DWORD Take_code()//取技能代码
{
// __declspec (naked)
int Replica_information ;
int Load_CALL ;
int Division ;
int The_base_path ;
int Load ;
int Catalog ; //ebp-0x14
int position;
Replica_information = 副本信息; //ebp-4
Load_CALL = 加载CALL; //ebp-8
Division = 分割CALL; //ebp-0xC
The_base_path = 路径基址; //ebp-0X10
Load = 加载CALL; //ebp-0x14
Catalog ;//ebp-0x18
position = GetPrivateProfileIntA("技能全屏", "技能代码", 10, lpPath); //ebp-0x1C
try{
__asm{
mov ecx, dword ptr ss : [Replica_information]
mov ecx, dword ptr ds : [ecx]
push 0x1
push dword ptr ss : [position]
call dword ptr ss : [Load_CALL]
test eax, eax
je Lable1
mov edi, eax
lea esi, dword ptr ds : [edi + 0xB4]
lea eax, dword ptr ds : [edi + 0xF4]
push esi
push eax
lea edx, dword ptr ss : [Replica_information]
push edx
mov dword ptr ds : [edx], 0x0
call dword ptr ss : [Division]
add esp, 0xC
mov eax, dword ptr ds : [eax]
mov ecx, dword ptr ss : [The_base_path]
mov ecx, dword ptr ds : [ecx]
push 0x1
push eax
call dword ptr ss : [Load]
Lable1 :
mov dword ptr ss : [Catalog], eax
}
}
catch (...){}
return Catalog;
}
[培训]科锐逆向工程师培训第53期2025年7月8日开班!