• Amused
  • Angry
  • Annoyed
  • Awesome
  • Bemused
  • Cocky
  • Cool
  • Crazy
  • Crying
  • Down
  • Drunk
  • Embarrased
  • Enraged
  • Friendly
  • Geeky
  • Godly
  • Happy
  • Hateful
  • Hungry
  • Innocent
  • Meh
  • Piratey
  • Poorly
  • Sad
  • Secret
  • Shy
  • Sneaky
  • Tired
  • Wtf
  • At Work
  • CodenzHub
  • Coding
  • Deejaying
  • Donating
  • Drinking
  • Eating
  • Editing
  • Hacking
  • Hate Mailing
  • Jamin'
  • Lagging
  • Live Streaming
  • Lurking
  • No Status
  • Pawning
  • PC Gaming
  • PS Gaming
  • Raging
  • Reversing
  • Sipping
  • Sleeping
  • Steam Gaming
  • Trolling
  • TwitchStreamer
  • Vodka!
  • Watching TV/Movie
  • Xbox Gaming
  • Youtuber
  • Zombies
  • Page 3 of 3 FirstFirst 123
    Results 21 to 24 of 24
    1. #21
      Newbie
      Bourbon + Fanta
       
      Drunk
       

      Join Date
      Dec 2017
      Posts
      32
      Thanks (-->)
      16
      Thanks (<--)
      12
      How to Manual Map DLL
      Quote Originally Posted by dotHBM View Post
      Hey, so I found the solution solution.

      _declspec(naked) void _stdcall fullMapAttackVacCC()
      {
      _asm
      {
      mov ecx, [cuserlocal]
      mov ecx,[ecx] //This one
      add ecx, 0x04
      lea eax, [ebp - 0x000000C4]
      push eax
      call dword ptr [fullmapcall] //Do I even need to change this to call dword ptr?
      lea eax, [ebp - 0x000000C4]
      push eax
      jmp dword ptr [fullmapattackjump]
      }
      }

      I not sure why but it came out of nowhere in my mind, I add it and it worked.
      Yes, it makes sense, cuz original CE script actualy reads the value of address, but prewiously you just retrieved the address to be red.
      GJ

    2. Thanks dotHBM thanked for this post
    3. #22
      Newbie
      Biology Major -> Software.E
       
      Feeling Normal
       

      Join Date
      Jan 2018
      Posts
      21
      Thanks (-->)
      16
      Thanks (<--)
      3
      Quote Originally Posted by IXSO View Post
      Yes, it makes sense, cuz original CE script actualy reads the value of address, but prewiously you just retrieved the address to be red.
      GJ
      Yeah IDK why though. Visual Studio is weird maybe? XD

    4. #23
      Newbie
      Bourbon + Fanta
       
      Drunk
       

      Join Date
      Dec 2017
      Posts
      32
      Thanks (-->)
      16
      Thanks (<--)
      12
      Quote Originally Posted by dotHBM View Post
      Yeah IDK why though. Visual Studio is weird maybe? XD
      No, it's bcuz with ``mov ecx, [cuserlocal]`` you read ``cuserlocal`` which is NOT ``02EFF398``, but a pointer to it.
      If you open it in debugger, you'll notice that the first line isn't ``mov ecx, [02EFF398]`` but some weird shit (like ``mov ecx, [03CAFE69]``) or myb even ``cuserlocal`` depending on debugger/compilation. However after steping you'll notice that ``ecx`` is now containing ``02EFF398`` aka the value of red address (``cuserlocal``). Hence you need to read ``ecx`` as the CE script actualy reads the value of ``02EFF398`` not just retrieves it.

    5. Thanks [GH]Rake thanked for this post
    6. #24
      Newbie
      Biology Major -> Software.E
       
      Feeling Normal
       

      Join Date
      Jan 2018
      Posts
      21
      Thanks (-->)
      16
      Thanks (<--)
      3
      Cheat Engine Tutorials
      Quote Originally Posted by IXSO View Post
      No, it's bcuz with ``mov ecx, [cuserlocal]`` you read ``cuserlocal`` which is NOT ``02EFF398``, but a pointer to it.
      If you open it in debugger, you'll notice that the first line isn't ``mov ecx, [02EFF398]`` but some weird shit (like ``mov ecx, [03CAFE69]``) or myb even ``cuserlocal`` depending on debugger/compilation. However after steping you'll notice that ``ecx`` is now containing ``02EFF398`` aka the value of red address (``cuserlocal``). Hence you need to read ``ecx`` as the CE script actualy reads the value of ``02EFF398`` not just retrieves it.
      Thanks for helping me and answering all my noobie questions! Appreciate it a lot. Looks like I need to learn more ASM

    Page 3 of 3 FirstFirst 123

    Similar Game Hacker Threads

    1. [Source Code] FASM x86 Shell Code Cave - Full Source
      By V-X in forum ASM
      Replies: 3
      Last Post: 08-26-2017, 02:50 PM
    2. [Help] Need help converting Cheat Engine Script
      By Dabzy in forum Hacking Help
      Replies: 6
      Last Post: 07-11-2017, 03:28 AM
    3. Replies: 25
      Last Post: 12-28-2016, 08:25 PM
    4. [Help] Code Cave Patching - Always Something!
      By Nether in forum C / C++ Help
      Replies: 2
      Last Post: 01-06-2014, 12:52 AM
    5. A bit of Code Cave help in C++?
      By xploiitz in forum C / C++ Help
      Replies: 9
      Last Post: 07-28-2012, 01:18 AM