- Joined
- May 1, 2006
- Messages
- 381
- Reaction score
- 167
1.03K
SetByte(0x0052D49B,0x02); and whoa
SetByte(0x0052D49B,0x02); and whoa
Join our community of MMO enthusiasts and game developers! By registering, you'll gain access to discussions on the latest developments in MMO server files and collaborate with like-minded individuals. Join us today and unlock the potential of MMO server development!
Join Today!1.03K
SetByte(0x0052D49B,0x02); and whoa
References in main_104:.text to USER32.SetWindowsHookExA
Address Disassembly Comment
CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA
[B][SIZE=3][I]CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA[/I][/SIZE][/B]
JMP DWORD PTR DS:[<&USER32.SetWindowsHoo USER32.SetWindowsHookExA
PUSH 0D
CALL DWORD PTR DS:[<&USER32.SetWindowsHo>; USER32.SetWindowsHookExA
MOV EDX,DWORD PTR SS:[EBP-4]
MOV DWORD PTR DS:[EDX],EAX
Open Ollydbg
Load Main.exe
Press Ctrl + N
Search SetWindowsHookExA
follow the second call (NOT JMP, JUST CALL)
Code:References in main_104:.text to USER32.SetWindowsHookExA Address Disassembly Comment CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA [B][SIZE=3][I]CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA[/I][/SIZE][/B] JMP DWORD PTR DS:[<&USER32.SetWindowsHoo USER32.SetWindowsHookExA
when u see some like this
Code:PUSH 0D CALL DWORD PTR DS:[<&USER32.SetWindowsHo>; USER32.SetWindowsHookExA MOV EDX,DWORD PTR SS:[EBP-4] MOV DWORD PTR DS:[EDX],EAX
Changue 0x0D to 0x02
0x0D = 13 [WH_KEYBOARD_LL (13)]
0x02 = 2 [WH_KEYBOARD (2)]
More infoYou must be registered to see links
1.03K JPN:
004BD479
1.03Y JPN:
004C7F49
1.04 JPN S6EP3:
0052D49B
1.04D GMO S6EP3:
0052101B
ok, ok ok ok ok ok
Test it and told me about your crash
GG
0046D29D |. 6A 00 push 0 ; /ThreadID = 0
0046D29F |. 8B4D 08 mov ecx,dword ptr ss:[ebp+8] ; |
0046D2A2 |. 51 push ecx ; |hModule
0046D2A3 |. 68 85D34600 push 0046D385 ; |Hookproc = main.0046D385
0046D2A8 |. 6A 0D push 0D ; |HookType = 13.
0046D2AA |. FF15 60347000 call dword ptr ds:[<&user32.SetWindowsHookExA>] ; \SetWindowsHookExA
0046D385 /. 55 push ebp
...
0046D3AB |> 8B4D 10 mov ecx,dword ptr ss:[ebp+10]; lParam (if you didn't know)
0046D3AE |. 894D FC mov dword ptr ss:[ebp-4],ecx
0046D3B1 |. 8B55 FC mov edx,dword ptr ss:[ebp-4]
0046D3B4 |. 8B02 mov eax,dword ptr ds:[edx] ; ops, look here, a pointer!
...
So it's just a number! That will be a treated as a memory address and if you are lucky, maybe, you can read that address, otherwise, a lovely exception will be thrown and your main will crash.lParam
The repeat count, scan code, extended-key flag, context code, previous key-state flag, and transition-state flag. For more information about the lParam parameter, seeYou must be registered to see links. The following table describes the bits of this value.
LRESULT __userpurge sub_521120<eax>(int a1<ebx>, int a2<edi>, int nCode, WPARAM wParam, LPARAM lParam)
{
void *v6; // eax@13
int v7; // eax@13
unsigned int v8; // [sp+0h] [bp-Ch]@4
if ( !nCode && wParam >= 0x100 && wParam <= 0x101 )
{
v8 = *(_DWORD *)lParam;
if ( *(_DWORD *)lParam == 27 )
{
if ( sub_790F40(a1, a2, 17) == 1 )
return 1;
}
else
{
if ( v8 > 0x5A && v8 <= 0x5C && !*(_DWORD *)&dword_E60974 )
return 1;
}
}
v6 = sub_5210B0(a1, a2);
v7 = sub_5210A0(v6);
return CallNextHookEx((HHOOK)v7, nCode, wParam, lParam);
}
In this hook, just call LL Hook, but works as a simple hook...
Do you understand ? You need read (main code), before open your mouth
i never told it is not a pointer
Code:LRESULT __userpurge sub_521120<eax>(int a1<ebx>, int a2<edi>, int nCode, WPARAM wParam, LPARAM lParam) { void *v6; // eax@13 int v7; // eax@13 unsigned int v8; // [sp+0h] [bp-Ch]@4 if ( !nCode && wParam >= 0x100 && wParam <= 0x101 ) { v8 = *(_DWORD *)lParam; if ( *(_DWORD *)lParam == 27 ) { if ( sub_790F40(a1, a2, 17) == 1 ) return 1; } else { if ( v8 > 0x5A && v8 <= 0x5C && !*(_DWORD *)&dword_E60974 ) return 1; } } v6 = sub_5210B0(a1, a2); v7 = sub_5210A0(v6); return CallNextHookEx((HHOOK)v7, nCode, wParam, lParam); }
Open Ollydbg
Load Main.exe
Press Ctrl + N
Search SetWindowsHookExA
follow the second call (NOT JMP, JUST CALL)
Code:References in main_104:.text to USER32.SetWindowsHookExA Address Disassembly Comment CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA [B][SIZE=3][I]CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA[/I][/SIZE][/B] JMP DWORD PTR DS:[<&USER32.SetWindowsHoo USER32.SetWindowsHookExA
when u see some like this
Code:PUSH 0D CALL DWORD PTR DS:[<&USER32.SetWindowsHo>; USER32.SetWindowsHookExA MOV EDX,DWORD PTR SS:[EBP-4] MOV DWORD PTR DS:[EDX],EAX
Changue 0x0D to 0x02
0x0D = 13 [WH_KEYBOARD_LL (13)]
0x02 = 2 [WH_KEYBOARD (2)]
More infoYou must be registered to see links
1.03K JPN:
004BD479
1.03Y JPN:
004C7F49
1.04 JPN S6EP3:
0052D49B
1.04D GMO S6EP3:
0052101B
Open Ollydbg
Load Main.exe
Press Ctrl + N
Search SetWindowsHookExA
follow the second call (NOT JMP, JUST CALL)
Code:References in main_104:.text to USER32.SetWindowsHookExA Address Disassembly Comment CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA [B][SIZE=3][I]CALL DWORD PTR DS:[<&USER32.SetWindowsHo USER32.SetWindowsHookExA[/I][/SIZE][/B] JMP DWORD PTR DS:[<&USER32.SetWindowsHoo USER32.SetWindowsHookExA
when u see some like this
Code:PUSH 0D CALL DWORD PTR DS:[<&USER32.SetWindowsHo>; USER32.SetWindowsHookExA MOV EDX,DWORD PTR SS:[EBP-4] MOV DWORD PTR DS:[EDX],EAX
Changue 0x0D to 0x02
0x0D = 13 [WH_KEYBOARD_LL (13)]
0x02 = 2 [WH_KEYBOARD (2)]
More infoYou must be registered to see links
1.03K JPN:
004BD479
1.03Y JPN:
004C7F49
1.04 JPN S6EP3:
0052D49B
1.04D GMO S6EP3:
0052101B
the only solution for this i think .. is having a perfect PC ultra game edition u know what i mean so u can have 2 accounts online and play
cus client opened 2 times causes that freeze lag XD
its kind of FPS thing i think.
Sir, if this is not enough then i dont know what it is, it happens to me too and the only fix is to reduce the amount of times that CTRL repeats in keyboard options, its just a crappy mu "bug"
Sir, if this is not enough then i dont know what it is, it happens to me too and the only fix is to reduce the amount of times that CTRL repeats in keyboard options, its just a crappy mu "bug"
its still not enuff,.. just open task manager, see how it looks like when u open 2 muonline, it might be bug ofcourse.. so dont waste time on it.
Igcn files somehow have fixed this...
True but its not a bug on 2 muonline..