Skip to content

Reverse engineering JABIA camera

Stan Bobovych edited this page Jul 25, 2015 · 1 revision

Moved the camera up and down while scanning for changing values in CheatEngine.

005ACB3E - F3 0F10 4D 64  - movss xmm1,[ebp+64] // always called
005ACB75 - F3 0F11 45 64  - movss [ebp+64],xmm0 // always called
005ACB1C - F3 0F10 4D 64  - movss xmm1,[ebp+64] // when changing 
005ACB39 - F3 0F11 4D 64  - movss [ebp+64],xmm1 // when changing 
int __thiscall call_camera(int this, float a2, int a3)
// ECX has pointer to camera struct

005A7020    55              PUSH EBP
005A7021    8BEC            MOV EBP,ESP
005A7023    83E4 F8         AND ESP,FFFFFFF8
005A7026    83EC 5C         SUB ESP,5C
005A7029    F3:0F1045 08    MOVSS XMM0,DWORD PTR SS:[EBP+8]
005A702E    53              PUSH EBX
005A702F    56              PUSH ESI
005A7030    57              PUSH EDI
005A7031    8BF9            MOV EDI,ECX

....................

005A70D5    8D8F F0000000   LEA ECX,DWORD PTR DS:[EDI+F0] // EDI has pointer to camera struct
005A70DB    53              PUSH EBX
005A70DC    51              PUSH ECX
005A70DD    D91C24          FSTP DWORD PTR SS:[ESP]
005A70E0    51              PUSH ECX
005A70E1    E8 2A530000     CALL GameJABi.005AC410