4
"Autotransform(enable to transform)"
Auto Assembler Script
{ Game : Application.exe
Version:
Date : 2019-05-17
This script does blah blah blah
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(BuggedMode1,Application.exe,0F B7 41 14 C3) // should be unique
alloc(newmem,$100,"Application.exe"+4B6B70)
label(code)
label(return)
newmem:
code:
//movzx eax,word ptr [rcx+14]
mov eax,(int)80
ret
jmp return
BuggedMode1:
jmp newmem
return:
registersymbol(BuggedMode1)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
BuggedMode1:
db 0F B7 41 14 C3
unregistersymbol(BuggedMode1)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4B6B70
"Application.exe"+4B6B66: CC - int 3
"Application.exe"+4B6B67: CC - int 3
"Application.exe"+4B6B68: CC - int 3
"Application.exe"+4B6B69: CC - int 3
"Application.exe"+4B6B6A: CC - int 3
"Application.exe"+4B6B6B: CC - int 3
"Application.exe"+4B6B6C: CC - int 3
"Application.exe"+4B6B6D: CC - int 3
"Application.exe"+4B6B6E: CC - int 3
"Application.exe"+4B6B6F: CC - int 3
// ---------- INJECTING HERE ----------
"Application.exe"+4B6B70: 0F B7 41 14 - movzx eax,word ptr [rcx+14]
"Application.exe"+4B6B74: C3 - ret
// ---------- DONE INJECTING ----------
"Application.exe"+4B6B75: CC - int 3
"Application.exe"+4B6B76: CC - int 3
"Application.exe"+4B6B77: CC - int 3
"Application.exe"+4B6B78: CC - int 3
"Application.exe"+4B6B79: CC - int 3
"Application.exe"+4B6B7A: CC - int 3
"Application.exe"+4B6B7B: CC - int 3
"Application.exe"+4B6B7C: CC - int 3
"Application.exe"+4B6B7D: CC - int 3
"Application.exe"+4B6B7E: CC - int 3
}
11
"InstaKill"
Auto Assembler Script
{ Game : Application.exe
Version:
Date : 2019-05-18
This script does blah blah blah
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(InstaKill1,Application.exe,48 89 11 0F 95 C0 C3 CC) // should be unique
alloc(newmem,$1000,"Application.exe"+4B6E0B)
alloc(test1,$100)
label(code)
label(return)
newmem:
cmp [rcx+10],0000000A
jne code
je test1
test1:
mov [rcx],(int)0
setne al
jmp return
code:
mov [rcx],rdx
setne al
jmp return
InstaKill1:
jmp newmem
nop
return:
registersymbol(InstaKill1)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
InstaKill1:
db 48 89 11 0F 95 C0
unregistersymbol(InstaKill1)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4B6E0B
"Application.exe"+4B6DF0: 48 85 D2 - test rdx,rdx
"Application.exe"+4B6DF3: 79 0C - jns Application.exe+4B6E01
"Application.exe"+4B6DF5: 33 D2 - xor edx,edx
"Application.exe"+4B6DF7: 48 39 11 - cmp [rcx],rdx
"Application.exe"+4B6DFA: 48 89 11 - mov [rcx],rdx
"Application.exe"+4B6DFD: 0F 95 C0 - setne al
"Application.exe"+4B6E00: C3 - ret
"Application.exe"+4B6E01: 49 3B D0 - cmp rdx,r8
"Application.exe"+4B6E04: 49 0F 4F D0 - cmovg rdx,r8
"Application.exe"+4B6E08: 48 39 11 - cmp [rcx],rdx
// ---------- INJECTING HERE ----------
"Application.exe"+4B6E0B: 48 89 11 - mov [rcx],rdx
"Application.exe"+4B6E0E: 0F 95 C0 - setne al
// ---------- DONE INJECTING ----------
"Application.exe"+4B6E11: C3 - ret
"Application.exe"+4B6E12: CC - int 3
"Application.exe"+4B6E13: CC - int 3
"Application.exe"+4B6E14: CC - int 3
"Application.exe"+4B6E15: CC - int 3
"Application.exe"+4B6E16: CC - int 3
"Application.exe"+4B6E17: CC - int 3
"Application.exe"+4B6E18: CC - int 3
"Application.exe"+4B6E19: CC - int 3
"Application.exe"+4B6E1A: CC - int 3
}
13
"InfMP"
Auto Assembler Script
{ Game : Application.exe
Version:
Date : 2019-05-18
This script does blah blah blah
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(infMP,Application.exe,44 89 41 10 0F 95 C0) // should be unique
alloc(newmem,$1000,"Application.exe"+4B6F4B)
label(code)
label(return)
newmem:
code:
//mov [rcx+10],r8d
mov [rcx+10],9999
setne al
jmp return
infMP:
jmp newmem
nop
nop
return:
registersymbol(infMP)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
infMP:
db 44 89 41 10 0F 95 C0
unregistersymbol(infMP)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4B6F4B
"Application.exe"+4B6F39: CC - int 3
"Application.exe"+4B6F3A: CC - int 3
"Application.exe"+4B6F3B: CC - int 3
"Application.exe"+4B6F3C: CC - int 3
"Application.exe"+4B6F3D: CC - int 3
"Application.exe"+4B6F3E: CC - int 3
"Application.exe"+4B6F3F: CC - int 3
"Application.exe"+4B6F40: 41 3B D0 - cmp edx,r8d
"Application.exe"+4B6F43: 44 0F 46 C2 - cmovbe r8d,edx
"Application.exe"+4B6F47: 44 39 41 10 - cmp [rcx+10],r8d
// ---------- INJECTING HERE ----------
"Application.exe"+4B6F4B: 44 89 41 10 - mov [rcx+10],r8d
"Application.exe"+4B6F4F: 0F 95 C0 - setne al
// ---------- DONE INJECTING ----------
"Application.exe"+4B6F52: C3 - ret
"Application.exe"+4B6F53: CC - int 3
"Application.exe"+4B6F54: CC - int 3
"Application.exe"+4B6F55: CC - int 3
"Application.exe"+4B6F56: CC - int 3
"Application.exe"+4B6F57: CC - int 3
"Application.exe"+4B6F58: CC - int 3
"Application.exe"+4B6F59: CC - int 3
"Application.exe"+4B6F5A: CC - int 3
"Application.exe"+4B6F5B: CC - int 3
}
15
"Item 99 on use(infinite)"
Auto Assembler Script
{ Game : Application.exe
Version:
Date : 2019-05-18
This script does blah blah blah
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(Items99,Application.exe,89 7B 04 81 FE B6 03 00 00) // should be unique
alloc(newmem,$1000,"Application.exe"+4BE207)
label(code)
label(return)
newmem:
code:
//mov [rbx+04],edi
mov [rbx+04],(int)99
cmp esi,000003B6
jmp return
Items99:
jmp newmem
nop
nop
nop
nop
return:
registersymbol(Items99)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
Items99:
db 89 7B 04 81 FE B6 03 00 00
unregistersymbol(Items99)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4BE207
"Application.exe"+4BE1E1: 41 0F 48 FC - cmovs edi,r12d
"Application.exe"+4BE1E5: 48 3B DD - cmp rbx,rbp
"Application.exe"+4BE1E8: 41 8B C4 - mov eax,r12d
"Application.exe"+4BE1EB: 0F 94 C0 - sete al
"Application.exe"+4BE1EE: 41 01 80 48 36 01 00 - add [r8+00013648],eax
"Application.exe"+4BE1F5: B8 0F 27 00 00 - mov eax,0000270F
"Application.exe"+4BE1FA: 66 83 4B 02 01 - or word ptr [rbx+02],01
"Application.exe"+4BE1FF: 3B F8 - cmp edi,eax
"Application.exe"+4BE201: 66 89 33 - mov [rbx],si
"Application.exe"+4BE204: 0F 4F F8 - cmovg edi,eax
// ---------- INJECTING HERE ----------
"Application.exe"+4BE207: 89 7B 04 - mov [rbx+04],edi
"Application.exe"+4BE20A: 81 FE B6 03 00 00 - cmp esi,000003B6
// ---------- DONE INJECTING ----------
"Application.exe"+4BE210: 0F 85 2E 01 00 00 - jne Application.exe+4BE344
"Application.exe"+4BE216: 85 FF - test edi,edi
"Application.exe"+4BE218: 74 0A - je Application.exe+4BE224
"Application.exe"+4BE21A: 41 83 88 CC 11 00 00 04 - or dword ptr [r8+000011CC],04
"Application.exe"+4BE222: EB 08 - jmp Application.exe+4BE22C
"Application.exe"+4BE224: 41 83 A0 CC 11 00 00 FB - and dword ptr [r8+000011CC],-05
"Application.exe"+4BE22C: 85 FF - test edi,edi
"Application.exe"+4BE22E: 0F 84 10 01 00 00 - je Application.exe+4BE344
"Application.exe"+4BE234: 49 8D B0 28 29 00 00 - lea rsi,[r8+00002928]
"Application.exe"+4BE23B: 4C 89 7C 24 50 - mov [rsp+50],r15
}
17
"Max Money after battle"
Auto Assembler Script
{ Game : Application.exe
Version:
Date : 2019-05-19
This script does blah blah blah
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(MoneyMax,Application.exe,C9 EB 03 49 03 C8 49 89 89 40 36 01 00) // should be unique
alloc(newmem,$100,"Application.exe"+4BE417)
label(code)
label(return)
newmem:
code:
mov [r9+00013640],r10
jmp return
MoneyMax+06:
jmp newmem
nop
nop
return:
registersymbol(MoneyMax)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
MoneyMax+06:
db 49 89 89 40 36 01 00
unregistersymbol(MoneyMax)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4BE417
"Application.exe"+4BE3FE: 79 17 - jns Application.exe+4BE417
"Application.exe"+4BE400: 49 8B C0 - mov rax,r8
"Application.exe"+4BE403: 48 99 - cqo
"Application.exe"+4BE405: 48 33 C2 - xor rax,rdx
"Application.exe"+4BE408: 48 2B C2 - sub rax,rdx
"Application.exe"+4BE40B: 48 3B C8 - cmp rcx,rax
"Application.exe"+4BE40E: 73 04 - jae Application.exe+4BE414
"Application.exe"+4BE410: 33 C9 - xor ecx,ecx
"Application.exe"+4BE412: EB 03 - jmp Application.exe+4BE417
"Application.exe"+4BE414: 49 03 C8 - add rcx,r8
// ---------- INJECTING HERE ----------
"Application.exe"+4BE417: 49 89 89 40 36 01 00 - mov [r9+00013640],rcx
// ---------- DONE INJECTING ----------
"Application.exe"+4BE41E: 49 39 89 C0 12 00 00 - cmp [r9+000012C0],rcx
"Application.exe"+4BE425: 73 07 - jae Application.exe+4BE42E
"Application.exe"+4BE427: 49 89 89 C0 12 00 00 - mov [r9+000012C0],rcx
"Application.exe"+4BE42E: C3 - ret
"Application.exe"+4BE42F: CC - int 3
"Application.exe"+4BE430: 48 89 5C 24 10 - mov [rsp+10],rbx
"Application.exe"+4BE435: 48 89 6C 24 18 - mov [rsp+18],rbp
"Application.exe"+4BE43A: 48 89 4C 24 08 - mov [rsp+08],rcx
"Application.exe"+4BE43F: 56 - push rsi
"Application.exe"+4BE440: 57 - push rdi
}
19
"ExpMulti"
Auto Assembler Script
{ Game : Application.exe
Version:
Date : 2019-05-19
This script does blah blah blah
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(ExpMultiScript1,Application.exe,48 89 43 08 81 FE E7 03 00 00) // should be unique
alloc(newmem,$1000,"Application.exe"+4B58CD)
alloc(multi1,8)
registersymbol(multi1)
label(code)
label(return)
newmem:
code:
imul rax,[multi1]
mov [rbx+08],rax
cmp esi,000003E7
jmp return
ExpMultiScript1:
jmp newmem
nop
nop
nop
nop
nop
return:
registersymbol(ExpMultiScript1)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ExpMultiScript1:
db 48 89 43 08 81 FE E7 03 00 00
unregistersymbol(ExpMultiScript1)
dealloc(newmem)
dealloc(multi1)
unregistersymbol(multi1)
{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4B58CD
"Application.exe"+4B589D: C3 - ret
"Application.exe"+4B589E: 48 B8 FF FF 89 5D 78 45 63 01 - mov rax,016345785D89FFFF
"Application.exe"+4B58A8: 48 89 74 24 30 - mov [rsp+30],rsi
"Application.exe"+4B58AD: 0F B7 77 1A - movzx esi,word ptr [rdi+1A]
"Application.exe"+4B58B1: 48 3B E8 - cmp rbp,rax
"Application.exe"+4B58B4: 48 B9 FF FF E7 89 04 23 C7 8A - mov rcx,8AC7230489E7FFFF
"Application.exe"+4B58BE: 48 0F 46 C5 - cmovbe rax,rbp
"Application.exe"+4B58C2: 48 03 43 08 - add rax,[rbx+08]
"Application.exe"+4B58C6: 48 3B C1 - cmp rax,rcx
"Application.exe"+4B58C9: 48 0F 47 C1 - cmova rax,rcx
// ---------- INJECTING HERE ----------
"Application.exe"+4B58CD: 48 89 43 08 - mov [rbx+08],rax
"Application.exe"+4B58D1: 81 FE E7 03 00 00 - cmp esi,000003E7
// ---------- DONE INJECTING ----------
"Application.exe"+4B58D7: 73 2A - jae Application.exe+4B5903
"Application.exe"+4B58D9: 8B D6 - mov edx,esi
"Application.exe"+4B58DB: 48 8B CF - mov rcx,rdi
"Application.exe"+4B58DE: E8 5D 35 00 00 - call Application.exe+4B8E40
"Application.exe"+4B58E3: 48 85 C0 - test rax,rax
"Application.exe"+4B58E6: 74 16 - je Application.exe+4B58FE
"Application.exe"+4B58E8: 48 39 43 08 - cmp [rbx+08],rax
"Application.exe"+4B58EC: 72 10 - jb Application.exe+4B58FE
"Application.exe"+4B58EE: 48 8B D3 - mov rdx,rbx
"Application.exe"+4B58F1: 48 8B CF - mov rcx,rdi
}
20
"Multiplier (edit value)"
4 Bytes
multi1