RizeVN How do I cheat?
Reputation: 0
Joined: 21 Jul 2015 Posts: 6
|
Posted: Fri Jul 01, 2016 1:21 am Post subject: Need help with Assembly Script |
|
|
| Quote: | | English is not my native language, please excuse any errors in this post. |
Script:
| Code: | [ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(update,Application-steam-x64.exe,43 0F AF 4C 3D F8) // should be unique
alloc(newmem,$1000,"Application-steam-x64.exe"+131F65)
label(code)
label(check)
label(init)
label(funcadd)
label(return)
label(fend)
label(token)
registersymbol(token)
label(ts1)
registersymbol(ts1)
label(ts1add)
label(ts2)
registersymbol(ts2)
label(ts2add)
label(ts3)
registersymbol(ts3)
label(ts3add)
label(ts4)
registersymbol(ts4)
label(ts4add)
label(ts5)
registersymbol(ts5)
label(ts5add)
label(ts6)
registersymbol(ts6)
label(ts6add)
label(ts7)
registersymbol(ts7)
label(ts7add)
label(ts8)
registersymbol(ts8)
label(ts8add)
label(ts9)
registersymbol(ts9)
label(ts9add)
label(ts10)
registersymbol(ts10)
label(ts10add)
newmem:
code:
imul ecx,[r13+r15-08]
jmp return
check:
cmp [token],0
je init
cmp [token],1
je funcadd
jmp code
init:
mov [ts1],0
mov [ts2],0
mov [ts3],0
mov [ts4],0
mov [ts5],0
mov [ts6],0
mov [ts7],0
mov [ts8],0
mov [ts9],0
mov [ts10],0
mov [token],1
jmp code
fend:
mov [token],2
jmp code
funcadd:
mov rsi,r13
add rsi,r15
sub rsi,8
cmp [ts1],0
je ts1add
cmp [ts1],rsi
je fend
cmp [ts2],0
je ts2add
cmp [ts2],rsi
je fend
cmp [ts3],0
je ts3add
cmp [ts3],rsi
je fend
cmp [ts4],0
je ts4add
cmp [ts4],rsi
je fend
cmp [ts5],0
je ts5add
cmp [ts5],rsi
je fend
cmp [ts6],0
je ts6add
cmp [ts6],rsi
je fend
cmp [ts7],0
je ts7add
cmp [ts7],rsi
je fend
cmp [ts8],0
je ts8add
cmp [ts8],rsi
je fend
cmp [ts9],0
je ts9add
cmp [ts9],rsi
je fend
cmp [ts10],0
je ts10add
cmp [ts10],rsi
je fend
jmp fend
ts1add:
mov [ts1],rsi
jmp code
ts2add:
mov [ts2],rsi
jmp code
ts3add:
mov [ts3],rsi
jmp code
ts4add:
mov [ts4],rsi
jmp code
ts5add:
mov [ts5],rsi
jmp code
ts6add:
mov [ts6],rsi
jmp code
ts7add:
mov [ts7],rsi
jmp code
ts8add:
mov [ts8],rsi
jmp code
ts9add:
mov [ts9],rsi
jmp code
ts10add:
mov [ts10],rsi
jmp code
ts1:
dd 0
ts2:
dd 0
ts3:
dd 0
ts4:
dd 0
ts5:
dd 0
ts6:
dd 0
ts7:
dd 0
ts8:
dd 0
ts9:
dd 0
ts10:
dd 0
token:
dd 0
update:
jmp check
nop
return:
registersymbol(update)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
update:
db 43 0F AF 4C 3D F8
unregistersymbol(ts1)
unregistersymbol(ts2)
unregistersymbol(ts3)
unregistersymbol(ts4)
unregistersymbol(ts5)
unregistersymbol(ts6)
unregistersymbol(ts7)
unregistersymbol(ts8)
unregistersymbol(ts9)
unregistersymbol(ts10)
unregistersymbol(update)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Application-steam-x64.exe"+131F65
"Application-steam-x64.exe"+131F48: 74 54 - je Application-steam-x64.exe+131F9E
"Application-steam-x64.exe"+131F4A: FF C3 - inc ebx
"Application-steam-x64.exe"+131F4C: 48 FF C6 - inc rsi
"Application-steam-x64.exe"+131F4F: 3B 5D 30 - cmp ebx,[rbp+30]
"Application-steam-x64.exe"+131F52: 7C DE - jl Application-steam-x64.exe+131F32
"Application-steam-x64.exe"+131F54: 33 C0 - xor eax,eax
"Application-steam-x64.exe"+131F56: 8B 48 48 - mov ecx,[rax+48]
"Application-steam-x64.exe"+131F59: 48 8B 44 24 50 - mov rax,[rsp+50]
"Application-steam-x64.exe"+131F5E: 41 FF C6 - inc r14d
"Application-steam-x64.exe"+131F61: 49 83 C7 10 - add r15,10
// ---------- INJECTING HERE ----------
"Application-steam-x64.exe"+131F65: 43 0F AF 4C 3D F8 - imul ecx,[r13+r15-08]
// ---------- DONE INJECTING ----------
"Application-steam-x64.exe"+131F6B: 44 03 E1 - add r12d,ecx
"Application-steam-x64.exe"+131F6E: 44 3B 70 30 - cmp r14d,[rax+30]
"Application-steam-x64.exe"+131F72: 7C AC - jl Application-steam-x64.exe+131F20
"Application-steam-x64.exe"+131F74: 4C 8B 7C 24 20 - mov r15,[rsp+20]
"Application-steam-x64.exe"+131F79: 4C 8B 6C 24 28 - mov r13,[rsp+28]
"Application-steam-x64.exe"+131F7E: 48 8B 7C 24 30 - mov rdi,[rsp+30]
"Application-steam-x64.exe"+131F83: 48 8B 74 24 68 - mov rsi,[rsp+68]
"Application-steam-x64.exe"+131F88: 48 8B 6C 24 60 - mov rbp,[rsp+60]
"Application-steam-x64.exe"+131F8D: 48 8B 5C 24 58 - mov rbx,[rsp+58]
"Application-steam-x64.exe"+131F92: 41 8B C4 - mov eax,r12d
} |
Basically, imul ecx,[r13+r15-08] run on every items in inventory to do something with the quantity so i make the script above to copy address of the quantity to my table. But when i active scripts there are strange address that i have no idea where it come from. |
|