94
"Start Up (stores Character Pointer to CharAdr)"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrusky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_CHARADR,TH2.exe,8B 45 F4 8B 4D EC 03) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
label(CharAdr)
registersymbol(CharAdr)
newmem:
code:
mov eax,[ebp-0C]
mov ecx,[ebp-14]
mov [CharAdr],eax //save Character Address
jmp return
CharAdr:
dd 0
INJECT_CHARADR:
jmp newmem
nop
return:
registersymbol(INJECT_CHARADR)
[DISABLE]
INJECT_CHARADR:
db 8B 45 F4 8B 4D EC
unregistersymbol(CharAdr)
unregistersymbol(INJECT_CHARADR)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+1564EC
"TH2.exe"+1564C9: 89 45 FC - mov [ebp-04],eax
"TH2.exe"+1564CC: 8B 4D FC - mov ecx,[ebp-04]
"TH2.exe"+1564CF: 83 79 08 FF - cmp dword ptr [ecx+08],-01
"TH2.exe"+1564D3: 75 02 - jne TH2.exe+1564D7
"TH2.exe"+1564D5: EB CE - jmp TH2.exe+1564A5
"TH2.exe"+1564D7: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+1564DA: 83 BA 64 01 00 00 00 - cmp dword ptr [edx+00000164],00
"TH2.exe"+1564E1: 75 02 - jne TH2.exe+1564E5
"TH2.exe"+1564E3: EB C0 - jmp TH2.exe+1564A5
"TH2.exe"+1564E5: C7 45 F0 01 00 00 00 - mov [ebp-10],00000001
// ---------- INJECTING HERE ----------
"TH2.exe"+1564EC: 8B 45 F4 - mov eax,[ebp-0C]
"TH2.exe"+1564EF: 8B 4D EC - mov ecx,[ebp-14]
// ---------- DONE INJECTING ----------
"TH2.exe"+1564F2: 03 88 68 01 00 00 - add ecx,[eax+00000168]
"TH2.exe"+1564F8: 8B 55 F4 - mov edx,[ebp-0C]
"TH2.exe"+1564FB: 8B 82 68 01 00 00 - mov eax,[edx+00000168]
"TH2.exe"+156501: 0F AF 45 DC - imul eax,[ebp-24]
"TH2.exe"+156505: 99 - cdq
"TH2.exe"+156506: BE 64 00 00 00 - mov esi,00000064
"TH2.exe"+15650B: F7 FE - idiv esi
"TH2.exe"+15650D: 03 C8 - add ecx,eax
"TH2.exe"+15650F: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+156512: 0F B6 90 60 01 00 00 - movzx edx,byte ptr [eax+00000160]
}
59
"Cheats"
1
68
"New More Loots (F11 Hotkey)"
Auto Assembler Script
[ENABLE]
alloc(newmemStart,128)
label(returnhereStart)
label(originalcodeStart)
label(exitStart)
label(OldVal)
registersymbol(OldVal)
newmemStart:
mov [ebp-30],00000001
originalcodeStart:
movzx ecx,byte ptr [ebp-30]
test ecx,ecx
exitStart:
jmp returnhereStart
OldVal:
dd 0
"TH2.exe"+1A77DE:
jmp newmemStart
nop
returnhereStart:
alloc(newmemEnd,128)
label(returnhereEnd)
label(originalcodeEnd)
label(exitEnd)
newmemEnd:
push edx
mov edx,[OldVal]
mov [ebp-14],edx
mov edx,[edx+TH2.exe+575D84]
mov [ebp-10],edx
pop edx
originalcodeEnd:
mov esp,ebp
pop ebp
ret
int 3
exitEnd:
jmp returnhereEnd
"TH2.exe"+1A7F51:
jmp newmemEnd
returnhereEnd:
alloc(newmemMulti,128)
label(returnhereMulti)
label(originalcodeMulti)
label(exitMulti)
newmemMulti:
mov ecx,[ebp-14]
mov [OldVal],ecx
cmp dword ptr[eax+18],00
je originalcodeMulti
mov [ebp-14],1340
mov ecx,[1340+TH2.exe+575D84]
mov [ebp-10],ecx
originalcodeMulti:
imul eax,edx,0B
mov ecx,[ebp-10]
exitMulti:
jmp returnhereMulti
"TH2.exe"+1A7984:
jmp newmemMulti
nop
returnhereMulti:
[DISABLE]
dealloc(newmemMulti)
"TH2.exe"+1A7984:
imul eax,edx,0B
mov ecx,[ebp-10]
dealloc(newmemEnd)
"TH2.exe"+1A7F51:
mov esp,ebp
pop ebp
ret
int 3
dealloc(newmemStart)
"TH2.exe"+1A77DE:
movzx ecx,byte ptr [ebp-30]
test ecx,ecx
unregistersymbol(OldVal)
Toggle Activation
122
0
34
"Gold Cheat"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrusky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_GOLDCHEAT,TH2.exe,03 84 0A 3E 2F 00 00) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
// i added this to set each pile to 50k before it is counted
mov [edx+ecx+00002F3E],#50000
//this is adding up all gold piles
add eax,[edx+ecx+00002F3E]
jmp return
INJECT_GOLDCHEAT:
jmp newmem
nop 2
return:
registersymbol(INJECT_GOLDCHEAT)
[DISABLE]
INJECT_GOLDCHEAT:
db 03 84 0A 3E 2F 00 00
unregistersymbol(INJECT_GOLDCHEAT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+226D93
"TH2.exe"+226D61: 8B 84 0A 3E 2F 00 00 - mov eax,[edx+ecx+00002F3E]
"TH2.exe"+226D68: 3B 05 FC 9C BE 01 - cmp eax,[TH2.exe+7E9CFC]
"TH2.exe"+226D6E: 7E 16 - jle TH2.exe+226D86
"TH2.exe"+226D70: 69 4D F8 4B 04 00 00 - imul ecx,[ebp-08],0000044B
"TH2.exe"+226D77: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+226D7A: A1 FC 9C BE 01 - mov eax,[TH2.exe+7E9CFC]
"TH2.exe"+226D7F: 89 84 0A 3E 2F 00 00 - mov [edx+ecx+00002F3E],eax
"TH2.exe"+226D86: 69 4D F8 4B 04 00 00 - imul ecx,[ebp-08],0000044B
"TH2.exe"+226D8D: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+226D90: 8B 45 EC - mov eax,[ebp-14]
// ---------- INJECTING HERE ----------
"TH2.exe"+226D93: 03 84 0A 3E 2F 00 00 - add eax,[edx+ecx+00002F3E]
// ---------- DONE INJECTING ----------
"TH2.exe"+226D9A: 89 45 EC - mov [ebp-14],eax
"TH2.exe"+226D9D: EB 8D - jmp TH2.exe+226D2C
"TH2.exe"+226D9F: 8B 4D FC - mov ecx,[ebp-04]
"TH2.exe"+226DA2: 8B 91 CC 01 00 00 - mov edx,[ecx+000001CC]
"TH2.exe"+226DA8: 3B 55 EC - cmp edx,[ebp-14]
"TH2.exe"+226DAB: 74 0C - je TH2.exe+226DB9
"TH2.exe"+226DAD: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+226DB0: 8B 4D EC - mov ecx,[ebp-14]
"TH2.exe"+226DB3: 89 88 CC 01 00 00 - mov [eax+000001CC],ecx
"TH2.exe"+226DB9: 8B 55 FC - mov edx,[ebp-04]
}
60
"God Mode"
1
61
"Life"
1
Array of byte
4
CharAdr
190
62
"Mana"
1
Array of byte
4
CharAdr
1A4
86
"Stat Cheats (can change in script)"
1
80
"Str+200"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrusky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_STRCHEAT,TH2.exe,03 88 68 01 00 00 8B 55 FC) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
add ecx,[eax+00000168]
add ecx,#200 // adds 200 Str, change if you like
jmp return
INJECT_STRCHEAT:
jmp newmem
nop
return:
registersymbol(INJECT_STRCHEAT)
[DISABLE]
INJECT_STRCHEAT:
db 03 88 68 01 00 00
unregistersymbol(INJECT_STRCHEAT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+141D80
"TH2.exe"+141D51: 89 95 5C FD FF FF - mov [ebp-000002A4],edx
"TH2.exe"+141D57: 8B 95 5C FD FF FF - mov edx,[ebp-000002A4]
"TH2.exe"+141D5D: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141D60: 8B 88 A0 00 00 00 - mov ecx,[eax+000000A0]
"TH2.exe"+141D66: E8 75 E6 01 00 - call TH2.exe+1603E0
"TH2.exe"+141D6B: 8B 4D FC - mov ecx,[ebp-04]
"TH2.exe"+141D6E: 8A 55 BC - mov dl,[ebp-44]
"TH2.exe"+141D71: 88 91 3E 01 00 00 - mov [ecx+0000013E],dl
"TH2.exe"+141D77: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141D7A: 8B 8D 14 FF FF FF - mov ecx,[ebp-000000EC]
// ---------- INJECTING HERE ----------
"TH2.exe"+141D80: 03 88 68 01 00 00 - add ecx,[eax+00000168]
// ---------- DONE INJECTING ----------
"TH2.exe"+141D86: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141D89: 89 8A 64 01 00 00 - mov [edx+00000164],ecx
"TH2.exe"+141D8F: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141D92: 8B 8D 10 FF FF FF - mov ecx,[ebp-000000F0]
"TH2.exe"+141D98: 03 88 78 01 00 00 - add ecx,[eax+00000178]
"TH2.exe"+141D9E: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DA1: 89 8A 74 01 00 00 - mov [edx+00000174],ecx
"TH2.exe"+141DA7: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DAA: 8B 8D 60 FF FF FF - mov ecx,[ebp-000000A0]
"TH2.exe"+141DB0: 03 88 70 01 00 00 - add ecx,[eax+00000170]
}
83
"Mag+200"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrusky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_MAGCHEAT,TH2.exe,03 88 70 01 00 00 8B 55 FC) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
add ecx,[eax+00000170]
add ecx,#200 // adds 200 Mag, change if you like
jmp return
INJECT_MAGCHEAT:
jmp newmem
nop
return:
registersymbol(INJECT_MAGCHEAT)
[DISABLE]
INJECT_MAGCHEAT:
db 03 88 70 01 00 00
unregistersymbol(INJECT_MAGCHEAT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+141DB0
"TH2.exe"+141D80: 03 88 68 01 00 00 - add ecx,[eax+00000168]
"TH2.exe"+141D86: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141D89: 89 8A 64 01 00 00 - mov [edx+00000164],ecx
"TH2.exe"+141D8F: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141D92: 8B 8D 10 FF FF FF - mov ecx,[ebp-000000F0]
"TH2.exe"+141D98: 03 88 78 01 00 00 - add ecx,[eax+00000178]
"TH2.exe"+141D9E: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DA1: 89 8A 74 01 00 00 - mov [edx+00000174],ecx
"TH2.exe"+141DA7: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DAA: 8B 8D 60 FF FF FF - mov ecx,[ebp-000000A0]
// ---------- INJECTING HERE ----------
"TH2.exe"+141DB0: 03 88 70 01 00 00 - add ecx,[eax+00000170]
// ---------- DONE INJECTING ----------
"TH2.exe"+141DB6: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DB9: 89 8A 6C 01 00 00 - mov [edx+0000016C],ecx
"TH2.exe"+141DBF: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DC2: 8B 4D AC - mov ecx,[ebp-54]
"TH2.exe"+141DC5: 03 88 80 01 00 00 - add ecx,[eax+00000180]
"TH2.exe"+141DCB: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DCE: 89 8A 7C 01 00 00 - mov [edx+0000017C],ecx
"TH2.exe"+141DD4: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DD7: 8B 80 68 01 00 00 - mov eax,[eax+00000168]
"TH2.exe"+141DDD: 0F AF 85 48 FF FF FF - imul eax,[ebp-000000B8]
}
81
"Dex+200"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrusky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_DEXCHEAT,TH2.exe,03 88 78 01 00 00 8B 55 FC) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
add ecx,[eax+00000178]
add ecx,#200 // adds 200 Dex, change if you like
jmp return
INJECT_DEXCHEAT:
jmp newmem
nop
return:
registersymbol(INJECT_DEXCHEAT)
[DISABLE]
INJECT_DEXCHEAT:
db 03 88 78 01 00 00
unregistersymbol(INJECT_DEXCHEAT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+141D98
"TH2.exe"+141D6B: 8B 4D FC - mov ecx,[ebp-04]
"TH2.exe"+141D6E: 8A 55 BC - mov dl,[ebp-44]
"TH2.exe"+141D71: 88 91 3E 01 00 00 - mov [ecx+0000013E],dl
"TH2.exe"+141D77: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141D7A: 8B 8D 14 FF FF FF - mov ecx,[ebp-000000EC]
"TH2.exe"+141D80: 03 88 68 01 00 00 - add ecx,[eax+00000168]
"TH2.exe"+141D86: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141D89: 89 8A 64 01 00 00 - mov [edx+00000164],ecx
"TH2.exe"+141D8F: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141D92: 8B 8D 10 FF FF FF - mov ecx,[ebp-000000F0]
// ---------- INJECTING HERE ----------
"TH2.exe"+141D98: 03 88 78 01 00 00 - add ecx,[eax+00000178]
// ---------- DONE INJECTING ----------
"TH2.exe"+141D9E: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DA1: 89 8A 74 01 00 00 - mov [edx+00000174],ecx
"TH2.exe"+141DA7: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DAA: 8B 8D 60 FF FF FF - mov ecx,[ebp-000000A0]
"TH2.exe"+141DB0: 03 88 70 01 00 00 - add ecx,[eax+00000170]
"TH2.exe"+141DB6: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DB9: 89 8A 6C 01 00 00 - mov [edx+0000016C],ecx
"TH2.exe"+141DBF: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DC2: 8B 4D AC - mov ecx,[ebp-54]
"TH2.exe"+141DC5: 03 88 80 01 00 00 - add ecx,[eax+00000180]
}
84
"Vit+200"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrsuky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_VITCHEAT,TH2.exe,03 88 80 01 00 00 8B 55 FC) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
add ecx,[eax+00000180]
add ecx,#200 // adds 200 Vit, change if you like
jmp return
INJECT_VITCHEAT:
jmp newmem
nop
return:
registersymbol(INJECT_VITCHEAT)
[DISABLE]
INJECT_VITCHEAT:
db 03 88 80 01 00 00
unregistersymbol(INJECT_VITCHEAT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+141DC5
"TH2.exe"+141D98: 03 88 78 01 00 00 - add ecx,[eax+00000178]
"TH2.exe"+141D9E: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DA1: 89 8A 74 01 00 00 - mov [edx+00000174],ecx
"TH2.exe"+141DA7: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DAA: 8B 8D 60 FF FF FF - mov ecx,[ebp-000000A0]
"TH2.exe"+141DB0: 03 88 70 01 00 00 - add ecx,[eax+00000170]
"TH2.exe"+141DB6: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DB9: 89 8A 6C 01 00 00 - mov [edx+0000016C],ecx
"TH2.exe"+141DBF: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DC2: 8B 4D AC - mov ecx,[ebp-54]
// ---------- INJECTING HERE ----------
"TH2.exe"+141DC5: 03 88 80 01 00 00 - add ecx,[eax+00000180]
// ---------- DONE INJECTING ----------
"TH2.exe"+141DCB: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DCE: 89 8A 7C 01 00 00 - mov [edx+0000017C],ecx
"TH2.exe"+141DD4: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+141DD7: 8B 80 68 01 00 00 - mov eax,[eax+00000168]
"TH2.exe"+141DDD: 0F AF 85 48 FF FF FF - imul eax,[ebp-000000B8]
"TH2.exe"+141DE4: 99 - cdq
"TH2.exe"+141DE5: B9 64 00 00 00 - mov ecx,00000064
"TH2.exe"+141DEA: F7 F9 - idiv ecx
"TH2.exe"+141DEC: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+141DEF: 03 82 64 01 00 00 - add eax,[edx+00000164]
}
85
"Magic Find +7677"
Auto Assembler Script
{ Game : TH2.exe
Version:
Date : 2019-09-02
Author : Tivrusky
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT_MFCHEAT,TH2.exe,03 95 80 FC FF FF) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
add edx,[ebp-00000380]
// add edx,#7677 // adds 7677 MF, change if you like
mov edx,#7677 // changes 7677 MF, change if you like
jmp return
INJECT_MFCHEAT:
jmp newmem
nop
return:
registersymbol(INJECT_MFCHEAT)
[DISABLE]
INJECT_MFCHEAT:
db 03 95 80 FC FF FF
unregistersymbol(INJECT_MFCHEAT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "TH2.exe"+144E33
"TH2.exe"+144E04: 8B 55 C8 - mov edx,[ebp-38]
"TH2.exe"+144E07: 52 - push edx
"TH2.exe"+144E08: 68 7C 5A 77 01 - push TH2.exe+375A7C
"TH2.exe"+144E0D: E8 EE DA 0C 00 - call TH2.exe+212900
"TH2.exe"+144E12: 83 C4 08 - add esp,08
"TH2.exe"+144E15: 89 85 80 FC FF FF - mov [ebp-00000380],eax
"TH2.exe"+144E1B: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+144E1E: 66 8B 88 9B 82 01 00 - mov cx,[eax+0001829B]
"TH2.exe"+144E25: 66 89 8D 8E FE FF FF - mov [ebp-00000172],cx
"TH2.exe"+144E2C: 0F BF 95 8E FE FF FF - movsx edx,word ptr [ebp-00000172]
// ---------- INJECTING HERE ----------
"TH2.exe"+144E33: 03 95 80 FC FF FF - add edx,[ebp-00000380]
// ---------- DONE INJECTING ----------
"TH2.exe"+144E39: 8B 45 FC - mov eax,[ebp-04]
"TH2.exe"+144E3C: 66 89 90 9B 82 01 00 - mov [eax+0001829B],dx
"TH2.exe"+144E43: B9 4B 04 00 00 - mov ecx,0000044B
"TH2.exe"+144E48: C1 E1 02 - shl ecx,02
"TH2.exe"+144E4B: 8B 55 FC - mov edx,[ebp-04]
"TH2.exe"+144E4E: 83 BC 0A 94 03 00 00 03 - cmp dword ptr [edx+ecx+00000394],03
"TH2.exe"+144E56: 75 55 - jne TH2.exe+144EAD
"TH2.exe"+144E58: B8 4B 04 00 00 - mov eax,0000044B
"TH2.exe"+144E5D: C1 E0 02 - shl eax,02
"TH2.exe"+144E60: 8B 4D FC - mov ecx,[ebp-04]
}
98
"All Spell Levels+20"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
originalcode:
mov [edx+00018219],al
add [edx+00018219],#20
exit:
jmp returnhere
"TH2.exe"+144274:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"TH2.exe"+144274:
mov [edx+00018219],al
//Alt: db 88 82 19 82 01 00
58
"Player Stats"
1
49
"Name"
String
32
0
0
1
CharAdr
140
47
"Class?"
4 Bytes
CharAdr
160
18
"Strength"
4 Bytes
CharAdr
164
51
"Base"
4 Bytes
CharAdr
168
15
"Magic"
4 Bytes
CharAdr
16C
50
"Base"
4 Bytes
CharAdr
170
21
"Dexterity"
4 Bytes
CharAdr
174
52
"Base"
4 Bytes
CharAdr
178
24
"Vitality"
4 Bytes
CharAdr
17C
53
"Base"
4 Bytes
CharAdr
180
48
"Stat Points"
4 Bytes
CharAdr
184
45
"Life (encrypted)"
1
Array of byte
4
CharAdr
190
46
"Mana (encrypted)"
1
Array of byte
4
CharAdr
1A4
54
"Level"
4 Bytes
CharAdr
1B8
28
"Experience"
4 Bytes
CharAdr
1BC
27
"Gold"
4 Bytes
CharAdr
1CC
33
"Magic Find"
4 Bytes
CharAdr
1829B
40
"Perks"
Array of byte
41
CharAdr
1a531
70
"Spell Levels"
Array of byte
43
CharAdr
C2
71
"Selected Spell"
Byte
CharAdr
B4
Drop Book
TH2.exe+148686
55
08
8B
4D
F0
E8
D5
07
00
00
E9
F3
00
00
00
<LuaScript>
errorOnLookupFailure(false)
DefaultProccessName = "TH2.exe"
strings_add(getAutoAttachList(), DefaultProccessName)
</LuaScript>
errorOnLookupFailure(false)
DefaultProccessName = "TH2.exe"
strings_add(getAutoAttachList(), DefaultProccessName)
"TH2.exe"+14891D
ITEM?