This can be closed.
Yeah thanks Einstein :|Quote:
[Only registered and activated users can see links. Click Here To Register...]
That hooked NtProtectVirtualMemory you're looking at is because of your Avast Anti-Virus software. It has nothing to do with TQ's anti-cheat system.
No, TQ didn't hook ntdll.NtProtectVirtualMemory. Avast Anti-Virus did.Quote:
Well TQ team decided to change that route a bit to their advantage and this is what they came up with.
ntdll.NtProtectVirtualMemory
Before:
After:PHP Code:MOV EAX, 0x4E
CALL DWORD PTR FS:[0C0]
RETN 14
PHP Code:JMP 00030A08
CALL DWORD PTR FS:[0C0]
RETN 14
Quote:
And you are saying that based on what ?
Or do i have to take it on faith and trust you lol.
[Only registered and activated users can see links. Click Here To Register...]Quote:
The (JMP 00030A08) eventually leads to this function.
Code:CPU Disasm Address Hex dump Command Comments 7272A890 /. 55 PUSH EBP 7272A891 |. 8BEC MOV EBP,ESP 7272A893 |. 83E4 F8 AND ESP,FFFFFFF8 ; QWORD (8.-byte) stack alignment 7272A896 |. 81EC 8C000000 SUB ESP,8C 7272A89C |. 53 PUSH EBX 7272A89D |. 56 PUSH ESI 7272A89E |. 57 PUSH EDI 7272A89F |. 68 84000000 PUSH 84 ; /Arg3 = 84 7272A8A4 |. 33F6 XOR ESI,ESI ; | 7272A8A6 |. 8D4424 18 LEA EAX,[LOCAL.33] ; | 7272A8AA |. 56 PUSH ESI ; |Arg2 => 0 7272A8AB |. 50 PUSH EAX ; |Arg1 => OFFSET LOCAL.33 7272A8AC |. E8 3F0F0100 CALL 7273B7F0 ; \[B][SIZE="7"][COLOR="Red"]snxhk[/COLOR][/SIZE][/B].7273B7F0
Search the snxhk.dll thats being called on google, or even better do a search on your computer and you'll find it in avast's directory. It's an avast dll.Quote:
And you are saying that based on what ?
Or do i have to take it on faith and trust you lol.
Fuck... You guys are right... I failed to do a simple search before i jump into the depth of the assembly code.Quote:
Search the snxhk.dll thats being called on google, or even better do a search on your computer and you'll find it in avast's directory. It's an avast dll.
p.s. omgawd I was slow :(