Advertisement
ChaosHacks

Untitled

Mar 22nd, 2019
239
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.92 KB | None | 0 0
  1. [ENABLE]
  2.  
  3. aobscanmodule(GetCoins,sekiro.exe,8B 41 7C C3 CC CC CC CC CC CC CC CC CC CC CC CC 32)
  4. alloc(newmem,$1000,"sekiro.exe"+66B4F0)
  5.  
  6. label(code)
  7. label(return)
  8. label(CBase)
  9. registersymbol(CBase)
  10.  
  11. newmem:
  12.  
  13.  
  14. code:
  15. mov [CBase],rcx
  16. mov eax,[rcx+7C]
  17. ret
  18. int 3
  19. jmp return
  20.  
  21. CBase:
  22. dq 0
  23.  
  24. GetCoins:
  25. jmp newmem
  26. return:
  27. registersymbol(GetCoins)
  28.  
  29. [DISABLE]
  30.  
  31. GetCoins:
  32. db 8B 41 7C C3 CC
  33.  
  34. unregistersymbol(GetCoins)
  35. unregistersymbol(CBase)
  36. dealloc(newmem)
  37.  
  38. {
  39. // ORIGINAL CODE - INJECTION POINT: "sekiro.exe"+66B4F0
  40.  
  41. "sekiro.exe"+66B4E6: CC - int 3
  42. "sekiro.exe"+66B4E7: CC - int 3
  43. "sekiro.exe"+66B4E8: CC - int 3
  44. "sekiro.exe"+66B4E9: CC - int 3
  45. "sekiro.exe"+66B4EA: CC - int 3
  46. "sekiro.exe"+66B4EB: CC - int 3
  47. "sekiro.exe"+66B4EC: CC - int 3
  48. "sekiro.exe"+66B4ED: CC - int 3
  49. "sekiro.exe"+66B4EE: CC - int 3
  50. "sekiro.exe"+66B4EF: CC - int 3
  51. // ---------- INJECTING HERE ----------
  52. "sekiro.exe"+66B4F0: 8B 41 7C - mov eax,[rcx+7C]
  53. "sekiro.exe"+66B4F3: C3 - ret
  54. "sekiro.exe"+66B4F4: CC - int 3
  55. // ---------- DONE INJECTING ----------
  56. "sekiro.exe"+66B4F5: CC - int 3
  57. "sekiro.exe"+66B4F6: CC - int 3
  58. "sekiro.exe"+66B4F7: CC - int 3
  59. "sekiro.exe"+66B4F8: CC - int 3
  60. "sekiro.exe"+66B4F9: CC - int 3
  61. "sekiro.exe"+66B4FA: CC - int 3
  62. "sekiro.exe"+66B4FB: CC - int 3
  63. "sekiro.exe"+66B4FC: CC - int 3
  64. "sekiro.exe"+66B4FD: CC - int 3
  65. "sekiro.exe"+66B4FE: CC - int 3
  66. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement