Guest User

MSP Spoofing

a guest
Aug 7th, 2016
488
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. VOID InitializeTitleSpecificHooks(PLDR_DATA_TABLE_ENTRY ModuleHandle) {
  2.     PatchModuleImport(ModuleHandle, NAME_KERNEL, 407, (DWORD)XexGetProcedureAddressHook);
  3.     PatchModuleImport(ModuleHandle, NAME_KERNEL, 408, (DWORD)XexLoadExecutableHook);
  4.     PatchModuleImport(ModuleHandle, NAME_KERNEL, 409, (DWORD)XexLoadImageHook);
  5.     PatchModuleImport(ModuleHandle, NAME_XAM, 401, (DWORD)XamInputGetStateHook);
  6.     XEX_EXECUTION_ID* pExecutionId = (XEX_EXECUTION_ID*)RtlImageXexHeaderField(ModuleHandle->XexHeaderBase, 0x00040006);
  7.  
  8.     if (wcscmp(ModuleHandle->BaseDllName.Buffer, L"hud.xex") == 0 && !IsDevkit) {
  9.         HUD_PatchLabels();
  10.         DbgPrint("Hud labels Patched!");
  11.     }
  12.  
  13.         if (wcscmp(ModuleHandle->BaseDllName.Buffer, L"Guide.MP.Purchase.xex") == 0) {
  14.         BYTE data1[28] = { 0x38, 0x80, 0x00, 0x05, 0x80, 0x63, 0x00, 0x1C, 0x90, 0x83, 0x00, 0x04, 0x38, 0x80, 0x05, 0x39, 0x90, 0x83, 0x00, 0x08, 0x38, 0x60, 0x00, 0x00, 0x4E, 0x80, 0x00, 0x20 };
  15.         BYTE data2[4] = { 0x60, 0x00, 0x00, 0x00 };
  16.         BYTE data3[4] = { 0x48, 0x00, 0x00, 0xC8 };
  17.         BYTE data4[4] = { 0x39, 0x60, 0x00, 0x00 };
  18.        
  19.             SetMemory((PVOID)0x8168A6D8,data1,28);// In Xam.xex  
  20.             SetMemory((PVOID)0x818E8CFC,data2,4);//  In Xam.xex                  
  21.             SetMemory((PVOID)0x818ED544,data3,4);//  In Xam.xex                
  22.             SetMemory((PVOID)0x9015C15C,data4,4);//  In Guide.MP.Purchase.xex
  23.             SetMemory((PVOID)0x9015C108,data2,4);//  In Guide.MP.Purchase.xex
  24.             XNotifyQueueUI(XNOTIFYUI_TYPE_GENERIC, 0, 2, L"DieXBLS.NiNJA - MSP Spoofing Enabled!\nDash: [Guide.MP.Purchase]", NULL);   
  25.     }
Advertisement
Add Comment
Please, Sign In to add comment