标题:
6.2【偷袭攻击】
[打印本页]
作者:
59054695
时间:
2021-3-24 17:23
标题:
6.2【偷袭攻击】
物理伤害增加,从侧面攻击伤害增加25%,从背面攻击伤害增加50%。
0043BDA9 |. E8 03D0FCFF CALL Ekd5.00408DB1 ; \Ekd5.00408DB1
0043BDA9 E8 926CFDFF CALL Ekd5.00412A40
00412A40 /$ 55 PUSH EBP
00412A41 |. 8BEC MOV EBP,ESP
00412A43 |. FF75 14 PUSH DWORD PTR SS:[EBP+14] ; /Arg4
00412A46 |. FF75 10 PUSH DWORD PTR SS:[EBP+10] ; |Arg3
00412A49 |. FF75 0C PUSH DWORD PTR SS:[EBP+C] ; |Arg2
00412A4C |. FF75 08 PUSH DWORD PTR SS:[EBP+8] ; |Arg1
00412A4F |. E8 5D63FFFF CALL Ekd5.00408DB1 ; \Ekd5.00408DB1
00412A54 |. 8945 10 MOV DWORD PTR SS:[EBP+10],EAX
00412A57 |. 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
00412A5A |. E8 303BFFFF CALL Ekd5.0040658F
00412A5F |. 6A 01 PUSH 1 ; /Arg4 = 00000001
00412A61 |. 6A 01 PUSH 1 ; |Arg3 = 00000001
00412A63 |. 6A 32 PUSH 32 ; |Arg2 = 00000032 宝物号
00412A65 |. 6A 48 PUSH 48 ; |Arg1 = 00000048 个人特效号
00412A67 |. E8 6DD7FFFF CALL Ekd5.004101D9 ; \Ekd5.004101D9
00412A6C |. 85C0 TEST EAX,EAX
00412A6E |. 74 13 JE SHORT Ekd5.00412A83
00412A70 |. 6A 00 PUSH 0 ; /Arg4 = 00000000
00412A72 |. FF75 10 PUSH DWORD PTR SS:[EBP+10] ; |Arg3
00412A75 |. FF75 0C PUSH DWORD PTR SS:[EBP+C] ; |Arg2
00412A78 |. FF75 08 PUSH DWORD PTR SS:[EBP+8] ; |Arg1
00412A7B |. E8 10000000 CALL Ekd5.00412A90 ; \Ekd5.00412A90
00412A80 |. 8945 10 MOV DWORD PTR SS:[EBP+10],EAX
00412A83 |> 8B45 10 MOV EAX,DWORD PTR SS:[EBP+10]
00412A86 |. 8BE5 MOV ESP,EBP
00412A88 |. 5D POP EBP
00412A89 \. C2 1000 RETN 10
00412A8C 90 NOP
00412A8D 90 NOP
00412A8E 90 NOP
00412A8F 90 NOP
00412A90 /$ 55 PUSH EBP
00412A91 |. 8BEC MOV EBP,ESP
00412A93 |. 33C0 XOR EAX,EAX
00412A95 |. 50 PUSH EAX
00412A96 |. 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
00412A99 |. 8079 0E 07 CMP BYTE PTR DS:[ECX+E],7
00412A9D |. 74 10 JE SHORT Ekd5.00412AAF
00412A9F |. BA CE005000 MOV EDX,Ekd5.005000CE
00412AA4 |. 66:813A FFFF CMP WORD PTR DS:[EDX],0FFFF
00412AA9 |. 74 04 JE SHORT Ekd5.00412AAF
00412AAB |. FF32 PUSH DWORD PTR DS:[EDX]
00412AAD |. EB 03 JMP SHORT Ekd5.00412AB2
00412AAF |> FF71 06 PUSH DWORD PTR DS:[ECX+6]
00412AB2 |> 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C]
00412AB5 |. 8A41 0F MOV AL,BYTE PTR DS:[ECX+F]
00412AB8 |. 8BD0 MOV EDX,EAX
00412ABA |. 83E2 01 AND EDX,1
00412ABD |. 85D2 TEST EDX,EDX
00412ABF |. 75 16 JNZ SHORT Ekd5.00412AD7
00412AC1 |. 8A51 07 MOV DL,BYTE PTR DS:[ECX+7]
00412AC4 |. 3A55 F9 CMP DL,BYTE PTR SS:[EBP-7]
00412AC7 |. 74 26 JE SHORT Ekd5.00412AEF
00412AC9 |. 77 06 JA SHORT Ekd5.00412AD1
00412ACB |. 3C 00 CMP AL,0
00412ACD |. 74 24 JE SHORT Ekd5.00412AF3
00412ACF |. EB 1A JMP SHORT Ekd5.00412AEB
00412AD1 |> 3C 02 CMP AL,2
00412AD3 |. 74 1E JE SHORT Ekd5.00412AF3
00412AD5 |. EB 14 JMP SHORT Ekd5.00412AEB
00412AD7 |> 8A51 06 MOV DL,BYTE PTR DS:[ECX+6]
00412ADA |. 3A55 F8 CMP DL,BYTE PTR SS:[EBP-8]
00412ADD |. 74 10 JE SHORT Ekd5.00412AEF
00412ADF |. 77 06 JA SHORT Ekd5.00412AE7
00412AE1 |. 3C 01 CMP AL,1
00412AE3 |. 74 06 JE SHORT Ekd5.00412AEB
00412AE5 |. EB 0C JMP SHORT Ekd5.00412AF3
00412AE7 |> 3C 03 CMP AL,3
00412AE9 |. 75 08 JNZ SHORT Ekd5.00412AF3
00412AEB |> 33C0 XOR EAX,EAX
00412AED |. EB 06 JMP SHORT Ekd5.00412AF5
00412AEF |> B0 01 MOV AL,1
00412AF1 |. EB 02 JMP SHORT Ekd5.00412AF5
00412AF3 |> B0 02 MOV AL,2
00412AF5 |> 6BC0 19 IMUL EAX,EAX,19
00412AF8 |. 50 PUSH EAX
00412AF9 |. FF75 10 PUSH DWORD PTR SS:[EBP+10]
00412AFC |. E8 93CB0B00 CALL Ekd5.004CF694
00412B01 |. 0145 10 ADD DWORD PTR SS:[EBP+10],EAX
00412B04 |. 0145 FC ADD DWORD PTR SS:[EBP-4],EAX
00412B07 |. 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C]
00412B0A |. E8 013CFFFF CALL Ekd5.00406710
00412B0F |. 3C 01 CMP AL,1
00412B11 |. 74 19 JE SHORT Ekd5.00412B2C
00412B13 |. 803D 9A0E5000 01 CMP BYTE PTR DS:[500E9A],1
00412B1A |. 75 10 JNZ SHORT Ekd5.00412B2C
00412B1C |. 6A 19 PUSH 19
00412B1E |. FF75 10 PUSH DWORD PTR SS:[EBP+10]
00412B21 |. E8 6ECB0B00 CALL Ekd5.004CF694
00412B26 |. 0145 10 ADD DWORD PTR SS:[EBP+10],EAX
00412B29 |. 0145 FC ADD DWORD PTR SS:[EBP-4],EAX
00412B2C |> 837D 14 00 CMP DWORD PTR SS:[EBP+14],0
00412B30 |. 75 05 JNZ SHORT Ekd5.00412B37
00412B32 |. 8B45 10 MOV EAX,DWORD PTR SS:[EBP+10]
00412B35 |. EB 03 JMP SHORT Ekd5.00412B3A
00412B37 |> 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
00412B3A |> 8BE5 MOV ESP,EBP
00412B3C |. 5D POP EBP
00412B3D \. C2 1000 RETN 10
作者:
c381612
时间:
2021-7-6 15:58
白神,这里的32宝物号 是不是指修改之后 替换了之前的32号宝物效果?同理,下面的个人特效是不是也是指替换了之前的48号个人特效?
另外,这个修改 6.2的修正版 适用吗???
图片附件:
屏幕截图 2021-07-06 155633.png
(2021-7-6 15:58, 70.7 K) / 该附件被下载次数 34
http://xycq.org.cn/forum/attachment.php?aid=149303
图片附件:
屏幕截图 2021-07-06 155633.png
(2021-7-6 15:59, 70.7 K) / 该附件被下载次数 38
http://xycq.org.cn/forum/attachment.php?aid=149304
作者:
59054695
时间:
2021-7-6 16:47
标题:
回复 #2 c381612 的帖子
1、没替换,是共用。
2、6.2修正版适用。
[
本帖最后由 59054695 于 2021-7-6 16:52 编辑
]
作者:
c381612
时间:
2021-7-8 17:11
标题:
回复 #3 59054695 的帖子
白神,我想把这个“偷袭攻击”和你之前发的“疾风攻击”放在一起写,要怎么样写啊?
我只会抄代码,可以请您帮我一下吗?
作者:
c381612
时间:
2021-7-10 07:00
白神,我试着在6.2修正版引擎上加入偷袭攻击和疾风攻击,自己试着做了一下,但是发现偷袭攻击有效果,但是疾风攻击没有效果,下面是我的代码,希望大神帮忙看看,问题出在哪里?
0043BDA9 E8 926CFDFF CALL Ekd5.00412B69
00412B69 /$ 55 PUSH EBP
00412B6A |. 8BEC MOV EBP,ESP
00412B6C |. FF75 14 PUSH DWORD PTR SS:[EBP+14] ; /Arg4
00412B6F |. FF75 10 PUSH DWORD PTR SS:[EBP+10] ; |Arg3
00412B72 |. FF75 0C PUSH DWORD PTR SS:[EBP+C] ; |Arg2
00412B75 |. FF75 08 PUSH DWORD PTR SS:[EBP+8] ; |Arg1
00412B78 |. E8 5D63FFFF CALL Ekd5.00408DB1 ; \Ekd5.00408DB1
00412B7D |. 8945 10 MOV DWORD PTR SS:[EBP+10],EAX
00412B80 |. 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
00412B83 |. E8 303BFFFF CALL Ekd5.0040658F
00412B88 |. 6A 01 PUSH 1 ; /Arg4 = 00000001
00412B8A |. 6A 01 PUSH 1 ; |Arg3 = 00000001
00412B8C |. 6A 32 PUSH 32 ; |Arg2 = 00000032 宝物号
00412B8E |. 6A 48 PUSH 48 ; |Arg1 = 00000048 个人特效号
00412B90 |. E8 6DD7FFFF CALL Ekd5.004101D9 ; \Ekd5.004101D9
00412B95 |. 85C0 TEST EAX,EAX
00412B97 |. 74 13 JE SHORT Ekd5.412BE8
00412B99 |. 6A 00 PUSH 0 ; /Arg4 = 00000000
00412B9B |. FF75 10 PUSH DWORD PTR SS:[EBP+10] ; |Arg3
00412B9E |. FF75 0C PUSH DWORD PTR SS:[EBP+C] ; |Arg2
00412BA1 |. FF75 08 PUSH DWORD PTR SS:[EBP+8] ; |Arg1
00412BA4 |. E8 10000000 CALL Ekd5.00412BF5 ; \Ekd5.00412BF5
00412BA9 |. 8945 10 MOV DWORD PTR SS:[EBP+10],EAX
00412BAC |. 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
00412BAF |. E8 303BFFFF CALL Ekd5.0040658F
00412BB4 |. 6A 01 PUSH 1 ; /Arg4 = 00000001
00412BB6 |. 6A 01 PUSH 1 ; |Arg3 = 00000001
00412BB8 |. 6A 2E PUSH 2E ; |Arg2 = 0000002E 宝物号
00412BBA |. 6A 48 PUSH 48 ; |Arg1 = 00000048 个人特效号
00412BCC |. E8 6DD7FFFF CALL Ekd5.004101D9 ; \Ekd5.004101D9
00412BC1 |. 85C0 TEST EAX,EAX
00412BC3 |. 74 23 JE SHORT Ekd5.412BE8
00412BC5 |. 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C]
00412BC8 |. E8 D7CC0200 CALL Ekd5.0043F74F
00412BCD |. 83F8 0E CMP EAX,0E 14上限可以自行修改
00412BD0 |. 73 16 JNB SHORT Ekd5.412BE8
00412BD2 |. B9 0E000000 MOV ECX,0E 14上限可以自行修改
00412BD7 |. 2BC8 SUB ECX,EAX
00412BD9 |. 6BC9 05 IMUL ECX,ECX,5
00412BDC |. FF75 10 PUSH DWORD PTR SS:[EBP+10]
00412BDF |. 51 PUSH ECX
00412BE0 |. E8 04CC0B00 CALL Ekd5.004CF694
00412BE5 |. 0145 10 ADD DWORD PTR SS:[EBP+10],EAX
00412BE8 |> 8B45 10 MOV EAX,DWORD PTR SS:[EBP+10]
00412BEB |. 8BE5 MOV ESP,EBP
00412BED |. 5D POP EBP
00412BEE \. C2 1000 RETN 10
00412BF5 /$ 55 push ebp Ekd52.00412BF5(guessed Arg1,Arg2,Arg3,Arg4)
00412BF6 |. 89E5 mov ebp,esp
00412BF8 |. 31C0 xor eax,eax
00412BFA |. 50 push eax
00412BFB |. 8B4D 08 mov ecx,dword ptr [ebp+8]
00412BFE |. 8079 0E 07 cmp byte ptr [ecx+0E],7
00412C02 |. 74 0F je short 00412C13
00412C04 |. BA CE005000 mov edx,005000CE
00412C09 |. 66:833A FF cmp word ptr [edx],0FFFF
00412C0D |. 74 04 je short 00412C13
00412C0F |. FF32 push dword ptr [edx]
00412C11 |. EB 03 jmp short 00412C16
00412C13 |> FF71 06 push dword ptr [ecx+6]
00412C16 |> 8B4D 0C mov ecx,dword ptr [ebp+0C]
00412C19 |. 8A41 0F mov al,byte ptr [ecx+0F]
00412C1C |. 89C2 mov edx,eax
00412C1E |. 83E2 01 and edx,00000001
00412C21 |. 85D2 test edx,edx
00412C23 |. 75 16 jnz short 00412C3B
00412C25 |. 8A51 07 mov dl,byte ptr [ecx+7]
00412C28 |. 3A55 F9 cmp dl,byte ptr [ebp-7]
00412C2B |. 74 26 je short 00412C53
00412C2D |. 77 06 ja short 00412C35
00412C2F |. 3C 00 cmp al,0
00412C31 |. 74 24 je short 00412C57
00412C33 |. EB 1A jmp short 00412C4F
00412C35 |> 3C 02 cmp al,2
00412C37 |. 74 1E je short 00412C57
00412C39 |. EB 14 jmp short 00412C4F
00412C3B |> 8A51 06 mov dl,byte ptr [ecx+6]
00412C3E |. 3A55 F8 cmp dl,byte ptr [ebp-8]
00412C41 |. 74 10 je short 00412C53
00412C43 |. 77 06 ja short 00412C4B
00412C45 |. 3C 01 cmp al,1
00412C47 |. 74 06 je short 00412C4F
00412C49 |. EB 0C jmp short 00412C57
00412C4B |> 3C 03 cmp al,3
00412C4D |. 75 08 jne short 00412C57
00412C4F |> 31C0 xor eax,eax
00412C51 |. EB 06 jmp short 00412C59
00412C53 |> B0 01 mov al,1
00412C55 |. EB 02 jmp short 00412C59
00412C57 |> B0 02 mov al,2
00412C59 |> 6BC0 19 imul eax,eax,19
00412C5C |. 50 push eax ; /Arg2
00412C5D |. FF75 10 push dword ptr [ebp+10] ; |Arg1 => [Arg3]
00412C60 |. E8 2FCA0B00 call 004CF694 ; \Ekd52.004CF694
00412C65 |. 0145 10 add dword ptr [ebp+10],eax
00412C68 |. 0145 FC add dword ptr [ebp-4],eax
00412C6B |. 8B4D 0C mov ecx,dword ptr [ebp+0C]
00412C6E |. E8 9D3AFFFF call 00406710
00412C73 |. 3C 01 cmp al,1
00412C75 |. 74 19 je short 00412C90
00412C77 |. 803D 9A0E5000 0 cmp byte ptr [500E9A],1
00412C7E |. 75 10 jne short 00412C90
00412C80 |. 6A 19 push 19 ; /Arg2 = 19
00412C82 |. FF75 10 push dword ptr [ebp+10] ; |Arg1 => [Arg3]
00412C85 |. E8 0ACA0B00 call 004CF694 ; \Ekd52.004CF694
00412C8A |. 0145 10 add dword ptr [ebp+10],eax
00412C8D |. 0145 FC add dword ptr [ebp-4],eax
00412C90 |> 837D 14 00 cmp dword ptr [ebp+14],0
00412C94 |. 75 05 jne short 00412C9B
00412C96 |. 8B45 10 mov eax,dword ptr [ebp+10]
00412C99 |. EB 03 jmp short 00412C9E
00412C9B |> 8B45 FC mov eax,dword ptr [ebp-4]
00412C9E |> 89EC mov esp,ebp
00412CA0 |. 5D pop ebp
00412CA1 \. C2 1000 retn 10
作者:
zhoufangzun
时间:
2021-7-10 07:29
00412B97 74 13 JE SHORT 412BAC
改为
00412B97 74 13 JE SHORT 412BAC
作者:
c381612
时间:
2021-7-10 07:38
标题:
回复 #6 zhoufangzun 的帖子
好的,我来试一试
[
本帖最后由 c381612 于 2021-7-10 07:39 编辑
]
欢迎光临 轩辕春秋文化论坛 (http://xycq.org.cn/forum/)
Powered by Discuz! 5.0.0