Audition Hack .. v.6085
Fitur Liat Di Dalam Rar....
NB : Yank Jelas . Pada Bagian Score Edan ( Score Hack ) Usahakan Jangan Meebihi 2 milyar.. standby saat. mau 2 m. off kan.. ok
Bonus ::: Dll Ada Di Dalam Rar..
NICH SPESIAL BUAT PUBLICK BASE DLL AUDITION WORK 100%. Jangan Kacang Lupa Kulit sertakan nama Pembuat ( Sandy IRawan )
Butuh Bantuan. Contack My Fb. Dengan Senang hati Membantu
//========================================================
#define WIN32_LEAN_AND_MEAN
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
#define OFS_PF 0x51EE46
#define OFS_OTP 0x5330B3
#define OFS_BU 0x5311B9
#define OFS_PFBR 0x51EE84
LPTSTR ModulGame = "Audition.exe";
void Patch(void *adr, void *ptr, int size)
{
DWORD OldProtection;
VirtualProtect(adr,size,PAGE_E XECUTE_READWRITE, &OldProtection);
memcpy(adr,ptr,size);
VirtualProtect(adr,size,OldPro tection, &OldProtection);
}
void WritePointer(unsigned long ulBase, int iOffset, int iValue)
{
if (!IsBadReadPtr((VOID*)ulBase, sizeof(unsigned long)))
{
if (!IsBadWritePtr((void*)(*(unsi gned long*)ulBase + iOffset), sizeof(unsigned long)))
{
*(int*)(*(unsigned long*)ulBase + iOffset) = iValue;
}
}
}
DWORD WINAPI MemPacth(LPVOID param)
{
while (1) {
if (GetAsyncKeyState(VK_F3)&1) {
MessageBeep(MB_ICONINFORMATION );
DWORD adrMin1, adrMin2 = 0;
DWORD dwPB = (DWORD)GetModuleHandleA(ModulG ame);
if (dwPB > 0) {
adrMin1 = dwPB + (DWORD)OFS_PF;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x0 0\x00\x00\x00\x7D\x3F\x33\x33" , 8);
adrMin1 = dwPB + (DWORD)OFS_PFBR;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x9 9\x99\x99\x99", 4);
adrMin1 = dwPB + (DWORD)OFS_BU;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x1 1\x11\x11\x11\x11\x11\x11\x11\ x11\x11\x11\x11\x11\x11\x11\x1 1\x11\x11\x11\x11\x11\x11\x11\ x11\x11\x11\x11\x14", 28);
adrMin1 = dwPB + (DWORD)OFS_OTP;
Patch((void *)(adrMin1),(void*)(PBYTE)"\xF F", 1);
}
}
if (GetAsyncKeyState(VK_F4)&1) {
MessageBeep(MB_ICONINFORMATION );
DWORD adrMin1, adrMin2 = 0;
DWORD dwPB = (DWORD)GetModuleHandleA(ModulG ame);
if (dwPB > 0) {
adrMin1 = dwPB + (DWORD)OFS_PF;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x7 D\x3F\x33\x33\x73\x3F\x9A\x99" , 8);
adrMin1 = dwPB + (DWORD)OFS_PFBR;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x0 3\x02\x01\x00\x01\x02\x03\x00\ x01", 9);
adrMin1 = dwPB + (DWORD)OFS_BU;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x0 0\x00\x00\x0F\x00\x00\x00\x1B\ x00\x00\x00\x28\x00\x00\x00\x3 7\x00\x00\x00\x03\x00\x00\x00\ x08\x00\x00\x00\x14", 28);
adrMin1 = dwPB + (DWORD)OFS_OTP;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x3 F", 1);
}
}
Sleep(10);
}
return (0);
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
if (dwReason == DLL_PROCESS_ATTACH)
{
DisableThreadLibraryCalls(hDll );
if(dwReason == DLL_PROCESS_ATTACH){
MessageBox(0, "Cheat Inject", "CopyRight@By.Sandy Irawan", MB_OK + MB_ICONINFORMATION );
MessageBox(0, "Created By : Sandy Irawan\nJUST PERFECK FOR PUBLICK BASE/SOURCE CODE", "CopyRight@By.Sandy Irawan", MB_OK + MB_ICONINFORMATION );
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)MemPac th, 0, 0, 0);
char strDLLName [_MAX_PATH];
GetModuleFileName(hDll, strDLLName , _MAX_PATH);
if (strstr(strDLLName, "Indosan.dll") <= 0) {
ExitProcess(0);
}
}
else if(dwReason == DLL_PROCESS_DETACH)
{
}
}
return TRUE;
}
void Patch(void *adr, void *ptr, int size)
{
DWORD OldProtection;
VirtualProtect(adr,size,PAGE_E
memcpy(adr,ptr,size);
VirtualProtect(adr,size,OldPro
}
void WritePointer(unsigned long ulBase, int iOffset, int iValue)
{
if (!IsBadReadPtr((VOID*)ulBase, sizeof(unsigned long)))
{
if (!IsBadWritePtr((void*)(*(unsi
{
*(int*)(*(unsigned long*)ulBase + iOffset) = iValue;
}
}
}
DWORD WINAPI MemPacth(LPVOID param)
{
while (1) {
if (GetAsyncKeyState(VK_F3)&1) {
MessageBeep(MB_ICONINFORMATION
DWORD adrMin1, adrMin2 = 0;
DWORD dwPB = (DWORD)GetModuleHandleA(ModulG
if (dwPB > 0) {
adrMin1 = dwPB + (DWORD)OFS_PF;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x0
adrMin1 = dwPB + (DWORD)OFS_PFBR;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x9
adrMin1 = dwPB + (DWORD)OFS_BU;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x1
adrMin1 = dwPB + (DWORD)OFS_OTP;
Patch((void *)(adrMin1),(void*)(PBYTE)"\xF
}
}
if (GetAsyncKeyState(VK_F4)&1) {
MessageBeep(MB_ICONINFORMATION
DWORD adrMin1, adrMin2 = 0;
DWORD dwPB = (DWORD)GetModuleHandleA(ModulG
if (dwPB > 0) {
adrMin1 = dwPB + (DWORD)OFS_PF;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x7
adrMin1 = dwPB + (DWORD)OFS_PFBR;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x0
adrMin1 = dwPB + (DWORD)OFS_BU;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x0
adrMin1 = dwPB + (DWORD)OFS_OTP;
Patch((void *)(adrMin1),(void*)(PBYTE)"\x3
}
}
Sleep(10);
}
return (0);
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
if (dwReason == DLL_PROCESS_ATTACH)
{
DisableThreadLibraryCalls(hDll
if(dwReason == DLL_PROCESS_ATTACH){
MessageBox(0, "Cheat Inject", "CopyRight@By.Sandy Irawan", MB_OK + MB_ICONINFORMATION );
MessageBox(0, "Created By : Sandy Irawan\nJUST PERFECK FOR PUBLICK BASE/SOURCE CODE", "CopyRight@By.Sandy Irawan", MB_OK + MB_ICONINFORMATION );
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)MemPac
char strDLLName [_MAX_PATH];
GetModuleFileName(hDll, strDLLName , _MAX_PATH);
if (strstr(strDLLName, "Indosan.dll") <= 0) {
ExitProcess(0);
}
}
else if(dwReason == DLL_PROCESS_DETACH)
{
}
}
return TRUE;
}







Tidak ada komentar:
Posting Komentar