Lol, dude dont get mad . There is no reason to hide anything at all (besides that you are still showing that the cursor was at 0xB4F474)...
Some remarks:
You wrote:
Code:
mov [ecx], eax // ecx = obj_health_addr, eax = new_health_value
(above it, we see)
mov ecx, [esi+30] // esi + 30 ....is a health addr, what is esi? probably obj.base , obj.substructure? or ?
about esi:
Assuming that swtor was compiled with cl.exe you end up having this passed in ecx and then "stored" in esi, that gives you the typical __thiscall prologue:
push ebp
mov ebp, esp
; bunch of opcodes
mov esi, ecx
If you go a little bit up you find:
Code:
mov eax, [esi]
mov edx, [eax + 8]
mov ecx, esi
call edx
That shows you that esi is an instance of a polymorphic class with a virtual method table (which you can easily read at runtime) and its second virtual function gets called there. In fact it seems to be an instance of a rather complex class, a lil bit above you see that the 50th virtual function gets called.
About short red line and magical health offset. Im pretty sure offset is not the right word here. I guess you are using 32 Bit (as you are using XP) and not 64 Bit thus an offset of 0xAAA638DE is already per se in kernel mode memory and oviously not an offset.