Difference between revisions of "RO:UnloadCRO"
Jump to navigation
Jump to search
(Created page with "=Request= {| class="wikitable" border="1" |- ! Index Word ! Description |- | 0 | Header code [0x000500C2] |- | 1 | Base address of the mapped CRO, in the process memor...") |
m (Wwylele moved page RO:LoadCROSymbols to RO:UnloadCRO: Wrong name) |
||
(4 intermediate revisions by 2 users not shown) | |||
Line 38: | Line 38: | ||
=Description= | =Description= | ||
− | This | + | This function patches the CRO binary in memory. It sets up imported symbols (functions+data) according to Import Table(s). |
Latest revision as of 18:55, 15 July 2016
Request[edit]
Index Word | Description |
---|---|
0 | Header code [0x000500C2] |
1 | Base address of the mapped CRO, in the process memory, originally passed to RO:LoadExeCRO. |
2 | Unknown, usually zero? |
3 | Original address where the CRO was first located in process memory(such as the process heap), also passed to RO:LoadExeCRO. |
4 | Must be zero |
5 | KProcess handle |
Response[edit]
Index Word | Description |
---|---|
0 | Header code |
1 | Result code |
Description[edit]
This function patches the CRO binary in memory. It sets up imported symbols (functions+data) according to Import Table(s).