Advertisement
ChaosHacks

Untitled

Mar 22nd, 2019
187
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.94 KB | None | 0 0
  1. [ENABLE]
  2.  
  3. aobscanmodule(GetCoin,sekiro.exe,CC CC 8B 41 7C C3 CC CC CC CC CC CC CC CC CC CC CC CC 32)
  4. alloc(newmem,$1000,"sekiro.exe"+66B4EE)
  5. alloc(CBase, 8)
  6.  
  7. label(code)
  8. label(return)
  9.  
  10. registersymbol(CBase)
  11.  
  12. newmem:
  13.  
  14. mov [CBase],rcx
  15.  
  16. code:
  17. int 3
  18. int 3
  19. mov eax,[rcx+7C]
  20. jmp return
  21.  
  22. GetCoin+2:
  23. jmp newmem
  24. return:
  25. registersymbol(GetCoin)
  26.  
  27. CBase:
  28. dq 0
  29.  
  30. [DISABLE]
  31.  
  32. GetCoin:
  33. db CC CC 8B 41 7C
  34.  
  35. unregistersymbol(GetCoin)
  36. unregistersymbol(CBase)
  37. dealloc(CBase)
  38. dealloc(newmem)
  39.  
  40. {
  41. // ORIGINAL CODE - INJECTION POINT: "sekiro.exe"+66B4EE
  42.  
  43. "sekiro.exe"+66B4E4: CC - int 3
  44. "sekiro.exe"+66B4E5: CC - int 3
  45. "sekiro.exe"+66B4E6: CC - int 3
  46. "sekiro.exe"+66B4E7: CC - int 3
  47. "sekiro.exe"+66B4E8: CC - int 3
  48. "sekiro.exe"+66B4E9: CC - int 3
  49. "sekiro.exe"+66B4EA: CC - int 3
  50. "sekiro.exe"+66B4EB: CC - int 3
  51. "sekiro.exe"+66B4EC: CC - int 3
  52. "sekiro.exe"+66B4ED: CC - int 3
  53. // ---------- INJECTING HERE ----------
  54. "sekiro.exe"+66B4EE: CC - int 3
  55. "sekiro.exe"+66B4EF: CC - int 3
  56. "sekiro.exe"+66B4F0: 8B 41 7C - mov eax,[rcx+7C]
  57. // ---------- DONE INJECTING ----------
  58. "sekiro.exe"+66B4F3: C3 - ret
  59. "sekiro.exe"+66B4F4: CC - int 3
  60. "sekiro.exe"+66B4F5: CC - int 3
  61. "sekiro.exe"+66B4F6: CC - int 3
  62. "sekiro.exe"+66B4F7: CC - int 3
  63. "sekiro.exe"+66B4F8: CC - int 3
  64. "sekiro.exe"+66B4F9: CC - int 3
  65. "sekiro.exe"+66B4FA: CC - int 3
  66. "sekiro.exe"+66B4FB: CC - int 3
  67. "sekiro.exe"+66B4FC: CC - int 3
  68. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement