|
发表于 2023-10-9 22:54:54
|
查看: 2502 |
回复: 0
获取任务描述(this,任务ID)
00AA1BA7 | 68 BC841F01 | push elementclient.11F84BC | 11F84BC:"Win_QuestMinion_Min"
00AA1BAC | 8BC8 | mov ecx, eax |
00AA1BAE | 8B10 | mov edx, dword ptr ds:[eax] |
00AA1BB0 | FF52 34 | call dword ptr ds:[edx+34] | 获取任务窗口UI对象
00AA1BB3 | 85C0 | test eax, eax |
00AA1BB5 | 0F84 D82B0000 | je elementclient.AA4793 |
00AA1BBB | 8B10 | mov edx, dword ptr ds:[eax] |
00AA1BBD | 8BC8 | mov ecx, eax |
00AA1BBF | 6A 01 | push 1 |
00AA1BC1 | 6A 00 | push 0 |
00AA1BC3 | 6A 00 | push 0 |
00AA1BC5 | FF52 24 | call dword ptr ds:[edx+24] |
00AA1BC8 | E9 C62B0000 | jmp elementclient.AA4793 |
00AA1BCD | A1 A4AF4201 | mov eax, dword ptr ds:[142AFA4] |
00AA1BD2 | 8985 28FDFFFF | mov dword ptr ss:[ebp-2D8], eax |
00AA1BD8 | C745 FC 00000000 | mov dword ptr ss:[ebp-4], 0 |
00AA1BDF | 8985 F0FCFFFF | mov dword ptr ss:[ebp-310], eax | [ebp-310]:L"^ffcb4a拜师鬼王"
00AA1BE5 | 8985 20FDFFFF | mov dword ptr ss:[ebp-2E0], eax | [ebp-2E0]:",ThT"
00AA1BEB | 8BCB | mov ecx, ebx |
00AA1BED | C645 FC 02 | mov byte ptr ss:[ebp-4], 2 |
00AA1BF1 | E8 CAB4DDFF | call elementclient.87D0C0 |
00AA1BF6 | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1BFC | 8B80 70020000 | mov eax, dword ptr ds:[eax+270] |
00AA1C02 | 8985 DCFCFFFF | mov dword ptr ss:[ebp-324], eax |
00AA1C08 | E8 53FB3600 | call elementclient.E11760 |
00AA1C0D | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1C13 | 50 | push eax |
00AA1C14 | 8985 78FCFFFF | mov dword ptr ss:[ebp-388], eax | [ebp-388]:"匕O\x01"
00AA1C1A | E8 C1F43600 | call elementclient.E110E0 |
00AA1C1F | 8BF8 | mov edi, eax |
00AA1C21 | C685 1FFDFFFF 01 | mov byte ptr ss:[ebp-2E1], 1 |
00AA1C28 | 89BD ECFCFFFF | mov dword ptr ss:[ebp-314], edi |
00AA1C2E | 85FF | test edi, edi |
00AA1C30 | 0F84 DE000000 | je elementclient.AA1D14 |
00AA1C36 | 51 | push ecx |
00AA1C37 | 8BCC | mov ecx, esp |
00AA1C39 | 68 9CA53001 | push elementclient.130A59C |
00AA1C3E | E8 5D324300 | call elementclient.ED4EA0 |
00AA1C43 | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1C49 | 57 | push edi |
00AA1C4A | E8 B1F53600 | call elementclient.E11200 |
00AA1C4F | 8B0D 742B4D01 | mov ecx, dword ptr ds:[14D2B74] |
00AA1C55 | 33F6 | xor esi, esi |
00AA1C57 | 85C9 | test ecx, ecx |
00AA1C59 | 7E 10 | jle elementclient.AA1C6B |
00AA1C5B | 8B15 682B4D01 | mov edx, dword ptr ds:[14D2B68] |
00AA1C61 | 3B04B2 | cmp eax, dword ptr ds:[edx+esi*4] |
00AA1C64 | 74 2C | je elementclient.AA1C92 |
00AA1C66 | 46 | inc esi |
00AA1C67 | 3BF1 | cmp esi, ecx |
00AA1C69 | 7C F6 | jl elementclient.AA1C61 |
00AA1C6B | 8A85 1FFDFFFF | mov al, byte ptr ss:[ebp-2E1] |
00AA1C71 | 3BF1 | cmp esi, ecx |
00AA1C73 | 74 39 | je elementclient.AA1CAE |
00AA1C75 | 84C0 | test al, al |
00AA1C77 | 74 35 | je elementclient.AA1CAE |
00AA1C79 | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1C7F | 57 | push edi |
00AA1C80 | E8 ABF73600 | call elementclient.E11430 |
00AA1C85 | 8BF8 | mov edi, eax |
00AA1C87 | 89BD ECFCFFFF | mov dword ptr ss:[ebp-314], edi |
00AA1C8D | E9 7A000000 | jmp elementclient.AA1D0C |
00AA1C92 | 50 | push eax |
00AA1C93 | FFB5 E8FCFFFF | push dword ptr ss:[ebp-318] |
00AA1C99 | 8BCB | mov ecx, ebx |
00AA1C9B | E8 F0D3FFFF | call elementclient.A9F090 |
00AA1CA0 | 8B0D 742B4D01 | mov ecx, dword ptr ds:[14D2B74] |
00AA1CA6 | 8885 1FFDFFFF | mov byte ptr ss:[ebp-2E1], al |
00AA1CAC | EB C3 | jmp elementclient.AA1C71 |
00AA1CAE | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1CB4 | 57 | push edi |
00AA1CB5 | E8 26F43600 | call elementclient.E110E0 |
00AA1CBA | 8BF8 | mov edi, eax |
00AA1CBC | 85FF | test edi, edi |
00AA1CBE | 74 22 | je elementclient.AA1CE2 |
00AA1CC0 | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1CC6 | 57 | push edi |
00AA1CC7 | E8 64F73600 | call elementclient.E11430 |
00AA1CCC | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1CD2 | 8BF0 | mov esi, eax |
00AA1CD4 | 6A 01 | push 1 |
00AA1CD6 | 57 | push edi |
00AA1CD7 | E8 A4EF3600 | call elementclient.E10C80 |
00AA1CDC | 8BFE | mov edi, esi |
00AA1CDE | 85F6 | test esi, esi |
00AA1CE0 | 75 DE | jne elementclient.AA1CC0 |
00AA1CE2 | 8B85 ECFCFFFF | mov eax, dword ptr ss:[ebp-314] |
00AA1CE8 | 8BF0 | mov esi, eax |
00AA1CEA | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1CF0 | 50 | push eax |
00AA1CF1 | E8 3AF73600 | call elementclient.E11430 |
00AA1CF6 | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1CFC | 8BF8 | mov edi, eax |
00AA1CFE | 6A 01 | push 1 |
00AA1D00 | 56 | push esi |
00AA1D01 | 89BD ECFCFFFF | mov dword ptr ss:[ebp-314], edi |
00AA1D07 | E8 74EF3600 | call elementclient.E10C80 |
00AA1D0C | 85FF | test edi, edi |
00AA1D0E | 0F85 22FFFFFF | jne elementclient.AA1C36 |
00AA1D14 | 33F6 | xor esi, esi |
00AA1D16 | 89B5 D8FCFFFF | mov dword ptr ss:[ebp-328], esi |
00AA1D1C | 3935 742B4D01 | cmp dword ptr ds:[14D2B74], esi |
00AA1D22 | 0F8E 73280000 | jle elementclient.AA459B |
00AA1D28 | 0F1F8400 00000000 | nop dword ptr ds:[eax+eax], eax |
00AA1D30 | A1 682B4D01 | mov eax, dword ptr ds:[14D2B68] |
00AA1D35 | 8BCB | mov ecx, ebx |
00AA1D37 | 8B3CB0 | mov edi, dword ptr ds:[eax+esi*4] |
00AA1D3A | 57 | push edi |
00AA1D3B | FFB5 E8FCFFFF | push dword ptr ss:[ebp-318] |
00AA1D41 | 89BD 00FDFFFF | mov dword ptr ss:[ebp-300], edi |
00AA1D47 | E8 44D3FFFF | call elementclient.A9F090 |
00AA1D4C | 84C0 | test al, al |
00AA1D4E | 0F84 34280000 | je elementclient.AA4588 |
00AA1D54 | FFB5 78FCFFFF | push dword ptr ss:[ebp-388] | [ebp-388]:"匕O\x01"
00AA1D5A | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1D60 | E8 7BF33600 | call elementclient.E110E0 |
00AA1D65 | 8BF0 | mov esi, eax |
00AA1D67 | 8985 18FDFFFF | mov dword ptr ss:[ebp-2E8], eax | [ebp-2E8]:&L"^ffcb4a加入门派\r^ffcb4a修真之路"
00AA1D6D | 85F6 | test esi, esi |
00AA1D6F | 74 35 | je elementclient.AA1DA6 |
00AA1D71 | 51 | push ecx |
00AA1D72 | 8BCC | mov ecx, esp |
00AA1D74 | 68 9CA53001 | push elementclient.130A59C |
00AA1D79 | E8 22314300 | call elementclient.ED4EA0 |
00AA1D7E | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1D84 | 56 | push esi |
00AA1D85 | E8 76F43600 | call elementclient.E11200 |
00AA1D8A | 3BC7 | cmp eax, edi |
00AA1D8C | 74 12 | je elementclient.AA1DA0 |
00AA1D8E | 8B8B A4020000 | mov ecx, dword ptr ds:[ebx+2A4] |
00AA1D94 | 56 | push esi |
00AA1D95 | E8 96F63600 | call elementclient.E11430 |
00AA1D9A | 8BF0 | mov esi, eax |
00AA1D9C | 85F6 | test esi, esi |
00AA1D9E | 75 D1 | jne elementclient.AA1D71 |
00AA1DA0 | 89B5 18FDFFFF | mov dword ptr ss:[ebp-2E8], esi | [ebp-2E8]:&L"^ffcb4a加入门派\r^ffcb4a修真之路"
00AA1DA6 | 8B8D C8FCFFFF | mov ecx, dword ptr ss:[ebp-338] |
00AA1DAC | 57 | push edi |
00AA1DAD | E8 3EDD2B00 | call elementclient.D5FAF0 |
00AA1DB2 | 84C0 | test al, al |
00AA1DB4 | 0F84 032A0000 | je elementclient.AA47BD |
00AA1DBA | 8B8D E8FCFFFF | mov ecx, dword ptr ss:[ebp-318] |
00AA1DC0 | 57 | push edi | 00002BB8
00AA1DC1 | E8 EA642C00 | call <elementclient.获取任务描述(this,任务ID)>
00AA1DC6 | 8BF0 | mov esi, eax | [eax+C58]+AE4 // 获取任务描述(this,任务ID)
00AA1DC8 | 89B5 F4FCFFFF | mov dword ptr ss:[ebp-30C], esi |
00AA1DCE | 85F6 | test esi, esi |
00AA1DD0 | 0F84 AC270000 | je elementclient.AA4582 |
00AA1DD6 | 8B8E 580C0000 | mov ecx, dword ptr ds:[esi+C58] | [esi+C58]+AE4
00AA1DDC | 8985 E0FCFFFF | mov dword ptr ss:[ebp-320], eax | eax+AE4
00AA1DE2 | 85C9 | test ecx, ecx |
00AA1DE4 | 74 1C | je elementclient.AA1E02 |
00AA1DE6 | 6666:0F1F8400 0000000 | nop word ptr ds:[eax+eax], ax |
00AA1DF0 | 8BC1 | mov eax, ecx |
00AA1DF2 | 898D E0FCFFFF | mov dword ptr ss:[ebp-320], ecx |
00AA1DF8 | 8B89 580C0000 | mov ecx, dword ptr ds:[ecx+C58] |
00AA1DFE | 85C9 | test ecx, ecx |
00AA1E00 | 75 EE | jne elementclient.AA1DF0 |
00AA1E02 | 85C0 | test eax, eax |
00AA1E04 | 0F84 78270000 | je elementclient.AA4582 |
00AA1E0A | 8D8D 2CFDFFFF | lea ecx, dword ptr ss:[ebp-2D4] |
00AA1E10 | 51 | push ecx |
00AA1E11 | FF70 04 | push dword ptr ds:[eax+4] |
00AA1E14 | 8B8D C8FCFFFF | mov ecx, dword ptr ss:[ebp-338] |
00AA1E1A | E8 41D72B00 | call elementclient.D5F560 |
00AA1E1F | 8B85 E0FCFFFF | mov eax, dword ptr ss:[ebp-320] |
00AA1E25 | 83C0 08 | add eax, 8 |
00AA1E28 | 83BD 40FDFFFF 00 | cmp dword ptr ss:[ebp-2C0], 0 |
00AA1E2F | 50 | push eax |
00AA1E30 | 8D85 F0FCFFFF | lea eax, dword ptr ss:[ebp-310] | [ebp-310]:L"^ffcb4a拜师鬼王"
00AA1E36 | 74 07 | je elementclient.AA1E3F |
00AA1E38 | 68 04721F01 | push elementclient.11F7204 | 11F7204:L"^ff0000%s"
00AA1E3D | EB 05 | jmp elementclient.AA1E44 |
00AA1E3F | 68 98AA2601 | push elementclient.126AA98 | 126AA98:L"^ffcb4a%s"
00AA1E44 | 50 | push eax |
00AA1E45 | E8 66564300 | call elementclient.ED74B0 |
00AA1E4A | 83C4 0C | add esp, C |
00AA1E4D | 8D85 F0FCFFFF | lea eax, dword ptr ss:[ebp-310] | [ebp-310]:L"^ffcb4a拜师鬼王"
|
游戏安全课程 学员办理咨询联系QQ150330575 手机 139 9636 2600 免费课程 在 www.bilibili.com 搜 郁金香灬老师
|
|