[TUTORIAL] NO AGGRO RANGE MONSTERS

08/10/2020 16:35 Naniooooo#1






{ Game : dekaron.exe
Version:
Date : 2020-03-20
Author : naniii

This script does blah blah blah
}




define(address,"NEWEST.exe"+175065)
define(bytes,0F B6 86 7F 01 00 00)

[ENABLE]

assert(address,bytes)
alloc(newmem,$1000)

label(code)
label(return)

newmem:
mov byte ptr [esi+0000017F],0
mov byte ptr [esi+000001F1],0
mov byte ptr [esi+000001B8],0
mov byte ptr [esi+00000263],0
mov byte ptr [esi+000002D5],0
mov byte ptr [esi+0000029C],0
mov byte ptr [esi+000003B9],0
mov byte ptr [esi+000003F2],0
mov byte ptr [esi+0000042B],0
mov byte ptr [esi+0000029C],0
mov byte ptr [esi+00000380],0
mov byte ptr [esi+00000464],0
mov [esi+00000180],0
mov [esi+000001F2],0
mov [esi+000001B9],0
mov [esi+00000264],0
mov [esi+000002D6],0
mov [esi+0000029D],0
mov [esi+000003BA],0
mov [esi+000003F3],0
mov [esi+0000029D],0
mov [esi+00000381],0
mov [esi+0000029D],0
mov [esi+0000042C],0
mov [esi+00000465],0
mov [esi+0000029D],0
mov [ebp-74],0
mov [ebp-70],0
mov [ebp-60],0
mov [ebp-64],0
mov [ebp-6C],0
mov [ebp-68],0
mov [ebp-58],0
mov [ebp-54],0
mov [ebp-50],0
mov [ebp-4C],0
mov [ebp-48],0
mov [ebp-44],0
mov [ebp-3C],0
mov [ebp-38],0
mov [ebp-34],0
//mov [edi+0C],0
mov [ebp-30],0
mov [ebp-2C],0
mov [ebp-28],0
mov [ebp-24],0
mov [ebp-20],0
mov [ebp-1C],0
mov [ebp-18],0
mov [ebp-14],0
mov [ebp-10],0
mov [ebp-40],0
mov [ebp-5C],0



code:
movzx eax,byte ptr [esi+0000017F]
jmp return

address:
jmp newmem
nop 2
return:

[DISABLE]

address:
db bytes
// movzx eax,byte ptr [esi+0000017F]

dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "dekaron.exe"+16D6D5

"dekaron.exe"+16D6BA: 8D 8D 40 FF FF FF - lea ecx,[ebp-000000C0]
"dekaron.exe"+16D6C0: 51 - push ecx
"dekaron.exe"+16D6C1: 8B C8 - mov ecx,eax
"dekaron.exe"+16D6C3: 8B 10 - mov edx,[eax]
"dekaron.exe"+16D6C5: FF 52 18 - call dword ptr [edx+18]
"dekaron.exe"+16D6C8: 6A 68 - push 68
"dekaron.exe"+16D6CA: 8D 45 8C - lea eax,[ebp-74]
"dekaron.exe"+16D6CD: 6A 00 - push 00
"dekaron.exe"+16D6CF: 50 - push eax
"dekaron.exe"+16D6D0: E8 CB CF A2 00 - call dekaron.exe+B9A6A0
// ---------- INJECTING HERE ----------
"dekaron.exe"+16D6D5: 0F B6 86 7F 01 00 00 - movzx eax,byte ptr [esi+0000017F]
// ---------- DONE INJECTING ----------
"dekaron.exe"+16D6DC: 83 C4 0C - add esp,0C
"dekaron.exe"+16D6DF: 89 45 8C - mov [ebp-74],eax
"dekaron.exe"+16D6E2: 8B 86 80 01 00 00 - mov eax,[esi+00000180]
"dekaron.exe"+16D6E8: 89 45 90 - mov [ebp-70],eax
"dekaron.exe"+16D6EB: 0F B6 86 F1 01 00 00 - movzx eax,byte ptr [esi+000001F1]
"dekaron.exe"+16D6F2: 89 45 94 - mov [ebp-6C],eax
"dekaron.exe"+16D6F5: 8B 86 F2 01 00 00 - mov eax,[esi+000001F2]
"dekaron.exe"+16D6FB: 89 45 98 - mov [ebp-68],eax
"dekaron.exe"+16D6FE: 0F B6 86 B8 01 00 00 - movzx eax,byte ptr [esi+000001B8]
"dekaron.exe"+16D705: 89 45 9C - mov [ebp-64],eax
}

_______________________________________________


50% OF THE CREDITS GO TO ICRAZIE :D
08/22/2020 10:04 Naniooooo#2
{ Game : dekaron.exe
Version:
Date : 2020-08-22
Author : nani

This script does blah blah blah
}

define(address,"dekaron.exe"+1626A5)
define(bytes,0F B6 86 FF 01 00 00)

[ENABLE]

assert(address,bytes)
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
mov byte ptr [esi+000001FF],0
mov [ebp-74],0
mov [esi+00000200],0
mov [ebp-70],0
mov byte ptr [esi+00000271],0
mov [ebp-6C],0
mov [esi+00000272],0
mov [ebp-68],0
mov byte ptr [esi+00000238],0
mov [ebp-64],0
mov [esi+00000239],0
mov [ebp-60],0
mov byte ptr [esi+000002E3],0
mov [ebp-58],0
mov [esi+000002E4],0
mov [ebp-54],0
mov byte ptr [esi+00000355],0
mov [ebp-50],0
mov [esi+00000356],0
mov [ebp-4C],0
mov byte ptr [esi+0000031C],0
mov [ebp-48],0
mov [esi+0000031D],0
mov [ebp-44],0
mov byte ptr [esi+00000439],0
mov [ebp-3C],0
mov [esi+0000043A],0
mov [ebp-38],0
mov byte ptr [esi+00000472],0
mov [ebp-34],0
mov [esi+00000473],0
//mov [edi+0C],0
mov [ebp-30],0
mov byte ptr [esi+000004AB],0
mov [ebp-2C],0
mov [esi+000004AC],0
mov [ebp-28],0
mov byte ptr [esi+000004E4],0
mov [ebp-24],0
mov [esi+000004E5],0
mov [ebp-20],0
mov byte ptr [esi+0000031C],0
mov [ebp-1C],0
mov [esi+0000031D],0
mov [ebp-18],0
mov byte ptr [esi+00000400],0
mov [ebp-14],0
mov [esi+00000401],0
mov [ebp-10],0
mov [esi+0000031D],0
mov [ebp-40],0
mov [esi+0000031D],0
mov [ebp-5C],0
jmp return

address:
jmp newmem
nop 2
return:

[DISABLE]

address:
db bytes
// movzx eax,byte ptr [esi+000001FF]

dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "dekaron.exe"+1626A5

"dekaron.exe"+16268A: 8D 8D 40 FF FF FF - lea ecx,[ebp-000000C0]
"dekaron.exe"+162690: 51 - push ecx
"dekaron.exe"+162691: 8B C8 - mov ecx,eax
"dekaron.exe"+162693: 8B 10 - mov edx,[eax]
"dekaron.exe"+162695: FF 52 18 - call dword ptr [edx+18]
"dekaron.exe"+162698: 6A 68 - push 68
"dekaron.exe"+16269A: 8D 45 8C - lea eax,[ebp-74]
"dekaron.exe"+16269D: 6A 00 - push 00
"dekaron.exe"+16269F: 50 - push eax
"dekaron.exe"+1626A0: E8 0B FC 9A 00 - call dekaron.exe+B122B0
// ---------- INJECTING HERE ----------
"dekaron.exe"+1626A5: 0F B6 86 FF 01 00 00 - movzx eax,byte ptr [esi+000001FF]
// ---------- DONE INJECTING ----------
"dekaron.exe"+1626AC: 83 C4 0C - add esp,0C
"dekaron.exe"+1626AF: 89 45 8C - mov [ebp-74],eax
"dekaron.exe"+1626B2: 8B 86 00 02 00 00 - mov eax,[esi+00000200]
"dekaron.exe"+1626B8: 89 45 90 - mov [ebp-70],eax
"dekaron.exe"+1626BB: 0F B6 86 71 02 00 00 - movzx eax,byte ptr [esi+00000271]
"dekaron.exe"+1626C2: 89 45 94 - mov [ebp-6C],eax
"dekaron.exe"+1626C5: 8B 86 72 02 00 00 - mov eax,[esi+00000272]
"dekaron.exe"+1626CB: 89 45 98 - mov [ebp-68],eax
"dekaron.exe"+1626CE: 0F B6 86 38 02 00 00 - movzx eax,byte ptr [esi+00000238]
"dekaron.exe"+1626D5: 89 45 9C - mov [ebp-64],eax
}