骑士 懒得发了,要各种明文发包 免费。
0048AF70 $6A FF push -0x1 ;SendAddr0048AF72 .68 9B08A800 push KnightOn.00A8089B
0048AF77 .64:A1 0000000>mov eax,dword ptr fs:
0048AF7D .50 push eax
0048AF7E .B8 14030800 mov eax,0x80314
0048AF83 .E8 389C5C00 call KnightOn.00A54BC0
0048AF88 .A1 2CXFC100 mov eax,dword ptr ds:
0048AF8D .33C4 xor eax,esp
0048AF8F .898424 100308>mov dword ptr ss:,eax
0048AF96 .53 push ebx
0048AF97 .55 push ebp
0048AF98 .56 push esi
0048AF99 .57 push edi
0048AF9A .A1 2CXFC100 mov eax,dword ptr ds:
0048AF9F .33C4 xor eax,esp
0048AFA1 .50 push eax
0048AFA2 .8D8424 280308>lea eax,dword ptr ss:
0048AFA9 .64:A3 0000000>mov dword ptr fs:,eax
0048AFAF .8BAC24 380308>mov ebp,dword ptr ss:
0048AFB6 .8BB424 3C0308>mov esi,dword ptr ss:
0048AFBD .68 B8F2D200 push KnightOn.00D2F2B8
0048AFC2 .8BF9 mov edi,ecx
0048AFC4 .FF15 30C2B000 call dword ptr ds: ;ntdll.RtlEnterCriticalSection
0048AFCA .3B3D FC5DDB00 cmp edi,dword ptr ds:
0048AFD0 .74 0C je short KnightOn.0048AFDE
0048AFD2 .3B3D 005EDB00 cmp edi,dword ptr ds:
0048AFD8 .0F85 C9010000 jnz KnightOn.0048B1A7
0048AFDE >E8 1D504E02 call 02970000
0048AFE3 .^ E0 83 loopdne short KnightOn.0048AF68
0048AFE5 .BF DC000400 mov edi,0x400DC
0048AFEA .000F add byte ptr ds:,cl
0048AFEC .84B6 01000083 test byte ptr ds:,dh
0048AFF2 .7F 04 jg short KnightOn.0048AFF8
0048AFF4 .FF0F dec dword ptr ds:
0048AFF6 84 db 84
0048AFF7 .AC lods byte ptr ds:
0048AFF8 .0100 add dword ptr ds:,eax
0048AFFA .0083 BF640004 add byte ptr ds:,al
0048B000 .0000 add byte ptr ds:,al
0048B002 .0F84 9F010000 je KnightOn.0048B1A7
0048B008 .68 FFFF0300 push 0x3FFFF
0048B00D .8D8424 290300>lea eax,dword ptr ss:
0048B014 .6A 00 push 0x0
0048B016 .50 push eax
0048B017 .C68424 300300>mov byte ptr ss:,0x0
0048B01F .E8 DC8B5C00 call KnightOn.00A53C00
0048B024 .68 FFFF0300 push 0x3FFFF
0048B029 .8D8C24 350304>lea ecx,dword ptr ss:
0048B030 .6A 00 push 0x0
0048B032 .51 push ecx
0048B033 .C68424 3C0304>mov byte ptr ss:,0x0
0048B03B .E8 C08B5C00 call KnightOn.00A53C00
0048B040 .83C4 18 add esp,0x18
0048B043 .80BF 80000400>cmp byte ptr ds:,0x1
0048B04A .75 35 jnz short KnightOn.0048B081
0048B04C .A0 9E5EDB00 mov al,byte ptr ds:
0048B051 .04 01 add al,0x1
0048B053 .3C FA cmp al,0xFA
0048B055 .76 02 jbe short KnightOn.0048B059
0048B057 .B0 01 mov al,0x1
0048B059 >56 push esi
0048B05A .8D9424 290304>lea edx,dword ptr ss:
0048B061 .55 push ebp
0048B062 .52 push edx
0048B063 .A2 9E5EDB00 mov byte ptr ds:,al
0048B068 .888424 300304>mov byte ptr ss:,al
0048B06F .E8 1C925C00 call KnightOn.00A54290
0048B074 .83C4 0C add esp,0xC
0048B077 .83C6 01 add esi,0x1
0048B07A .8DAC24 240304>lea ebp,dword ptr ss:
0048B081 >83BF 84000400>cmp dword ptr ds:,0x0
0048B088 .74 28 je short KnightOn.0048B0B2
0048B08A .68 D800B100 push KnightOn.00B100D8 ;ASCII "S9*lO1mD"
0048B08F .8D4C24 28 lea ecx,dword ptr ss:
0048B093 .E8 28133E00 call KnightOn.0086C3C0
0048B098 .8B87 88000400 mov eax,dword ptr ds:
0048B09E .50 push eax
0048B09F .56 push esi
0048B0A0 .55 push ebp
0048B0A1 .8D4C24 30 lea ecx,dword ptr ss:
0048B0A5 .E8 A6133E00 call KnightOn.0086C450
0048B0AA .8BAF 88000400 mov ebp,dword ptr ds:
0048B0B0 .8BF0 mov esi,eax
0048B0B2 >6A 01 push 0x1
0048B0B4 .55 push ebp
0048B0B5 .56 push esi
0048B0B6 .8D4C24 24 lea ecx,dword ptr ss:
0048B0BA .E8 31FDFFFF call KnightOn.0048ADF0
0048B0BF .C78424 300308>mov dword ptr ss:,0x0
0048B0CA .80BF 80000400>cmp byte ptr ds:,0x1
0048B0D1 .8B7424 1C mov esi,dword ptr ss:
0048B0D5 .8B5C24 20 mov ebx,dword ptr ss:
0048B0D9 .75 23 jnz short KnightOn.0048B0FE
0048B0DB .6A 01 push 0x1
0048B0DD .56 push esi
0048B0DE .8D5424 1C lea edx,dword ptr ss:
0048B0E2 .52 push edx
0048B0E3 .53 push ebx
0048B0E4 .8D4E 2A lea ecx,dword ptr ds:
0048B0E7 .6A 00 push 0x0
0048B0E9 .894C24 28 mov dword ptr ss:,ecx
0048B0ED .E8 259B5B00 call KnightOn.00A44C17
0048B0F2 .85C0 test eax,eax
0048B0F4 .0F85 80000000 jnz KnightOn.0048B17A
0048B0FA .8B7424 14 mov esi,dword ptr ss:
0048B0FE >68 55AA0000 push 0xAA55 ; /NetShort = AA55
0048B103 .8D6E 06 lea ebp,dword ptr ds: ; |
0048B106 .E8 49065B00 call KnightOn.00A3B754 ; \ntohs
0048B10B .56 push esi
0048B10C .66:898424 280>mov word ptr ss:,ax
0048B114 .8D8424 2C0300>lea eax,dword ptr ss:
0048B11B .53 push ebx
0048B11C .50 push eax
0048B11D .66:89B424 320>mov word ptr ss:,si
0048B125 .E8 66915C00 call KnightOn.00A54290
0048B12A .83C4 0C add esp,0xC
0048B12D .68 AA550000 push 0x55AA ; /NetShort = 55AA
0048B132 .8DB434 2C0300>lea esi,dword ptr ss: ; |
0048B139 .E8 16065B00 call KnightOn.00A3B754 ; \ntohs
0048B13E .66:8906 mov word ptr ds:,ax
0048B141 .33F6 xor esi,esi
0048B143 .85ED test ebp,ebp
0048B145 .7E 33 jle short KnightOn.0048B17A
0048B147 .8B1D F8C3B000 mov ebx,dword ptr ds: ;ntdll.RtlGetLastWin32Error
0048B14D .8D49 00 lea ecx,dword ptr ds:
0048B150 >8B57 04 mov edx,dword ptr ds:
0048B153 .6A 00 push 0x0 ; /Flags = 0
0048B155 .55 push ebp ; |DataSize
0048B156 .8D8C24 2C0300>lea ecx,dword ptr ss: ; |
0048B15D .51 push ecx ; |Data
0048B15E .52 push edx ; |Socket
0048B15F .E8 EA055B00 call KnightOn.00A3B74E ; \send
0048B164 .83F8 FF cmp eax,-0x1
0048B167 .75 32 jnz short KnightOn.0048B19B
0048B169 .FFD3 call ebx
0048B16B .3D 33270000 cmp eax,0x2733
0048B170 .74 2F je short KnightOn.0048B1A1
0048B172 .6A FF push -0x1 ; /ExitCode = FFFFFFFF (-1.)
0048B174 .FF15 B0C4B000 call dword ptr ds: ; \PostQuitMessage
0048B17A >68 B8F2D200 push KnightOn.00D2F2B8
0048B17F .FF15 2CC2B000 call dword ptr ds: ;ntdll.RtlLeaveCriticalSection
0048B185 .C78424 300308>mov dword ptr ss:,-0x1
0048B190 .8D4C24 18 lea ecx,dword ptr ss:
0048B194 .E8 E7FBFFFF call KnightOn.0048AD80
0048B199 .EB 17 jmp short KnightOn.0048B1B2
0048B19B >85C0 test eax,eax
0048B19D .7E 02 jle short KnightOn.0048B1A1
0048B19F .03F0 add esi,eax
0048B1A1 >3BF5 cmp esi,ebp
0048B1A3 .^ 7C AB jl short KnightOn.0048B150
0048B1A5 .^ EB D3 jmp short KnightOn.0048B17A
0048B1A7 >68 B8F2D200 push KnightOn.00D2F2B8
0048B1AC .FF15 2CC2B000 call dword ptr ds: ;ntdll.RtlLeaveCriticalSection
0048B1B2 >8B8C24 280308>mov ecx,dword ptr ss:
0048B1B9 .64:890D 00000>mov dword ptr fs:,ecx
0048B1C0 .59 pop ecx
0048B1C1 .5F pop edi
0048B1C2 .5E pop esi
0048B1C3 .5D pop ebp
0048B1C4 .5B pop ebx
0048B1C5 .8B8C24 100308>mov ecx,dword ptr ss:
0048B1CC .33CC xor ecx,esp
0048B1CE .E8 70845C00 call KnightOn.00A53643
0048B1D3 .81C4 20030800 add esp,0x80320
0048B1D9 .C2 0800 retn 0x8
->
004A1DD0/$6A FF push -0x1
004A1DD2|.68 921CA800 push KnightOn.00A81C92
004A1DD7|.64:A1 00000000 mov eax,dword ptr fs:
004A1DDD|.50 push eax
004A1DDE|.81EC 28020000 sub esp,0x228
004A1DE4|.A1 2CXFC100 mov eax,dword ptr ds:
004A1DE9|.33C4 xor eax,esp
004A1DEB|.898424 24020000 mov dword ptr ss:,eax
004A1DF2|.53 push ebx
004A1DF3|.56 push esi
004A1DF4|.A1 2CXFC100 mov eax,dword ptr ds:
004A1DF9|.33C4 xor eax,esp
004A1DFB|.50 push eax
004A1DFC|.8D8424 34020000 lea eax,dword ptr ss:
004A1E03|.64:A3 00000000 mov dword ptr fs:,eax
004A1E09|.8BD1 mov edx,ecx
004A1E0B|.895424 0C mov dword ptr ss:,edx
004A1E0F|.8B0D 845DDB00 mov ecx,dword ptr ds:
004A1E15|.8BB424 48020000 mov esi,dword ptr ss:
004A1E1C|.33DB xor ebx,ebx
004A1E1E|.83B9 9C0B0000 5C cmp dword ptr ds:,0x5C
004A1E25|.75 23 jnz short KnightOn.004A1E4A
004A1E27|.3999 B8060000 cmp dword ptr ds:,ebx
004A1E2D|.0F85 FE020000 jnz KnightOn.004A2131
004A1E33|.837E 18 10 cmp dword ptr ds:,0x10
004A1E37|.72 05 jb short KnightOn.004A1E3E
004A1E39|.8B46 04 mov eax,dword ptr ds:
004A1E3C|.EB 03 jmp short KnightOn.004A1E41
004A1E3E|>8D46 04 lea eax,dword ptr ds:
004A1E41|>8038 2B cmp byte ptr ds:,0x2B
004A1E44|.0F85 E7020000 jnz KnightOn.004A2131
004A1E4A|>8B8424 44020000 mov eax,dword ptr ss:
004A1E51|.83F8 06 cmp eax,0x6
004A1E54|.75 0E jnz short KnightOn.004A1E64
004A1E56|.3999 D8060000 cmp dword ptr ds:,ebx
004A1E5C|.0F8E XF020000 jle KnightOn.004A2131
004A1E62|.EB 1B jmp short KnightOn.004A1E7F
004A1E64|>83F8 02 cmp eax,0x2
004A1E67|.75 16 jnz short KnightOn.004A1E7F
004A1E69|.8B82 BC010000 mov eax,dword ptr ds:
004A1E6F|.3BC3 cmp eax,ebx
004A1E71|.74 0C je short KnightOn.004A1E7F
004A1E73|.3898 1D080000 cmp byte ptr ds:,bl
004A1E79|.0F84 B2020000 je KnightOn.004A2131
004A1E7F|>81B9 B8060000 FA000000 cmp dword ptr ds:,0xFA
004A1E89|.75 1E jnz short KnightOn.004A1EA9
004A1E8B|.6A 0B push 0xB
004A1E8D|.53 push ebx
004A1E8E|.68 8802B100 push KnightOn.00B10288 ;ASCII "+zonechange"
004A1E93|.8BCE mov ecx,esi
004A1E95|.E8 168FF7FF call KnightOn.0041ADB0
004A1E9A|.83F8 FF cmp eax,-0x1
004A1E9D|.0F84 8E020000 je KnightOn.004A2131
004A1EA3|.8B0D 845DDB00 mov ecx,dword ptr ds:
004A1EA9|>F605 F0F4DA00 01 test byte ptr ds:,0x1
004A1EB0|.75 2A jnz short KnightOn.004A1EDC
004A1EB2|.830D F0F4DA00 01 or dword ptr ds:,0x1
004A1EB9|.899C24 3C020000 mov dword ptr ss:,ebx
004A1EC0|.E8 2B7XFAFF call KnightOn.00449AF0
004A1EC5|.D91D EXF4DA00 fstp dword ptr ds:
004A1ECB|.C78424 3C020000 FFFFFF>mov dword ptr ss:,-0x1
004A1ED6|.8B0D 845DDB00 mov ecx,dword ptr ds:
004A1EDC|>F605 F0F4DA00 02 test byte ptr ds:,0x2
004A1EE3|.75 48 jnz short KnightOn.004A1F2D
004A1EE5|.830D F0F4DA00 02 or dword ptr ds:,0x2
004A1EEC|.C78424 3C020000 010000>mov dword ptr ss:,0x1
004A1EF7|.68 701A4000 push KnightOn.00401A70 ;入口地址
004A1EFC|.68 802E4000 push KnightOn.00402E80 ;入口地址
004A1F01|.6A 03 push 0x3
004A1F03|.6A 1C push 0x1C
004A1F05|.68 98F4DA00 push KnightOn.00DAF498
004A1F0A|.E8 1C2C5B00 call KnightOn.00A54B2B
004A1F0F|.68 30A8AF00 push KnightOn.00AFA830
004A1F14|.E8 A61B5B00 call KnightOn.00A53ABF
004A1F19|.83C4 04 add esp,0x4
004A1F1C|.C78424 3C020000 FFFFFF>mov dword ptr ss:,-0x1
004A1F27|.8B0D 845DDB00 mov ecx,dword ptr ds:
004A1F2D|>8B8424 44020000 mov eax,dword ptr ss:
004A1F34|.83F8 0E cmp eax,0xE
004A1F37|.74 73 je short KnightOn.004A1FAC
004A1F39|.3999 B8060000 cmp dword ptr ds:,ebx
004A1F3F|.74 6B je short KnightOn.004A1FAC
004A1F41|.83F8 13 cmp eax,0x13
004A1F44|.74 66 je short KnightOn.004A1FAC
004A1F46|.A1 94F4DA00 mov eax,dword ptr ds:
004A1F4B|.6A FF push -0x1
004A1F4D|.8D0CC5 00000000 lea ecx,dword ptr ds:
004A1F54|.2BC8 sub ecx,eax
004A1F56|.53 push ebx
004A1F57|.8D0C8D 98F4DA00 lea ecx,dword ptr ds:
004A1F5E|.56 push esi
004A1F5F|.E8 3XFDF5FF call KnightOn.00401CA0
004A1F64|.A1 94F4DA00 mov eax,dword ptr ds:
004A1F69|.83C0 01 add eax,0x1
004A1F6C|.83F8 03 cmp eax,0x3
004A1F6F|.A3 94F4DA00 mov dword ptr ds:,eax
004A1F74|.7C 06 jl short KnightOn.004A1F7C
004A1F76|.891D 94F4DA00 mov dword ptr ds:,ebx
004A1F7C|>68 B4F4DA00 push KnightOn.00DAF4B4
004A1F81|.68 98F4DA00 push KnightOn.00DAF498
004A1F86|.E8 0548F8FF call KnightOn.00426790
004A1F8B|.83C4 08 add esp,0x8
004A1F8E|.84C0 test al,al
004A1F90|.74 1A je short KnightOn.004A1FAC
004A1F92|.68 D0F4DA00 push KnightOn.00DAF4D0
004A1F97|.68 B4F4DA00 push KnightOn.00DAF4B4
004A1F9C|.E8 EF47F8FF call KnightOn.00426790
004A1FA1|.83C4 08 add esp,0x8
004A1FA4|.84C0 test al,al
004A1FA6|.0F85 85010000 jnz KnightOn.004A2131
004A1FAC|>C74424 2C 0F000000 mov dword ptr ss:,0xF
004A1FB4|.895C24 28 mov dword ptr ss:,ebx
004A1FB8|.885C24 18 mov byte ptr ss:,bl
004A1FBC|.C78424 3C020000 020000>mov dword ptr ss:,0x2
004A1FC7|.6A FF push -0x1
004A1FC9|.53 push ebx
004A1FCA|.56 push esi
004A1FCB|.8D4C24 20 lea ecx,dword ptr ss:
004A1FXF|.E8 CXFXF5FF call KnightOn.00401CA0
004A1FD4|.8B4C24 28 mov ecx,dword ptr ss:
004A1FD8|.33F6 xor esi,esi
004A1FDA|.3BCB cmp ecx,ebx
004A1FDC|.76 49 jbe short KnightOn.004A2027
004A1FDE|.3BF1 cmp esi,ecx
004A1FE0|.76 09 jbe short KnightOn.004A1FEB
004A1FE2|.E8 D7185B00 call KnightOn.00A538BE
004A1FE7|.8B4C24 28 mov ecx,dword ptr ss:
004A1FEB|>837C24 2C 10 /cmp dword ptr ss:,0x10
004A1FF0|.8B4424 18 |mov eax,dword ptr ss:
004A1FF4|.73 04 |jnb short KnightOn.004A1FFA
004A1FF6|.8D4424 18 |lea eax,dword ptr ss:
004A1FFA|>803C30 0A |cmp byte ptr ds:,0xA
004A1FFE|.75 20 |jnz short KnightOn.004A2020
004A2000|.3BF1 |cmp esi,ecx
004A2002|.76 05 |jbe short KnightOn.004A2009
004A2004|.E8 B5185B00 |call KnightOn.00A538BE
004A2009|>837C24 2C 10 |cmp dword ptr ss:,0x10
004A200E|.8B4424 18 |mov eax,dword ptr ss:
004A2012|.73 04 |jnb short KnightOn.004A2018
004A2014|.8D4424 18 |lea eax,dword ptr ss:
004A2018|>C60430 5F |mov byte ptr ds:,0x5F
004A201C|.8B4C24 28 |mov ecx,dword ptr ss:
004A2020|>83C6 01 |add esi,0x1
004A2023|.3BF1 |cmp esi,ecx
004A2025|.^ 72 C4 \jb short KnightOn.004A1FEB
004A2027|>83EC 1C sub esp,0x1C
004A202A|.8BCC mov ecx,esp
004A202C|.896424 2C mov dword ptr ss:,esp
004A2030|.6A FF push -0x1
004A2032|.53 push ebx
004A2033|.8D4424 38 lea eax,dword ptr ss:
004A2037|.C741 18 0F000000 mov dword ptr ds:,0xF
004A203E|.8959 14 mov dword ptr ds:,ebx
004A2041|.50 push eax
004A2042|.8859 04 mov byte ptr ds:,bl
004A2045|.E8 56FXF5FF call KnightOn.00401CA0
004A204A|.C68424 58020000 03 mov byte ptr ss:,0x3
004A2052|.C68424 58020000 02 mov byte ptr ss:,0x2
004A205A|.8B0D 8C5DDB00 mov ecx,dword ptr ds:
004A2060|.E8 8BA62B00 call KnightOn.0075C6F0
004A2065|.8B7424 28 mov esi,dword ptr ss:
004A2069|.3BF3 cmp esi,ebx
004A206B|.8B8C24 44020000 mov ecx,dword ptr ss:
004A2072|.66:8B5424 28 mov dx,word ptr ss:
004A2077|.C64424 30 10 mov byte ptr ss:,0x10
004A207C|.884C24 31 mov byte ptr ss:,cl
004A2080|.66:895424 32 mov word ptr ss:,dx
004A2085|.B8 04000000 mov eax,0x4
004A208A|.74 28 je short KnightOn.004A20B4
004A208C|.837C24 2C 10 cmp dword ptr ss:,0x10
004A2091|.8B4424 18 mov eax,dword ptr ss:
004A2095|.73 04 jnb short KnightOn.004A209B
004A2097|.8D4424 18 lea eax,dword ptr ss:
004A209B|>56 push esi
004A209C|.50 push eax
004A209D|.8D4424 3C lea eax,dword ptr ss:
004A20A1|.50 push eax
004A20A2|.E8 E9215B00 call KnightOn.00A54290
004A20A7|.8B8C24 50020000 mov ecx,dword ptr ss:
004A20AE|.83C4 0C add esp,0xC
004A20B1|.8D46 04 lea eax,dword ptr ds:
004A20B4|>83F9 13 cmp ecx,0x13
004A20B7|.75 1D jnz short KnightOn.004A20D6
004A20B9|.8B4C24 0C mov ecx,dword ptr ss:
004A20BD|.8B89 1C020000 mov ecx,dword ptr ds:
004A20C3|.3BCB cmp ecx,ebx
004A20C5|.74 2A je short KnightOn.004A20F1
004A20C7|.8B89 EC030000 mov ecx,dword ptr ds:
004A20CD|.884C04 30 mov byte ptr ss:,cl
004A20D1|.83C0 01 add eax,0x1
004A20D4|.EB 1B jmp short KnightOn.004A20F1
004A20D6|>83F9 21 cmp ecx,0x21
004A20D9|.75 16 jnz short KnightOn.004A20F1
004A20DB|.66:8B8C24 4C020000 mov cx,word ptr ss:
004A20E3|.66:83F9 FF cmp cx,0xFFFF
004A20E7|.7E 08 jle short KnightOn.004A20F1
004A20E9|.66:894C04 30 mov word ptr ss:,cx
004A20EE|.83C0 02 add eax,0x2
004A20F1|>8B0D FC5DDB00 mov ecx,dword ptr ds:
004A20F7|.50 push eax
004A20F8|.8D5424 34 lea edx,dword ptr ss:
004A20FC|.52 push edx
004A20FD|.E8 6E8EFEFF call KnightOn.0048AF70 ;喊话调用。。。
004A2102|.C78424 3C020000 FFFFFF>mov dword ptr ss:,-0x1
004A210D|.837C24 2C 10 cmp dword ptr ss:,0x10
004A2112|.72 0D jb short KnightOn.004A2121
004A2114|.8B4424 18 mov eax,dword ptr ss:
004A2118|.50 push eax
004A2119|.E8 79155B00 call KnightOn.00A53697
004A211E|.83C4 04 add esp,0x4
004A2121|>C74424 2C 0F000000 mov dword ptr ss:,0xF
004A2129|.895C24 28 mov dword ptr ss:,ebx
004A212D|.885C24 18 mov byte ptr ss:,bl
004A2131|>8B8C24 34020000 mov ecx,dword ptr ss:
004A2138|.64:890D 00000000 mov dword ptr fs:,ecx
004A213F|.59 pop ecx
004A2140|.5E pop esi
004A2141|.5B pop ebx
004A2142|.8B8C24 24020000 mov ecx,dword ptr ss:
004A2149|.33CC xor ecx,esp
004A214B|.E8 F3145B00 call KnightOn.00A53643
004A2150|.81C4 34020000 add esp,0x234
004A2156\.C2 0C00 retn 0xC
强烈支持楼主ing…… 不知该说些什么。。。。。。 哦 不错 谢谢啊 支持一下 不错 海论坛,我支持你! 支持一下 不错 看到这帖子真是高兴! 围观 围观 沙发在哪里!!! 回个帖子,下班咯~
页:
[1]
2