Reset
url: https://msdn.microsof*****m/en-us/libr...=vs.85%29.aspx
Code:
___:006BC363 mov eax, [esi+2B930h]
___:006BC369 mov ecx, [eax]
___:006BC36B lea edx, [esp+10h]
___:006BC36F push edx
___:006BC370 push 0
___:006BC372 push 0
___:006BC374 push 0
___:006BC376 push eax
___:006BC377 mov eax, [ecx+48h]
___:006BC37A call eax
Present
irm= https://msdn.microsof*****m/en-us/libr...(v=vs.85).aspx
Code:
___:006BCF0F
___:006BCF0F loc_6BCF0F: ; CODE XREF: sub_6BCAD0+392j
___:006BCF0F ; sub_6BCAD0+3A7j ...
___:006BCF0F mov edi, [edi+2B930h] ; DevicePointer + DeviceOffset
___:006BCF15 mov eax, [edi] ; pDevice?
___:006BCF17 mov ecx, [eax+44h] ; vTable
___:006BCF1A push 0 ; pSourceRect
___:006BCF1C push 0 ; pDestRect
___:006BCF1E push 0 ; hDestWindowOverride
___:006BCF20 push 0 ; pDirtyRegion
___:006BCF22 push edi ; push Ptr+Ofs?
___:006BCF23 call ecx ; Call Present
BeginScene
url: https://msdn.microsof*****m/en-us/libr...(v=vs.85).aspx
Code:
___:006B8850 sub_6B8850 proc near ; CODE XREF: sub_436738+35p
___:006B8850 mov eax, [eax+2B930h] ; DevicePointer + Offset
___:006B8856 mov ecx, [eax] ; pDevice?
___:006B8858 mov edx, [ecx+0A4h] ; vTable
___:006B885E push eax ; Push Ptr+Ofs?
___:006B885F call edx ; Call BeginScene
___:006B8861 retn ; Return
___:006B8861 sub_6B8850 endp
EndScene
url: https://msdn.microsof*****m/en-us/libr...(v=vs.85).aspx
Code:
___:006B8A90 EndScene proc near ; CODE XREF: sub_436738+3E4p
___:006B8A90 mov eax, [eax+2B930h] ; DevicePointer + DeviceOffset
___:006B8A96 mov ecx, [eax] ; pDevice?
___:006B8A98 mov edx, [ecx+0A8h] ; vTable
___:006B8A9E push eax ; Push Ptr+Ofs
___:006B8A9F call edx ; Call EndScene
___:006B8AA1 retn ; Return
___:006B8AA1 EndScene endp
I know there are going to come alot of questions on what to do with this?
My reply: Study assembly and c++.
Do not start private messaging me asking for a fix to get stuff undetected, working.
Put in some work.
Those functions can be used to hook using mid functions, see my tutorial!