Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?xml version="1.0" encoding="utf-8"?>
- <CheatTable CheatEngineTableVersion="28">
- <CheatEntries>
- <CheatEntry>
- <ID>12997</ID>
- <Description>"enable"</Description>
- <Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(damageHandle1AOB,re2.exe,8B 43 7C 89 46 7C 48 8B 47 50)
- registersymbol(damageHandle1AOB)
- aobscanmodule(totalGameTimeWriteAOB,re2.exe,E8 ** ** ** ** EB 08 48 ** ** ** 48 ** ** ** 48 ** ** ** 4C ** ** ** 0F 85 ** ** ** ** 44 ** ** ** 0F 85)
- registersymbol(totalGameTimeWriteAOB)
- ///*******************************************///
- //current ammo clip read on fine aim / on reload / after rload until next exit fine aim
- aobscanmodule(ammoClipReadOnAimReloadAOB,re2.exe,48 ** ** A0 00 00 00 48 ** ** 74 ** 48 ** ** ** 48 ** ** 74 ** 48 ** ** ** 48 ** ** 74 ** 8B ** 20 48 ** ** ** ** 48 ** ** ** 5F C3)
- registersymbol(ammoClipReadOnAimReloadAOB)
- label(pAmmo)
- registersymbol(pAmmo)
- label(dAmmoClipMax)
- registersymbol(dAmmoClipMax)
- alloc(newmem,2048,ammoClipReadOnAimReloadAOB+1e) //"re2.exe"+E993E19)
- label(returnhere)
- label(originalcode_ammoClipReadOnAimReloadAOB)
- registersymbol(originalcode_ammoClipReadOnAimReloadAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rcx
- mov rcx,pAmmo
- mov [rcx],rax
- mov byte ptr [rcx+8],1
- cmp byte ptr [rcx+c],0
- je end
- //mov byte ptr [rcx+c],0
- mov rbx,dAmmoClipMax
- mov ebx,[rbx]
- test ebx,ebx
- jg @f
- mov ebx,2
- @@:
- cmp [rax+20],ebx
- jge end
- cmp dword ptr [rax+14],9 //SLS 60
- jne @f
- //mov ebx,5
- //mov edi,[rax+18]
- //shr edi,1
- //test dil,dil //Quick Loader
- mov edi,[rax+18]
- and edi,2
- cmp edi,2 //Quick Loader
- jne doinc
- @@:
- cmp dword ptr [rax+14],4 //Quickdraw Army
- je doinc
- @@:
- cmp dword ptr [rax+14],b //W-870
- jne @f
- mov edi,[rax+18]
- and edi,1
- cmp edi,1
- jne doinc
- inc [rax+20]
- jmp doinc
- @@:
- jmp customammoclipassign
- doinc:
- cmp byte ptr [rcx+c],1
- jne end
- inc [rax+20]
- cmp [rax+20],ebx
- jle end
- customammoclipassign:
- mov [rax+20],ebx
- end:
- mov byte ptr [rcx+c],0
- pop rcx
- originalcode_ammoClipReadOnAimReloadAOB:
- readmem(ammoClipReadOnAimReloadAOB+1e,8)
- //mov eax,[rax+20]
- //mov rbx,[rsp+30]
- exit:
- jmp returnhere
- ///
- pAmmo:
- dq 0
- dq 0
- dAmmoClipMax:
- dq 1
- ///
- ammoClipReadOnAimReloadAOB+1e: //"re2.exe"+E993E19:
- jmp newmem
- nop
- nop
- nop
- returnhere:
- ///*******************************************///
- //current ammo clip chk max
- aobscanmodule(ammoClipMaxCChkAOB,re2.exe,74 0C 48 ** ** 10 48 ** ** 74 03 8B ** ** 39 DA 48)
- registersymbol(ammoClipMaxCChkAOB)
- alloc(newmem2,2048,ammoClipMaxCChkAOB+e) //"re2.exe"+B8BE4D2)
- label(returnhere2)
- label(originalcode2_ammoClipMaxCChkAOB)
- registersymbol(originalcode2_ammoClipMaxCChkAOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rsi,dAmmoClipMax
- mov [rsi],edx
- originalcode2_ammoClipMaxCChkAOB:
- readmem(ammoClipMaxCChkAOB+e,7)
- //cmp edx,ebx
- //mov rbx,[rsp+30]
- exit2:
- jmp returnhere2
- ///
- ammoClipMaxCChkAOB+e: //"re2.exe"+B8BE4D2:
- jmp newmem2
- nop
- nop
- returnhere2:
- ///*******************************************///
- //player health read 4 bytes, start: 1200
- aobscanmodule(playerHealthCReadAOB,re2.exe,8B ** ** 48 ** ** ** ** 48 ** ** ** 5F C3 48 ** ** ** ** B8 01)
- registersymbol(playerHealthCReadAOB)
- label(pPlayer)
- registersymbol(pPlayer)
- label(pPlayerBase)
- registersymbol(pPlayerBase)
- alloc(newmem6,2048,playerHealthCReadAOB) //"re2.exe"+8F11DE3)
- label(returnhere6)
- label(originalcode6_playerHealthCReadAOB)
- registersymbol(originalcode6_playerHealthCReadAOB)
- label(exit6)
- newmem6: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rbx,pPlayer
- mov [rbx],rax
- mov [rbx+8],rdi
- originalcode6_playerHealthCReadAOB:
- readmem(playerHealthCReadAOB,8)
- //mov eax,[rax+58]
- //mov rbx,[rsp+30]
- exit6:
- jmp returnhere6
- ///
- pPlayer:
- dq 0
- pPlayerBase:
- dq 0
- ///
- playerHealthCReadAOB: //"re2.exe"+8F11DE3:
- jmp newmem6
- nop
- nop
- nop
- returnhere6:
- ///*******************************************///
- aobscanmodule(someItemQWrite3AOB,re2.exe,41 ** ** ** 48 ** ** ** ** 48 ** ** ** ** 48 ** ** ** 5F E9 ** ** ** ** 89 ** ** 48 ** 74 ** ** 48 ** ** ** ** 48 ** ** ** 5F C3)
- registersymbol(someItemQWrite3AOB)
- alloc(newmem3,2048,someItemQWrite3AOB+18) //"re2.exe"+B8BC63A)
- label(returnhere3)
- label(originalcode3_someItemQWrite3AOB)
- registersymbol(originalcode3_someItemQWrite3AOB)
- label(exit3)
- newmem3: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rsi,pAmmo
- cmp byte ptr [rsi+c],1
- jne @f
- inc byte ptr [rsi+c]
- originalcode3_someItemQWrite3AOB:
- readmem(someItemQWrite3AOB+18,8)
- //mov [rax+20],ebx
- //mov rsi,[rsp+30]
- exit3:
- jmp returnhere3
- ///
- someItemQWrite3AOB+18: //"re2.exe"+B8BC63A:
- jmp newmem3
- nop
- nop
- nop
- returnhere3:
- ///*******************************************///
- aobscanmodule(readiedWeaponChkAOB,re2.exe,44 ** ** ** ** ** ** 75 ** 44 ** ** ** ** ** ** 75 ** 40)
- registersymbol(readiedWeaponChkAOB)
- label(pReadiedWeapon)
- registersymbol(pReadiedWeapon)
- label(dCusFCamZOffset)
- registersymbol(dCusFCamZOffset)
- alloc(newmem7,2048,readiedWeaponChkAOB+9) //"re2.exe"+B45CCE1)
- label(returnhere7)
- label(originalcode7_readiedWeaponChkAOB)
- registersymbol(originalcode7_readiedWeaponChkAOB)
- label(exit7)
- newmem7: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rdx,pReadiedWeapon
- db 48 8D 8F
- readmem(readiedWeaponChkAOB+c,4)
- //lea rcx,[rdi+198]
- mov [rdx],rcx
- originalcode7_readiedWeaponChkAOB:
- readmem(readiedWeaponChkAOB+9,7)
- //cmp [rdi+00000198],r12d
- exit7:
- jmp returnhere7
- ///
- pReadiedWeapon:
- dq 0
- dCusFCamZOffset:
- dd (float)-0.18
- dd (float)-0.18
- dd (float)-0.18
- dd (float)0.012
- dd (float)15
- dd (float)-1
- dd 0
- ///
- readiedWeaponChkAOB+9: //"re2.exe"+B45CCE1:
- jmp newmem7
- nop
- nop
- returnhere7:
- ///*******************************************///
- label(pSomeGameStatus)
- registersymbol(pSomeGameStatus)
- alloc(newmem8,2048,totalGameTimeWriteAOB+1d) //"re2.exe"+AD9D90B)
- label(returnhere8)
- label(originalcode8_totalGameTimeWriteAOB)
- registersymbol(originalcode8_totalGameTimeWriteAOB)
- label(exit8)
- newmem8: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rax
- mov rax,pSomeGameStatus
- mov [rax],rdi
- pop rax
- readmem(totalGameTimeWriteAOB+1d,4)
- reassemble(totalGameTimeWriteAOB+21)
- jmp exit8
- originalcode8_totalGameTimeWriteAOB:
- readmem(totalGameTimeWriteAOB+1d,10)
- //cmp [rdi+53],r14l
- //jne re2.exe+AD9D9AE
- exit8:
- jmp returnhere8
- ///
- pSomeGameStatus:
- ///
- totalGameTimeWriteAOB+1d: //"re2.exe"+AD9D90B:
- jmp newmem8
- nop
- nop
- nop
- nop
- nop
- returnhere8:
- ///*******************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- ammoClipReadOnAimReloadAOB+1e: //"re2.exe"+E993E19:
- readmem(originalcode_ammoClipReadOnAimReloadAOB,8)
- //db 8B 40 20 48 8B 5C 24 30
- //Alt: mov eax,[rax+20]
- //Alt: mov rbx,[rsp+30]
- unregistersymbol(originalcode_ammoClipReadOnAimReloadAOB)
- unregistersymbol(pAmmo)
- unregistersymbol(dAmmoClipMax)
- ///*******************************************///
- dealloc(newmem2)
- ammoClipMaxCChkAOB+e: //"re2.exe"+B8BE4D2:
- readmem(originalcode2_ammoClipMaxCChkAOB,7)
- //db 39 DA 48 8B 5C 24 30
- //Alt: cmp edx,ebx
- //Alt: mov rbx,[rsp+30]
- unregistersymbol(originalcode2_ammoClipMaxCChkAOB)
- ///*******************************************///
- dealloc(newmem6)
- playerHealthCReadAOB: //"re2.exe"+8F11DE3:
- readmem(originalcode6_playerHealthCReadAOB,8)
- //db 8B 40 58 48 8B 5C 24 30
- //Alt: mov eax,[rax+58]
- //Alt: mov rbx,[rsp+30]
- unregistersymbol(originalcode6_playerHealthCReadAOB)
- unregistersymbol(pPlayer)
- unregistersymbol(pPlayerBase)
- ///*******************************************///
- dealloc(newmem3)
- someItemQWrite3AOB+18: //"re2.exe"+B8BC63A:
- readmem(originalcode3_someItemQWrite3AOB,8)
- //db 89 58 20 48 8B 74 24 30
- //Alt: mov [rax+20],ebx
- //Alt: mov rsi,[rsp+30]
- unregistersymbol(originalcode3_someItemQWrite3AOB)
- ///*******************************************///
- dealloc(newmem7)
- readiedWeaponChkAOB+9: //"re2.exe"+B45CCE1:
- readmem(originalcode7_readiedWeaponChkAOB,7)
- //db 44 39 A7 98 01 00 00
- //Alt: cmp [rdi+00000198],r12d
- unregistersymbol(originalcode7_readiedWeaponChkAOB)
- unregistersymbol(pReadiedWeapon)
- unregistersymbol(dCusFCamZOffset)
- ///*******************************************///
- dealloc(newmem8)
- totalGameTimeWriteAOB+1d: //"re2.exe"+AD9D90B:
- readmem(originalcode8_totalGameTimeWriteAOB,10)
- db 44 38 77 53 0F 85 99 00 00 00
- //Alt: cmp [rdi+53],r14l
- //Alt: jne re2.exe+AD9D9AE
- unregistersymbol(originalcode8_totalGameTimeWriteAOB)
- unregistersymbol(pSomeGameStatus)
- ///*******************************************///
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>12998</ID>
- <Description>"undead .4"</Description>
- <Options moHideChildren="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- define(dminhealthdefault,#360)
- label(pPlayerJustHit)
- registersymbol(pPlayerJustHit)
- label(pPAttackedInfo)
- registersymbol(pPAttackedInfo)
- label(pPAttackedInfo2)
- registersymbol(pPAttackedInfo2)
- label(dMinHealth)
- registersymbol(dMinHealth)
- alloc(newmem8,2048,damageHandle1AOB) //"re2.exe"+B9766D3)
- label(returnhere8)
- label(originalcode8_damageHandle1AOB)
- registersymbol(originalcode8_damageHandle1AOB)
- label(exit8)
- newmem8: //this is allocated memory, you have read,write,execute access
- //place your code here
- push r14
- push rdx
- mov rax,pPlayer
- mov rdx,[rbp+b8]
- cmp [rax],rdx
- jne notplayer8
- mov rax,pPlayerJustHit
- mov [rax],rbp
- mov rax,pPAttackedInfo
- mov [rax],rbx
- mov rax,pPAttackedInfo2
- mov [rax],rcx
- mov r14,dMinHealth
- mov eax,[rdx+58]
- sub eax,[rbx+7c]
- cmp eax,[r14]
- jg @f
- xor eax,eax
- mov [rbx+7c],eax
- mov eax,[r14]
- mov [rdx+58],eax
- mov byte ptr [rdx+5c],1 //god flag
- jmp end8
- @@:
- //mov byte ptr [rdx+5c],0
- jmp end8
- notplayer8:
- end8:
- pop rdx
- pop r14
- originalcode8_damageHandle1AOB:
- readmem(damageHandle1AOB,6)
- //mov eax,[rbx+7C]
- //mov [rsi+7C],eax
- exit8:
- jmp returnhere8
- ///
- pPlayerJustHit:
- dq 0
- pPAttackedInfo:
- dq 0
- pPAttackedInfo2:
- dq 0
- dMinHealth:
- dd dminhealthdefault
- ///
- damageHandle1AOB: //"re2.exe"+B9766D3:
- jmp newmem8
- nop
- returnhere8:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem8)
- damageHandle1AOB: //"re2.exe"+B9766D3:
- readmem(originalcode8_damageHandle1AOB,6)
- //db 8B 43 7C 89 46 7C
- //Alt: mov eax,[rbx+7C]
- //Alt: mov [rsi+7C],eax
- unregistersymbol(originalcode8_damageHandle1AOB)
- unregistersymbol(pPlayerJustHit)
- unregistersymbol(pPAttackedInfo)
- unregistersymbol(pPAttackedInfo2)
- unregistersymbol(dMinHealth)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13060</ID>
- <Description>"min health"</Description>
- <LastState Value="650" Activated="1" RealAddress="156A300B7"/>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>dMinHealth</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13061</ID>
- <Description>"don't set lower than 360"</Description>
- <LastState Value="" RealAddress="00000000"/>
- <Color>808080</Color>
- <GroupHeader>1</GroupHeader>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13062</ID>
- <Description>"damage mod"</Description>
- <Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- define(ddamagemultiplierdefault,(float)1)
- label(pEnemyJustHit)
- registersymbol(pEnemyJustHit)
- label(pAttackInfo)
- registersymbol(pAttackInfo)
- label(pAttackInfo2)
- registersymbol(pAttackInfo2)
- label(bIsEnemy)
- registersymbol(bIsEnemy)
- label(dDamageMultiplier)
- registersymbol(dDamageMultiplier)
- label(bWeakLimbsKey)
- registersymbol(bWeakLimbsKey)
- label(bWeakLimbs)
- registersymbol(bWeakLimbs)
- alloc(newmem2,2048,damageHandle1AOB+6) //"re2.exe"+B9766D9)
- label(returnhere2)
- label(originalcode2_damageHandle1AOB)
- registersymbol(originalcode2_damageHandle1AOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rdx
- mov rax,pPlayer
- mov rdx,[rbp+b8]
- cmp [rax],rdx
- pop rdx
- je @f
- mov rax,pEnemyJustHit
- mov [rax],rbp
- mov rax,pAttackInfo
- mov [rax],rbx
- mov rax,pAttackInfo2
- mov [rax],rcx
- mov rax,bIsEnemy
- mov byte ptr [rax],1
- mov rax,dDamageMultiplier
- fild dword ptr [rbx+7c]
- fmul dword ptr [rax]
- fist dword ptr [rsi+7c]
- fistp dword ptr [rbx+7c]
- //fld1
- //fst dword ptr [rbx+80]
- //fst dword ptr [rbx+8c]
- //fstp dword ptr [rbx+90]
- originalcode2_damageHandle1AOB:
- readmem(damageHandle1AOB+6,9)
- //mov rax,[rdi+50]
- //cmp qword ptr [rax+18],00
- exit2:
- jmp returnhere2
- ///
- pEnemyJustHit:
- dq 0
- pAttackInfo:
- dq 0
- pAttackInfo2:
- dq 0
- bIsEnemy:
- dd 0
- dDamageMultiplier:
- dd ddamagemultiplierdefault
- bWeakLimbsKey:
- dd 14
- bWeakLimbs:
- dd 0
- dd 0
- ///
- damageHandle1AOB+6: //"re2.exe"+B9766D9:
- jmp newmem2
- nop
- nop
- nop
- nop
- returnhere2:
- ///*******************************************///
- aobscanmodule(cJmpIfNormalAttackAOB,re2.exe,48 ** ** ** 00 0F 85 ** ** ** ** 48 ** ** 74 ** 83 ** ** 00 7E)
- registersymbol(cJmpIfNormalAttackAOB)
- alloc(newmem6,2048,cJmpIfNormalAttackAOB+10) //"re2.exe"+6940E6)
- label(returnhere6)
- label(originalcode6_cJmpIfNormalAttackAOB)
- registersymbol(originalcode6_cJmpIfNormalAttackAOB)
- label(exit6)
- newmem6: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rdi,bIsEnemy
- cmp byte ptr [rdi],1
- jne end6
- inc byte ptr [rdi]
- mov rdi,bWeakLimbs
- cmp byte ptr [rdi],1
- je @f
- cmp byte ptr [rdi+4],1
- jne end6
- @@:
- readmem(cJmpIfNormalAttackAOB+10,4)
- //cmp dword ptr [rax+1C],00
- jg @f
- db C7 40
- readmem(cJmpIfNormalAttackAOB+12,1)
- db 01 00 00 00
- //mov dword ptr [rax+1c],1
- end6:
- readmem(cJmpIfNormalAttackAOB+10,4)
- reassemble(cJmpIfNormalAttackAOB+14)
- jmp exit6
- originalcode6_cJmpIfNormalAttackAOB:
- readmem(cJmpIfNormalAttackAOB+10,6)
- //cmp dword ptr [rax+1C],00
- //jle re2.exe+694138
- exit6:
- jmp returnhere6
- ///
- cJmpIfNormalAttackAOB+10: //"re2.exe"+6940E6:
- jmp newmem6
- nop
- returnhere6:
- ///*******************************************///
- aobscanmodule(dsmageSpecialEffectReadAOB,re2.exe,8B ** ** ** ** 00 02 00 00 0F 8E ** ** ** ** ** 00 00 02 00)
- registersymbol(dsmageSpecialEffectReadAOB)
- alloc(newmem12,2048,dsmageSpecialEffectReadAOB) //"re2.exe"+A3DDB96)
- label(returnhere12)
- label(originalcode12_dsmageSpecialEffectReadAOB)
- registersymbol(originalcode12_dsmageSpecialEffectReadAOB)
- label(exit12)
- newmem12: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rdi
- mov rdi,bIsEnemy
- cmp byte ptr [rdi],2
- jne end12
- xor eax,eax
- mov [rdi],eax
- mov rdi,bWeakLimbs
- cmp byte ptr [rdi],1
- je @f
- cmp byte ptr [rdi+4],1
- jne end12
- @@:
- mov eax,40
- db 89
- readmem(dsmageSpecialEffectReadAOB+1,3)
- //mov [rbx+rsi*4+20],eax
- end12:
- pop rdi
- originalcode12_dsmageSpecialEffectReadAOB:
- readmem(dsmageSpecialEffectReadAOB,9)
- //mov eax,[rbx+rsi*4+20]
- //cmp eax,00000200
- exit12:
- jmp returnhere12
- ///
- dsmageSpecialEffectReadAOB: //"re2.exe"+A3DDB96:
- jmp newmem12
- nop
- nop
- nop
- nop
- returnhere12:
- ///*******************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem2)
- damageHandle1AOB+6: //"re2.exe"+B9766D9:
- readmem(originalcode2_damageHandle1AOB,9)
- //db 48 8B 47 50 48 83 78 18 00
- //Alt: mov rax,[rdi+50]
- //Alt: cmp qword ptr [rax+18],00
- unregistersymbol(originalcode2_damageHandle1AOB)
- unregistersymbol(pEnemyJustHit)
- unregistersymbol(pAttackInfo)
- unregistersymbol(pAttackInfo2)
- unregistersymbol(bIsEnemy)
- unregistersymbol(dDamageMultiplier)
- unregistersymbol(bWeakLimbsKey)
- unregistersymbol(bWeakLimbs)
- ///*******************************************///
- dealloc(newmem6)
- cJmpIfNormalAttackAOB+10: //"re2.exe"+6940E6:
- readmem(originalcode6_cJmpIfNormalAttackAOB,6)
- //db 83 78 1C 00 7E 4C
- //Alt: cmp dword ptr [rax+1C],00
- //Alt: jle re2.exe+694138
- unregistersymbol(originalcode6_cJmpIfNormalAttackAOB)
- ///*******************************************///
- dealloc(newmem12)
- dsmageSpecialEffectReadAOB: //"re2.exe"+A3DDB96:
- readmem(originalcode12_dsmageSpecialEffectReadAOB,9)
- //db 8B 44 B3 20 3D 00 02 00 00
- //Alt: mov eax,[rbx+rsi*4+20]
- //Alt: cmp eax,00000200
- unregistersymbol(originalcode12_dsmageSpecialEffectReadAOB)
- ///*******************************************///
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13693</ID>
- <Description>"damage multiplier"</Description>
- <Options moHideChildren="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- dDamageMultiplier:
- dd (float)2
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dDamageMultiplier:
- dd (float)1
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13063</ID>
- <Description>"x?"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="0.5" Activated="1" RealAddress="13FF00098"/>
- <Color>008000</Color>
- <VariableType>Float</VariableType>
- <Address>dDamageMultiplier</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13580</ID>
- <Description>"enemy base"</Description>
- <LastState Value="" RealAddress="100F01A0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pEnemyJustHit</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13614</ID>
- <Description>"+120"</Description>
- <LastState Value="" RealAddress="121558F0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+120</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13613</ID>
- <Description>"+28"</Description>
- <LastState Value="" RealAddress="100F4B60"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+28</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13615</ID>
- <Description>"+60"</Description>
- <LastState Value="" RealAddress="121E0FC0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+60</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13617</ID>
- <Description>"+10"</Description>
- <LastState Value="00000002" RealAddress="121E0FD0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+10</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13616</ID>
- <Description>"+68"</Description>
- <LastState Value="" RealAddress="121E4CC0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+68</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13618</ID>
- <Description>"+10"</Description>
- <LastState Value="00000001" RealAddress="121E4CD0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+10</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13621</ID>
- <Description>"+98 enemy health"</Description>
- <LastState Value="" RealAddress="100F49F0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+98</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13581</ID>
- <Description>"enemy health"</Description>
- <LastState Value="" RealAddress="100F49F0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+b8</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13582</ID>
- <Description>"h"</Description>
- <LastState Value="890" RealAddress="100F4A48"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+58</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13583</ID>
- <Description>"h max"</Description>
- <LastState Value="890" RealAddress="100F4A44"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>-4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13584</ID>
- <Description>"god (auto reset)"</Description>
- <LastState Value="0" RealAddress="100F4A4C"/>
- <Color>0000FF</Color>
- <VariableType>Byte</VariableType>
- <Address>+4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13585</ID>
- <Description>"god"</Description>
- <LastState Value="0" RealAddress="100F4A4D"/>
- <Color>0000FF</Color>
- <VariableType>Byte</VariableType>
- <Address>+5</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13586</ID>
- <Description>"+a0"</Description>
- <LastState Value="9.720168429E-29" RealAddress="100F4A90"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+a0</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13587</ID>
- <Description>"ai 1"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="12033B90"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pAttackInfo</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13592</ID>
- <Description>"damage"</Description>
- <LastState Value="0" RealAddress="12033C0C"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+7c</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13593</ID>
- <Description>"+70"</Description>
- <LastState Value="117B7D50" RealAddress="12033C00"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+70</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13612</ID>
- <Description>"+74"</Description>
- <LastState Value="00000000" RealAddress="12033C04"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+74</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13611</ID>
- <Description>"+78"</Description>
- <LastState Value="FFFFFFFF" RealAddress="12033C08"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+78</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13610</ID>
- <Description>"+7c damage"</Description>
- <LastState Value="0" RealAddress="12033C0C"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+7c</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13609</ID>
- <Description>"+80"</Description>
- <LastState Value="1" RealAddress="12033C10"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+80</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13598</ID>
- <Description>"+84"</Description>
- <LastState Value="FFFFFFFF" RealAddress="12033C14"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+84</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13597</ID>
- <Description>"+88"</Description>
- <LastState Value="0" RealAddress="12033C18"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+88</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13599</ID>
- <Description>"+8c"</Description>
- <LastState Value="1" RealAddress="12033C1C"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+8c</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13600</ID>
- <Description>"+90"</Description>
- <LastState Value="1" RealAddress="12033C20"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+90</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13602</ID>
- <Description>"+94"</Description>
- <LastState Value="0" RealAddress="12033C24"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+94</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13603</ID>
- <Description>"+98"</Description>
- <LastState Value="0" RealAddress="12033C28"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+98</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13604</ID>
- <Description>"+9c"</Description>
- <LastState Value="0" RealAddress="12033C2C"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+9c</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13594</ID>
- <Description>"+a0 impact angle"</Description>
- <LastState Value="0.8535404205" RealAddress="12033C30"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+a0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13595</ID>
- <Description>"+a4 impact angle"</Description>
- <LastState Value="-0.3193790913" RealAddress="12033C34"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+a4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13596</ID>
- <Description>"+a8 impact angle"</Description>
- <LastState Value="0.411662221" RealAddress="12033C38"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+a8</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13605</ID>
- <Description>"+ac"</Description>
- <LastState Value="0" RealAddress="12033C3C"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+ac</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13601</ID>
- <Description>"+b0"</Description>
- <LastState Value="0" RealAddress="12033C40"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+b0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13606</ID>
- <Description>"+b4"</Description>
- <LastState Value="0" RealAddress="12033C44"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+b4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13607</ID>
- <Description>"+b8"</Description>
- <LastState Value="355905728" RealAddress="12033C48"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+b8</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13608</ID>
- <Description>"+bc"</Description>
- <LastState Value="0" RealAddress="12033C4C"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+bc</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13619</ID>
- <Description>"ai 2"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="1E349DF0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pAttackInfo2</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13622</ID>
- <Description>"+60"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="12825EF0"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>+60</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13623</ID>
- <Description>"+40"</Description>
- <LastState Value="170C6670" RealAddress="12825F30"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+40</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13624</ID>
- <Description>"+3a0"</Description>
- <LastState Value="00000000" RealAddress="128262D0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+3a0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13625</ID>
- <Description>"+690"</Description>
- <LastState Value="00000000" RealAddress="128265C0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+690</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13627</ID>
- <Description>"+6f0"</Description>
- <LastState Value="00000000" RealAddress="12826620"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+6f0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13626</ID>
- <Description>"+720"</Description>
- <LastState Value="00000000" RealAddress="12826650"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+720</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13628</ID>
- <Description>"+790"</Description>
- <LastState Value="00000000" RealAddress="128266C0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+790</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13629</ID>
- <Description>"+7c0 *"</Description>
- <LastState Value="00000000" RealAddress="128266F0"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+7c0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13630</ID>
- <Description>"+8d0"</Description>
- <LastState Value="00000000" RealAddress="12826800"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+8d0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13631</ID>
- <Description>"+b00"</Description>
- <LastState Value="00000000" RealAddress="12826A30"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+b00</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13632</ID>
- <Description>"+b40"</Description>
- <LastState Value="00000000" RealAddress="12826A70"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+b40</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13694</ID>
- <Description>"tofu zombies"</Description>
- <Options moDeactivateChildrenAsWell="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- //modified from TheyCallMeTim13's lua keylistener script
- //http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
- {$lua}
- local function weaklimbskeyLuaThread(thread)
- while WeakLimbskeyLuaThread do
- addrwl = getAddress('bWeakLimbs')
- if addrwl then
- if ( isKeyPressed( readInteger('bWeakLimbsKey') ) and readBytes(addrwl) == 2 ) then
- writeBytes(addrwl+4, 1)
- else
- writeBytes(addrwl+4, 0)
- end
- else
- addrwl = getAddress('bWeakLimbs')
- end
- end
- thread.terminate()
- -- while WeakLimbskeyLuaThread do
- -- if ( isKeyPressed(VK_CAPITAL) ) then
- -- writeBytes("bWeakLimbs" ,1)
- -- else
- -- writeBytes("bWeakLimbs" ,0)
- -- end
- -- end
- -- thread.terminate()
- end
- ----------------------------------
- if syntaxcheck then return end
- WeakLimbskeyLuaThread = true
- createThread(weaklimbskeyLuaThread)
- {$asm}
- ///*****************************************///
- bWeakLimbs:
- db 2
- dd 0
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- {$lua}
- if syntaxcheck then return end
- WeakLimbskeyLuaThread = false
- {$asm}
- ///*****************************************///
- bWeakLimbs:
- dd 0
- dd 0
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13637</ID>
- <Description>"method"</Description>
- <Options moHideChildren="1"/>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:no
- 2:hold key
- 1:always
- </DropDownList>
- <LastState Value="0" RealAddress="13FF000A0"/>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>bWeakLimbs</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13744</ID>
- <Description>"+4"</Description>
- <Options moHideChildren="1"/>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:not pressing
- 1:pressing
- </DropDownList>
- <LastState Value="0" RealAddress="13FF000A4"/>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>+4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13634</ID>
- <Description>""</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem11,2048,"re2.exe"+A9EA0BD)
- label(returnhere11)
- label(originalcode11)
- label(exit11)
- newmem11: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov r8d,3
- mov [rdx+10],r8d
- originalcode11:
- mov r8d,[rdx+10]
- mov rbx,rcx
- exit11:
- jmp returnhere11
- ///
- "re2.exe"+A9EA0BD:
- jmp newmem11
- nop
- nop
- returnhere11:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem11)
- "re2.exe"+A9EA0BD:
- db 44 8B 42 10 48 89 CB
- //Alt: mov r8d,[rdx+10]
- //Alt: mov rbx,rcx
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13635</ID>
- <Description>""</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem17,2048,"re2.exe"+BE144BE)
- label(returnhere17)
- label(originalcode17)
- label(exit17)
- newmem17: //this is allocated memory, you have read,write,execute access
- //place your code here
- xor rax,rax
- test r10,r10
- jz @f
- mov dword ptr [r10+8],ffffffff
- originalcode17:
- mov r8,rax
- mov rdx,rdi
- exit17:
- jmp returnhere17
- ///
- "re2.exe"+BE144BE:
- jmp newmem17
- nop
- returnhere17:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem17)
- "re2.exe"+BE144BE:
- db 49 89 C0 48 89 FA
- //Alt: mov r8,rax
- //Alt: mov rdx,rdi
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13633</ID>
- <Description>"+"</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(cJmpIfNormalAttackAOB,re2.exe,48 ** ** ** 00 0F 85 ** ** ** ** 48 ** ** 74 ** 83 ** ** 00 7E)
- registersymbol(cJmpIfNormalAttackAOB)
- alloc(newmem6,2048,cJmpIfNormalAttackAOB+10) //"re2.exe"+6940E6)
- label(returnhere6)
- label(originalcode6_cJmpIfNormalAttackAOB)
- registersymbol(originalcode6_cJmpIfNormalAttackAOB)
- label(exit6)
- newmem6: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rdi,bIsEnemy
- cmp byte ptr [rdi],1
- jne @f
- inc byte ptr [rdi]
- mov rdi,bWeakLimbs
- cmp byte ptr [rdi],1
- jne @f
- readmem(cJmpIfNormalAttackAOB+10,4)
- //cmp dword ptr [rax+1C],00
- jg @f
- db C7 40
- readmem(cJmpIfNormalAttackAOB+12,1)
- db 01 00 00 00
- //mov dword ptr [rax+1c],1
- @@:
- readmem(cJmpIfNormalAttackAOB+10,4)
- reassemble(cJmpIfNormalAttackAOB+14)
- jmp exit6
- originalcode6_cJmpIfNormalAttackAOB:
- readmem(cJmpIfNormalAttackAOB+10,6)
- //cmp dword ptr [rax+1C],00
- //jle re2.exe+694138
- exit6:
- jmp returnhere6
- ///
- cJmpIfNormalAttackAOB+10: //"re2.exe"+6940E6:
- jmp newmem6
- nop
- returnhere6:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem6)
- cJmpIfNormalAttackAOB+10: //"re2.exe"+6940E6:
- readmem(originalcode6_cJmpIfNormalAttackAOB,6)
- //db 83 78 1C 00 7E 4C
- //Alt: cmp dword ptr [rax+1C],00
- //Alt: jle re2.exe+694138
- unregistersymbol(originalcode6_cJmpIfNormalAttackAOB)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13636</ID>
- <Description>"++"</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(dsmageSpecialEffectReadAOB,re2.exe,8B ** ** ** ** 00 02 00 00 0F 8E ** ** ** ** ** 00 00 02 00)
- registersymbol(dsmageSpecialEffectReadAOB)
- alloc(newmem12,2048,dsmageSpecialEffectReadAOB) //"re2.exe"+A3DDB96)
- label(returnhere12)
- label(originalcode12_dsmageSpecialEffectReadAOB)
- registersymbol(originalcode12_dsmageSpecialEffectReadAOB)
- label(exit12)
- newmem12: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rdi
- mov rdi,bIsEnemy
- cmp byte ptr [rdi],2
- jne @f
- xor eax,eax
- mov [rdi],eax
- mov rdi,bWeakLimbs
- cmp byte ptr [rdi],1
- jne @f
- mov eax,40
- db 89
- readmem(dsmageSpecialEffectReadAOB+1,3)
- //mov [rbx+rsi*4+20],eax
- @@:
- pop rdi
- originalcode12_dsmageSpecialEffectReadAOB:
- readmem(dsmageSpecialEffectReadAOB,9)
- //mov eax,[rbx+rsi*4+20]
- //cmp eax,00000200
- exit12:
- jmp returnhere12
- ///
- dsmageSpecialEffectReadAOB: //"re2.exe"+A3DDB96:
- jmp newmem12
- nop
- nop
- nop
- nop
- returnhere12:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem12)
- dsmageSpecialEffectReadAOB: //"re2.exe"+A3DDB96:
- readmem(originalcode12_dsmageSpecialEffectReadAOB,9)
- //db 8B 44 B3 20 3D 00 02 00 00
- //Alt: mov eax,[rbx+rsi*4+20]
- //Alt: cmp eax,00000200
- unregistersymbol(originalcode12_dsmageSpecialEffectReadAOB)
- </AssemblerScript>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13746</ID>
- <Description>"mod key"</Description>
- <Options moHideChildren="1"/>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">10:SHIFT key
- 11:CTRL key
- 12:ALT key
- 14:CAPS LOCK key
- 04:Middle Mouse Button
- 05:X1 Mouse Button
- 06:X2 Moust Button
- </DropDownList>
- <LastState Value="14" RealAddress="13FF0009C"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>bWeakLimbsKey</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13747</ID>
- <Description>"ignore if method is set to always"</Description>
- <LastState Value="" RealAddress="00000000"/>
- <Color>808080</Color>
- <GroupHeader>1</GroupHeader>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13001</ID>
- <Description>"no reload"</Description>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- //ammo clip read on fire 1
- aobscanmodule(ammoClipReadOnFire1AOB,re2.exe,74 0C 48 ** ** ** 48 ** ** 74 03 8B ** ** 48 ** ** 48 ** ** E8)
- registersymbol(ammoClipReadOnFire1AOB)
- alloc(newmem,2048,ammoClipReadOnFire1AOB+e) //"re2.exe"+BFBB04E)
- label(returnhere)
- label(originalcode_ammoClipReadOnFire1AOB)
- registersymbol(originalcode_ammoClipReadOnFire1AOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rdx,pAmmo
- cmp [rdx],rcx
- jne @f
- cmp byte ptr [rdx+8],1
- jne @f
- inc byte ptr [rdx+8]
- test esi,esi
- jg @f
- mov esi,1
- //mov [rcx+20],esi
- originalcode_ammoClipReadOnFire1AOB:
- readmem(ammoClipReadOnFire1AOB+e,6)
- //mov rdx,rdi
- //mov rcx,rbx
- exit:
- jmp returnhere
- ///
- ammoClipReadOnFire1AOB+e: //"re2.exe"+BFBB04E:
- jmp newmem
- nop
- returnhere:
- ///****************************************///
- //ammo clip const read 1 (chk zero), accessed twice after "ammo clip read on fire 1"
- aobscanmodule(ammoClipZeroCChkAOB,re2.exe,74 0C 48 ** ** ** 48 ** ** 74 03 8B ** ** 85 DB 48)
- registersymbol(ammoClipZeroCChkAOB)
- alloc(newmem2,2048,ammoClipZeroCChkAOB+e) //"re2.exe"+B8BE2C8)
- label(returnhere2)
- label(originalcode2_ammoClipZeroCChkAOB)
- registersymbol(originalcode2_ammoClipZeroCChkAOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rsi,pAmmo
- cmp [rsi],rcx
- jne end2
- cmp byte ptr [rsi+8],2
- je @f
- cmp byte ptr [rsi+8],3
- je @f
- jmp end2
- @@:
- inc byte ptr [rsi+8]
- test ebx,ebx
- jg @f
- mov ebx,1
- end2:
- originalcode2_ammoClipZeroCChkAOB:
- readmem(ammoClipZeroCChkAOB+e,7)
- //test ebx,ebx
- //mov rbx,[rsp+30]
- exit2:
- jmp returnhere2
- ///
- ammoClipZeroCChkAOB+e: //"re2.exe"+B8BE2C8:
- jmp newmem2
- nop
- nop
- returnhere2:
- ///****************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- ammoClipReadOnFire1AOB+e: //"re2.exe"+BFBB04E:
- readmem(originalcode_ammoClipReadOnFire1AOB,6)
- //db 48 89 FA 48 89 D9
- //Alt: mov rdx,rdi
- //Alt: mov rcx,rbx
- unregistersymbol(originalcode_ammoClipReadOnFire1AOB)
- ///****************************************///
- dealloc(newmem2)
- ammoClipZeroCChkAOB+e: //"re2.exe"+B8BE2C8:
- readmem(originalcode2_ammoClipZeroCChkAOB,7)
- //db 85 DB 48 8B 5C 24 30
- //Alt: test ebx,ebx
- //Alt: mov rbx,[rsp+30]
- unregistersymbol(originalcode2_ammoClipZeroCChkAOB)
- ///****************************************///
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13004</ID>
- <Description>"ignore ammo pouch .4"</Description>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- //have ammo pouch to reload flag fetchED, const
- aobscanmodule(ammoPouchReadCallerForReloadFlagFetchCAOB,re2.exe,74 0D 48 ** ** ** 48 ** ** 74 04 44 ** ** ** 45 ** ** 48 ** ** 48 ** ** E8 ** ** ** ** 0F B6 C8 48 ** ** ** 48 ** ** ** 00)
- registersymbol(ammoPouchReadCallerForReloadFlagFetchCAOB)
- alloc(newmem,2048,ammoPouchReadCallerForReloadFlagFetchCAOB+1d) //"re2.exe"+C30F42D)
- label(returnhere)
- label(originalcode_ammoPouchReadCallerForReloadFlagFetchCAOB)
- registersymbol(originalcode_ammoPouchReadCallerForReloadFlagFetchCAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov al,1
- originalcode_ammoPouchReadCallerForReloadFlagFetchCAOB:
- readmem(ammoPouchReadCallerForReloadFlagFetchCAOB+1d,7)
- //movzx ecx,al
- //mov rax,[rbx+50]
- exit:
- jmp returnhere
- ///
- ammoPouchReadCallerForReloadFlagFetchCAOB+1d: //"re2.exe"+C30F42D:
- jmp newmem
- nop
- nop
- returnhere:
- ///**************************************///
- //cjmp1 to skip ammo/ammopouch chk on ammo/ammopouch cal after reload, before 1st ammopouch read after reload
- aobscanmodule(haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB,re2.exe,F2 ** ** ** ** ** 0F 11 ** ** ** E8 ** ** ** ** 0F B6 D0 48 ** ** ** 48 ** ** ** 48 ** ** 0F 85 ** ** ** ** 49 BC FF FF FF FF FF FF FF 7F 85 ** 0F 84)
- registersymbol(haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB)
- alloc(newmem2,2048,haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB+24) //"re2.exe"+C30FC4B)
- label(returnhere2)
- label(originalcode2_haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB)
- registersymbol(originalcode2_haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rbx
- mov rbx,pAmmo
- mov byte ptr [rbx+c],1
- test edx,edx
- jnz @f
- mov edx,1
- //inc byte ptr [rbx+c]
- @@:
- pop rbx
- originalcode2_haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB:
- readmem(haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB+24,10)
- //mov r12,7FFFFFFFFFFFFFFF
- exit2:
- jmp returnhere2
- ///
- haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB+24: //"re2.exe"+C30FC4B:
- jmp newmem2
- nop
- nop
- nop
- nop
- nop
- returnhere2:
- ///**************************************///
- aobscanmodule(itemIDsReadForAltAmmoPresenceAOB,re2.exe,8B ** ** EB 02 31 C0 48 ** ** 75 ** 41 ** ** 18 0F 94 D0)
- registersymbol(itemIDsReadForAltAmmoPresenceAOB)
- itemIDsReadForAltAmmoPresenceAOB+10: //"re2.exe"+B9F3E92:
- db 90 B0 01
- ///**************************************///
- aobscanmodule(cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB,re2.exe,48 ** ** ** 75 ** 48 ** ** 74 ** 39 ** ** 0F 84)
- registersymbol(cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB)
- alloc(originalcode6_cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB,8,re2.exe)
- registersymbol(originalcode6_cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB)
- originalcode6_cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB:
- readmem(cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB+e,6)
- ///
- cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB+e: //"re2.exe"+C311C6D:
- db 90 90 90 90 90 90
- ///**************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- ammoPouchReadCallerForReloadFlagFetchCAOB+1d: //"re2.exe"+C30F42D:
- readmem(originalcode_ammoPouchReadCallerForReloadFlagFetchCAOB,7)
- //db 0F B6 C8 48 8B 43 50
- //Alt: movzx ecx,al
- //Alt: mov rax,[rbx+50]
- unregistersymbol(originalcode_ammoPouchReadCallerForReloadFlagFetchCAOB)
- ///**************************************///
- dealloc(newmem2)
- haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB+24: //"re2.exe"+C30FC4B:
- readmem(originalcode2_haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB,10)
- //db 49 BC FF FF FF FF FF FF FF 7F
- //Alt: mov r12,7FFFFFFFFFFFFFFF
- unregistersymbol(originalcode2_haveAmmoPouchChkBeforeAmmoAPouchCallAfterReloadAOB)
- ///**************************************///
- itemIDsReadForAltAmmoPresenceAOB+10: //"re2.exe"+B9F3E92:
- db 0F 94 D0
- //Alt: sete al
- ///**************************************///
- cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB+e: //"re2.exe"+C311C6D:
- readmem(originalcode6_cJmpIfNoAltAmmoPouchForChangeAfterAlrAmmoChangeAOB,6)
- //db 0F 84 09 02 00 00
- //Alt: je re2.exe+C311E7C
- ///**************************************///
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13030</ID>
- <Description>"inf. sub-weapons"</Description>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(subWeaponsDurationQuantityCalOnUseCounterAOB,re2.exe,0F 84 ** ** ** ** 48 ** ** ** 48 ** ** 0F 84 ** ** ** ** 8B ** ** E9)
- registersymbol(subWeaponsDurationQuantityCalOnUseCounterAOB)
- alloc(newmem,2048,subWeaponsDurationQuantityCalOnUseCounterAOB+13) //"re2.exe"+B8C3A02)
- label(returnhere)
- label(originalcode_subWeaponsDurationQuantityCalOnUseCounterAOB)
- registersymbol(originalcode_subWeaponsDurationQuantityCalOnUseCounterAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- cmp dword ptr [rcx+14],2e //knife
- jne @f
- db 01 79
- readmem(subWeaponsDurationQuantityCalOnUseCounterAOB+15,1)
- //add [rcx+20],edi
- jmp fakeoriginalcode
- @@:
- cmp dword ptr [rcx+14],42 //flash grenade
- jne @f
- cmp [rcx+20],edi
- jg fakeoriginalcode
- mov [rcx+20],edi
- inc dword ptr [rcx+20]
- @@:
- cmp dword ptr [rcx+14],41 //hand grenade
- jne @f
- cmp [rcx+20],edi
- jg fakeoriginalcode
- mov [rcx+20],edi
- inc dword ptr [rcx+20]
- @@:
- fakeoriginalcode:
- readmem(subWeaponsDurationQuantityCalOnUseCounterAOB+13,3)
- //mov ebx,[rcx+20]
- reassemble(subWeaponsDurationQuantityCalOnUseCounterAOB+16)
- //jmp re2.exe+B8C3947
- originalcode_subWeaponsDurationQuantityCalOnUseCounterAOB:
- readmem(subWeaponsDurationQuantityCalOnUseCounterAOB+13,8)
- //mov ebx,[rcx+20]
- //jmp re2.exe+B8C3947
- exit:
- jmp returnhere
- ///
- subWeaponsDurationQuantityCalOnUseCounterAOB+13: //"re2.exe"+B8C3A02:
- jmp newmem
- nop
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- subWeaponsDurationQuantityCalOnUseCounterAOB+13: //"re2.exe"+B8C3A02:
- readmem(originalcode_subWeaponsDurationQuantityCalOnUseCounterAOB,8)
- //db 8B 59 20 E9 3D FF FF FF
- //Alt: mov ebx,[rcx+20]
- //Alt: jmp re2.exe+B8C3947
- unregistersymbol(originalcode_subWeaponsDurationQuantityCalOnUseCounterAOB)
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13013</ID>
- <Description>"universal item key"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- define(universalitemkeyiddefault,14)
- aobscanmodule(itemIDChkOnWObjectInteractViaInvClickAOB,re2.exe,EB 02 89 ** 39 ** ** 74 ** 48)
- registersymbol(itemIDChkOnWObjectInteractViaInvClickAOB)
- label(bUniversalItemKeyID)
- registersymbol(bUniversalItemKeyID)
- label(bUniversalItemKeyPressed)
- registersymbol(bUniversalItemKeyPressed)
- alloc(newmem,2048,itemIDChkOnWObjectInteractViaInvClickAOB+4) //"re2.exe"+E9A08EF)
- label(returnhere)
- label(originalcode_itemIDChkOnWObjectInteractViaInvClickAOB)
- registersymbol(originalcode_itemIDChkOnWObjectInteractViaInvClickAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rcx
- mov rcx,bUniversalItemKeyPressed
- cmp byte ptr [rcx],1
- pop rcx
- je @f
- readmem(itemIDChkOnWObjectInteractViaInvClickAOB+4,3)
- //cmp [rax+10],edx
- @@:
- reassemble(itemIDChkOnWObjectInteractViaInvClickAOB+7)
- //je re2.exe+E9A0927
- jmp exit
- originalcode_itemIDChkOnWObjectInteractViaInvClickAOB:
- readmem(itemIDChkOnWObjectInteractViaInvClickAOB+4,5)
- //cmp [rax+10],edx
- //je re2.exe+E9A0927
- exit:
- jmp returnhere
- ///
- bUniversalItemKeyID:
- dd universalitemkeyiddefault
- bUniversalItemKeyPressed:
- dd 0
- ///
- itemIDChkOnWObjectInteractViaInvClickAOB+4: //"re2.exe"+E9A08EF:
- jmp newmem
- returnhere:
- ///*****************************************///
- //item id chk on use with world object interact
- aobscanmodule(itemIDChkOnWObjectInteractViaInvUseAOB,re2.exe,74 0E 48 ** ** ** 48 ** ** 74 05 8B ** ** EB 02 89 ** 39 ** ** 74 ** 48)
- registersymbol(itemIDChkOnWObjectInteractViaInvUseAOB)
- alloc(newmem2,2048,itemIDChkOnWObjectInteractViaInvUseAOB+12) //"re2.exe"+E9A0D77)
- label(returnhere2)
- label(originalcode2_itemIDChkOnWObjectInteractViaInvUseAOB)
- registersymbol(originalcode2_itemIDChkOnWObjectInteractViaInvUseAOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rbx
- mov rbx,bUniversalItemKeyPressed
- cmp byte ptr [rbx],1
- pop rbx
- je @f
- readmem(itemIDChkOnWObjectInteractViaInvUseAOB+12,3)
- //cmp [rax+10],ecx
- @@:
- reassemble(itemIDChkOnWObjectInteractViaInvUseAOB+15)
- //je re2.exe+E9A0DB1
- jmp exit2
- originalcode2_itemIDChkOnWObjectInteractViaInvUseAOB:
- readmem(itemIDChkOnWObjectInteractViaInvUseAOB+12,5)
- //cmp [rax+10],ecx
- //je re2.exe+E9A0DB1
- exit2:
- jmp returnhere2
- ///
- itemIDChkOnWObjectInteractViaInvUseAOB+12: //"re2.exe"+E9A0D77:
- jmp newmem2
- returnhere2:
- ///*****************************************///
- //modified from TheyCallMeTim13's lua keylistener script
- //http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
- {$lua}
- local function universalitemkeyLuaThread(thread)
- local addr = getAddressSafe('bUniversalItemKeyPressed')
- while UniversalItemkeyLuaThread do
- if addr then
- if ( isKeyPressed( readInteger('bUniversalItemKeyID') ) ) then
- writeBytes(addr, 1)
- else
- writeBytes(addr, 0)
- end
- else
- addr = getAddressSafe('bUniversalItemKeyPressed')
- end
- end
- thread.terminate()
- -- while UniversalItemkeyLuaThread do
- -- if ( isKeyPressed(VK_CAPITAL) ) then
- -- writeBytes("bUniversalItemKeyPressed" ,1)
- -- else
- -- writeBytes("bUniversalItemKeyPressed" ,0)
- -- end
- -- end
- -- thread.terminate()
- end
- ----------------------------------
- if syntaxcheck then return end
- UniversalItemkeyLuaThread = true
- createThread(universalitemkeyLuaThread)
- {$asm}
- ///*****************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- {$lua}
- if syntaxcheck then return end
- UniversalItemkeyLuaThread = false
- {$asm}
- ///*****************************************///
- dealloc(newmem)
- itemIDChkOnWObjectInteractViaInvClickAOB+4: //"re2.exe"+E9A08EF:
- readmem(originalcode_itemIDChkOnWObjectInteractViaInvClickAOB,5)
- //db 39 50 10 74 33
- //Alt: cmp [rax+10],edx
- //Alt: je re2.exe+E9A0927
- unregistersymbol(originalcode_itemIDChkOnWObjectInteractViaInvClickAOB)
- unregistersymbol(bUniversalItemKeyID)
- unregistersymbol(bUniversalItemKeyPressed)
- ///*****************************************///
- dealloc(newmem2)
- itemIDChkOnWObjectInteractViaInvUseAOB+12: //"re2.exe"+E9A0D77:
- readmem(originalcode2_itemIDChkOnWObjectInteractViaInvUseAOB,5)
- //db 39 48 10 74 35
- //Alt: cmp [rax+10],ecx
- //Alt: je re2.exe+E9A0DB1
- unregistersymbol(originalcode2_itemIDChkOnWObjectInteractViaInvUseAOB)
- ///*****************************************///
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13019</ID>
- <Description>"key"</Description>
- <Options moHideChildren="1"/>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">10:SHIFT key
- 11:CTRL key
- 12:ALT key
- 14:CAPS LOCK key
- 04:Middle Mouse Button
- 05:X1 Mouse Button
- 06:X2 Moust Button
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>bUniversalItemKeyID</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13020</ID>
- <Description>""</Description>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13021</ID>
- <Description>""</Description>
- <Color>008000</Color>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13005</ID>
- <Description>"slow walk key"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- //move float read, 0<>1, r8==b
- define(walkkeyiddefault,14)
- aobscanmodule(someFloatRead1AOB,re2.exe,E8 ** ** ** ** 48 ** ** ** 5B C3 0F 57 C0 48 ** ** ** 5B C3 F3 ** ** ** ** 48 ** ** ** 5B C3)
- registersymbol(someFloatRead1AOB)
- label(bWalkKeyID)
- registersymbol(bWalkKeyID)
- label(bWalkKeyPressed)
- registersymbol(bWalkKeyPressed)
- alloc(newmem,2048,someFloatRead1AOB+14) //"re2.exe"+F58320D)
- label(returnhere)
- label(originalcode_someFloatRead1AOB)
- registersymbol(originalcode_someFloatRead1AOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- cmp r8,b
- jne @f
- mov rbx,bWalkKeyPressed
- cmp byte ptr [rbx],1
- jne @f
- mov rbx,dCustMoveSpeed
- movss xmm0,[rbx]
- jmp exit
- originalcode_someFloatRead1AOB:
- readmem(someFloatRead1AOB+14,5)
- //movss xmm0,[rcx+10]
- exit:
- jmp returnhere
- ///
- bWalkKeyID:
- dd walkkeyiddefault
- bWalkKeyPressed:
- dd 0
- dCustMoveSpeed:
- dd (float)0.75
- ///
- someFloatRead1AOB+14: //"re2.exe"+F58320D:
- jmp newmem
- returnhere:
- ///*****************************************///
- //modified from TheyCallMeTim13's lua keylistener script
- //http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
- {$lua}
- local function walkkeyLuaThread(thread2)
- local addr2 = getAddressSafe('bWalkKeyPressed')
- while RunWalkkeyLuaThread do
- if addr2 then
- if ( isKeyPressed( readInteger('bWalkKeyID') ) ) then
- writeBytes(addr2, 1)
- else
- writeBytes(addr2, 0)
- end
- else
- addr2 = getAddressSafe('bWalkKeyPressed')
- end
- end
- thread2.terminate()
- -- while RunWalkkeyLuaThread do
- -- if ( isKeyPressed(VK_CAPITAL) ) then
- -- writeBytes("bWalkKeyPressed" ,1)
- -- else
- -- writeBytes("bWalkKeyPressed" ,0)
- -- end
- -- end
- -- thread2.terminate()
- end
- ----------------------------------
- if syntaxcheck then return end
- RunWalkkeyLuaThread = true
- createThread(walkkeyLuaThread)
- {$asm}
- ///*****************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- {$lua}
- if syntaxcheck then return end
- RunWalkkeyLuaThread = false
- {$asm}
- ///*****************************************///
- dealloc(newmem)
- someFloatRead1AOB+14: //"re2.exe"+F58320D:
- readmem(originalcode_someFloatRead1AOB,5)
- //db F3 0F 10 41 10
- //Alt: movss xmm0,[rcx+10]
- unregistersymbol(originalcode_someFloatRead1AOB)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13006</ID>
- <Description>"key"</Description>
- <Options moHideChildren="1"/>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">10:SHIFT key
- 11:CTRL key
- 12:ALT key
- 14:CAPS LOCK key
- 04:Middle Mouse Button
- 05:X1 Mouse Button
- 06:X2 Moust Button
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>bWalkKeyID</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13007</ID>
- <Description>""</Description>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13008</ID>
- <Description>""</Description>
- <Color>008000</Color>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13037</ID>
- <Description>"slow motion .2"</Description>
- <Options moHideChildren="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(slowmokeys,1024,re2.exe)
- label(dSlowMoKey1)
- registersymbol(dSlowMoKey1)
- label(dSlowMoKey2)
- registersymbol(dSlowMoKey2)
- label(dCustSpeedhackSpeed)
- registersymbol(dCustSpeedhackSpeed)
- ///
- slowmokeys:
- dSlowMoKey1:
- dd 05
- dSlowMoKey2:
- dd 02
- dCustSpeedhackSpeed:
- dd (float)0.15
- ///
- {$lua}
- lastSpeed=speedhack_getSpeed();
- local myToggle=0;
- bSpeedKeyReleased=1;
- local function slowmokeyLuaThread(thread3)
- local addr = getAddressSafe('dCustSpeedhackSpeed')
- -- local addrga = readPointer(getAddress('pSomeGameStatus'))
- while SlowMokeyLuaThread do
- local myTable = getXBox360ControllerState()
- addrga = readPointer(getAddress('pSomeGameStatus'))
- -- addrga = getAddress('pSomeGameStatus')
- if (addr and (addrga ~= 0))then
- if (myTable == nil) then
- if ( ((isKeyPressed(readInteger('dSlowMoKey1'))) and (isKeyPressed(readInteger('dSlowMoKey2')))) and not( readBytes(addrga+0x51)==1 or readBytes(addrga+0x53)==1) ) then
- if ( bSpeedKeyReleased == 1) then
- if (myToggle == 0) then
- myToggle=1
- else
- myToggle = 0
- end
- end
- else
- if bSpeedKeyReleased == 0 then
- bSpeedKeyReleased=1
- end
- end
- if myToggle == 1 then
- if speedhack_getSpeed() ~= readFloat("dCustSpeedhackSpeed") then
- -- print("pressing: ", lastSpeed)
- lastSpeed=speedhack_getSpeed()
- speedhack_setSpeed(readFloat("dCustSpeedhackSpeed"))
- end
- else
- -- print(lastSpeed)
- if speedhack_getSpeed() ~= lastSpeed then
- speedhack_setSpeed(lastSpeed)
- end
- end
- else
- if ( ((myTable.GAMEPAD_RIGHT_SHOULDER) or ((isKeyPressed(readInteger('dSlowMoKey1'))) and (isKeyPressed(readInteger('dSlowMoKey2'))))) and not( readBytes(addrga+0x51)==1 or readBytes(addrga+0x53)==1) ) then
- if ( bSpeedKeyReleased == 1) then
- if (myToggle == 0) then
- myToggle=1
- else
- myToggle = 0
- end
- end
- else
- if bSpeedKeyReleased == 0 then
- bSpeedKeyReleased=1
- end
- end
- if myToggle == 1 then
- if speedhack_getSpeed() ~= readFloat("dCustSpeedhackSpeed") then
- -- print("pressing: ", lastSpeed)
- lastSpeed=speedhack_getSpeed()
- speedhack_setSpeed(readFloat("dCustSpeedhackSpeed"))
- end
- else
- -- print(lastSpeed)
- if speedhack_getSpeed() ~= lastSpeed then
- speedhack_setSpeed(lastSpeed)
- end
- end
- end
- else
- addr = getAddressSafe('dCustSpeedhackSpeed')
- -- addrga = readPointer(getAddress('pSomeGameStatus'))
- end
- end
- thread3.terminate()
- end
- ----------------------------------
- if syntaxcheck then return end
- SlowMokeyLuaThread = true
- createThread(slowmokeyLuaThread)
- {$asm}
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- {$lua}
- if syntaxcheck then return end
- SlowMokeyLuaThread = false
- {$asm}
- ///*****************************************///
- dealloc(newmem)
- unregistersymbol(dSlowMoKey1)
- unregistersymbol(dSlowMoKey2)
- unregistersymbol(dCustSpeedhackSpeed)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13038</ID>
- <Description>"key 1"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">10:SHIFT key
- 11:CTRL key
- 12:ALT key
- 14:CAPS LOCK key
- 02:Right Mouse Button
- 04:Middle Mouse Button
- 05:X1 Mouse Button
- 06:X2 Moust Button
- </DropDownList>
- <LastState Value="10" Activated="1" RealAddress="13FF40000"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>dSlowMoKey1</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13039</ID>
- <Description>"key 2"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">10:SHIFT key
- 11:CTRL key
- 12:ALT key
- 14:CAPS LOCK key
- 02:Right Mouse Button
- 04:Middle Mouse Button
- 05:X1 Mouse Button
- 06:X2 Moust Button
- </DropDownList>
- <LastState Value="10" Activated="1" RealAddress="13FF40004"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>Byte</VariableType>
- <Address>dSlowMoKey2</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13040</ID>
- <Description>"slow motion speed"</Description>
- <LastState Value="0.150000006" Activated="1" RealAddress="13FF40008"/>
- <Color>008000</Color>
- <VariableType>Float</VariableType>
- <Address>dCustSpeedhackSpeed</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13179</ID>
- <Description>"game play time mod .2"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- define(qmaxgameplaytime_default,#7123) //1:58:43
- //aobscanmodule(totalGameTimeWriteAOB,re2.exe,E8 ** ** ** ** EB 08 48 ** ** ** 48 ** ** ** 48 ** ** ** 4C ** ** ** 0F 85 ** ** ** ** 44 ** ** ** 0F 85)
- //registersymbol(totalGameTimeWriteAOB)
- label(pGameTime)
- registersymbol(pGameTime)
- label(qMaxGamePlayTime)
- registersymbol(qMaxGamePlayTime)
- alloc(newmem,2048,totalGameTimeWriteAOB+7) //"re2.exe"+AD9D8F5)
- label(returnhere)
- label(originalcode_totalGameTimeWriteAOB)
- registersymbol(originalcode_totalGameTimeWriteAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rbx
- mov rbx,pGameTime
- mov [rbx],rcx
- mov rbx,qMaxGamePlayTime
- mov rbx,[rbx]
- imul rbx,rbx,#1000000
- lea rax,[rdx+rbp]
- sub rax,[rcx+20]
- sub rax,[rcx+30]
- cmp rax,rbx
- jbe @f
- mov rax,rbx
- add rax,[rcx+20]
- add rax,[rcx+30]
- sub rax,#4000000
- mov rdx,rax
- xor rbp,ebp
- end:
- pop rbx
- originalcode_totalGameTimeWriteAOB:
- readmem(totalGameTimeWriteAOB+7,8)
- //lea rax,[rdx+rbp]
- //mov [rcx+18],rax
- exit:
- jmp returnhere
- ///
- pGameTime:
- dq 0
- qMaxGamePlayTime:
- dq qmaxgameplaytime_default
- ///
- totalGameTimeWriteAOB+7: //"re2.exe"+AD9D8F5:
- jmp newmem
- nop
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- totalGameTimeWriteAOB+7: //"re2.exe"+AD9D8F5:
- readmem(originalcode_totalGameTimeWriteAOB,8)
- //db 48 8D 04 2A 48 89 41 18
- //Alt: lea rax,[rdx+rbp]
- //Alt: mov [rcx+18],rax
- unregistersymbol(originalcode_totalGameTimeWriteAOB)
- unregistersymbol(pGameTime)
- unregistersymbol(qMaxGamePlayTime)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13180</ID>
- <Description>"stop at:"</Description>
- <LastState Value="" RealAddress="00000000"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>808080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>qMaxGamePlayTime</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13181</ID>
- <Description>"hour"</Description>
- <Color>008000</Color>
- <VariableType>Custom</VariableType>
- <CustomType>RE2_Hrs</CustomType>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13182</ID>
- <Description>"minute"</Description>
- <Color>008000</Color>
- <VariableType>Custom</VariableType>
- <CustomType>RE2_Mins</CustomType>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13183</ID>
- <Description>"second"</Description>
- <Color>008000</Color>
- <VariableType>Custom</VariableType>
- <CustomType>RE2_Secs</CustomType>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13184</ID>
- <Description>"total in secs"</Description>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+0</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13185</ID>
- <Description>""</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <GroupHeader>1</GroupHeader>
- <CheatEntries>
- <CheatEntry>
- <ID>13186</ID>
- <Description>"total"</Description>
- <Color>0000FF</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>pGameTime</Address>
- <Offsets>
- <Offset>18</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13187</ID>
- <Description>"cut-scene"</Description>
- <Color>0000FF</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>+8</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13188</ID>
- <Description>"pause"</Description>
- <Color>0000FF</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>+10</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13025</ID>
- <Description>"highlighted item"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(itemIDReadOnHighlightedInInvAOB,re2.exe,4C ** ** ** 45 ** ** 4D ** ** 74 ** 45 ** ** ** 75)
- registersymbol(itemIDReadOnHighlightedInInvAOB)
- label(bSpecialChangeAa)
- registersymbol(bSpecialChangeAa)
- label(bSpecialChangeAb)
- registersymbol(bSpecialChangeAb)
- label(bSpecialChangeB)
- registersymbol(bSpecialChangeB)
- label(bSpecialChangeC)
- registersymbol(bSpecialChangeC)
- label(bSpecialChangeD)
- registersymbol(bSpecialChangeD)
- label(pHighlightedItem)
- registersymbol(pHighlightedItem)
- alloc(newmem,2048,itemIDReadOnHighlightedInInvAOB+c) //"re2.exe"+9868BBC)
- label(returnhere)
- label(originalcode_itemIDReadOnHighlightedInInvAOB)
- registersymbol(originalcode_itemIDReadOnHighlightedInInvAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rax,pHighlightedItem
- mov [rax],r8
- mov rax,bSpecialChangeAa
- ncaa:
- cmp byte ptr [rax],1
- jne @f
- cmp dword ptr [r8+10],f
- jne @f
- mov dword ptr [r8+10],1a
- ncab:
- mov rax,bSpecialChangeAb
- cmp byte ptr [rax],1
- jne @f
- cmp dword ptr [r8+10],1a
- jne @f
- mov dword ptr [r8+10],f
- ncb:
- cmp byte ptr [rax+4],1
- jne ncc
- cmp dword ptr [r8+10],16
- je @f
- cmp dword ptr [r8+10],17
- je @f
- cmp dword ptr [r8+10],18
- je @f
- jmp ncc
- @@:
- mov dword ptr [r8+10],1b
- ncc:
- cmp byte ptr [rax+8],1
- jne @f
- cmp dword ptr [r8+10],20
- jne @f
- mov dword ptr [r8+10],1a
- fild dword ptr [r8+20]
- fimul dword ptr [rax+c]
- fistp dword ptr [r8+20]
- ncd:
- mov rax,bSpecialChangeD
- cmp byte ptr [rax],1
- jne @f
- cmp dword ptr [r8+10],12
- jne @f
- mov dword ptr [r8+10],f
- @@:
- readmem(itemIDReadOnHighlightedInInvAOB+c,4)
- reassemble(itemIDReadOnHighlightedInInvAOB+10)
- jmp exit
- originalcode_itemIDReadOnHighlightedInInvAOB:
- readmem(itemIDReadOnHighlightedInInvAOB+c,6)
- //cmp [r8+10],r9d
- //jne re2.exe+9868BDE
- exit:
- jmp returnhere
- ///
- bSpecialChangeAa: //Handgun Ammo > Large-caliber Handgun Ammo
- dd 0
- bSpecialChangeAb: //Large-caliber Handgun Ammo > Handgun Ammo
- dd 0
- bSpecialChangeB: //Rounds+Needles > High-Powered Rounds (SLS 60)
- dd 0
- bSpecialChangeC: //Ribbon > 20 Large-caliber Handgun Ammo
- dd 0
- dd #10
- bSpecialChangeD: //MAG Ammo > Handgun Ammo
- dd 0
- pHighlightedItem:
- ///
- itemIDReadOnHighlightedInInvAOB+c: //"re2.exe"+9868BBC:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- itemIDReadOnHighlightedInInvAOB+c: //"re2.exe"+9868BBC:
- readmem(originalcode_itemIDReadOnHighlightedInInvAOB,6)
- //db 45 39 48 10 75 1C
- //Alt: cmp [r8+10],r9d
- //Alt: jne re2.exe+9868BDE
- unregistersymbol(originalcode_itemIDReadOnHighlightedInInvAOB)
- unregistersymbol(bSpecialChangeAa)
- unregistersymbol(bSpecialChangeAb)
- unregistersymbol(bSpecialChangeB)
- unregistersymbol(bSpecialChangeC)
- unregistersymbol(bSpecialChangeD)
- unregistersymbol(pHighlightedItem)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13026</ID>
- <Description>""</Description>
- <LastState Value="" RealAddress="00000000"/>
- <Color>FFFFFF</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pHighlightedItem</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13130</ID>
- <Description>"item id"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">00000000:is weapon
- 00000001:First Aid Spray
- 00000002:Green Herb
- 00000003:Red Herb
- 00000004:Blue Herb
- 00000005:Mixed Herb (G+G)
- 00000006:Mixed Herb (G+R)
- 00000007:Mixed Herb (G+B)
- 00000008:Mixed Herb (G+G+B)
- 00000009:Mixed Herb (G+G+G)
- 0000000A:Mixed Herb (G+R+B)
- 0000000B:Mixed Herb (R+B)
- 0000000C:Green Herb
- 0000000D:Red Herb
- 0000000E:Blue Herb
- 0000000F:Handgun Ammo
- 00000010:Shotgun Shells
- 00000011:Submachine Gun Ammo
- 00000012:MAG Ammo
- 00000016:Acid Rounds
- 00000017:Flame Rounds
- 00000018:Needle Cartridges
- 00000019:Fuel
- 0000001A:Large-caliber Handgun Ammo
- 0000001B:High-Powered Rounds (SLS 60)
- 0000001F:Detonator
- 00000020:Ink Ribbon
- 00000021:Wooden Board
- 00000022:Electronic Gadget
- 00000023:Battery (9-volt)
- 00000024:Gunpowder
- 00000025:Gunpowder (Large)
- 00000026:High-Grade Gunpowder (Yellow)
- 00000027:High-Grade Gunpowder (White)
- 00000030:High-Capacity Mag. (Matilda)
- 00000031:Muzzle Brake (Matilda)
- 00000032:Gun Stock(Matilda)
- 00000033:Speed Loader (SLS 60)
- 00000034:Laser Sight (JMB Hp3)
- 00000035:Reinforced Frame (SLS 60)
- 00000036:High-Capacity Mag. (JMB Hp3)
- 00000037:Shotgun Stock (W-870)
- 00000038:Long Barrel (W-870)
- 0000003A:High-Capacity Mag. (MQ 11)
- 0000003C:Suppressor (MQ 11)
- 0000003D:Red Dot Sight (Lightning Hawk)
- 0000003E:Long Barrel (Lightning Hawk)
- 00000040:Shoulder Stock (GM 79)
- 00000041:Regulator (Flamethrower)
- 00000042:High Voltage Condenser (Spark Shot)
- 00000048:Film "Hiding Place"
- 00000049:Film "Rising Rookie"
- 0000004A:Film "Commemorative"
- 0000004B:Film "3F Locker"
- 0000004C:Film "Lion Statue"
- 0000004D:Storage Room Key
- 0000004F:Mechanic Jack Handle
- 00000050:Square Crank
- 00000051:Unicorn Medallion
- 00000052:Spade Key
- 00000053:Parking Garage Key Card
- 00000054:Weapons Locker Key Card
- 00000056:Valve Handle
- 00000057:S.T.A.R.S. Badge
- 00000058:Scepter
- 0000005A:Red Jewel
- 0000005B:Bejeweled Box
- 0000005D:Bishop Plug
- 0000005E:Rook Plug
- 0000005F:King Plug
- 00000062:Picture Block
- 00000066:USB Dongle Key
- 00000070:Spare Key (key pad)
- 00000072:Red Book (Art Object)
- 00000073:Statue's Left Arm
- 00000074:Left Arm with Book
- 00000076:Lion Medallion
- 00000077:Diamond Key
- 00000078:Car Key
- 0000007C:Maiden Medallion
- 0000007E:Power Panel Part
- 0000007F:Power Panel Part
- 00000080:Lovers Relief
- 00000081:Small Gear
- 00000082:Large Gear
- 00000083:Courtyard Key
- 00000084:Knight Plug
- 00000085:Pawn Plug
- 00000086:Queen Plug
- 00000087:Boxed Electronic Part
- 00000088:Boxed Electronic Part
- 0000009F:Orphanage Key
- 000000A0:Club Key
- 000000A9:Heart Key
- 000000AA:U.S.S. Digital Video Cassette
- 000000B0:T-Bar Valve Handle
- 000000B3:Dispersal Cartridge (Empty)
- 000000B4:Dispersal Cartridge (Solution)
- 000000B5:Dispersal Cartridge (Herbicide)
- 000000B7:Joint Plug
- 000000BA:Upgrade Chip (Admin)
- 000000BB:ID Wristband (Admin)
- 000000BC:Electronic Chip
- 000000BD:Signal Modulator
- 000000BE:Trophy
- 000000BF:Trophy
- 000000C2:Sewers Key
- 000000C3:ID Wristband (Visitor)
- 000000C4:ID Wristband (General Staff)
- 000000C5:ID Wristband (Senior Staff)
- 000000C6:Upgrade Chip (General Staff)
- 000000C7:Upgrade Chip (Senior Staff)
- 000000C8:ID Wristband (Visitor)
- 000000C9:ID Wristband (General Staff)
- 000000CA:ID Wristband (Senior Staff)
- 000000CB:Lab Digital Video Cassette
- 000000E6:Briefcase
- 000000F0:Fuse (Main Hall)
- 000000F1:Fuse (Break Room Hallway)
- 000000F3:Scissors
- 000000F4:Bolt Cutter
- 000000F5:Stuffed Doll
- 00000106:Hip Pouch
- 00000123:Portable Safe
- 00000125:Tin Storage Box
- 00000126:Wooden Box
- 00000127:Wooden Box
- 00000128:Tin Storage Box
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+10</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13131</ID>
- <Description>"weapon id"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">FFFFFFFF:not weapon
- 00000001:Handgun - Matilda
- 00000002:Handgun - M19
- 00000003:Handgun - JMB Hp3
- 00000004:Handgun - Quickdraw Army Revolver
- 00000007:Handgun - MUP
- 00000008:Handgun - Broom Hc
- 00000009:Handgun - SLS 60
- 0000000B:Shotgun - W-870
- 00000015:Sub Gun - MQ 11
- 00000017:Sub Gun - LE 5 (Infinite)
- 0000001F:MAG - Lightning Hawk
- 00000029:EMF Visualizer
- 0000002A:Grenade Launcher - GM 79
- 0000002B:Chemical Flamethrower
- 0000002C:Stun Gun - Spark Shot
- 0000002D:ATM-4
- 0000002E:Combat Knife
- 0000002F:Combat knife (Infinite)
- 00000031:Anti-tank Rocket
- 00000032:Minigun
- 00000041:Hand Grenade
- 00000042:Flash Grenade
- 00000052:Handgun - Samurai Edge (Infinite)
- 00000053:Handgun - Samurai Edge (Chris Model)
- 00000054:Handgun - Samurai Edge (Jill Model)
- 00000055:Handgun - Samurai Edge (Albert Model)
- 000000DE:ATM-4 (Infinite)
- 000000F2:Anti-tank Rocket (Infinite)
- 000000FC:Minigun (Infinite)
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+14</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13074</ID>
- <Description>"upgrade"</Description>
- <DropDownList DisplayValueAsItem="1">00000000:Nothing
- 00000001:Upgrade 1
- 00000002:Upgrade 2
- 00000003:Upgrade 1 + 2
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+18</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13143</ID>
- <Description>"1"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>0</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13144</ID>
- <Description>"2"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>1</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13145</ID>
- <Description>"3"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>2</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13146</ID>
- <Description>"4"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>3</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13147</ID>
- <Description>"5"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>4</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13150</ID>
- <Description>"6"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>5</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13149</ID>
- <Description>"7"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>6</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13148</ID>
- <Description>"8"</Description>
- <Color>0000FF</Color>
- <VariableType>Binary</VariableType>
- <BitStart>7</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13132</ID>
- <Description>"ammo type"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">00000000:N/A
- 0000000F:Handgun Ammo
- 00000010:Shotgun Shells
- 00000011:Submachine Gun Ammo
- 00000012:MAG Ammo
- 00000016:Acid Rounds
- 00000017:Flame Rounds
- 00000018:Needle Cartridges
- 00000019:Fuel
- 0000001A:Large-caliber Handgun Ammo
- 0000001B:High-Powered Rounds (SLS 60)
- 0000001C:Rocket
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+1C</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13133</ID>
- <Description>"quantity / durabiliy"</Description>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+20</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13168</ID>
- <Description>"DO NOT ACTIVATE"</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- bSpecialChangeAa:
- db 1
- bSpecialChangeC:
- db 1
- //bSpecialChangeD:
- //db 1
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- bSpecialChangeAa:
- db 0
- bSpecialChangeC:
- db 0
- //bSpecialChangeD:
- //db 0
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13189</ID>
- <Description>"DO NOT ACTIVATE"</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- bSpecialChangeAb:
- db 1
- //bSpecialChangeB:
- //db 1
- //bSpecialChangeC:
- //db 1
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- bSpecialChangeAb:
- db 0
- //bSpecialChangeB:
- //db 0
- //bSpecialChangeC:
- //db 0
- </AssemblerScript>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13409</ID>
- <Description>"hide weapon upgrade appearance"</Description>
- <Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(weaponUpgradeFlagsReadForAppearanceAOB,re2.exe,48 ** ** ** ** 00 00 45 ** ** 8B ** ** ** 00 00 48 ** ** 74)
- registersymbol(weaponUpgradeFlagsReadForAppearanceAOB)
- label(bW870UAppearance)
- registersymbol(bW870UAppearance)
- label(bMaltildaUAppearance)
- registersymbol(bMaltildaUAppearance)
- label(bSLS60UAppearance)
- registersymbol(bSLS60UAppearance)
- alloc(newmem,2048,weaponUpgradeFlagsReadForAppearanceAOB+a) //"re2.exe"+C795D26)
- label(returnhere)
- label(originalcode_weaponUpgradeFlagsReadForAppearanceAOB)
- registersymbol(originalcode_weaponUpgradeFlagsReadForAppearanceAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- readmem(weaponUpgradeFlagsReadForAppearanceAOB+a,6)
- //mov ebp,[rdi+13c]
- db 48 8D 87
- readmem(weaponUpgradeFlagsReadForAppearanceAOB+c,4)
- //lea rax,[rdi+13c]
- cmp word ptr [rax-4],b //W-870
- jne @f
- mov rax,bW870UAppearance
- mov al,[rax]
- movzx eax,al
- not eax
- and ebp,eax
- jmp end
- @@:
- cmp word ptr [rax-4],1 //Maltilda
- jne @f
- mov rax,bMaltildaUAppearance
- mov al,[rax]
- movzx eax,al
- not eax
- and ebp,eax
- jmp end
- @@:
- cmp word ptr [rax-4],9 //SLS 60
- jne @f
- mov rax,bSLS60UAppearance
- mov al,[rax]
- movzx eax,al
- not eax
- and ebp,eax
- jmp end
- end:
- jmp exit
- originalcode_weaponUpgradeFlagsReadForAppearanceAOB:
- readmem(weaponUpgradeFlagsReadForAppearanceAOB+a,6)
- //mov ebp,[rdi+0000013C]
- exit:
- jmp returnhere
- ///
- bW870UAppearance:
- db 0
- bMaltildaUAppearance:
- db 0
- bSLS60UAppearance:
- db 0
- ///
- weaponUpgradeFlagsReadForAppearanceAOB+a: //"re2.exe"+C795D26:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- weaponUpgradeFlagsReadForAppearanceAOB+a: //"re2.exe"+C795D26:
- readmem(originalcode_weaponUpgradeFlagsReadForAppearanceAOB,6)
- //db 8B AF 3C 01 00 00
- //Alt: mov ebp,[rdi+0000013C]
- unregistersymbol(originalcode_weaponUpgradeFlagsReadForAppearanceAOB)
- unregistersymbol(bW870UAppearance)
- unregistersymbol(bMaltildaUAppearance)
- unregistersymbol(bSLS60UAppearance)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13410</ID>
- <Description>"[Maltilda]"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>bMaltildaUAppearance</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13411</ID>
- <Description>"Gun Stock"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:as is
- 1:hide
- </DropDownList>
- <Color>008000</Color>
- <VariableType>Binary</VariableType>
- <BitStart>0</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13412</ID>
- <Description>"Muzzle Brake"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:as is
- 1:hide
- </DropDownList>
- <Color>008000</Color>
- <VariableType>Binary</VariableType>
- <BitStart>1</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13413</ID>
- <Description>"[SLS 60]"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>bSLS60UAppearance</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13414</ID>
- <Description>"Reinforced Frame"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:as is
- 1:hide
- </DropDownList>
- <Color>008000</Color>
- <VariableType>Binary</VariableType>
- <BitStart>3</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13415</ID>
- <Description>"[W-870]"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>bW870UAppearance</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13416</ID>
- <Description>"Long Barrel"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:as is
- 1:hide
- </DropDownList>
- <Color>008000</Color>
- <VariableType>Binary</VariableType>
- <BitStart>0</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13417</ID>
- <Description>"Shotgun Stock"</Description>
- <DropDownList ReadOnly="1" DescriptionOnly="1" DisplayValueAsItem="1">0:as is
- 1:hide
- </DropDownList>
- <Color>008000</Color>
- <VariableType>Binary</VariableType>
- <BitStart>1</BitStart>
- <BitLength>1</BitLength>
- <ShowAsBinary>0</ShowAsBinary>
- <Address>+0</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13418</ID>
- <Description>"DO NOT ACTIVATE"</Description>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- bW870UAppearance:
- db 1
- bMaltildaUAppearance:
- db 2
- //bSLS60UAppearance:
- //db 4
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- bW870UAppearance:
- db 0
- bMaltildaUAppearance:
- db 0
- //bSLS60UAppearance:
- //db 0
- </AssemblerScript>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13488</ID>
- <Description>"wet!"</Description>
- <Options moHideChildren="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- define(dcuswetamount,(float)0.5)
- aobscanmodule(wetFlagReadAOB,re2.exe,48 ** ** 0F 85 ** ** ** ** 8B ** ** ** 00 00 FF ** 83 ** 02)
- registersymbol(wetFlagReadAOB)
- label(dCusWetAmount)
- registersymbol(dCusWetAmount)
- label(pSomeFxInfo)
- registersymbol(pSomeFxInfo)
- alloc(newmem,2048,wetFlagReadAOB+9) //"re2.exe"+AA843B6)
- label(returnhere)
- label(originalcode_wetFlagReadAOB)
- registersymbol(originalcode_wetFlagReadAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rbx
- mov rbx,pSomeFxInfo
- mov [rbx],rdi
- readmem(wetFlagReadAOB+9,6)
- //mov eax,[rdi+98]
- or eax,1
- mov rbx,dCusWetAmount
- movss xmm6,[rbx]
- maxss xmm6,[rdi+60]
- movss [rdi+60],xmm6
- pop rbx
- jmp exit
- originalcode_wetFlagReadAOB:
- readmem(wetFlagReadAOB+9,6)
- //mov eax,[rdi+00000098]
- exit:
- jmp returnhere
- ///
- dCusWetAmount:
- dd dcuswetamount
- pSomeFxInfo:
- dq 0
- ///
- wetFlagReadAOB+9: //"re2.exe"+AA843B6:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- wetFlagReadAOB+9: //"re2.exe"+AA843B6:
- readmem(originalcode_wetFlagReadAOB,6)
- //db 8B 87 98 00 00 00
- //Alt: mov eax,[rdi+00000098]
- unregistersymbol(originalcode_wetFlagReadAOB)
- unregistersymbol(dCusWetAmount)
- unregistersymbol(pSomeFxInfo)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13489</ID>
- <Description>"amount"</Description>
- <LastState Value="0.200000003" Activated="1" RealAddress="13FFB0052"/>
- <Color>008000</Color>
- <VariableType>Float</VariableType>
- <Address>dCusWetAmount</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13573</ID>
- <Description>""</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="15567BA0"/>
- <Color>FFFFFF</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pSomeFxInfo</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13574</ID>
- <Description>"wet flag"</Description>
- <LastState Value="1" RealAddress="15567C38"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+98</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13575</ID>
- <Description>"wet amount"</Description>
- <LastState Value="0.1997894943" RealAddress="15567C00"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>+60</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13551</ID>
- <Description>"follow cam mod"</Description>
- <Options moHideChildren="1"/>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(folllowCamOffsets2WriteAOB,re2.exe,0F 85 ** ** ** ** 48 85 DB 0F 84 ** ** ** ** F3 ** ** ** ** F3 ** ** ** ** F3 ** ** ** ** C6 ** ** 01 48 ** ** ** 48)
- registersymbol(folllowCamOffsets2WriteAOB)
- label(pFCamOffsets)
- registersymbol(pFCamOffsets)
- alloc(newmem,2048,folllowCamOffsets2WriteAOB+f) //"re2.exe"+B468A5B)
- label(returnhere)
- label(originalcode_folllowCamOffsets2WriteAOB)
- registersymbol(originalcode_folllowCamOffsets2WriteAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov rax,pFCamOffsets
- mov [rax],rbx
- originalcode_folllowCamOffsets2WriteAOB:
- readmem(folllowCamOffsets2WriteAOB+f,5)
- //movss [rbx+50],xmm0
- exit:
- jmp returnhere
- ///
- pFCamOffsets:
- ///
- folllowCamOffsets2WriteAOB+f: //"re2.exe"+B468A5B:
- jmp newmem
- returnhere:
- ///*****************************************///
- aobscanmodule(folllowCamOffsetZ1WriteAOB,re2.exe,F3 ** ** ** ** 0F ** ** ** 0F ** ** ** F3 ** ** ** ** F3 ** ** ** ** 48 ** ** ** E9)
- registersymbol(folllowCamOffsetZ1WriteAOB)
- label(bAimKey)
- registersymbol(bAimKey)
- label(bAimKeyPressed)
- registersymbol(bAimKeyPressed)
- alloc(newmem2,2048,folllowCamOffsetZ1WriteAOB+12) //"re2.exe"+BB83445)
- label(returnhere2)
- label(originalcode2_folllowCamOffsetZ1WriteAOB)
- registersymbol(originalcode2_folllowCamOffsetZ1WriteAOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- push rcx
- mov rax,pFCamOffsets
- cmp [rax],rbx
- jne end
- mov rcx,dCusFCamZOffset
- xorps xmm0,xmm0
- comiss xmm0,[rcx+8]
- movss xmm0,[rcx+8]
- jbe @f
- mulss xmm0,[rcx+14]
- @@:
- divss xmm0,[rcx+10]
- movss [rcx+c],xmm0
- movss xmm0,[rcx+8]
- mov rcx,pReadiedWeapon
- mov rcx,[rcx]
- test rcx,rcx
- jz cfczoc
- cmp dword ptr [rcx],0
- je @f
- cmp dword ptr [rcx],2e
- je @f
- cmp dword ptr [rcx],2f
- je @f
- xorps xmm0,xmm0
- @@:
- mov rcx,dCusFCamZOffset
- movss [rcx+4],xmm0
- cfczoc:
- mov rcx,dCusFCamZOffset
- movss xmm0,[rcx]
- comiss xmm0,[rcx+4]
- ja deccfczo
- jb inccfczo
- je assigncfczo
- inccfczo:
- addss xmm0,[rcx+c]
- minss xmm0,[rcx+4]
- jmp assigncfczo
- deccfczo:
- subss xmm0,[rcx+c]
- maxss xmm0,[rcx+4]
- jmp assigncfczo
- assigncfczo:
- movss [rcx],xmm0
- db F3 0F 58 43
- readmem(folllowCamOffsets2WriteAOB+18,1)
- //addss xmm0,[rbx+54]
- end:
- pop rcx
- originalcode2_folllowCamOffsetZ1WriteAOB:
- readmem(folllowCamOffsetZ1WriteAOB+12,5)
- //movss [rdx+14],xmm0
- exit2:
- jmp returnhere2
- ///
- bAimKey:
- dd 02
- bAimKeyPressed:
- dd 0
- ///
- folllowCamOffsetZ1WriteAOB+12: //"re2.exe"+BB83445:
- jmp newmem2
- returnhere2:
- ///*****************************************///
- dCusFCamZOffset:
- dd 0
- dCusFCamZOffset+8:
- dd (float)-0.22
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- folllowCamOffsets2WriteAOB+f: //"re2.exe"+B468A5B:
- readmem(originalcode_folllowCamOffsets2WriteAOB,5)
- //db F3 0F 11 43 50
- //Alt: movss [rbx+50],xmm0
- unregistersymbol(originalcode_folllowCamOffsets2WriteAOB)
- unregistersymbol(pFCamOffsets)
- ///*****************************************///
- dealloc(newmem2)
- folllowCamOffsetZ1WriteAOB+12: //"re2.exe"+BB83445:
- readmem(originalcode2_folllowCamOffsetZ1WriteAOB,5)
- //db F3 0F 11 42 14
- //Alt: movss [rdx+14],xmm0
- unregistersymbol(originalcode2_folllowCamOffsetZ1WriteAOB)
- unregistersymbol(bAimKey)
- unregistersymbol(bAimKeyPressed)
- ///*****************************************///
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13562</ID>
- <Description>"custom z"</Description>
- <LastState Value="-0.3300000131" Activated="1" RealAddress="13FFD0039"/>
- <Color>008000</Color>
- <VariableType>Float</VariableType>
- <Address>dCusFCamZOffset+8</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13561</ID>
- <Description>""</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <GroupHeader>1</GroupHeader>
- <CheatEntries>
- <CheatEntry>
- <ID>13552</ID>
- <Description>""</Description>
- <LastState Value="" RealAddress="15B1EE90"/>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pFCamOffsets</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13553</ID>
- <Description>"+50"</Description>
- <LastState Value="-12.5851469" RealAddress="15B1EEE0"/>
- <VariableType>Float</VariableType>
- <Address>+50</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13554</ID>
- <Description>"+54"</Description>
- <LastState Value="1.419144511" RealAddress="15B1EEE4"/>
- <VariableType>Float</VariableType>
- <Address>+54</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13555</ID>
- <Description>"+58"</Description>
- <LastState Value="-16.14104843" RealAddress="15B1EEE8"/>
- <VariableType>Float</VariableType>
- <Address>+58</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13556</ID>
- <Description>"+0"</Description>
- <LastState Value="-0.3300000131" RealAddress="13FFD0031"/>
- <VariableType>Float</VariableType>
- <Address>dCusFCamZOffset</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13557</ID>
- <Description>"+4"</Description>
- <LastState Value="-0.3300000131" RealAddress="13FFD0035"/>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13558</ID>
- <Description>"+8"</Description>
- <LastState Value="-0.3300000131" RealAddress="13FFD0039"/>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13559</ID>
- <Description>"+c"</Description>
- <LastState Value="0.02200000174" RealAddress="13FFD003D"/>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13560</ID>
- <Description>"+10"</Description>
- <LastState Value="15" RealAddress="13FFD0041"/>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13565</ID>
- <Description>"+14"</Description>
- <LastState Value="-1" RealAddress="13FFD0045"/>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13566</ID>
- <Description>"+18"</Description>
- <LastState Value="0" RealAddress="13FFD0049"/>
- <VariableType>Float</VariableType>
- <Address>+4</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13209</ID>
- <Description>"character model mod .6"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(charInvReadOnLodAOB,re2.exe,74 ** 48 ** ** 88 00 ** ** 48 ** ** 75 ** 8D ** ** 45 ** ** 48 ** ** E8 ** ** ** ** 31 C0 48 ** ** ** ** 48 ** ** ** 5F C3 8B ** ** 48 ** ** ** ** 48 ** ** ** 5F C3)
- registersymbol(charInvReadOnLodAOB)
- label(bStart)
- registersymbol(bStart)
- label(pCurrentCharacter)
- registersymbol(pCurrentCharacter)
- label(dCurrentCharacter)
- registersymbol(dCurrentCharacter)
- alloc(newmem23,2048,charInvReadOnLodAOB+29) //"re2.exe"+C2EB9E3)
- label(returnhere23)
- label(originalcode23_charInvReadOnLodAOB)
- registersymbol(originalcode23_charInvReadOnLodAOB)
- label(exit23)
- newmem23: //this is allocated memory, you have read,write,execute access
- //place your code here
- xor rdi,rdi //
- mov rbx,bStart
- mov [rbx],rdi
- mov rbx,pCurrentCharacter
- mov [rbx],rdi
- mov rbx,dCurrentCharacter
- //mov eax,[rax+54] //
- mov [rbx],edi
- originalcode23_charInvReadOnLodAOB:
- readmem(charInvReadOnLodAOB+29,8)
- //mov eax,[rax+54]
- //mov rbx,[rsp+30]
- exit23:
- jmp returnhere23
- ///
- bStart:
- dd 0
- pCurrentCharacter:
- dq 0
- dCurrentCharacter:
- dd ffffffff
- ///
- charInvReadOnLodAOB+29: //"re2.exe"+C2EB9E3:
- jmp newmem23
- nop
- nop
- nop
- returnhere23:
- ///*************************************///
- aobscanmodule(charIDReadOnModelLoadAOB,re2.exe,31 C0 48 ** ** ** ** 48 ** ** ** 5F C3 8B ** ** 48 ** ** ** ** 48 ** ** ** 5F C3 8B)
- registersymbol(charIDReadOnModelLoadAOB)
- //label(pCurrentCharacter)
- //registersymbol(pCurrentCharacter)
- //label(dCurrentCharacter)
- //registersymbol(dCurrentCharacter)
- label(pCharacterInfo)
- registersymbol(pCharacterInfo)
- label(dCustomCharacter)
- registersymbol(dCustomCharacter)
- alloc(newmem,2048,charIDReadOnModelLoadAOB+d) //"re2.exe"+E4616C3)
- label(returnhere)
- label(originalcode_charIDReadOnModelLoadAOB)
- registersymbol(originalcode_charIDReadOnModelLoadAOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- //mov rbx,pCharacterInfo
- //mov [rbx],rax
- xor rbx,rbx
- readmem(charIDReadOnModelLoadAOB+d,1)
- db 58
- readmem(charIDReadOnModelLoadAOB+f,1)
- //mov ebx,[rax+54]
- test ebx,ebx
- jl @f
- cmp ebx,5
- jg @f
- mov rdi,dCustomCharacter
- mov ebx,[rdi+rbx*4]
- test ebx,ebx
- cmovge eax,ebx //
- jl @f //
- readmem(charIDReadOnModelLoadAOB+10,5) //
- jmp exit //
- {jl @f
- db 89 58
- readmem(charIDReadOnModelLoadAOB+f,1)
- //mov [rax+54],ebx}
- originalcode_charIDReadOnModelLoadAOB:
- readmem(charIDReadOnModelLoadAOB+d,8)
- //mov eax,[rax+54]
- //mov rbx,[rsp+30]
- exit:
- jmp returnhere
- ///
- //pCurrentCharacter:
- //dq 0
- //dCurrentCharacter:
- //dd ffffffff
- pCharacterInfo:
- dq 0
- dCustomCharacter:
- dd ffffffff //leon
- dd ffffffff //claire
- dd ffffffff //ada
- dd ffffffff //sherry
- dd ffffffff //hunk
- dd ffffffff //tofu
- ///
- charIDReadOnModelLoadAOB+d: //"re2.exe"+E4616C3:
- jmp newmem
- nop
- nop
- nop
- returnhere:
- ///*************************************///
- aobscanmodule(costumeWriteOnLoadOrChangeAOB,re2.exe,74 14 E8 ** ** ** ** 48 ** ** ** 48 ** ** ** 00 0F 85 ** ** ** ** 89 ** ** 48)
- registersymbol(costumeWriteOnLoadOrChangeAOB)
- label(dCustomCostume)
- registersymbol(dCustomCostume)
- alloc(newmem2,2048,costumeWriteOnLoadOrChangeAOB+16) //"re2.exe"+E46D663)
- label(returnhere2)
- label(originalcode2_costumeWriteOnLoadOrChangeAOB)
- registersymbol(originalcode2_costumeWriteOnLoadOrChangeAOB)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- test eax,eax
- jl end2
- cmp eax,3
- jg @f
- push rcx
- mov rcx,dCustomCostume
- mov eax,[rcx+rax*4]
- pop rcx
- test eax,eax
- cmovge ebp,eax
- jmp end2
- @@:
- xor ebp,ebp
- end2:
- originalcode2_costumeWriteOnLoadOrChangeAOB:
- readmem(costumeWriteOnLoadOrChangeAOB+16,7)
- //mov [rdi+54],ebp
- //mov rax,[rbx+50]
- exit2:
- jmp returnhere2
- ///
- dCustomCostume:
- dd ffffffff //leon
- dd ffffffff //claire
- dd ffffffff //ada
- dd ffffffff //sherry
- ///
- costumeWriteOnLoadOrChangeAOB+16: //"re2.exe"+E46D663:
- jmp newmem2
- nop
- nop
- returnhere2:
- ///*************************************///
- aobscanmodule(charIDChk1AOB,re2.exe,48 ** ** ** ** ** ** 48 85 C0 0F 84 ** ** ** ** 48 ** ** ** 48 ** ** 0F 84 ** ** ** ** 39 ** ** 0F 85)
- registersymbol(charIDChk1AOB)
- alloc(newmem4,2048,charIDChk1AOB+1d) //"re2.exe"+D5DDD90)
- label(returnhere4)
- label(originalcode4_charIDChk1AOB)
- registersymbol(originalcode4_charIDChk1AOB)
- label(exit4)
- newmem4: //this is allocated memory, you have read,write,execute access
- //place your code here
- //cmp edi,4
- //je @f
- //push rbx
- //mov rbx,pCurrentCharacter
- //cmp [rbx],rcx
- //pop rbx
- //jne @f
- cmp rsi,1
- jne @f
- push rbx
- mov rbx,pCurrentCharacter
- mov [rbx],rcx
- //push rbx
- mov rbx,dCurrentCharacter
- //mov ebx,[rbx]
- //cmp ebx,edi
- mov [rbx],edi
- pop rbx
- //reassemble(charIDChk1AOB+20)
- //jmp exit4
- @@:
- readmem(charIDChk1AOB+1d,3)
- reassemble(charIDChk1AOB+20)
- jmp exit4
- originalcode4_charIDChk1AOB:
- readmem(charIDChk1AOB+1d,9)
- //cmp [rcx+54],edi
- //jne re2.exe+D5DDCA2
- exit4:
- jmp returnhere4
- ///
- ///
- charIDChk1AOB+1d: //"re2.exe"+D5DDD90:
- jmp newmem4
- nop
- nop
- nop
- nop
- returnhere4:
- ///*************************************///
- aobscanmodule(charIDReadOnModelLoadForStanceAOB,re2.exe,75 ** 48 ** ** ** 48 ** ** 8B ** ** 48 85 C0 74 ** 8B ** ** E8)
- registersymbol(charIDReadOnModelLoadForStanceAOB)
- label(dCustomStance)
- registersymbol(dCustomStance)
- alloc(newmem24,2048,charIDReadOnModelLoadForStanceAOB+11) //"re2.exe"+C23D28A)
- label(returnhere24)
- label(originalcode24_charIDReadOnModelLoadForStanceAOB)
- registersymbol(originalcode24_charIDReadOnModelLoadForStanceAOB)
- label(exit24)
- newmem24: //this is allocated memory, you have read,write,execute access
- //place your code here
- //mov rdx,pCharacterInfo
- //mov [rdx],rax
- mov rdx,pCurrentCharacter
- mov [rdx],rax
- xor rdx,rdx
- readmem(charIDReadOnModelLoadForStanceAOB+11,3)
- //mov edx,[rax+54]
- mov rax,dCurrentCharacter
- mov [rax],edx
- mov rax,dCustomStance
- mov eax,[rax]
- test eax,eax
- cmovge edx,eax
- xor rax,rax
- end24:
- reassemble(charIDReadOnModelLoadForStanceAOB+14)
- //call re2.exe+149C610
- jmp exit24
- originalcode24_charIDReadOnModelLoadForStanceAOB:
- readmem(charIDReadOnModelLoadForStanceAOB+11,8)
- //mov edx,[rax+54]
- //call re2.exe+149C610
- exit24:
- jmp returnhere24
- ///
- dCustomStance:
- dd ffffffff
- ///
- charIDReadOnModelLoadForStanceAOB+11: //"re2.exe"+C23D28A:
- jmp newmem24
- nop
- nop
- nop
- returnhere24:
- ///*************************************///
- luaCall(lua_aobscan("charIDReadForLoadoutOnLoadAOB","re2.exe","48 ** ** ** 48 ** ** ** 48 ** ** 48 ** ** ** 00 74 08 31 C0 48 ** ** ** 5F C3 48 ** ** ** ** 45 ** ** 8B ** ** 48",2))
- alloc(newmem25,2048,charIDReadForLoadoutOnLoadAOB+1f) //"re2.exe"+950EAC1)
- label(returnhere25)
- label(originalcode25_charIDReadForLoadoutOnLoadAOB)
- registersymbol(originalcode25_charIDReadForLoadoutOnLoadAOB)
- label(exit25)
- newmem25: //this is allocated memory, you have read,write,execute access
- //place your code here
- readmem(charIDReadForLoadoutOnLoadAOB+1f,6)
- //xor r8d,r8d
- //mov ebx,[rdx+54]
- push rcx
- mov rcx,bStart
- cmp dword ptr [rcx],0
- je @f
- mov rcx,pCurrentCharacter
- cmp [rcx],rdx
- jne @f
- mov rcx,dCustomStance
- mov ecx,[rcx]
- test ecx,ecx
- cmovge ebx,ecx
- end25:
- mov rcx,bStart
- inc dword ptr [rcx]
- pop rcx
- jmp exit25
- originalcode25_charIDReadForLoadoutOnLoadAOB:
- readmem(charIDReadForLoadoutOnLoadAOB+1f,6)
- //xor r8d,r8d
- //mov ebx,[rdx+54]
- exit25:
- jmp returnhere25
- ///
- charIDReadForLoadoutOnLoadAOB+1f: //"re2.exe"+950EAC1:
- jmp newmem25
- nop
- returnhere25:
- ///*************************************///
- aobscanmodule(charIDReadForLoadoutOnCutsceneEndAOB,re2.exe,4C ** ** ** 48 ** ** 49 ** ** ** ** ** ** 48 ** ** 0F 84 ** ** ** ** 8B ** ** 45 ** ** 48)
- registersymbol(charIDReadForLoadoutOnCutsceneEndAOB)
- alloc(newmem26,2048,charIDReadForLoadoutOnCutsceneEndAOB+17) //"re2.exe"+BFD2E06)
- label(returnhere26)
- label(originalcode26_charIDReadForLoadoutOnCutsceneEndAOB)
- registersymbol(originalcode26_charIDReadForLoadoutOnCutsceneEndAOB)
- label(exit26)
- newmem26: //this is allocated memory, you have read,write,execute access
- //place your code here
- readmem(charIDReadForLoadoutOnCutsceneEndAOB+17,6)
- //mov edi,[rax+54]
- //xor r8d,r8d
- mov rdx,pCurrentCharacter
- cmp [rdx],rax
- jne @f
- mov rdx,dCustomStance
- mov edx,[rdx]
- test edx,edx
- cmovge edi,edx
- end26:
- jmp exit26
- originalcode26_charIDReadForLoadoutOnCutsceneEndAOB:
- readmem(charIDReadForLoadoutOnCutsceneEndAOB+17,6)
- //mov edi,[rax+54]
- //xor r8d,r8d
- exit26:
- jmp returnhere26
- ///
- charIDReadForLoadoutOnCutsceneEndAOB+17: //"re2.exe"+BFD2E06:
- jmp newmem26
- nop
- returnhere26:
- ///*************************************///
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem23)
- charInvReadOnLodAOB+29: //"re2.exe"+C2EB9E3:
- readmem(originalcode23_charInvReadOnLodAOB,8)
- //db 8B 40 54 48 8B 5C 24 30
- //Alt: mov eax,[rax+54]
- //Alt: mov rbx,[rsp+30]
- unregistersymbol(originalcode23_charInvReadOnLodAOB)
- unregistersymbol(bStart)
- unregistersymbol(pCurrentCharacter)
- unregistersymbol(dCurrentCharacter)
- ///*************************************///
- dealloc(newmem)
- charIDReadOnModelLoadAOB+d: //"re2.exe"+E4616C3:
- readmem(originalcode_charIDReadOnModelLoadAOB,8)
- //db 8B 40 54 48 8B 5C 24 30
- //Alt: mov eax,[rax+54]
- //Alt: mov rbx,[rsp+30]
- unregistersymbol(originalcode_charIDReadOnModelLoadAOB)
- //unregistersymbol(pCurrentCharacter)
- //unregistersymbol(dCurrentCharacter)
- unregistersymbol(pCharacterInfo)
- unregistersymbol(dCustomCharacter)
- ///*************************************///
- dealloc(newmem2)
- costumeWriteOnLoadOrChangeAOB+16: //"re2.exe"+E46D663:
- readmem(originalcode2_costumeWriteOnLoadOrChangeAOB,7)
- //db 89 6F 54 48 8B 43 50
- //Alt: mov [rdi+54],ebp
- //Alt: mov rax,[rbx+50]
- unregistersymbol(originalcode2_costumeWriteOnLoadOrChangeAOB)
- unregistersymbol(dCustomCostume)
- ///*************************************///
- dealloc(newmem4)
- charIDChk1AOB+1d: //"re2.exe"+D5DDD90:
- readmem(originalcode4_charIDChk1AOB,9)
- //db 39 79 54 0F 85 09 FF FF FF
- //Alt: cmp [rcx+54],edi
- //Alt: jne re2.exe+D5DDCA2
- unregistersymbol(originalcode4_charIDChk1AOB)
- ///*************************************///
- dealloc(newmem24)
- charIDReadOnModelLoadForStanceAOB+11: //"re2.exe"+C23D28A:
- readmem(originalcode24_charIDReadOnModelLoadForStanceAOB,8)
- //db 8B 50 54 E8 7E F3 25 F5
- //Alt: mov edx,[rax+54]
- //Alt: call re2.exe+149C610
- unregistersymbol(originalcode24_charIDReadOnModelLoadForStanceAOB)
- unregistersymbol(dCustomStance)
- ///*************************************///
- dealloc(newmem25)
- charIDReadForLoadoutOnLoadAOB+1f: //"re2.exe"+950EAC1:
- readmem(originalcode25_charIDReadForLoadoutOnLoadAOB,6)
- //db 45 31 C0 8B 5A 54
- //Alt: xor r8d,r8d
- //Alt: mov ebx,[rdx+54]
- unregistersymbol(originalcode25_charIDReadForLoadoutOnLoadAOB)
- ///*************************************///
- dealloc(newmem26)
- charIDReadForLoadoutOnCutsceneEndAOB+17: //"re2.exe"+BFD2E06:
- readmem(originalcode26_charIDReadForLoadoutOnCutsceneEndAOB,6)
- //db 8B 78 54 45 31 C0
- //Alt: mov edi,[rax+54]
- //Alt: xor r8d,r8d
- unregistersymbol(originalcode26_charIDReadForLoadoutOnCutsceneEndAOB)
- ///*************************************///
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13245</ID>
- <Description>"custom stance"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>dCustomStance</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13455</ID>
- <Description>"for controlling character"</Description>
- <LastState Value="" RealAddress="00000000"/>
- <Color>808080</Color>
- <GroupHeader>1</GroupHeader>
- </CheatEntry>
- <CheatEntry>
- <ID>13571</ID>
- <Description>"MUST reload after changes"</Description>
- <LastState Value="" RealAddress="00000000"/>
- <Color>808080</Color>
- <GroupHeader>1</GroupHeader>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13210</ID>
- <Description>"[custom character]"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>dCustomCharacter</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13211</ID>
- <Description>"Leon"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+0*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13212</ID>
- <Description>"Claire"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+1*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13213</ID>
- <Description>"Ada"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+2*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13214</ID>
- <Description>"Sherry"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+3*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13215</ID>
- <Description>"HUNK"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+4*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13216</ID>
- <Description>"Tofu"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">ffffffff:default
- 00000000:Leon Scott Kennedy
- 00000001:Claire Redfield
- 00000002:Ada Wong
- 00000003:Sherry Birkin
- 00000004:HUNK
- 00000005:Tofu
- 00000006:Robert Kendo (Gun Shop Owner)
- 00000007:Brian Irons (Chief of Police)
- 00000008:Ben Bertolucci (Journalist)
- 00000009:Annette Birkin
- 0000000a:Chris Redfield
- 0000000D:Marvin Branagh
- 00000010:William Broken
- 00000014:Katherine Warren
- 0000001B:RPD Pilot
- 0000001D:Truck Driver
- 0000001E:Woman that Truck Driver hits
- 0000001F:Cop in Gas Station
- 00000020:First zombie in gas station with missing face texture
- 00000021:Emma Kendo
- 00000022:RPD Elliot with Entrails buttflap
- 00000024:Gas Station clerk
- 00000025:Officer in west hallway with cheek torn open. Broken textures
- 00000027:Male Generic Zombie A
- 00000028:G-infected Zombie torched by Annette
- 00000029:Some guy in a lab coat
- 0000002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+5*4</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13217</ID>
- <Description>"[costumes]"</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <ShowAsHex>1</ShowAsHex>
- <Color>000080</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>dCustomCostume</Address>
- <CheatEntries>
- <CheatEntry>
- <ID>13218</ID>
- <Description>"Leon"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">FFFFFFFF:default
- 00000000:Leon Casual
- 00000001:Leon Police (Clean)
- 00000002:Leon Police (Dirty)
- 00000003:Leon Police Injured (Clean)
- 00000004:Leon Police Injured (Dirty)
- 00000005:Leon C. Police 1
- 00000006:Leon C. Police 2
- 00000007:Leon C. Police 3
- 00000008:Leon C. Police Injured 1
- 00000009:Leon C. Police Injured 2
- 0000000A:Noir
- 0000000B:Arklay Sheriff
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+0*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13219</ID>
- <Description>"Claire"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">FFFFFFFF:default
- 00000000:Claire Jacket (Clean)
- 00000001:Claire Jacket (Slight Dirty)
- 00000002:Claire Jacket (Dirty)
- 00000003:Claire Tank Top (Slight Dirty)
- 00000004:Claire Tank Top (Dirty)
- 00000005:Claire C. Jacket 1
- 00000006:Claire C. Jacket 2
- 00000007:Claire C. Jacket 3
- 00000008:Claire C. No Jacket 1
- 00000009:Claire C. No Jacket 2
- 0000000A:Noir
- 0000000B:Military
- 0000000C:Elza Walker
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+1*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13220</ID>
- <Description>"Ada"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">FFFFFFFF:default
- 00000000:Coat
- 00000001:without Coat
- 00000002:Injured
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+2*4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13221</ID>
- <Description>"Sherry"</Description>
- <DropDownList DescriptionOnly="1" DisplayValueAsItem="1">FFFFFFFF:default
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>+3*4</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13238</ID>
- <Description>"debug"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FFFFFF</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- {aobscanmodule(charIDChk1AOB,re2.exe,48 ** ** ** ** ** ** 48 85 C0 0F 84 ** ** ** ** 48 ** ** ** 48 ** ** 0F 84 ** ** ** ** 39 ** ** 0F 85)
- registersymbol(charIDChk1AOB)
- alloc(newmem,2048,charIDChk1AOB+1d) //"re2.exe"+D5DDD90)
- label(returnhere)
- label(originalcode_charIDChk1AOB)
- registersymbol(originalcode_charIDChk1AOB)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- //cmp edi,4
- //je @f
- push rbx
- mov rbx,pCharacterInfo
- mov [rbx],rcx
- pop rbx
- @@:
- readmem(charIDChk1AOB+1d,3)
- reassemble(charIDChk1AOB+20)
- jmp exit
- originalcode_charIDChk1AOB:
- readmem(charIDChk1AOB+1d,9)
- //cmp [rcx+54],edi
- //jne re2.exe+D5DDCA2
- exit:
- jmp returnhere
- ///
- charIDChk1AOB+1d: //"re2.exe"+D5DDD90:
- jmp newmem
- nop
- nop
- nop
- nop
- returnhere:}
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- {dealloc(newmem)
- charIDChk1AOB+1d: //"re2.exe"+D5DDD90:
- readmem(originalcode_charIDChk1AOB,9)
- //db 39 79 54 0F 85 09 FF FF FF
- //Alt: cmp [rcx+54],edi
- //Alt: jne re2.exe+D5DDCA2
- unregistersymbol(originalcode_charIDChk1AOB)}
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13236</ID>
- <Description>""</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <Color>FFFFFF</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pCharacterInfo</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13237</ID>
- <Description>"char ID"</Description>
- <DropDownList DisplayValueAsItem="1">0000:Leon Scott Kennedy
- 0001:Claire Redfield
- 0002:Ada Wong
- 0003:Sherry Birkin
- 0004:HUNK
- 0005:Tofu
- 0006:Robert Kendo (Gun Shop Owner)
- 0007:Brian Irons (Chief of Police)
- 0008:Ben Bertolucci (Journalist)
- 0009:Annette Birkin
- 000a:Chris Redfield
- 000D:Marvin Branagh
- 0010:William Broken
- 0014:Katherine Warren
- 001B:RPD Pilot from crashed helicopter
- 001D:Truck Driver
- 001E:Woman that Truck Driver hits
- 001F:Cop in Gas Station
- 0020:First zombie in gas station with missing face texture
- 0021:Emma Kendo (With weird skeleton. Because of Leon base?)
- 0022:RPD Elliot with Entrails buttflap
- 0024:Gas Station clerk
- 0025:Officer in west hallway with cheek torn open. Broken textures
- 0027:Male Generic Zombie A
- 0028:G-infected Zombie torched by Annette
- 0029:Some guy in a lab coat
- 002A:Unknown character
- </DropDownList>
- <ShowAsHex>1</ShowAsHex>
- <Color>808080</Color>
- <VariableType>2 Bytes</VariableType>
- <Address>+54</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13450</ID>
- <Description>""</Description>
- <LastState Value="" RealAddress="00000000"/>
- <Color>FFFFFF</Color>
- <VariableType>Array of byte</VariableType>
- <ByteLength>0</ByteLength>
- <Address>pCurrentCharacter</Address>
- <Offsets>
- <Offset>0</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13451</ID>
- <Description>""</Description>
- <Color>FFFFFF</Color>
- <VariableType>Byte</VariableType>
- <Address>+54</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13452</ID>
- <Description>""</Description>
- <Color>FFFFFF</Color>
- <VariableType>Byte</VariableType>
- <Address>dCurrentCharacter</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13134</ID>
- <Description>"save count (edited) (cjbok)"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- aobscanmodule(SaveCountAOB,re2.exe,01 89 41 24 48 8B 43 50) // should be unique
- label(dCustSaveCount)
- registersymbol(dCustSaveCount)
- alloc(SaveCountMem,$1000,"re2.exe"+ADE1B7E)
- registersymbol(SaveCountAOB)
- label(return)
- SaveCountMem:
- mov rax,dCustSaveCount
- mov eax,[rax]
- mov [rcx+24],eax
- mov rax,[rbx+50]
- jmp return
- ///
- dCustSaveCount:
- dd #3
- ///
- SaveCountAOB+01:
- jmp SaveCountMem
- nop
- nop
- return:
- [DISABLE]
- SaveCountAOB+01:
- //mov [rcx+24],eax
- //mov rax,[rbx+50]
- db 89 41 24 48 8B 43 50
- unregistersymbol(SaveCountAOB)
- dealloc(SaveCountMem)
- unregistersymbol(dCustSaveCount)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13572</ID>
- <Description>"#"</Description>
- <Color>008000</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>dCustSaveCount</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13050</ID>
- <Description>"max pouch slots (cjbok)"</Description>
- <LastState Activated="1"/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- aobscanmodule(PouchSlotCountAOB,re2.exe,F5 45 31 ED EB 07 44 8B A8 90 00 00 00) // should be unique
- alloc(PouchSlotCountMem,$1000,"re2.exe"+C715653)
- registersymbol(PouchSlotCountAOB)
- label(PouchSlotCountRet)
- PouchSlotCountMem:
- mov [rax+00000090],#20
- mov r13d,[rax+00000090]
- jmp PouchSlotCountRet
- PouchSlotCountAOB+06:
- jmp PouchSlotCountMem
- nop
- nop
- PouchSlotCountRet:
- [DISABLE]
- PouchSlotCountAOB+06:
- //mov r13d,[rax+00000090]
- db 44 8B A8 90 00 00 00
- unregistersymbol(PouchSlotCountAOB)
- dealloc(PouchSlotCountMem)
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>13135</ID>
- <Description>"Game Time (cjbok)"</Description>
- <Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- aobscanmodule(GameTimeAOB,re2.exe,48 8B 43 50 4C 39 70 18 0F 85 78 02 00 00 48 8B 4F)
- alloc(GameTimeMem,512,"re2.exe"+AD9D8CE)
- registersymbol(GameTimeAOB)
- label(calculate)
- label(GameTimeRet)
- label(pTime)
- label(bSetGameTime)
- label(iSetTime)
- label(fCurTime)
- registersymbol(pTime)
- registersymbol(bSetGameTime)
- registersymbol(iSetTime)
- registersymbol(fCurTime)
- GameTimeMem:
- mov [pTime],rax // Game Time Timer Pointer
- cmp [bSetGameTime],1
- jne calculate
- push rax
- mov rax,[iSetTime]
- mov rdx,0
- mov rcx,#60000000
- mul rcx
- mov rdx,rax
- pop rax
- mov [rax+18],rdx
- mov [rax+20],0
- mov [rax+30],0
- mov rbp,0
- // Formula:
- // (Current Time - Start Time - Pause Time) / 1.000.000 = Game Time in seconds
- calculate:
- push rdx
- push rcx
- mov rdx,[rax+18] // Current Time
- sub rdx,[rax+20] // Start Time
- sub rdx,[rax+30] // Pause Time
- mov rax,rdx
- mov rdx,0
- mov rcx,#1000000
- div rcx
- mov [fCurTime],rax
- pop rcx
- pop rdx
- mov rax,[rbx+50]
- cmp [rax+18],r14
- jmp GameTimeRet
- pTime:
- dq 0
- bSetGameTime:
- dq 0
- iSetTime:
- dq #60
- fCurTime:
- dq 0
- GameTimeAOB:
- jmp GameTimeMem
- nop
- nop
- nop
- GameTimeRet:
- [DISABLE]
- GameTimeAOB:
- //mov rax,[rbx+50]
- //cmp [rax+18],r14
- db 48 8B 43 50 4C 39 70 18
- unregistersymbol(pTime)
- unregistersymbol(bSetGameTime)
- unregistersymbol(iSetTime)
- unregistersymbol(fCurTime)
- unregistersymbol(GameTimeAOB)
- dealloc(GameTimeMem)
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13072</ID>
- <Description>"Set Game Time"</Description>
- <Options moHideChildren="1"/>
- <LastState/>
- <Color>FF0000</Color>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- bSetGameTime:
- dq 1
- [DISABLE]
- bSetGameTime:
- dq 0
- </AssemblerScript>
- <CheatEntries>
- <CheatEntry>
- <ID>13073</ID>
- <Description>"Time In Minutes"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>iSetTime</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13136</ID>
- <Description>"Current Time"</Description>
- <Color>808080</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>pTime</Address>
- <Offsets>
- <Offset>18</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>13137</ID>
- <Description>"Start Time"</Description>
- <Color>808080</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>pTime</Address>
- <Offsets>
- <Offset>20</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>13138</ID>
- <Description>"Pause Time"</Description>
- <Color>808080</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>pTime</Address>
- <Offsets>
- <Offset>30</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>13071</ID>
- <Description>"Game Time (seconds)"</Description>
- <Color>808080</Color>
- <VariableType>8 Bytes</VariableType>
- <Address>fCurTime</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13022</ID>
- <Description>""</Description>
- <Options moHideChildren="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <GroupHeader>1</GroupHeader>
- <CheatEntries>
- <CheatEntry>
- <ID>13014</ID>
- <Description>"health"</Description>
- <LastState Value="650" RealAddress="1556B9C8"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>pPlayer</Address>
- <Offsets>
- <Offset>58</Offset>
- </Offsets>
- <Hotkeys>
- <Hotkey>
- <Action>Set Value</Action>
- <Keys>
- <Key>18</Key>
- <Key>4</Key>
- </Keys>
- <Value>(health max)</Value>
- <ID>0</ID>
- </Hotkey>
- </Hotkeys>
- <CheatEntries>
- <CheatEntry>
- <ID>13015</ID>
- <Description>"health max"</Description>
- <LastState Value="1200" RealAddress="1556B9C4"/>
- <Color>0000FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>-4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13058</ID>
- <Description>"god (auto reset)"</Description>
- <LastState Value="0" RealAddress="1556B9CC"/>
- <Color>0000FF</Color>
- <VariableType>Byte</VariableType>
- <Address>+4</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13059</ID>
- <Description>"god"</Description>
- <LastState Value="0" RealAddress="1556B9CD"/>
- <Color>0000FF</Color>
- <VariableType>Byte</VariableType>
- <Address>+5</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13016</ID>
- <Description>"current clip"</Description>
- <LastState Value="15" RealAddress="153AB330"/>
- <Color>8080FF</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>pAmmo</Address>
- <Offsets>
- <Offset>20</Offset>
- </Offsets>
- <CheatEntries>
- <CheatEntry>
- <ID>13017</ID>
- <Description>"clip max"</Description>
- <LastState Value="15" RealAddress="156A100DD"/>
- <Color>808080</Color>
- <VariableType>4 Bytes</VariableType>
- <Address>dAmmoClipMax</Address>
- </CheatEntry>
- <CheatEntry>
- <ID>13018</ID>
- <Description>""</Description>
- <LastState Value="1" RealAddress="156A100D5"/>
- <Color>808080</Color>
- <VariableType>Byte</VariableType>
- <Address>pAmmo+8</Address>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>13498</ID>
- <Description>"x +-"</Description>
- <LastState Value="-12.20088291" RealAddress="1536B150"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>pPlayerBase</Address>
- <Offsets>
- <Offset>30</Offset>
- <Offset>18</Offset>
- <Offset>10</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>13499</ID>
- <Description>"z +-"</Description>
- <LastState Value="2.980232239E-8" RealAddress="1536B154"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>pPlayerBase</Address>
- <Offsets>
- <Offset>34</Offset>
- <Offset>18</Offset>
- <Offset>10</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>13500</ID>
- <Description>"y -+"</Description>
- <LastState Value="-15.85340023" RealAddress="1536B158"/>
- <Color>0000FF</Color>
- <VariableType>Float</VariableType>
- <Address>pPlayerBase</Address>
- <Offsets>
- <Offset>38</Offset>
- <Offset>18</Offset>
- <Offset>10</Offset>
- </Offsets>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- </CheatEntries>
- <CheatCodes>
- <CodeEntry>
- <Description>Code :mov esi,[rcx+20]</Description>
- <AddressString>re2.exe+FFCD9CD</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>71</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>89</Byte>
- <Byte>FE</Byte>
- <Byte>4D</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rcx+20]</Description>
- <AddressString>re2.exe+FFDEEF0</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>41</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>89</Byte>
- <Byte>F8</Byte>
- <Byte>4D</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ecx,[rdx+20]</Description>
- <AddressString>re2.exe+FFDEF61</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>D2</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>4A</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>89</Byte>
- <Byte>F9</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rsp+10],rbx</Description>
- <AddressString>re2.exe+F4D91C0</AddressString>
- <Before>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>57</Byte>
- <Byte>48</Byte>
- <Byte>83</Byte>
- <Byte>EC</Byte>
- <Byte>40</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rsp+20],rbx</Description>
- <AddressString>re2.exe+FFCD760</AddressString>
- <Before>
- <Byte>0F</Byte>
- <Byte>1F</Byte>
- <Byte>44</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>57</Byte>
- <Byte>41</Byte>
- <Byte>56</Byte>
- <Byte>41</Byte>
- <Byte>57</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rcx+20]</Description>
- <AddressString>re2.exe+D984BA5</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>41</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>31</Byte>
- <Byte>C0</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,esi</Description>
- <AddressString>re2.exe+F8F8710</AddressString>
- <Before>
- <Byte>E9</Byte>
- <Byte>C0</Byte>
- <Byte>17</Byte>
- <Byte>4A</Byte>
- <Byte>F2</Byte>
- </Before>
- <Actual>
- <Byte>41</Byte>
- <Byte>89</Byte>
- <Byte>F0</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>C2</Byte>
- <Byte>E8</Byte>
- <Byte>C5</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rsi+10],r14d</Description>
- <AddressString>re2.exe+C94AF58</AddressString>
- <Before>
- <Byte>78</Byte>
- <Byte>18</Byte>
- <Byte>00</Byte>
- <Byte>75</Byte>
- <Byte>1F</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>89</Byte>
- <Byte>76</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>45</Byte>
- <Byte>50</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbp+00000098],r14d</Description>
- <AddressString>re2.exe+3CC50BB</AddressString>
- <Before>
- <Byte>B5</Byte>
- <Byte>90</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>89</Byte>
- <Byte>B5</Byte>
- <Byte>98</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>88</Byte>
- <Byte>8D</Byte>
- <Byte>A0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbp+000000A8],r8d</Description>
- <AddressString>re2.exe+3CC45C4</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>A0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>89</Byte>
- <Byte>85</Byte>
- <Byte>A8</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>88</Byte>
- <Byte>95</Byte>
- <Byte>B0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbp+00000098],r8d</Description>
- <AddressString>re2.exe+3C42C04</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>90</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>89</Byte>
- <Byte>85</Byte>
- <Byte>98</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>88</Byte>
- <Byte>8D</Byte>
- <Byte>A0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov rcx,[rdi+58]</Description>
- <AddressString>re2.exe+D6B723E</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>03</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>4F</Byte>
- <Byte>58</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>75</Byte>
- <Byte>12</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ebx,[rcx+20]</Description>
- <AddressString>re2.exe+10046882</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>03</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>59</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>89</Byte>
- <Byte>D8</Byte>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov esi,[rcx+20]</Description>
- <AddressString>re2.exe+10047153</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>71</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>89</Byte>
- <Byte>DE</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov esi,[rcx+20]</Description>
- <AddressString>re2.exe+1004705D</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>71</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>89</Byte>
- <Byte>DE</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov rsi,[rcx+18]</Description>
- <AddressString>re2.exe+A8D5D6B</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>04</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>71</Byte>
- <Byte>18</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>F0</Byte>
- <Byte>E9</Byte>
- <Byte>77</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov edx,[rcx+10]</Description>
- <AddressString>re2.exe+1005AB98</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>51</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>02</Byte>
- <Byte>89</Byte>
- <Byte>F2</Byte>
- <Byte>39</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ebp,[rax+10]</Description>
- <AddressString>re2.exe+A92B69B</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C0</Byte>
- <Byte>74</Byte>
- <Byte>03</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>68</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>50</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :movss [rdi+30],xmm2</Description>
- <AddressString>re2.exe+2104505</AddressString>
- <Before>
- <Byte>41</Byte>
- <Byte>0F</Byte>
- <Byte>58</Byte>
- <Byte>46</Byte>
- <Byte>08</Byte>
- </Before>
- <Actual>
- <Byte>F3</Byte>
- <Byte>0F</Byte>
- <Byte>11</Byte>
- <Byte>57</Byte>
- <Byte>30</Byte>
- </Actual>
- <After>
- <Byte>F3</Byte>
- <Byte>0F</Byte>
- <Byte>11</Byte>
- <Byte>4F</Byte>
- <Byte>34</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rsp+28],al</Description>
- <AddressString>re2.exe+EE8A8FF</AddressString>
- <Before>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>0F</Byte>
- <Byte>98</Byte>
- <Byte>D0</Byte>
- </Before>
- <Actual>
- <Byte>88</Byte>
- <Byte>44</Byte>
- <Byte>24</Byte>
- <Byte>28</Byte>
- </Actual>
- <After>
- <Byte>C6</Byte>
- <Byte>44</Byte>
- <Byte>24</Byte>
- <Byte>20</Byte>
- <Byte>01</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov rcx,[rbx+50]</Description>
- <AddressString>re2.exe+985FFB1</AddressString>
- <Before>
- <Byte>E8</Byte>
- <Byte>3F</Byte>
- <Byte>42</Byte>
- <Byte>96</Byte>
- <Byte>F7</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>4B</Byte>
- <Byte>50</Byte>
- </Actual>
- <After>
- <Byte>31</Byte>
- <Byte>D2</Byte>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov rdx,rax</Description>
- <AddressString>re2.exe+BFCEECA</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C0</Byte>
- <Byte>74</Byte>
- <Byte>69</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>C2</Byte>
- </Actual>
- <After>
- <Byte>E8</Byte>
- <Byte>5E</Byte>
- <Byte>5C</Byte>
- <Byte>1F</Byte>
- <Byte>F5</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov rax,[rbx+50]</Description>
- <AddressString>re2.exe+CBA0721</AddressString>
- <Before>
- <Byte>87</Byte>
- <Byte>F8</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>50</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>48</Byte>
- <Byte>18</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,00000002</Description>
- <AddressString>re2.exe+CBA0609</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>41</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>41</Byte>
- <Byte>B8</Byte>
- <Byte>02</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>C2</Byte>
- <Byte>E8</Byte>
- <Byte>49</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,00000001</Description>
- <AddressString>re2.exe+CBA059F</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>AB</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>41</Byte>
- <Byte>B8</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>C2</Byte>
- <Byte>E8</Byte>
- <Byte>B3</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,00000003</Description>
- <AddressString>re2.exe+CBA05D4</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>76</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>41</Byte>
- <Byte>B8</Byte>
- <Byte>03</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>C2</Byte>
- <Byte>E8</Byte>
- <Byte>7E</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rbx+7C]</Description>
- <AddressString>re2.exe+B9766D3</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>3C</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>7C</Byte>
- </Actual>
- <After>
- <Byte>89</Byte>
- <Byte>46</Byte>
- <Byte>7C</Byte>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rsi+10],r14d</Description>
- <AddressString>re2.exe+B79C798</AddressString>
- <Before>
- <Byte>78</Byte>
- <Byte>18</Byte>
- <Byte>00</Byte>
- <Byte>75</Byte>
- <Byte>1F</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>89</Byte>
- <Byte>76</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>45</Byte>
- <Byte>50</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbx+1C],eax</Description>
- <AddressString>re2.exe+20C03A3</AddressString>
- <Before>
- <Byte>03</Byte>
- <Byte>C5</Byte>
- <Byte>41</Byte>
- <Byte>8B</Byte>
- <Byte>D6</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>43</Byte>
- <Byte>1C</Byte>
- </Actual>
- <After>
- <Byte>E8</Byte>
- <Byte>D5</Byte>
- <Byte>16</Byte>
- <Byte>FB</Byte>
- <Byte>FF</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r15d,[rdx+00000098]</Description>
- <AddressString>re2.exe+ACD6B56</AddressString>
- <Before>
- <Byte>50</Byte>
- <Byte>44</Byte>
- <Byte>8D</Byte>
- <Byte>76</Byte>
- <Byte>FF</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>8B</Byte>
- <Byte>BA</Byte>
- <Byte>98</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>15</Byte>
- <Byte>74</Byte>
- <Byte>39</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rdi+00000098],eax</Description>
- <AddressString>re2.exe+ACD5FC5</AddressString>
- <Before>
- <Byte>8F</Byte>
- <Byte>E0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>87</Byte>
- <Byte>98</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>15</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbx+00000088],eax</Description>
- <AddressString>re2.exe+E46DA3C</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>DF</Byte>
- <Byte>02</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>83</Byte>
- <Byte>88</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>A9</Byte>
- <Byte>FD</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rbx+00000088]</Description>
- <AddressString>re2.exe+E46DD0F</AddressString>
- <Before>
- <Byte>E8</Byte>
- <Byte>C1</Byte>
- <Byte>A7</Byte>
- <Byte>94</Byte>
- <Byte>F3</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>83</Byte>
- <Byte>88</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>89</Byte>
- <Byte>83</Byte>
- <Byte>A0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rbx+000000A0]</Description>
- <AddressString>re2.exe+AFB41BA</AddressString>
- <Before>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- <Byte>75</Byte>
- <Byte>14</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>83</Byte>
- <Byte>A0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>85</Byte>
- <Byte>C0</Byte>
- <Byte>74</Byte>
- <Byte>05</Byte>
- <Byte>83</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbx+000000A0],eax</Description>
- <AddressString>re2.exe+AFB44A5</AddressString>
- <Before>
- <Byte>83</Byte>
- <Byte>88</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>83</Byte>
- <Byte>A0</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>4C</Byte>
- <Byte>8B</Byte>
- <Byte>7C</Byte>
- <Byte>24</Byte>
- <Byte>20</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rbx],eax 0,3,5,7</Description>
- <AddressString>re2.exe+DBAAF6D</AddressString>
- <Before>
- <Byte>E3</Byte>
- <Byte>04</Byte>
- <Byte>48</Byte>
- <Byte>01</Byte>
- <Byte>CB</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>03</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>3B</Byte>
- <Byte>7B</Byte>
- <Byte>08</Byte>
- <Byte>74</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8,[r13+00000090]</Description>
- <AddressString>re2.exe+1CF9E20</AddressString>
- <Before>
- <Byte>E9</Byte>
- <Byte>CE</Byte>
- <Byte>09</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>4D</Byte>
- <Byte>8B</Byte>
- <Byte>85</Byte>
- <Byte>90</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>4D</Byte>
- <Byte>85</Byte>
- <Byte>C0</Byte>
- <Byte>75</Byte>
- <Byte>17</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>menu change flag chk Code :cmp [rax+18],r12d</Description>
- <AddressString>re2.exe+1CF9E55</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C0</Byte>
- <Byte>74</Byte>
- <Byte>D7</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>39</Byte>
- <Byte>60</Byte>
- <Byte>18</Byte>
- </Actual>
- <After>
- <Byte>7F</Byte>
- <Byte>0D</Byte>
- <Byte>33</Byte>
- <Byte>FF</Byte>
- <Byte>41</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp [r15+000000BC],ebx</Description>
- <AddressString>re2.exe+C929B1A</AddressString>
- <Before>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>75</Byte>
- <Byte>0D</Byte>
- </Before>
- <Actual>
- <Byte>41</Byte>
- <Byte>39</Byte>
- <Byte>9F</Byte>
- <Byte>BC</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>0F</Byte>
- <Byte>84</Byte>
- <Byte>6B</Byte>
- <Byte>03</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [r15+000000BC],ebx</Description>
- <AddressString>re2.exe+C929EA7</AddressString>
- <Before>
- <Byte>78</Byte>
- <Byte>18</Byte>
- <Byte>00</Byte>
- <Byte>75</Byte>
- <Byte>07</Byte>
- </Before>
- <Actual>
- <Byte>41</Byte>
- <Byte>89</Byte>
- <Byte>9F</Byte>
- <Byte>BC</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Actual>
- <After>
- <Byte>4C</Byte>
- <Byte>8B</Byte>
- <Byte>64</Byte>
- <Byte>24</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp [rdi+54],esi</Description>
- <AddressString>re2.exe+BB15931</AddressString>
- <Before>
- <Byte>E9</Byte>
- <Byte>9F</Byte>
- <Byte>C0</Byte>
- <Byte>2B</Byte>
- <Byte>F6</Byte>
- </Before>
- <Actual>
- <Byte>39</Byte>
- <Byte>77</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>74</Byte>
- <Byte>27</Byte>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>FA</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rdi+54],ebp</Description>
- <AddressString>re2.exe+E46D663</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>81</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>6F</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>50</Byte>
- <Byte>48</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rax+54]</Description>
- <AddressString>re2.exe+8F11C73</AddressString>
- <Before>
- <Byte>83</Byte>
- <Byte>C4</Byte>
- <Byte>20</Byte>
- <Byte>5F</Byte>
- <Byte>C3</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>40</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>30</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rax+14]</Description>
- <AddressString>re2.exe+B7FBF47</AddressString>
- <Before>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>EB</Byte>
- <Byte>03</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>40</Byte>
- <Byte>14</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>40</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ecx,[rax+14]</Description>
- <AddressString>re2.exe+B7FBD3D</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>03</Byte>
- <Byte>02</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>48</Byte>
- <Byte>14</Byte>
- </Actual>
- <After>
- <Byte>8D</Byte>
- <Byte>41</Byte>
- <Byte>FB</Byte>
- <Byte>83</Byte>
- <Byte>F8</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r9d,[rax+14]</Description>
- <AddressString>re2.exe+B80BE55</AddressString>
- <Before>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>74</Byte>
- <Byte>2A</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>8B</Byte>
- <Byte>48</Byte>
- <Byte>14</Byte>
- </Actual>
- <After>
- <Byte>41</Byte>
- <Byte>8D</Byte>
- <Byte>41</Byte>
- <Byte>F0</Byte>
- <Byte>83</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov [rdi+14],ebp</Description>
- <AddressString>re2.exe+B80BE7F</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>F0</Byte>
- <Byte>02</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>89</Byte>
- <Byte>6F</Byte>
- <Byte>14</Byte>
- </Actual>
- <After>
- <Byte>8D</Byte>
- <Byte>45</Byte>
- <Byte>F0</Byte>
- <Byte>83</Byte>
- <Byte>F8</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rax+54]</Description>
- <AddressString>re2.exe+8F11C73</AddressString>
- <Before>
- <Byte>83</Byte>
- <Byte>C4</Byte>
- <Byte>20</Byte>
- <Byte>5F</Byte>
- <Byte>C3</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>40</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>30</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :sub esp,20</Description>
- <AddressString>re2.exe+E468E67</AddressString>
- <Before>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>10</Byte>
- <Byte>57</Byte>
- <Byte>48</Byte>
- </Before>
- <Actual>
- <Byte>83</Byte>
- <Byte>EC</Byte>
- <Byte>20</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>D7</Byte>
- <Byte>48</Byte>
- <Byte>89</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rax+54]</Description>
- <AddressString>re2.exe+E4616C3</AddressString>
- <Before>
- <Byte>83</Byte>
- <Byte>C4</Byte>
- <Byte>20</Byte>
- <Byte>5F</Byte>
- <Byte>C3</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>40</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>30</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp [rcx+54],edi</Description>
- <AddressString>re2.exe+D5DDD90</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>03</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- </Before>
- <Actual>
- <Byte>39</Byte>
- <Byte>79</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>0F</Byte>
- <Byte>85</Byte>
- <Byte>09</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ebx,[rdx+54]</Description>
- <AddressString>re2.exe+950EAC4</AddressString>
- <Before>
- <Byte>24</Byte>
- <Byte>38</Byte>
- <Byte>45</Byte>
- <Byte>31</Byte>
- <Byte>C0</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>5A</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>15</Byte>
- <Byte>B2</Byte>
- <Byte>E0</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ebx,[rbx+54]</Description>
- <AddressString>re2.exe+E3BFE2B</AddressString>
- <Before>
- <Byte>15</Byte>
- <Byte>55</Byte>
- <Byte>CD</Byte>
- <Byte>C6</Byte>
- <Byte>F8</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>5B</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>E8</Byte>
- <Byte>2D</Byte>
- <Byte>FF</Byte>
- <Byte>A0</Byte>
- <Byte>F3</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp dword ptr [rsi+54],03</Description>
- <AddressString>re2.exe+C86AE77</AddressString>
- <Before>
- <Byte>E9</Byte>
- <Byte>98</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>83</Byte>
- <Byte>7E</Byte>
- <Byte>54</Byte>
- <Byte>03</Byte>
- </Actual>
- <After>
- <Byte>0F</Byte>
- <Byte>84</Byte>
- <Byte>8E</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,[rbx+10]</Description>
- <AddressString>re2.exe+B800BE0</AddressString>
- <Before>
- <Byte>4B</Byte>
- <Byte>14</Byte>
- <Byte>4C</Byte>
- <Byte>89</Byte>
- <Byte>EA</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>89</Byte>
- <Byte>E9</Byte>
- <Byte>E8</Byte>
- <Byte>C4</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8,[rax-10]</Description>
- <AddressString>re2.exe+8DC564E</AddressString>
- <Before>
- <Byte>75</Byte>
- <Byte>23</Byte>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>02</Byte>
- </Before>
- <Actual>
- <Byte>4C</Byte>
- <Byte>8B</Byte>
- <Byte>40</Byte>
- <Byte>F0</Byte>
- </Actual>
- <After>
- <Byte>41</Byte>
- <Byte>FF</Byte>
- <Byte>90</Byte>
- <Byte>D0</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rax+54]</Description>
- <AddressString>re2.exe+C2EB9E3</AddressString>
- <Before>
- <Byte>83</Byte>
- <Byte>C4</Byte>
- <Byte>20</Byte>
- <Byte>5F</Byte>
- <Byte>C3</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>40</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>5C</Byte>
- <Byte>24</Byte>
- <Byte>30</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov edx,[rax+54]</Description>
- <AddressString>re2.exe+C313673</AddressString>
- <Before>
- <Byte>44</Byte>
- <Byte>89</Byte>
- <Byte>F2</Byte>
- <Byte>EB</Byte>
- <Byte>0A</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>50</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>EB</Byte>
- <Byte>05</Byte>
- <Byte>BA</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp dword ptr [rdi+54],05</Description>
- <AddressString>re2.exe+D0B2710</AddressString>
- <Before>
- <Byte>78</Byte>
- <Byte>18</Byte>
- <Byte>00</Byte>
- <Byte>75</Byte>
- <Byte>62</Byte>
- </Before>
- <Actual>
- <Byte>83</Byte>
- <Byte>7F</Byte>
- <Byte>54</Byte>
- <Byte>05</Byte>
- </Actual>
- <After>
- <Byte>75</Byte>
- <Byte>5C</Byte>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>15</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov ebx,[rdx+54]</Description>
- <AddressString>re2.exe+950EAC4</AddressString>
- <Before>
- <Byte>24</Byte>
- <Byte>38</Byte>
- <Byte>45</Byte>
- <Byte>31</Byte>
- <Byte>C0</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>5A</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>15</Byte>
- <Byte>B2</Byte>
- <Byte>E0</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp dword ptr [rbp+54],05</Description>
- <AddressString>re2.exe+D0B13C9</AddressString>
- <Before>
- <Byte>85</Byte>
- <Byte>E7</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>83</Byte>
- <Byte>7D</Byte>
- <Byte>54</Byte>
- <Byte>05</Byte>
- </Actual>
- <After>
- <Byte>75</Byte>
- <Byte>3B</Byte>
- <Byte>48</Byte>
- <Byte>8B</Byte>
- <Byte>15</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rdx+54]</Description>
- <AddressString>re2.exe+2772D0</AddressString>
- <Before>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>42</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>C3</Byte>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- <Byte>CC</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r9d,[rdi+54]</Description>
- <AddressString>re2.exe+DBF4ABC</AddressString>
- <Before>
- <Byte>84</Byte>
- <Byte>DD</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>8B</Byte>
- <Byte>4F</Byte>
- <Byte>54</Byte>
- </Actual>
- <After>
- <Byte>41</Byte>
- <Byte>89</Byte>
- <Byte>C0</Byte>
- <Byte>48</Byte>
- <Byte>89</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,[rcx+10]</Description>
- <AddressString>re2.exe+CFC5014</AddressString>
- <Before>
- <Byte>39</Byte>
- <Byte>71</Byte>
- <Byte>20</Byte>
- <Byte>74</Byte>
- <Byte>CC</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>8B</Byte>
- <Byte>41</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>BA</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov eax,[rbx+10]</Description>
- <AddressString>re2.exe+CFC9AEE</AddressString>
- <Before>
- <Byte>48</Byte>
- <Byte>85</Byte>
- <Byte>C9</Byte>
- <Byte>74</Byte>
- <Byte>58</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>39</Byte>
- <Byte>41</Byte>
- <Byte>10</Byte>
- <Byte>74</Byte>
- <Byte>03</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :cmp [rcx+10],eax</Description>
- <AddressString>re2.exe+CFC9AF1</AddressString>
- <Before>
- <Byte>74</Byte>
- <Byte>58</Byte>
- <Byte>8B</Byte>
- <Byte>43</Byte>
- <Byte>10</Byte>
- </Before>
- <Actual>
- <Byte>39</Byte>
- <Byte>41</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>74</Byte>
- <Byte>03</Byte>
- <Byte>89</Byte>
- <Byte>79</Byte>
- <Byte>20</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Code :mov r8d,[rcx+10]</Description>
- <AddressString>re2.exe+CFC5014</AddressString>
- <Before>
- <Byte>39</Byte>
- <Byte>71</Byte>
- <Byte>20</Byte>
- <Byte>74</Byte>
- <Byte>CC</Byte>
- </Before>
- <Actual>
- <Byte>44</Byte>
- <Byte>8B</Byte>
- <Byte>41</Byte>
- <Byte>10</Byte>
- </Actual>
- <After>
- <Byte>BA</Byte>
- <Byte>01</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </After>
- </CodeEntry>
- </CheatCodes>
- <UserdefinedSymbols/>
- <Comments>http://fearlessrevolution.com/viewtopic.php?f=4&t=8539
- ///
- 3 scritps by CJBok:
- save count 0
- max pouch slots
- Game Time
- link:
- http://fearlessrevolution.com/viewtopic.php?p=76389#p76389
- ///
- weapon's upgrade shared by gir489
- link:
- http://fearlessrevolution.com/viewtopic.php?f=4&t=8539&start=255#p76443
- </Comments>
- <LuaScript>--vng21092's aobscan lua script
- function lua_aobscan(name,module,bytes,index)
- index = index - 1
- if(module == "") then
- local resultSet = AOBScan(bytes)
- if(resultSet == nil) then
- unregisterSymbol(name)
- print(name.." not found")
- else
- unregisterSymbol(name)
- registerSymbol(name,resultSet[index])
- resultSet.destroy()
- end
- else
- if(getModuleSize(module) == nil) then
- print("Module "..module.." not found")
- else
- local memScanner = createMemScan()
- local memFoundList = createFoundList(memScanner)
- memScanner.firstScan(
- soExactValue,vtByteArray,rtRounded,bytes,nil,
- getAddress(module),(getAddress(module)+getModuleSize(module)),"",
- fsmNotAligned,"",true,false,false,false)
- memScanner.waitTillDone()
- memFoundList.initialize()
- if(memFoundList.Count == 0) then
- unregisterSymbol(name)
- print(name.." in module "..module.." not found")
- else
- unregisterSymbol(name)
- registerSymbol(name,memFoundList.Address[index])
- end
- memScanner.destroy()
- memFoundList.destroy()
- end
- end
- end
- ---
- ----------------------------------------------
- registerCustomTypeAutoAssembler([[
- alloc(ConvertRoutine,1024)
- alloc(ConvertBackRoutine,1024)
- alloc(TypeName,256)
- alloc(ByteSize,4)
- alloc(UsesFloat,1)
- alloc(CallMethod,1)
- TypeName:
- db 'RE2_Hrs',0
- ByteSize:
- dd 4
- UsesFloat:
- db 0 //Change to 1 if this custom type should be treated as a float
- CallMethod:
- db 1 //Remove or change to 0 for legacy call mechanism
- //The convert routine should hold a routine that converts the data to an integer (in eax)
- //function declared as: cdecl int ConvertRoutine(unsigned char *input, PTR_UINT address);
- //Note: Keep in mind that this routine can be called by multiple threads at the same time.
- ConvertRoutine:
- //jmp dllname.functionname
- [64-bit]
- //or manual:
- //parameters: (64-bit)
- //rcx=address of input
- //rdx=address
- mov eax,[rcx] //eax now contains the bytes 'input' pointed to
- xor edx,edx
- mov ecx,#3600
- div ecx
- ret
- [/64-bit]
- [32-bit]
- //jmp dllname.functionname
- //or manual:
- //parameters: (32-bit)
- push ebp
- mov ebp,esp
- //[ebp+8]=address of input
- //[ebp+c]=address
- //example:
- mov eax,[ebp+8] //place the address that contains the bytes into eax
- mov eax,[eax] //place the bytes into eax so it's handled as a normal 4 byte value
- pop ebp
- ret
- [/32-bit]
- //The convert back routine should hold a routine that converts the given integer back to a row of bytes (e.g when the user wats to write a new value)
- //function declared as: cdecl void ConvertBackRoutine(int i, PTR_UINT address, unsigned char *output);
- ConvertBackRoutine:
- //jmp dllname.functionname
- //or manual:
- [64-bit]
- //parameters: (64-bit)
- //ecx=input
- //rdx=address
- //r8=address of output
- //example:
- imul ecx,ecx,#3600
- mov eax,[r8]
- xor edx,edx
- mov ebx,#3600
- div ebx
- add ecx,edx
- mov [r8],ecx //place the integer at the 4 bytes pointed to by r8
- ret
- [/64-bit]
- [32-bit]
- //parameters: (32-bit)
- push ebp
- mov ebp,esp
- //[ebp+8]=input
- //[ebp+c]=address
- //[ebp+10]=address of output
- //example:
- push eax
- push ebx
- mov eax,[ebp+8] //load the value into eax
- mov ebx,[ebp+10] //load the output address into ebx
- mov [ebx],eax //write the value into the address
- pop ebx
- pop eax
- pop ebp
- ret
- [/32-bit]
- ]])
- ---
- ----------------------------------------------
- registerCustomTypeAutoAssembler([[
- alloc(ConvertRoutine,1024)
- alloc(ConvertBackRoutine,1024)
- alloc(TypeName,256)
- alloc(ByteSize,4)
- alloc(UsesFloat,1)
- alloc(CallMethod,1)
- TypeName:
- db 'RE2_Mins',0
- ByteSize:
- dd 4
- UsesFloat:
- db 0 //Change to 1 if this custom type should be treated as a float
- CallMethod:
- db 1 //Remove or change to 0 for legacy call mechanism
- //The convert routine should hold a routine that converts the data to an integer (in eax)
- //function declared as: cdecl int ConvertRoutine(unsigned char *input, PTR_UINT address);
- //Note: Keep in mind that this routine can be called by multiple threads at the same time.
- ConvertRoutine:
- //jmp dllname.functionname
- [64-bit]
- //or manual:
- //parameters: (64-bit)
- //rcx=address of input
- //rdx=address
- mov eax,[rcx] //eax now contains the bytes 'input' pointed to
- xor edx,edx
- mov ecx,#3600
- div ecx
- mov eax,edx
- xor edx,edx
- mov ecx,#60
- div ecx
- ret
- [/64-bit]
- [32-bit]
- //jmp dllname.functionname
- //or manual:
- //parameters: (32-bit)
- push ebp
- mov ebp,esp
- //[ebp+8]=address of input
- //[ebp+c]=address
- //example:
- mov eax,[ebp+8] //place the address that contains the bytes into eax
- mov eax,[eax] //place the bytes into eax so it's handled as a normal 4 byte value
- pop ebp
- ret
- [/32-bit]
- //The convert back routine should hold a routine that converts the given integer back to a row of bytes (e.g when the user wats to write a new value)
- //function declared as: cdecl void ConvertBackRoutine(int i, PTR_UINT address, unsigned char *output);
- ConvertBackRoutine:
- //jmp dllname.functionname
- //or manual:
- [64-bit]
- //parameters: (64-bit)
- //ecx=input
- //rdx=address
- //r8=address of output
- //example:
- imul ecx,ecx,#60
- mov eax,[r8]
- xor edx,edx
- mov ebx,#3600
- div ebx
- imul eax,eax,#3600
- add ecx,eax
- mov eax,edx
- xor edx,edx
- mov ebx,#60
- div ebx
- add ecx,edx
- mov [r8],ecx //place the integer at the 4 bytes pointed to by r8
- ret
- [/64-bit]
- [32-bit]
- //parameters: (32-bit)
- push ebp
- mov ebp,esp
- //[ebp+8]=input
- //[ebp+c]=address
- //[ebp+10]=address of output
- //example:
- push eax
- push ebx
- mov eax,[ebp+8] //load the value into eax
- mov ebx,[ebp+10] //load the output address into ebx
- mov [ebx],eax //write the value into the address
- pop ebx
- pop eax
- pop ebp
- ret
- [/32-bit]
- ]])
- ---
- ----------------------------------------------
- registerCustomTypeAutoAssembler([[
- alloc(ConvertRoutine,1024)
- alloc(ConvertBackRoutine,1024)
- alloc(TypeName,256)
- alloc(ByteSize,4)
- alloc(UsesFloat,1)
- alloc(CallMethod,1)
- TypeName:
- db 'RE2_Secs',0
- ByteSize:
- dd 4
- UsesFloat:
- db 0 //Change to 1 if this custom type should be treated as a float
- CallMethod:
- db 1 //Remove or change to 0 for legacy call mechanism
- //The convert routine should hold a routine that converts the data to an integer (in eax)
- //function declared as: cdecl int ConvertRoutine(unsigned char *input, PTR_UINT address);
- //Note: Keep in mind that this routine can be called by multiple threads at the same time.
- ConvertRoutine:
- //jmp dllname.functionname
- [64-bit]
- //or manual:
- //parameters: (64-bit)
- //rcx=address of input
- //rdx=address
- mov eax,[rcx] //eax now contains the bytes 'input' pointed to
- xor edx,edx
- mov ecx,#3600
- div ecx
- mov eax,edx
- xor edx,edx
- mov ecx,#60
- div ecx
- mov eax,edx
- ret
- [/64-bit]
- [32-bit]
- //jmp dllname.functionname
- //or manual:
- //parameters: (32-bit)
- push ebp
- mov ebp,esp
- //[ebp+8]=address of input
- //[ebp+c]=address
- //example:
- mov eax,[ebp+8] //place the address that contains the bytes into eax
- mov eax,[eax] //place the bytes into eax so it's handled as a normal 4 byte value
- pop ebp
- ret
- [/32-bit]
- //The convert back routine should hold a routine that converts the given integer back to a row of bytes (e.g when the user wats to write a new value)
- //function declared as: cdecl void ConvertBackRoutine(int i, PTR_UINT address, unsigned char *output);
- ConvertBackRoutine:
- //jmp dllname.functionname
- //or manual:
- [64-bit]
- //parameters: (64-bit)
- //ecx=input
- //rdx=address
- //r8=address of output
- //example:
- mov eax,[r8]
- xor edx,edx
- mov ebx,#60
- div ebx
- imul eax,eax,#60
- add ecx,eax
- mov [r8],ecx //place the integer at the 4 bytes pointed to by r8
- ret
- [/64-bit]
- [32-bit]
- //parameters: (32-bit)
- push ebp
- mov ebp,esp
- //[ebp+8]=input
- //[ebp+c]=address
- //[ebp+10]=address of output
- //example:
- push eax
- push ebx
- mov eax,[ebp+8] //load the value into eax
- mov ebx,[ebp+10] //load the output address into ebx
- mov [ebx],eax //write the value into the address
- pop ebx
- pop eax
- pop ebp
- ret
- [/32-bit]
- ]])
- ---
- ----------------------------------------------
- </LuaScript>
- </CheatTable>
Add Comment
Please, Sign In to add comment