/*
Name: VJ'Hamim Hack
Copyright: | PENSI CHEATER | ™
Author: All Member Dragon Cyber [DC]
Date: 00/00/2011
*/
#include <windows.h>
#include "stdio.h"
#include "stdlib.h"
//************************************************************************************************************************//
LPTSTR Brother = "PointBlank.i3exec"; // Target
DWORD dwBase, adrRESPAWN1, adrRESPAWN2, adrDEFUSE, adrSETUP, adrINVICIBLE1, adrINVICIBLE2, adrINVICIBLE3 , CheckProtection;
//************************************************************************************************************************//
int snHDD (void)
{
}
UCHAR szFileSys[255],szVolNameBuff[255];
DWORD dwMFL,dwSysFlags;
DWORD dwSerial;
LPCTSTR szHD = "C:\\"; // letak HWID nya
//========================Offset=========================//
#define No_Respawn 0x3CFF74 // offset lama
#define No_Respawn_Map_4vs4 0x3CCE50 // offset lama
#define Defuse 0x3C60A2 // offset lama
#define Pasang 0x3CFF74 // offset lama
#define InvicibleTime 0x3C5CFC // offset lama
#define InvicibleTime_4vs4 0x3CCE60 // offset lama
#define InvicibleTime_4vs4b 0x3CCE70 // offset lama
//=======================================================//
//************************************************************************************************************************//
//Check Apakah address tersebut di protect ?
void InProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
VirtualProtect((int*)Offset, Length, PAGE_EXECUTE_READWRITE, &CheckProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
RtlMoveMemory((int*)Offset, (const int*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
VirtualProtect((int*)Offset, Length, CheckProtection, &CheckProtection); // protect lagi address tsb biar gk kena satpam
}
// Lakukan patch terhadap memory
int MEMhack( BYTE *Offset, BYTE *ByteArray, DWORD Length){
InProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);
}
//************************************************************************************************************************//
int VJHamim (void *adr, void *ptr, int size)
{
unsigned long CheckProtection;
VirtualProtect((int*)adr,size,PAGE_READWRITE, &CheckProtection);
RtlMoveMemory((int*)adr,(const int*)ptr,size);
VirtualProtect((int*)adr,size,CheckProtection, 0);
}
//***************************************ByPass HS************************************************************************//
int __fastcall VJHamimProtection(void){
return 0; // unhook
}
//************************************************************************************************************************//
DWORD __stdcall ThreadStarter(LPCVOID MCR)
{
while (1) {
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
VJHamimProtection();
//============================================NO RES,Invisible KILL,No Defuse,No Pasang============================================//
if (GetAsyncKeyState(VK_HOME)&1)
{
MessageBeep(MB_ICONINFORMATION);// waktu di pencet bunyi Trining
DWORD HAMIMGANTENG =(DWORD)GetModuleHandleA("PointBlank.i3exec");
adrRESPAWN1 = HAMIMGANTENG + (DWORD)No_Respawn;
VJHamim((void *)(adrRESPAWN1),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
adrRESPAWN2 = HAMIMGANTENG + (DWORD)No_Respawn_Map_4vs4;
VJHamim((void *)(adrRESPAWN2),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
adrDEFUSE = HAMIMGANTENG + (DWORD)Defuse;
VJHamim((void *)(adrDEFUSE),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
adrSETUP = HAMIMGANTENG + (DWORD)Pasang;
VJHamim((void *)(adrSETUP),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
adrINVICIBLE1 = HAMIMGANTENG + (DWORD)InvicibleTime;
VJHamim((void *)(adrINVICIBLE1),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
adrINVICIBLE2 = HAMIMGANTENG + (DWORD)InvicibleTime_4vs4;
VJHamim((void *)(adrINVICIBLE2),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
adrINVICIBLE3 = HAMIMGANTENG + (DWORD)InvicibleTime_4vs4b;
VJHamim((void *)(adrINVICIBLE3),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
}
Sleep(15);
}
return (0);
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
switch(dwReason)
{
case DLL_PROCESS_ATTACH:
DisableThreadLibraryCalls(hDll);
// bila Hardware ID ingin di aktifkan hilangkan tanda : /* dibelakang GetVolume
/*GetVolumeInformation(szHD,(LPTSTR)szVolNameBuff,255,&dwSerial, &dwMFL,&dwSysFlags,(LPTSTR)szFileSys,255);
if (dwSerial== 1352882290){// Serial Number atau HWID anda
MessageBox (0, "|============•••HWID SUKSES REGISTRASI•••============|"," VJ'HAMIM HWID",MB_ICONINFORMATION) ;
}else{ // bila HWID di terima
MessageBox (0, "|============•••HWID Is Not Registered•••============|","[C]2011 | HWID IS NOT REGISTERED | -=VJ'HAMIM=- |",MB_ICONWARNING);
ExitProcess(0);// bila HWID tidak di terima
}//*
MessageBox (0," |•••Special For Public•••|","•••Ndy ScarletZer•••", MB_OK);
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)ThreadStarter, 0, 0, 0);
MessageBox (0,"EDIT WOI","©¨VJ'Hamim Hack¨™", MB_OK);
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)ThreadStarter, 0, 0, 0);
break;
}
char strDLLName [_MAX_PATH];
GetModuleFileName(hDll, strDLLName , _MAX_PATH);
if (strstr(strDLLName, "ScarLetZer.dll") <= 0) {
// Notice Kalau DLL Sudah di Rename
MessageBox(0, "KOK DI RENAME DLL SAYA KAKS.?", "VJ'HAMIM INSIDE", MB_OK + MB_ICONSTOP );
MessageBox(0, "KALO BELI ITU YA BELI AJA , GK USAH PAKEK RENAME2x ya.? ;)", "VJ'HAMIM HACK", MB_OK + MB_ICONSTOP );
ExitProcess(0);//PB g jalan
}
}
Buat Logger bsa Pakai Logger yang kemarin w share
Silahkan Tulis Komentar Anda ...