Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- VOID InitializeTitleSpecificHooks(PLDR_DATA_TABLE_ENTRY ModuleHandle) {
- PatchModuleImport(ModuleHandle, NAME_KERNEL, 407, (DWORD)XexGetProcedureAddressHook);
- PatchModuleImport(ModuleHandle, NAME_KERNEL, 408, (DWORD)XexLoadExecutableHook);
- PatchModuleImport(ModuleHandle, NAME_KERNEL, 409, (DWORD)XexLoadImageHook);
- PatchModuleImport(ModuleHandle, NAME_XAM, 401, (DWORD)XamInputGetStateHook);
- XEX_EXECUTION_ID* pExecutionId = (XEX_EXECUTION_ID*)RtlImageXexHeaderField(ModuleHandle->XexHeaderBase, 0x00040006);
- if (wcscmp(ModuleHandle->BaseDllName.Buffer, L"hud.xex") == 0 && !IsDevkit) {
- HUD_PatchLabels();
- DbgPrint("Hud labels Patched!");
- }
- if (wcscmp(ModuleHandle->BaseDllName.Buffer, L"Guide.MP.Purchase.xex") == 0) {
- BYTE data1[28] = { 0x38, 0x80, 0x00, 0x05, 0x80, 0x63, 0x00, 0x1C, 0x90, 0x83, 0x00, 0x04, 0x38, 0x80, 0x05, 0x39, 0x90, 0x83, 0x00, 0x08, 0x38, 0x60, 0x00, 0x00, 0x4E, 0x80, 0x00, 0x20 };
- BYTE data2[4] = { 0x60, 0x00, 0x00, 0x00 };
- BYTE data3[4] = { 0x48, 0x00, 0x00, 0xC8 };
- BYTE data4[4] = { 0x39, 0x60, 0x00, 0x00 };
- SetMemory((PVOID)0x8168A6D8,data1,28);// In Xam.xex
- SetMemory((PVOID)0x818E8CFC,data2,4);// In Xam.xex
- SetMemory((PVOID)0x818ED544,data3,4);// In Xam.xex
- SetMemory((PVOID)0x9015C15C,data4,4);// In Guide.MP.Purchase.xex
- SetMemory((PVOID)0x9015C108,data2,4);// In Guide.MP.Purchase.xex
- XNotifyQueueUI(XNOTIFYUI_TYPE_GENERIC, 0, 2, L"DieXBLS.NiNJA - MSP Spoofing Enabled!\nDash: [Guide.MP.Purchase]", NULL);
- }
Advertisement
Add Comment
Please, Sign In to add comment