导航菜单

=====================================
绝地求生-PUBG-正式服 自动解密
游戏进程PID:123E8
模块地址:7FF739740000
当前版本:PUBG基址解密插图8.2.5.3
DUMP成功
=====================================

.版本 2

.常量 世界基址,"119072520",,718E708
.常量 名称基址,"118437208",,70F3558
.常量 初始解密,"90210600",,5608128
.常量 世界一级,"2136",,858
.常量 世界二级,"656",,290
.常量 本人一级,"1944",,798
.常量 本人二级,"72",,48
.常量 本人三级,"72",,48
.常量 朝向解密,"1192",,4A8
.常量 本人数组,"1160",,488
.常量 开镜追踪地址,"25756833",,18904A1
.常量 PItC++hX,"3",,3
.常量 m_rootComponent,"752",,2F0
.常量 Audience,"196752",,30090
.常量 OBJid,"44",,2C
.常量 Position,"784",,310
.常量 Eyes,"1908",,774
.常量 Playname,"768",,300
.常量 Mesh,"1240",,4D8
.常量 Health,"4296",,10C8
.常量 Health_Die,"7336",,1CA8
.常量 CameraPos,"3",,3
.常量 CameraRot,"3",,3
.常量 CameraFov,"7384",,1CD8
.常量 Bone,"2768",,AD0
.常量 BoneArry,"768",,300
.常量 DroppedItemGroup,"1136",,470
.常量 DroppedItemGroup_Count,"1144",,478
.常量 DroppedItemGroup_UItem,"1632",,660
.常量 Packge,"1336",,538
.常量 PackgePos,"1296",,510
.常量 IDD,"16140",,3F0C
.常量 TeamNumber,"3608",,E18
.常量 PlayerState,"1144",,478
.常量 PlayerSatisitc,"768",,300
.常量 WeaponProcessor,"3152",,C50
.常量 CurrentWeaponIndex,"768",,300
.常量 EquippedWeapons,"768",,300
.常量 InitialSpeed,"2544",,9F0
.常量 Veloctity,"992",,3E0
.常量 ActorRootComp,"0",,
.常量 IsScope,"2468",,9A4
.常量 BoxCoordinates,"1336",,538
.常量 ScopeCarmera,"768",,300
.常量 ScopeCarmera_Breath,"688",,2B0
.常量 屏息偏移,"2472",,9A8
.常量 瞬击,"1000",,3E8

解密ID

.常量 解密IDCALL,"447853",,0006D56D
置入代码 ({139,93,8,129,243,41,31,117,136,209,203,139,195,193,224,16,51,195,53,45,49,48,164,137,69,248})

相关推荐

CVE-2020-0904:Hyper-V类型混淆任意地址解引用漏洞分析

译文声明 本文是翻译文章,文章原作者Daniel Fernandez Kuehr,文章来源:labs.bluefrostseC++urity.de 原文地址:https://labs.bluefrostsecurity.de/advisories/bfs-sa-2020-003/ 译文仅供参考,具体内容表达以...

JustSystems Ichitaro(一太郎)缓冲区溢出漏洞

  漏洞简介 IC++hitaro(一太郎)是日本JustSystems公司的一套文字处理软件。 JustSystems Ichitaro在处理JTD文档的过程中存在基于堆的缓冲区溢出漏洞,允许远程攻击者可利用该漏洞构建恶意文件,诱使用户解...