原帖由
star175 于 2013-1-18 23:29 发表
2013-3-18 特别更新
3 增加了为特定武将指定特定策略
以上两个我曾经发过帖子
http://www.xycq.net/forum/thread-278060-1-1.html介绍
注意第三点,此次发布的exe中的函数代码如下
00450931 /$ 55 PUSH EBP ; 武将习得策略
00450932 |. 8BEC MOV EBP,ESP
00450934 |. 51 PUSH ECX ; 82
00450935 |. 52 PUSH EDX
00450936 |. E8 42B5FBFF CALL Ekd5.0040BE7D
0045093B |. 50 PUSH EAX
0045093C |. BA A45B4600 MOV EDX,Ekd5.00465BA4
00450941 |. EB 01 JMP SHORT Ekd5.00450944
00450943 |> 42 /INC EDX
00450944 |> 803A FF CMP BYTE PTR DS:[EDX],0FF
00450947 |.^ 75 FA |JNZ SHORT Ekd5.00450943
00450949 |. 42 |INC EDX
0045094A |. 803A FF |CMP BYTE PTR DS:[EDX],0FF
0045094D |. 74 29 |JE SHORT Ekd5.00450978
0045094F |. 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4]
00450952 |. 3A0A |CMP CL,BYTE PTR DS:[EDX]
00450954 |.^ 75 ED \JNZ SHORT Ekd5.00450943
00450956 |> 42 /INC EDX
00450957 |. 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C]
0045095A |. 66:3B02 |CMP AX,WORD PTR DS:[EDX]
0045095D |. 74 0A |JE SHORT Ekd5.00450969
0045095F |. 803A FF |CMP BYTE PTR DS:[EDX],0FF
00450962 |. 74 14 |JE SHORT Ekd5.00450978
00450964 |. 83C2 02 |ADD EDX,2
00450967 |.^ EB ED \JMP SHORT Ekd5.00450956
00450969 |> 8B4D F8 MOV ECX,DWORD PTR SS:[EBP-8]
0045096C |. E8 5F5CFBFF CALL Ekd5.004065D0
00450971 |. 8A4A 02 MOV CL,BYTE PTR DS:[EDX+2]
00450974 |. 3AC1 CMP AL,CL
00450976 |. 73 04 JNB SHORT Ekd5.0045097C
00450978 |> 33C0 XOR EAX,EAX
0045097A |. EB 06 JMP SHORT Ekd5.00450982
0045097C |> 33C0 XOR EAX,EAX
0045097E |. 40 INC EAX
0045097F |. 8B55 F8 MOV EDX,DWORD PTR SS:[EBP-8]
00450982 |> 8BE5 MOV ESP,EBP
00450984 |. 5D POP EBP
00450985 \. C3 RETN