slark How do I cheat? Reputation: 0
Joined: 28 Feb 2015 Posts: 7
|
Posted: Sat Feb 28, 2015 9:40 am Post subject: Same value moves to different addresses in the same session |
|
|
Hello, forum.
I am trying to determine the name of the currently selected unit in a game. I have no issues finding the address that holds the name of the unit, but the moment I select a different unit, the address no longer reflects the unit's name. After some research I have learned that whenever I select different units, their names are being stored in at different addresses all the time.
Considering the above scenario, how would one go about finding the base address that always indicates the currently selected unit's name? If I try to find out what accesses/writes the address, nothing shows up unless I select a different unit, but then the address indicates to some random strings.
For example, when I try to find out what accesses the address, I get this bunch of results the moment I select a different unit:
Code: | 5ED6D483 - 8A 10 - mov dl,[eax]
5ED96566 - 88 50 0C - mov [eax+0C],dl
5ED9656D - 89 50 08 - mov [eax+08],edx
5EDEC5F6 - 0FB6 42 0C - movzx eax,byte ptr [edx+0C]
5ED96388 - 8B 46 08 - mov eax,[esi+08]
5ED963A2 - 0FB6 4E 0C - movzx ecx,byte ptr [esi+0C]
5F09FE28 - 89 44 8F F8 - mov [edi+ecx*4-08],eax
5F09FE30 - 89 44 8F FC - mov [edi+ecx*4-04],eax
5ED12DC1 - C6 04 1E 00 - mov byte ptr [esi+ebx],00
5ED02054 - 8A 08 - mov cl,[eax]
5F09FE24 - 8B 44 8E F8 - mov eax,[esi+ecx*4-08]
5F09FE2C - 8B 44 8E FC - mov eax,[esi+ecx*4-04]
5F09FE6C - 8A 06 - mov al,[esi]
5F09FE70 - 8A 46 01 - mov al,[esi+01]
5EE87764 - 89 78 08 - mov [eax+08],edi
5EE87767 - 89 78 0C - mov [eax+0C],edi
5EE8776A - 89 78 10 - mov [eax+10],edi |
I've tried pointer scanning on 5 levels and it generates over a thousand million results which upon filtering leaves about 1.2 million results, but I'd like to know the principle behind finding such problematic addresses.
Any help or hint is much appreciated. Thank you.
|
|