你用这个软件[attach]6369804[/attach] 反汇编太阁5的exe文件,解出来的文件中会出现一堆Possible StringData Ref from Data Obj ->的行,一般的小功能程序段就在这些行的附近,注意这些字符是big5码的,要转换一下才看的懂,比如以下的:
* Possible StringData Ref from Data Obj ->"ň縨" "防禦"
* Possible StringData Ref from Data Obj ->"簿笆" "移动"
* Possible StringData Ref from Data Obj ->"秤兵ン" "胜利条件"
* Possible StringData Ref from Data Obj ->"毖兵ン" "败北条件"
* Possible StringData Ref from Data Obj ->"" ""
* Possible StringData Ref from Data Obj ->"砰" "体力"
* Possible StringData Ref from Data Obj ->"" "气力"
* Possible StringData Ref from Data Obj ->"杆称" "装备"
* Possible StringData Ref from Data Obj ->"? "?
* Possible StringData Ref from Data Obj ->"" ""
* Possible StringData Ref from Data Obj ->"闽超" "关闭"
* Possible StringData Ref from Data Obj ->"м" "秘技"
* Possible StringData Ref from Data Obj ->"発" "逃亡"
* Possible StringData Ref from Data Obj ->"ň縨" "防禦"
反汇编得到的程序行号和主程序的对应地址之间相差400000h。
反汇编对应的说明:[attach]6369806[/attach] 作者: wangzc2009 时间: 2015-7-5 20:18:57
bhima 发表于 2015-7-5 13:04
你用这个软件 反汇编太阁5的exe文件,解出来的文件中会出现一堆Possible StringData Ref from Data Obj - ...
万岁!谢谢你!。。。。我分析出全显示马价,米价,交易品价了。。。。。真是太感谢了。
全显米价,马价,交易品价
[ENABLE]
00573673:
jbe 00573730
00573684:
je 00573730
00573BAC:
jbe 00573C5B
00573BBD:
je 00573C5B
005772f2:
jmp 00577302
nop
nop
nop
[DISABLE]
00573673:
ja 00573730
00573684:
jne 00573730
00573BAC:
ja 00573C5B
00573BBD:
jne 00573C5B
005772f2:
je 005773A1 作者: bhima 时间: 2015-7-5 21:31:41
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem1,2048)
alloc(Pointer,4)
registersymbol(Pointer)
label(operations1)
label(returnhere1)
label(originalcode1)
label(exit1)
newmem3:
push ebx
mov bx,[0075361A]
cmp bx,[esi]
jne originalcode3
mov bl,[esi+8]
and bl,0f
cmp bl,0
je originalcode3
pop ebx
test byte ptr [esi+09],-80
jne Taikou5.exe+CDA00
jmp exit3
originalcode3:
pop ebx
test byte ptr [esi+09],-80
je Taikou5.exe+CDA00
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem1)
dealloc(Pointer)
unregistersymbol(Pointer)
"Taikou5.exe"+1FDCE:
test word ptr [ecx+02],0FFF
//Alt: db 66 F7 41 02 FF 0F
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
dealloc(wardata)
unregistersymbol(wardata)
"Taikou5.exe"+ACB13:
mov di,[ebx+04]
and eax,000000FF
dealloc(newmem3)
"Taikou5.exe"+CDACE:
test byte ptr [esi+09],-80
je Taikou5.exe+CDA00
//Alt: db 66 8B 7B 04 25 FF 00 00 00作者: wangzc2009 时间: 2015-7-21 20:13:18
本帖最后由 wangzc2009 于 2015-7-23 18:38 编辑
bhima 发表于 2015-7-17 21:40
我发现出兵的最大值是这一块:
* Possible StringData Ref from Data Obj ->"%s
( ...