《问道》最新遍历逆向分析
全局游戏战斗对象:asktao.mod+E499A8
其中包含敌人、宠物、队友的全局战斗中数据
队友和自己的血量遍历
00600A12 | 39BE EC040000 | cmp dword ptr ds:[esi+4EC],edi
人物对象创建地址:
asktao.mod+344228 - E8 7374EBFF - call asktao.mod+1FB6A0
asktao.mod+34422D - EB 02 - jmp asktao.mod+344231
asktao.mod+34422F - 33 C0 - xor eax,eax
asktao.mod+344231 - 8B 75 C8 - mov esi,[ebp-38]
asktao.mod+344234 - 81 C6 F0020000 - add esi,000002F0 { 752 }
asktao.mod+34423A - 8B F8 - mov edi,eax
asktao.mod+34423C - 8B 46 04 - mov eax,[esi+04]
asktao.mod+34423F - 85 C0 - test eax,eax
asktao.mod+344241 - C6 45 FC 00 - mov byte ptr [ebp-04],00 { 0 }
asktao.mod+344245 - 89 7D CC - mov [ebp-34],edi
asktao.mod+344248 - 75 04 - jne asktao.mod+34424E
asktao.mod+34424A - 33 D2 - xor edx,edx
asktao.mod+34424C - EB 08 - jmp asktao.mod+344256
asktao.mod+34424E - 8B 56 08 - mov edx,[esi+08]
asktao.mod+344251 - 2B D0 - sub edx,eax
asktao.mod+344253 - C1 FA 02 - sar edx,02 { 2 }
asktao.mod+344256 - 85 C0 - test eax,eax
asktao.mod+344258 - 74 35 - je asktao.mod+34428F
asktao.mod+34425A - 8B 4E 0C - mov ecx,[esi+0C]
asktao.mod+34425D - 2B C8 - sub ecx,eax
asktao.mod+34425F - C1 F9 02 - sar ecx,02 { 2 }
asktao.mod+344262 - 3B D1 - cmp edx,ecx
asktao.mod+344264 - 73 29 - jae asktao.mod+34428F
asktao.mod+344266 - 8B 56 08 - mov edx,[esi+08]
asktao.mod+344269 - B9 01000000 - mov ecx,00000001 { 1 }
asktao.mod+34426E - 8B C2 - mov eax,edx
asktao.mod+344270 - 85 C9 - test ecx,ecx
asktao.mod+344272 - 76 0A - jna asktao.mod+34427E
asktao.mod+344274 - 89 38 - mov [eax],edi


