刚刚在群里面有人发了这么一款辅助
我下载下来看了下
很简单 修改几个跳转就能过去了。
因为我电脑没这个游戏 所以就没测试了~.~

[Asm] 纯文本查看 复制代码
0040151C - FF25 A0104000 jmp dword ptr ds:[<&MSVBVM60.EVENT_SINK_>; msvbvm60.EVENT_SINK_Release 00401522 - FF25 60104000 jmp dword ptr ds:[<&MSVBVM60.#303>] ; msvbvm60.GetMemStr 00401528 - FF25 74104000 jmp dword ptr ds:[<&MSVBVM60.#309>] ; msvbvm60.PutMemStr 0040152E - FF25 4C104000 jmp dword ptr ds:[<&MSVBVM60.#300>] ; msvbvm60.GetMem2 00401534 - FF25 70104000 jmp dword ptr ds:[<&MSVBVM60.#306>] ; msvbvm60.PutMem2 0040153A - FF25 0C114000 jmp dword ptr ds:[<&MSVBVM60.#100>] ; msvbvm60.ThunRTMain 00401540 > 68 9CA74100 push feifei.0041A79C ; VB5!6&vb6chs.dll 00401545 E8 F0FFFFFF call <jmp.&MSVBVM60.#100> 0040154A 0000 add byte ptr ds:[eax],al 0040154C 0000 add byte ptr ds:[eax],al 0040154E 0000 add byte ptr ds:[eax],al 00401550 3000 xor byte ptr ds:[eax],al 00401552 0000 add byte ptr ds:[eax],al 00401554 40 inc eax ; kernel32.BaseThreadInitThunk 00401555 0000 add byte ptr ds:[eax],al 00401557 0000 add byte ptr ds:[eax],al 00401559 0000 add byte ptr ds:[eax],al 0040155B 00AF BF06FB93 add byte ptr ds:[edi-0x6C04F941],ch 00401561 8FC1 pop ecx ; kernel32.765CED5C 00401563 4E dec esi 00401564 91 xchg eax,ecx[Asm] 纯文本查看 复制代码
00401000 > 07 pop es 00401001 05 A2728693 add eax,0x938672A2 00401006 A3 72F909A3 mov dword ptr ds:[0xA309F972],eax 0040100B 72 37 jb short <&MSVBVM60.__vbaHresultCheckObj> 0040100D 05 A272EE6A add eax,0x6AEE72A2 00401012 A4 movs byte ptr es:[edi],byte ptr ds:[esi] 00401013 72 31 jb short feifei.00401046 00401015 68 A4728DCC push 0xCC8D72A4 0040101A A1 72748BA4 mov eax,dword ptr ds:[0xA48B7472] 0040101F - 72 C9 jb short feifei.00400FEA 00401021 2E:A1 722919A2 mov eax,dword ptr cs:[0xA2192972] 00401027 72 62 jb short feifei.0040108B 00401029 - 72 A4 jb short feifei.00400FCF 0040102B - 72 88 jb short feifei.00400FB5 0040102D BE A072BA02 mov esi,0x2BA72A0[Asm] 纯文本查看 复制代码
中文搜索引擎, 条目 28 地址=00424A81 反汇编=mov dword ptr ss:[ebp-0x7C],feifei.0041CC28 文本字符串=登录失败,迅雷魔域6星vip请确认帐号及密码正确![Asm] 纯文本查看 复制代码
0042495D 5F pop edi ; user32.767B66C9 0042495E 5E pop esi ; user32.767B66C9 0042495F 64:890D 0000000>mov dword ptr fs:[0],ecx 00424966 5B pop ebx ; user32.767B66C9 00424967 8BE5 mov esp,ebp 00424969 5D pop ebp ; user32.767B66C9 0042496A C2 0800 retn 0x8 0042496D 90 nop 0042496E 90 nop 0042496F 90 nop 00424970 55 push ebp 00424971 8BEC mov ebp,esp 00424973 83EC 0C sub esp,0xC 00424976 68 66134000 push <jmp.&MSVBVM60.__vbaExceptHandler> 0042497B 64:A1 00000000 mov eax,dword ptr fs:[0] 00424981 50 push eax 00424982 64:8925 0000000>mov dword ptr fs:[0],esp[Asm] 纯文本查看 复制代码
00424A0F /7D 18 jge short feifei.00424A29 [b] //跳转已实现[/b] 00424A11 |8B8D 38FFFFFF mov ecx,dword ptr ss:[ebp-0xC8] 00424A17 |68 A0000000 push 0xA0 00424A1C |68 CCC94100 push feifei.0041C9CC 00424A21 |51 push ecx ; ntdll.76E06570 00424A22 |50 push eax 00424A23 |FF15 44104000 call dword ptr ds:[<&MSVBVM60.__vbaHresu>; msvbvm60.__vbaHresultCheckObj 00424A29 \8B55 D8 mov edx,dword ptr ss:[ebp-0x28] 00424A2C 52 push edx 00424A2D 68 7CCA4100 push feifei.0041CA7C ; 0