this isnt saying how to add it im on ollydbg can somone explain how to add it i dont know what its saying to do
Code:start: pushad call getlocation getlocation: pop ebp sub ebp, getlocation-start mov ebx, [ebp+ (PatchLocation - start)] ; ebx contains the location of the where the patch will be placed mov ecx, ebp sub ecx, ebx add ecx, (CodeToExecute - start - 5) ; ecx has the jump position mov [ebp + ((PatchMeCode-start) + 1)], ecx ; fix the jump push ebp push 0x40 push EndOfPatchMeCode - PatchMeCode push ebx mov eax, [ebp+ (VirtualProtectAddress - start)] call [eax] mov esi, ebp add esi, PatchMeCode - start mov edi, [ebp+ (PatchLocation - start)] mov ecx, EndOfPatchMeCode - PatchMeCode rep movsb ; death glitch mov ebx, [ebp+ (DeathGlitchPatchAddress - start)] push ebp push 0x40 push 6 push ebx mov eax, [ebp+ (VirtualProtectAddress - start)] call [eax] mov [ebx], DWORD 0x90909090 mov [ebx], WORD 0x9090 popad mov al,1 retn PatchLocation: dd 0x47dda0 GetCurrentThreadIdAddress: dd 0x5e6120 VirtualProtectAddress: dd 0x5e62f4 WinsockSend: dd 0x5e65c4 PacketStart: dw 0x66 PacketSize: dw PacketEnd-PacketStart PacketID: dd 0xffffffb0 PacketAnswer: dd 0x12345678 PacketEnd: DeathGlitchPatchAddress: dd 0x4B2EC9 CodeToExecute: POP EAX PUSH EAX CMP EAX, 0x00645000 JGE SHORT .deathjump push ebp call .nextline6 .nextline6: pop eax sub eax, .nextline6 - start mov ebp, eax mov eax, [EBP + ( GetCurrentThreadIdAddress - start ) ] call [eax] ; load thread id into eax cmp DWORD [EBP + ( PacketAnswer - start )], 0x12345678 ; test if already set jne .compareAnswer ; already set, jump to compare thread ids mov [ebp + ( PacketAnswer - start) ], eax ; wasn't set, so its now set .compareAnswer: cmp [ebp + ( PacketAnswer - start) ], eax ; compare thread ids pop ebp jne SHORT .deathjump ; if the threads aren't equal, bail mov eax, [fs:0] push -1 mov eax, 0x47dda8 ; return jmp JMP eax .deathjump: pushad ;== all pushed call nextline5 nextline5: pop eax sub eax, nextline5 - start mov ebp, eax mov eax, [EBP + ( GetCurrentThreadIdAddress - start ) ] call [eax] mov [ ebp + ( PacketAnswer - start ) ], eax mov eax, [esp + 8] mov [ebp + PacketAnswer], eax mov eax, dword [0x203e06b] push 0 push PacketEnd-PacketStart mov ebx, ebp add ebx, PacketStart push ebx push eax mov eax, [ebp + WinsockSend] call [eax] ; == all reset popad ;; push -1 // never fixed? Copied from another anti hack probably ;; push 0x0056792d ;; mov eax, 0x448e35 ;; jmp eax push -1 mov eax, 0x47dda8 ; return jmp JMP eax RETN PatchMeCode: JMP 0x12345678 NOP NOP EndOfPatchMeCode:


Reply With Quote

