Originally Posted by
Shynd
/* 46f7a5 */ xEBx02x33xC0x8BxDx00x00x00x00x64x8Bx15x00x00x00x00x8Bx34x8Ax8BxDx00x00x00x00x89x 81x00x00x00x00 xxxxxx????xxx????xxxxx????xx???
AH shynd u da mon! altho u missed out one '?' in the mask it was 31 characters long but there was 32 opcodes also i found it with Olly,
Code:
/*
0046F7A5 |. EB 02 JMP SHORT WoW.0046F7A9
0046F7A7 |> 33C0 XOR EAX,EAX0046F7A9 |> 8B0D 44972E01 MOV ECX,DWORD PTR DS:[12E9744]
0046F7AF |. 64:8B15 2C000000 MOV EDX,DWORD PTR FS:[2C]
0046F7B6 |. 8B348A MOV ESI,DWORD PTR DS:[EDX+ECX*4]
0046F7B9 |. 8B0D 08421C01 MOV ECX,DWORD PTR DS:[11C4208] ;Offset 0x20
0046F7BF |. 8981 2C280000 MOV DWORD PTR DS:[ECX+282C],EAX
*/
it return's the adress 46F7A5 now ive recalculated the offsets
the offset for the pointer is at 0x20 i think
Code:
ObjectManager.Pointer = Memory.ReadUInt(hProcess, (ObjectManager.CodeAddress + 0x20)); //0x16 for 2.4.3?
MOV ECX,DWORD PTR DS:[11C4208]
havent got evrything in place yet im gonna do that tomorrow really tired now cu :wave: and +Rep for the help