From 00b271f265450850336c8bcfdacc8671dbc8406a Mon Sep 17 00:00:00 2001 From: boris Date: Tue, 1 Jan 2019 20:53:10 +1300 Subject: yah --- csgo-loader/csgo-client/Security/SyscallManager.cpp | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) (limited to 'csgo-loader/csgo-client/Security/SyscallManager.cpp') diff --git a/csgo-loader/csgo-client/Security/SyscallManager.cpp b/csgo-loader/csgo-client/Security/SyscallManager.cpp index 871b593..9bb1302 100644 --- a/csgo-loader/csgo-client/Security/SyscallManager.cpp +++ b/csgo-loader/csgo-client/Security/SyscallManager.cpp @@ -1,5 +1,4 @@ #include -#include // Global accessor for SyscallManager. Wrapper::SyscallManagerPtr Syscalls = std::make_unique(); @@ -23,7 +22,7 @@ namespace Wrapper GetSystemDirectoryA(SystemPath, MAX_PATH); // Append 'ntdll.dll' to path. - strcat_s(SystemPath, "\\ntdll.dll"); + strcat_s(SystemPath, STR("\\ntdll.dll")); // Open handle to 'ntdll.dll'. std::ifstream FileHandle(SystemPath, std::ios::in | std::ios::binary); @@ -139,7 +138,7 @@ namespace Wrapper // We've found a syscall. uint8_t *Opcodes = (uint8_t *)(Buffer + FunctionRawOffset); - if(!memcmp(Opcodes, "\x4C\x8B\xD1\xB8", 4)) + if(!memcmp(Opcodes, STR("\x4C\x8B\xD1\xB8"), 4)) { uint32_t SyscallIndex = *(uint32_t *)(Buffer + FunctionRawOffset + 4); -- cgit v1.2.3