Resource icon

Kholat Cheat Table 2020-07-23

Hexui Undetected CSGO Cheats PUBG Accounts
Kholat is a horror adventure game created by IMGN.PRO and released to the public in 2015. It is narrated by Sean Bean, a fairly famous British actor. Explorer the wilderness tundra and hidden caves, in this exploration adventure and try not to shit your pants, because this game was inspired by a real event called the Dyatlov Pass invident. Try to uncover the mystery of the 9 dead russian hikers, while avoiding your own death as well. This game is an adventure mystery style game, so don't expect any action combat, but you will enjoy an interesting story that is beautifully written and narrated.

Kholat Cheat Table
1595532532490.png


But who said you can't speed up the game a bit with some cheats? Our Kholat cheat table has 4 basic cheats to help you do just that, infinite stamina so you can run forever, speed modifier so you can blast through the game as fast as possible and waste little time, and the freeze enemy movement cheat so you can get the hell outta there without being killed when they eventually find you. If you scare easily, that last cheat will certainly be helpful so no enemies can sneak up on you. You can download the cheat table as always at the top of the page. Enjoy!

Cheat Trainer Features
  • Infinite stamina
  • speed hack
  • freeze enemy movement
Cheat Engine Scripts
Infinite Stamina Cheat:
[ENABLE]

aobscanmodule(stamina,Kholat-Win64-Shipping.exe,F3 0F 5C CE 0F 2F C8 F3 0F 11 8B) // should be unique
alloc(newmem,$1000,"Kholat-Win64-Shipping.exe"+108ACA)

label(code)
label(return)
label(stam)
registersymbol(stam)

newmem:

code:
mov [stam],rbx
  //subss xmm1,xmm6
  comiss xmm1,xmm0
  jmp return

stam:
dq 0

stamina:
  jmp newmem
  nop
  nop
return:
registersymbol(stamina)

[DISABLE]

stamina:
  db F3 0F 5C CE 0F 2F C8

unregistersymbol(stamina)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Kholat-Win64-Shipping.exe"+108ACA

"Kholat-Win64-Shipping.exe"+108A98: 48 85 C9                       -  test rcx,rcx
"Kholat-Win64-Shipping.exe"+108A9B: 0F 84 E7 00 00 00              -  je Kholat-Win64-Shipping.exe+108B88
"Kholat-Win64-Shipping.exe"+108AA1: E8 AA 3D 00 00                 -  call Kholat-Win64-Shipping.exe+10C850
"Kholat-Win64-Shipping.exe"+108AA6: 84 C0                          -  test al,al
"Kholat-Win64-Shipping.exe"+108AA8: 0F 85 DA 00 00 00              -  jne Kholat-Win64-Shipping.exe+108B88
"Kholat-Win64-Shipping.exe"+108AAE: F6 83 BC 05 00 00 02           -  test byte ptr [rbx+000005BC],02
"Kholat-Win64-Shipping.exe"+108AB5: 74 57                          -  je Kholat-Win64-Shipping.exe+108B0E
"Kholat-Win64-Shipping.exe"+108AB7: F3 0F 10 8B C8 05 00 00        -  movss xmm1,[rbx+000005C8]
"Kholat-Win64-Shipping.exe"+108ABF: F3 0F 59 B3 8C 05 00 00        -  mulss xmm6,[rbx+0000058C]
"Kholat-Win64-Shipping.exe"+108AC7: 0F 57 C0                       -  xorps xmm0,xmm0
// ---------- INJECTING HERE ----------
"Kholat-Win64-Shipping.exe"+108ACA: F3 0F 5C CE                    -  subss xmm1,xmm6
"Kholat-Win64-Shipping.exe"+108ACE: 0F 2F C8                       -  comiss xmm1,xmm0
// ---------- DONE INJECTING  ----------
"Kholat-Win64-Shipping.exe"+108AD1: F3 0F 11 8B C8 05 00 00        -  movss [rbx+000005C8],xmm1
"Kholat-Win64-Shipping.exe"+108AD9: 0F 87 BC 00 00 00              -  ja Kholat-Win64-Shipping.exe+108B9B
"Kholat-Win64-Shipping.exe"+108ADF: 33 D2                          -  xor edx,edx
"Kholat-Win64-Shipping.exe"+108AE1: 48 8B CB                       -  mov rcx,rbx
"Kholat-Win64-Shipping.exe"+108AE4: C7 83 C8 05 00 00 00 00 00 00  -  mov [rbx+000005C8],00000000
"Kholat-Win64-Shipping.exe"+108AEE: C6 83 C4 05 00 00 01           -  mov byte ptr [rbx+000005C4],01
"Kholat-Win64-Shipping.exe"+108AF5: E8 86 E6 FF FF                 -  call Kholat-Win64-Shipping.exe+107180
"Kholat-Win64-Shipping.exe"+108AFA: B2 01                          -  mov dl,01
"Kholat-Win64-Shipping.exe"+108AFC: 48 8B CB                       -  mov rcx,rbx
"Kholat-Win64-Shipping.exe"+108AFF: 0F 28 74 24 20                 -  movaps xmm6,[rsp+20]
}
Freeze Enemy Movement:
{ Game   : Kholat-Win64-Shipping.exe
  Version:
  Date   : 2019-02-03
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(enemy_movement,Kholat-Win64-Shipping.exe,DC EB 15 0F 28 89 C0 00 00 00) // should be unique
alloc(newmem,$1000,"Kholat-Win64-Shipping.exe"+9D7726)

label(code)
label(return)

newmem:

code:
  //movaps xmm1,[rcx+000000C0]
  jmp return

enemy_movement+03:
  jmp newmem
  nop
  nop
return:
registersymbol(enemy_movement)

[DISABLE]

enemy_movement+03:
  db 0F 28 89 C0 00 00 00

unregistersymbol(enemy_movement)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Kholat-Win64-Shipping.exe"+9D7726

"Kholat-Win64-Shipping.exe"+9D76F7: F6 81 E0 00 00 00 01     -  test byte ptr [rcx+000000E0],01
"Kholat-Win64-Shipping.exe"+9D76FE: F3 0F 10 B1 FC 00 00 00  -  movss xmm6,[rcx+000000FC]
"Kholat-Win64-Shipping.exe"+9D7706: 74 1E                    -  je Kholat-Win64-Shipping.exe+9D7726
"Kholat-Win64-Shipping.exe"+9D7708: 48 8B 01                 -  mov rax,[rcx]
"Kholat-Win64-Shipping.exe"+9D770B: 48 8D 55 DC              -  lea rdx,[rbp-24]
"Kholat-Win64-Shipping.exe"+9D770F: FF 90 D0 03 00 00        -  call qword ptr [rax+000003D0]
"Kholat-Win64-Shipping.exe"+9D7715: F3 0F 10 45 E4           -  movss xmm0,[rbp-1C]
"Kholat-Win64-Shipping.exe"+9D771A: F3 0F 10 55 E0           -  movss xmm2,[rbp-20]
"Kholat-Win64-Shipping.exe"+9D771F: F3 0F 10 4D DC           -  movss xmm1,[rbp-24]
"Kholat-Win64-Shipping.exe"+9D7724: EB 15                    -  jmp Kholat-Win64-Shipping.exe+9D773B
// ---------- INJECTING HERE ----------
"Kholat-Win64-Shipping.exe"+9D7726: 0F 28 89 C0 00 00 00     -  movaps xmm1,[rcx+000000C0]
// ---------- DONE INJECTING  ----------
"Kholat-Win64-Shipping.exe"+9D772D: 0F 28 D1                 -  movaps xmm2,xmm1
"Kholat-Win64-Shipping.exe"+9D7730: 0F 28 C1                 -  movaps xmm0,xmm1
"Kholat-Win64-Shipping.exe"+9D7733: 0F C6 D1 55              -  shufps xmm2,xmm155
"Kholat-Win64-Shipping.exe"+9D7737: 0F C6 C1 AA              -  shufps xmm0,xmm1-56
"Kholat-Win64-Shipping.exe"+9D773B: F3 0F 5C C6              -  subss xmm0,xmm6
"Kholat-Win64-Shipping.exe"+9D773F: F3 0F 11 4D DC           -  movss [rbp-24],xmm1
"Kholat-Win64-Shipping.exe"+9D7744: F3 0F 11 55 E0           -  movss [rbp-20],xmm2
"Kholat-Win64-Shipping.exe"+9D7749: F3 0F 11 45 E4           -  movss [rbp-1C],xmm0
"Kholat-Win64-Shipping.exe"+9D774E: EB 08                    -  jmp Kholat-Win64-Shipping.exe+9D7758
"Kholat-Win64-Shipping.exe"+9D7750: F2 0F 11 4D DC           -  movsd [rbp-24],xmm1
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
2
Views
142
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods