修改m2自定义犯谋杀罪后增加多少pk值
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004BBF75(C), :004BBFA7(C)
|
:004BBFAD 807DF300 cmp byte ptr [ebp-0D], 00
:004BBFB1 0F85EC000000 jne 004BC0A3
:004BBFB7 8B45FC mov eax, dword ptr [ebp-04]
:004BBFBA 8B8080030000 mov eax, dword ptr [eax+00000380]
:004BBFC0 8B55FC mov edx, dword ptr [ebp-04]
:004BBFC3 E810090000 call 004BC8D8
:004BBFC8 84C0 test al, al
:004BBFCA 0F85BB000000 jne 004BC08B
:004BBFD0 8B45FC mov eax, dword ptr [ebp-04]
:004BBFD3 8B8080030000 mov eax, dword ptr [eax+00000380]
:004BBFD9 BA64000000 mov edx, 00000064--------------〉这里就是犯了谋杀罪后的增加的pk值
:004BBFDE E8F1340000 call 004BF4D4
:004BBFE3 8B45FC mov eax, dword ptr [ebp-04]
:004BBFE6 8B8080030000 mov eax, dword ptr [eax+00000380]
:004BBFEC 33C9 xor ecx, ecx dedecms.com
|:004BBF75(C), :004BBFA7(C)
|
:004BBFAD 807DF300 cmp byte ptr [ebp-0D], 00
:004BBFB1 0F85EC000000 jne 004BC0A3
:004BBFB7 8B45FC mov eax, dword ptr [ebp-04]
:004BBFBA 8B8080030000 mov eax, dword ptr [eax+00000380]
:004BBFC0 8B55FC mov edx, dword ptr [ebp-04]
:004BBFC3 E810090000 call 004BC8D8
:004BBFC8 84C0 test al, al
:004BBFCA 0F85BB000000 jne 004BC08B
:004BBFD0 8B45FC mov eax, dword ptr [ebp-04]
:004BBFD3 8B8080030000 mov eax, dword ptr [eax+00000380]
:004BBFD9 BA64000000 mov edx, 00000064--------------〉这里就是犯了谋杀罪后的增加的pk值
:004BBFDE E8F1340000 call 004BF4D4
:004BBFE3 8B45FC mov eax, dword ptr [ebp-04]
:004BBFE6 8B8080030000 mov eax, dword ptr [eax+00000380]
:004BBFEC 33C9 xor ecx, ecx dedecms.com
Tags:
作者:佚名评论内容只代表网友观点,与本站立场无关!
评论摘要(共 0 条,得分 0 分,平均 0 分)
查看完整评论