Re: Sword Art Online: Fatal Bullet(Steam)DIY
Posted: Sun Feb 25, 2018 11:34 am
Thanks for the good work. Haven't noticed anything weird being affected by both scripts.
Community Cheat Tables of Cheat Engine
https://fearlessrevolution.com/
Code: Select all
{ Game : SAOFB-Win64-Shipping.exe
Version:
Date : 2018-02-25
Author : Dekirai
This script does blah blah blah
}
[ENABLE]
aobscanmodule(infammo,SAOFB-Win64-Shipping.exe,89 83 7C 06 00 00 48) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+33E502)
label(code)
label(return)
newmem:
code:
mov [rbx+0000067C],eax
jmp return
infammo:
nop
nop
nop
nop
nop
nop
return:
registersymbol(infammo)
[DISABLE]
infammo:
db 89 83 7C 06 00 00
unregistersymbol(infammo)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+33E502
"SAOFB-Win64-Shipping.exe"+33E4E1: 0F 84 87 00 00 00 - je SAOFB-Win64-Shipping.exe+33E56E
"SAOFB-Win64-Shipping.exe"+33E4E7: 80 B8 84 06 00 00 00 - cmp byte ptr [rax+00000684],00
"SAOFB-Win64-Shipping.exe"+33E4EE: 75 D6 - jne SAOFB-Win64-Shipping.exe+33E4C6
"SAOFB-Win64-Shipping.exe"+33E4F0: 48 83 C4 20 - add rsp,20
"SAOFB-Win64-Shipping.exe"+33E4F4: 5B - pop rbx
"SAOFB-Win64-Shipping.exe"+33E4F5: C3 - ret
"SAOFB-Win64-Shipping.exe"+33E4F6: 8B 83 7C 06 00 00 - mov eax,[rbx+0000067C]
"SAOFB-Win64-Shipping.exe"+33E4FC: 85 C0 - test eax,eax
"SAOFB-Win64-Shipping.exe"+33E4FE: 74 08 - je SAOFB-Win64-Shipping.exe+33E508
"SAOFB-Win64-Shipping.exe"+33E500: FF C8 - dec eax
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+33E502: 89 83 7C 06 00 00 - mov [rbx+0000067C],eax
// ---------- DONE INJECTING ----------
"SAOFB-Win64-Shipping.exe"+33E508: 48 8B CB - mov rcx,rbx
"SAOFB-Win64-Shipping.exe"+33E50B: E8 20 9A 00 00 - call SAOFB-Win64-Shipping.exe+347F30
"SAOFB-Win64-Shipping.exe"+33E510: 84 C0 - test al,al
"SAOFB-Win64-Shipping.exe"+33E512: 74 5A - je SAOFB-Win64-Shipping.exe+33E56E
"SAOFB-Win64-Shipping.exe"+33E514: 80 BB 85 06 00 00 00 - cmp byte ptr [rbx+00000685],00
"SAOFB-Win64-Shipping.exe"+33E51B: 75 51 - jne SAOFB-Win64-Shipping.exe+33E56E
"SAOFB-Win64-Shipping.exe"+33E51D: 80 BB 89 03 00 00 05 - cmp byte ptr [rbx+00000389],05
"SAOFB-Win64-Shipping.exe"+33E524: 75 21 - jne SAOFB-Win64-Shipping.exe+33E547
"SAOFB-Win64-Shipping.exe"+33E526: 4C 8D 83 98 06 00 00 - lea r8,[rbx+00000698]
"SAOFB-Win64-Shipping.exe"+33E52D: 41 B9 01 00 00 00 - mov r9d,00000001
}
this also effect when you sell and move items to item box so when you have it active, you will be overweight very quickly since you can only carry a limited amount of items with you 170 to be exact.qweasdzxc17 wrote: ↑Sun Feb 25, 2018 7:22 amNo items usage for enhancing and transforming.Code: Select all
{ Game : SAOFB-Win64-Shipping.exe Version: Date : 2018-02-25 Author : qweasdzxc17 This script does blah blah blah } [ENABLE] aobscanmodule(SAOFBNoMats,SAOFB-Win64-Shipping.exe,72 29 F8 89 41 10 48 83 B9 ?? ?? ?? ?? ?? 74 2F 48 8B 89) registersymbol(SAOFBNoMats) SAOFBNoMats+03: db 90 90 90 [DISABLE] SAOFBNoMats+03: db 89 41 10 unregistersymbol(SAOFBNoMats) { // ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5CF49E1 "SAOFB-Win64-Shipping.exe"+5CF49CA: 8B 41 10 - mov eax,[rcx+10] "SAOFB-Win64-Shipping.exe"+5CF49CD: 48 89 CB - mov rbx,rcx "SAOFB-Win64-Shipping.exe"+5CF49D0: 85 D2 - test edx,edx "SAOFB-Win64-Shipping.exe"+5CF49D2: 78 7D - js SAOFB-Win64-Shipping.exe+5CF4A51 "SAOFB-Win64-Shipping.exe"+5CF49D4: 39 C2 - cmp edx,eax "SAOFB-Win64-Shipping.exe"+5CF49D6: 89 C7 - mov edi,eax "SAOFB-Win64-Shipping.exe"+5CF49D8: 0F 4C FA - cmovl edi,edx "SAOFB-Win64-Shipping.exe"+5CF49DB: 85 FF - test edi,edi "SAOFB-Win64-Shipping.exe"+5CF49DD: 74 72 - je SAOFB-Win64-Shipping.exe+5CF4A51 "SAOFB-Win64-Shipping.exe"+5CF49DF: 29 F8 - sub eax,edi // ---------- INJECTING HERE ---------- "SAOFB-Win64-Shipping.exe"+5CF49E1: 89 41 10 - mov [rcx+10],eax "SAOFB-Win64-Shipping.exe"+5CF49E4: 48 83 B9 A0 00 00 00 00 - cmp qword ptr [rcx+000000A0],00 // ---------- DONE INJECTING ---------- "SAOFB-Win64-Shipping.exe"+5CF49EC: 74 2F - je SAOFB-Win64-Shipping.exe+5CF4A1D "SAOFB-Win64-Shipping.exe"+5CF49EE: 48 8B 89 A0 00 00 00 - mov rcx,[rcx+000000A0] "SAOFB-Win64-Shipping.exe"+5CF49F5: 89 7C 24 30 - mov [rsp+30],edi "SAOFB-Win64-Shipping.exe"+5CF49F9: C6 44 24 38 01 - mov byte ptr [rsp+38],01 "SAOFB-Win64-Shipping.exe"+5CF49FE: 48 85 C9 - test rcx,rcx "SAOFB-Win64-Shipping.exe"+5CF4A01: 75 07 - jne SAOFB-Win64-Shipping.exe+5CF4A0A "SAOFB-Win64-Shipping.exe"+5CF4A03: FF 15 BF BE BE 09 - call qword ptr [SAOFB-Win64-Shipping.exe+F8E08C8] "SAOFB-Win64-Shipping.exe"+5CF4A09: CC - int 3 "SAOFB-Win64-Shipping.exe"+5CF4A0A: 48 8B 01 - mov rax,[rcx] "SAOFB-Win64-Shipping.exe"+5CF4A0D: 4C 8D 4C 24 30 - lea r9,[rsp+30] }
May affect more than as stated, use with caution and let me know about any side-effects.
EDIT: Whoops, Register symbol on wrong line.
Ah, correct, sorry, first time I actually had to hook CE to save a script to a table.qweasdzxc17 wrote: ↑Sun Feb 25, 2018 9:39 amIf i'm not wrong that error just means CE hasnt hooked onto the game process yet.Spoiler
cdtrico wrote: ↑Sun Feb 25, 2018 9:16 amqweasdzxc17 wrote: ↑Sun Feb 25, 2018 8:45 amSpoiler
Use any skill twice to obtain 100% proficiency, let me know if there are any bugs.Code: Select all
{ Game : SAOFB-Win64-Shipping.exe Version: Date : 2018-02-25 Author : qweasdzxc17 This script does blah blah blah } [ENABLE] aobscanmodule(SAOFBSkillProf,SAOFB-Win64-Shipping.exe,44 89 14 B8 48 8D 8B ?? ?? ?? ?? 48 8B 43 38) // should be unique alloc(QuickSkillProf,$1000,"SAOFB-Win64-Shipping.exe"+5B4527E) label(QuickSkillProfOri) label(QuickSkillProfRet) label(addinto) QuickSkillProf: pushf cmp r10d,#999 jge QuickSkillProfOri jmp addinto addinto: mov r10d,#999 QuickSkillProfOri: popf mov [rax+rdi*4],r10d lea rcx,[rbx+000000C0] jmp QuickSkillProfRet SAOFBSkillProf: jmp QuickSkillProf nop nop nop nop nop nop QuickSkillProfRet: registersymbol(SAOFBSkillProf) [DISABLE] SAOFBSkillProf: db 44 89 14 B8 48 8D 8B C0 00 00 00 unregistersymbol(SAOFBSkillProf) dealloc(QuickSkillProf) { // ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B4527E "SAOFB-Win64-Shipping.exe"+5B4525B: 3B 53 40 - cmp edx,[rbx+40] "SAOFB-Win64-Shipping.exe"+5B4525E: 7D 48 - jnl SAOFB-Win64-Shipping.exe+5B452A8 "SAOFB-Win64-Shipping.exe"+5B45260: 48 8B 43 38 - mov rax,[rbx+38] "SAOFB-Win64-Shipping.exe"+5B45264: 48 89 7C 24 30 - mov [rsp+30],rdi "SAOFB-Win64-Shipping.exe"+5B45269: 48 63 FA - movsxd rdi,edx "SAOFB-Win64-Shipping.exe"+5B4526C: 45 85 C0 - test r8d,r8d "SAOFB-Win64-Shipping.exe"+5B4526F: 78 0D - js SAOFB-Win64-Shipping.exe+5B4527E "SAOFB-Win64-Shipping.exe"+5B45271: 41 BA E8 03 00 00 - mov r10d,000003E8 "SAOFB-Win64-Shipping.exe"+5B45277: 45 39 D0 - cmp r8d,r10d "SAOFB-Win64-Shipping.exe"+5B4527A: 45 0F 4C D0 - cmovl r10d,r8d // ---------- INJECTING HERE ---------- "SAOFB-Win64-Shipping.exe"+5B4527E: 44 89 14 B8 - mov [rax+rdi*4],r10d "SAOFB-Win64-Shipping.exe"+5B45282: 48 8D 8B C0 00 00 00 - lea rcx,[rbx+000000C0] // ---------- DONE INJECTING ---------- "SAOFB-Win64-Shipping.exe"+5B45289: 48 8B 43 38 - mov rax,[rbx+38] "SAOFB-Win64-Shipping.exe"+5B4528D: 44 8B 04 B8 - mov r8d,[rax+rdi*4] "SAOFB-Win64-Shipping.exe"+5B45291: E8 4A 0B 83 FA - call SAOFB-Win64-Shipping.exe+375DE0 "SAOFB-Win64-Shipping.exe"+5B45296: 48 8B 43 38 - mov rax,[rbx+38] "SAOFB-Win64-Shipping.exe"+5B4529A: 8B 04 B8 - mov eax,[rax+rdi*4] "SAOFB-Win64-Shipping.exe"+5B4529D: 48 8B 7C 24 30 - mov rdi,[rsp+30] "SAOFB-Win64-Shipping.exe"+5B452A2: 48 83 C4 20 - add rsp,20 "SAOFB-Win64-Shipping.exe"+5B452A6: 5B - pop rbx "SAOFB-Win64-Shipping.exe"+5B452A7: C3 - ret "SAOFB-Win64-Shipping.exe"+5B452A8: 44 89 D0 - mov eax,r10d }
EDIT: je to jge.
The other code assigns now, thanks!
This one is great too, except now I get an error at line 12 'Failure to determine what "SAOFB-win64-shipping.exe"+5B4527E means'.
Sorry for the trouble.
Absolutely fantastic. Works great for Skills and Gadgets. Any chance you could look into the Weapon Proficiency next?qweasdzxc17 wrote: ↑Sun Feb 25, 2018 8:45 amUse any skill twice to obtain 100% proficiency, let me know if there are any bugs.Code: Select all
{ Game : SAOFB-Win64-Shipping.exe Version: Date : 2018-02-25 Author : qweasdzxc17 This script does blah blah blah } [ENABLE] aobscanmodule(SAOFBSkillProf,SAOFB-Win64-Shipping.exe,44 89 14 B8 48 8D 8B ?? ?? ?? ?? 48 8B 43 38) // should be unique alloc(QuickSkillProf,$1000,"SAOFB-Win64-Shipping.exe"+5B4527E) label(QuickSkillProfOri) label(QuickSkillProfRet) label(addinto) QuickSkillProf: pushf cmp r10d,#999 jge QuickSkillProfOri jmp addinto addinto: mov r10d,#999 QuickSkillProfOri: popf mov [rax+rdi*4],r10d lea rcx,[rbx+000000C0] jmp QuickSkillProfRet SAOFBSkillProf: jmp QuickSkillProf nop nop nop nop nop nop QuickSkillProfRet: registersymbol(SAOFBSkillProf) [DISABLE] SAOFBSkillProf: db 44 89 14 B8 48 8D 8B C0 00 00 00 unregistersymbol(SAOFBSkillProf) dealloc(QuickSkillProf) { // ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B4527E "SAOFB-Win64-Shipping.exe"+5B4525B: 3B 53 40 - cmp edx,[rbx+40] "SAOFB-Win64-Shipping.exe"+5B4525E: 7D 48 - jnl SAOFB-Win64-Shipping.exe+5B452A8 "SAOFB-Win64-Shipping.exe"+5B45260: 48 8B 43 38 - mov rax,[rbx+38] "SAOFB-Win64-Shipping.exe"+5B45264: 48 89 7C 24 30 - mov [rsp+30],rdi "SAOFB-Win64-Shipping.exe"+5B45269: 48 63 FA - movsxd rdi,edx "SAOFB-Win64-Shipping.exe"+5B4526C: 45 85 C0 - test r8d,r8d "SAOFB-Win64-Shipping.exe"+5B4526F: 78 0D - js SAOFB-Win64-Shipping.exe+5B4527E "SAOFB-Win64-Shipping.exe"+5B45271: 41 BA E8 03 00 00 - mov r10d,000003E8 "SAOFB-Win64-Shipping.exe"+5B45277: 45 39 D0 - cmp r8d,r10d "SAOFB-Win64-Shipping.exe"+5B4527A: 45 0F 4C D0 - cmovl r10d,r8d // ---------- INJECTING HERE ---------- "SAOFB-Win64-Shipping.exe"+5B4527E: 44 89 14 B8 - mov [rax+rdi*4],r10d "SAOFB-Win64-Shipping.exe"+5B45282: 48 8D 8B C0 00 00 00 - lea rcx,[rbx+000000C0] // ---------- DONE INJECTING ---------- "SAOFB-Win64-Shipping.exe"+5B45289: 48 8B 43 38 - mov rax,[rbx+38] "SAOFB-Win64-Shipping.exe"+5B4528D: 44 8B 04 B8 - mov r8d,[rax+rdi*4] "SAOFB-Win64-Shipping.exe"+5B45291: E8 4A 0B 83 FA - call SAOFB-Win64-Shipping.exe+375DE0 "SAOFB-Win64-Shipping.exe"+5B45296: 48 8B 43 38 - mov rax,[rbx+38] "SAOFB-Win64-Shipping.exe"+5B4529A: 8B 04 B8 - mov eax,[rax+rdi*4] "SAOFB-Win64-Shipping.exe"+5B4529D: 48 8B 7C 24 30 - mov rdi,[rsp+30] "SAOFB-Win64-Shipping.exe"+5B452A2: 48 83 C4 20 - add rsp,20 "SAOFB-Win64-Shipping.exe"+5B452A6: 5B - pop rbx "SAOFB-Win64-Shipping.exe"+5B452A7: C3 - ret "SAOFB-Win64-Shipping.exe"+5B452A8: 44 89 D0 - mov eax,r10d }
EDIT: je to jge.
Code: Select all
{ Game : SAOFB-Win64-Shipping.exe
Version:
Date : 2018-02-25
Author : hanbq
This script does blah blah blah
}
[ENABLE]
aobscanmodule(metal_increase,SAOFB-Win64-Shipping.exe,43 89 04 1A 49 8B 40 38) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+5B437BE)
label(code)
label(return)
newmem:
mov eax, 0000270f
//inc eax
//inc eax
//inc eax
code:
mov [r10+r11],eax
mov rax,[r8+38]
jmp return
metal_increase:
jmp newmem
nop
nop
nop
return:
registersymbol(metal_increase)
[DISABLE]
metal_increase:
db 43 89 04 1A 49 8B 40 38
unregistersymbol(metal_increase)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B437BE
"SAOFB-Win64-Shipping.exe"+5B4379A: 4C 8D 1C 8D 00 00 00 00 - lea r11,[rcx*4+00000000]
"SAOFB-Win64-Shipping.exe"+5B437A2: 41 8B 0C 8A - mov ecx,[r10+rcx*4]
"SAOFB-Win64-Shipping.exe"+5B437A6: 41 89 C9 - mov r9d,ecx
"SAOFB-Win64-Shipping.exe"+5B437A9: 41 01 F9 - add r9d,edi
"SAOFB-Win64-Shipping.exe"+5B437AC: 79 04 - jns SAOFB-Win64-Shipping.exe+5B437B2
"SAOFB-Win64-Shipping.exe"+5B437AE: 31 C0 - xor eax,eax
"SAOFB-Win64-Shipping.exe"+5B437B0: EB 0C - jmp SAOFB-Win64-Shipping.exe+5B437BE
"SAOFB-Win64-Shipping.exe"+5B437B2: B8 0F 27 00 00 - mov eax,0000270F
"SAOFB-Win64-Shipping.exe"+5B437B7: 41 39 C1 - cmp r9d,eax
"SAOFB-Win64-Shipping.exe"+5B437BA: 41 0F 4C C1 - cmovl eax,r9d
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5B437BE: 43 89 04 1A - mov [r10+r11],eax
"SAOFB-Win64-Shipping.exe"+5B437C2: 49 8B 40 38 - mov rax,[r8+38]
// ---------- DONE INJECTING ----------
"SAOFB-Win64-Shipping.exe"+5B437C6: 41 8B 14 03 - mov edx,[r11+rax]
"SAOFB-Win64-Shipping.exe"+5B437CA: 39 D1 - cmp ecx,edx
"SAOFB-Win64-Shipping.exe"+5B437CC: 74 10 - je SAOFB-Win64-Shipping.exe+5B437DE
"SAOFB-Win64-Shipping.exe"+5B437CE: 49 8D 88 B0 02 00 00 - lea rcx,[r8+000002B0]
"SAOFB-Win64-Shipping.exe"+5B437D5: 44 0F B6 C3 - movzx r8d,bl
"SAOFB-Win64-Shipping.exe"+5B437D9: E8 22 25 83 FA - call SAOFB-Win64-Shipping.exe+375D00
"SAOFB-Win64-Shipping.exe"+5B437DE: 48 8B 5C 24 30 - mov rbx,[rsp+30]
"SAOFB-Win64-Shipping.exe"+5B437E3: 48 83 C4 20 - add rsp,20
"SAOFB-Win64-Shipping.exe"+5B437E7: 5F - pop rdi
"SAOFB-Win64-Shipping.exe"+5B437E8: C3 - ret
}
Code: Select all
{ Game : SAOFB-Win64-Shipping.exe
Version:
Date : 2018-02-25
Author : hanbq
This script does blah blah blah
}
[ENABLE]
aobscanmodule(metal_dec,SAOFB-Win64-Shipping.exe,41 89 14 1B 49 8B 4A 38) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+5B4328C)
label(code)
label(return)
newmem:
code:
// mov [r11+rbx],edx
mov rcx,[r10+38]
jmp return
metal_dec:
jmp newmem
nop
nop
nop
return:
registersymbol(metal_dec)
[DISABLE]
metal_dec:
db 41 89 14 1B 49 8B 4A 38
unregistersymbol(metal_dec)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B4328C
"SAOFB-Win64-Shipping.exe"+5B4326C: 48 8D 1C 85 00 00 00 00 - lea rbx,[rax*4+00000000]
"SAOFB-Win64-Shipping.exe"+5B43274: 41 8B 04 83 - mov eax,[r11+rax*4]
"SAOFB-Win64-Shipping.exe"+5B43278: 89 C1 - mov ecx,eax
"SAOFB-Win64-Shipping.exe"+5B4327A: 01 D1 - add ecx,edx
"SAOFB-Win64-Shipping.exe"+5B4327C: 79 04 - jns SAOFB-Win64-Shipping.exe+5B43282
"SAOFB-Win64-Shipping.exe"+5B4327E: 31 D2 - xor edx,edx
"SAOFB-Win64-Shipping.exe"+5B43280: EB 0A - jmp SAOFB-Win64-Shipping.exe+5B4328C
"SAOFB-Win64-Shipping.exe"+5B43282: BA 0F 27 00 00 - mov edx,0000270F
"SAOFB-Win64-Shipping.exe"+5B43287: 39 D1 - cmp ecx,edx
"SAOFB-Win64-Shipping.exe"+5B43289: 0F 4C D1 - cmovl edx,ecx
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5B4328C: 41 89 14 1B - mov [r11+rbx],edx
"SAOFB-Win64-Shipping.exe"+5B43290: 49 8B 4A 38 - mov rcx,[r10+38]
// ---------- DONE INJECTING ----------
"SAOFB-Win64-Shipping.exe"+5B43294: 8B 14 0B - mov edx,[rbx+rcx]
"SAOFB-Win64-Shipping.exe"+5B43297: 39 D0 - cmp eax,edx
"SAOFB-Win64-Shipping.exe"+5B43299: 74 0D - je SAOFB-Win64-Shipping.exe+5B432A8
"SAOFB-Win64-Shipping.exe"+5B4329B: 49 8D 8A B0 02 00 00 - lea rcx,[r10+000002B0]
"SAOFB-Win64-Shipping.exe"+5B432A2: 5B - pop rbx
"SAOFB-Win64-Shipping.exe"+5B432A3: E9 58 2A 83 FA - jmp SAOFB-Win64-Shipping.exe+375D00
"SAOFB-Win64-Shipping.exe"+5B432A8: 5B - pop rbx
"SAOFB-Win64-Shipping.exe"+5B432A9: C3 - ret
"SAOFB-Win64-Shipping.exe"+5B432AA: CC - int 3
"SAOFB-Win64-Shipping.exe"+5B432AB: F9 - stc
}
Code: Select all
{ Game : SAOFB-Win64-Shipping.exe
Version:
Date : 2018-02-25
Author : hanbq
This script does blah blah blah
}
[ENABLE]
aobscanmodule(metal_stock_desc,SAOFB-Win64-Shipping.exe,41 2B C6 44 0F 49 E0) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+5D32E0)
label(code)
label(return)
newmem:
xor r14d, r14d
code:
sub eax,r14d
cmovns r12d,eax
jmp return
metal_stock_desc:
jmp newmem
nop
nop
return:
registersymbol(metal_stock_desc)
[DISABLE]
metal_stock_desc:
db 41 2B C6 44 0F 49 E0
unregistersymbol(metal_stock_desc)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5D32E0
"SAOFB-Win64-Shipping.exe"+5D32C3: E8 E8 15 76 00 - call SAOFB-Win64-Shipping.exe+D348B0
"SAOFB-Win64-Shipping.exe"+5D32C8: FF C7 - inc edi
"SAOFB-Win64-Shipping.exe"+5D32CA: 49 FF C6 - inc r14
"SAOFB-Win64-Shipping.exe"+5D32CD: 83 FF 02 - cmp edi,02
"SAOFB-Win64-Shipping.exe"+5D32D0: 72 AE - jb SAOFB-Win64-Shipping.exe+5D3280
"SAOFB-Win64-Shipping.exe"+5D32D2: 45 33 E4 - xor r12d,r12d
"SAOFB-Win64-Shipping.exe"+5D32D5: 44 8B 75 77 - mov r14d,[rbp+77]
"SAOFB-Win64-Shipping.exe"+5D32D9: 8B 46 34 - mov eax,[rsi+34]
"SAOFB-Win64-Shipping.exe"+5D32DC: 85 C0 - test eax,eax
"SAOFB-Win64-Shipping.exe"+5D32DE: 78 0B - js SAOFB-Win64-Shipping.exe+5D32EB
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5D32E0: 41 2B C6 - sub eax,r14d
"SAOFB-Win64-Shipping.exe"+5D32E3: 44 0F 49 E0 - cmovns r12d,eax
// ---------- DONE INJECTING ----------
"SAOFB-Win64-Shipping.exe"+5D32E7: 44 89 66 34 - mov [rsi+34],r12d
"SAOFB-Win64-Shipping.exe"+5D32EB: 45 8B C6 - mov r8d,r14d
"SAOFB-Win64-Shipping.exe"+5D32EE: 48 8B D6 - mov rdx,rsi
"SAOFB-Win64-Shipping.exe"+5D32F1: 49 8B CD - mov rcx,r13
"SAOFB-Win64-Shipping.exe"+5D32F4: E8 07 5D FF FF - call SAOFB-Win64-Shipping.exe+5C9000
"SAOFB-Win64-Shipping.exe"+5D32F9: 41 8B C7 - mov eax,r15d
"SAOFB-Win64-Shipping.exe"+5D32FC: 48 81 C4 B8 00 00 00 - add rsp,000000B8
"SAOFB-Win64-Shipping.exe"+5D3303: 41 5F - pop r15
"SAOFB-Win64-Shipping.exe"+5D3305: 41 5E - pop r14
"SAOFB-Win64-Shipping.exe"+5D3307: 41 5D - pop r13
}