Code:
CPU Disasm
Address Hex dump Command Comments
00785173 |.^\E9 6EABFFFF JMP 0077FCE6
00785178 |> B8 37040000 MOV EAX,437
0078517D |. 8895 5604FFFF MOV BYTE PTR SS:[EBP+FFFF0456],DL
00785183 |. 66:8985 5004F MOV WORD PTR SS:[EBP+FFFF0450],AX
0078518A |. 8D85 5004FFFF LEA EAX,[EBP+FFFF0450]
00785190 |. 50 PUSH EAX
00785191 |. 898D 5204FFFF MOV DWORD PTR SS:[EBP+FFFF0452],ECX
00785197 |. 68 37040000 PUSH 437
0078519C \. E9 EE2D0000 JMP 00787F8F
007851A1 /> 8BCF MOV ECX,EDI
007851A3 |. E8 787FFFFF CALL 0077D120 ; [Ragnarok.0077D120
007851A8 |. 3C 01 CMP AL,1
007851AA |.^ 0F84 8CACFFFF JE 0077FE3C
007851B0 8B8D 4C06FFFF MOV ECX,DWORD PTR SS:[EBP+FFFF064C] ; //MovementX
007851B6 B8 5F030000 MOV EAX,35F
007851BB 8B95 4806FFFF MOV EDX,DWORD PTR SS:[EBP+FFFF0648] ; //MovementY
007851C1 |. 66:8985 4C2BF MOV WORD PTR SS:[EBP+FFFF2B4C],AX
007851C8 |. 8BC1 MOV EAX,ECX
007851CA |. C1F8 02 SAR EAX,2
007851CD |. 8885 4E2BFFFF MOV BYTE PTR SS:[EBP+FFFF2B4E],AL
007851D3 |. 8BC2 MOV EAX,EDX
007851D5 |. C1F8 04 SAR EAX,4
007851D8 |. 24 3F AND AL,3F
007851DA |. C0E1 06 SHL CL,6
007851DD |. 0AC1 OR AL,CL
007851DF |. C0E2 04 SHL DL,4
007851E2 |. 8885 4F2BFFFF MOV BYTE PTR SS:[EBP+FFFF2B4F],AL
007851E8 |. 8D85 4C2BFFFF LEA EAX,[EBP+FFFF2B4C]
007851EE |. 50 PUSH EAX
007851EF |. 8895 502BFFFF MOV BYTE PTR SS:[EBP+FFFF2B50],DL
007851F5 |. 68 5F030000 PUSH 35F
007851FA \. E9 902D0000 JMP 00787F8F
007851FF /> 8B95 4C06FFFF MOV EDX,DWORD PTR SS:[EBP+FFFF064C]
Code:
CPU Disasm
Address Hex dump Command Comments
00787F71 |. /7C 02 JL SHORT 00787F75
00787F73 |> |33C0 XOR EAX,EAX
00787F75 |> \8985 D203FFFF MOV DWORD PTR SS:[EBP+FFFF03D2],EAX
00787F7B |. B9 6D0B0000 MOV ECX,0B6D
00787F80 |. 8D85 D003FFFF LEA EAX,[EBP+FFFF03D0]
00787F86 |. 66:898D D003F MOV WORD PTR SS:[EBP+FFFF03D0],CX
00787F8D |. 50 PUSH EAX
00787F8E |. 51 PUSH ECX
00787F8F |> E8 2CCCB45F CALL Hooks::Send_Packet_Hook_P2
00787F94 |. 8BC8 MOV ECX,EAX
00787F96 |. E8 25171700 CALL 008F96C0 ; \Ragnarok.008F96C0
00787F9B |. 50 PUSH EAX
00787F9C |> E8 FF201700 CALL 008FA0A0
00787FA1 |. 8BC8 MOV ECX,EAX
00787FA3 |. E8 F81C1700 CALL 008F9CA0 ; \Ragnarok.008F9CA0
00787FA8 |. 33C0 XOR EAX,EAX
00787FAA \. EB 13 JMP SHORT 00787FBF
00787FAC /> 8B95 4C06FFFF MOV EDX,DWORD PTR SS:[EBP+FFFF064C]
Code:
Naked void Hooks::Send_Packet_Hook_P2(void) //00787F8F
{
__asm
{
POP Outgoing_Packet_Return_Address
//PUSHAD
MOV ECX, 0x2A //Movement X
MOV EAX, 0x35F
MOV EDX, 0x0EB //Movement Y
MOV WORD PTR SS : [EBP + 0xFFFF2B4C] , AX
MOV EAX, ECX
SAR EAX, 0x2
MOV BYTE PTR SS : [EBP + 0xFFFF2B4E] , AL
MOV EAX, EDX
SAR EAX, 0x4
AND AL, 0x3F
SHL CL, 0x6
OR AL, CL
SHL DL, 0x4
MOV BYTE PTR SS : [EBP + 0xFFFF2B4F] , AL
LEA EAX, [EBP + 0xFFFF2B4C]
PUSH EAX
MOV BYTE PTR SS : [EBP + 0xFFFF2B50] , DL
PUSH 0x35F
//POPAD
CALL Properties::Send_Packet_Original_Address
PUSH Outgoing_Packet_Return_Address
RET
}
}