回复 #4 wysjbc 的帖子
0043BD3F . 8B45 E0 MOV EAX,DWORD PTR SS:[EBP-20]
0043BD42 8B4D F0 MOV ECX,DWORD PTR SS:[EBP-10]
0043BD45 BA 01000000 MOV EDX,1
0043BD4A 6BC0 08 IMUL EAX,EAX,8
0043BD4D 3BC1 CMP EAX,ECX
0043BD4F 7E 05 JLE SHORT Ekd5.0043BD56
0043BD51 2BC1 SUB EAX,ECX
0043BD53 42 INC EDX
0043BD54 ^ EB F7 JMP SHORT Ekd5.0043BD4D
0043BD56 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
0043BD59 C1E8 02 SHR EAX,2
0043BD5C 03D0 ADD EDX,EAX
0043BD5E 8955 FC MOV DWORD PTR SS:[EBP-4],EDX
0043BD61 EB 1b JMP SHORT Ekd5.0043BD7E
攻击除以防御乘以8
0043DB6C . /0F8E 97000000 JLE Ekd5.0043DC09
0043DB72 |8A45 F8 MOV AL,BYTE PTR SS:[EBP-8]
0043DB75 |50 PUSH EAX
0043DB76 |8B4D F4 MOV ECX,DWORD PTR SS:[EBP-C]
0043DB79 |8A51 04 MOV DL,BYTE PTR DS:[ECX+4]
0043DB7C |52 PUSH EDX
0043DB7D |B9 F0274900 MOV ECX,Ekd5.004927F0
0043DB82 |E8 6A89FCFF CALL Ekd5.004064F1
0043DB87 |E9 7D000000 JMP Ekd5.0043DC09
两轮攻击
|