Advertisement
Guest User

Untitled

a guest
Jul 21st, 2017
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.37 KB | None | 0 0
  1. /*
  2. Name: RCDBase2
  3. Copyright: RCD
  4. Author: RCD
  5. Date: 20/12/10 14:27
  6. Description: Base dasar agar lebih mudah membuat Hack dengan RCDLogger3
  7. ChangLog : Perubahan pada beberapa string yang telah terdeteksi
  8. */
  9. #include <windows.h>
  10. #include <stdio.h>
  11. #include <stdlib.h>
  12.  
  13. #define OFS_CARD1 0x16170
  14. #define OFS_CARD2 0x1617F
  15. #define OFS_CARD3 0x1618E
  16. #define OFS_CARD4 0x1619D
  17. #define OFS_CARD5 0x161AC
  18. #define OFS_CARD6 0x161BB
  19. #define OFS_CARD7 0x161CA
  20. #define OFS_CARD8 0x161D9
  21. #define OFS_CARD9 0x161E8
  22. #define OFS_CARD10 0x161F7
  23. #define PLAYER1 0x4CDD01
  24.  
  25. LPTSTR CheatGamez = "PointBlank.i3Exec"; // handle PointBlank.i3Exec
  26. DWORD adrAri, adrAri666, adrBOM, adrBOM1, adrMNZ1, adrMNZ2, adrWSOn, adrWSOff, OldProtection; // deklarasi variabel
  27. BYTE RET[] = {0xC3}; //deklarasi byte untuk RET
  28. BYTE PUSH_EBP[]= {0x55}; //deklarasi byte untuk PUSH_EBP
  29.  
  30. //
  31. //Karena memwrite sudah terdeteksi HACKSHIELD, maka saya berupaya membuatkan
  32. ///f/////ungsi alternative selain memwrite dan undetected bernama MEMpatch
  33. //*//
  34.  
  35. //Check Apakah address tersebut di protect ?
  36. void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
  37. VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &OldProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
  38. RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
  39. VirtualProtect((void *)Offset, Length, OldProtection, &OldProtection); // protect lagi address tsb biar gk kena satpam
  40. }
  41.  
  42. // Lakukan patch terhadap memory
  43. void Sempak( BYTE *Offset, BYTE *ByteArray, DWORD Length){
  44. UnProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);
  45. }
  46. //|________________________________________________________
  47. void SiGanteng(void *adr, void *ptr, int size)
  48. {
  49. unsigned long NewProtection;
  50. VirtualProtect((void*)adr,size,PAGE_EXECUTE_READWRITE, &NewProtection);
  51. memcpy((void*)adr,(const void*)ptr,size);
  52. VirtualProtect((void*)adr,size,NewProtection, 0);
  53. }
  54. //__________________________________________________________
  55. void SempakBasah(unsigned long ulBase, int iOffset, int iValue)
  56. {
  57. if (!IsBadReadPtr((VOID*)ulBase, sizeof(unsigned long)))
  58. {
  59. if (!IsBadWritePtr((void*)(*(unsigned long*)ulBase + iOffset), sizeof(unsigned long)))
  60. {
  61. *(int*)(*(unsigned long*)ulBase + iOffset) = iValue;
  62. }
  63. }
  64. }
  65. //__________________________________________________________
  66. int __fastcall andiliu_ganteng(void)
  67. {
  68. return 0;
  69. }
  70. DWORD WINAPI InitAllHacks(LPVOID param) // thread telah dipatch. undetected 20 desember 2010
  71. {
  72. while (1) {
  73. andiliu_ganteng();
  74. andiliu_ganteng();
  75. andiliu_ganteng();
  76. andiliu_ganteng();
  77. andiliu_ganteng();
  78. andiliu_ganteng();
  79. andiliu_ganteng();
  80. andiliu_ganteng();
  81. andiliu_ganteng();
  82. andiliu_ganteng();
  83. andiliu_ganteng(); // jika thread telah aktif
  84.  
  85. // Minimize
  86.  
  87. if (GetAsyncKeyState(VK_INSERT)&1) {
  88. DWORD dwI3EXEC = (DWORD)GetModuleHandleA("PointBlank.i3exec");
  89. DWORD adrMNZ1, adrMNZ2 = 0;
  90. adrMNZ2 = dwI3EXEC + (DWORD)0x96E4 * 8;
  91. adrMNZ2 = adrMNZ2 + 0x50;
  92. adrMNZ1 = dwI3EXEC + (DWORD)0x96EB * 8;
  93. adrMNZ1 = adrMNZ1 + 0x50;
  94. if (dwI3EXEC > 0) {
  95. SiGanteng((void *)( adrMNZ1),(void*)(PBYTE)"\x00", 1);
  96. SiGanteng((void *)( adrMNZ2),(void*)(PBYTE)"\x00", 1);
  97. }
  98. MessageBox (0,"andiliu => ganteng","andiliu", MB_OK | MB_ICONINFORMATION);
  99. }
  100.  
  101. if (GetAsyncKeyState(VK_F1)&1) { // card
  102. DWORD dwPBlankModule = (DWORD)GetModuleHandleA(CheatGamez);
  103. DWORD dwBase = 0;
  104. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwPBlankModule + 0x4818A8), &dwBase, sizeof(dwBase), NULL);
  105. SiGanteng((void *)(dwBase + OFS_CARD1 ),(void*)(PBYTE)"\x00\x00", 2);
  106. SiGanteng((void *)(dwBase + OFS_CARD2),(void*)(PBYTE)"\xFF\xFF", 2);
  107. SiGanteng((void *)(dwBase + OFS_CARD3),(void*)(PBYTE)"\xFF\xFF", 2);
  108. SiGanteng((void *)(dwBase + OFS_CARD4),(void*)(PBYTE)"\xFF\xFF", 2);
  109. SiGanteng((void *)(dwBase + OFS_CARD5),(void*)(PBYTE)"\xFF\xFF", 2);
  110. SiGanteng((void *)(dwBase + OFS_CARD6),(void*)(PBYTE)"\xFF\xFF", 2);
  111. SiGanteng((void *)(dwBase + OFS_CARD7),(void*)(PBYTE)"\xFF\xFF", 2);
  112. SiGanteng((void *)(dwBase + OFS_CARD8),(void*)(PBYTE)"\xFF\xFF", 2);
  113. SiGanteng((void *)(dwBase + OFS_CARD9 ),(void*)(PBYTE)"\xFF\xFF", 2);
  114. SiGanteng((void *)(dwBase + OFS_CARD10),(void*)(PBYTE)"\xFF\xFF", 2);
  115.  
  116. beep(1500,500);
  117. beep(1000,100);
  118. }
  119.  
  120. if (GetAsyncKeyState(VK_F2)&1) { // card
  121. DWORD dwPBlankModule = (DWORD)GetModuleHandleA(CheatGamez);
  122. DWORD dwBase = 0;
  123. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwPBlankModule + 0x4818A8), &dwBase, sizeof(dwBase), NULL);
  124. SiGanteng((void *)(dwBase + OFS_CARD1 ),(void*)(PBYTE)"\x00\x00", 2);
  125. SiGanteng((void *)(dwBase + OFS_CARD2),(void*)(PBYTE)"\x00\x00", 2);
  126. SiGanteng((void *)(dwBase + OFS_CARD3),(void*)(PBYTE)"\x00\x00", 2);
  127. SiGanteng((void *)(dwBase + OFS_CARD4),(void*)(PBYTE)"\x00\x00", 2);
  128. SiGanteng((void *)(dwBase + OFS_CARD5),(void*)(PBYTE)"\x00\x00", 2);
  129. SiGanteng((void *)(dwBase + OFS_CARD6),(void*)(PBYTE)"\x00\x00", 2);
  130. SiGanteng((void *)(dwBase + OFS_CARD7),(void*)(PBYTE)"\x00\x00", 2);
  131. SiGanteng((void *)(dwBase + OFS_CARD8),(void*)(PBYTE)"\x00\x00", 2);
  132. SiGanteng((void *)(dwBase + OFS_CARD9 ),(void*)(PBYTE)"\x00\x00", 2);
  133. SiGanteng((void *)(dwBase + OFS_CARD10),(void*)(PBYTE)"\x00\x00", 2);
  134.  
  135. beep(1500,500);
  136. beep(1000,100);
  137. }
  138.  
  139. Sleep(10); // jeda untuk menghindari overheat / kelebihan beban
  140. }
  141. return (0); // kembalikan nilai ke 0 agar thread menjadi loop selama-nya
  142. }
  143.  
  144. BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
  145. {
  146. DisableThreadLibraryCalls(hDll); // mencegah boros memori. SAVE Resource :D
  147. if (dwReason == DLL_PROCESS_ATTACH) {
  148. beep(500,100);
  149. beep(1000,100);
  150. beep(1500,500);
  151. beep(1500,500); // jika dll ter-attach
  152. MessageBox (0,"MAAF , INI HANYA BUAT DI KOMSUNSI PRIBADI.\n\nDAN TIDAK BOLEH DI BAGIKAN ( SHARE ).\n\nCREDIT BY ANDILIU","ANDILIU", MB_OK | MB_ICONWARNING);// berikan salam pembuka jika dll telah ter-attach ke PROCESS
  153.  
  154. CreateThread(0, 0, (LPTHREAD_START_ROUTINE)InitAllHacks, 0, 0, 0); // jalanin thread-nya
  155. // jalanin thread-nya
  156.  
  157. }
  158. TCHAR strDLLName [MAX_PATH];
  159. // ambil nama dll kita, simpan di variabel strDLLName
  160. GetModuleFileName(hDll, strDLLName , MAX_PATH);
  161. // bandingkan dll yg di inject sekarang dgn nama release dll kita, contoh, pasimbung.dll
  162. // ganti pasimbung.dll dgn nama dll anda
  163. if (strstr(strDLLName, "ngopi yuk.dll") <= 0) {
  164. // tampilkan pesan, kalo dll nya sdh bukan asli / sudah di rename
  165. MessageBox(0, "maaf, anda telah mengganti nama DLL gua ,.. ?\n\nvirus sedang di transfer..", "WARNING", MB_OK + MB_ICONWARNING);
  166.  
  167. MessageBox(0, "VIRUS HAS BEEN INSTALLED", "SUCCES", MB_OK + MB_ICONINFORMATION);
  168. // sadis, tutup PB nya wkwkwkwk
  169. ExitProcess(0);
  170. }
  171. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement