超级玩家
 
- 贡献度
- 47
- 金元
- 5124
- 积分
- 700
- 精华
- 0
- 注册时间
- 2006-11-20
|
{ Game : WO4.exe
Version:
Date : 2018-10-27
Author : Gavin
This script does blah blah blah
}
[ENABLE]
aobscanmodule(MountPointer_AOB,WO4U.dll,0F B7 00 3B C1) // should be unique
alloc(newmem,$1000,"WO4U.dll")
label(code)
label(return)
label(mountptr)
registersymbol(mountptr)
newmem:
mov [mountptr],rax
code:
movzx eax,word ptr [rax]
cmp eax,ecx
jmp return
mountptr:
dq 0
MountPointer_AOB:
jmp newmem
return:
registersymbol(MountPointer_AOB)
[DISABLE]
MountPointer_AOB:
db 0F B7 00 3B C1
unregistersymbol(MountPointer_AOB)
unregistersymbol(mountptr)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "WO4.exe"+4DB364
"WO4.exe"+4DB32F: B8 03 00 00 00 - mov eax,00000003
"WO4.exe"+4DB334: 44 3B C8 - cmp r9d,eax
"WO4.exe"+4DB337: 41 0F 42 C1 - cmovb eax,r9d
"WO4.exe"+4DB33B: 89 83 6C B9 01 00 - mov [rbx+0001B96C],eax
"WO4.exe"+4DB341: F3 41 0F 10 9E 04 01 00 00 - movss xmm3,[r14+00000104]
"WO4.exe"+4DB34A: E8 51 65 09 00 - call WO4.exe+5718A0
"WO4.exe"+4DB34F: 48 8B 45 E0 - mov rax,[rbp-20]
"WO4.exe"+4DB353: B9 01 00 00 00 - mov ecx,00000001
"WO4.exe"+4DB358: BA F4 01 00 00 - mov edx,000001F4
"WO4.exe"+4DB35D: C7 45 C8 13 00 00 00 - mov [rbp-38],00000013
// ---------- INJECTING HERE ----------
"WO4.exe"+4DB364: 0F B7 00 - movzx eax,word ptr [rax]
"WO4.exe"+4DB367: 3B C1 - cmp eax,ecx
// ---------- DONE INJECTING ----------
"WO4.exe"+4DB369: 0F 47 C8 - cmova ecx,eax
"WO4.exe"+4DB36C: 3B CA - cmp ecx,edx
"WO4.exe"+4DB36E: 0F 42 D1 - cmovb edx,ecx
"WO4.exe"+4DB371: 48 8D 0D 3C 1C 40 00 - lea rcx,[WO4.exe+8DCFB4]
"WO4.exe"+4DB378: E8 B3 45 E6 FF - call WO4.exe+33F930
"WO4.exe"+4DB37D: F3 0F 10 05 2B 6E 91 00 - movss xmm0,[WO4.exe+DF21B0]
"WO4.exe"+4DB385: 48 8D 55 C8 - lea rdx,[rbp-38]
"WO4.exe"+4DB389: F3 0F 10 0D 23 6E 91 00 - movss xmm1,[WO4.exe+DF21B4]
"WO4.exe"+4DB391: 48 8D 4D D0 - lea rcx,[rbp-30]
"WO4.exe"+4DB395: F3 41 0F 58 45 00 - addss xmm0,dword ptr [r13+00]
}
|
|