Cheat Engine Forum Index Cheat Engine
The Official Site of Cheat Engine
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 


Help with show module addresses

 
Post new topic   Reply to topic    Cheat Engine Forum Index -> Cheat Engine
View previous topic :: View next topic  
Author Message
DELTA10FY
Master Cheater
Reputation: 5

Joined: 07 Aug 2009
Posts: 438

PostPosted: Tue Jul 20, 2010 5:08 am    Post subject: Help with show module addresses Reply with quote

I know that this pointscan but if not
Xxxxx.exe or another does not appear in this case
Only the temporal steering
What to do in these cases?
Array of Bytes?
As put in script
any command to find the address provided? Idea

Sorry for English
thanks in advance



aa.PNG
 Description:
 Filesize:  14.38 KB
 Viewed:  4065 Time(s)

aa.PNG



co2.PNG
 Description:
 Filesize:  43.13 KB
 Viewed:  4065 Time(s)

co2.PNG



todo.PNG
 Description:
 Filesize:  49.15 KB
 Viewed:  4065 Time(s)

todo.PNG


Back to top
View user's profile Send private message MSN Messenger
Dark Byte
Site Admin
Reputation: 470

Joined: 09 May 2003
Posts: 25796
Location: The netherlands

PostPosted: Tue Jul 20, 2010 6:08 am    Post subject: Reply with quote

it looks like runtime generated code so use an aobscan yes

as for what bytes to look for I just can't tell you since the menu is in front of it, but replace the bytes of direct addresses and long relative jumps and calls with wildcards since they are more likely to change when the code is located at a different spot

_________________
Do not ask me about online cheats. I don't know any and wont help finding them.

Like my help? Join me on Patreon so i can keep helping
Back to top
View user's profile Send private message MSN Messenger
DELTA10FY
Master Cheater
Reputation: 5

Joined: 07 Aug 2009
Posts: 438

PostPosted: Tue Jul 20, 2010 7:59 am    Post subject: Reply with quote

Dark Byte wrote:
it looks like runtime generated code so use an aobscan yes

as for what bytes to look for I just can't tell you since the menu is in front of it, but replace the bytes of direct addresses and long relative jumps and calls with wildcards since they are more likely to change when the code is located at a different spot


Sorry I know almost nothing about aobscan
help me and correct me
Table 1 as original
Table 2 activating script without adding the aobscan
as would be the script?
Scrip I do not understand script could explain aobscan Rolling Eyes

I correct _faddress://0ca19cb5
0ca2d1dd it does not matter



ta.PNG
 Description:
 Filesize:  30.42 KB
 Viewed:  4027 Time(s)

ta.PNG



2.PNG
 Description:
 Filesize:  2.42 KB
 Viewed:  4047 Time(s)

2.PNG



1.PNG
 Description:
 Filesize:  3.33 KB
 Viewed:  4047 Time(s)

1.PNG


Back to top
View user's profile Send private message MSN Messenger
Dark Byte
Site Admin
Reputation: 470

Joined: 09 May 2003
Posts: 25796
Location: The netherlands

PostPosted: Tue Jul 20, 2010 9:52 am    Post subject: Reply with quote

search for aob 89 87 50 01 00 00 e9
so
Code:

[enable]
alloc(mycodecave,79)
aobscan(aobresult, 89 87 50 01 00 00 e9)
label(storedaddress)
label(return)
registersymbol(storedaddress)

aobresult:
storedaddress:
jmp mycodecave
nop
return:

mycodecave:
......
......
mov [edi+150],eax
......
......
jmp 0ca2d2a0

[disable]
storedaddress:
mov [edi+150],eax
jmp 0ca2d2a0

unregistersymbol(storedaddress)


it would have helped to have the bytes and more after as well

_________________
Do not ask me about online cheats. I don't know any and wont help finding them.

Like my help? Join me on Patreon so i can keep helping
Back to top
View user's profile Send private message MSN Messenger
DELTA10FY
Master Cheater
Reputation: 5

Joined: 07 Aug 2009
Posts: 438

PostPosted: Wed Jul 21, 2010 1:24 am    Post subject: Reply with quote

Dark Byte wrote:
search for aob 89 87 50 01 00 00 e9
so
Code:

[enable]
alloc(mycodecave,79)
aobscan(aobresult, 89 87 50 01 00 00 e9)
label(storedaddress)
label(return)
registersymbol(storedaddress)

aobresult:
storedaddress:
jmp mycodecave
nop
return:

mycodecave:
......
......
mov [edi+150],eax
......
......
jmp 0ca2d2a0

[disable]
storedaddress:
mov [edi+150],eax
jmp 0ca2d2a0

unregistersymbol(storedaddress)


it would have helped to have the bytes and more after as well


Thanks for explaining darkbyte
But I still have the problem

Functions of these commands
Book of ASM?
sorry to be so heavy but I need to fully understand this
asbscan is new to me Wink



da2.png
 Description:
 Filesize:  20.05 KB
 Viewed:  3985 Time(s)

da2.png


Back to top
View user's profile Send private message MSN Messenger
Display posts from previous:   
Post new topic   Reply to topic    Cheat Engine Forum Index -> Cheat Engine All times are GMT - 6 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group

CE Wiki   IRC (#CEF)   Twitter
Third party websites