edi],byte ptr ds:>
- 004AA140 75 18 jnz Xasktao.004AA15A
- 004AA142 6A 00 push 0x0
- 004AA144 6A 00 push 0x0
- 004AA146 68 04609400 push asktao.00946004 ; ASCII "CLOSE_CTM"
- 004AA14B 6A 00 push 0x0
- 004AA14D 68 88879500 push asktao.00958788 ; ASCII "SklMainDlg"
- 004AA152 E8 69510E00 call asktao.0058F2C0
- 004AA157 83C4 14 add esp,0x14
- 004AA15A 8B8C24 BC000000 mov ecx,dword ptr ss:[esp+0xBC]
- 004AA161 64:890D 0000000>mov dword ptr fs:[0],ecx
- 004AA168 59 pop ecx
- 004AA169 5F pop edi
- 004AA16A 5E pop esi
- 004AA16B 5D pop ebp
- 004AA16C 5B pop ebx
- 004AA16D 8B8C24 A4000000 mov ecx,dword ptr ss:[esp+0xA4]
- 004AA174 33CC xor ecx,esp
- 004AA176 E8 AB194200 call asktao.008CBB26
- 004AA17B 81C4 B4000000 add esp,0xB4
- 004AA181 C3 retn
复制代码 |
|