First of all, let me tell you that I don't have that much experience with Reverse Engineering, what I suppose is your definition of "Coding". But however, I know assembly language a bit and I am able to disassemble programs, even though that is not what a programmer usually does.
@{FS}Nemesis: Unfortunately not yet, but that's why I'm applying.
@{FS}Krzywy: I didn't know which "offsets" you wanted to have at first, but I guess you mean critical ones, like the login ones.
Because I don't know which dynamic link library contains which functions yet, I concentrated on the ones which call the error "User's ticket has expired", which in my personal experience is appearing when two pcs are using one Steam account.
The function is called in "Steam.dll" at offsets:
20113333
201A50BF
201A51A3
201A55F7
201A5801
201A5A0F
201A5C1B
201A5E82
201A60EB
201A6311
201A6529
201A68B0
201ADBB3
201AE5E0
201AF5C7
201AFDDA
201B9BE1
201BA919
I changed every single call value from:
E882950200
to:
90
which would mean this message is stop being called.
However, I didn't manage to run my modified Steam.dll with Steam without being updated at startup yet.
Well, modifying hexdigits isn't very hard, but knowing the program structure. I guess you know it better than me, that's why I want to join.