Can anyone post please the oread spawn hack for CE???
[ENABLE] alloc(newmem,2048) label(returnhere) label(originalcode) label(exit) 0045C66D: jmp newmem nop returnhere: newmem: mov [eax+08],00000020 mov [eax+04],00000020 mov [eax+18],000001F4 mov [eax+1C],000001F4 mov [eax+2C],00000064 mov [eax+30],00000020 mov [eax+34],00000000 mov [eax+54],00000000 mov [eax+58],00000000 mov [eax+5C],00000000 originalcode: mov edx,[eax+1c] mov [ecx+20],edx mov edx,99 mov [eax+8c],edx mov edx,01 mov [eax+90],edx mov edx,99 mov [eax+3C],edx exit: jmp returnhere [DISABLE] dealloc(newmem) 0045C66D: mov edx,[eax+1c] mov [ecx+20],edx alloc(newmem,256) label(orig_00883AC2) newmem: push 60 push 00a9f448 call 00889d18 mov edi,00000094 mov eax,edi call 00886430 mov [ebp-18],esp mov esi,esp mov [esi],edi push esi call dword ptr [00a2519c] mov ecx,[esi+10] mov [00c154a8],ecx mov eax,[esi+04] mov [00c154b4],eax mov edx,[esi+08] mov [00c154b8],edx mov esi,[esi+0c] and esi,00007fff mov [00c154ac],esi cmp ecx,02 or esi,00008000 mov [00c154ac],esi orig_00883AC2: shl eax,08 add eax,edx mov [00c154b0],eax xor esi,esi push esi mov edi,[00a251b0] call edi cmp word ptr [eax],5a4d jne 00883afd mov ecx,[eax+3c] add ecx,eax