Reverse engineering JABIA camera
Stan Bobovych edited this page Jul 25, 2015
·
1 revision
Moved the camera up and down while scanning for changing values in CheatEngine.
005ACB3E - F3 0F10 4D 64 - movss xmm1,[ebp+64] // always called
005ACB75 - F3 0F11 45 64 - movss [ebp+64],xmm0 // always called
005ACB1C - F3 0F10 4D 64 - movss xmm1,[ebp+64] // when changing
005ACB39 - F3 0F11 4D 64 - movss [ebp+64],xmm1 // when changing
int __thiscall call_camera(int this, float a2, int a3)
// ECX has pointer to camera struct
005A7020 55 PUSH EBP
005A7021 8BEC MOV EBP,ESP
005A7023 83E4 F8 AND ESP,FFFFFFF8
005A7026 83EC 5C SUB ESP,5C
005A7029 F3:0F1045 08 MOVSS XMM0,DWORD PTR SS:[EBP+8]
005A702E 53 PUSH EBX
005A702F 56 PUSH ESI
005A7030 57 PUSH EDI
005A7031 8BF9 MOV EDI,ECX
....................
005A70D5 8D8F F0000000 LEA ECX,DWORD PTR DS:[EDI+F0] // EDI has pointer to camera struct
005A70DB 53 PUSH EBX
005A70DC 51 PUSH ECX
005A70DD D91C24 FSTP DWORD PTR SS:[ESP]
005A70E0 51 PUSH ECX
005A70E1 E8 2A530000 CALL GameJABi.005AC410