Intro: I came to the conclusion that unless I understand how to dissassemble/reverseengineer wow, it wouldn't do any good to learn the offsets etc you guys post if one day something changes a little, and I can't fix it myself. So I figured my first step would be to set a break point on my health_address(es) and check out the code that accesses it. Hopefully from looking at the code I can learn more about the object's structure in memory. But..I think I picked a bad chunk to start with because other bp's lead to code that uses mov fs[2c] (for tls) so..i'll check that out tomorrow. Anyway, any comments on the chunk I did ..examine, would be greatly appreciated.
DMA Health
1015BB30
1015C3D4
AUTOHACK bb30
5C765C: mov [eax+edx*4],ecx
'Function(ByVal esp,ecx) ?
5c7650 push ebp
5c7651 mov ebp,esp esp=19FB60
5c7653 mov eax,[ecx+0x8]
5c7656 mov ecx,[ebp+0xC] []=health_value
5c7659 mov edx,[ebp+0x8] []=??some_multiplier 0-999ish
5c765c mov [eax+edx*4],ecx []=health_addr
ecx=1015ABA0
ecx + 8 + [ebp+0x8]*4 = health_addr
1015ABA8 + [esp+0x8]*4 = health_addr
so far I can't tell much about any structure..ebp+0xc=health_value, but I don't know where
ebp is being ..initialized,it might be significant like an object base_pointer, or might not.
Same w/ ecx. So the next step might be to...find any code that JMPS to 5c7650?
Again, thanks for any help.