Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- aobscanmodule(StringReadCall,DDDA.exe,8B 44 24 04 39 81 80 00 00 00)
- registersymbol(StringReadCall)
- aobscanmodule(highlightedItemIDReadAOB,DDDA.exe,8B F0 0F BF 47 10 85 C0 78)
- registersymbol(highlightedItemIDReadAOB)
- aobscanmodule(highlightedItemStringReadAOB,DDDA.exe,85 C9 74 07 52 57 E8 ** ** ** ** 8B C3)
- registersymbol(highlightedItemStringReadAOB)
- aobscanmodule(highlightedEquipmentStringReadAOB,DDDA.exe,8B ** ** ** ** ** ** 85 C9 74 07 56 52 E8)
- registersymbol(highlightedEquipmentStringReadAOB)
- aobscanmodule(highlightedItemWeightAOB,DDDA.exe,F3 0F 10 40 44 83 FE 06)
- registersymbol(highlightedItemWeightAOB)
- aobscanmodule(highlightedItemStringReadInSotrageAOB,DDDA.exe,85 C9 74 07 52 57 E8 ** ** ** ** 8B ** ** ** ** ** ** ** ** 08 ** ** 78 01 00 00)
- registersymbol(highlightedItemStringReadInSotrageAOB)
- ///
- label(pHighlightedItem)
- registersymbol(pHighlightedItem)
- label(pSomeBase2)
- registersymbol(pSomeBase2)
- label(pSomeBase3)
- registersymbol(pSomeBase3)
- label(pHighlightedItemName)
- registersymbol(pHighlightedItemName)
- label(pHighlightedItemWeight)
- registersymbol(pHighlightedItemWeight)
- ///
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov [pHighlightedItem],edi
- mov eax,[esp+1c]
- mov [pSomeBase2],eax
- /*test ebp,ebp
- jz @f
- cmp ebp,01000000
- jbe @f
- mov [pSomeBase3],ebp*/
- @@:
- mov eax,[esp+14]
- pushad
- /*test eax,eax
- jz originalcode
- mov ecx,[eax+9ac]
- test ecx,ecx
- jz originalcode
- movzx eax,word ptr [edi+10]
- push eax
- call StringReadCall
- mov [pHighlightedItemName],eax*/
- originalcode:
- popad
- movsx eax,word ptr [edi+10]
- test eax,eax
- exit:
- jmp returnhere
- ///
- pHighlightedItem:
- dd 0
- pSomeBase2:
- dd 0
- pSomeBase3:
- dd 0
- ///
- alloc(newmem2,2048)
- label(returnhere2)
- label(originalcode2)
- label(exit2)
- newmem2: //this is allocated memory, you have read,write,execute access
- //place your code here
- test ecx,ecx
- je highlightedItemStringReadAOB+b //DDDA.exe+26908C
- pushad
- push eax
- call StringReadCall
- mov [pHighlightedItemName],eax
- originalcode2:
- popad
- //test ecx,ecx
- //je highlightedItemStringReadAOB+b //DDDA.exe+26908C
- push edx
- exit2:
- jmp returnhere2
- ///
- pHighlightedItemName:
- dd 0
- dd 0
- dd 0
- dd 0
- dd 0
- ///
- alloc(newmem3,2048)
- label(returnhere3)
- label(originalcode3)
- label(exit3)
- newmem3: //this is allocated memory, you have read,write,execute access
- //place your code here
- test ecx,ecx
- je highlightedEquipmentStringReadAOB+12 //DDDA.exe+248464
- pushad
- push eax
- call StringReadCall
- mov [pHighlightedItemName],eax
- originalcode3:
- popad
- //test ecx,ecx
- //je highlightedEquipmentStringReadAOB+12 //DDDA.exe+248464
- push esi
- exit3:
- jmp returnhere3
- ///
- alloc(newmem4,2048)
- label(returnhere4)
- label(originalcode4)
- label(exit4)
- newmem4: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov [pHighlightedItemWeight],eax
- originalcode4:
- movss xmm0,[eax+44]
- exit4:
- jmp returnhere4
- ///
- pHighlightedItemWeight:
- dd 0
- ///
- alloc(newmem5,2048)
- label(returnhere5)
- label(originalcode5)
- label(exit5)
- newmem5: //this is allocated memory, you have read,write,execute access
- //place your code here
- test ecx,ecx
- je highlightedItemStringReadInSotrageAOB+b //DDDA.exe+3208D8
- pushad
- push eax
- call StringReadCall
- mov [pHighlightedItemName],eax
- originalcode5:
- popad
- //test ecx,ecx
- //je highlightedItemStringReadInSotrageAOB+b //DDDA.exe+3208D8
- push edx
- exit5:
- jmp returnhere5
- ///
- highlightedItemIDReadAOB+2: //"DDDA.exe"+5937F:
- jmp newmem
- nop
- returnhere:
- highlightedItemStringReadAOB: //"DDDA.exe"+269081:
- jmp newmem2
- returnhere2:
- highlightedEquipmentStringReadAOB+7: //"DDDA.exe"+248459:
- jmp newmem3
- returnhere3:
- highlightedItemWeightAOB: //"DDDA.exe"+593AA:
- jmp newmem4
- returnhere4:
- highlightedItemStringReadInSotrageAOB: //"DDDA.exe"+3208CD:
- jmp newmem5
- returnhere5:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- unregistersymbol(StringReadCall)
- dealloc(newmem)
- highlightedItemIDReadAOB+2: //"DDDA.exe"+5937F:
- db 0F BF 47 10 85 C0
- //Alt: movsx eax,word ptr [edi+10]
- //Alt: test eax,eax
- unregistersymbol(highlightedItemIDReadAOB)
- dealloc(newmem2)
- highlightedItemStringReadAOB: //"DDDA.exe"+269081:
- db 85 C9 74 07 52
- //Alt: test ecx,ecx
- //Alt: je highlightedItemStringReadAOB+b //DDDA.exe+26908C
- //Alt: push edx
- unregistersymbol(highlightedItemStringReadAOB)
- dealloc(newmem3)
- highlightedEquipmentStringReadAOB+7: //"DDDA.exe"+248459:
- db 85 C9 74 07 56
- //Alt: test ecx,ecx
- //Alt: je highlightedEquipmentStringReadAOB+12 //DDDA.exe+248464
- //Alt: push esi
- unregistersymbol(highlightedEquipmentStringReadAOB)
- dealloc(newmem4)
- highlightedItemWeightAOB: //"DDDA.exe"+593AA:
- db F3 0F 10 40 44
- //Alt: movss xmm0,[eax+44]
- unregistersymbol(highlightedItemWeightAOB)
- dealloc(newmem5)
- highlightedItemStringReadInSotrageAOB: //"DDDA.exe"+3208CD:
- db 85 C9 74 07 52
- //Alt: test ecx,ecx
- //Alt: je highlightedItemStringReadInSotrageAOB+b //DDDA.exe+3208D8
- //Alt: push edx
- unregistersymbol(highlightedItemStringReadInSotrageAOB)
- ///
- unregistersymbol(pHighlightedItem)
- unregistersymbol(pSomeBase2)
- unregistersymbol(pSomeBase3)
- unregistersymbol(pHighlightedItemName)
- unregistersymbol(pHighlightedItemWeight)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement