Resource icon

Disneyland Adventures Cheats 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Disneyland Adventures Cheats
1595545462287.png


Features
  • Gold cheat
  • experience hack
Cheat Scripts
XP lookup:
{ Game   : Disney.exe
  Version:
  Date   : 2018-09-15
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(xp_lookup,Disney.exe,49 8B 06 49 89 04 24) // should be unique
alloc(newmem,$1000,"Disney.exe"+58C176)

label(code)
label(return)
label(xp_flag)
label(xp_addr)
label(xp_addy)
registersymbol(xp_addy)
registersymbol(xp_flag)

newmem:
cmp [xp_flag],1
je xp_addr
jmp code

xp_addr:
mov [xp_flag],0
push rbx
mov rbx,["Disney.exe"+00AE0FA8]
cmp rbx,0
je code
mov rbx,[rbx+560]
cmp rbx,0
je code
mov rbx,[rbx+18]
cmp rbx,0
je code
mov rbx,[rbx+378]
cmp rbx,0
je code
mov rbx,[rbx+20]
cmp rbx,0
je code
lea rbx,[rbx+150]
cmp rbx,0
je code
 mov qword ptr [xp_addy],rbx
pop rbx

code:
  mov rax,[r14]
  mov [r12],rax
  jmp return



  xp_flag:
  dq 0

  xp_addy:
  dq 0



xp_lookup:
  jmp newmem
  nop
  nop
return:
registersymbol(xp_lookup)

[DISABLE]

xp_lookup:
  db 49 8B 06 49 89 04 24

unregistersymbol(xp_lookup)
unregistersymbol(xp_addy)
unregistersymbol(xp_flag)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Disney.exe"+58C176

"Disney.exe"+58C154: 74 20                 -  je Disney.exe+58C176
"Disney.exe"+58C156: F6 41 0A 01           -  test byte ptr [rcx+0A],01
"Disney.exe"+58C15A: 75 1A                 -  jne Disney.exe+58C176
"Disney.exe"+58C15C: 4C 8B 45 20           -  mov r8,[rbp+20]
"Disney.exe"+58C160: 33 D2                 -  xor edx,edx
"Disney.exe"+58C162: 4D 8B 80 18 02 00 00  -  mov r8,[r8+00000218]
"Disney.exe"+58C169: E8 B2 86 FF FF        -  call Disney.exe+584820
"Disney.exe"+58C16E: 48 8B D8              -  mov rbx,rax
"Disney.exe"+58C171: 48 85 C0              -  test rax,rax
"Disney.exe"+58C174: 75 44                 -  jne Disney.exe+58C1BA
// ---------- INJECTING HERE ----------
"Disney.exe"+58C176: 49 8B 06              -  mov rax,[r14]
"Disney.exe"+58C179: 49 89 04 24           -  mov [r12],rax
// ---------- DONE INJECTING  ----------
"Disney.exe"+58C17D: 49 8B 46 08           -  mov rax,[r14+08]
"Disney.exe"+58C181: 49 89 44 24 08        -  mov [r12+08],rax
"Disney.exe"+58C186: 41 8B 46 10           -  mov eax,[r14+10]
"Disney.exe"+58C18A: 41 89 44 24 10        -  mov [r12+10],eax
"Disney.exe"+58C18F: EB 64                 -  jmp Disney.exe+58C1F5
"Disney.exe"+58C191: 45 33 C0              -  xor r8d,r8d
"Disney.exe"+58C194: 48 8B D7              -  mov rdx,rdi
"Disney.exe"+58C197: 48 8B CD              -  mov rcx,rbp
"Disney.exe"+58C19A: E8 C1 86 FF FF        -  call Disney.exe+584860
"Disney.exe"+58C19F: 48 8B D8              -  mov rbx,rax
}
gold lookup:
{ Game   : Disney.exe
  Version:
  Date   : 2018-09-15
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(gold1,Disney.exe,49 89 07 49 8B 44 24 08 49 89 47 08 41) // should be unique
alloc(newmem,$1000,"Disney.exe"+58C344)


label(code)
label(return)
label(gold)
registersymbol(gold)



newmem:
cmp [r15+2C],7FF6
jne code
cmp [r15+3C],00
jne code
cmp [r15+10],00
je code
cmp [r15+04],0
je code
cmp [r15+08],0
jne code
cmp [r15+58],0
je code
cmp [r15+0C],0
jne code
cmp [r15],(float)100
jle code
cmp [r15],(float)9999999
jg code
mov [gold],r15

code:
  mov [r15],rax
  mov rax,[r12+08]
  jmp return

gold:
  dq 0

gold1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(gold1)

[DISABLE]

gold1:
  db 49 89 07 49 8B 44 24 08

unregistersymbol(gold1)
unregistersymbol(gold)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Disney.exe"+58C344

"Disney.exe"+58C31D: F6 41 0A 02           -  test byte ptr [rcx+0A],02
"Disney.exe"+58C321: 75 1D                 -  jne Disney.exe+58C340
"Disney.exe"+58C323: 4C 8B 46 20           -  mov r8,[rsi+20]
"Disney.exe"+58C327: BA 01 00 00 00        -  mov edx,00000001
"Disney.exe"+58C32C: 4D 8B 80 20 02 00 00  -  mov r8,[r8+00000220]
"Disney.exe"+58C333: E8 E8 84 FF FF        -  call Disney.exe+584820
"Disney.exe"+58C338: 48 8B D8              -  mov rbx,rax
"Disney.exe"+58C33B: 48 85 C0              -  test rax,rax
"Disney.exe"+58C33E: 75 6B                 -  jne Disney.exe+58C3AB
"Disney.exe"+58C340: 49 8B 04 24           -  mov rax,[r12]
// ---------- INJECTING HERE ----------
"Disney.exe"+58C344: 49 89 07              -  mov [r15],rax
"Disney.exe"+58C347: 49 8B 44 24 08        -  mov rax,[r12+08]
// ---------- DONE INJECTING  ----------
"Disney.exe"+58C34C: 49 89 47 08           -  mov [r15+08],rax
"Disney.exe"+58C350: 41 8B 44 24 10        -  mov eax,[r12+10]
"Disney.exe"+58C355: 41 89 47 10           -  mov [r15+10],eax
"Disney.exe"+58C359: 41 83 7C 24 10 06     -  cmp dword ptr [r12+10],06
"Disney.exe"+58C35F: 0F 8C 83 00 00 00     -  jl Disney.exe+58C3E8
"Disney.exe"+58C365: 49 8B 04 24           -  mov rax,[r12]
"Disney.exe"+58C369: F6 40 09 03           -  test byte ptr [rax+09],03
"Disney.exe"+58C36D: 74 79                 -  je Disney.exe+58C3E8
"Disney.exe"+58C36F: F6 45 09 04           -  test byte ptr [rbp+09],04
"Disney.exe"+58C373: 74 73                 -  je Disney.exe+58C3E8
}
Author
ChrisFayte
Downloads
0
Views
37
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods League of Legends Accounts