Since I just competed the hunting of addresses/offsets for CSROR, let's make a thread of his own. It will be remove from this thread.
Legends: 7D = 125, 0FA = 250, 17+4876E7FF = 99b
Code:;***SR_GameServer Offsets*** ;LEVEL <005094DF> CMP AL,7D <0050BB27> CMP CL,7D <0050BFEC> CMP DWORD PTR SS:[ESP+1C],7D <0050BCF2> CMP DWORD PTR SS:[ESP+28],1DD ;In VSRO this is the 1B4 ;PET LEVEL <004F6BDF> CMP BYTE PTR DS:[EDI+58],7D <004F8DA5> CMP BYTE PTR DS:[EAX+58],7D ;fellows? ;MASTERY LEVEL <005F68FE> CMP ECX,0FA <005F6904> JMP 005F6911 <005F6911> JA 005F68E2 <005F688C> CMP ECX,0FA <005F6892> JMP 005F689F <005F689F> JA 005F68E2 ;STALL/TRADE MAX VALUE (99b) <004872BB> CMP ESI,17 <004872C2> CMP EAX,4876E7FF <004887C7> CMP EDX,17 <004887DA> CMP EAX,4876E7FF <00490413> CMP EAX,17 <0049041E> CMP ECX,4876E7FF ;***SRO_Client Offsets*** ;LEVEL <009825E2> CMP BL,7D <005B88CD> CMP BYTE PTR DS:[EAX+AC],7D <005B9E72> CMP BYTE PTR DS:[EAX+AC],7D <00748A7F> CMP BYTE PTR DS:[EAX+AC],7D ;SKILL <0076CA87> CMP AL,7D <007757AC> CMP EAX,0FA <007757B5> MOV EDI,0FA <0077AA51> CMP EAX,0FA <0077AA5A> MOV ESI,0FA ;PARTY <0080A82E> PUSH 7D <0080A873> PUSH 7D <0080C44E> PUSH 7D <0080C4B3> PUSH 7D <0080C4D0> PUSH 7D <00810EE4> PUSH 7D <00810F47> PUSH 7D <00810F64> PUSH 7D ;ALCHEMY UPGRADE <0066C404> CMP EAX,0E ;max degree to put in upgrade window ;STALL/TRADE MAX VALUE (99b) <005E591C> PUSH 17 <005E591E> PUSH 4876E7FF <005F0A0D> PUSH 17 <005F0A0F> PUSH 4876E7FF <00782559> PUSH 17 <0078255B> PUSH 4876E7FF <00789ED8> PUSH 17 <00789EDA> PUSH 4876E7FF ;ZOOM HACK <008484F4> JMP 008484FE
I suggest you to use multiasm.dll ollydbg plugin with that you can just simply copy/paste/assemble.



Reply With Quote![[CSROR] SR_GameServer and SRO_Client offsets](http://ragezone.com/hyper728.png)


