#define WIN32_LEAN_AND_MEAN
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
//========================================================================================
==============================
==============//
#define ByPassHS 0x99
//=================================Deklarasi snHDD (HWIDCheck)=================================================
==============================
==========
int snHDD (void)
{
}
UCHAR szFileSys[255],szVolNameBuff[2
55];
DWORD dwMFL,dwSysFlags;
DWORD dwSerial;
LPCTSTR szHD = "C:\\";//*/
//=================================Deklarasi BYTE AmmoGobalReload=============================================
==============================
===========
BYTE ByteAmmoON[33] = {0xC7, 0x02, 0x3C, 0x00, 0x00, 0x00, 0x52, 0xE8, 0x7F, 0x87, 0xEB, 0xFF, 0x83, 0xC4, 0x08, 0x8B, 0x45, 0xFC, 0x8B, 0x4D, 0x08, 0x89, 0x88, 0x68, 0x09, 0x00, 0x00, 0x8B, 0xE5, 0x5D, 0xC2, 0x04, 0x00};
BYTE ByteAmmoOFF[33] = {0x52, 0xE8, 0x85, 0x87, 0xEB, 0xFF, 0x83, 0xC4, 0x08, 0x8B, 0x45, 0xFC, 0x8B, 0x4D, 0x08, 0x89, 0x88, 0x68, 0x09, 0x00, 0x00, 0x8B, 0xE5, 0x5D, 0xC2, 0x04, 0x00, 0x55, 0x8B, 0xEC, 0x51, 0x89, 0x4D};
//===================================Deklarasi Handle I3Exec Dan Deklarasi Address DWORD=========================
==============================
=========
LPTSTR TheTwins = "PointBlank.i3Exec";
LPTSTR indrasmart = "PointBlank.i3Exec";
DWORD d, ds;
DWORD dwGanteng = 0;
DWORD adrWall, adrMNZ1, adrMNZ2, adrAmmo, CheckProtection;
DWORD dwBase, NextProtection;
DWORD adrHelm, adrHead, adrAutoHs, adrGravity, adrGravity1, adrNo_Respawn, adrNo_Respawn_Map_4vs4, adrPasang, adrDefuse, adrInvicible, adrInvicible4vs4, adrInvicible4vs4b, adrDeathFly, adrBool= 0;
DWORD adrWSOn, adrWSOff, OldProtection;
DWORD adrNODC, adrColekKill, adrHeadCrott, adrBUG, adrLompatsempak, adrJatuh, adrTengah, adrPasbomsmbarangan, adrAmmoOn, dwBase, adrGHOST1, adrGHOST2, adrNINJA1, adrNINJA2, adrRESPAWN1, adrRESPAWN2, adrDEFUSE, adrSETUP, adrINVICIBLE1, adrINVICIBLE2, adrINVICIBLE3 , CheckProtection, adrMAGNET, adrMAGNET2;
//==============================================Deklarasi Memory UnprotectandModify=======================================================================================?==============
==============================
==========================//
void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &CheckProtection);
RtlMoveMemory((void *)Offset, (const void*)Pointer, Length);
VirtualProtect((void *)Offset, Length, CheckProtection, &CheckProtection);
}
char __fastcall indracheacopz(void* address, int* val, char bytes)
{
DWORD indrasmart, CooL;
VirtualProtect(address, bytes, PAGE_EXECUTE_READWRITE, &indrasmart);
memcpy(address, val, bytes);
VirtualProtect(address,bytes,i
ndrasmart,&CooL);
return -1;
}
void indra813(void *adr, void *ptr, int size)
{
unsigned long CheckProtection;
VirtualProtect((void*)adr,size
,PAGE_READWRITE, &CheckProtection);
RtlMoveMemory((void*)adr,(cons
t void*)ptr,size);
VirtualProtect((void*)adr,size
,CheckProtection, 0);
}
void indra(void *adr, void *ptr, int size)
{
unsigned long CheckProtection;
VirtualProtect((void*)adr,size
,PAGE_READWRITE, &CheckProtection);
RtlMoveMemory((void*)adr,(cons
t void*)ptr,size);
VirtualProtect((void*)adr,size
,CheckProtection, 0);
}
//=================================================Deklarasi Memory Modification=============================================================================================?==============
==============================
===================//
void indracool (void *adr, void *ptr, int size)
{
DWORD CheckProtection;
RtlMoveMemory(adr,ptr,size);
}
void indraganteng(void *adr, void *ptr, int size)
{
unsigned long CheckProtection;
VirtualProtect((void*)adr,size
,PAGE_READWRITE, &CheckProtection);
RtlMoveMemory((void*)adr,(cons
t void*)ptr,size);
VirtualProtect((void*)adr,size
,CheckProtection, 0);
}
void StroKes(void *adr, void *ptr, int size)
{
unsigned long CheckProtection;
VirtualProtect((void*)adr,size
,PAGE_READWRITE, &CheckProtection);
RtlMoveMemory((void*)adr,(cons
t void*)ptr,size);
VirtualProtect((void*)adr,size
,CheckProtection, 0);
}
//Check Apakah address tersebut di protect ?
void InProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
VirtualProtect((int*)Offset, Length, PAGE_EXECUTE_READWRITE, &CheckProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
RtlMoveMemory((int*)Offset, (const int*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
VirtualProtect((int*)Offset, Length, CheckProtection, &CheckProtection); // protect lagi address tsb biar gk kena satpam
}
// Lakukan patch terhadap memory
int MEMhack( BYTE *Offset, BYTE *ByteArray, DWORD Length){
InProtectAndModify((DWORD)Offs
et , (DWORD)ByteArray , 1);
}
void UnknowProtectAnd(void *adr, void *ptr, int size)
{
unsigned long CheckProtection;
VirtualProtect((void*)adr,size
,PAGE_READWRITE, &CheckProtection);
RtlMoveMemory((void*)adr,(cons
t void*)ptr,size);
VirtualProtect((void*)adr,size
,CheckProtection, 0);
}
//============================Deklarasi Anti AHNHS_ENGINE_DETECT_GAME_HACK=============================================================
===============?==============
========================
int __fastcall AntiHS(void)
{
return 0;
}
//===========================Deklarasi MEMPatch====================================================
==============================
=======
void MEMpatch( BYTE *Offset, BYTE *ByteArray, DWORD Length){
UnProtectAndModify((DWORD)Offs
et , (DWORD)ByteArray , 1);
}
//====================================Deklarasi Thread======================================================
==============================
=====
DWORD WINAPI The_Strokes(LPVOID param)
{
Beep(600,600);//Berikan BEEP Saat Thread Di Eksekusi, Jika Tidak ada BEEP maka Cheat akan cepat BT
while (1){
//========================MENGHINDARI AHNHS_ENGINE_DETECT_GAMEHACK================================
==============================
===============
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
//============================
================ AMMo GLOBAL ==============================
==//
if (GetAsyncKeyState (0x01) && GetAsyncKeyState (0x02)&0x8000 ) { // Klik Kiri + Klik Kanan (kayak EchoLondo)
DWORD CheatCalled = 1;
CheatCalled = (DWORD)GetModuleHandleA("Point
Blank.i3exec") + ByPassHS;//Offset ByPass HackShield;
if (CheatCalled > 0) {
DWORD dwSick = (DWORD)GetModuleHandleA("Point
Blank.i3exec")+0x16EC35;
indra813((BYTE*)(dwSick),ByteA
mmoON,33);
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
{
Sleep (50);
}
indra813((BYTE*)(dwSick),ByteA
mmoOFF,33);
Beep(800,100);//Beep kyk di Echolontong, Eh Echolondo kwkwkwkwwk
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
AntiHS();
}
}
//============================
=========Berikan Sleep Agar CPU Tidak Overload / Terbebani=====================
===========================
Sleep(20);
}
}
//=====================================Pemanggilan Thread DLL=======================================================================================
===============?==============
==================//
BOOL _stdcall DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
switch(dwReason)
{
case DLL_PROCESS_ATTACH:
DisableThreadLibraryCalls(hDll
);
//====================================Start HWID Check!!=====================================================
==============================
============
/*GetVolumeInformation(szHD,(LPTSTR)szVolNameBuff,255,&dwSer
ial, &dwMFL,&dwSysFlags,(LPTSTR)szF
ileSys,255);
if (dwSerial== HWID LOE){
MessageBox (0, "|==========•••HWID Teregistrasi•••==========|","C
heacopZFullHacks",MB_ICONINFOR
MATION) ;
}
else
{
MessageBox (0, "|============•••HWID Tidak di registrasi•••============|","C
heacopZFullHacks",MB_ICONSTOP)
;
MessageBox (0, "Silahkan PM indracheacopz Untuk meregistrasi HWID","CheacopZFullHacks",MB_I
CONINFORMATION);
ExitProcess(0);
}
system("start
[You must be registered and logged in to see this link.]);*/
//======================================Notice Yang akan muncul jika DLL Di Inject====================================================================================
===============?==============
========================
MessageBox(0, "========================================================================\n\nSpecial Thanks To : \n- Allah \n- Fahmy Hacker\n- Dhani SlazherSecret\n- Rhaffie Alfaris\n- Billy \n- Indra D'Darkness\n- Felix D'Darkness\n- Yorry D'Darkness\n- Siddick D'Darkness\n- Ari D'Darkness\n- Rezza D'Darkness\n- Iben D'Darkness\n- Ozzy D'Darkness\n- Goran D'Darkness\n- Pheonx D'Darkness\n- Israndy D'Darkness\n- All member Society Secret Community\n- All member =||D'Darkness Immortal||=\n- All Member Team Secret\n\n========================================================================\n\nFitur : \n\nAmmo Global Reload\n\n========================================================================\n\nHotkey :\n\n[-]Klik Kiri + Klik Kanan : AmmoGlobal Reload\n\n========================================================================\n\nCredit: indracheacopz\n\n===========================================
============================="
, "
CheacopZ", MB_OK + MB_ICONINFORMATION );
//=====================================Pemanggilan Thread===================================================================================================?==============
==============================
===================
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)The_St
rokes,0, 0, 0);
//=======================================Break pemanggilan Thread Anti Rename DLL===========================
==============================
======
break;
}
//===============================Variabel Nama DLL=========================================================
==============================
====
TCHAR strDLLName [MAX_PATH];
// ambil nama dll kita, simpan di variabel strDLLName
GetModuleFileName(hDll, strDLLName , MAX_PATH);
if (strstr(strDLLName, "indracheacopz.dll") <= 0) {
// Jika Nama DLL Berubah maka Notice di tampilkan
//============Notice Anti Rename DLL=========================================================
==============================
===============?===========
MessageBox(0, "Nah, Ketahuan lo Rename DLL gwa kan??", "PKL DETECTED", MB_OK + MB_ICONSTOP );
MessageBox(0, "Balikin gak nama dll nya?", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "Gwa hitung ni", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "1...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "2...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "3...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "4...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "5...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "6...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "7...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "8...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "9...", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "10...", "WARNING", MB_OK + MB_ICONSTOP );
//==============Agar lebih seru
========================================================================================
===============?==============
=================
Sleep(5000);
MessageBox(0, "MASIH LU RENAME JUGA???", "WARNING", MB_OK + MB_ICONSTOP );
MessageBox(0, "Yawdah trserah lu...", "
", MB_OK + MB_ICONINFORMATION );
Sleep(10000);
system("start C:/Windows/System32/shutdown.e
xe -s -f -t 00");// Kompi matek :v
}
}