ShyTwig16 wrote: ↑Fri Apr 26, 2019 11:20 am
Here's a Krypt unlocker based on SunBeams findings.
This will Unlock all chests and doors and set the chest cost to 1 for all types, but you have to approach the chest twice to see the change. But there is something that resets some of the chests when I reloaded the game and it doesn't work on those.
Code: Select all
{
Process : MK11.exe - (x64)
Module : MK11.exe
Game Title : MK11
Game Version : 1.0.0.0
CE Version : 6.83
Script Version : 0.0.1
Date : 04/26/19
Author : ShyTwig16
Name : KryptChestCheckHook
Krypt Chest Check Hook
}
{$STRICT}
define(address, MK11.exe+8E5DD1F)
define(bytes, 83 BB 28 04 00 00 FF)
////
//// ------------------------------ ENABLE ------------------------------
[ENABLE]
aobScanModule(aobKryptChestCheckHook, MK11.exe, F7xxxxxxxxxxxxxxxxxx0F85xxxxxxxx83xxxxxxxxxxxx74xx83xxxxxxxxxxxx74xx83xxxxxxxxxxxx0F85xxxxxxxx83xxxxxxxxxxxx0F85xxxxxxxx83)
define(injKryptChestCheckHook, aobKryptChestCheckHook+10)
assert(injKryptChestCheckHook, bytes)
registerSymbol(injKryptChestCheckHook)
alloc(memKryptChestCheckHook, 0x400, injKryptChestCheckHook)
label(ptrKryptChestCheckHook)
registerSymbol(ptrKryptChestCheckHook)
label(n_code)
label(o_code)
label(exit)
label(return)
memKryptChestCheckHook:
ptrKryptChestCheckHook:
dq 0
align 10 CC
n_code:
push rax
mov [ptrKryptChestCheckHook],rbx
or byte ptr [rbx+D0],08
cmp dword ptr [rbx+488],00
je @f
mov dword ptr [rbx+488],01
jmp o_code
@@:
cmp dword ptr [rbx+4B8],00
je @f
mov dword ptr [rbx+4B8],01
jmp o_code
@@:
mov rax,[rbx+1C8]
test rax,rax
jz o_code
cmp dword ptr [rax+10],00
je @f
mov dword ptr [rax+10],01
jmp o_code
@@:
o_code:
cmp dword ptr [rbx+00000428],-01
exit:
pop rax
jmp return
////
//// ---------- Injection Point ----------
injKryptChestCheckHook:
jmp n_code
nop
nop
return:
////
//// ------------------------------ DISABLE ------------------------------
[DISABLE]
////
//// ---------- Injection Point ----------
injKryptChestCheckHook:
db bytes
unregisterSymbol(injKryptChestCheckHook)
unregisterSymbol(ptrKryptChestCheckHook)
dealloc(memKryptChestCheckHook)
{
//// Injection Point: MK11.exe+8E5DD1F - 0000000148E5DD1F
//// AOB address: 0000000148E5DD0F - MK11.exe+8E5DD0F
//// Process: MK11.exe - 0000000140000000
//// Module: MK11.exe - 0000000140000000
//// Module Size: 0000000017EBE000
MK11.exe+8E5DCCE: 48 8B 0C 24 - mov rcx,[rsp]
MK11.exe+8E5DCD2: 48 8D 64 24 08 - lea rsp,[rsp+08]
MK11.exe+8E5DCD7: 9D - popfq
MK11.exe+8E5DCD8: 53 - push rbx
MK11.exe+8E5DCD9: 48 8D 1D F0DF2101 - lea rbx,[14A07BCD0] [245C8948]
MK11.exe+8E5DCE0: 48 87 1C 24 - xchg [rsp],rbx
MK11.exe+8E5DCE4: C3 - ret
MK11.exe+8E5DCE5: 4C 8D 3D B03B5C0E - lea r15,[15742189C] [8D4C3289]
MK11.exe+8E5DCEC: 41 FF E3 - jmp r11
MK11.exe+8E5DCEF: 3D 48894C24 - cmp eax,244C8948 [(float)-0.0304]
MK11.exe+8E5DCF4: 08 53 48 - or [rbx+48],dl
MK11.exe+8E5DCF7: 83 EC 70 - sub esp,70
MK11.exe+8E5DCFA: 48 89 CB - mov rbx,rcx
MK11.exe+8E5DCFD: 31 D2 - xor edx,edx
MK11.exe+8E5DCFF: 31 C9 - xor ecx,ecx
MK11.exe+8E5DD01: E8 3AB25DF7 - call 140438F40
MK11.exe+8E5DD06: 48 85 C0 - test rax,rax
MK11.exe+8E5DD09: 0F84 47050000 - je 148E5E256
MK11.exe+8E5DD0F: F7 83 D0000000 00000200 - test [rbx+000000D0],20000 <<<--- AOB Starts Here
MK11.exe+8E5DD19: 0F85 37050000 - jne 148E5E256
//// INJECTING START ----------------------------------------------------------
MK11.exe+8E5DD1F: 83 BB 28040000 FF - cmp dword ptr [rbx+00000428],-01
//// INJECTING END ----------------------------------------------------------
MK11.exe+8E5DD26: 74 30 - je 148E5DD58
MK11.exe+8E5DD28: 83 BB 58040000 FF - cmp dword ptr [rbx+00000458],-01
MK11.exe+8E5DD2F: 74 27 - je 148E5DD58
MK11.exe+8E5DD31: 83 BB 88040000 00 - cmp dword ptr [rbx+00000488],00
MK11.exe+8E5DD38: 0F85 18050000 - jne 148E5E256
MK11.exe+8E5DD3E: 83 BB B8040000 00 - cmp dword ptr [rbx+000004B8],00
MK11.exe+8E5DD45: 0F85 0B050000 - jne 148E5E256
MK11.exe+8E5DD4B: 83 BB E8040000 00 - cmp dword ptr [rbx+000004E8],00
MK11.exe+8E5DD52: 0F85 FE040000 - jne 148E5E256
MK11.exe+8E5DD58: 48 89 6C 24 68 - mov [rsp+68],rbp
MK11.exe+8E5DD5D: 48 8B 2D 1C5320FA - mov rbp,[143063080] [74E4B940]
MK11.exe+8E5DD64: 48 89 AC 24 98000000 - mov [rsp+00000098],rbp
MK11.exe+8E5DD6C: 48 85 ED - test rbp,rbp
MK11.exe+8E5DD6F: 0F84 DC040000 - je 148E5E251
MK11.exe+8E5DD75: 48 89 D9 - mov rcx,rbx
MK11.exe+8E5DD78: E8 D3EB98F7 - call 1407EC950
MK11.exe+8E5DD7D: 83 F8 05 - cmp eax,05
MK11.exe+8E5DD80: 0F84 CB040000 - je 148E5E251
MK11.exe+8E5DD86: 48 83 BB C8010000 00 - cmp qword ptr [rbx+000001C8],00
MK11.exe+8E5DD8E: 0F85 BD040000 - jne 148E5E251
//// Template: I2CEA_AOBFullInjectionWithValues
//// Generated with: I2 Cheat Engine Auto Assembler Script Template Generator
//// Code Happy, Code Freely, Be Awesome.
}
If you want it to only approach the chest once use this script as well.
Code: Select all
{
Process : MK11.exe - (x64)
Module : MK11.exe
Game Title : MK11
Game Version : 1.0.0.0
CE Version : 6.83
Script Version : 0.0.1
Date : 04/25/19
Author : ShyTwig16
Name : KryptChestReadHook
Krypt Chest Read Hook
}
{$STRICT}
define(address, MK11.exe+8E87480)
define(bytes, 8B 96 88 04 00 00)
////
//// ------------------------------ ENABLE ------------------------------
[ENABLE]
aobScanModule(aobKryptChestReadHook, MK11.exe, 48xxxxFFxx8Bxxxxxxxxxx8Bxxxxxxxxxx8Bxxxxxxxxxx41xxxxxx75)
define(injKryptChestReadHook, aobKryptChestReadHook+5)
assert(injKryptChestReadHook, bytes)
registerSymbol(injKryptChestReadHook)
alloc(memKryptChestReadHook, 0x400, injKryptChestReadHook)
label(intKryptChestReadHook)
registerSymbol(intKryptChestReadHook)
label(ptrKryptChestReadHook)
registerSymbol(ptrKryptChestReadHook)
label(n_code)
label(o_code)
label(exit)
label(return)
memKryptChestReadHook:
intKryptChestReadHook:
dd (int)1
align 10
ptrKryptChestReadHook:
dq 0
align 10 CC
n_code:
mov [ptrKryptChestReadHook],rsi
mov edx,[intKryptChestReadHook]
cmp dword ptr [rsi+488],00
je @f
mov [rsi+488],edx
jmp o_code
@@:
cmp dword ptr [rsi+4B8],00
je @f
mov [rsi+4B8],edx
jmp o_code
@@:
o_code:
mov edx,[rsi+00000488]
exit:
jmp return
////
//// ---------- Injection Point ----------
injKryptChestReadHook:
jmp n_code
nop
return:
////
//// ------------------------------ DISABLE ------------------------------
[DISABLE]
////
//// ---------- Injection Point ----------
injKryptChestReadHook:
db bytes
unregisterSymbol(injKryptChestReadHook)
unregisterSymbol(intKryptChestReadHook)
unregisterSymbol(ptrKryptChestReadHook)
dealloc(memKryptChestReadHook)
{
//// Injection Point: MK11.exe+8E87480 - 0000000148E87480
//// AOB address: 0000000148E8747B - MK11.exe+8E8747B
//// Process: MK11.exe - 0000000140000000
//// Module: MK11.exe - 0000000140000000
//// Module Size: 0000000017EBE000
MK11.exe+8E87439: C1 E8 0F - shr eax,0F
MK11.exe+8E8743C: F6 D0 - not al
MK11.exe+8E8743E: 24 01 - and al,01
MK11.exe+8E87440: 48 8B 5C 24 30 - mov rbx,[rsp+30]
MK11.exe+8E87445: 48 8B 74 24 38 - mov rsi,[rsp+38]
MK11.exe+8E8744A: 48 83 C4 20 - add rsp,20
MK11.exe+8E8744E: 5F - pop rdi
MK11.exe+8E8744F: C3 - ret
MK11.exe+8E87450: 48 89 F1 - mov rcx,rsi
MK11.exe+8E87453: E8 383C96F7 - call 1407EB090
MK11.exe+8E87458: 41 89 C0 - mov r8d,eax
MK11.exe+8E8745B: FF C8 - dec eax
MK11.exe+8E8745D: 83 F8 16 - cmp eax,16
MK11.exe+8E87460: 77 1E - ja 148E87480
MK11.exe+8E87462: 48 63 C8 - movsxd rcx,eax
MK11.exe+8E87465: 48 8D 05 948B17F7 - lea rax,[140000000] [00905A4D]
MK11.exe+8E8746C: 0FB6 8C 08 4CBE7E00 - movzx ecx,byte ptr [rax+rcx+007EBE4C]
MK11.exe+8E87474: 8B 94 88 44BE7E00 - mov edx,[rax+rcx*4+007EBE44]
MK11.exe+8E8747B: 48 01 C2 - add rdx,rax <<<--- AOB Starts Here
MK11.exe+8E8747E: FF E2 - jmp rdx
//// INJECTING START ----------------------------------------------------------
MK11.exe+8E87480: 8B 96 88040000 - mov edx,[rsi+00000488]
//// INJECTING END ----------------------------------------------------------
MK11.exe+8E87486: 8B 8E B8040000 - mov ecx,[rsi+000004B8]
MK11.exe+8E8748C: 8B 86 E8040000 - mov eax,[rsi+000004E8]
MK11.exe+8E87492: 41 83 F8 0C - cmp r8d,0C
MK11.exe+8E87496: 75 3C - jne 148E874D4
MK11.exe+8E87498: 85 C9 - test ecx,ecx
MK11.exe+8E8749A: 7E 1A - jle 148E874B6
MK11.exe+8E8749C: C7 07 02000000 - mov [rdi],00000002
MK11.exe+8E874A2: B0 01 - mov al,01
MK11.exe+8E874A4: 89 0B - mov [rbx],ecx
MK11.exe+8E874A6: 48 8B 5C 24 30 - mov rbx,[rsp+30]
MK11.exe+8E874AB: 48 8B 74 24 38 - mov rsi,[rsp+38]
MK11.exe+8E874B0: 48 83 C4 20 - add rsp,20
MK11.exe+8E874B4: 5F - pop rdi
MK11.exe+8E874B5: C3 - ret
MK11.exe+8E874B6: 85 C0 - test eax,eax
MK11.exe+8E874B8: 7E 24 - jle 148E874DE
MK11.exe+8E874BA: C7 07 03000000 - mov [rdi],00000003
MK11.exe+8E874C0: 89 03 - mov [rbx],eax
MK11.exe+8E874C2: B0 01 - mov al,01
MK11.exe+8E874C4: 48 8B 5C 24 30 - mov rbx,[rsp+30]
//// Template: I2CEA_AOBFullInjection
//// Generated with: I2 Cheat Engine Auto Assembler Script Template Generator
//// Code Happy, Code Freely, Be Awesome.
}
SunBeam wrote: ↑Fri Apr 26, 2019 10:34 am
...Till then I'm on vacation
Have fun, where you going this time?
EDIT:
Does anyone know what this chest is?
[Link]
[Link]