{ Game : dekaron.exe
Version:
Date : 2019-03-31
Author : nan
This script does blah blah blah
}
[ENABLE]
aobscanmodule(VAC,dekaron.exe,8B 42 04 89 41 08 8B 42)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
mov [edx+04],63 //DwExploreRange
mov eax,[edx+04]
mov [ecx+08],eax
mov [edx+04],63 //DwSight
mov eax,[edx+08]
mov [ecx+0C],eax
mov [edx],63 //DwPersuitRange
mov eax,[edx]
mov [ecx+04],eax
mov [edx+0c],0 //DwAvoidRange
mov eax,[edx+0C]
mov [ecx+10],eax
mov [edx+10],0 //DwExploreStandDelay
mov eax,[edx+10]
mov [ecx+14],eax
mov [edx+14],0 //DwExploreMoveDelay
mov eax,[edx+14]
mov [ecx+18],eax
mov [edx+18],0 //DwStandDelay
mov eax,[edx+18]
mov [ecx+1C],eax
mov [edx+1C],1 //DwMoveDelay
mov eax,[edx+1C]
mov [ecx+20],eax
mov [edx+20],0 //DwFollowMyMasterRange
mov eax,[edx+20]
mov [ecx+24],eax
mov [edx+24],0 //DwStopMasterNear
mov eax,[edx+24]
mov [ecx+28],eax
mov [edx+28],0 //DwWarpMyMasterRange
mov eax,[edx+28]
mov [ecx+2C],eax
Mov [edx+2C],0 //DwCallTeamPossibelHP
mov eax,[edx+2C]
mov [ecx+30],eax
mov [edx+30],63 //DwCallTeamCount
mov eax,[edx+30]
mov [ecx+34],eax
mov [edx+34],0 //DwBlockNFirstAttack
mov eax,[edx+34]
mov [ecx+38],eax
mov [edx+38],63 //dwCallTeamCell
mov al,[edx+38]
mov [ecx+3C],al
mov [edx+3C],9999 //dwFollowTarget
mov eax,[edx+3C]
mov [ecx+40],eax
mov [edx+40],0 //dwSpecialAttackStartHP
mov eax,[edx+40]
mov [ecx+44],eax
mov [edx+44],0 //dwSpecialMeleeAttackRate
mov eax,[edx+44]
mov [ecx+48],eax
mov [edx+48],0 //dwSpecialRangeAttackRate
mov eax,[edx+48]
mov [ecx+4C],eax
mov [edx+4C],0 //dwSpecialAttackRate
mov eax,[edx+4C]
mov [ecx+50],eax
mov [edx+50],0 //dwSpecialAttackTargetType
mov eax,[edx+50]
mov [ecx+54],eax
mov [edx+54],0 //dwSpecialAttackTargetValue
mov eax,[edx+54]
mov [ecx+58],eax
mov [edx+58],0 //dwSpecialDelayTime
mov eax,[edx+58]
mov [ecx+5C],eax
mov [edx+5C],0 //DwPowerAttackStartHP
mov eax,[edx+5C]
mov [ecx+60],eax
mov [edx+60],0 //dwPowerMeleeAttackProbable
mov eax,[edx+60]
mov [ecx+64],eax
mov [edx+64],0 //dwPowerRangeAttackProbable
mov eax,[edx+64]
mov [ecx+68],eax
mov [edx+68],0 //dwPowerRate
mov eax,[edx+68]
mov [ecx+6C],eax
mov [edx+6C],0 //dwPowerAttackTargetType
mov eax,[edx+6C]
mov [ecx+70],eax
mov [edx+70],0 //dwPowerAttackTargetValue
mov eax,[edx+70]
mov [ecx+74],eax
mov [edx+74],0 //dwPowerDelayTime
mov eax,[edx+74]
mov [ecx+78],eax
mov [edx+78],0 //dwAttack1_Rate
mov eax,[edx+78]
mov [ecx+7C],eax
mov [edx+7C],0 //dwAttack1_TargetType
mov eax,[edx+7C]
mov [ecx+00000080],eax
mov [edx+80],0 //dwAttack1_TargetValue
mov eax,[edx+00000080]
mov [ecx+00000084],eax
mov [edx+84],0 //dwAttack2_Rate
mov eax,[edx+00000084]
mov [ecx+00000088],eax
mov [edx+88],0 //dwAttack2_TargetType
mov eax,[edx+00000088]
mov [ecx+0000008C],eax
mov [edx+8C],0 //dwAttack2_TargetValue
mov eax,[edx+0000008C]
mov [ecx+00000090],eax
mov [edx+90],0 //dwAttack3_Rate
mov eax,[edx+00000090]
mov [ecx+00000094],eax
mov [edx+94],0 //dwAttack3_TargetType
mov eax,[edx+00000094]
mov [ecx+00000098],eax
mov [edx+98],0 //dwAttack3_TargetValue
mov eax,[edx+00000098]
mov [ecx+0000009C],eax
mov [edx+9C],0 //dwAttack4_Rate
mov eax,[edx+0000009C]
mov [ecx+000000A0],eax
mov [edx+A0],0 //dwAttack4_TargetType
mov eax,[edx+000000A0]
mov [ecx+000000A4],eax
mov [edx+A4],0 //dwAttack4_TargetValue
mov eax,[edx+000000A4]
mov [ecx+000000A8],eax
mov [edx+A8],63 //dwMaxSummonsMonsterCount
mov eax,[edx+000000A8]
mov [ecx+000000AC],eax
mov [edx+AC],1 //dwReSummonsMonsterTick
mov eax,[edx+000000AC]
mov [ecx+000000B0],eax
mov [edx+B0],0 //dwMaxSummonsMonsterRange
mov eax,[edx+000000B0]
mov [ecx+000000B4],eax
mov [edx+B4],1 //dwSummonsStartPcCount
mov eax,[edx+000000B4]
mov [ecx+000000B8],eax
code:
mov eax,[edx+04]
mov [ecx+08],eax
jmp return
VAC:
jmp newmem
nop
return:
registersymbol(VAC)
[DISABLE]
VAC:
db 8B 42 04 89 41 08
unregistersymbol(VAC)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "dekaron.exe"+746136
"dekaron.exe"+746129: CC - int 3
"dekaron.exe"+74612A: CC - int 3
"dekaron.exe"+74612B: CC - int 3
"dekaron.exe"+74612C: CC - int 3
"dekaron.exe"+74612D: CC - int 3
"dekaron.exe"+74612E: CC - int 3
"dekaron.exe"+74612F: CC - int 3
"dekaron.exe"+746130: 55 - push ebp
"dekaron.exe"+746131: 8B EC - mov ebp,esp
"dekaron.exe"+746133: 8B 55 08 - mov edx,[ebp+08]
// ---------- INJECTING HERE ----------
"dekaron.exe"+746136: 8B 42 04 - mov eax,[edx+04]
"dekaron.exe"+746139: 89 41 08 - mov [ecx+08],eax
// ---------- DONE INJECTING ----------
"dekaron.exe"+74613C: 8B 42 08 - mov eax,[edx+08]
"dekaron.exe"+74613F: 89 41 0C - mov [ecx+0C],eax
"dekaron.exe"+746142: 8B 02 - mov eax,[edx]
"dekaron.exe"+746144: 89 41 04 - mov [ecx+04],eax
"dekaron.exe"+746147: 8B 42 0C - mov eax,[edx+0C]
"dekaron.exe"+74614A: 89 41 10 - mov [ecx+10],eax
"dekaron.exe"+74614D: 8B 42 10 - mov eax,[edx+10]
"dekaron.exe"+746150: 89 41 14 - mov [ecx+14],eax
"dekaron.exe"+746153: 8B 42 14 - mov eax,[edx+14]
"dekaron.exe"+746156: 89 41 18 - mov [ecx+18],eax
}