That is right. I think that this dll is very important, they should control the login prozess and all TCP and UDP packets are send about this. I want to hook the NMCO_CallNMFunc to get the values of the Parameter and for this i need the Parameters. Than i would isolate the dll and debug and analyt this dll.
Originally Posted by freedompeace
Edit: i am not the ASM Pro, but i have found (in a old asm code from engine.exe) a
after the call of the NMCO_CallNMFunc, so we search for 10 Bytes, if nexon doesnt have change the parameter.
LOL hex-rays have solved my problem
maybe one want to know it from the nmcogame.dll
signed int __cdecl NMCO_CallNMFunc(int a1,int a2,void **a3,int a4)
int __cdecl NMCO_CallNMFunc(int a1,int a2,int a3,int a4)