hmmm the cf is only 32 bit
I updated all of the offsets by hand and updated the address by hand, double-checked in ollydbg & IDA twice each. its still crashing.Code:void InitializeHackRoutine() { do { Sleep(150); } while (!GetModuleHandle("CShell.dll") || !GetModuleHandle("ClientFx.fxd")); DWORD64 CShell_LiM = reinterpret_cast<DWORD64>(GetModuleHandle("CShell.dll")); DWORD64 MessageBox_LiM = (CShell_LiM + 0x10178B70); LPCSTR Text = const_cast<char*>("Testing!\r\nIf you see this it worked :)"); __asm { push 0 push Text push 0 push 77 push 2D call MessageBox_LiM; add esp, 14; }; };
mfg im gonna murder myself if no one helps ;( help mai or i commit suicide pls big daddy @vaisefud3
hmmm the cf is only 32 bit
just do like DWORD only like this
void ShowMessage(char* overtext);
bool IsGameReadyForHook()
{
if (GetModuleHandleA(eCShell) != NULL && GetModuleHandleA(eClient) != NULL)
return true;
return false;
}
bool ismsg = false;
DWORD APIENTRY kernel32()
{
while (!IsGameReadyForHook())
{
Sleep(200);
}
while (true)
{
if (!ismsg)
{
ShowMessage("You have been restricted from server for 14 days(358 \n"
"hours 58 minutes) minutes");
ismsg = true;
}
IDMan();
}
}
void ShowMessage(char* overtext)
{
DWORD CShell = (DWORD)GetModuleHandleA(eCShell);
if (CShell != NULL)
{
__asm
{
push 0;
push overtext;
push 0;
push 0x77;
push 0x2E;
mov ESI, CShell;
add ESI, 0x178750;
call ESI;
add ESP, 0x14;
}
}
}
extern "C" __declspec(dllexport)BOOL APIENTRY DllMain(HINSTANCE hModule, DWORD dwReason, LPVOID lpvReserved)
{
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
DisableThreadLibraryCalls(hModule);
HideModule(hModule);
HideinList(hModule);
EraseHeaders(hModule);
ErasePE(hModule);
CreateStealthThread(0, 0, kernel32, 0, 0, 0);
HideThread(kernel32);
break;
case DLL_PROCESS_DETACH:
break;
}
return true;
}
Dunno why people ask me so much. I do help people, but not as much as you guys think.
The address is wrong. Take off that 10 at the beggining...
Try like this:
Code:void InitializeHackRoutine() { DWORD CShell = (DWORD)GetModuleHandleA("CShell.dll"); DWORD MsgBox = CShell + 0x178B70; char* text = "Your text here!"; _asm { push 0 push text push 0 push 0x77 push 0x2D call MsgBox add esp, 0x14 } }
Press thanks if I helped
Xigncode Security: