Code:
.text:00419C6A mov [esp+194h+buf], 0EFh
.text:00419C6F push ecx ; hostlong
.text:00419C70 mov [esp+198h+argp], eax
.text:00419C74 call htonl
.text:00419C79 mov edx, dword_6B2AC8
.text:00419C7F mov [esp+194h+var_168], eax
.text:00419C83 push edx ; hostlong
.text:00419C84 call htonl
.text:00419C89 mov [esp+194h+var_164], eax
.text:00419C8D mov eax, dword_6B2AC4
.text:00419C92 push eax ; hostlong
.text:00419C93 call htonl
.text:00419C98 mov ecx, dword_6B2AC0
.text:00419C9E mov [esp+194h+var_160], eax
.text:00419CA2 push ecx ; hostlong
.text:00419CA3 call htonl
.text:00419CA8 mov [esp+194h+var_15C], eax
.text:00419CAC mov eax, [esi+4]
.text:00419CAF push ebx ; flags
.text:00419CB0 lea edx, [esp+198h+buf]
.text:00419CB4 push edi ; len
.text:00419CB5 push edx ; buf
.text:00419CB6 push eax ; s
.text:00419CB7 call send
.text:00419CBC cmp eax, 0FFFFFFFFh
.text:00419CBF jz short loc_419CED
.text:00419CC1 mov edx, [esi+4]
.text:00419CC4 push ebx ; flags
.text:00419CC5 lea ecx, [esp+198h+argp]
.text:00419CC9 push 4 ; len
.text:00419CCB push ecx ; buf
.text:00419CCC push edx ; s
.text:00419CCD call send
.text:00419CD2 cmp eax, 0FFFFFFFFh
.text:00419CD5 jz short loc_419CED
.text:00419CD7 mov ecx, [esi+4]
.text:00419CDA push ebx ; flags
.text:00419CDB lea eax, [esp+198h+var_168]
.text:00419CDF push 10h ; len
.text:00419CE1 push eax ; buf
.text:00419CE2 push ecx ; s
.text:00419CE3
.text:00419CE3 loc_419CE3: ; CODE XREF: sub_419A10+252j
.text:00419CE3 call send
как видим вызов send идет 3 раза;) собственно так как инжект седит именно на этой функции он и должен 3 раза словить даные.