Hello,
I was doing some test as I'm currently trying to learn things and understand how they works by myself.
As a test i was trying to reverse ObjectCurMgr (refering to this thread by bobbysing on gamedeception : How to find stuff - Game Deception - Forums), here is the asm i try to Inject using BlackMagic :
I was reading BlackMagic Documentation and Some methods of Fasm are undocumented that's why i made this post.
Code:
MOV ECX, DWORD PTR FS:[0x2C]
MOV EAX, DWORD PTR DS:[0x1341104]
MOV EDX, DWORD PTR DS:[ECX+EAX*4]
MOV EAX, DWORD PTR DS:[EDX+0x8]
This might be wrong, but as i said i'm trying to reverse and learn by myself, don't be rude for that.
So here is my asm with blackmagic :
Code:
....
....
ProcessManager.WowProcess.Asm.AddLine("MOV ECX, DWORD PTR FS:[0x2C]");
ProcessManager.WowProcess.Asm.AddLine("MOV EAX, DWORD PTR DS:[0x01341104]");
ProcessManager.WowProcess.Asm.AddLine("MOV EDX, DWORD PTR DS:[ECX+EAX*4]");
ProcessManager.WowProcess.Asm.AddLine("MOV EAX, DWORD PTR DS:[EDX+0x8]");
ProcessManager.WowProcess.Asm.AddLine("MOV "+result+", EAX");
try
{
ProcessManager.WowProcess.Asm.Inject(codecave);
}
catch (Exception e)
{
ProcessManager.ResumeMainWowThread();
throw e;
}
result is a uint