:004BF4D4 55 push ebp
:004BF4D5 8BEC mov ebp, esp
:004BF4D7 83C4F4 add esp, FFFFFFF4
:004BF4DA 8955F8 mov dword ptr [ebp-08], edx
:004BF4DD 8945FC mov dword ptr [ebp-04], eax
:004BF4E0 8B45FC mov eax, dword ptr [ebp-04]
:004BF4E3 E8B8FBFFFF call 004BF0A0
:004BF4E8 8945F4 mov dword ptr [ebp-0C], eax
:004BF4EB 8B45FC mov eax, dword ptr [ebp-04]
:004BF4EE 8B80AC000000 mov eax, dword ptr [eax+000000AC] = PK值
:004BF4F4 0345F8 add eax, dword ptr [ebp-08]
:004BF4F7 83F800 cmp eax, 00000000
:004BF4FA 7D02 jge 004BF4FE
:004BF4FC 33C0 xor eax, eax
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004BF4FA(C)
|
:004BF4FE 8B55FC mov edx, dword ptr [ebp-04]
:004BF501 8982AC000000 mov dword ptr [edx+000000AC], eax
:004BF507 8B45FC mov eax, dword ptr [ebp-04]
:004BF50A E891FBFFFF call 004BF0A0 --- PK值换算
:004BF50F 83F805 cmp eax, 00000005 --- PK值是否5
:004BF512 720A jb 004BF51E
:004BF514 8B55FC mov edx, dword ptr [ebp-04]
:004BF517 C682A102000001 mov byte ptr [edx+000002A1], 01 --- PK值>5,强制安全模式
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004BF512(C)
|
:004BF51E 3B45F4 cmp eax, dword ptr [ebp-0C]
:004BF521 740D je 004BF530
:004BF523 83F802 cmp eax, 00000002
:004BF526 7F08 jg 004BF530
:004BF528 8B45FC mov eax, dword ptr [ebp-04]
:004BF52B E8F4FBFFFF call 004BF124
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004BF521(C), :004BF526(C)
|
:004BF530 8BE5 mov esp, ebp
:004BF532 5D pop ebp
:004BF533 C3 ret
私服资源吧
(责任编辑:admin) |