194
"Resources/Ammo"
Auto Assembler Script
[ENABLE]
aobscanmodule(res_ammo,ROTTR.exe,74 05 0F B7 40 0C C3 31) // should be unique
alloc(newmem,$100,"ROTTR.exe"+393E035)
label(byz_coins)
label(arrows)
label(poison_arrows)
label(fire_arrows)
label(grenade_arrows)
label(pis_rounds)
label(frag_pis_rounds)
label(rif_rounds)
label(rif_grenades)
label(shells)
label(fire_shells)
label(code)
label(return)
newmem:
je ROTTR.exe+393E03C
pushf
cmp rbx,0F
je byz_coins
cmp rdx,21
je arrows
cmp rdx,1D
je poison_arrows
cmp rdx,1E
je fire_arrows
cmp rdx,19
je grenade_arrows
cmp rdx,18
je pis_rounds
cmp rdx,1F
je frag_pis_rounds
cmp rdx,03
je rif_rounds
cmp rdx,10
je rif_grenades
cmp rdx,05
je shells
cmp rdx,1A
je fire_shells
mov [rax+0C],63
jmp code
byz_coins:
mov [rax+0C],352
jmp code
arrows:
mov [rax+0C],2D
jmp code
poison_arrows:
mov [rax+0C],05
jmp code
fire_arrows:
mov [rax+0C],0A
jmp code
grenade_arrows:
mov [rax+0C],05
jmp code
pis_rounds:
mov [rax+0C],4B
jmp code
frag_pis_rounds:
mov [rax+0C],28
jmp code
rif_rounds:
mov [rax+0C],B4
jmp code
rif_grenades:
mov [rax+0C],05
jmp code
shells:
mov [rax+0C],24
jmp code
fire_shells:
mov [rax+0C],1A
jmp code
code:
popf
//je ROTTR.exe+393E03C
movzx eax,word ptr [rax+0C]
jmp return
res_ammo:
jmp newmem
nop
return:
registersymbol(res_ammo)
[DISABLE]
res_ammo:
db 74 05 0F B7 40 0C
unregistersymbol(res_ammo)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+393E035
"ROTTR.exe"+393E018: 49 8B 40 28 - mov rax,[r8+28]
"ROTTR.exe"+393E01C: 48 8B 04 D0 - mov rax,[rax+rdx*8]
"ROTTR.exe"+393E020: 48 85 C0 - test rax,rax
"ROTTR.exe"+393E023: 74 17 - je ROTTR.exe+393E03C
"ROTTR.exe"+393E025: 39 48 08 - cmp [rax+08],ecx
"ROTTR.exe"+393E028: 74 08 - je ROTTR.exe+393E032
"ROTTR.exe"+393E02A: 48 8B 00 - mov rax,[rax]
"ROTTR.exe"+393E02D: 48 85 C0 - test rax,rax
"ROTTR.exe"+393E030: 75 F3 - jne ROTTR.exe+393E025
"ROTTR.exe"+393E032: 48 85 C0 - test rax,rax
// ---------- INJECTING HERE ----------
"ROTTR.exe"+393E035: 74 05 - je ROTTR.exe+393E03C
"ROTTR.exe"+393E037: 0F B7 40 0C - movzx eax,word ptr [rax+0C]
// ---------- DONE INJECTING ----------
"ROTTR.exe"+393E03B: C3 - ret
"ROTTR.exe"+393E03C: 31 C0 - xor eax,eax
"ROTTR.exe"+393E03E: C3 - ret
"ROTTR.exe"+393E03F: CC - int 3
"ROTTR.exe"+393E040: 53 - push rbx
"ROTTR.exe"+393E041: 48 83 EC 20 - sub rsp,20
"ROTTR.exe"+393E045: 8B 99 C8 03 00 00 - mov ebx,[rcx+000003C8]
"ROTTR.exe"+393E04B: E8 F0 A8 37 00 - call ROTTR.exe+3CB8940
"ROTTR.exe"+393E050: 89 DA - mov edx,ebx
"ROTTR.exe"+393E052: 48 89 C1 - mov rcx,rax
}
20
"Skill Points"
Auto Assembler Script
[ENABLE]
aobscanmodule(skill_points,ROTTR.exe,8B 41 44 39 E8)
alloc(newmem,$100,"ROTTR.exe"+3C1495D)
label(code)
label(return)
newmem:
mov [rcx+44],20
code:
mov eax,[rcx+44]
cmp eax,ebp
jmp return
skill_points:
jmp newmem
return:
registersymbol(skill_points)
[DISABLE]
skill_points:
db 8B 41 44 39 E8
unregistersymbol(skill_points)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+3C1495D
"ROTTR.exe"+3C1493A: 0F 84 3E 01 00 00 - je ROTTR.exe+3C14A7E
"ROTTR.exe"+3C14940: 85 ED - test ebp,ebp
"ROTTR.exe"+3C14942: 74 26 - je ROTTR.exe+3C1496A
"ROTTR.exe"+3C14944: 48 89 D9 - mov rcx,rbx
"ROTTR.exe"+3C14947: E8 E4 1A 01 00 - call ROTTR.exe+3C26430
"ROTTR.exe"+3C1494C: 48 85 C0 - test rax,rax
"ROTTR.exe"+3C1494F: 74 09 - je ROTTR.exe+3C1495A
"ROTTR.exe"+3C14951: 48 8B 88 D0 61 00 00 - mov rcx,[rax+000061D0]
"ROTTR.exe"+3C14958: EB 03 - jmp ROTTR.exe+3C1495D
"ROTTR.exe"+3C1495A: 48 89 F1 - mov rcx,rsi
// ---------- INJECTING HERE ----------
"ROTTR.exe"+3C1495D: 8B 41 44 - mov eax,[rcx+44]
"ROTTR.exe"+3C14960: 39 E8 - cmp eax,ebp
// ---------- DONE INJECTING ----------
"ROTTR.exe"+3C14962: 0F 42 E8 - cmovb ebp,eax
"ROTTR.exe"+3C14965: 29 E8 - sub eax,ebp
"ROTTR.exe"+3C14967: 89 41 44 - mov [rcx+44],eax
"ROTTR.exe"+3C1496A: 48 8D 2D CF 63 63 FE - lea rbp,[ROTTR.exe+224AD40]
"ROTTR.exe"+3C14971: 45 85 ED - test r13d,r13d
"ROTTR.exe"+3C14974: 74 37 - je ROTTR.exe+3C149AD
"ROTTR.exe"+3C14976: 48 8B 83 98 31 00 00 - mov rax,[rbx+00003198]
"ROTTR.exe"+3C1497D: 48 8D 94 24 88 00 00 00 - lea rdx,[rsp+00000088]
"ROTTR.exe"+3C14985: 45 31 C9 - xor r9d,r9d
"ROTTR.exe"+3C14988: 8B 48 68 - mov ecx,[rax+68]
}
52
"InfAmmo/NoReload"
Auto Assembler Script
[ENABLE]
aobscanmodule(infAmmo,ROTTR.exe,66 89 18 48 8B 8D A8 03 00 00)
aobscanmodule(noReload,ROTTR.exe,29 18 49 8B 86 70 03 00 00)
registersymbol(infAmmo)
registersymbol(noReload)
infAmmo:
//"ROTTR.exe"+399DBCB:
db 90 90 90
noReload:
//"ROTTR.exe"+39396CC:
db 90 90
[DISABLE]
infAmmo:
//"ROTTR.exe"+399DBCB:
db 66 89 18
noReload:
//"ROTTR.exe"+39396CC:
db 29 18
unregistersymbol(infAmmo)
unregistersymbol(noReload)
{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+399DBCB
"ROTTR.exe"+399DBA4: 75 12 - jne ROTTR.exe+399DBB8
"ROTTR.exe"+399DBA6: 48 8B 45 18 - mov rax,[rbp+18]
"ROTTR.exe"+399DBAA: 48 8D 4D 18 - lea rcx,[rbp+18]
"ROTTR.exe"+399DBAE: FF 90 68 01 00 00 - call qword ptr [rax+00000168]
"ROTTR.exe"+399DBB4: 85 C0 - test eax,eax
"ROTTR.exe"+399DBB6: 75 22 - jne ROTTR.exe+399DBDA
"ROTTR.exe"+399DBB8: 48 8B 8D A8 03 00 00 - mov rcx,[rbp+000003A8]
"ROTTR.exe"+399DBBF: 4C 89 FA - mov rdx,r15
"ROTTR.exe"+399DBC2: 48 83 C1 28 - add rcx,28
"ROTTR.exe"+399DBC6: E8 25 8A F6 FF - call ROTTR.exe+39065F0
// ---------- INJECTING HERE ----------
"ROTTR.exe"+399DBCB: 66 89 18 - mov [rax],bx
"ROTTR.exe"+399DBCE: 48 8B 8D A8 03 00 00 - mov rcx,[rbp+000003A8]
// ---------- DONE INJECTING ----------
"ROTTR.exe"+399DBD5: E8 C6 91 BA FF - call ROTTR.exe+3546DA0
"ROTTR.exe"+399DBDA: 66 85 DB - test bx,bx
"ROTTR.exe"+399DBDD: 0F 85 83 01 00 00 - jne ROTTR.exe+399DD66
"ROTTR.exe"+399DBE3: 4C 89 64 24 68 - mov [rsp+68],r12
"ROTTR.exe"+399DBE8: 44 0F B6 A4 24 80 00 00 00 - movzx r12d,byte ptr [rsp+00000080]
"ROTTR.exe"+399DBF1: 45 84 ED - test r13l,r13l
"ROTTR.exe"+399DBF4: 75 09 - jne ROTTR.exe+399DBFF
"ROTTR.exe"+399DBF6: 45 84 E4 - test r12l,r12l
"ROTTR.exe"+399DBF9: 0F 84 62 01 00 00 - je ROTTR.exe+399DD61
"ROTTR.exe"+399DBFF: 48 39 B5 C8 02 00 00 - cmp [rbp+000002C8],rsi
}
79
"No Spread"
Auto Assembler Script
[ENABLE]
aobscanmodule(no_spread,ROTTR.exe,06 89 02 FF 03 48 8B 5C 24 40) // should be unique
//aobscanmodule(no_recoil,ROTTR.exe,75 A8 48 83 C6 08)
alloc(newmem,$100,"ROTTR.exe"+339B113)
//registersymbol(no_recoil)
//no_recoil:
//db 90 90 48 83 C6 08
label(code)
label(return)
newmem:
pushf
cmp [rbx+4],F
je code
inc [rbx]
code:
//inc [rbx]
popf
mov rbx,[rsp+40]
jmp return
no_spread+03:
jmp newmem
nop
nop
return:
registersymbol(no_spread)
[DISABLE]
no_spread+03:
db FF 03 48 8B 5C 24 40
//no_recoil:
//db 75 A8 48 83 C6 08
unregistersymbol(no_spread)
//unregistersymbol(no_recoil)
dealloc(newmem)
{
// no_spread: "ROTTR.exe"+339B113
"ROTTR.exe"+339B0F7: 48 8B 5C 24 40 - mov rbx,[rsp+40]
"ROTTR.exe"+339B0FC: 48 83 C4 20 - add rsp,20
"ROTTR.exe"+339B100: 5E - pop rsi
"ROTTR.exe"+339B101: C3 - ret
"ROTTR.exe"+339B102: 48 8B 43 08 - mov rax,[rbx+08]
"ROTTR.exe"+339B106: 48 8D 14 88 - lea rdx,[rax+rcx*4]
"ROTTR.exe"+339B10A: 48 85 D2 - test rdx,rdx
"ROTTR.exe"+339B10D: 74 04 - je ROTTR.exe+339B113
"ROTTR.exe"+339B10F: 8B 06 - mov eax,[rsi]
"ROTTR.exe"+339B111: 89 02 - mov [rdx],eax
// ---------- INJECTING HERE ----------
"ROTTR.exe"+339B113: FF 03 - inc [rbx]
"ROTTR.exe"+339B115: 48 8B 5C 24 40 - mov rbx,[rsp+40]
// ---------- DONE INJECTING ----------
"ROTTR.exe"+339B11A: 48 83 C4 20 - add rsp,20
"ROTTR.exe"+339B11E: 5E - pop rsi
"ROTTR.exe"+339B11F: C3 - ret
"ROTTR.exe"+339B120: CC - int 3
"ROTTR.exe"+339B121: CC - int 3
"ROTTR.exe"+339B122: CC - int 3
"ROTTR.exe"+339B123: CC - int 3
"ROTTR.exe"+339B124: CC - int 3
"ROTTR.exe"+339B125: CC - int 3
"ROTTR.exe"+339B126: 66 2E 0F 1F 84 00 00 00 00 00 - nop cs:[rax+rax+00000000]
}
286
"Auto/Semi"
Byte
80789F00
266
"Inf Health"
Auto Assembler Script
[ENABLE]
aobscanmodule(health,ROTTR.exe,F3 0F 11 70 2C 48 8B 8B A8) // should be unique
alloc(newmem,$100,"ROTTR.exe"+3580D48)
label(code)
label(return)
"ROTTR.exe"+35575E3: //bloodon
db 90 90 90 90 90 90 90 90 90 90 90 90
"ROTTR.exe"+35852D1: //bloodoff
db 90 90 90 90 90
newmem:
pushf
cmp rsi,1C2
jne code
movss [rax+2C],xmm0
popf
jmp return
code:
popf
movss [rax+2C],xmm6
jmp return
health:
jmp newmem
return:
registersymbol(health)
[DISABLE]
health:
db F3 0F 11 70 2C
"ROTTR.exe"+35575E3:
db 48 C7 84 3A 90 05 00 00 00 00 80 3F
"ROTTR.exe"+35852D1:
db F3 41 0F 11 31
unregistersymbol(health)
dealloc(newmem)
{
// health: "ROTTR.exe"+3580D48
"ROTTR.exe"+3580D24: 48 8B 01 - mov rax,[rcx]
"ROTTR.exe"+3580D27: 0F 28 F1 - movaps xmm6,xmm1
"ROTTR.exe"+3580D2A: FF 90 08 01 00 00 - call qword ptr [rax+00000108]
"ROTTR.exe"+3580D30: 84 C0 - test al,al
"ROTTR.exe"+3580D32: 75 34 - jne ROTTR.exe+3580D68
"ROTTR.exe"+3580D34: 48 8B 83 A8 02 00 00 - mov rax,[rbx+000002A8]
"ROTTR.exe"+3580D3B: 66 0F 6E 40 28 - movd xmm0,[rax+28]
"ROTTR.exe"+3580D40: 0F 5B C0 - cvtdq2ps xmm0,xmm0
"ROTTR.exe"+3580D43: 0F 2E F0 - ucomiss xmm6,xmm0
"ROTTR.exe"+3580D46: 74 20 - je ROTTR.exe+3580D68
// ---------- INJECTING HERE ----------
"ROTTR.exe"+3580D48: F3 0F 11 70 2C - movss [rax+2C],xmm6
// ---------- DONE INJECTING ----------
"ROTTR.exe"+3580D4D: 48 8B 8B A8 02 00 00 - mov rcx,[rbx+000002A8]
"ROTTR.exe"+3580D54: F3 0F 2C 41 2C - cvttss2si eax,[rcx+2C]
"ROTTR.exe"+3580D59: 89 41 28 - mov [rcx+28],eax
"ROTTR.exe"+3580D5C: 48 8B 8B A8 02 00 00 - mov rcx,[rbx+000002A8]
"ROTTR.exe"+3580D63: E8 38 60 FC FF - call ROTTR.exe+3546DA0
"ROTTR.exe"+3580D68: 0F 28 74 24 20 - movaps xmm6,[rsp+20]
"ROTTR.exe"+3580D6D: 48 83 C4 30 - add rsp,30
"ROTTR.exe"+3580D71: 5B - pop rbx
"ROTTR.exe"+3580D72: C3 - ret
"ROTTR.exe"+3580D73: AA - stosb
}
{
// graphic blood on: "ROTTR.exe"+35575E3
"ROTTR.exe"+355758E: FF C0 - inc eax
"ROTTR.exe"+3557590: 89 87 A0 06 00 00 - mov [rdi+000006A0],eax
"ROTTR.exe"+3557596: 89 8C 3A 50 05 00 00 - mov [rdx+rdi+00000550],ecx
"ROTTR.exe"+355759D: 66 0F 7F 84 3A 60 05 00 00 - movdqa [rdx+rdi+00000560],xmm0
"ROTTR.exe"+35575A6: 44 89 B4 3A 70 05 00 00 - mov [rdx+rdi+00000570],r14d
"ROTTR.exe"+35575AE: 48 C7 84 3A 74 05 00 00 00 00 80 3F - mov qword ptr [rdx+rdi+00000574],3F800000
"ROTTR.exe"+35575BA: 44 89 B4 3A 7C 05 00 00 - mov [rdx+rdi+0000057C],r14d
"ROTTR.exe"+35575C2: C7 84 3A 84 05 00 00 00 00 80 3E - mov [rdx+rdi+00000584],3E800000
"ROTTR.exe"+35575CD: C7 84 3A 80 05 00 00 00 00 80 40 - mov [rdx+rdi+00000580],40800000
"ROTTR.exe"+35575D8: C7 84 3A 8C 05 00 00 00 00 80 3F - mov [rdx+rdi+0000058C],3F800000
// ---------- INJECTING HERE ----------
"ROTTR.exe"+35575E3: 48 C7 84 3A 90 05 00 00 00 00 80 3F - mov qword ptr [rdx+rdi+00000590],3F800000
// ---------- DONE INJECTING ----------
"ROTTR.exe"+35575EF: 48 C7 84 3A 98 05 00 00 00 00 80 3F - mov qword ptr [rdx+rdi+00000598],3F800000
"ROTTR.exe"+35575FB: 44 89 B4 3A A0 05 00 00 - mov [rdx+rdi+000005A0],r14d
"ROTTR.exe"+3557603: 48 89 F9 - mov rcx,rdi
"ROTTR.exe"+3557606: 4C 89 B4 3A A8 05 00 00 - mov [rdx+rdi+000005A8],r14
"ROTTR.exe"+355760E: 44 89 B4 3A B0 05 00 00 - mov [rdx+rdi+000005B0],r14d
"ROTTR.exe"+3557616: E8 15 D9 02 00 - call ROTTR.exe+3584F30
"ROTTR.exe"+355761B: 4C 8B 74 24 50 - mov r14,[rsp+50]
"ROTTR.exe"+3557620: 48 8B 74 24 48 - mov rsi,[rsp+48]
"ROTTR.exe"+3557625: 48 8B 5C 24 40 - mov rbx,[rsp+40]
"ROTTR.exe"+355762A: 0F 28 74 24 20 - movaps xmm6,[rsp+20]
}
{
// gtaphic blood off: "ROTTR.exe"+35852D1
"ROTTR.exe"+35852A2: F3 41 0F 10 06 - movss xmm0,[r14]
"ROTTR.exe"+35852A7: E8 F4 43 EE FF - call ROTTR.exe+34696A0
"ROTTR.exe"+35852AC: 4C 8B 4C 24 28 - mov r9,[rsp+28]
"ROTTR.exe"+35852B1: 48 8B 94 24 08 03 00 00 - mov rdx,[rsp+00000308]
"ROTTR.exe"+35852B9: 4C 8B 54 24 20 - mov r10,[rsp+20]
"ROTTR.exe"+35852BE: 0F 28 C6 - movaps xmm0,xmm6
"ROTTR.exe"+35852C1: 41 0F 28 D1 - movaps xmm2,xmm9
"ROTTR.exe"+35852C5: F3 41 0F 11 37 - movss [r15],xmm6
"ROTTR.exe"+35852CA: F3 41 0F 59 C3 - mulss xmm0,xmm11
"ROTTR.exe"+35852CF: 31 C0 - xor eax,eax
// ---------- INJECTING HERE ----------
"ROTTR.exe"+35852D1: F3 41 0F 11 31 - movss [r9],xmm6
// ---------- DONE INJECTING ----------
"ROTTR.exe"+35852D6: 4C 89 F9 - mov rcx,r15
"ROTTR.exe"+35852D9: F3 0F 58 C6 - addss xmm0,xmm6
"ROTTR.exe"+35852DD: 89 02 - mov [rdx],eax
"ROTTR.exe"+35852DF: F3 0F 5C D0 - subss xmm2,xmm0
"ROTTR.exe"+35852E3: 48 8D 94 24 00 03 00 00 - lea rdx,[rsp+00000300]
"ROTTR.exe"+35852EB: 45 31 C9 - xor r9d,r9d
"ROTTR.exe"+35852EE: 41 89 04 24 - mov [r12],eax
"ROTTR.exe"+35852F2: 41 C7 06 00 00 80 3F - mov [r14],3F800000
"ROTTR.exe"+35852F9: 41 89 02 - mov [r10],eax
"ROTTR.exe"+35852FC: 41 C6 47 18 01 - mov byte ptr [r15+18],01
}
308
"Triggerbot"
Auto Assembler Script
[ENABLE]
aobscanmodule(triggerbot,ROTTR.exe,F3 0F 10 4B 44 F3 0F 11 44) // should be unique
alloc(newmem,$100,"ROTTR.exe"+40CCD54)
globalalloc(crosshair,8)
label(code)
label(return)
newmem:
mov [crosshair],rbx
code:
movss xmm1,[rbx+44]
jmp return
triggerbot:
jmp newmem
return:
registersymbol(triggerbot)
{$lua}
timer = createTimer()
timer:setInterval(10)
timer.OnTimer = function()
leftClickAddress = 0x80789F00
rightClick = readBytes(0x80789F04,1)
crosshairValue = readFloat("[crosshair]+44")
if (rightClick == 4) then
if (crosshairValue == 0) then
writeBytes(leftClickAddress,4)
end
if (crosshairValue == 255) then
writeBytes(leftClickAddress,1)
if isKeyPressed(VK_LBUTTON) then
writeBytes(leftClickAddress,4)
end
end
end
end
{$asm}
[DISABLE]
{$lua}
timer.destroy()
{$asm}
triggerbot:
db F3 0F 10 4B 44
unregistersymbol(triggerbot)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+40CCD54
"ROTTR.exe"+40CCD2C: F3 0F 10 63 50 - movss xmm4,[rbx+50]
"ROTTR.exe"+40CCD31: F3 0F 10 6B 54 - movss xmm5,[rbx+54]
"ROTTR.exe"+40CCD36: 0F 57 DB - xorps xmm3,xmm3
"ROTTR.exe"+40CCD39: 0F 57 D2 - xorps xmm2,xmm2
"ROTTR.exe"+40CCD3C: F2 48 0F 2C C8 - cvttsd2si rcx,xmm0
"ROTTR.exe"+40CCD41: F3 0F 10 43 38 - movss xmm0,[rbx+38]
"ROTTR.exe"+40CCD46: F3 0F 11 4C 24 24 - movss [rsp+24],xmm1
"ROTTR.exe"+40CCD4C: 89 C8 - mov eax,ecx
"ROTTR.exe"+40CCD4E: C1 E8 10 - shr eax,10
"ROTTR.exe"+40CCD51: 0F B6 C0 - movzx eax,al
// ---------- INJECTING HERE ----------
"ROTTR.exe"+40CCD54: F3 0F 10 4B 44 - movss xmm1,[rbx+44]
// ---------- DONE INJECTING ----------
"ROTTR.exe"+40CCD59: F3 0F 11 44 24 20 - movss [rsp+20],xmm0
"ROTTR.exe"+40CCD5F: F3 0F 10 43 40 - movss xmm0,[rbx+40]
"ROTTR.exe"+40CCD64: F3 0F 11 44 24 28 - movss [rsp+28],xmm0
"ROTTR.exe"+40CCD6A: F3 0F 10 43 48 - movss xmm0,[rbx+48]
"ROTTR.exe"+40CCD6F: F3 0F 11 4C 24 2C - movss [rsp+2C],xmm1
"ROTTR.exe"+40CCD75: F3 0F 10 4B 4C - movss xmm1,[rbx+4C]
"ROTTR.exe"+40CCD7A: F3 0F 11 5B 38 - movss [rbx+38],xmm3
"ROTTR.exe"+40CCD7F: F3 0F 11 44 24 30 - movss [rsp+30],xmm0
"ROTTR.exe"+40CCD85: 0F 57 C0 - xorps xmm0,xmm0
"ROTTR.exe"+40CCD88: F3 48 0F 2A C0 - cvtsi2ss xmm0,rax
}
skewcameracheat
143809C07
skewenable
13FFF003F
playerCheck
009A0000
SpideySenses
1435581D6
GiftPoints
143599C03
rottr_healthCalc
1431698FA
rottr_getPlayer
1433A662D
FreezeSkillPoints
1438A4AFB
UnlimitedSpideySenses
143A3B6C5
AllResources
143A57E9D
player_ptr
38A80000
onehit
1449A29F9
highlight
144369A65
items
1446A892E
aobJumpHeightCalc_r
144B45DE6
aobJumpHeightCalc_i
132600046
bEnableJumpHeightBonus
132600000
fJumpHeightBonus
132600004
pPlayerRagDoll
13260004E
enemy_too
13FFE003D
assassinations
1449AC822
nonlethal
144966512
mana
1448469D1
reload
14470BC9A
bend_time
1446EA95C
choke1
1449646D1
inventory
1448FD131
inventory_ptr
13FFF0026
player
1449746AC
playthrough_stats
144AC3E12
playthrough_stats_ptr
14D810022
stats
14497C844
stats_ptr
14D820083
chaos
144762AEF
crosshair
06F80000
Info about this table:
Cheat Table by kelavpp for the game
"Rise of The Tomb Raider - 20 Year Celabration 2016
- version 1.0 build 767.2_64.
When triggerbot is checked you need to bring the crosshair up, and when it turns red the weapon automatically fires.
"ROTTR.exe"+3A73DCE
NO ZOOM
"NxApp_GoldMaster.dll"+26089
4 left click
13FFF0000
50