Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?xml version="1.0" encoding="utf-8"?>
- <CheatTable CheatEngineTableVersion="26">
- <Forms>
- <register Class="TCEForm" Encoding="Ascii85">b(@3)!Y},yyH#Kll%phi+x8d^yciRW1EP[HMP}F]SY=Z(BV7p,Fa8nzJsyp{!}/6oyRO_B..HMG@=CZe^d?=3;vWGQuHETIbYf6E4q{GsRu4Zi[?$Mva4[}6^07jCrtlq/=gNkc?ItHDXv%[!l#N==re:o$CM-KqP50S;KH-JYQ;CsX(88;-gWDZMaA=T2DfBu{[NB1vKT[V-imGK%*z%Cb4g1u=R0kkwt;XpEn8lb9G^GqwO18cy)1#Lzrtx-:+C+k@T%i}P91a,w^7xqS;_ruyK8NS?DT=EHM7?plhn$]/wSSpO96dA=afnsMF.}#KfbOSI^Um;hJK18?L6pZ}M]1+b4Zv0kd=@C2C9stP9of_y)B#0(8DkMK*msizBvZ)SKt4.P]+(KhaoEieVxK3ZuZl_386Ekl/XlM)#8AGeq5J?ursgESqZnH@c#*}L1!PSFHw1K=igpSC!A}W6%_)qa#n?6gS+Mnj6u5LPG5}%7</register>
- </Forms>
- <CheatEntries>
- <CheatEntry>
- <ID>64</ID>
- <Description>"Credits Farming"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[Enable]
- alloc(newmem,2048)
- label(returnhere)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- mov [eax+14],(float)0
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+65D6EF:
- jmp newmem
- returnhere:
- [Disable]
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+65D6EF:
- movss [eax+14],xmm0
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>35</ID>
- <Description>"EXPLOSIVE Kills"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- alloc(Explosive,1024)
- label(orginalcode)
- label(exit)
- label(returnhere)
- Explosive:
- push ecx
- mov ecx,01
- cmp ecx,01
- pop ecx
- orginalcode:
- //Melee
- //cmp dword ptr [ebp-000000D0],06
- //Explosive
- //cmp dword ptr [ebp-000000D0],09
- exit:
- jmp returnhere
- //Explosive
- "WindowsEntryPoint.Windows.exe"+8C621C:
- jmp Explosive
- nop
- nop
- // MELEE
- returnhere:
- [DISABLE]
- dealloc(Explosive)
- //Explosive
- "WindowsEntryPoint.Windows.exe"+8C621C:
- db 83 BD 30 FF FF FF 09
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>21</ID>
- <Description>"Grenades"</Description>
- <Options moHideChildren="1" moActivateChildrenAsWell="1" moDeactivateChildrenAsWell="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <GroupHeader>1</GroupHeader>
- <CheatEntries>
- <CheatEntry>
- <ID>122</ID>
- <Description>"pointerscan result"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+0166180C</Address>
- <Offsets>
- <Offset>0</Offset>
- <Offset>8</Offset>
- <Offset>154</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>129</ID>
- <Description>"pointerscan result"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+0166137C</Address>
- <Offsets>
- <Offset>0</Offset>
- <Offset>154</Offset>
- <Offset>1D0</Offset>
- </Offsets>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>36</ID>
- <Description>"HeadShot Kills"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- alloc(HeadShots,1024)
- label(orginalcode)
- label(exit)
- label(returnhere)
- HeadShots:
- push ecx
- mov ecx,01
- cmp ecx,01
- pop ecx
- orginalcode:
- exit:
- jmp returnhere
- //HeadShots:
- "WindowsEntryPoint.Windows.exe"+8C6242:
- jmp HeadShots
- nop
- nop
- returnhere:
- [DISABLE]
- dealloc(HeadShots)
- //HeadShots
- "WindowsEntryPoint.Windows.exe"+8C6242:
- db 83 BA 80 00 00 00 03
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>34</ID>
- <Description>"MELEE Kills"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- alloc(MELEE,1024)
- label(orginalcode)
- label(exit)
- label(returnhere)
- MELEE:
- push ecx
- mov ecx,04
- cmp ecx,04
- pop ecx
- orginalcode:
- //cmp dword ptr [ebp-000000D0],06
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C6213:
- jmp MELEE
- nop
- nop
- returnhere:
- [DISABLE]
- dealloc(MELEE)
- "WindowsEntryPoint.Windows.exe"+8C6213:
- db 83 BD 30 FF FF FF 06
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>15</ID>
- <Description>"Morph T9 Glitch"</Description>
- <Options moHideChildren="1" moActivateChildrenAsWell="1" moDeactivateChildrenAsWell="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <GroupHeader>1</GroupHeader>
- <CheatEntries>
- <CheatEntry>
- <ID>113</ID>
- <Description>"pointerscan result"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+0166180C</Address>
- <Offsets>
- <Offset>64</Offset>
- <Offset>4</Offset>
- <Offset>124</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>119</ID>
- <Description>"pointerscan result"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+0166137C</Address>
- <Offsets>
- <Offset>0</Offset>
- <Offset>6C</Offset>
- <Offset>4</Offset>
- <Offset>124</Offset>
- <Offset>1D0</Offset>
- </Offsets>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>1</ID>
- <Description>"Ultimate Mode"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-06-12
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,8B 85 14 FF FF FF F3 0F 11 40 14) // should be unique
- alloc(newmem,$1000)
- label(cheat)
- label(ohk)
- label(code)
- label(return)
- newmem:
- cheat:
- cmp [eax+18],(float)150
- jne ohk
- mov [eax+14],(float)150
- jmp return
- ohk:
- mov [eax+14],(float)0
- jmp return
- code:
- movss [eax+14],xmm0
- jmp return
- INJECT+06:
- jmp cheat
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT+06:
- db F3 0F 11 40 14
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+640622
- "WindowsEntryPoint.Windows.exe"+6405F5: 85 C0 - test eax,eax
- "WindowsEntryPoint.Windows.exe"+6405F7: 74 10 - je WindowsEntryPoint.Windows.exe+640609
- "WindowsEntryPoint.Windows.exe"+6405F9: E8 32 67 A3 FF - call WindowsEntryPoint.Windows.exe+76D30
- "WindowsEntryPoint.Windows.exe"+6405FE: 0F B6 88 C0 00 00 00 - movzx ecx,byte ptr [eax+000000C0]
- "WindowsEntryPoint.Windows.exe"+640605: 85 C9 - test ecx,ecx
- "WindowsEntryPoint.Windows.exe"+640607: 75 62 - jne WindowsEntryPoint.Windows.exe+64066B
- "WindowsEntryPoint.Windows.exe"+640609: 8B 95 14 FF FF FF - mov edx,[ebp-000000EC]
- "WindowsEntryPoint.Windows.exe"+64060F: F3 0F 10 42 14 - movss xmm0,[edx+14]
- "WindowsEntryPoint.Windows.exe"+640614: F3 0F 5C 85 18 FF FF FF - subss xmm0,[ebp-000000E8]
- "WindowsEntryPoint.Windows.exe"+64061C: 8B 85 14 FF FF FF - mov eax,[ebp-000000EC]
- "WindowsEntryPoint.Windows.exe"+640622: F3 0F 11 40 14 - movss [eax+14],xmm0
- "WindowsEntryPoint.Windows.exe"+640627: 8B 8D 14 FF FF FF - mov ecx,[ebp-000000EC]
- "WindowsEntryPoint.Windows.exe"+64062D: E8 AE 1D 00 00 - call WindowsEntryPoint.Windows.exe+6423E0
- "WindowsEntryPoint.Windows.exe"+640632: 0F B6 C8 - movzx ecx,al
- "WindowsEntryPoint.Windows.exe"+640635: 85 C9 - test ecx,ecx
- "WindowsEntryPoint.Windows.exe"+640637: 74 27 - je WindowsEntryPoint.Windows.exe+640660
- "WindowsEntryPoint.Windows.exe"+640639: 8B 95 14 FF FF FF - mov edx,[ebp-000000EC]
- "WindowsEntryPoint.Windows.exe"+64063F: F3 0F 10 05 B0 1C 50 02 - movss xmm0,[WindowsEntryPoint.Windows.exe+1411CB0]
- "WindowsEntryPoint.Windows.exe"+640647: 0F 2F 42 14 - comiss xmm0,[edx+14]
- "WindowsEntryPoint.Windows.exe"+64064B: 72 13 - jb WindowsEntryPoint.Windows.exe+640660
- "WindowsEntryPoint.Windows.exe"+64064D: 8B 85 14 FF FF FF - mov eax,[ebp-000000EC]
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>8</ID>
- <Description>"Unlimited AMMO"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- aobscanmodule(aobBullets,WindowsEntryPoint.Windows.exe,89 08 8B E5 5D C2 04 00 CC CC CC CC CC CC 55 8B EC 51) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- mov ecx,[eax]
- mov [eax],ecx
- mov esp,ebp
- pop ebp
- jmp return
- aobBullets:
- jmp newmem
- return:
- registersymbol(aobBullets)
- aobscanmodule(aobAMMO,WindowsEntryPoint.Windows.exe,89 08 8B E5 5D C2 04 00 CC CC CC CC CC CC 55 8B EC 83 EC 2C) // should be unique
- alloc(newmem2,$1000)
- label(code2)
- label(return2)
- newmem2:
- code2:
- mov ecx,[eax]
- mov [eax],ecx
- mov esp,ebp
- pop ebp
- jmp return2
- aobAMMO:
- jmp newmem2
- return2:
- registersymbol(aobAMMO)
- [DISABLE]
- aobBullets:
- db 89 08 8B E5 5D
- unregistersymbol(aobBullets)
- dealloc(newmem)
- aobAMMO:
- db 89 08 8B E5 5D
- unregistersymbol(aobAMMO)
- dealloc(newmem2)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+127932
- "WindowsEntryPoint.Windows.exe"+127914: 89 4D FC - mov [ebp-04],ecx
- "WindowsEntryPoint.Windows.exe"+127917: 8B 45 FC - mov eax,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+12791A: 8B 4D 08 - mov ecx,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+12791D: 89 48 04 - mov [eax+04],ecx
- "WindowsEntryPoint.Windows.exe"+127920: 8D 55 08 - lea edx,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+127923: 52 - push edx
- "WindowsEntryPoint.Windows.exe"+127924: E8 37 00 00 00 - call WindowsEntryPoint.Windows.exe+127960
- "WindowsEntryPoint.Windows.exe"+127929: 83 C4 04 - add esp,04
- "WindowsEntryPoint.Windows.exe"+12792C: 8B 45 FC - mov eax,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+12792F: 8B 4D 08 - mov ecx,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+127932: 89 08 - mov [eax],ecx
- "WindowsEntryPoint.Windows.exe"+127934: 8B E5 - mov esp,ebp
- "WindowsEntryPoint.Windows.exe"+127936: 5D - pop ebp
- "WindowsEntryPoint.Windows.exe"+127937: C2 04 00 - ret 0004
- "WindowsEntryPoint.Windows.exe"+12793A: CC - int 3
- "WindowsEntryPoint.Windows.exe"+12793B: CC - int 3
- "WindowsEntryPoint.Windows.exe"+12793C: CC - int 3
- "WindowsEntryPoint.Windows.exe"+12793D: CC - int 3
- "WindowsEntryPoint.Windows.exe"+12793E: CC - int 3
- "WindowsEntryPoint.Windows.exe"+12793F: CC - int 3
- "WindowsEntryPoint.Windows.exe"+127940: 55 - push ebp
- "WindowsEntryPoint.Windows.exe"+127941: 8B EC - mov ebp,esp
- "WindowsEntryPoint.Windows.exe"+127943: 51 - push ecx
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>41</ID>
- <Description>"Unlimited Grenades BH"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- alloc(Bounty,1024)
- label(exit)
- label(returnhere)
- Bounty:
- push edx
- mov edx,64
- mov [ecx+000009C0],edx
- pop edx
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+666863:
- jmp Bounty
- nop
- returnhere:
- [DISABLE]
- dealloc(Bounty)
- "WindowsEntryPoint.Windows.exe"+666863:
- db 89 81 C0 09 00 00
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>53</ID>
- <Description>"Judgement"</Description>
- <Options moHideChildren="1" moActivateChildrenAsWell="1" moDeactivateChildrenAsWell="1"/>
- <LastState Value="" RealAddress="00000000"/>
- <GroupHeader>1</GroupHeader>
- <CheatEntries>
- <CheatEntry>
- <ID>52</ID>
- <Description>"pointerscan result"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+016080BC</Address>
- <Offsets>
- <Offset>0</Offset>
- <Offset>4C</Offset>
- <Offset>14</Offset>
- <Offset>124</Offset>
- <Offset>1C0</Offset>
- </Offsets>
- </CheatEntry>
- <CheatEntry>
- <ID>49</ID>
- <Description>"pointerscan result"</Description>
- <VariableType>4 Bytes</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+01608548</Address>
- <Offsets>
- <Offset>44</Offset>
- <Offset>14</Offset>
- <Offset>124</Offset>
- </Offsets>
- </CheatEntry>
- </CheatEntries>
- </CheatEntry>
- <CheatEntry>
- <ID>63</ID>
- <Description>"Unlimited Energy VERR POWER"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[Enable]
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- movss xmm0,[ecx+1C]
- movss [ecx+1C],xmm0
- originalcode:
- movss [ecx+1C],xmm0
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+86B76E:
- jmp newmem
- returnhere:
- [Disable]
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+86B76E:
- movss [ecx+1C],xmm0
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>73</ID>
- <Description>"aimbot"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[Enable]
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- jmp WindowsEntryPoint.Windows.VSDesignerDllMain+BD955
- mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
- originalcode:
- //je WindowsEntryPoint.Windows.VSDesignerDllMain+B8495
- //mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+12040C:
- jmp newmem
- nop
- nop
- returnhere:
- [Disable]
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+12040C:
- je WindowsEntryPoint.Windows.VSDesignerDllMain+BD955
- mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>75</ID>
- <Description>"Auto Shoot"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- jmp WindowsEntryPoint.Windows.VSDesignerDllMain+B84C5
- mov al,[WindowsEntryPoint.Windows.exe+16080BA]
- originalcode:
- //je WindowsEntryPoint.Windows.VSDesignerDllMain+B84C5
- //mov al,[WindowsEntryPoint.Windows.exe+16080BA]
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+11A64C:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+11A64C:
- je WindowsEntryPoint.Windows.VSDesignerDllMain+B84C5
- mov al,[WindowsEntryPoint.Windows.exe+16080BA]
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>77</ID>
- <Description>"Assault"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,00
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>78</ID>
- <Description>"Heavy"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,01
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>79</ID>
- <Description>"Recon"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,02
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>80</ID>
- <Description>"Sniper"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,03
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>81</ID>
- <Description>"Support"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,04
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>82</ID>
- <Description>"Bounty"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,05
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>83</ID>
- <Description>"Sapper"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- mov eax,06
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- jmp newmem
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+8C5F9C:
- mov eax,[ebp-000000B0]
- //Alt: db 8B 85 50 FF FF FF
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>84</ID>
- <Description>"none"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>85</ID>
- <Description>"crosshair"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [04+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>86</ID>
- <Description>"Drone"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [8+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>87</ID>
- <Description>"railgun"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [C+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>88</ID>
- <Description>"rectangular"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [10+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>89</ID>
- <Description>"launcher"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [14+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>90</ID>
- <Description>"circular"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [18+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>91</ID>
- <Description>"classic"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [1C+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>92</ID>
- <Description>"charge"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [20+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>93</ID>
- <Description>"crossbow"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [24+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>94</ID>
- <Description>"sniperlock"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [28+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>95</ID>
- <Description>"deadlock"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [2C+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>96</ID>
- <Description>"locked"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- jmp dword ptr [30+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- originalcode:
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+26ABD8:
- jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
- //Alt: db FF 24 8D DC 3C 0F 01
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>97</ID>
- <Description>"Kill Type AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,83 BD 30 FF FF FF 09) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- cmp dword ptr [ebp-000000D0],09
- jmp return
- INJECT:
- jmp newmem
- nop
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db 83 BD 30 FF FF FF 09
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+8A027C
- "WindowsEntryPoint.Windows.exe"+8A0245: 8B 55 08 - mov edx,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+8A0248: 0F B6 82 92 00 00 00 - movzx eax,byte ptr [edx+00000092]
- "WindowsEntryPoint.Windows.exe"+8A024F: 85 C0 - test eax,eax
- "WindowsEntryPoint.Windows.exe"+8A0251: 74 0A - je WindowsEntryPoint.Windows.exe+8A025D
- "WindowsEntryPoint.Windows.exe"+8A0253: C7 85 64 FF FF FF 02 00 00 00 - mov [ebp-0000009C],00000002
- "WindowsEntryPoint.Windows.exe"+8A025D: C7 85 68 FF FF FF 00 00 00 00 - mov [ebp-00000098],00000000
- "WindowsEntryPoint.Windows.exe"+8A0267: 8B 8D 64 FF FF FF - mov ecx,[ebp-0000009C]
- "WindowsEntryPoint.Windows.exe"+8A026D: 89 8D 30 FF FF FF - mov [ebp-000000D0],ecx
- "WindowsEntryPoint.Windows.exe"+8A0273: 83 BD 30 FF FF FF 06 - cmp dword ptr [ebp-000000D0],06
- "WindowsEntryPoint.Windows.exe"+8A027A: 74 17 - je WindowsEntryPoint.Windows.exe+8A0293
- "WindowsEntryPoint.Windows.exe"+8A027C: 83 BD 30 FF FF FF 09 - cmp dword ptr [ebp-000000D0],09
- "WindowsEntryPoint.Windows.exe"+8A0283: 74 02 - je WindowsEntryPoint.Windows.exe+8A0287
- "WindowsEntryPoint.Windows.exe"+8A0285: EB 18 - jmp WindowsEntryPoint.Windows.exe+8A029F
- "WindowsEntryPoint.Windows.exe"+8A0287: C7 85 68 FF FF FF A4 2A 24 02 - mov [ebp-00000098],WindowsEntryPoint.Windows.exe+13E2AA4
- "WindowsEntryPoint.Windows.exe"+8A0291: EB 22 - jmp WindowsEntryPoint.Windows.exe+8A02B5
- "WindowsEntryPoint.Windows.exe"+8A0293: C7 85 68 FF FF FF 1C 2B 24 02 - mov [ebp-00000098],WindowsEntryPoint.Windows.exe+13E2B1C
- "WindowsEntryPoint.Windows.exe"+8A029D: EB 16 - jmp WindowsEntryPoint.Windows.exe+8A02B5
- "WindowsEntryPoint.Windows.exe"+8A029F: 8B 55 08 - mov edx,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+8A02A2: E9 59 FD FD 00 - jmp 026E0000
- "WindowsEntryPoint.Windows.exe"+8A02A7: 90 - nop
- "WindowsEntryPoint.Windows.exe"+8A02A8: 90 - nop
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>98</ID>
- <Description>"Unlimited Grenades BH AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,89 81 C0 09 00 00) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- mov [ecx+000009C0],eax
- jmp return
- INJECT:
- jmp newmem
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db 89 81 C0 09 00 00
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+64B4A3
- "WindowsEntryPoint.Windows.exe"+64B481: 8B 4D FC - mov ecx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+64B484: 51 - push ecx
- "WindowsEntryPoint.Windows.exe"+64B485: E8 16 B6 A2 FF - call WindowsEntryPoint.Windows.exe+76AA0
- "WindowsEntryPoint.Windows.exe"+64B48A: 8B C8 - mov ecx,eax
- "WindowsEntryPoint.Windows.exe"+64B48C: E8 5F B3 CA FF - call WindowsEntryPoint.Windows.exe+2F67F0
- "WindowsEntryPoint.Windows.exe"+64B491: 89 45 F8 - mov [ebp-08],eax
- "WindowsEntryPoint.Windows.exe"+64B494: 8B 55 FC - mov edx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+64B497: 8B 82 C0 09 00 00 - mov eax,[edx+000009C0]
- "WindowsEntryPoint.Windows.exe"+64B49D: 03 45 08 - add eax,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+64B4A0: 8B 4D FC - mov ecx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+64B4A3: 89 81 C0 09 00 00 - mov [ecx+000009C0],eax
- "WindowsEntryPoint.Windows.exe"+64B4A9: 8B 55 FC - mov edx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+64B4AC: 8B 82 C0 09 00 00 - mov eax,[edx+000009C0]
- "WindowsEntryPoint.Windows.exe"+64B4B2: 3B 45 F8 - cmp eax,[ebp-08]
- "WindowsEntryPoint.Windows.exe"+64B4B5: 7E 0C - jle WindowsEntryPoint.Windows.exe+64B4C3
- "WindowsEntryPoint.Windows.exe"+64B4B7: 8B 4D FC - mov ecx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+64B4BA: 8B 55 F8 - mov edx,[ebp-08]
- "WindowsEntryPoint.Windows.exe"+64B4BD: 89 91 C0 09 00 00 - mov [ecx+000009C0],edx
- "WindowsEntryPoint.Windows.exe"+64B4C3: 6A 00 - push 00
- "WindowsEntryPoint.Windows.exe"+64B4C5: 6A 01 - push 01
- "WindowsEntryPoint.Windows.exe"+64B4C7: 8B 45 FC - mov eax,[ebp-04]
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>99</ID>
- <Description>"Unlimited Energy Weapons AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,F3 0F 11 41 1C 8B 55 FC 8B 45 FC F3 0F 10 42 1C 0F 2F 40 10) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- movss [ecx+1C],xmm0
- jmp return
- INJECT:
- jmp newmem
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db F3 0F 11 41 1C
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+848E7E
- "WindowsEntryPoint.Windows.exe"+848E59: 6A 00 - push 00
- "WindowsEntryPoint.Windows.exe"+848E5B: 6A FF - push -01
- "WindowsEntryPoint.Windows.exe"+848E5D: 68 98 D0 23 02 - push WindowsEntryPoint.Windows.exe+13DD098
- "WindowsEntryPoint.Windows.exe"+848E62: E8 29 61 82 FF - call WindowsEntryPoint.Windows.exe+6EF90
- "WindowsEntryPoint.Windows.exe"+848E67: 8B C8 - mov ecx,eax
- "WindowsEntryPoint.Windows.exe"+848E69: E8 72 B3 8E FF - call WindowsEntryPoint.Windows.exe+1341E0
- "WindowsEntryPoint.Windows.exe"+848E6E: 8B 45 FC - mov eax,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+848E71: F3 0F 10 40 1C - movss xmm0,[eax+1C]
- "WindowsEntryPoint.Windows.exe"+848E76: F3 0F 58 45 08 - addss xmm0,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+848E7B: 8B 4D FC - mov ecx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+848E7E: F3 0F 11 41 1C - movss [ecx+1C],xmm0
- "WindowsEntryPoint.Windows.exe"+848E83: 8B 55 FC - mov edx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+848E86: 8B 45 FC - mov eax,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+848E89: F3 0F 10 42 1C - movss xmm0,[edx+1C]
- "WindowsEntryPoint.Windows.exe"+848E8E: 0F 2F 40 10 - comiss xmm0,[eax+10]
- "WindowsEntryPoint.Windows.exe"+848E92: 72 0A - jb WindowsEntryPoint.Windows.exe+848E9E
- "WindowsEntryPoint.Windows.exe"+848E94: 6A 02 - push 02
- "WindowsEntryPoint.Windows.exe"+848E96: 8B 4D FC - mov ecx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+848E99: E8 52 FE FF FF - call WindowsEntryPoint.Windows.exe+848CF0
- "WindowsEntryPoint.Windows.exe"+848E9E: EB 30 - jmp WindowsEntryPoint.Windows.exe+848ED0
- "WindowsEntryPoint.Windows.exe"+848EA0: 8B 4D FC - mov ecx,[ebp-04]
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>100</ID>
- <Description>"Credits Farming AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,F3 0F 11 40 14 8B 4D FC F3 0F 10 45) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- movss [eax+14],xmm0
- jmp return
- INJECT:
- jmp newmem
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db F3 0F 11 40 14
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+64238F
- "WindowsEntryPoint.Windows.exe"+64237C: CC - int 3
- "WindowsEntryPoint.Windows.exe"+64237D: CC - int 3
- "WindowsEntryPoint.Windows.exe"+64237E: CC - int 3
- "WindowsEntryPoint.Windows.exe"+64237F: CC - int 3
- "WindowsEntryPoint.Windows.exe"+642380: 55 - push ebp
- "WindowsEntryPoint.Windows.exe"+642381: 8B EC - mov ebp,esp
- "WindowsEntryPoint.Windows.exe"+642383: 51 - push ecx
- "WindowsEntryPoint.Windows.exe"+642384: 89 4D FC - mov [ebp-04],ecx
- "WindowsEntryPoint.Windows.exe"+642387: 8B 45 FC - mov eax,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+64238A: F3 0F 10 45 08 - movss xmm0,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+64238F: F3 0F 11 40 14 - movss [eax+14],xmm0
- "WindowsEntryPoint.Windows.exe"+642394: 8B 4D FC - mov ecx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+642397: F3 0F 10 45 08 - movss xmm0,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+64239C: 0F 2F 41 1C - comiss xmm0,[ecx+1C]
- "WindowsEntryPoint.Windows.exe"+6423A0: 76 2B - jna WindowsEntryPoint.Windows.exe+6423CD
- "WindowsEntryPoint.Windows.exe"+6423A2: E8 C9 4E A3 FF - call WindowsEntryPoint.Windows.exe+77270
- "WindowsEntryPoint.Windows.exe"+6423A7: 8B C8 - mov ecx,eax
- "WindowsEntryPoint.Windows.exe"+6423A9: E8 B2 4D A3 FF - call WindowsEntryPoint.Windows.exe+77160
- "WindowsEntryPoint.Windows.exe"+6423AE: 0F B6 D0 - movzx edx,al
- "WindowsEntryPoint.Windows.exe"+6423B1: 85 D2 - test edx,edx
- "WindowsEntryPoint.Windows.exe"+6423B3: 75 18 - jne WindowsEntryPoint.Windows.exe+6423CD
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>101</ID>
- <Description>"Aim Bot AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,74 07 A1 C4 80 46 02) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- je WindowsEntryPoint.Windows.VSDesignerDllMain+B8495
- mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
- jmp return
- INJECT:
- jmp newmem
- nop
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db 74 07 A1 C4 80 46 02
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+11A61C
- "WindowsEntryPoint.Windows.exe"+11A60A: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A60B: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A60C: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A60D: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A60E: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A60F: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A610: 55 - push ebp
- "WindowsEntryPoint.Windows.exe"+11A611: 8B EC - mov ebp,esp
- "WindowsEntryPoint.Windows.exe"+11A613: 0F B6 05 B9 80 46 02 - movzx eax,byte ptr [WindowsEntryPoint.Windows.exe+16080B9]
- "WindowsEntryPoint.Windows.exe"+11A61A: 85 C0 - test eax,eax
- "WindowsEntryPoint.Windows.exe"+11A61C: 74 07 - je WindowsEntryPoint.Windows.exe+11A625
- "WindowsEntryPoint.Windows.exe"+11A61E: A1 C4 80 46 02 - mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
- "WindowsEntryPoint.Windows.exe"+11A623: EB 0B - jmp WindowsEntryPoint.Windows.exe+11A630
- "WindowsEntryPoint.Windows.exe"+11A625: E8 06 C7 F5 FF - call WindowsEntryPoint.Windows.exe+76D30
- "WindowsEntryPoint.Windows.exe"+11A62A: 8B 80 D0 00 00 00 - mov eax,[eax+000000D0]
- "WindowsEntryPoint.Windows.exe"+11A630: 5D - pop ebp
- "WindowsEntryPoint.Windows.exe"+11A631: C3 - ret
- "WindowsEntryPoint.Windows.exe"+11A632: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A633: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A634: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A635: CC - int 3
- "WindowsEntryPoint.Windows.exe"+11A636: CC - int 3
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>102</ID>
- <Description>"Kill Classes AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,8B 85 50 FF FF FF FF 24) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- mov eax,[ebp-000000B0]
- jmp return
- INJECT:
- jmp newmem
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db 8B 85 50 FF FF FF
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+89FFFC
- "WindowsEntryPoint.Windows.exe"+89FFBE: C7 85 6C FF FF FF 74 2B 24 02 - mov [ebp-00000094],WindowsEntryPoint.Windows.exe+13E2B74
- "WindowsEntryPoint.Windows.exe"+89FFC8: EB 16 - jmp WindowsEntryPoint.Windows.exe+89FFE0
- "WindowsEntryPoint.Windows.exe"+89FFCA: C7 85 6C FF FF FF 94 2B 24 02 - mov [ebp-00000094],WindowsEntryPoint.Windows.exe+13E2B94
- "WindowsEntryPoint.Windows.exe"+89FFD4: EB 0A - jmp WindowsEntryPoint.Windows.exe+89FFE0
- "WindowsEntryPoint.Windows.exe"+89FFD6: C7 85 6C FF FF FF 8C 2B 24 02 - mov [ebp-00000094],WindowsEntryPoint.Windows.exe+13E2B8C
- "WindowsEntryPoint.Windows.exe"+89FFE0: C7 85 70 FF FF FF 00 00 00 00 - mov [ebp-00000090],00000000
- "WindowsEntryPoint.Windows.exe"+89FFEA: 8B 55 0C - mov edx,[ebp+0C]
- "WindowsEntryPoint.Windows.exe"+89FFED: 89 95 50 FF FF FF - mov [ebp-000000B0],edx
- "WindowsEntryPoint.Windows.exe"+89FFF3: 83 BD 50 FF FF FF 06 - cmp dword ptr [ebp-000000B0],06
- "WindowsEntryPoint.Windows.exe"+89FFFA: 77 5F - ja WindowsEntryPoint.Windows.exe+8A005B
- "WindowsEntryPoint.Windows.exe"+89FFFC: 8B 85 50 FF FF FF - mov eax,[ebp-000000B0]
- "WindowsEntryPoint.Windows.exe"+8A0002: FF 24 85 50 06 70 01 - jmp dword ptr [eax*4+WindowsEntryPoint.Windows.exe+8A0650]
- "WindowsEntryPoint.Windows.exe"+8A0009: C7 85 70 FF FF FF 84 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B84
- "WindowsEntryPoint.Windows.exe"+8A0013: EB 46 - jmp WindowsEntryPoint.Windows.exe+8A005B
- "WindowsEntryPoint.Windows.exe"+8A0015: C7 85 70 FF FF FF 7C 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B7C
- "WindowsEntryPoint.Windows.exe"+8A001F: EB 3A - jmp WindowsEntryPoint.Windows.exe+8A005B
- "WindowsEntryPoint.Windows.exe"+8A0021: C7 85 70 FF FF FF 3C 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B3C
- "WindowsEntryPoint.Windows.exe"+8A002B: EB 2E - jmp WindowsEntryPoint.Windows.exe+8A005B
- "WindowsEntryPoint.Windows.exe"+8A002D: C7 85 70 FF FF FF 34 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B34
- "WindowsEntryPoint.Windows.exe"+8A0037: EB 22 - jmp WindowsEntryPoint.Windows.exe+8A005B
- "WindowsEntryPoint.Windows.exe"+8A0039: C7 85 70 FF FF FF 2C 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B2C
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>103</ID>
- <Description>"CrossHair AOB"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-20
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,FF 24 8D DC 3C 0C 01) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- // jmp dword ptr [ecx*4+WindowsEntryPoint.Windows.VSDesignerDllMain+201B4C]
- jmp return
- INJECT:
- jmp newmem
- nop
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db FF 24 8D DC 3C 0C 01
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+263608
- "WindowsEntryPoint.Windows.exe"+2635E0: 89 45 DC - mov [ebp-24],eax
- "WindowsEntryPoint.Windows.exe"+2635E3: 8B 4D D4 - mov ecx,[ebp-2C]
- "WindowsEntryPoint.Windows.exe"+2635E6: 8B 91 64 03 00 00 - mov edx,[ecx+00000364]
- "WindowsEntryPoint.Windows.exe"+2635EC: 3B 55 DC - cmp edx,[ebp-24]
- "WindowsEntryPoint.Windows.exe"+2635EF: 0F 84 A5 06 00 00 - je WindowsEntryPoint.Windows.exe+263C9A
- "WindowsEntryPoint.Windows.exe"+2635F5: 8B 45 DC - mov eax,[ebp-24]
- "WindowsEntryPoint.Windows.exe"+2635F8: 89 45 D0 - mov [ebp-30],eax
- "WindowsEntryPoint.Windows.exe"+2635FB: 83 7D D0 0F - cmp dword ptr [ebp-30],0F
- "WindowsEntryPoint.Windows.exe"+2635FF: 0F 87 E6 05 00 00 - ja WindowsEntryPoint.Windows.exe+263BEB
- "WindowsEntryPoint.Windows.exe"+263605: 8B 4D D0 - mov ecx,[ebp-30]
- "WindowsEntryPoint.Windows.exe"+263608: FF 24 8D DC 3C 0C 01 - jmp dword ptr [ecx*4+WindowsEntryPoint.Windows.exe+263CDC]
- "WindowsEntryPoint.Windows.exe"+26360F: 68 7C F3 1F 02 - push WindowsEntryPoint.Windows.exe+139F37C
- "WindowsEntryPoint.Windows.exe"+263614: 8D 8D 04 FF FF FF - lea ecx,[ebp-000000FC]
- "WindowsEntryPoint.Windows.exe"+26361A: E8 01 12 E1 FF - call WindowsEntryPoint.Windows.exe+74820
- "WindowsEntryPoint.Windows.exe"+26361F: 89 85 5C FF FF FF - mov [ebp-000000A4],eax
- "WindowsEntryPoint.Windows.exe"+263625: 8B 95 5C FF FF FF - mov edx,[ebp-000000A4]
- "WindowsEntryPoint.Windows.exe"+26362B: 89 55 90 - mov [ebp-70],edx
- "WindowsEntryPoint.Windows.exe"+26362E: C6 45 FC 01 - mov byte ptr [ebp-04],01
- "WindowsEntryPoint.Windows.exe"+263632: 68 84 F3 1F 02 - push WindowsEntryPoint.Windows.exe+139F384
- "WindowsEntryPoint.Windows.exe"+263637: 8B 4D 90 - mov ecx,[ebp-70]
- "WindowsEntryPoint.Windows.exe"+26363A: E8 01 B9 E0 FF - call WindowsEntryPoint.Windows.exe+6EF40
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>107</ID>
- <Description>"GroundFlag"</Description>
- <VariableType>Byte</VariableType>
- <Address>"WindowsEntryPoint.Windows.exe"+016615E4</Address>
- <Offsets>
- <Offset>C0</Offset>
- <Offset>0</Offset>
- <Offset>A8</Offset>
- </Offsets>
- <Hotkeys>
- <Hotkey>
- <Action>Set Value</Action>
- <Keys>
- <Key>113</Key>
- </Keys>
- <Value>0</Value>
- <ID>0</ID>
- </Hotkey>
- </Hotkeys>
- </CheatEntry>
- <CheatEntry>
- <ID>108</ID>
- <Description>"Fly Hack"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-24
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,06 89 04 0A 8B 45 FC) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- mov eax,[edx+ecx]
- mov [edx+ecx],eax
- mov eax,[ebp-04]
- jmp return
- INJECT+01:
- jmp newmem
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT+01:
- db 89 04 0A 8B 45 FC
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+92527
- "WindowsEntryPoint.Windows.exe"+92507: 8B 75 08 - mov esi,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+9250A: 8B 14 16 - mov edx,[esi+edx]
- "WindowsEntryPoint.Windows.exe"+9250D: 89 14 01 - mov [ecx+eax],edx
- "WindowsEntryPoint.Windows.exe"+92510: B8 04 00 00 00 - mov eax,00000004
- "WindowsEntryPoint.Windows.exe"+92515: D1 E0 - shl eax,1
- "WindowsEntryPoint.Windows.exe"+92517: B9 04 00 00 00 - mov ecx,00000004
- "WindowsEntryPoint.Windows.exe"+9251C: D1 E1 - shl ecx,1
- "WindowsEntryPoint.Windows.exe"+9251E: 8B 55 FC - mov edx,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+92521: 8B 75 08 - mov esi,[ebp+08]
- "WindowsEntryPoint.Windows.exe"+92524: 8B 04 06 - mov eax,[esi+eax]
- "WindowsEntryPoint.Windows.exe"+92527: 89 04 0A - mov [edx+ecx],eax
- "WindowsEntryPoint.Windows.exe"+9252A: 8B 45 FC - mov eax,[ebp-04]
- "WindowsEntryPoint.Windows.exe"+9252D: 5E - pop esi
- "WindowsEntryPoint.Windows.exe"+9252E: 8B E5 - mov esp,ebp
- "WindowsEntryPoint.Windows.exe"+92530: 5D - pop ebp
- "WindowsEntryPoint.Windows.exe"+92531: C2 04 00 - ret 0004
- "WindowsEntryPoint.Windows.exe"+92534: CC - int 3
- "WindowsEntryPoint.Windows.exe"+92535: CC - int 3
- "WindowsEntryPoint.Windows.exe"+92536: CC - int 3
- "WindowsEntryPoint.Windows.exe"+92537: CC - int 3
- "WindowsEntryPoint.Windows.exe"+92538: CC - int 3
- "WindowsEntryPoint.Windows.exe"+92539: CC - int 3
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>109</ID>
- <Description>"GroundFlagAlwaysOff"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
- Version:
- Date : 2017-07-30
- Author : Abo 3Amer
- This script does blah blah blah
- }
- [ENABLE]
- aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,C6 80 C0 00 00 00 00 8B 8D) // should be unique
- alloc(newmem,$1000)
- label(code)
- label(return)
- newmem:
- code:
- mov byte ptr [eax+000000C0],01
- jmp return
- INJECT:
- jmp newmem
- nop
- nop
- return:
- registersymbol(INJECT)
- [DISABLE]
- INJECT:
- db C6 80 C0 00 00 00 00
- unregistersymbol(INJECT)
- dealloc(newmem)
- {
- // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+6FD6AC
- "WindowsEntryPoint.Windows.exe"+6FD674: 81 C1 8C 00 00 00 - add ecx,0000008C
- "WindowsEntryPoint.Windows.exe"+6FD67A: E8 31 76 9B FF - call WindowsEntryPoint.Windows.exe+B4CB0
- "WindowsEntryPoint.Windows.exe"+6FD67F: 8B 8D 58 FF FF FF - mov ecx,[ebp-000000A8]
- "WindowsEntryPoint.Windows.exe"+6FD685: 8B 55 DC - mov edx,[ebp-24]
- "WindowsEntryPoint.Windows.exe"+6FD688: 89 91 A4 00 00 00 - mov [ecx+000000A4],edx
- "WindowsEntryPoint.Windows.exe"+6FD68E: C6 85 57 FF FF FF 01 - mov byte ptr [ebp-000000A9],01
- "WindowsEntryPoint.Windows.exe"+6FD695: F3 0F 10 85 4C FF FF FF - movss xmm0,[ebp-000000B4]
- "WindowsEntryPoint.Windows.exe"+6FD69D: 0F 2F 85 5C FF FF FF - comiss xmm0,[ebp-000000A4]
- "WindowsEntryPoint.Windows.exe"+6FD6A4: 72 1A - jb WindowsEntryPoint.Windows.exe+6FD6C0
- "WindowsEntryPoint.Windows.exe"+6FD6A6: 8B 85 58 FF FF FF - mov eax,[ebp-000000A8]
- "WindowsEntryPoint.Windows.exe"+6FD6AC: C6 80 C0 00 00 00 00 - mov byte ptr [eax+000000C0],00
- "WindowsEntryPoint.Windows.exe"+6FD6B3: 8B 8D 58 FF FF FF - mov ecx,[ebp-000000A8]
- "WindowsEntryPoint.Windows.exe"+6FD6B9: C6 81 C3 00 00 00 00 - mov byte ptr [ecx+000000C3],00
- "WindowsEntryPoint.Windows.exe"+6FD6C0: EB 14 - jmp WindowsEntryPoint.Windows.exe+6FD6D6
- "WindowsEntryPoint.Windows.exe"+6FD6C2: C6 85 57 FF FF FF 00 - mov byte ptr [ebp-000000A9],00
- "WindowsEntryPoint.Windows.exe"+6FD6C9: 8B 95 58 FF FF FF - mov edx,[ebp-000000A8]
- "WindowsEntryPoint.Windows.exe"+6FD6CF: C6 82 C0 00 00 00 01 - mov byte ptr [edx+000000C0],01
- "WindowsEntryPoint.Windows.exe"+6FD6D6: 51 - push ecx
- "WindowsEntryPoint.Windows.exe"+6FD6D7: F3 0F 10 85 4C FF FF FF - movss xmm0,[ebp-000000B4]
- "WindowsEntryPoint.Windows.exe"+6FD6DF: F3 0F 11 04 24 - movss [esp],xmm0
- "WindowsEntryPoint.Windows.exe"+6FD6E4: 51 - push ecx
- }
- </AssemblerScript>
- </CheatEntry>
- <CheatEntry>
- <ID>110</ID>
- <Description>"GroundFlagAlwaysOn"</Description>
- <LastState/>
- <VariableType>Auto Assembler Script</VariableType>
- <AssemblerScript>[ENABLE]
- //code from here to '[DISABLE]' will be used to enable the cheat
- alloc(newmem,2048)
- label(returnhere)
- label(originalcode)
- label(exit)
- newmem: //this is allocated memory, you have read,write,execute access
- //place your code here
- originalcode:
- mov byte ptr [ecx+000000C0],00
- exit:
- jmp returnhere
- "WindowsEntryPoint.Windows.exe"+6FD724:
- jmp newmem
- nop
- nop
- returnhere:
- [DISABLE]
- //code from here till the end of the code will be used to disable the cheat
- dealloc(newmem)
- "WindowsEntryPoint.Windows.exe"+6FD724:
- mov byte ptr [ecx+000000C0],01
- //Alt: db C6 81 C0 00 00 00 01
- </AssemblerScript>
- </CheatEntry>
- </CheatEntries>
- <CheatCodes>
- <CodeEntry>
- <Description>Change of jne WindowsEntryPoint.Windows.VSDesignerDllMain+83E125</Description>
- <Address>009502A9</Address>
- <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
- <ModuleNameOffset>8A02A9</ModuleNameOffset>
- <Before>
- <Byte>80</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>03</Byte>
- </Before>
- <Actual>
- <Byte>75</Byte>
- <Byte>0A</Byte>
- </Actual>
- <After>
- <Byte>C7</Byte>
- <Byte>85</Byte>
- <Byte>68</Byte>
- <Byte>FF</Byte>
- <Byte>FF</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Change of mov ecx,[ebp-30]</Description>
- <Address>01093605</Address>
- <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
- <ModuleNameOffset>263605</ModuleNameOffset>
- <Before>
- <Byte>87</Byte>
- <Byte>E6</Byte>
- <Byte>05</Byte>
- <Byte>00</Byte>
- <Byte>00</Byte>
- </Before>
- <Actual>
- <Byte>8B</Byte>
- <Byte>4D</Byte>
- <Byte>D0</Byte>
- </Actual>
- <After>
- <Byte>FF</Byte>
- <Byte>24</Byte>
- <Byte>8D</Byte>
- <Byte>DC</Byte>
- <Byte>3C</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Change of jmp dword ptr [ecx*4+WindowsEntryPoint.Windows.VSDesignerDllMain+201B4C]</Description>
- <Address>00403608</Address>
- <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
- <ModuleNameOffset>263608</ModuleNameOffset>
- <Before>
- <Byte>00</Byte>
- <Byte>00</Byte>
- <Byte>8B</Byte>
- <Byte>4D</Byte>
- <Byte>D0</Byte>
- </Before>
- <Actual>
- <Byte>FF</Byte>
- <Byte>24</Byte>
- <Byte>8D</Byte>
- <Byte>DC</Byte>
- <Byte>3C</Byte>
- <Byte>09</Byte>
- <Byte>01</Byte>
- </Actual>
- <After>
- <Byte>68</Byte>
- <Byte>7C</Byte>
- <Byte>F3</Byte>
- <Byte>1C</Byte>
- <Byte>02</Byte>
- </After>
- </CodeEntry>
- <CodeEntry>
- <Description>Change of movss [ecx+1C],xmm0</Description>
- <Address>00948E7E</Address>
- <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
- <ModuleNameOffset>848E7E</ModuleNameOffset>
- <Before>
- <Byte>45</Byte>
- <Byte>08</Byte>
- <Byte>8B</Byte>
- <Byte>4D</Byte>
- <Byte>FC</Byte>
- </Before>
- <Actual>
- <Byte>F3</Byte>
- <Byte>0F</Byte>
- <Byte>11</Byte>
- <Byte>41</Byte>
- <Byte>1C</Byte>
- </Actual>
- <After>
- <Byte>8B</Byte>
- <Byte>55</Byte>
- <Byte>FC</Byte>
- <Byte>8B</Byte>
- <Byte>45</Byte>
- </After>
- </CodeEntry>
- </CheatCodes>
- <UserdefinedSymbols/>
- <Structures StructVersion="2">
- <Structure Name="unnamed structure" AutoFill="0" AutoCreate="1" DefaultHex="0" AutoDestroy="0" DoNotSaveLocal="0" RLECompression="0" AutoCreateStructsize="4096">
- <Elements>
- <Element Offset="0" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="12" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="24" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="28" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="44" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="68" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="92" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="104" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="140" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="144" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="152" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="156" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="160" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="168" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="172" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="176" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="180" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="184" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="188" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="192" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="196" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="200" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="204" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="208" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="212" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="216" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="220" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="224" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="228" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="232" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="236" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="240" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="244" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="248" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="252" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="256" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="260" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="264" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="268" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="272" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="276" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="280" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="284" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="288" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
- <Element Offset="293" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="296" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="300" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="304" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="308" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="312" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="316" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="320" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="324" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="328" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="332" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="336" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="340" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="344" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="348" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="352" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="356" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="360" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="364" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="368" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="372" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="376" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="380" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="384" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="388" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="392" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="396" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="400" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="404" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="408" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="412" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="416" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="420" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="424" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="428" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="432" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="436" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="440" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="444" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="448" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="452" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="456" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="460" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="464" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="468" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="472" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="476" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="480" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="484" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="488" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="492" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="496" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- </Elements>
- </Structure>
- <Structure Name="unnamed structure2" AutoFill="0" AutoCreate="1" DefaultHex="0" AutoDestroy="0" DoNotSaveLocal="0" RLECompression="0" AutoCreateStructsize="4096">
- <Elements>
- <Element Offset="0" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="12" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="24" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="28" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="44" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="68" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="92" Vartype="String" Bytesize="13" DisplayMethod="Unsigned Integer"/>
- <Element Offset="105" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="108" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="140" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="144" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="152" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="156" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="160" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="168" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="172" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="176" Vartype="String" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="180" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="184" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="188" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="192" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="196" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="200" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="204" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="208" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="212" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="216" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="220" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="224" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="228" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="232" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="236" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="240" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="244" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="248" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="252" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="256" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="260" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="264" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="268" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="272" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="276" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="280" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="284" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="288" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="292" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="296" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="300" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="304" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="308" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="312" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
- <Element Offset="317" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="320" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="324" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="328" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="332" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="336" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
- <Element Offset="341" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="344" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="348" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="352" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="356" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="360" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="364" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="368" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="372" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="376" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="380" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="384" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="388" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="392" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="396" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="400" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="404" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="408" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="412" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="416" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="420" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="424" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="428" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="432" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="436" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="440" Vartype="String" Bytesize="6" DisplayMethod="Unsigned Integer"/>
- <Element Offset="446" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
- <Element Offset="448" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="452" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="456" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="460" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="464" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="468" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="472" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="476" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="480" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="484" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="488" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- <Element Offset="492" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
- <Element Offset="496" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
- </Elements>
- </Structure>
- </Structures>
- <LuaScript>function CEButton1Click(sender)
- ShellExecute("https://www.youtube.com/channel/UCbkYmwF5RPxz0f0-OaUGxTg?view_as=subscriber")
- end
- function checkFirstTime()
- First = io.open([[C:\Windows\System32\e.txt]])
- if First ~= nil then
- First:close()
- showMessage'Welcome Back!'
- else
- First1 = io.open([[C:\Windows\System32\e.txt]],'w')
- ShowMessage'Welcome To MC5 Trainer Please Read READ ME To Get Started!'
- local r = math.random(100000000000000000,999999999999999999)
- First1:write(r)
- First1:close()
- end
- user = io.open([[C:\Windows\System32\e.txt]])
- register.username.text = user:read()
- user:close()
- end
- checkFirstTime()
- function checkVIP()
- File = io.open([[C:\Windows\System32\q.txt]])
- if File ~= nil then
- function CECheckbox1Change(sender)
- addresslist=getAddressList()
- local CreditsFarm = addresslist.getMemoryRecordByDescription('Credits Farming')
- if CETrainer.CECheckbox1.checked == true then
- memoryrecord_freeze(CreditsFarm)
- else
- memoryrecord_unfreeze(CreditsFarm)
- end
- end
- function CECheckbox2Change(sender)
- addresslist=getAddressList()
- local MorphMines = addresslist.getMemoryRecordByDescription('Morph T9 Glitch')
- if CETrainer.CECheckbox2.checked == true then
- memoryrecord_freeze(MorphMines)
- else
- memoryrecord_unfreeze(MorphMines)
- end
- end
- function CECheckbox3Change(sender)
- addresslist=getAddressList()
- local GodMode = addresslist.getMemoryRecordByDescription('Ultimate Mode')
- if CETrainer.CECheckbox3.checked == true then
- memoryrecord_freeze(GodMode)
- else
- memoryrecord_unfreeze(GodMode)
- end
- end
- function CECheckbox8Change(sender)
- addresslist=getAddressList()
- local GR = addresslist.getMemoryRecordByDescription('Grenades')
- if CETrainer.CECheckbox8.checked == true then
- memoryrecord_freeze(GR)
- else
- memoryrecord_unfreeze(GR)
- end
- end
- function CECheckbox6Change(sender)
- if CETrainer.CECheckbox6.checked == true then
- if CETrainer.CEComboBox2.text == 'Assault' then
- addresslist=getAddressList()
- local ass = addresslist.getMemoryRecordByDescription('Assault')
- memoryrecord_freeze(ass)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Sniper' then
- addresslist=getAddressList()
- local snip = addresslist.getMemoryRecordByDescription('Sniper')
- memoryrecord_freeze(snip)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Recon' then
- addresslist=getAddressList()
- local rec = addresslist.getMemoryRecordByDescription('Recon')
- memoryrecord_freeze(rec)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Heavy' then
- addresslist=getAddressList()
- local hev = addresslist.getMemoryRecordByDescription('Heavy')
- memoryrecord_freeze(hev)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Support' then
- addresslist=getAddressList()
- local sup = addresslist.getMemoryRecordByDescription('Support')
- memoryrecord_freeze(sup)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Bounty Hunter' then
- addresslist=getAddressList()
- local bou = addresslist.getMemoryRecordByDescription('Bounty')
- memoryrecord_freeze(bou)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Sapper' then
- addresslist=getAddressList()
- local sap = addresslist.getMemoryRecordByDescription('Sapper')
- memoryrecord_freeze(sap)
- CETrainer.CEComboBox2.Visible=false
- end
- end
- if CETrainer.CECheckbox6.checked == false then
- CETrainer.CEComboBox2.Visible=true
- addresslist=getAddressList()
- local ass = addresslist.getMemoryRecordByDescription('Assault')
- memoryrecord_unfreeze(ass)
- local snip = addresslist.getMemoryRecordByDescription('Sniper')
- memoryrecord_unfreeze(snip)
- local rec = addresslist.getMemoryRecordByDescription('Recon')
- memoryrecord_unfreeze(rec)
- local hev = addresslist.getMemoryRecordByDescription('Heavy')
- memoryrecord_unfreeze(hev)
- local sup = addresslist.getMemoryRecordByDescription('Support')
- memoryrecord_unfreeze(sup)
- local bou = addresslist.getMemoryRecordByDescription('Bounty')
- memoryrecord_unfreeze(bou)
- local sap = addresslist.getMemoryRecordByDescription('Sapper')
- memoryrecord_unfreeze(sap)
- end
- end
- function CECheckbox10Change(sender)
- addresslist=getAddressList()
- local UEVP = addresslist.getMemoryRecordByDescription('Unlimited Energy VERR POWER')
- if CETrainer.CECheckbox10.checked == true then
- memoryrecord_freeze(UEVP)
- else
- memoryrecord_unfreeze(UEVP)
- end
- end
- function CECheckbox4Change(sender)
- addresslist=getAddressList()
- local UGBH = addresslist.getMemoryRecordByDescription('Unlimited Grenades BH')
- if CETrainer.CECheckbox4.checked == true then
- memoryrecord_freeze(UGBH)
- else
- memoryrecord_unfreeze(UGBH)
- end
- end
- function CECheckbox5Change(sender)
- if CETrainer.CECheckbox5.checked == true then
- if CETrainer.CEComboBox1.text == 'Explosive Kills' then
- addresslist=getAddressList()
- local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
- memoryrecord_freeze(explos)
- CETrainer.CEComboBox1.Visible=false
- end
- if CETrainer.CEComboBox1.text == 'Melee Kills' then
- addresslist=getAddressList()
- local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
- memoryrecord_freeze(melee)
- CETrainer.CEComboBox1.Visible=false
- end
- if CETrainer.CEComboBox1.text == 'HeadShot Kills' then
- addresslist=getAddressList()
- local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
- memoryrecord_freeze(headshot)
- CETrainer.CEComboBox1.Visible=false
- end
- end
- if CETrainer.CECheckbox5.checked == false then
- CETrainer.CEComboBox1.Visible=true
- addresslist=getAddressList()
- local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
- memoryrecord_unfreeze(explos)
- local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
- memoryrecord_unfreeze(melee)
- local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
- memoryrecord_unfreeze(headshot)
- end
- end
- function CECheckbox12Change(sender)
- if CETrainer.CECheckbox12.checked == true then
- addresslist=getAddressList()
- local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
- if timer100 then
- timer100.destroy()
- timer100=nil
- end
- timer100=createTimer()
- timer100.OnTimer=function(t)
- fly2()
- timer100.destroy()
- timer100=nil
- end
- else
- local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- memoryrecord_unfreeze(GFAO)
- end
- end
- function downlClick(sender)
- local GFAaO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- memoryrecord_unfreeze(GFAaO)
- if timer1000 then
- timer1000.destroy()
- timer1000=nil
- end
- timer1000=createTimer()
- timer1000.OnTimer=function(t)
- memoryrecord_freeze(GFAaO)
- timer1000.destroy()
- timer1000=nil
- end
- end
- function CECheckbox11Change(sender)
- if CETrainer.CECheckbox11.checked == true then
- if CETrainer.CEComboBox3.text == 'None' then
- addresslist=getAddressList()
- local non = addresslist.getMemoryRecordByDescription('none')
- memoryrecord_freeze(non)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Cross Hair' then
- addresslist=getAddressList()
- local cros = addresslist.getMemoryRecordByDescription('crosshair')
- memoryrecord_freeze(cros)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Drone' then
- addresslist=getAddressList()
- local drone = addresslist.getMemoryRecordByDescription('Drone')
- memoryrecord_freeze(drone)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Rail Gun' then
- addresslist=getAddressList()
- local rg = addresslist.getMemoryRecordByDescription('railgun')
- memoryrecord_freeze(rg)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Rectangular' then
- addresslist=getAddressList()
- local rec = addresslist.getMemoryRecordByDescription('rectangular')
- memoryrecord_freeze(rec)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Launcher' then
- addresslist=getAddressList()
- local lan = addresslist.getMemoryRecordByDescription('launcher')
- memoryrecord_freeze(lan)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Circular' then
- addresslist=getAddressList()
- local cir = addresslist.getMemoryRecordByDescription('circular')
- memoryrecord_freeze(cir)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Classic' then
- addresslist=getAddressList()
- local clas = addresslist.getMemoryRecordByDescription('classic')
- memoryrecord_freeze(clas)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Charge' then
- addresslist=getAddressList()
- local char = addresslist.getMemoryRecordByDescription('charge')
- memoryrecord_freeze(char)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'CrossBow' then
- addresslist=getAddressList()
- local crb = addresslist.getMemoryRecordByDescription('crossbow')
- memoryrecord_freeze(crb)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Sniper Lock' then
- addresslist=getAddressList()
- local spl = addresslist.getMemoryRecordByDescription('sniperlock')
- memoryrecord_freeze(spl)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Dead Lock' then
- addresslist=getAddressList()
- local delo = addresslist.getMemoryRecordByDescription('deadlock')
- memoryrecord_freeze(delo)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Locked' then
- addresslist=getAddressList()
- local locked = addresslist.getMemoryRecordByDescription('locked')
- memoryrecord_freeze(locked)
- CETrainer.CEComboBox3.Visible=false
- end
- end
- if CETrainer.CECheckbox11.checked == false then
- CETrainer.CEComboBox3.Visible=true
- addresslist=getAddressList()
- local none = addresslist.getMemoryRecordByDescription('none')
- memoryrecord_unfreeze(none)
- local cr = addresslist.getMemoryRecordByDescription('crosshair')
- memoryrecord_unfreeze(cr)
- local dr = addresslist.getMemoryRecordByDescription('Drone')
- memoryrecord_unfreeze(dr)
- local rg = addresslist.getMemoryRecordByDescription('railgun')
- memoryrecord_unfreeze(rg)
- local rec = addresslist.getMemoryRecordByDescription('rectangular')
- memoryrecord_unfreeze(rec)
- local laun = addresslist.getMemoryRecordByDescription('launcher')
- memoryrecord_unfreeze(laun)
- local cir = addresslist.getMemoryRecordByDescription('circular')
- memoryrecord_unfreeze(cir)
- local clas = addresslist.getMemoryRecordByDescription('classic')
- memoryrecord_unfreeze(clas)
- local char = addresslist.getMemoryRecordByDescription('charge')
- memoryrecord_unfreeze(char)
- local crbow = addresslist.getMemoryRecordByDescription('crossbow')
- memoryrecord_unfreeze(crbow)
- local spl = addresslist.getMemoryRecordByDescription('sniperlock')
- memoryrecord_unfreeze(spl)
- local dl = addresslist.getMemoryRecordByDescription('deadlock')
- memoryrecord_unfreeze(dl)
- local locked = addresslist.getMemoryRecordByDescription('locked')
- memoryrecord_unfreeze(locked)
- end
- end
- function CECheckbox9Change(sender)
- addresslist=getAddressList()
- local aim = addresslist.getMemoryRecordByDescription('aimbot')
- if CETrainer.CECheckbox9.checked == true then
- memoryrecord_freeze(aim)
- else
- memoryrecord_unfreeze(aim)
- end
- end
- function CECheckbox7Change(sender)
- if CETrainer.CECheckbox7.checked == true then
- t=createTimer(nil)
- timer_setInterval(t, 300)
- timer_onTimer(t, typestring)
- timer_setEnabled(t, true)
- else
- object_destroy(t)
- end
- end
- CETrainer.register11.Caption = 'Registered!'
- CETrainer.register11.Font.Color=0x00a800
- function register11Click(sender)
- showMessage'You are Already Registered'
- end
- else
- CETrainer.register11.Caption = 'Register'
- CETrainer.register11.Font.Color=0xb30404
- function CECheckbox1Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox2Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox3Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox4Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox8Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox5Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox6Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox12Change(sender)
- showMessage'You Must Register your pc First'
- end
- function downlClick(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox10Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox11Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox9Change(sender)
- showMessage'You Must Register your pc First'
- end
- function CECheckbox7Change(sender)
- showMessage'You Must Register your pc First'
- end
- function register11Click(sender)
- register.show()
- end
- end
- end
- checkVIP()
- function FormActivate(sender)
- openProcess"WindowsEntryPoints.Windows.exe"
- end
- function CEButton2Click(sender)
- ShellExecute("https://youtube.streamlabs.com/UCbkYmwF5RPxz0f0-OaUGxTg#/")
- end
- function CEButton3Click(sender)
- openProcess'WindowsEntryPoint.Windows.exe'
- if openProcess'WindowsEntryPoint.Windows.exe' then
- showMessage'Success'
- else
- showMessage'Game Not Found!open the game first'
- end
- end
- RequiredCEVersion=6.7
- if (getCEVersion==nil) or (getCEVersion()<RequiredCEVersion) then
- messageDialog('Please install Cheat Engine '..RequiredCEVersion, mtError, mbOK)
- closeCE()
- end
- CETrainer.SEPERATOR.Visible=false
- getAutoAttachList().add("WindowsEntryPoint.Windows.exe")
- gPlaySoundOnAction=true
- gActivateSound=findTableFile([[Activate]])
- gDeactivateSound=findTableFile([[Deactivate]])
- CETrainer.show()
- function AboutClick()
- showMessage(gAboutText)
- end
- gAboutText=[[This trainer was made by Ahmad
- Darwish
- Contact :
- promo.ah6@gmail.com
- تم انشاء هذا البرنامج من قبل احمد درويش
- للتواصل :
- promo.ah6@gmail.com]]
- function CloseClick()
- closeCE()
- end
- i=1;
- m=0;
- function typestring()
- if ((m % 2)==0) then
- keyDown(string.byte(s,i))
- else
- keyUp(string.byte(s,i))
- i=i+1
- if (i>#s) then
- i=1
- end
- end
- m=m+1
- end
- function fly()
- addresslist=getAddressList()
- local GF = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
- memoryrecord_unfreeze(GF)
- memoryrecord_freeze(FlyHack)
- end
- function fly2()
- addresslist=getAddressList()
- local GF = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
- memoryrecord_unfreeze(FlyHack)
- memoryrecord_freeze(GF)
- end
- function VIP()
- function CECheckbox1Change(sender)
- addresslist=getAddressList()
- local CreditsFarm = addresslist.getMemoryRecordByDescription('Credits Farming')
- if CETrainer.CECheckbox1.checked == true then
- memoryrecord_freeze(CreditsFarm)
- else
- memoryrecord_unfreeze(CreditsFarm)
- end
- end
- function CECheckbox2Change(sender)
- addresslist=getAddressList()
- local MorphMines = addresslist.getMemoryRecordByDescription('Morph T9 Glitch')
- if CETrainer.CECheckbox2.checked == true then
- memoryrecord_freeze(MorphMines)
- else
- memoryrecord_unfreeze(MorphMines)
- end
- end
- function CECheckbox3Change(sender)
- addresslist=getAddressList()
- local GodMode = addresslist.getMemoryRecordByDescription('Ultimate Mode')
- if CETrainer.CECheckbox3.checked == true then
- memoryrecord_freeze(GodMode)
- else
- memoryrecord_unfreeze(GodMode)
- end
- end
- function CECheckbox8Change(sender)
- addresslist=getAddressList()
- local GR = addresslist.getMemoryRecordByDescription('Grenades')
- if CETrainer.CECheckbox8.checked == true then
- memoryrecord_freeze(GR)
- else
- memoryrecord_unfreeze(GR)
- end
- end
- function CECheckbox6Change(sender)
- if CETrainer.CECheckbox6.checked == true then
- if CETrainer.CEComboBox2.text == 'Assault' then
- addresslist=getAddressList()
- local ass = addresslist.getMemoryRecordByDescription('Assault')
- memoryrecord_freeze(ass)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Sniper' then
- addresslist=getAddressList()
- local snip = addresslist.getMemoryRecordByDescription('Sniper')
- memoryrecord_freeze(snip)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Recon' then
- addresslist=getAddressList()
- local rec = addresslist.getMemoryRecordByDescription('Recon')
- memoryrecord_freeze(rec)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Heavy' then
- addresslist=getAddressList()
- local hev = addresslist.getMemoryRecordByDescription('Heavy')
- memoryrecord_freeze(hev)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Support' then
- addresslist=getAddressList()
- local sup = addresslist.getMemoryRecordByDescription('Support')
- memoryrecord_freeze(sup)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Bounty Hunter' then
- addresslist=getAddressList()
- local bou = addresslist.getMemoryRecordByDescription('Bounty')
- memoryrecord_freeze(bou)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Sapper' then
- addresslist=getAddressList()
- local sap = addresslist.getMemoryRecordByDescription('Sapper')
- memoryrecord_freeze(sap)
- CETrainer.CEComboBox2.Visible=false
- end
- end
- if CETrainer.CECheckbox6.checked == false then
- CETrainer.CEComboBox2.Visible=true
- addresslist=getAddressList()
- local ass = addresslist.getMemoryRecordByDescription('Assault')
- memoryrecord_unfreeze(ass)
- local snip = addresslist.getMemoryRecordByDescription('Sniper')
- memoryrecord_unfreeze(snip)
- local rec = addresslist.getMemoryRecordByDescription('Recon')
- memoryrecord_unfreeze(rec)
- local hev = addresslist.getMemoryRecordByDescription('Heavy')
- memoryrecord_unfreeze(hev)
- local sup = addresslist.getMemoryRecordByDescription('Support')
- memoryrecord_unfreeze(sup)
- local bou = addresslist.getMemoryRecordByDescription('Bounty')
- memoryrecord_unfreeze(bou)
- local sap = addresslist.getMemoryRecordByDescription('Sapper')
- memoryrecord_unfreeze(sap)
- end
- end
- function CECheckbox10Change(sender)
- addresslist=getAddressList()
- local UEVP = addresslist.getMemoryRecordByDescription('Unlimited Energy VERR POWER')
- if CETrainer.CECheckbox10.checked == true then
- memoryrecord_freeze(UEVP)
- else
- memoryrecord_unfreeze(UEVP)
- end
- end
- function CECheckbox4Change(sender)
- addresslist=getAddressList()
- local UGBH = addresslist.getMemoryRecordByDescription('Unlimited Grenades BH')
- if CETrainer.CECheckbox4.checked == true then
- memoryrecord_freeze(UGBH)
- else
- memoryrecord_unfreeze(UGBH)
- end
- end
- function CECheckbox5Change(sender)
- if CETrainer.CECheckbox5.checked == true then
- if CETrainer.CEComboBox1.text == 'Explosive Kills' then
- addresslist=getAddressList()
- local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
- memoryrecord_freeze(explos)
- CETrainer.CEComboBox1.Visible=false
- end
- if CETrainer.CEComboBox1.text == 'Melee Kills' then
- addresslist=getAddressList()
- local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
- memoryrecord_freeze(melee)
- CETrainer.CEComboBox1.Visible=false
- end
- if CETrainer.CEComboBox1.text == 'HeadShot Kills' then
- addresslist=getAddressList()
- local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
- memoryrecord_freeze(headshot)
- CETrainer.CEComboBox1.Visible=false
- end
- end
- if CETrainer.CECheckbox5.checked == false then
- CETrainer.CEComboBox1.Visible=true
- addresslist=getAddressList()
- local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
- memoryrecord_unfreeze(explos)
- local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
- memoryrecord_unfreeze(melee)
- local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
- memoryrecord_unfreeze(headshot)
- end
- end
- function CECheckbox12Change(sender)
- if CETrainer.CECheckbox12.checked == true then
- local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
- if timer100 then
- timer100.destroy()
- timer100=nil
- end
- timer100=createTimer()
- timer100.OnTimer=function(t)
- fly2()
- timer100.destroy()
- timer100=nil
- end
- else
- local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- memoryrecord_unfreeze(GFAO)
- end
- end
- function downlClick(sender)
- local GFAaO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
- memoryrecord_unfreeze(GFAaO)
- if timer1000 then
- timer1000.destroy()
- timer1000=nil
- end
- timer1000=createTimer()
- timer1000.OnTimer=function(t)
- memoryrecord_freeze(GFAaO)
- timer1000.destroy()
- timer1000=nil
- end
- end
- function CECheckbox11Change(sender)
- if CETrainer.CECheckbox11.checked == true then
- if CETrainer.CEComboBox3.text == 'None' then
- addresslist=getAddressList()
- local non = addresslist.getMemoryRecordByDescription('none')
- memoryrecord_freeze(non)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Cross Hair' then
- addresslist=getAddressList()
- local cros = addresslist.getMemoryRecordByDescription('crosshair')
- memoryrecord_freeze(cros)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Drone' then
- addresslist=getAddressList()
- local drone = addresslist.getMemoryRecordByDescription('Drone')
- memoryrecord_freeze(drone)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Rail Gun' then
- addresslist=getAddressList()
- local rg = addresslist.getMemoryRecordByDescription('railgun')
- memoryrecord_freeze(rg)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Rectangular' then
- addresslist=getAddressList()
- local rec = addresslist.getMemoryRecordByDescription('rectangular')
- memoryrecord_freeze(rec)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Launcher' then
- addresslist=getAddressList()
- local lan = addresslist.getMemoryRecordByDescription('launcher')
- memoryrecord_freeze(lan)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Circular' then
- addresslist=getAddressList()
- local cir = addresslist.getMemoryRecordByDescription('circular')
- memoryrecord_freeze(cir)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Classic' then
- addresslist=getAddressList()
- local clas = addresslist.getMemoryRecordByDescription('classic')
- memoryrecord_freeze(clas)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Charge' then
- addresslist=getAddressList()
- local char = addresslist.getMemoryRecordByDescription('charge')
- memoryrecord_freeze(char)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'CrossBow' then
- addresslist=getAddressList()
- local crb = addresslist.getMemoryRecordByDescription('crossbow')
- memoryrecord_freeze(crb)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Sniper Lock' then
- addresslist=getAddressList()
- local spl = addresslist.getMemoryRecordByDescription('sniperlock')
- memoryrecord_freeze(spl)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Dead Lock' then
- addresslist=getAddressList()
- local delo = addresslist.getMemoryRecordByDescription('deadlock')
- memoryrecord_freeze(delo)
- CETrainer.CEComboBox3.Visible=false
- end
- if CETrainer.CEComboBox3.text == 'Locked' then
- addresslist=getAddressList()
- local locked = addresslist.getMemoryRecordByDescription('locked')
- memoryrecord_freeze(locked)
- CETrainer.CEComboBox3.Visible=false
- end
- end
- if CETrainer.CECheckbox11.checked == false then
- CETrainer.CEComboBox3.Visible=true
- addresslist=getAddressList()
- local none = addresslist.getMemoryRecordByDescription('none')
- memoryrecord_unfreeze(none)
- local cr = addresslist.getMemoryRecordByDescription('crosshair')
- memoryrecord_unfreeze(cr)
- local dr = addresslist.getMemoryRecordByDescription('Drone')
- memoryrecord_unfreeze(dr)
- local rg = addresslist.getMemoryRecordByDescription('railgun')
- memoryrecord_unfreeze(rg)
- local rec = addresslist.getMemoryRecordByDescription('rectangular')
- memoryrecord_unfreeze(rec)
- local laun = addresslist.getMemoryRecordByDescription('launcher')
- memoryrecord_unfreeze(laun)
- local cir = addresslist.getMemoryRecordByDescription('circular')
- memoryrecord_unfreeze(cir)
- local clas = addresslist.getMemoryRecordByDescription('classic')
- memoryrecord_unfreeze(clas)
- local char = addresslist.getMemoryRecordByDescription('charge')
- memoryrecord_unfreeze(char)
- local crbow = addresslist.getMemoryRecordByDescription('crossbow')
- memoryrecord_unfreeze(crbow)
- local spl = addresslist.getMemoryRecordByDescription('sniperlock')
- memoryrecord_unfreeze(spl)
- local dl = addresslist.getMemoryRecordByDescription('deadlock')
- memoryrecord_unfreeze(dl)
- local locked = addresslist.getMemoryRecordByDescription('locked')
- memoryrecord_unfreeze(locked)
- end
- end
- function CECheckbox9Change(sender)
- addresslist=getAddressList()
- local aim = addresslist.getMemoryRecordByDescription('aimbot')
- if CETrainer.CECheckbox9.checked == true then
- memoryrecord_freeze(aim)
- else
- memoryrecord_unfreeze(aim)
- end
- end
- function CECheckbox7Change(sender)
- if CETrainer.CECheckbox7.checked == true then
- t=createTimer(nil)
- timer_setInterval(t, 300)
- timer_onTimer(t, typestring)
- timer_setEnabled(t, true)
- else
- object_destroy(t)
- end
- end
- end
- function notVIP()
- function CECheckbox1Change(sender)
- addresslist=getAddressList()
- local CreditsFarm = addresslist.getMemoryRecordByDescription('Credits Farming')
- if CETrainer.CECheckbox1.checked == true then
- memoryrecord_freeze(CreditsFarm)
- else
- memoryrecord_unfreeze(CreditsFarm)
- end
- end
- function CECheckbox2Change(sender)
- addresslist=getAddressList()
- local MorphMines = addresslist.getMemoryRecordByDescription('Morph T9 Glitch')
- if CETrainer.CECheckbox2.checked == true then
- memoryrecord_freeze(MorphMines)
- else
- memoryrecord_unfreeze(MorphMines)
- end
- end
- function CECheckbox3Change(sender)
- addresslist=getAddressList()
- local GodMode = addresslist.getMemoryRecordByDescription('Ultimate Mode')
- if CETrainer.CECheckbox3.checked == true then
- memoryrecord_freeze(GodMode)
- else
- memoryrecord_unfreeze(GodMode)
- end
- end
- function CECheckbox8Change(sender)
- addresslist=getAddressList()
- local GR = addresslist.getMemoryRecordByDescription('Grenades')
- if CETrainer.CECheckbox8.checked == true then
- memoryrecord_freeze(GR)
- else
- memoryrecord_unfreeze(GR)
- end
- end
- function CECheckbox6Change(sender)
- if CETrainer.CECheckbox6.checked == true then
- if CETrainer.CEComboBox2.text == 'Assault' then
- addresslist=getAddressList()
- local ass = addresslist.getMemoryRecordByDescription('Assault')
- memoryrecord_freeze(ass)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Sniper' then
- addresslist=getAddressList()
- local snip = addresslist.getMemoryRecordByDescription('Sniper')
- memoryrecord_freeze(snip)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Recon' then
- addresslist=getAddressList()
- local rec = addresslist.getMemoryRecordByDescription('Recon')
- memoryrecord_freeze(rec)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Heavy' then
- addresslist=getAddressList()
- local hev = addresslist.getMemoryRecordByDescription('Heavy')
- memoryrecord_freeze(hev)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Support' then
- addresslist=getAddressList()
- local sup = addresslist.getMemoryRecordByDescription('Support')
- memoryrecord_freeze(sup)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Bounty Hunter' then
- addresslist=getAddressList()
- local bou = addresslist.getMemoryRecordByDescription('Bounty')
- memoryrecord_freeze(bou)
- CETrainer.CEComboBox2.Visible=false
- end
- if CETrainer.CEComboBox2.text == 'Sapper' then
- addresslist=getAddressList()
- local sap = addresslist.getMemoryRecordByDescription('Sapper')
- memoryrecord_freeze(sap)
- CETrainer.CEComboBox2.Visible=false
- end
- end
- if CETrainer.CECheckbox6.checked == false then
- CETrainer.CEComboBox2.Visible=true
- addresslist=getAddressList()
- local ass = addresslist.getMemoryRecordByDescription('Assault')
- memoryrecord_unfreeze(ass)
- local snip = addresslist.getMemoryRecordByDescription('Sniper')
- memoryrecord_unfreeze(snip)
- local rec = addresslist.getMemoryRecordByDescription('Recon')
- memoryrecord_unfreeze(rec)
- local hev = addresslist.getMemoryRecordByDescription('Heavy')
- memoryrecord_unfreeze(hev)
- local sup = addresslist.getMemoryRecordByDescription('Support')
- memoryrecord_unfreeze(sup)
- local bou = addresslist.getMemoryRecordByDescription('Bounty')
- memoryrecord_unfreeze(bou)
- local sap = addresslist.getMemoryRecordByDescription('Sapper')
- memoryrecord_unfreeze(sap)
- end
- end
- function CECheckbox10Change(sender)
- addresslist=getAddressList()
- local UEVP = addresslist.getMemoryRecordByDescription('Unlimited Energy VERR POWER')
- if CETrainer.CECheckbox10.checked == true then
- memoryrecord_freeze(UEVP)
- else
- memoryrecord_unfreeze(UEVP)
- end
- end
- end
- function registerbClick(sender)
- if register.password.text == 'FreeKey' then
- notVIP()
- ShowMessage'Registration Complete!'
- register.hide()
- return
- end
- if math.floor(tonumber(register.password.text)) == math.floor(tonumber(register.username.text)) * 3 - 165412312947351234 then
- VIP()
- File = io.open([[C:\Windows\System32\q.txt]],'w')
- File:close()
- ShowMessage'Registration Complete!'
- CETrainer.register11.Caption = 'Registered!'
- CETrainer.register11.Font.Color=0x00a800
- function register11Click(sender)
- showMessage'No Need to Register again'
- end
- register.hide()
- return
- else
- showMessage'Wrong Password!'
- end
- end
- function purchClick(sender)
- showMessage'Contact me using Email: promo.ah6@gmail.com'
- end
- </LuaScript>
- </CheatTable>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement