龙之谷跟背包有关的代码

来源:互联网 发布:淘宝客手机网站搭建 编辑:程序博客网 时间:2024/05/04 08:58
006DF0F0    55              push ebp006DF0F1    8BEC            mov ebp,esp006DF0F3    83E4 F8         and esp,-0x8006DF0F6    83EC 14         sub esp,0x14006DF0F9    53              push ebx006DF0FA    8B5D 08         mov ebx,dword ptr ss:[ebp+0x8]006DF0FD    85DB            test ebx,ebx006DF0FF    56              push esi006DF100    57              push edi006DF101    8BF9            mov edi,ecx006DF103    75 4F           jnz short DragonNe.006DF154006DF105    8D87 70020000   lea eax,dword ptr ds:[edi+0x270]006DF10B    68 ED2E0000     push 0x2EED006DF110    8D7424 14       lea esi,dword ptr ss:[esp+0x14]006DF114    E8 27F6FFFF     call DragonNe.006DE740006DF119    8B08            mov ecx,dword ptr ds:[eax]006DF11B    898F D0020000   mov dword ptr ds:[edi+0x2D0],ecx 006DF121    8B50 04         mov edx,dword ptr ds:[eax+0x4]006DF124    8997 D4020000   mov dword ptr ds:[edi+0x2D4],edx006DF12A    8B48 08         mov ecx,dword ptr ds:[eax+0x8]006DF12D    898F D8020000   mov dword ptr ds:[edi+0x2D8],ecx006DF133    8B50 0C         mov edx,dword ptr ds:[eax+0xC]006DF136    8B07            mov eax,dword ptr ds:[edi]006DF138    8997 DC020000   mov dword ptr ds:[edi+0x2DC],edx006DF13E    8B90 98000000   mov edx,dword ptr ds:[eax+0x98]006DF144    83C4 04         add esp,0x4006DF147    8BCF            mov ecx,edi006DF149    FFD2            call edx006DF14B    5F              pop edi006DF14C    5E              pop esi006DF14D    5B              pop ebx006DF14E    8BE5            mov esp,ebp006DF150    5D              pop ebp006DF151    C2 0800         retn 0x8006DF154    8B07            mov eax,dword ptr ds:[edi]006DF156    8B90 98000000   mov edx,dword ptr ds:[eax+0x98]006DF15C    FFD2            call edx006DF15E    C787 94000000 0>mov dword ptr ds:[edi+0x94],0x0006DF168    8B87 A4020000   mov eax,dword ptr ds:[edi+0x2A4]006DF16E    85C0            test eax,eax006DF170    74 0C           je short DragonNe.006DF17E006DF172    8D8F 48020000   lea ecx,dword ptr ds:[edi+0x248]006DF178    51              push ecx006DF179    E8 32EEFFFF     call DragonNe.006DDFB0006DF17E    8D4424 0C       lea eax,dword ptr ss:[esp+0xC]006DF182    8D97 48020000   lea edx,dword ptr ds:[edi+0x248]006DF188    50              push eax006DF189    8D73 04         lea esi,dword ptr ds:[ebx+0x4]006DF18C    899F A4020000   mov dword ptr ds:[edi+0x2A4],ebx006DF192    895424 10       mov dword ptr ss:[esp+0x10],edx006DF196    E8 25F63600     call DragonNe.00A4E7C0006DF19B    8B8F A4020000   mov ecx,dword ptr ds:[edi+0x2A4]006DF1A1    8B11            mov edx,dword ptr ds:[ecx]006DF1A3    8B42 08         mov eax,dword ptr ds:[edx+0x8]006DF1A6    FFD0            call eax006DF1A8    8987 A0020000   mov dword ptr ds:[edi+0x2A0],eax ======>跟背包第一格有关006DF1AE    8B87 A4020000   mov eax,dword ptr ds:[edi+0x2A4]006DF1B4    85C0            test eax,eax006DF1B6    8B48 30         mov ecx,dword ptr ds:[eax+0x30]006DF1B9    898F A8020000   mov dword ptr ds:[edi+0x2A8],ecx006DF1BF    74 56           je short DragonNe.006DF217006DF1C1    8378 30 00      cmp dword ptr ds:[eax+0x30],0x0006DF1C5    75 50           jnz short DragonNe.006DF217006DF1C7    8B48 64         mov ecx,dword ptr ds:[eax+0x64]006DF1CA    83F9 02         cmp ecx,0x2006DF1CD    74 2C           je short DragonNe.006DF1FB006DF1CF    83F9 41         cmp ecx,0x41006DF1D2    74 27           je short DragonNe.006DF1FB006DF1D4    83F9 04         cmp ecx,0x4006DF1D7    74 22           je short DragonNe.006DF1FB006DF1D9    83F9 08         cmp ecx,0x8006DF1DC    74 1D           je short DragonNe.006DF1FB006DF1DE    83F9 09         cmp ecx,0x9006DF1E1    74 18           je short DragonNe.006DF1FB006DF1E3    83F9 20         cmp ecx,0x20006DF1E6    74 13           je short DragonNe.006DF1FB006DF1E8    83F9 2E         cmp ecx,0x2E006DF1EB    74 0E           je short DragonNe.006DF1FB006DF1ED    83F9 70         cmp ecx,0x70006DF1F0    74 09           je short DragonNe.006DF1FB006DF1F2    83F9 2B         cmp ecx,0x2B006DF1F5    74 04           je short DragonNe.006DF1FB006DF1F7    32C9            xor cl,cl006DF1F9    EB 02           jmp short DragonNe.006DF1FD006DF1FB    B1 01           mov cl,0x1006DF1FD    84C9            test cl,cl006DF1FF    888F FD020000   mov byte ptr ds:[edi+0x2FD],cl006DF205    74 10           je short DragonNe.006DF217006DF207    83B8 9C000000 0>cmp dword ptr ds:[eax+0x9C],0x1006DF20E    75 07           jnz short DragonNe.006DF217006DF210    C687 FD020000 0>mov byte ptr ds:[edi+0x2FD],0x0006DF217    8B45 0C         mov eax,dword ptr ss:[ebp+0xC]006DF21A    85C0            test eax,eax006DF21C    74 05           je short DragonNe.006DF223006DF21E    83F8 FF         cmp eax,-0x1006DF221    75 07           jnz short DragonNe.006DF22A006DF223    8BF7            mov esi,edi006DF225    E8 96050000     call DragonNe.006DF7C0006DF22A    57              push edi006DF22B    8BCB            mov ecx,ebx006DF22D    8987 E4020000   mov dword ptr ds:[edi+0x2E4],eax006DF233    C787 E8020000 0>mov dword ptr ds:[edi+0x2E8],0x0006DF23D    E8 0E000000     call DragonNe.006DF250006DF242    5F              pop edi006DF243    5E              pop esi006DF244    5B              pop ebx006DF245    8BE5            mov esp,ebp006DF247    5D              pop ebp006DF248    C2 0800         retn 0x8