Advertisement
Guest User

Untitled

a guest
Aug 4th, 2017
510
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 109.88 KB | None | 0 0
  1. <?xml version="1.0" encoding="utf-8"?>
  2. <CheatTable CheatEngineTableVersion="26">
  3. <Forms>
  4. <register Class="TCEForm" Encoding="Ascii85">b(@3)!Y},yyH#Kll%phi+x8d^yciRW1EP[HMP}F]SY=Z(BV7p,Fa8nzJsyp{!}/6oyRO_B..HMG@=CZe^d?=3;vWGQuHETIbYf6E4q{GsRu4Zi[?$Mva4[}6^07jCrtlq/=gNkc?ItHDXv%[!l#N==re:o$CM-KqP50S;KH-JYQ;CsX(88;-gWDZMaA=T2DfBu{[NB1vKT[V-imGK%*z%Cb4g1u=R0kkwt;XpEn8lb9G^GqwO18cy)1#Lzrtx-:+C+k@T%i}P91a,w^7xqS;_ruyK8NS?DT=EHM7?plhn$]/wSSpO96dA=afnsMF.}#KfbOSI^Um;hJK18?L6pZ}M]1+b4Zv0kd=@C2C9stP9of_y)B#0(8DkMK*msizBvZ)SKt4.P]+(KhaoEieVxK3ZuZl_386Ekl/XlM)#8AGeq5J?ursgESqZnH@c#*}L1!PSFHw1K=igpSC!A}W6%_)qa#n?6gS+Mnj6u5LPG5}%7</register>
  5. </Forms>
  6. <CheatEntries>
  7. <CheatEntry>
  8. <ID>64</ID>
  9. <Description>"Credits Farming"</Description>
  10. <LastState/>
  11. <VariableType>Auto Assembler Script</VariableType>
  12. <AssemblerScript>[Enable]
  13. alloc(newmem,2048)
  14. label(returnhere)
  15. label(exit)
  16.  
  17. newmem: //this is allocated memory, you have read,write,execute access
  18. mov [eax+14],(float)0
  19.  
  20. exit:
  21. jmp returnhere
  22.  
  23. "WindowsEntryPoint.Windows.exe"+65D6EF:
  24. jmp newmem
  25. returnhere:
  26. [Disable]
  27. dealloc(newmem)
  28. "WindowsEntryPoint.Windows.exe"+65D6EF:
  29. movss [eax+14],xmm0
  30.  
  31. </AssemblerScript>
  32. </CheatEntry>
  33. <CheatEntry>
  34. <ID>35</ID>
  35. <Description>"EXPLOSIVE Kills"</Description>
  36. <LastState/>
  37. <VariableType>Auto Assembler Script</VariableType>
  38. <AssemblerScript>[ENABLE]
  39. alloc(Explosive,1024)
  40. label(orginalcode)
  41. label(exit)
  42. label(returnhere)
  43.  
  44. Explosive:
  45. push ecx
  46. mov ecx,01
  47. cmp ecx,01
  48. pop ecx
  49.  
  50.  
  51. orginalcode:
  52. //Melee
  53. //cmp dword ptr [ebp-000000D0],06
  54. //Explosive
  55. //cmp dword ptr [ebp-000000D0],09
  56.  
  57.  
  58.  
  59. exit:
  60. jmp returnhere
  61.  
  62.  
  63. //Explosive
  64. "WindowsEntryPoint.Windows.exe"+8C621C:
  65. jmp Explosive
  66. nop
  67. nop
  68. // MELEE
  69.  
  70.  
  71. returnhere:
  72.  
  73.  
  74.  
  75. [DISABLE]
  76. dealloc(Explosive)
  77. //Explosive
  78. "WindowsEntryPoint.Windows.exe"+8C621C:
  79. db 83 BD 30 FF FF FF 09
  80. </AssemblerScript>
  81. </CheatEntry>
  82. <CheatEntry>
  83. <ID>21</ID>
  84. <Description>"Grenades"</Description>
  85. <Options moHideChildren="1" moActivateChildrenAsWell="1" moDeactivateChildrenAsWell="1"/>
  86. <LastState Value="" RealAddress="00000000"/>
  87. <GroupHeader>1</GroupHeader>
  88. <CheatEntries>
  89. <CheatEntry>
  90. <ID>122</ID>
  91. <Description>"pointerscan result"</Description>
  92. <VariableType>4 Bytes</VariableType>
  93. <Address>"WindowsEntryPoint.Windows.exe"+0166180C</Address>
  94. <Offsets>
  95. <Offset>0</Offset>
  96. <Offset>8</Offset>
  97. <Offset>154</Offset>
  98. </Offsets>
  99. </CheatEntry>
  100. <CheatEntry>
  101. <ID>129</ID>
  102. <Description>"pointerscan result"</Description>
  103. <VariableType>4 Bytes</VariableType>
  104. <Address>"WindowsEntryPoint.Windows.exe"+0166137C</Address>
  105. <Offsets>
  106. <Offset>0</Offset>
  107. <Offset>154</Offset>
  108. <Offset>1D0</Offset>
  109. </Offsets>
  110. </CheatEntry>
  111. </CheatEntries>
  112. </CheatEntry>
  113. <CheatEntry>
  114. <ID>36</ID>
  115. <Description>"HeadShot Kills"</Description>
  116. <LastState/>
  117. <VariableType>Auto Assembler Script</VariableType>
  118. <AssemblerScript>[ENABLE]
  119. alloc(HeadShots,1024)
  120. label(orginalcode)
  121. label(exit)
  122. label(returnhere)
  123.  
  124. HeadShots:
  125. push ecx
  126. mov ecx,01
  127. cmp ecx,01
  128. pop ecx
  129.  
  130. orginalcode:
  131.  
  132.  
  133.  
  134. exit:
  135. jmp returnhere
  136.  
  137. //HeadShots:
  138. "WindowsEntryPoint.Windows.exe"+8C6242:
  139. jmp HeadShots
  140. nop
  141. nop
  142.  
  143. returnhere:
  144.  
  145.  
  146.  
  147. [DISABLE]
  148. dealloc(HeadShots)
  149. //HeadShots
  150. "WindowsEntryPoint.Windows.exe"+8C6242:
  151. db 83 BA 80 00 00 00 03
  152. </AssemblerScript>
  153. </CheatEntry>
  154. <CheatEntry>
  155. <ID>34</ID>
  156. <Description>"MELEE Kills"</Description>
  157. <LastState/>
  158. <VariableType>Auto Assembler Script</VariableType>
  159. <AssemblerScript>[ENABLE]
  160. alloc(MELEE,1024)
  161. label(orginalcode)
  162. label(exit)
  163. label(returnhere)
  164.  
  165.  
  166. MELEE:
  167. push ecx
  168. mov ecx,04
  169. cmp ecx,04
  170. pop ecx
  171.  
  172. orginalcode:
  173. //cmp dword ptr [ebp-000000D0],06
  174.  
  175. exit:
  176. jmp returnhere
  177.  
  178.  
  179. "WindowsEntryPoint.Windows.exe"+8C6213:
  180. jmp MELEE
  181. nop
  182. nop
  183. returnhere:
  184. [DISABLE]
  185. dealloc(MELEE)
  186. "WindowsEntryPoint.Windows.exe"+8C6213:
  187. db 83 BD 30 FF FF FF 06
  188.  
  189. </AssemblerScript>
  190. </CheatEntry>
  191. <CheatEntry>
  192. <ID>15</ID>
  193. <Description>"Morph T9 Glitch"</Description>
  194. <Options moHideChildren="1" moActivateChildrenAsWell="1" moDeactivateChildrenAsWell="1"/>
  195. <LastState Value="" RealAddress="00000000"/>
  196. <GroupHeader>1</GroupHeader>
  197. <CheatEntries>
  198. <CheatEntry>
  199. <ID>113</ID>
  200. <Description>"pointerscan result"</Description>
  201. <VariableType>4 Bytes</VariableType>
  202. <Address>"WindowsEntryPoint.Windows.exe"+0166180C</Address>
  203. <Offsets>
  204. <Offset>64</Offset>
  205. <Offset>4</Offset>
  206. <Offset>124</Offset>
  207. </Offsets>
  208. </CheatEntry>
  209. <CheatEntry>
  210. <ID>119</ID>
  211. <Description>"pointerscan result"</Description>
  212. <VariableType>4 Bytes</VariableType>
  213. <Address>"WindowsEntryPoint.Windows.exe"+0166137C</Address>
  214. <Offsets>
  215. <Offset>0</Offset>
  216. <Offset>6C</Offset>
  217. <Offset>4</Offset>
  218. <Offset>124</Offset>
  219. <Offset>1D0</Offset>
  220. </Offsets>
  221. </CheatEntry>
  222. </CheatEntries>
  223. </CheatEntry>
  224. <CheatEntry>
  225. <ID>1</ID>
  226. <Description>"Ultimate Mode"</Description>
  227. <LastState/>
  228. <VariableType>Auto Assembler Script</VariableType>
  229. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  230. Version:
  231. Date : 2017-06-12
  232. Author : Abo 3Amer
  233.  
  234. This script does blah blah blah
  235. }
  236.  
  237. [ENABLE]
  238.  
  239. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,8B 85 14 FF FF FF F3 0F 11 40 14) // should be unique
  240. alloc(newmem,$1000)
  241. label(cheat)
  242. label(ohk)
  243. label(code)
  244. label(return)
  245.  
  246. newmem:
  247.  
  248. cheat:
  249. cmp [eax+18],(float)150
  250. jne ohk
  251. mov [eax+14],(float)150
  252. jmp return
  253.  
  254. ohk:
  255. mov [eax+14],(float)0
  256. jmp return
  257.  
  258. code:
  259. movss [eax+14],xmm0
  260. jmp return
  261.  
  262. INJECT+06:
  263. jmp cheat
  264.  
  265.  
  266. return:
  267. registersymbol(INJECT)
  268.  
  269. [DISABLE]
  270.  
  271. INJECT+06:
  272. db F3 0F 11 40 14
  273.  
  274. unregistersymbol(INJECT)
  275. dealloc(newmem)
  276.  
  277. {
  278. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+640622
  279.  
  280. "WindowsEntryPoint.Windows.exe"+6405F5: 85 C0 - test eax,eax
  281. "WindowsEntryPoint.Windows.exe"+6405F7: 74 10 - je WindowsEntryPoint.Windows.exe+640609
  282. "WindowsEntryPoint.Windows.exe"+6405F9: E8 32 67 A3 FF - call WindowsEntryPoint.Windows.exe+76D30
  283. "WindowsEntryPoint.Windows.exe"+6405FE: 0F B6 88 C0 00 00 00 - movzx ecx,byte ptr [eax+000000C0]
  284. "WindowsEntryPoint.Windows.exe"+640605: 85 C9 - test ecx,ecx
  285. "WindowsEntryPoint.Windows.exe"+640607: 75 62 - jne WindowsEntryPoint.Windows.exe+64066B
  286. "WindowsEntryPoint.Windows.exe"+640609: 8B 95 14 FF FF FF - mov edx,[ebp-000000EC]
  287. "WindowsEntryPoint.Windows.exe"+64060F: F3 0F 10 42 14 - movss xmm0,[edx+14]
  288. "WindowsEntryPoint.Windows.exe"+640614: F3 0F 5C 85 18 FF FF FF - subss xmm0,[ebp-000000E8]
  289. "WindowsEntryPoint.Windows.exe"+64061C: 8B 85 14 FF FF FF - mov eax,[ebp-000000EC]
  290. "WindowsEntryPoint.Windows.exe"+640622: F3 0F 11 40 14 - movss [eax+14],xmm0
  291. "WindowsEntryPoint.Windows.exe"+640627: 8B 8D 14 FF FF FF - mov ecx,[ebp-000000EC]
  292. "WindowsEntryPoint.Windows.exe"+64062D: E8 AE 1D 00 00 - call WindowsEntryPoint.Windows.exe+6423E0
  293. "WindowsEntryPoint.Windows.exe"+640632: 0F B6 C8 - movzx ecx,al
  294. "WindowsEntryPoint.Windows.exe"+640635: 85 C9 - test ecx,ecx
  295. "WindowsEntryPoint.Windows.exe"+640637: 74 27 - je WindowsEntryPoint.Windows.exe+640660
  296. "WindowsEntryPoint.Windows.exe"+640639: 8B 95 14 FF FF FF - mov edx,[ebp-000000EC]
  297. "WindowsEntryPoint.Windows.exe"+64063F: F3 0F 10 05 B0 1C 50 02 - movss xmm0,[WindowsEntryPoint.Windows.exe+1411CB0]
  298. "WindowsEntryPoint.Windows.exe"+640647: 0F 2F 42 14 - comiss xmm0,[edx+14]
  299. "WindowsEntryPoint.Windows.exe"+64064B: 72 13 - jb WindowsEntryPoint.Windows.exe+640660
  300. "WindowsEntryPoint.Windows.exe"+64064D: 8B 85 14 FF FF FF - mov eax,[ebp-000000EC]
  301. }
  302. </AssemblerScript>
  303. </CheatEntry>
  304. <CheatEntry>
  305. <ID>8</ID>
  306. <Description>"Unlimited AMMO"</Description>
  307. <LastState/>
  308. <VariableType>Auto Assembler Script</VariableType>
  309. <AssemblerScript>[ENABLE]
  310.  
  311. aobscanmodule(aobBullets,WindowsEntryPoint.Windows.exe,89 08 8B E5 5D C2 04 00 CC CC CC CC CC CC 55 8B EC 51) // should be unique
  312. alloc(newmem,$1000)
  313.  
  314. label(code)
  315. label(return)
  316.  
  317. newmem:
  318.  
  319. code:
  320. mov ecx,[eax]
  321. mov [eax],ecx
  322. mov esp,ebp
  323. pop ebp
  324. jmp return
  325.  
  326. aobBullets:
  327. jmp newmem
  328. return:
  329. registersymbol(aobBullets)
  330. aobscanmodule(aobAMMO,WindowsEntryPoint.Windows.exe,89 08 8B E5 5D C2 04 00 CC CC CC CC CC CC 55 8B EC 83 EC 2C) // should be unique
  331. alloc(newmem2,$1000)
  332.  
  333. label(code2)
  334. label(return2)
  335.  
  336. newmem2:
  337.  
  338. code2:
  339. mov ecx,[eax]
  340. mov [eax],ecx
  341. mov esp,ebp
  342. pop ebp
  343. jmp return2
  344.  
  345. aobAMMO:
  346. jmp newmem2
  347. return2:
  348. registersymbol(aobAMMO)
  349. [DISABLE]
  350.  
  351. aobBullets:
  352. db 89 08 8B E5 5D
  353.  
  354. unregistersymbol(aobBullets)
  355. dealloc(newmem)
  356. aobAMMO:
  357. db 89 08 8B E5 5D
  358.  
  359. unregistersymbol(aobAMMO)
  360. dealloc(newmem2)
  361. {
  362. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+127932
  363.  
  364. "WindowsEntryPoint.Windows.exe"+127914: 89 4D FC - mov [ebp-04],ecx
  365. "WindowsEntryPoint.Windows.exe"+127917: 8B 45 FC - mov eax,[ebp-04]
  366. "WindowsEntryPoint.Windows.exe"+12791A: 8B 4D 08 - mov ecx,[ebp+08]
  367. "WindowsEntryPoint.Windows.exe"+12791D: 89 48 04 - mov [eax+04],ecx
  368. "WindowsEntryPoint.Windows.exe"+127920: 8D 55 08 - lea edx,[ebp+08]
  369. "WindowsEntryPoint.Windows.exe"+127923: 52 - push edx
  370. "WindowsEntryPoint.Windows.exe"+127924: E8 37 00 00 00 - call WindowsEntryPoint.Windows.exe+127960
  371. "WindowsEntryPoint.Windows.exe"+127929: 83 C4 04 - add esp,04
  372. "WindowsEntryPoint.Windows.exe"+12792C: 8B 45 FC - mov eax,[ebp-04]
  373. "WindowsEntryPoint.Windows.exe"+12792F: 8B 4D 08 - mov ecx,[ebp+08]
  374. "WindowsEntryPoint.Windows.exe"+127932: 89 08 - mov [eax],ecx
  375. "WindowsEntryPoint.Windows.exe"+127934: 8B E5 - mov esp,ebp
  376. "WindowsEntryPoint.Windows.exe"+127936: 5D - pop ebp
  377. "WindowsEntryPoint.Windows.exe"+127937: C2 04 00 - ret 0004
  378. "WindowsEntryPoint.Windows.exe"+12793A: CC - int 3
  379. "WindowsEntryPoint.Windows.exe"+12793B: CC - int 3
  380. "WindowsEntryPoint.Windows.exe"+12793C: CC - int 3
  381. "WindowsEntryPoint.Windows.exe"+12793D: CC - int 3
  382. "WindowsEntryPoint.Windows.exe"+12793E: CC - int 3
  383. "WindowsEntryPoint.Windows.exe"+12793F: CC - int 3
  384. "WindowsEntryPoint.Windows.exe"+127940: 55 - push ebp
  385. "WindowsEntryPoint.Windows.exe"+127941: 8B EC - mov ebp,esp
  386. "WindowsEntryPoint.Windows.exe"+127943: 51 - push ecx
  387. }
  388. </AssemblerScript>
  389. </CheatEntry>
  390. <CheatEntry>
  391. <ID>41</ID>
  392. <Description>"Unlimited Grenades BH"</Description>
  393. <LastState/>
  394. <VariableType>Auto Assembler Script</VariableType>
  395. <AssemblerScript>[ENABLE]
  396. alloc(Bounty,1024)
  397. label(exit)
  398. label(returnhere)
  399.  
  400. Bounty:
  401. push edx
  402. mov edx,64
  403. mov [ecx+000009C0],edx
  404. pop edx
  405.  
  406. exit:
  407. jmp returnhere
  408.  
  409. "WindowsEntryPoint.Windows.exe"+666863:
  410. jmp Bounty
  411. nop
  412. returnhere:
  413.  
  414.  
  415. [DISABLE]
  416. dealloc(Bounty)
  417. "WindowsEntryPoint.Windows.exe"+666863:
  418. db 89 81 C0 09 00 00
  419. </AssemblerScript>
  420. </CheatEntry>
  421. <CheatEntry>
  422. <ID>53</ID>
  423. <Description>"Judgement"</Description>
  424. <Options moHideChildren="1" moActivateChildrenAsWell="1" moDeactivateChildrenAsWell="1"/>
  425. <LastState Value="" RealAddress="00000000"/>
  426. <GroupHeader>1</GroupHeader>
  427. <CheatEntries>
  428. <CheatEntry>
  429. <ID>52</ID>
  430. <Description>"pointerscan result"</Description>
  431. <VariableType>4 Bytes</VariableType>
  432. <Address>"WindowsEntryPoint.Windows.exe"+016080BC</Address>
  433. <Offsets>
  434. <Offset>0</Offset>
  435. <Offset>4C</Offset>
  436. <Offset>14</Offset>
  437. <Offset>124</Offset>
  438. <Offset>1C0</Offset>
  439. </Offsets>
  440. </CheatEntry>
  441. <CheatEntry>
  442. <ID>49</ID>
  443. <Description>"pointerscan result"</Description>
  444. <VariableType>4 Bytes</VariableType>
  445. <Address>"WindowsEntryPoint.Windows.exe"+01608548</Address>
  446. <Offsets>
  447. <Offset>44</Offset>
  448. <Offset>14</Offset>
  449. <Offset>124</Offset>
  450. </Offsets>
  451. </CheatEntry>
  452. </CheatEntries>
  453. </CheatEntry>
  454. <CheatEntry>
  455. <ID>63</ID>
  456. <Description>"Unlimited Energy VERR POWER"</Description>
  457. <LastState/>
  458. <VariableType>Auto Assembler Script</VariableType>
  459. <AssemblerScript>[Enable]
  460. alloc(newmem,2048)
  461. label(returnhere)
  462. label(originalcode)
  463. label(exit)
  464.  
  465. newmem: //this is allocated memory, you have read,write,execute access
  466. movss xmm0,[ecx+1C]
  467. movss [ecx+1C],xmm0
  468.  
  469. originalcode:
  470. movss [ecx+1C],xmm0
  471.  
  472. exit:
  473. jmp returnhere
  474.  
  475. "WindowsEntryPoint.Windows.exe"+86B76E:
  476. jmp newmem
  477. returnhere:
  478. [Disable]
  479. dealloc(newmem)
  480. "WindowsEntryPoint.Windows.exe"+86B76E:
  481. movss [ecx+1C],xmm0
  482. </AssemblerScript>
  483. </CheatEntry>
  484. <CheatEntry>
  485. <ID>73</ID>
  486. <Description>"aimbot"</Description>
  487. <LastState/>
  488. <VariableType>Auto Assembler Script</VariableType>
  489. <AssemblerScript>[Enable]
  490. alloc(newmem,2048)
  491. label(returnhere)
  492. label(originalcode)
  493. label(exit)
  494.  
  495. newmem: //this is allocated memory, you have read,write,execute access
  496. jmp WindowsEntryPoint.Windows.VSDesignerDllMain+BD955
  497. mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
  498.  
  499. originalcode:
  500. //je WindowsEntryPoint.Windows.VSDesignerDllMain+B8495
  501. //mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
  502.  
  503. exit:
  504. jmp returnhere
  505.  
  506. "WindowsEntryPoint.Windows.exe"+12040C:
  507. jmp newmem
  508. nop
  509. nop
  510. returnhere:
  511. [Disable]
  512. dealloc(newmem)
  513. "WindowsEntryPoint.Windows.exe"+12040C:
  514. je WindowsEntryPoint.Windows.VSDesignerDllMain+BD955
  515. mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
  516. </AssemblerScript>
  517. </CheatEntry>
  518. <CheatEntry>
  519. <ID>75</ID>
  520. <Description>"Auto Shoot"</Description>
  521. <LastState/>
  522. <VariableType>Auto Assembler Script</VariableType>
  523. <AssemblerScript>[ENABLE]
  524. //code from here to '[DISABLE]' will be used to enable the cheat
  525. alloc(newmem,2048)
  526. label(returnhere)
  527. label(originalcode)
  528. label(exit)
  529.  
  530. newmem: //this is allocated memory, you have read,write,execute access
  531. jmp WindowsEntryPoint.Windows.VSDesignerDllMain+B84C5
  532. mov al,[WindowsEntryPoint.Windows.exe+16080BA]
  533.  
  534. originalcode:
  535. //je WindowsEntryPoint.Windows.VSDesignerDllMain+B84C5
  536. //mov al,[WindowsEntryPoint.Windows.exe+16080BA]
  537.  
  538. exit:
  539. jmp returnhere
  540.  
  541. "WindowsEntryPoint.Windows.exe"+11A64C:
  542. jmp newmem
  543. nop
  544. nop
  545. returnhere:
  546.  
  547.  
  548.  
  549.  
  550. [DISABLE]
  551. //code from here till the end of the code will be used to disable the cheat
  552. dealloc(newmem)
  553. "WindowsEntryPoint.Windows.exe"+11A64C:
  554. je WindowsEntryPoint.Windows.VSDesignerDllMain+B84C5
  555. mov al,[WindowsEntryPoint.Windows.exe+16080BA]
  556.  
  557. </AssemblerScript>
  558. </CheatEntry>
  559. <CheatEntry>
  560. <ID>77</ID>
  561. <Description>"Assault"</Description>
  562. <LastState/>
  563. <VariableType>Auto Assembler Script</VariableType>
  564. <AssemblerScript>[ENABLE]
  565. //code from here to '[DISABLE]' will be used to enable the cheat
  566. alloc(newmem,2048)
  567. label(returnhere)
  568. label(originalcode)
  569. label(exit)
  570.  
  571. newmem: //this is allocated memory, you have read,write,execute access
  572. //place your code here
  573. mov eax,00
  574. originalcode:
  575.  
  576.  
  577. exit:
  578. jmp returnhere
  579.  
  580. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  581. jmp newmem
  582. nop
  583. returnhere:
  584.  
  585.  
  586.  
  587.  
  588. [DISABLE]
  589. //code from here till the end of the code will be used to disable the cheat
  590. dealloc(newmem)
  591. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  592. mov eax,[ebp-000000B0]
  593. //Alt: db 8B 85 50 FF FF FF
  594. </AssemblerScript>
  595. </CheatEntry>
  596. <CheatEntry>
  597. <ID>78</ID>
  598. <Description>"Heavy"</Description>
  599. <LastState/>
  600. <VariableType>Auto Assembler Script</VariableType>
  601. <AssemblerScript>[ENABLE]
  602. //code from here to '[DISABLE]' will be used to enable the cheat
  603. alloc(newmem,2048)
  604. label(returnhere)
  605. label(originalcode)
  606. label(exit)
  607.  
  608. newmem: //this is allocated memory, you have read,write,execute access
  609. //place your code here
  610. mov eax,01
  611. originalcode:
  612.  
  613.  
  614. exit:
  615. jmp returnhere
  616.  
  617. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  618. jmp newmem
  619. nop
  620. returnhere:
  621.  
  622.  
  623.  
  624.  
  625. [DISABLE]
  626. //code from here till the end of the code will be used to disable the cheat
  627. dealloc(newmem)
  628. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  629. mov eax,[ebp-000000B0]
  630. //Alt: db 8B 85 50 FF FF FF
  631. </AssemblerScript>
  632. </CheatEntry>
  633. <CheatEntry>
  634. <ID>79</ID>
  635. <Description>"Recon"</Description>
  636. <LastState/>
  637. <VariableType>Auto Assembler Script</VariableType>
  638. <AssemblerScript>[ENABLE]
  639. //code from here to '[DISABLE]' will be used to enable the cheat
  640. alloc(newmem,2048)
  641. label(returnhere)
  642. label(originalcode)
  643. label(exit)
  644.  
  645. newmem: //this is allocated memory, you have read,write,execute access
  646. //place your code here
  647. mov eax,02
  648. originalcode:
  649.  
  650.  
  651. exit:
  652. jmp returnhere
  653.  
  654. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  655. jmp newmem
  656. nop
  657. returnhere:
  658.  
  659.  
  660.  
  661.  
  662. [DISABLE]
  663. //code from here till the end of the code will be used to disable the cheat
  664. dealloc(newmem)
  665. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  666. mov eax,[ebp-000000B0]
  667. //Alt: db 8B 85 50 FF FF FF
  668. </AssemblerScript>
  669. </CheatEntry>
  670. <CheatEntry>
  671. <ID>80</ID>
  672. <Description>"Sniper"</Description>
  673. <LastState/>
  674. <VariableType>Auto Assembler Script</VariableType>
  675. <AssemblerScript>[ENABLE]
  676. //code from here to '[DISABLE]' will be used to enable the cheat
  677. alloc(newmem,2048)
  678. label(returnhere)
  679. label(originalcode)
  680. label(exit)
  681.  
  682. newmem: //this is allocated memory, you have read,write,execute access
  683. //place your code here
  684. mov eax,03
  685. originalcode:
  686.  
  687.  
  688. exit:
  689. jmp returnhere
  690.  
  691. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  692. jmp newmem
  693. nop
  694. returnhere:
  695.  
  696.  
  697.  
  698.  
  699. [DISABLE]
  700. //code from here till the end of the code will be used to disable the cheat
  701. dealloc(newmem)
  702. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  703. mov eax,[ebp-000000B0]
  704. //Alt: db 8B 85 50 FF FF FF
  705. </AssemblerScript>
  706. </CheatEntry>
  707. <CheatEntry>
  708. <ID>81</ID>
  709. <Description>"Support"</Description>
  710. <LastState/>
  711. <VariableType>Auto Assembler Script</VariableType>
  712. <AssemblerScript>[ENABLE]
  713. //code from here to '[DISABLE]' will be used to enable the cheat
  714. alloc(newmem,2048)
  715. label(returnhere)
  716. label(originalcode)
  717. label(exit)
  718.  
  719. newmem: //this is allocated memory, you have read,write,execute access
  720. //place your code here
  721. mov eax,04
  722. originalcode:
  723.  
  724.  
  725. exit:
  726. jmp returnhere
  727.  
  728. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  729. jmp newmem
  730. nop
  731. returnhere:
  732.  
  733.  
  734.  
  735.  
  736. [DISABLE]
  737. //code from here till the end of the code will be used to disable the cheat
  738. dealloc(newmem)
  739. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  740. mov eax,[ebp-000000B0]
  741. //Alt: db 8B 85 50 FF FF FF
  742. </AssemblerScript>
  743. </CheatEntry>
  744. <CheatEntry>
  745. <ID>82</ID>
  746. <Description>"Bounty"</Description>
  747. <LastState/>
  748. <VariableType>Auto Assembler Script</VariableType>
  749. <AssemblerScript>[ENABLE]
  750. //code from here to '[DISABLE]' will be used to enable the cheat
  751. alloc(newmem,2048)
  752. label(returnhere)
  753. label(originalcode)
  754. label(exit)
  755.  
  756. newmem: //this is allocated memory, you have read,write,execute access
  757. //place your code here
  758. mov eax,05
  759. originalcode:
  760.  
  761.  
  762. exit:
  763. jmp returnhere
  764.  
  765. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  766. jmp newmem
  767. nop
  768. returnhere:
  769.  
  770.  
  771.  
  772.  
  773. [DISABLE]
  774. //code from here till the end of the code will be used to disable the cheat
  775. dealloc(newmem)
  776. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  777. mov eax,[ebp-000000B0]
  778. //Alt: db 8B 85 50 FF FF FF
  779. </AssemblerScript>
  780. </CheatEntry>
  781. <CheatEntry>
  782. <ID>83</ID>
  783. <Description>"Sapper"</Description>
  784. <LastState/>
  785. <VariableType>Auto Assembler Script</VariableType>
  786. <AssemblerScript>[ENABLE]
  787. //code from here to '[DISABLE]' will be used to enable the cheat
  788. alloc(newmem,2048)
  789. label(returnhere)
  790. label(originalcode)
  791. label(exit)
  792.  
  793. newmem: //this is allocated memory, you have read,write,execute access
  794. //place your code here
  795. mov eax,06
  796. originalcode:
  797.  
  798.  
  799. exit:
  800. jmp returnhere
  801.  
  802. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  803. jmp newmem
  804. nop
  805. returnhere:
  806.  
  807.  
  808.  
  809.  
  810. [DISABLE]
  811. //code from here till the end of the code will be used to disable the cheat
  812. dealloc(newmem)
  813. "WindowsEntryPoint.Windows.exe"+8C5F9C:
  814. mov eax,[ebp-000000B0]
  815. //Alt: db 8B 85 50 FF FF FF
  816. </AssemblerScript>
  817. </CheatEntry>
  818. <CheatEntry>
  819. <ID>84</ID>
  820. <Description>"none"</Description>
  821. <LastState/>
  822. <VariableType>Auto Assembler Script</VariableType>
  823. <AssemblerScript>[ENABLE]
  824. //code from here to '[DISABLE]' will be used to enable the cheat
  825. alloc(newmem,2048)
  826. label(returnhere)
  827. label(originalcode)
  828. label(exit)
  829.  
  830. newmem: //this is allocated memory, you have read,write,execute access
  831. //place your code here
  832. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  833. originalcode:
  834.  
  835.  
  836. exit:
  837. jmp returnhere
  838.  
  839. "WindowsEntryPoint.Windows.exe"+26ABD8:
  840. jmp newmem
  841. nop
  842. nop
  843. returnhere:
  844.  
  845.  
  846.  
  847.  
  848.  
  849. [DISABLE]
  850. //code from here till the end of the code will be used to disable the cheat
  851. dealloc(newmem)
  852. "WindowsEntryPoint.Windows.exe"+26ABD8:
  853. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  854. //Alt: db FF 24 8D DC 3C 0F 01
  855. </AssemblerScript>
  856. </CheatEntry>
  857. <CheatEntry>
  858. <ID>85</ID>
  859. <Description>"crosshair"</Description>
  860. <LastState/>
  861. <VariableType>Auto Assembler Script</VariableType>
  862. <AssemblerScript>[ENABLE]
  863. //code from here to '[DISABLE]' will be used to enable the cheat
  864. alloc(newmem,2048)
  865. label(returnhere)
  866. label(originalcode)
  867. label(exit)
  868.  
  869. newmem: //this is allocated memory, you have read,write,execute access
  870. //place your code here
  871. jmp dword ptr [04+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  872. originalcode:
  873.  
  874.  
  875. exit:
  876. jmp returnhere
  877.  
  878. "WindowsEntryPoint.Windows.exe"+26ABD8:
  879. jmp newmem
  880. nop
  881. nop
  882. returnhere:
  883.  
  884.  
  885.  
  886.  
  887.  
  888. [DISABLE]
  889. //code from here till the end of the code will be used to disable the cheat
  890. dealloc(newmem)
  891. "WindowsEntryPoint.Windows.exe"+26ABD8:
  892. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  893. //Alt: db FF 24 8D DC 3C 0F 01
  894. </AssemblerScript>
  895. </CheatEntry>
  896. <CheatEntry>
  897. <ID>86</ID>
  898. <Description>"Drone"</Description>
  899. <LastState/>
  900. <VariableType>Auto Assembler Script</VariableType>
  901. <AssemblerScript>[ENABLE]
  902. //code from here to '[DISABLE]' will be used to enable the cheat
  903. alloc(newmem,2048)
  904. label(returnhere)
  905. label(originalcode)
  906. label(exit)
  907.  
  908. newmem: //this is allocated memory, you have read,write,execute access
  909. //place your code here
  910. jmp dword ptr [8+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  911. originalcode:
  912.  
  913.  
  914. exit:
  915. jmp returnhere
  916.  
  917. "WindowsEntryPoint.Windows.exe"+26ABD8:
  918. jmp newmem
  919. nop
  920. nop
  921. returnhere:
  922.  
  923.  
  924.  
  925.  
  926.  
  927. [DISABLE]
  928. //code from here till the end of the code will be used to disable the cheat
  929. dealloc(newmem)
  930. "WindowsEntryPoint.Windows.exe"+26ABD8:
  931. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  932. //Alt: db FF 24 8D DC 3C 0F 01
  933. </AssemblerScript>
  934. </CheatEntry>
  935. <CheatEntry>
  936. <ID>87</ID>
  937. <Description>"railgun"</Description>
  938. <LastState/>
  939. <VariableType>Auto Assembler Script</VariableType>
  940. <AssemblerScript>[ENABLE]
  941. //code from here to '[DISABLE]' will be used to enable the cheat
  942. alloc(newmem,2048)
  943. label(returnhere)
  944. label(originalcode)
  945. label(exit)
  946.  
  947. newmem: //this is allocated memory, you have read,write,execute access
  948. //place your code here
  949. jmp dword ptr [C+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  950. originalcode:
  951.  
  952.  
  953. exit:
  954. jmp returnhere
  955.  
  956. "WindowsEntryPoint.Windows.exe"+26ABD8:
  957. jmp newmem
  958. nop
  959. nop
  960. returnhere:
  961.  
  962.  
  963.  
  964.  
  965.  
  966. [DISABLE]
  967. //code from here till the end of the code will be used to disable the cheat
  968. dealloc(newmem)
  969. "WindowsEntryPoint.Windows.exe"+26ABD8:
  970. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  971. //Alt: db FF 24 8D DC 3C 0F 01
  972. </AssemblerScript>
  973. </CheatEntry>
  974. <CheatEntry>
  975. <ID>88</ID>
  976. <Description>"rectangular"</Description>
  977. <LastState/>
  978. <VariableType>Auto Assembler Script</VariableType>
  979. <AssemblerScript>[ENABLE]
  980. //code from here to '[DISABLE]' will be used to enable the cheat
  981. alloc(newmem,2048)
  982. label(returnhere)
  983. label(originalcode)
  984. label(exit)
  985.  
  986. newmem: //this is allocated memory, you have read,write,execute access
  987. //place your code here
  988. jmp dword ptr [10+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  989. originalcode:
  990.  
  991.  
  992. exit:
  993. jmp returnhere
  994.  
  995. "WindowsEntryPoint.Windows.exe"+26ABD8:
  996. jmp newmem
  997. nop
  998. nop
  999. returnhere:
  1000.  
  1001.  
  1002.  
  1003.  
  1004.  
  1005. [DISABLE]
  1006. //code from here till the end of the code will be used to disable the cheat
  1007. dealloc(newmem)
  1008. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1009. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1010. //Alt: db FF 24 8D DC 3C 0F 01
  1011. </AssemblerScript>
  1012. </CheatEntry>
  1013. <CheatEntry>
  1014. <ID>89</ID>
  1015. <Description>"launcher"</Description>
  1016. <LastState/>
  1017. <VariableType>Auto Assembler Script</VariableType>
  1018. <AssemblerScript>[ENABLE]
  1019. //code from here to '[DISABLE]' will be used to enable the cheat
  1020. alloc(newmem,2048)
  1021. label(returnhere)
  1022. label(originalcode)
  1023. label(exit)
  1024.  
  1025. newmem: //this is allocated memory, you have read,write,execute access
  1026. //place your code here
  1027. jmp dword ptr [14+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1028. originalcode:
  1029.  
  1030.  
  1031. exit:
  1032. jmp returnhere
  1033.  
  1034. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1035. jmp newmem
  1036. nop
  1037. nop
  1038. returnhere:
  1039.  
  1040.  
  1041.  
  1042.  
  1043.  
  1044. [DISABLE]
  1045. //code from here till the end of the code will be used to disable the cheat
  1046. dealloc(newmem)
  1047. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1048. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1049. //Alt: db FF 24 8D DC 3C 0F 01
  1050. </AssemblerScript>
  1051. </CheatEntry>
  1052. <CheatEntry>
  1053. <ID>90</ID>
  1054. <Description>"circular"</Description>
  1055. <LastState/>
  1056. <VariableType>Auto Assembler Script</VariableType>
  1057. <AssemblerScript>[ENABLE]
  1058. //code from here to '[DISABLE]' will be used to enable the cheat
  1059. alloc(newmem,2048)
  1060. label(returnhere)
  1061. label(originalcode)
  1062. label(exit)
  1063.  
  1064. newmem: //this is allocated memory, you have read,write,execute access
  1065. //place your code here
  1066. jmp dword ptr [18+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1067. originalcode:
  1068.  
  1069.  
  1070. exit:
  1071. jmp returnhere
  1072.  
  1073. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1074. jmp newmem
  1075. nop
  1076. nop
  1077. returnhere:
  1078.  
  1079.  
  1080.  
  1081.  
  1082.  
  1083. [DISABLE]
  1084. //code from here till the end of the code will be used to disable the cheat
  1085. dealloc(newmem)
  1086. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1087. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1088. //Alt: db FF 24 8D DC 3C 0F 01
  1089. </AssemblerScript>
  1090. </CheatEntry>
  1091. <CheatEntry>
  1092. <ID>91</ID>
  1093. <Description>"classic"</Description>
  1094. <LastState/>
  1095. <VariableType>Auto Assembler Script</VariableType>
  1096. <AssemblerScript>[ENABLE]
  1097. //code from here to '[DISABLE]' will be used to enable the cheat
  1098. alloc(newmem,2048)
  1099. label(returnhere)
  1100. label(originalcode)
  1101. label(exit)
  1102.  
  1103. newmem: //this is allocated memory, you have read,write,execute access
  1104. //place your code here
  1105. jmp dword ptr [1C+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1106. originalcode:
  1107.  
  1108.  
  1109. exit:
  1110. jmp returnhere
  1111.  
  1112. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1113. jmp newmem
  1114. nop
  1115. nop
  1116. returnhere:
  1117.  
  1118.  
  1119.  
  1120.  
  1121.  
  1122. [DISABLE]
  1123. //code from here till the end of the code will be used to disable the cheat
  1124. dealloc(newmem)
  1125. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1126. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1127. //Alt: db FF 24 8D DC 3C 0F 01
  1128. </AssemblerScript>
  1129. </CheatEntry>
  1130. <CheatEntry>
  1131. <ID>92</ID>
  1132. <Description>"charge"</Description>
  1133. <LastState/>
  1134. <VariableType>Auto Assembler Script</VariableType>
  1135. <AssemblerScript>[ENABLE]
  1136. //code from here to '[DISABLE]' will be used to enable the cheat
  1137. alloc(newmem,2048)
  1138. label(returnhere)
  1139. label(originalcode)
  1140. label(exit)
  1141.  
  1142. newmem: //this is allocated memory, you have read,write,execute access
  1143. //place your code here
  1144. jmp dword ptr [20+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1145. originalcode:
  1146.  
  1147.  
  1148. exit:
  1149. jmp returnhere
  1150.  
  1151. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1152. jmp newmem
  1153. nop
  1154. nop
  1155. returnhere:
  1156.  
  1157.  
  1158.  
  1159.  
  1160.  
  1161. [DISABLE]
  1162. //code from here till the end of the code will be used to disable the cheat
  1163. dealloc(newmem)
  1164. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1165. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1166. //Alt: db FF 24 8D DC 3C 0F 01
  1167. </AssemblerScript>
  1168. </CheatEntry>
  1169. <CheatEntry>
  1170. <ID>93</ID>
  1171. <Description>"crossbow"</Description>
  1172. <LastState/>
  1173. <VariableType>Auto Assembler Script</VariableType>
  1174. <AssemblerScript>[ENABLE]
  1175. //code from here to '[DISABLE]' will be used to enable the cheat
  1176. alloc(newmem,2048)
  1177. label(returnhere)
  1178. label(originalcode)
  1179. label(exit)
  1180.  
  1181. newmem: //this is allocated memory, you have read,write,execute access
  1182. //place your code here
  1183. jmp dword ptr [24+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1184. originalcode:
  1185.  
  1186.  
  1187. exit:
  1188. jmp returnhere
  1189.  
  1190. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1191. jmp newmem
  1192. nop
  1193. nop
  1194. returnhere:
  1195.  
  1196.  
  1197.  
  1198.  
  1199.  
  1200. [DISABLE]
  1201. //code from here till the end of the code will be used to disable the cheat
  1202. dealloc(newmem)
  1203. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1204. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1205. //Alt: db FF 24 8D DC 3C 0F 01
  1206. </AssemblerScript>
  1207. </CheatEntry>
  1208. <CheatEntry>
  1209. <ID>94</ID>
  1210. <Description>"sniperlock"</Description>
  1211. <LastState/>
  1212. <VariableType>Auto Assembler Script</VariableType>
  1213. <AssemblerScript>[ENABLE]
  1214. //code from here to '[DISABLE]' will be used to enable the cheat
  1215. alloc(newmem,2048)
  1216. label(returnhere)
  1217. label(originalcode)
  1218. label(exit)
  1219.  
  1220. newmem: //this is allocated memory, you have read,write,execute access
  1221. //place your code here
  1222. jmp dword ptr [28+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1223. originalcode:
  1224.  
  1225.  
  1226. exit:
  1227. jmp returnhere
  1228.  
  1229. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1230. jmp newmem
  1231. nop
  1232. nop
  1233. returnhere:
  1234.  
  1235.  
  1236.  
  1237.  
  1238.  
  1239. [DISABLE]
  1240. //code from here till the end of the code will be used to disable the cheat
  1241. dealloc(newmem)
  1242. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1243. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1244. //Alt: db FF 24 8D DC 3C 0F 01
  1245. </AssemblerScript>
  1246. </CheatEntry>
  1247. <CheatEntry>
  1248. <ID>95</ID>
  1249. <Description>"deadlock"</Description>
  1250. <LastState/>
  1251. <VariableType>Auto Assembler Script</VariableType>
  1252. <AssemblerScript>[ENABLE]
  1253. //code from here to '[DISABLE]' will be used to enable the cheat
  1254. alloc(newmem,2048)
  1255. label(returnhere)
  1256. label(originalcode)
  1257. label(exit)
  1258.  
  1259. newmem: //this is allocated memory, you have read,write,execute access
  1260. //place your code here
  1261. jmp dword ptr [2C+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1262. originalcode:
  1263.  
  1264.  
  1265. exit:
  1266. jmp returnhere
  1267.  
  1268. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1269. jmp newmem
  1270. nop
  1271. nop
  1272. returnhere:
  1273.  
  1274.  
  1275.  
  1276.  
  1277.  
  1278. [DISABLE]
  1279. //code from here till the end of the code will be used to disable the cheat
  1280. dealloc(newmem)
  1281. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1282. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1283. //Alt: db FF 24 8D DC 3C 0F 01
  1284. </AssemblerScript>
  1285. </CheatEntry>
  1286. <CheatEntry>
  1287. <ID>96</ID>
  1288. <Description>"locked"</Description>
  1289. <LastState/>
  1290. <VariableType>Auto Assembler Script</VariableType>
  1291. <AssemblerScript>[ENABLE]
  1292. //code from here to '[DISABLE]' will be used to enable the cheat
  1293. alloc(newmem,2048)
  1294. label(returnhere)
  1295. label(originalcode)
  1296. label(exit)
  1297.  
  1298. newmem: //this is allocated memory, you have read,write,execute access
  1299. //place your code here
  1300. jmp dword ptr [30+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1301. originalcode:
  1302.  
  1303.  
  1304. exit:
  1305. jmp returnhere
  1306.  
  1307. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1308. jmp newmem
  1309. nop
  1310. nop
  1311. returnhere:
  1312.  
  1313.  
  1314.  
  1315.  
  1316.  
  1317. [DISABLE]
  1318. //code from here till the end of the code will be used to disable the cheat
  1319. dealloc(newmem)
  1320. "WindowsEntryPoint.Windows.exe"+26ABD8:
  1321. jmp dword ptr [00+WindowsEntryPoint.Windows.VSDesignerDllMain+2087EC]
  1322. //Alt: db FF 24 8D DC 3C 0F 01
  1323. </AssemblerScript>
  1324. </CheatEntry>
  1325. <CheatEntry>
  1326. <ID>97</ID>
  1327. <Description>"Kill Type AOB"</Description>
  1328. <LastState/>
  1329. <VariableType>Auto Assembler Script</VariableType>
  1330. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1331. Version:
  1332. Date : 2017-07-20
  1333. Author : Abo 3Amer
  1334.  
  1335. This script does blah blah blah
  1336. }
  1337.  
  1338. [ENABLE]
  1339.  
  1340. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,83 BD 30 FF FF FF 09) // should be unique
  1341. alloc(newmem,$1000)
  1342.  
  1343. label(code)
  1344. label(return)
  1345.  
  1346. newmem:
  1347.  
  1348. code:
  1349. cmp dword ptr [ebp-000000D0],09
  1350. jmp return
  1351.  
  1352. INJECT:
  1353. jmp newmem
  1354. nop
  1355. nop
  1356. return:
  1357. registersymbol(INJECT)
  1358.  
  1359. [DISABLE]
  1360.  
  1361. INJECT:
  1362. db 83 BD 30 FF FF FF 09
  1363.  
  1364. unregistersymbol(INJECT)
  1365. dealloc(newmem)
  1366.  
  1367. {
  1368. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+8A027C
  1369.  
  1370. "WindowsEntryPoint.Windows.exe"+8A0245: 8B 55 08 - mov edx,[ebp+08]
  1371. "WindowsEntryPoint.Windows.exe"+8A0248: 0F B6 82 92 00 00 00 - movzx eax,byte ptr [edx+00000092]
  1372. "WindowsEntryPoint.Windows.exe"+8A024F: 85 C0 - test eax,eax
  1373. "WindowsEntryPoint.Windows.exe"+8A0251: 74 0A - je WindowsEntryPoint.Windows.exe+8A025D
  1374. "WindowsEntryPoint.Windows.exe"+8A0253: C7 85 64 FF FF FF 02 00 00 00 - mov [ebp-0000009C],00000002
  1375. "WindowsEntryPoint.Windows.exe"+8A025D: C7 85 68 FF FF FF 00 00 00 00 - mov [ebp-00000098],00000000
  1376. "WindowsEntryPoint.Windows.exe"+8A0267: 8B 8D 64 FF FF FF - mov ecx,[ebp-0000009C]
  1377. "WindowsEntryPoint.Windows.exe"+8A026D: 89 8D 30 FF FF FF - mov [ebp-000000D0],ecx
  1378. "WindowsEntryPoint.Windows.exe"+8A0273: 83 BD 30 FF FF FF 06 - cmp dword ptr [ebp-000000D0],06
  1379. "WindowsEntryPoint.Windows.exe"+8A027A: 74 17 - je WindowsEntryPoint.Windows.exe+8A0293
  1380. "WindowsEntryPoint.Windows.exe"+8A027C: 83 BD 30 FF FF FF 09 - cmp dword ptr [ebp-000000D0],09
  1381. "WindowsEntryPoint.Windows.exe"+8A0283: 74 02 - je WindowsEntryPoint.Windows.exe+8A0287
  1382. "WindowsEntryPoint.Windows.exe"+8A0285: EB 18 - jmp WindowsEntryPoint.Windows.exe+8A029F
  1383. "WindowsEntryPoint.Windows.exe"+8A0287: C7 85 68 FF FF FF A4 2A 24 02 - mov [ebp-00000098],WindowsEntryPoint.Windows.exe+13E2AA4
  1384. "WindowsEntryPoint.Windows.exe"+8A0291: EB 22 - jmp WindowsEntryPoint.Windows.exe+8A02B5
  1385. "WindowsEntryPoint.Windows.exe"+8A0293: C7 85 68 FF FF FF 1C 2B 24 02 - mov [ebp-00000098],WindowsEntryPoint.Windows.exe+13E2B1C
  1386. "WindowsEntryPoint.Windows.exe"+8A029D: EB 16 - jmp WindowsEntryPoint.Windows.exe+8A02B5
  1387. "WindowsEntryPoint.Windows.exe"+8A029F: 8B 55 08 - mov edx,[ebp+08]
  1388. "WindowsEntryPoint.Windows.exe"+8A02A2: E9 59 FD FD 00 - jmp 026E0000
  1389. "WindowsEntryPoint.Windows.exe"+8A02A7: 90 - nop
  1390. "WindowsEntryPoint.Windows.exe"+8A02A8: 90 - nop
  1391. }
  1392. </AssemblerScript>
  1393. </CheatEntry>
  1394. <CheatEntry>
  1395. <ID>98</ID>
  1396. <Description>"Unlimited Grenades BH AOB"</Description>
  1397. <LastState/>
  1398. <VariableType>Auto Assembler Script</VariableType>
  1399. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1400. Version:
  1401. Date : 2017-07-20
  1402. Author : Abo 3Amer
  1403.  
  1404. This script does blah blah blah
  1405. }
  1406.  
  1407. [ENABLE]
  1408.  
  1409. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,89 81 C0 09 00 00) // should be unique
  1410. alloc(newmem,$1000)
  1411.  
  1412. label(code)
  1413. label(return)
  1414.  
  1415. newmem:
  1416.  
  1417. code:
  1418. mov [ecx+000009C0],eax
  1419. jmp return
  1420.  
  1421. INJECT:
  1422. jmp newmem
  1423. nop
  1424. return:
  1425. registersymbol(INJECT)
  1426.  
  1427. [DISABLE]
  1428.  
  1429. INJECT:
  1430. db 89 81 C0 09 00 00
  1431.  
  1432. unregistersymbol(INJECT)
  1433. dealloc(newmem)
  1434.  
  1435. {
  1436. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+64B4A3
  1437.  
  1438. "WindowsEntryPoint.Windows.exe"+64B481: 8B 4D FC - mov ecx,[ebp-04]
  1439. "WindowsEntryPoint.Windows.exe"+64B484: 51 - push ecx
  1440. "WindowsEntryPoint.Windows.exe"+64B485: E8 16 B6 A2 FF - call WindowsEntryPoint.Windows.exe+76AA0
  1441. "WindowsEntryPoint.Windows.exe"+64B48A: 8B C8 - mov ecx,eax
  1442. "WindowsEntryPoint.Windows.exe"+64B48C: E8 5F B3 CA FF - call WindowsEntryPoint.Windows.exe+2F67F0
  1443. "WindowsEntryPoint.Windows.exe"+64B491: 89 45 F8 - mov [ebp-08],eax
  1444. "WindowsEntryPoint.Windows.exe"+64B494: 8B 55 FC - mov edx,[ebp-04]
  1445. "WindowsEntryPoint.Windows.exe"+64B497: 8B 82 C0 09 00 00 - mov eax,[edx+000009C0]
  1446. "WindowsEntryPoint.Windows.exe"+64B49D: 03 45 08 - add eax,[ebp+08]
  1447. "WindowsEntryPoint.Windows.exe"+64B4A0: 8B 4D FC - mov ecx,[ebp-04]
  1448. "WindowsEntryPoint.Windows.exe"+64B4A3: 89 81 C0 09 00 00 - mov [ecx+000009C0],eax
  1449. "WindowsEntryPoint.Windows.exe"+64B4A9: 8B 55 FC - mov edx,[ebp-04]
  1450. "WindowsEntryPoint.Windows.exe"+64B4AC: 8B 82 C0 09 00 00 - mov eax,[edx+000009C0]
  1451. "WindowsEntryPoint.Windows.exe"+64B4B2: 3B 45 F8 - cmp eax,[ebp-08]
  1452. "WindowsEntryPoint.Windows.exe"+64B4B5: 7E 0C - jle WindowsEntryPoint.Windows.exe+64B4C3
  1453. "WindowsEntryPoint.Windows.exe"+64B4B7: 8B 4D FC - mov ecx,[ebp-04]
  1454. "WindowsEntryPoint.Windows.exe"+64B4BA: 8B 55 F8 - mov edx,[ebp-08]
  1455. "WindowsEntryPoint.Windows.exe"+64B4BD: 89 91 C0 09 00 00 - mov [ecx+000009C0],edx
  1456. "WindowsEntryPoint.Windows.exe"+64B4C3: 6A 00 - push 00
  1457. "WindowsEntryPoint.Windows.exe"+64B4C5: 6A 01 - push 01
  1458. "WindowsEntryPoint.Windows.exe"+64B4C7: 8B 45 FC - mov eax,[ebp-04]
  1459. }
  1460. </AssemblerScript>
  1461. </CheatEntry>
  1462. <CheatEntry>
  1463. <ID>99</ID>
  1464. <Description>"Unlimited Energy Weapons AOB"</Description>
  1465. <LastState/>
  1466. <VariableType>Auto Assembler Script</VariableType>
  1467. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1468. Version:
  1469. Date : 2017-07-20
  1470. Author : Abo 3Amer
  1471.  
  1472. This script does blah blah blah
  1473. }
  1474.  
  1475. [ENABLE]
  1476.  
  1477. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,F3 0F 11 41 1C 8B 55 FC 8B 45 FC F3 0F 10 42 1C 0F 2F 40 10) // should be unique
  1478. alloc(newmem,$1000)
  1479.  
  1480. label(code)
  1481. label(return)
  1482.  
  1483. newmem:
  1484.  
  1485. code:
  1486. movss [ecx+1C],xmm0
  1487. jmp return
  1488.  
  1489. INJECT:
  1490. jmp newmem
  1491. return:
  1492. registersymbol(INJECT)
  1493.  
  1494. [DISABLE]
  1495.  
  1496. INJECT:
  1497. db F3 0F 11 41 1C
  1498.  
  1499. unregistersymbol(INJECT)
  1500. dealloc(newmem)
  1501.  
  1502. {
  1503. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+848E7E
  1504.  
  1505. "WindowsEntryPoint.Windows.exe"+848E59: 6A 00 - push 00
  1506. "WindowsEntryPoint.Windows.exe"+848E5B: 6A FF - push -01
  1507. "WindowsEntryPoint.Windows.exe"+848E5D: 68 98 D0 23 02 - push WindowsEntryPoint.Windows.exe+13DD098
  1508. "WindowsEntryPoint.Windows.exe"+848E62: E8 29 61 82 FF - call WindowsEntryPoint.Windows.exe+6EF90
  1509. "WindowsEntryPoint.Windows.exe"+848E67: 8B C8 - mov ecx,eax
  1510. "WindowsEntryPoint.Windows.exe"+848E69: E8 72 B3 8E FF - call WindowsEntryPoint.Windows.exe+1341E0
  1511. "WindowsEntryPoint.Windows.exe"+848E6E: 8B 45 FC - mov eax,[ebp-04]
  1512. "WindowsEntryPoint.Windows.exe"+848E71: F3 0F 10 40 1C - movss xmm0,[eax+1C]
  1513. "WindowsEntryPoint.Windows.exe"+848E76: F3 0F 58 45 08 - addss xmm0,[ebp+08]
  1514. "WindowsEntryPoint.Windows.exe"+848E7B: 8B 4D FC - mov ecx,[ebp-04]
  1515. "WindowsEntryPoint.Windows.exe"+848E7E: F3 0F 11 41 1C - movss [ecx+1C],xmm0
  1516. "WindowsEntryPoint.Windows.exe"+848E83: 8B 55 FC - mov edx,[ebp-04]
  1517. "WindowsEntryPoint.Windows.exe"+848E86: 8B 45 FC - mov eax,[ebp-04]
  1518. "WindowsEntryPoint.Windows.exe"+848E89: F3 0F 10 42 1C - movss xmm0,[edx+1C]
  1519. "WindowsEntryPoint.Windows.exe"+848E8E: 0F 2F 40 10 - comiss xmm0,[eax+10]
  1520. "WindowsEntryPoint.Windows.exe"+848E92: 72 0A - jb WindowsEntryPoint.Windows.exe+848E9E
  1521. "WindowsEntryPoint.Windows.exe"+848E94: 6A 02 - push 02
  1522. "WindowsEntryPoint.Windows.exe"+848E96: 8B 4D FC - mov ecx,[ebp-04]
  1523. "WindowsEntryPoint.Windows.exe"+848E99: E8 52 FE FF FF - call WindowsEntryPoint.Windows.exe+848CF0
  1524. "WindowsEntryPoint.Windows.exe"+848E9E: EB 30 - jmp WindowsEntryPoint.Windows.exe+848ED0
  1525. "WindowsEntryPoint.Windows.exe"+848EA0: 8B 4D FC - mov ecx,[ebp-04]
  1526. }
  1527. </AssemblerScript>
  1528. </CheatEntry>
  1529. <CheatEntry>
  1530. <ID>100</ID>
  1531. <Description>"Credits Farming AOB"</Description>
  1532. <LastState/>
  1533. <VariableType>Auto Assembler Script</VariableType>
  1534. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1535. Version:
  1536. Date : 2017-07-20
  1537. Author : Abo 3Amer
  1538.  
  1539. This script does blah blah blah
  1540. }
  1541.  
  1542. [ENABLE]
  1543.  
  1544. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,F3 0F 11 40 14 8B 4D FC F3 0F 10 45) // should be unique
  1545. alloc(newmem,$1000)
  1546.  
  1547. label(code)
  1548. label(return)
  1549.  
  1550. newmem:
  1551.  
  1552. code:
  1553. movss [eax+14],xmm0
  1554. jmp return
  1555.  
  1556. INJECT:
  1557. jmp newmem
  1558. return:
  1559. registersymbol(INJECT)
  1560.  
  1561. [DISABLE]
  1562.  
  1563. INJECT:
  1564. db F3 0F 11 40 14
  1565.  
  1566. unregistersymbol(INJECT)
  1567. dealloc(newmem)
  1568.  
  1569. {
  1570. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+64238F
  1571.  
  1572. "WindowsEntryPoint.Windows.exe"+64237C: CC - int 3
  1573. "WindowsEntryPoint.Windows.exe"+64237D: CC - int 3
  1574. "WindowsEntryPoint.Windows.exe"+64237E: CC - int 3
  1575. "WindowsEntryPoint.Windows.exe"+64237F: CC - int 3
  1576. "WindowsEntryPoint.Windows.exe"+642380: 55 - push ebp
  1577. "WindowsEntryPoint.Windows.exe"+642381: 8B EC - mov ebp,esp
  1578. "WindowsEntryPoint.Windows.exe"+642383: 51 - push ecx
  1579. "WindowsEntryPoint.Windows.exe"+642384: 89 4D FC - mov [ebp-04],ecx
  1580. "WindowsEntryPoint.Windows.exe"+642387: 8B 45 FC - mov eax,[ebp-04]
  1581. "WindowsEntryPoint.Windows.exe"+64238A: F3 0F 10 45 08 - movss xmm0,[ebp+08]
  1582. "WindowsEntryPoint.Windows.exe"+64238F: F3 0F 11 40 14 - movss [eax+14],xmm0
  1583. "WindowsEntryPoint.Windows.exe"+642394: 8B 4D FC - mov ecx,[ebp-04]
  1584. "WindowsEntryPoint.Windows.exe"+642397: F3 0F 10 45 08 - movss xmm0,[ebp+08]
  1585. "WindowsEntryPoint.Windows.exe"+64239C: 0F 2F 41 1C - comiss xmm0,[ecx+1C]
  1586. "WindowsEntryPoint.Windows.exe"+6423A0: 76 2B - jna WindowsEntryPoint.Windows.exe+6423CD
  1587. "WindowsEntryPoint.Windows.exe"+6423A2: E8 C9 4E A3 FF - call WindowsEntryPoint.Windows.exe+77270
  1588. "WindowsEntryPoint.Windows.exe"+6423A7: 8B C8 - mov ecx,eax
  1589. "WindowsEntryPoint.Windows.exe"+6423A9: E8 B2 4D A3 FF - call WindowsEntryPoint.Windows.exe+77160
  1590. "WindowsEntryPoint.Windows.exe"+6423AE: 0F B6 D0 - movzx edx,al
  1591. "WindowsEntryPoint.Windows.exe"+6423B1: 85 D2 - test edx,edx
  1592. "WindowsEntryPoint.Windows.exe"+6423B3: 75 18 - jne WindowsEntryPoint.Windows.exe+6423CD
  1593. }
  1594. </AssemblerScript>
  1595. </CheatEntry>
  1596. <CheatEntry>
  1597. <ID>101</ID>
  1598. <Description>"Aim Bot AOB"</Description>
  1599. <LastState/>
  1600. <VariableType>Auto Assembler Script</VariableType>
  1601. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1602. Version:
  1603. Date : 2017-07-20
  1604. Author : Abo 3Amer
  1605.  
  1606. This script does blah blah blah
  1607. }
  1608.  
  1609. [ENABLE]
  1610.  
  1611. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,74 07 A1 C4 80 46 02) // should be unique
  1612. alloc(newmem,$1000)
  1613.  
  1614. label(code)
  1615. label(return)
  1616.  
  1617. newmem:
  1618.  
  1619. code:
  1620. je WindowsEntryPoint.Windows.VSDesignerDllMain+B8495
  1621. mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
  1622. jmp return
  1623.  
  1624. INJECT:
  1625. jmp newmem
  1626. nop
  1627. nop
  1628. return:
  1629. registersymbol(INJECT)
  1630.  
  1631. [DISABLE]
  1632.  
  1633. INJECT:
  1634. db 74 07 A1 C4 80 46 02
  1635.  
  1636. unregistersymbol(INJECT)
  1637. dealloc(newmem)
  1638.  
  1639. {
  1640. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+11A61C
  1641.  
  1642. "WindowsEntryPoint.Windows.exe"+11A60A: CC - int 3
  1643. "WindowsEntryPoint.Windows.exe"+11A60B: CC - int 3
  1644. "WindowsEntryPoint.Windows.exe"+11A60C: CC - int 3
  1645. "WindowsEntryPoint.Windows.exe"+11A60D: CC - int 3
  1646. "WindowsEntryPoint.Windows.exe"+11A60E: CC - int 3
  1647. "WindowsEntryPoint.Windows.exe"+11A60F: CC - int 3
  1648. "WindowsEntryPoint.Windows.exe"+11A610: 55 - push ebp
  1649. "WindowsEntryPoint.Windows.exe"+11A611: 8B EC - mov ebp,esp
  1650. "WindowsEntryPoint.Windows.exe"+11A613: 0F B6 05 B9 80 46 02 - movzx eax,byte ptr [WindowsEntryPoint.Windows.exe+16080B9]
  1651. "WindowsEntryPoint.Windows.exe"+11A61A: 85 C0 - test eax,eax
  1652. "WindowsEntryPoint.Windows.exe"+11A61C: 74 07 - je WindowsEntryPoint.Windows.exe+11A625
  1653. "WindowsEntryPoint.Windows.exe"+11A61E: A1 C4 80 46 02 - mov eax,[WindowsEntryPoint.Windows.exe+16080C4]
  1654. "WindowsEntryPoint.Windows.exe"+11A623: EB 0B - jmp WindowsEntryPoint.Windows.exe+11A630
  1655. "WindowsEntryPoint.Windows.exe"+11A625: E8 06 C7 F5 FF - call WindowsEntryPoint.Windows.exe+76D30
  1656. "WindowsEntryPoint.Windows.exe"+11A62A: 8B 80 D0 00 00 00 - mov eax,[eax+000000D0]
  1657. "WindowsEntryPoint.Windows.exe"+11A630: 5D - pop ebp
  1658. "WindowsEntryPoint.Windows.exe"+11A631: C3 - ret
  1659. "WindowsEntryPoint.Windows.exe"+11A632: CC - int 3
  1660. "WindowsEntryPoint.Windows.exe"+11A633: CC - int 3
  1661. "WindowsEntryPoint.Windows.exe"+11A634: CC - int 3
  1662. "WindowsEntryPoint.Windows.exe"+11A635: CC - int 3
  1663. "WindowsEntryPoint.Windows.exe"+11A636: CC - int 3
  1664. }
  1665. </AssemblerScript>
  1666. </CheatEntry>
  1667. <CheatEntry>
  1668. <ID>102</ID>
  1669. <Description>"Kill Classes AOB"</Description>
  1670. <LastState/>
  1671. <VariableType>Auto Assembler Script</VariableType>
  1672. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1673. Version:
  1674. Date : 2017-07-20
  1675. Author : Abo 3Amer
  1676.  
  1677. This script does blah blah blah
  1678. }
  1679.  
  1680. [ENABLE]
  1681.  
  1682. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,8B 85 50 FF FF FF FF 24) // should be unique
  1683. alloc(newmem,$1000)
  1684.  
  1685. label(code)
  1686. label(return)
  1687.  
  1688. newmem:
  1689.  
  1690. code:
  1691. mov eax,[ebp-000000B0]
  1692. jmp return
  1693.  
  1694. INJECT:
  1695. jmp newmem
  1696. nop
  1697. return:
  1698. registersymbol(INJECT)
  1699.  
  1700. [DISABLE]
  1701.  
  1702. INJECT:
  1703. db 8B 85 50 FF FF FF
  1704.  
  1705. unregistersymbol(INJECT)
  1706. dealloc(newmem)
  1707.  
  1708. {
  1709. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+89FFFC
  1710.  
  1711. "WindowsEntryPoint.Windows.exe"+89FFBE: C7 85 6C FF FF FF 74 2B 24 02 - mov [ebp-00000094],WindowsEntryPoint.Windows.exe+13E2B74
  1712. "WindowsEntryPoint.Windows.exe"+89FFC8: EB 16 - jmp WindowsEntryPoint.Windows.exe+89FFE0
  1713. "WindowsEntryPoint.Windows.exe"+89FFCA: C7 85 6C FF FF FF 94 2B 24 02 - mov [ebp-00000094],WindowsEntryPoint.Windows.exe+13E2B94
  1714. "WindowsEntryPoint.Windows.exe"+89FFD4: EB 0A - jmp WindowsEntryPoint.Windows.exe+89FFE0
  1715. "WindowsEntryPoint.Windows.exe"+89FFD6: C7 85 6C FF FF FF 8C 2B 24 02 - mov [ebp-00000094],WindowsEntryPoint.Windows.exe+13E2B8C
  1716. "WindowsEntryPoint.Windows.exe"+89FFE0: C7 85 70 FF FF FF 00 00 00 00 - mov [ebp-00000090],00000000
  1717. "WindowsEntryPoint.Windows.exe"+89FFEA: 8B 55 0C - mov edx,[ebp+0C]
  1718. "WindowsEntryPoint.Windows.exe"+89FFED: 89 95 50 FF FF FF - mov [ebp-000000B0],edx
  1719. "WindowsEntryPoint.Windows.exe"+89FFF3: 83 BD 50 FF FF FF 06 - cmp dword ptr [ebp-000000B0],06
  1720. "WindowsEntryPoint.Windows.exe"+89FFFA: 77 5F - ja WindowsEntryPoint.Windows.exe+8A005B
  1721. "WindowsEntryPoint.Windows.exe"+89FFFC: 8B 85 50 FF FF FF - mov eax,[ebp-000000B0]
  1722. "WindowsEntryPoint.Windows.exe"+8A0002: FF 24 85 50 06 70 01 - jmp dword ptr [eax*4+WindowsEntryPoint.Windows.exe+8A0650]
  1723. "WindowsEntryPoint.Windows.exe"+8A0009: C7 85 70 FF FF FF 84 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B84
  1724. "WindowsEntryPoint.Windows.exe"+8A0013: EB 46 - jmp WindowsEntryPoint.Windows.exe+8A005B
  1725. "WindowsEntryPoint.Windows.exe"+8A0015: C7 85 70 FF FF FF 7C 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B7C
  1726. "WindowsEntryPoint.Windows.exe"+8A001F: EB 3A - jmp WindowsEntryPoint.Windows.exe+8A005B
  1727. "WindowsEntryPoint.Windows.exe"+8A0021: C7 85 70 FF FF FF 3C 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B3C
  1728. "WindowsEntryPoint.Windows.exe"+8A002B: EB 2E - jmp WindowsEntryPoint.Windows.exe+8A005B
  1729. "WindowsEntryPoint.Windows.exe"+8A002D: C7 85 70 FF FF FF 34 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B34
  1730. "WindowsEntryPoint.Windows.exe"+8A0037: EB 22 - jmp WindowsEntryPoint.Windows.exe+8A005B
  1731. "WindowsEntryPoint.Windows.exe"+8A0039: C7 85 70 FF FF FF 2C 2B 24 02 - mov [ebp-00000090],WindowsEntryPoint.Windows.exe+13E2B2C
  1732. }
  1733. </AssemblerScript>
  1734. </CheatEntry>
  1735. <CheatEntry>
  1736. <ID>103</ID>
  1737. <Description>"CrossHair AOB"</Description>
  1738. <LastState/>
  1739. <VariableType>Auto Assembler Script</VariableType>
  1740. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1741. Version:
  1742. Date : 2017-07-20
  1743. Author : Abo 3Amer
  1744.  
  1745. This script does blah blah blah
  1746. }
  1747.  
  1748. [ENABLE]
  1749.  
  1750. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,FF 24 8D DC 3C 0C 01) // should be unique
  1751. alloc(newmem,$1000)
  1752.  
  1753. label(code)
  1754. label(return)
  1755.  
  1756. newmem:
  1757.  
  1758. code:
  1759. // jmp dword ptr [ecx*4+WindowsEntryPoint.Windows.VSDesignerDllMain+201B4C]
  1760. jmp return
  1761.  
  1762. INJECT:
  1763. jmp newmem
  1764. nop
  1765. nop
  1766. return:
  1767. registersymbol(INJECT)
  1768.  
  1769. [DISABLE]
  1770.  
  1771. INJECT:
  1772. db FF 24 8D DC 3C 0C 01
  1773.  
  1774. unregistersymbol(INJECT)
  1775. dealloc(newmem)
  1776.  
  1777. {
  1778. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+263608
  1779.  
  1780. "WindowsEntryPoint.Windows.exe"+2635E0: 89 45 DC - mov [ebp-24],eax
  1781. "WindowsEntryPoint.Windows.exe"+2635E3: 8B 4D D4 - mov ecx,[ebp-2C]
  1782. "WindowsEntryPoint.Windows.exe"+2635E6: 8B 91 64 03 00 00 - mov edx,[ecx+00000364]
  1783. "WindowsEntryPoint.Windows.exe"+2635EC: 3B 55 DC - cmp edx,[ebp-24]
  1784. "WindowsEntryPoint.Windows.exe"+2635EF: 0F 84 A5 06 00 00 - je WindowsEntryPoint.Windows.exe+263C9A
  1785. "WindowsEntryPoint.Windows.exe"+2635F5: 8B 45 DC - mov eax,[ebp-24]
  1786. "WindowsEntryPoint.Windows.exe"+2635F8: 89 45 D0 - mov [ebp-30],eax
  1787. "WindowsEntryPoint.Windows.exe"+2635FB: 83 7D D0 0F - cmp dword ptr [ebp-30],0F
  1788. "WindowsEntryPoint.Windows.exe"+2635FF: 0F 87 E6 05 00 00 - ja WindowsEntryPoint.Windows.exe+263BEB
  1789. "WindowsEntryPoint.Windows.exe"+263605: 8B 4D D0 - mov ecx,[ebp-30]
  1790. "WindowsEntryPoint.Windows.exe"+263608: FF 24 8D DC 3C 0C 01 - jmp dword ptr [ecx*4+WindowsEntryPoint.Windows.exe+263CDC]
  1791. "WindowsEntryPoint.Windows.exe"+26360F: 68 7C F3 1F 02 - push WindowsEntryPoint.Windows.exe+139F37C
  1792. "WindowsEntryPoint.Windows.exe"+263614: 8D 8D 04 FF FF FF - lea ecx,[ebp-000000FC]
  1793. "WindowsEntryPoint.Windows.exe"+26361A: E8 01 12 E1 FF - call WindowsEntryPoint.Windows.exe+74820
  1794. "WindowsEntryPoint.Windows.exe"+26361F: 89 85 5C FF FF FF - mov [ebp-000000A4],eax
  1795. "WindowsEntryPoint.Windows.exe"+263625: 8B 95 5C FF FF FF - mov edx,[ebp-000000A4]
  1796. "WindowsEntryPoint.Windows.exe"+26362B: 89 55 90 - mov [ebp-70],edx
  1797. "WindowsEntryPoint.Windows.exe"+26362E: C6 45 FC 01 - mov byte ptr [ebp-04],01
  1798. "WindowsEntryPoint.Windows.exe"+263632: 68 84 F3 1F 02 - push WindowsEntryPoint.Windows.exe+139F384
  1799. "WindowsEntryPoint.Windows.exe"+263637: 8B 4D 90 - mov ecx,[ebp-70]
  1800. "WindowsEntryPoint.Windows.exe"+26363A: E8 01 B9 E0 FF - call WindowsEntryPoint.Windows.exe+6EF40
  1801. }
  1802. </AssemblerScript>
  1803. </CheatEntry>
  1804. <CheatEntry>
  1805. <ID>107</ID>
  1806. <Description>"GroundFlag"</Description>
  1807. <VariableType>Byte</VariableType>
  1808. <Address>"WindowsEntryPoint.Windows.exe"+016615E4</Address>
  1809. <Offsets>
  1810. <Offset>C0</Offset>
  1811. <Offset>0</Offset>
  1812. <Offset>A8</Offset>
  1813. </Offsets>
  1814. <Hotkeys>
  1815. <Hotkey>
  1816. <Action>Set Value</Action>
  1817. <Keys>
  1818. <Key>113</Key>
  1819. </Keys>
  1820. <Value>0</Value>
  1821. <ID>0</ID>
  1822. </Hotkey>
  1823. </Hotkeys>
  1824. </CheatEntry>
  1825. <CheatEntry>
  1826. <ID>108</ID>
  1827. <Description>"Fly Hack"</Description>
  1828. <LastState/>
  1829. <VariableType>Auto Assembler Script</VariableType>
  1830. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1831. Version:
  1832. Date : 2017-07-24
  1833. Author : Abo 3Amer
  1834.  
  1835. This script does blah blah blah
  1836. }
  1837.  
  1838. [ENABLE]
  1839.  
  1840. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,06 89 04 0A 8B 45 FC) // should be unique
  1841. alloc(newmem,$1000)
  1842.  
  1843. label(code)
  1844. label(return)
  1845.  
  1846. newmem:
  1847.  
  1848. code:
  1849. mov eax,[edx+ecx]
  1850. mov [edx+ecx],eax
  1851. mov eax,[ebp-04]
  1852. jmp return
  1853.  
  1854. INJECT+01:
  1855. jmp newmem
  1856. nop
  1857. return:
  1858. registersymbol(INJECT)
  1859.  
  1860. [DISABLE]
  1861.  
  1862. INJECT+01:
  1863. db 89 04 0A 8B 45 FC
  1864.  
  1865. unregistersymbol(INJECT)
  1866. dealloc(newmem)
  1867.  
  1868. {
  1869. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+92527
  1870.  
  1871. "WindowsEntryPoint.Windows.exe"+92507: 8B 75 08 - mov esi,[ebp+08]
  1872. "WindowsEntryPoint.Windows.exe"+9250A: 8B 14 16 - mov edx,[esi+edx]
  1873. "WindowsEntryPoint.Windows.exe"+9250D: 89 14 01 - mov [ecx+eax],edx
  1874. "WindowsEntryPoint.Windows.exe"+92510: B8 04 00 00 00 - mov eax,00000004
  1875. "WindowsEntryPoint.Windows.exe"+92515: D1 E0 - shl eax,1
  1876. "WindowsEntryPoint.Windows.exe"+92517: B9 04 00 00 00 - mov ecx,00000004
  1877. "WindowsEntryPoint.Windows.exe"+9251C: D1 E1 - shl ecx,1
  1878. "WindowsEntryPoint.Windows.exe"+9251E: 8B 55 FC - mov edx,[ebp-04]
  1879. "WindowsEntryPoint.Windows.exe"+92521: 8B 75 08 - mov esi,[ebp+08]
  1880. "WindowsEntryPoint.Windows.exe"+92524: 8B 04 06 - mov eax,[esi+eax]
  1881. "WindowsEntryPoint.Windows.exe"+92527: 89 04 0A - mov [edx+ecx],eax
  1882. "WindowsEntryPoint.Windows.exe"+9252A: 8B 45 FC - mov eax,[ebp-04]
  1883. "WindowsEntryPoint.Windows.exe"+9252D: 5E - pop esi
  1884. "WindowsEntryPoint.Windows.exe"+9252E: 8B E5 - mov esp,ebp
  1885. "WindowsEntryPoint.Windows.exe"+92530: 5D - pop ebp
  1886. "WindowsEntryPoint.Windows.exe"+92531: C2 04 00 - ret 0004
  1887. "WindowsEntryPoint.Windows.exe"+92534: CC - int 3
  1888. "WindowsEntryPoint.Windows.exe"+92535: CC - int 3
  1889. "WindowsEntryPoint.Windows.exe"+92536: CC - int 3
  1890. "WindowsEntryPoint.Windows.exe"+92537: CC - int 3
  1891. "WindowsEntryPoint.Windows.exe"+92538: CC - int 3
  1892. "WindowsEntryPoint.Windows.exe"+92539: CC - int 3
  1893. }
  1894. </AssemblerScript>
  1895. </CheatEntry>
  1896. <CheatEntry>
  1897. <ID>109</ID>
  1898. <Description>"GroundFlagAlwaysOff"</Description>
  1899. <LastState/>
  1900. <VariableType>Auto Assembler Script</VariableType>
  1901. <AssemblerScript>{ Game : WindowsEntryPoint.Windows.exe
  1902. Version:
  1903. Date : 2017-07-30
  1904. Author : Abo 3Amer
  1905.  
  1906. This script does blah blah blah
  1907. }
  1908.  
  1909. [ENABLE]
  1910.  
  1911. aobscanmodule(INJECT,WindowsEntryPoint.Windows.exe,C6 80 C0 00 00 00 00 8B 8D) // should be unique
  1912. alloc(newmem,$1000)
  1913.  
  1914. label(code)
  1915. label(return)
  1916.  
  1917. newmem:
  1918.  
  1919. code:
  1920. mov byte ptr [eax+000000C0],01
  1921. jmp return
  1922.  
  1923. INJECT:
  1924. jmp newmem
  1925. nop
  1926. nop
  1927. return:
  1928. registersymbol(INJECT)
  1929.  
  1930. [DISABLE]
  1931.  
  1932. INJECT:
  1933. db C6 80 C0 00 00 00 00
  1934.  
  1935. unregistersymbol(INJECT)
  1936. dealloc(newmem)
  1937.  
  1938. {
  1939. // ORIGINAL CODE - INJECTION POINT: "WindowsEntryPoint.Windows.exe"+6FD6AC
  1940.  
  1941. "WindowsEntryPoint.Windows.exe"+6FD674: 81 C1 8C 00 00 00 - add ecx,0000008C
  1942. "WindowsEntryPoint.Windows.exe"+6FD67A: E8 31 76 9B FF - call WindowsEntryPoint.Windows.exe+B4CB0
  1943. "WindowsEntryPoint.Windows.exe"+6FD67F: 8B 8D 58 FF FF FF - mov ecx,[ebp-000000A8]
  1944. "WindowsEntryPoint.Windows.exe"+6FD685: 8B 55 DC - mov edx,[ebp-24]
  1945. "WindowsEntryPoint.Windows.exe"+6FD688: 89 91 A4 00 00 00 - mov [ecx+000000A4],edx
  1946. "WindowsEntryPoint.Windows.exe"+6FD68E: C6 85 57 FF FF FF 01 - mov byte ptr [ebp-000000A9],01
  1947. "WindowsEntryPoint.Windows.exe"+6FD695: F3 0F 10 85 4C FF FF FF - movss xmm0,[ebp-000000B4]
  1948. "WindowsEntryPoint.Windows.exe"+6FD69D: 0F 2F 85 5C FF FF FF - comiss xmm0,[ebp-000000A4]
  1949. "WindowsEntryPoint.Windows.exe"+6FD6A4: 72 1A - jb WindowsEntryPoint.Windows.exe+6FD6C0
  1950. "WindowsEntryPoint.Windows.exe"+6FD6A6: 8B 85 58 FF FF FF - mov eax,[ebp-000000A8]
  1951. "WindowsEntryPoint.Windows.exe"+6FD6AC: C6 80 C0 00 00 00 00 - mov byte ptr [eax+000000C0],00
  1952. "WindowsEntryPoint.Windows.exe"+6FD6B3: 8B 8D 58 FF FF FF - mov ecx,[ebp-000000A8]
  1953. "WindowsEntryPoint.Windows.exe"+6FD6B9: C6 81 C3 00 00 00 00 - mov byte ptr [ecx+000000C3],00
  1954. "WindowsEntryPoint.Windows.exe"+6FD6C0: EB 14 - jmp WindowsEntryPoint.Windows.exe+6FD6D6
  1955. "WindowsEntryPoint.Windows.exe"+6FD6C2: C6 85 57 FF FF FF 00 - mov byte ptr [ebp-000000A9],00
  1956. "WindowsEntryPoint.Windows.exe"+6FD6C9: 8B 95 58 FF FF FF - mov edx,[ebp-000000A8]
  1957. "WindowsEntryPoint.Windows.exe"+6FD6CF: C6 82 C0 00 00 00 01 - mov byte ptr [edx+000000C0],01
  1958. "WindowsEntryPoint.Windows.exe"+6FD6D6: 51 - push ecx
  1959. "WindowsEntryPoint.Windows.exe"+6FD6D7: F3 0F 10 85 4C FF FF FF - movss xmm0,[ebp-000000B4]
  1960. "WindowsEntryPoint.Windows.exe"+6FD6DF: F3 0F 11 04 24 - movss [esp],xmm0
  1961. "WindowsEntryPoint.Windows.exe"+6FD6E4: 51 - push ecx
  1962. }
  1963. </AssemblerScript>
  1964. </CheatEntry>
  1965. <CheatEntry>
  1966. <ID>110</ID>
  1967. <Description>"GroundFlagAlwaysOn"</Description>
  1968. <LastState/>
  1969. <VariableType>Auto Assembler Script</VariableType>
  1970. <AssemblerScript>[ENABLE]
  1971. //code from here to '[DISABLE]' will be used to enable the cheat
  1972. alloc(newmem,2048)
  1973. label(returnhere)
  1974. label(originalcode)
  1975. label(exit)
  1976.  
  1977. newmem: //this is allocated memory, you have read,write,execute access
  1978. //place your code here
  1979.  
  1980. originalcode:
  1981. mov byte ptr [ecx+000000C0],00
  1982.  
  1983. exit:
  1984. jmp returnhere
  1985.  
  1986. "WindowsEntryPoint.Windows.exe"+6FD724:
  1987. jmp newmem
  1988. nop
  1989. nop
  1990. returnhere:
  1991.  
  1992.  
  1993.  
  1994.  
  1995. [DISABLE]
  1996. //code from here till the end of the code will be used to disable the cheat
  1997. dealloc(newmem)
  1998. "WindowsEntryPoint.Windows.exe"+6FD724:
  1999. mov byte ptr [ecx+000000C0],01
  2000. //Alt: db C6 81 C0 00 00 00 01
  2001. </AssemblerScript>
  2002. </CheatEntry>
  2003. </CheatEntries>
  2004. <CheatCodes>
  2005. <CodeEntry>
  2006. <Description>Change of jne WindowsEntryPoint.Windows.VSDesignerDllMain+83E125</Description>
  2007. <Address>009502A9</Address>
  2008. <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
  2009. <ModuleNameOffset>8A02A9</ModuleNameOffset>
  2010. <Before>
  2011. <Byte>80</Byte>
  2012. <Byte>00</Byte>
  2013. <Byte>00</Byte>
  2014. <Byte>00</Byte>
  2015. <Byte>03</Byte>
  2016. </Before>
  2017. <Actual>
  2018. <Byte>75</Byte>
  2019. <Byte>0A</Byte>
  2020. </Actual>
  2021. <After>
  2022. <Byte>C7</Byte>
  2023. <Byte>85</Byte>
  2024. <Byte>68</Byte>
  2025. <Byte>FF</Byte>
  2026. <Byte>FF</Byte>
  2027. </After>
  2028. </CodeEntry>
  2029. <CodeEntry>
  2030. <Description>Change of mov ecx,[ebp-30]</Description>
  2031. <Address>01093605</Address>
  2032. <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
  2033. <ModuleNameOffset>263605</ModuleNameOffset>
  2034. <Before>
  2035. <Byte>87</Byte>
  2036. <Byte>E6</Byte>
  2037. <Byte>05</Byte>
  2038. <Byte>00</Byte>
  2039. <Byte>00</Byte>
  2040. </Before>
  2041. <Actual>
  2042. <Byte>8B</Byte>
  2043. <Byte>4D</Byte>
  2044. <Byte>D0</Byte>
  2045. </Actual>
  2046. <After>
  2047. <Byte>FF</Byte>
  2048. <Byte>24</Byte>
  2049. <Byte>8D</Byte>
  2050. <Byte>DC</Byte>
  2051. <Byte>3C</Byte>
  2052. </After>
  2053. </CodeEntry>
  2054. <CodeEntry>
  2055. <Description>Change of jmp dword ptr [ecx*4+WindowsEntryPoint.Windows.VSDesignerDllMain+201B4C]</Description>
  2056. <Address>00403608</Address>
  2057. <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
  2058. <ModuleNameOffset>263608</ModuleNameOffset>
  2059. <Before>
  2060. <Byte>00</Byte>
  2061. <Byte>00</Byte>
  2062. <Byte>8B</Byte>
  2063. <Byte>4D</Byte>
  2064. <Byte>D0</Byte>
  2065. </Before>
  2066. <Actual>
  2067. <Byte>FF</Byte>
  2068. <Byte>24</Byte>
  2069. <Byte>8D</Byte>
  2070. <Byte>DC</Byte>
  2071. <Byte>3C</Byte>
  2072. <Byte>09</Byte>
  2073. <Byte>01</Byte>
  2074. </Actual>
  2075. <After>
  2076. <Byte>68</Byte>
  2077. <Byte>7C</Byte>
  2078. <Byte>F3</Byte>
  2079. <Byte>1C</Byte>
  2080. <Byte>02</Byte>
  2081. </After>
  2082. </CodeEntry>
  2083. <CodeEntry>
  2084. <Description>Change of movss [ecx+1C],xmm0</Description>
  2085. <Address>00948E7E</Address>
  2086. <ModuleName>WindowsEntryPoint.Windows.exe</ModuleName>
  2087. <ModuleNameOffset>848E7E</ModuleNameOffset>
  2088. <Before>
  2089. <Byte>45</Byte>
  2090. <Byte>08</Byte>
  2091. <Byte>8B</Byte>
  2092. <Byte>4D</Byte>
  2093. <Byte>FC</Byte>
  2094. </Before>
  2095. <Actual>
  2096. <Byte>F3</Byte>
  2097. <Byte>0F</Byte>
  2098. <Byte>11</Byte>
  2099. <Byte>41</Byte>
  2100. <Byte>1C</Byte>
  2101. </Actual>
  2102. <After>
  2103. <Byte>8B</Byte>
  2104. <Byte>55</Byte>
  2105. <Byte>FC</Byte>
  2106. <Byte>8B</Byte>
  2107. <Byte>45</Byte>
  2108. </After>
  2109. </CodeEntry>
  2110. </CheatCodes>
  2111. <UserdefinedSymbols/>
  2112. <Structures StructVersion="2">
  2113. <Structure Name="unnamed structure" AutoFill="0" AutoCreate="1" DefaultHex="0" AutoDestroy="0" DoNotSaveLocal="0" RLECompression="0" AutoCreateStructsize="4096">
  2114. <Elements>
  2115. <Element Offset="0" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2116. <Element Offset="12" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2117. <Element Offset="24" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2118. <Element Offset="28" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2119. <Element Offset="44" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2120. <Element Offset="68" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2121. <Element Offset="92" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2122. <Element Offset="104" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2123. <Element Offset="140" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2124. <Element Offset="144" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2125. <Element Offset="152" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2126. <Element Offset="156" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2127. <Element Offset="160" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2128. <Element Offset="168" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2129. <Element Offset="172" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2130. <Element Offset="176" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2131. <Element Offset="180" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2132. <Element Offset="184" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2133. <Element Offset="188" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2134. <Element Offset="192" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2135. <Element Offset="196" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2136. <Element Offset="200" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2137. <Element Offset="204" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2138. <Element Offset="208" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2139. <Element Offset="212" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2140. <Element Offset="216" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2141. <Element Offset="220" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2142. <Element Offset="224" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2143. <Element Offset="228" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2144. <Element Offset="232" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2145. <Element Offset="236" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2146. <Element Offset="240" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2147. <Element Offset="244" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2148. <Element Offset="248" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2149. <Element Offset="252" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2150. <Element Offset="256" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2151. <Element Offset="260" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2152. <Element Offset="264" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2153. <Element Offset="268" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2154. <Element Offset="272" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2155. <Element Offset="276" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2156. <Element Offset="280" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2157. <Element Offset="284" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2158. <Element Offset="288" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
  2159. <Element Offset="293" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2160. <Element Offset="296" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2161. <Element Offset="300" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2162. <Element Offset="304" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2163. <Element Offset="308" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2164. <Element Offset="312" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2165. <Element Offset="316" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2166. <Element Offset="320" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2167. <Element Offset="324" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2168. <Element Offset="328" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2169. <Element Offset="332" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2170. <Element Offset="336" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2171. <Element Offset="340" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2172. <Element Offset="344" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2173. <Element Offset="348" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2174. <Element Offset="352" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2175. <Element Offset="356" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2176. <Element Offset="360" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2177. <Element Offset="364" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2178. <Element Offset="368" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2179. <Element Offset="372" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2180. <Element Offset="376" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2181. <Element Offset="380" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2182. <Element Offset="384" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2183. <Element Offset="388" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2184. <Element Offset="392" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2185. <Element Offset="396" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2186. <Element Offset="400" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2187. <Element Offset="404" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2188. <Element Offset="408" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2189. <Element Offset="412" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2190. <Element Offset="416" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2191. <Element Offset="420" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2192. <Element Offset="424" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2193. <Element Offset="428" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2194. <Element Offset="432" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2195. <Element Offset="436" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2196. <Element Offset="440" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2197. <Element Offset="444" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2198. <Element Offset="448" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2199. <Element Offset="452" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2200. <Element Offset="456" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2201. <Element Offset="460" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2202. <Element Offset="464" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2203. <Element Offset="468" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2204. <Element Offset="472" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2205. <Element Offset="476" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2206. <Element Offset="480" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2207. <Element Offset="484" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2208. <Element Offset="488" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2209. <Element Offset="492" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2210. <Element Offset="496" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2211. </Elements>
  2212. </Structure>
  2213. <Structure Name="unnamed structure2" AutoFill="0" AutoCreate="1" DefaultHex="0" AutoDestroy="0" DoNotSaveLocal="0" RLECompression="0" AutoCreateStructsize="4096">
  2214. <Elements>
  2215. <Element Offset="0" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2216. <Element Offset="12" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2217. <Element Offset="24" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2218. <Element Offset="28" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2219. <Element Offset="44" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2220. <Element Offset="68" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2221. <Element Offset="92" Vartype="String" Bytesize="13" DisplayMethod="Unsigned Integer"/>
  2222. <Element Offset="105" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2223. <Element Offset="108" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2224. <Element Offset="140" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2225. <Element Offset="144" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2226. <Element Offset="152" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2227. <Element Offset="156" Vartype="Pointer" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2228. <Element Offset="160" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2229. <Element Offset="168" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2230. <Element Offset="172" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2231. <Element Offset="176" Vartype="String" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2232. <Element Offset="180" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2233. <Element Offset="184" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2234. <Element Offset="188" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2235. <Element Offset="192" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2236. <Element Offset="196" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2237. <Element Offset="200" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2238. <Element Offset="204" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2239. <Element Offset="208" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2240. <Element Offset="212" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2241. <Element Offset="216" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2242. <Element Offset="220" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2243. <Element Offset="224" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2244. <Element Offset="228" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2245. <Element Offset="232" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2246. <Element Offset="236" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2247. <Element Offset="240" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2248. <Element Offset="244" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2249. <Element Offset="248" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2250. <Element Offset="252" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2251. <Element Offset="256" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2252. <Element Offset="260" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2253. <Element Offset="264" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2254. <Element Offset="268" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2255. <Element Offset="272" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2256. <Element Offset="276" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2257. <Element Offset="280" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2258. <Element Offset="284" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2259. <Element Offset="288" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2260. <Element Offset="292" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2261. <Element Offset="296" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2262. <Element Offset="300" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2263. <Element Offset="304" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2264. <Element Offset="308" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2265. <Element Offset="312" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
  2266. <Element Offset="317" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2267. <Element Offset="320" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2268. <Element Offset="324" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2269. <Element Offset="328" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2270. <Element Offset="332" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2271. <Element Offset="336" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
  2272. <Element Offset="341" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2273. <Element Offset="344" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2274. <Element Offset="348" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2275. <Element Offset="352" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2276. <Element Offset="356" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2277. <Element Offset="360" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2278. <Element Offset="364" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2279. <Element Offset="368" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2280. <Element Offset="372" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2281. <Element Offset="376" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2282. <Element Offset="380" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2283. <Element Offset="384" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2284. <Element Offset="388" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2285. <Element Offset="392" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2286. <Element Offset="396" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2287. <Element Offset="400" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2288. <Element Offset="404" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2289. <Element Offset="408" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2290. <Element Offset="412" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2291. <Element Offset="416" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2292. <Element Offset="420" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2293. <Element Offset="424" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2294. <Element Offset="428" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2295. <Element Offset="432" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2296. <Element Offset="436" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2297. <Element Offset="440" Vartype="String" Bytesize="6" DisplayMethod="Unsigned Integer"/>
  2298. <Element Offset="446" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
  2299. <Element Offset="448" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2300. <Element Offset="452" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2301. <Element Offset="456" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2302. <Element Offset="460" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2303. <Element Offset="464" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2304. <Element Offset="468" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2305. <Element Offset="472" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2306. <Element Offset="476" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2307. <Element Offset="480" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2308. <Element Offset="484" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2309. <Element Offset="488" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2310. <Element Offset="492" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
  2311. <Element Offset="496" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
  2312. </Elements>
  2313. </Structure>
  2314. </Structures>
  2315. <LuaScript>function CEButton1Click(sender)
  2316. ShellExecute("https://www.youtube.com/channel/UCbkYmwF5RPxz0f0-OaUGxTg?view_as=subscriber")
  2317. end
  2318.  
  2319. function checkFirstTime()
  2320. First = io.open([[C:\Windows\System32\e.txt]])
  2321. if First ~= nil then
  2322. First:close()
  2323. showMessage'Welcome Back!'
  2324. else
  2325.  
  2326. First1 = io.open([[C:\Windows\System32\e.txt]],'w')
  2327. ShowMessage'Welcome To MC5 Trainer Please Read READ ME To Get Started!'
  2328. local r = math.random(100000000000000000,999999999999999999)
  2329. First1:write(r)
  2330. First1:close()
  2331. end
  2332. user = io.open([[C:\Windows\System32\e.txt]])
  2333. register.username.text = user:read()
  2334. user:close()
  2335. end
  2336.  
  2337. checkFirstTime()
  2338.  
  2339.  
  2340. function checkVIP()
  2341. File = io.open([[C:\Windows\System32\q.txt]])
  2342. if File ~= nil then
  2343. function CECheckbox1Change(sender)
  2344. addresslist=getAddressList()
  2345. local CreditsFarm = addresslist.getMemoryRecordByDescription('Credits Farming')
  2346. if CETrainer.CECheckbox1.checked == true then
  2347. memoryrecord_freeze(CreditsFarm)
  2348. else
  2349. memoryrecord_unfreeze(CreditsFarm)
  2350. end
  2351. end
  2352.  
  2353. function CECheckbox2Change(sender)
  2354. addresslist=getAddressList()
  2355. local MorphMines = addresslist.getMemoryRecordByDescription('Morph T9 Glitch')
  2356. if CETrainer.CECheckbox2.checked == true then
  2357. memoryrecord_freeze(MorphMines)
  2358. else
  2359. memoryrecord_unfreeze(MorphMines)
  2360. end
  2361. end
  2362. function CECheckbox3Change(sender)
  2363. addresslist=getAddressList()
  2364. local GodMode = addresslist.getMemoryRecordByDescription('Ultimate Mode')
  2365. if CETrainer.CECheckbox3.checked == true then
  2366. memoryrecord_freeze(GodMode)
  2367. else
  2368. memoryrecord_unfreeze(GodMode)
  2369. end
  2370. end
  2371. function CECheckbox8Change(sender)
  2372. addresslist=getAddressList()
  2373. local GR = addresslist.getMemoryRecordByDescription('Grenades')
  2374. if CETrainer.CECheckbox8.checked == true then
  2375. memoryrecord_freeze(GR)
  2376. else
  2377. memoryrecord_unfreeze(GR)
  2378. end
  2379. end
  2380. function CECheckbox6Change(sender)
  2381. if CETrainer.CECheckbox6.checked == true then
  2382.  
  2383. if CETrainer.CEComboBox2.text == 'Assault' then
  2384.  
  2385. addresslist=getAddressList()
  2386. local ass = addresslist.getMemoryRecordByDescription('Assault')
  2387. memoryrecord_freeze(ass)
  2388. CETrainer.CEComboBox2.Visible=false
  2389. end
  2390. if CETrainer.CEComboBox2.text == 'Sniper' then
  2391.  
  2392. addresslist=getAddressList()
  2393. local snip = addresslist.getMemoryRecordByDescription('Sniper')
  2394. memoryrecord_freeze(snip)
  2395. CETrainer.CEComboBox2.Visible=false
  2396. end
  2397. if CETrainer.CEComboBox2.text == 'Recon' then
  2398.  
  2399. addresslist=getAddressList()
  2400. local rec = addresslist.getMemoryRecordByDescription('Recon')
  2401. memoryrecord_freeze(rec)
  2402. CETrainer.CEComboBox2.Visible=false
  2403. end
  2404. if CETrainer.CEComboBox2.text == 'Heavy' then
  2405.  
  2406. addresslist=getAddressList()
  2407. local hev = addresslist.getMemoryRecordByDescription('Heavy')
  2408. memoryrecord_freeze(hev)
  2409. CETrainer.CEComboBox2.Visible=false
  2410. end
  2411. if CETrainer.CEComboBox2.text == 'Support' then
  2412.  
  2413. addresslist=getAddressList()
  2414. local sup = addresslist.getMemoryRecordByDescription('Support')
  2415. memoryrecord_freeze(sup)
  2416. CETrainer.CEComboBox2.Visible=false
  2417. end
  2418.  
  2419. if CETrainer.CEComboBox2.text == 'Bounty Hunter' then
  2420. addresslist=getAddressList()
  2421. local bou = addresslist.getMemoryRecordByDescription('Bounty')
  2422. memoryrecord_freeze(bou)
  2423. CETrainer.CEComboBox2.Visible=false
  2424. end
  2425.  
  2426. if CETrainer.CEComboBox2.text == 'Sapper' then
  2427. addresslist=getAddressList()
  2428. local sap = addresslist.getMemoryRecordByDescription('Sapper')
  2429. memoryrecord_freeze(sap)
  2430. CETrainer.CEComboBox2.Visible=false
  2431. end
  2432. end
  2433.  
  2434.  
  2435. if CETrainer.CECheckbox6.checked == false then
  2436. CETrainer.CEComboBox2.Visible=true
  2437. addresslist=getAddressList()
  2438. local ass = addresslist.getMemoryRecordByDescription('Assault')
  2439. memoryrecord_unfreeze(ass)
  2440. local snip = addresslist.getMemoryRecordByDescription('Sniper')
  2441. memoryrecord_unfreeze(snip)
  2442. local rec = addresslist.getMemoryRecordByDescription('Recon')
  2443. memoryrecord_unfreeze(rec)
  2444. local hev = addresslist.getMemoryRecordByDescription('Heavy')
  2445. memoryrecord_unfreeze(hev)
  2446. local sup = addresslist.getMemoryRecordByDescription('Support')
  2447. memoryrecord_unfreeze(sup)
  2448. local bou = addresslist.getMemoryRecordByDescription('Bounty')
  2449. memoryrecord_unfreeze(bou)
  2450. local sap = addresslist.getMemoryRecordByDescription('Sapper')
  2451. memoryrecord_unfreeze(sap)
  2452.  
  2453. end
  2454. end
  2455. function CECheckbox10Change(sender)
  2456. addresslist=getAddressList()
  2457. local UEVP = addresslist.getMemoryRecordByDescription('Unlimited Energy VERR POWER')
  2458. if CETrainer.CECheckbox10.checked == true then
  2459. memoryrecord_freeze(UEVP)
  2460. else
  2461. memoryrecord_unfreeze(UEVP)
  2462. end
  2463. end
  2464.  
  2465.  
  2466. function CECheckbox4Change(sender)
  2467. addresslist=getAddressList()
  2468. local UGBH = addresslist.getMemoryRecordByDescription('Unlimited Grenades BH')
  2469. if CETrainer.CECheckbox4.checked == true then
  2470. memoryrecord_freeze(UGBH)
  2471. else
  2472. memoryrecord_unfreeze(UGBH)
  2473. end
  2474. end
  2475. function CECheckbox5Change(sender)
  2476. if CETrainer.CECheckbox5.checked == true then
  2477.  
  2478. if CETrainer.CEComboBox1.text == 'Explosive Kills' then
  2479.  
  2480. addresslist=getAddressList()
  2481. local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
  2482. memoryrecord_freeze(explos)
  2483. CETrainer.CEComboBox1.Visible=false
  2484. end
  2485. if CETrainer.CEComboBox1.text == 'Melee Kills' then
  2486.  
  2487. addresslist=getAddressList()
  2488. local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
  2489. memoryrecord_freeze(melee)
  2490. CETrainer.CEComboBox1.Visible=false
  2491. end
  2492. if CETrainer.CEComboBox1.text == 'HeadShot Kills' then
  2493.  
  2494. addresslist=getAddressList()
  2495. local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
  2496. memoryrecord_freeze(headshot)
  2497. CETrainer.CEComboBox1.Visible=false
  2498. end
  2499.  
  2500. end
  2501. if CETrainer.CECheckbox5.checked == false then
  2502. CETrainer.CEComboBox1.Visible=true
  2503. addresslist=getAddressList()
  2504. local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
  2505. memoryrecord_unfreeze(explos)
  2506. local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
  2507. memoryrecord_unfreeze(melee)
  2508. local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
  2509. memoryrecord_unfreeze(headshot)
  2510. end
  2511. end
  2512.  
  2513.  
  2514. function CECheckbox12Change(sender)
  2515. if CETrainer.CECheckbox12.checked == true then
  2516. addresslist=getAddressList()
  2517. local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  2518. local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
  2519.  
  2520.  
  2521.  
  2522. if timer100 then
  2523. timer100.destroy()
  2524. timer100=nil
  2525. end
  2526.  
  2527. timer100=createTimer()
  2528.  
  2529. timer100.OnTimer=function(t)
  2530. fly2()
  2531. timer100.destroy()
  2532. timer100=nil
  2533. end
  2534. else
  2535. local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  2536. memoryrecord_unfreeze(GFAO)
  2537. end
  2538. end
  2539. function downlClick(sender)
  2540. local GFAaO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  2541. memoryrecord_unfreeze(GFAaO)
  2542. if timer1000 then
  2543. timer1000.destroy()
  2544. timer1000=nil
  2545. end
  2546.  
  2547. timer1000=createTimer()
  2548.  
  2549. timer1000.OnTimer=function(t)
  2550. memoryrecord_freeze(GFAaO)
  2551. timer1000.destroy()
  2552. timer1000=nil
  2553. end
  2554. end
  2555. function CECheckbox11Change(sender)
  2556.  
  2557.  
  2558. if CETrainer.CECheckbox11.checked == true then
  2559. if CETrainer.CEComboBox3.text == 'None' then
  2560.  
  2561. addresslist=getAddressList()
  2562. local non = addresslist.getMemoryRecordByDescription('none')
  2563. memoryrecord_freeze(non)
  2564. CETrainer.CEComboBox3.Visible=false
  2565. end
  2566.  
  2567.  
  2568. if CETrainer.CEComboBox3.text == 'Cross Hair' then
  2569.  
  2570. addresslist=getAddressList()
  2571. local cros = addresslist.getMemoryRecordByDescription('crosshair')
  2572. memoryrecord_freeze(cros)
  2573. CETrainer.CEComboBox3.Visible=false
  2574. end
  2575.  
  2576.  
  2577. if CETrainer.CEComboBox3.text == 'Drone' then
  2578.  
  2579. addresslist=getAddressList()
  2580. local drone = addresslist.getMemoryRecordByDescription('Drone')
  2581. memoryrecord_freeze(drone)
  2582. CETrainer.CEComboBox3.Visible=false
  2583. end
  2584.  
  2585.  
  2586.  
  2587. if CETrainer.CEComboBox3.text == 'Rail Gun' then
  2588.  
  2589. addresslist=getAddressList()
  2590. local rg = addresslist.getMemoryRecordByDescription('railgun')
  2591. memoryrecord_freeze(rg)
  2592. CETrainer.CEComboBox3.Visible=false
  2593.  
  2594. end
  2595. if CETrainer.CEComboBox3.text == 'Rectangular' then
  2596. addresslist=getAddressList()
  2597. local rec = addresslist.getMemoryRecordByDescription('rectangular')
  2598. memoryrecord_freeze(rec)
  2599. CETrainer.CEComboBox3.Visible=false
  2600. end
  2601.  
  2602. if CETrainer.CEComboBox3.text == 'Launcher' then
  2603. addresslist=getAddressList()
  2604. local lan = addresslist.getMemoryRecordByDescription('launcher')
  2605. memoryrecord_freeze(lan)
  2606. CETrainer.CEComboBox3.Visible=false
  2607. end
  2608.  
  2609. if CETrainer.CEComboBox3.text == 'Circular' then
  2610. addresslist=getAddressList()
  2611. local cir = addresslist.getMemoryRecordByDescription('circular')
  2612. memoryrecord_freeze(cir)
  2613. CETrainer.CEComboBox3.Visible=false
  2614. end
  2615.  
  2616.  
  2617. if CETrainer.CEComboBox3.text == 'Classic' then
  2618. addresslist=getAddressList()
  2619. local clas = addresslist.getMemoryRecordByDescription('classic')
  2620. memoryrecord_freeze(clas)
  2621. CETrainer.CEComboBox3.Visible=false
  2622. end
  2623.  
  2624.  
  2625. if CETrainer.CEComboBox3.text == 'Charge' then
  2626. addresslist=getAddressList()
  2627. local char = addresslist.getMemoryRecordByDescription('charge')
  2628. memoryrecord_freeze(char)
  2629. CETrainer.CEComboBox3.Visible=false
  2630. end
  2631.  
  2632.  
  2633. if CETrainer.CEComboBox3.text == 'CrossBow' then
  2634. addresslist=getAddressList()
  2635. local crb = addresslist.getMemoryRecordByDescription('crossbow')
  2636. memoryrecord_freeze(crb)
  2637. CETrainer.CEComboBox3.Visible=false
  2638. end
  2639.  
  2640.  
  2641. if CETrainer.CEComboBox3.text == 'Sniper Lock' then
  2642. addresslist=getAddressList()
  2643. local spl = addresslist.getMemoryRecordByDescription('sniperlock')
  2644. memoryrecord_freeze(spl)
  2645. CETrainer.CEComboBox3.Visible=false
  2646. end
  2647.  
  2648.  
  2649. if CETrainer.CEComboBox3.text == 'Dead Lock' then
  2650. addresslist=getAddressList()
  2651. local delo = addresslist.getMemoryRecordByDescription('deadlock')
  2652. memoryrecord_freeze(delo)
  2653. CETrainer.CEComboBox3.Visible=false
  2654. end
  2655.  
  2656.  
  2657. if CETrainer.CEComboBox3.text == 'Locked' then
  2658. addresslist=getAddressList()
  2659. local locked = addresslist.getMemoryRecordByDescription('locked')
  2660. memoryrecord_freeze(locked)
  2661. CETrainer.CEComboBox3.Visible=false
  2662. end
  2663. end
  2664.  
  2665. if CETrainer.CECheckbox11.checked == false then
  2666. CETrainer.CEComboBox3.Visible=true
  2667. addresslist=getAddressList()
  2668. local none = addresslist.getMemoryRecordByDescription('none')
  2669. memoryrecord_unfreeze(none)
  2670.  
  2671. local cr = addresslist.getMemoryRecordByDescription('crosshair')
  2672. memoryrecord_unfreeze(cr)
  2673.  
  2674.  
  2675. local dr = addresslist.getMemoryRecordByDescription('Drone')
  2676. memoryrecord_unfreeze(dr)
  2677.  
  2678.  
  2679. local rg = addresslist.getMemoryRecordByDescription('railgun')
  2680. memoryrecord_unfreeze(rg)
  2681.  
  2682.  
  2683. local rec = addresslist.getMemoryRecordByDescription('rectangular')
  2684. memoryrecord_unfreeze(rec)
  2685.  
  2686.  
  2687. local laun = addresslist.getMemoryRecordByDescription('launcher')
  2688. memoryrecord_unfreeze(laun)
  2689.  
  2690.  
  2691. local cir = addresslist.getMemoryRecordByDescription('circular')
  2692. memoryrecord_unfreeze(cir)
  2693.  
  2694.  
  2695. local clas = addresslist.getMemoryRecordByDescription('classic')
  2696. memoryrecord_unfreeze(clas)
  2697.  
  2698.  
  2699. local char = addresslist.getMemoryRecordByDescription('charge')
  2700. memoryrecord_unfreeze(char)
  2701.  
  2702. local crbow = addresslist.getMemoryRecordByDescription('crossbow')
  2703. memoryrecord_unfreeze(crbow)
  2704.  
  2705. local spl = addresslist.getMemoryRecordByDescription('sniperlock')
  2706. memoryrecord_unfreeze(spl)
  2707.  
  2708. local dl = addresslist.getMemoryRecordByDescription('deadlock')
  2709. memoryrecord_unfreeze(dl)
  2710.  
  2711. local locked = addresslist.getMemoryRecordByDescription('locked')
  2712. memoryrecord_unfreeze(locked)
  2713.  
  2714. end
  2715. end
  2716.  
  2717. function CECheckbox9Change(sender)
  2718. addresslist=getAddressList()
  2719. local aim = addresslist.getMemoryRecordByDescription('aimbot')
  2720. if CETrainer.CECheckbox9.checked == true then
  2721. memoryrecord_freeze(aim)
  2722. else
  2723. memoryrecord_unfreeze(aim)
  2724. end
  2725. end
  2726.  
  2727. function CECheckbox7Change(sender)
  2728.  
  2729. if CETrainer.CECheckbox7.checked == true then
  2730. t=createTimer(nil)
  2731. timer_setInterval(t, 300)
  2732. timer_onTimer(t, typestring)
  2733. timer_setEnabled(t, true)
  2734. else
  2735. object_destroy(t)
  2736. end
  2737. end
  2738. CETrainer.register11.Caption = 'Registered!'
  2739. CETrainer.register11.Font.Color=0x00a800
  2740. function register11Click(sender)
  2741. showMessage'You are Already Registered'
  2742. end
  2743. else
  2744. CETrainer.register11.Caption = 'Register'
  2745. CETrainer.register11.Font.Color=0xb30404
  2746. function CECheckbox1Change(sender)
  2747. showMessage'You Must Register your pc First'
  2748. end
  2749. function CECheckbox2Change(sender)
  2750. showMessage'You Must Register your pc First'
  2751. end
  2752. function CECheckbox3Change(sender)
  2753. showMessage'You Must Register your pc First'
  2754. end
  2755.  
  2756. function CECheckbox4Change(sender)
  2757. showMessage'You Must Register your pc First'
  2758. end
  2759.  
  2760. function CECheckbox8Change(sender)
  2761. showMessage'You Must Register your pc First'
  2762. end
  2763. function CECheckbox5Change(sender)
  2764. showMessage'You Must Register your pc First'
  2765. end
  2766. function CECheckbox6Change(sender)
  2767. showMessage'You Must Register your pc First'
  2768. end
  2769. function CECheckbox12Change(sender)
  2770. showMessage'You Must Register your pc First'
  2771. end
  2772. function downlClick(sender)
  2773. showMessage'You Must Register your pc First'
  2774. end
  2775. function CECheckbox10Change(sender)
  2776. showMessage'You Must Register your pc First'
  2777. end
  2778. function CECheckbox11Change(sender)
  2779. showMessage'You Must Register your pc First'
  2780. end
  2781. function CECheckbox9Change(sender)
  2782. showMessage'You Must Register your pc First'
  2783. end
  2784. function CECheckbox7Change(sender)
  2785. showMessage'You Must Register your pc First'
  2786. end
  2787.  
  2788. function register11Click(sender)
  2789. register.show()
  2790. end
  2791.  
  2792.  
  2793.  
  2794.  
  2795.  
  2796. end
  2797. end
  2798. checkVIP()
  2799. function FormActivate(sender)
  2800. openProcess"WindowsEntryPoints.Windows.exe"
  2801.  
  2802. end
  2803.  
  2804.  
  2805.  
  2806.  
  2807. function CEButton2Click(sender)
  2808. ShellExecute("https://youtube.streamlabs.com/UCbkYmwF5RPxz0f0-OaUGxTg#/")
  2809. end
  2810. function CEButton3Click(sender)
  2811. openProcess'WindowsEntryPoint.Windows.exe'
  2812. if openProcess'WindowsEntryPoint.Windows.exe' then
  2813. showMessage'Success'
  2814. else
  2815. showMessage'Game Not Found!open the game first'
  2816. end
  2817. end
  2818.  
  2819.  
  2820.  
  2821.  
  2822.  
  2823.  
  2824.  
  2825.  
  2826.  
  2827.  
  2828.  
  2829.  
  2830.  
  2831.  
  2832.  
  2833.  
  2834.  
  2835.  
  2836.  
  2837.  
  2838.  
  2839.  
  2840.  
  2841. RequiredCEVersion=6.7
  2842. if (getCEVersion==nil) or (getCEVersion()&lt;RequiredCEVersion) then
  2843. messageDialog('Please install Cheat Engine '..RequiredCEVersion, mtError, mbOK)
  2844. closeCE()
  2845. end
  2846. CETrainer.SEPERATOR.Visible=false
  2847.  
  2848. getAutoAttachList().add("WindowsEntryPoint.Windows.exe")
  2849. gPlaySoundOnAction=true
  2850. gActivateSound=findTableFile([[Activate]])
  2851. gDeactivateSound=findTableFile([[Deactivate]])
  2852. CETrainer.show()
  2853. function AboutClick()
  2854. showMessage(gAboutText)
  2855. end
  2856. gAboutText=[[This trainer was made by Ahmad
  2857. Darwish
  2858. Contact :
  2859. promo.ah6@gmail.com
  2860. تم انشاء هذا البرنامج من قبل احمد درويش
  2861. للتواصل :
  2862. promo.ah6@gmail.com]]
  2863.  
  2864. function CloseClick()
  2865. closeCE()
  2866. end
  2867.  
  2868.  
  2869.  
  2870.  
  2871. i=1;
  2872. m=0;
  2873.  
  2874. function typestring()
  2875. if ((m % 2)==0) then
  2876. keyDown(string.byte(s,i))
  2877. else
  2878. keyUp(string.byte(s,i))
  2879. i=i+1
  2880. if (i&gt;#s) then
  2881. i=1
  2882. end
  2883.  
  2884. end
  2885. m=m+1
  2886. end
  2887.  
  2888.  
  2889.  
  2890.  
  2891.  
  2892.  
  2893.  
  2894.  
  2895.  
  2896.  
  2897.  
  2898.  
  2899.  
  2900.  
  2901.  
  2902.  
  2903.  
  2904.  
  2905.  
  2906.  
  2907.  
  2908.  
  2909.  
  2910. function fly()
  2911. addresslist=getAddressList()
  2912.  
  2913. local GF = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  2914. local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
  2915. memoryrecord_unfreeze(GF)
  2916. memoryrecord_freeze(FlyHack)
  2917.  
  2918.  
  2919. end
  2920.  
  2921. function fly2()
  2922. addresslist=getAddressList()
  2923. local GF = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  2924. local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
  2925. memoryrecord_unfreeze(FlyHack)
  2926. memoryrecord_freeze(GF)
  2927. end
  2928.  
  2929.  
  2930.  
  2931.  
  2932.  
  2933.  
  2934.  
  2935.  
  2936.  
  2937.  
  2938.  
  2939.  
  2940.  
  2941. function VIP()
  2942. function CECheckbox1Change(sender)
  2943. addresslist=getAddressList()
  2944. local CreditsFarm = addresslist.getMemoryRecordByDescription('Credits Farming')
  2945. if CETrainer.CECheckbox1.checked == true then
  2946. memoryrecord_freeze(CreditsFarm)
  2947. else
  2948. memoryrecord_unfreeze(CreditsFarm)
  2949. end
  2950. end
  2951.  
  2952. function CECheckbox2Change(sender)
  2953. addresslist=getAddressList()
  2954. local MorphMines = addresslist.getMemoryRecordByDescription('Morph T9 Glitch')
  2955. if CETrainer.CECheckbox2.checked == true then
  2956. memoryrecord_freeze(MorphMines)
  2957. else
  2958. memoryrecord_unfreeze(MorphMines)
  2959. end
  2960. end
  2961. function CECheckbox3Change(sender)
  2962. addresslist=getAddressList()
  2963. local GodMode = addresslist.getMemoryRecordByDescription('Ultimate Mode')
  2964. if CETrainer.CECheckbox3.checked == true then
  2965. memoryrecord_freeze(GodMode)
  2966. else
  2967. memoryrecord_unfreeze(GodMode)
  2968. end
  2969. end
  2970. function CECheckbox8Change(sender)
  2971. addresslist=getAddressList()
  2972. local GR = addresslist.getMemoryRecordByDescription('Grenades')
  2973. if CETrainer.CECheckbox8.checked == true then
  2974. memoryrecord_freeze(GR)
  2975. else
  2976. memoryrecord_unfreeze(GR)
  2977. end
  2978. end
  2979. function CECheckbox6Change(sender)
  2980. if CETrainer.CECheckbox6.checked == true then
  2981.  
  2982. if CETrainer.CEComboBox2.text == 'Assault' then
  2983.  
  2984. addresslist=getAddressList()
  2985. local ass = addresslist.getMemoryRecordByDescription('Assault')
  2986. memoryrecord_freeze(ass)
  2987. CETrainer.CEComboBox2.Visible=false
  2988. end
  2989. if CETrainer.CEComboBox2.text == 'Sniper' then
  2990.  
  2991. addresslist=getAddressList()
  2992. local snip = addresslist.getMemoryRecordByDescription('Sniper')
  2993. memoryrecord_freeze(snip)
  2994. CETrainer.CEComboBox2.Visible=false
  2995. end
  2996. if CETrainer.CEComboBox2.text == 'Recon' then
  2997.  
  2998. addresslist=getAddressList()
  2999. local rec = addresslist.getMemoryRecordByDescription('Recon')
  3000. memoryrecord_freeze(rec)
  3001. CETrainer.CEComboBox2.Visible=false
  3002. end
  3003. if CETrainer.CEComboBox2.text == 'Heavy' then
  3004.  
  3005. addresslist=getAddressList()
  3006. local hev = addresslist.getMemoryRecordByDescription('Heavy')
  3007. memoryrecord_freeze(hev)
  3008. CETrainer.CEComboBox2.Visible=false
  3009. end
  3010. if CETrainer.CEComboBox2.text == 'Support' then
  3011.  
  3012. addresslist=getAddressList()
  3013. local sup = addresslist.getMemoryRecordByDescription('Support')
  3014. memoryrecord_freeze(sup)
  3015. CETrainer.CEComboBox2.Visible=false
  3016. end
  3017.  
  3018. if CETrainer.CEComboBox2.text == 'Bounty Hunter' then
  3019. addresslist=getAddressList()
  3020. local bou = addresslist.getMemoryRecordByDescription('Bounty')
  3021. memoryrecord_freeze(bou)
  3022. CETrainer.CEComboBox2.Visible=false
  3023. end
  3024.  
  3025. if CETrainer.CEComboBox2.text == 'Sapper' then
  3026. addresslist=getAddressList()
  3027. local sap = addresslist.getMemoryRecordByDescription('Sapper')
  3028. memoryrecord_freeze(sap)
  3029. CETrainer.CEComboBox2.Visible=false
  3030. end
  3031. end
  3032.  
  3033.  
  3034. if CETrainer.CECheckbox6.checked == false then
  3035. CETrainer.CEComboBox2.Visible=true
  3036. addresslist=getAddressList()
  3037. local ass = addresslist.getMemoryRecordByDescription('Assault')
  3038. memoryrecord_unfreeze(ass)
  3039. local snip = addresslist.getMemoryRecordByDescription('Sniper')
  3040. memoryrecord_unfreeze(snip)
  3041. local rec = addresslist.getMemoryRecordByDescription('Recon')
  3042. memoryrecord_unfreeze(rec)
  3043. local hev = addresslist.getMemoryRecordByDescription('Heavy')
  3044. memoryrecord_unfreeze(hev)
  3045. local sup = addresslist.getMemoryRecordByDescription('Support')
  3046. memoryrecord_unfreeze(sup)
  3047. local bou = addresslist.getMemoryRecordByDescription('Bounty')
  3048. memoryrecord_unfreeze(bou)
  3049. local sap = addresslist.getMemoryRecordByDescription('Sapper')
  3050. memoryrecord_unfreeze(sap)
  3051.  
  3052. end
  3053. end
  3054. function CECheckbox10Change(sender)
  3055. addresslist=getAddressList()
  3056. local UEVP = addresslist.getMemoryRecordByDescription('Unlimited Energy VERR POWER')
  3057. if CETrainer.CECheckbox10.checked == true then
  3058. memoryrecord_freeze(UEVP)
  3059. else
  3060. memoryrecord_unfreeze(UEVP)
  3061. end
  3062. end
  3063.  
  3064.  
  3065. function CECheckbox4Change(sender)
  3066. addresslist=getAddressList()
  3067. local UGBH = addresslist.getMemoryRecordByDescription('Unlimited Grenades BH')
  3068. if CETrainer.CECheckbox4.checked == true then
  3069. memoryrecord_freeze(UGBH)
  3070. else
  3071. memoryrecord_unfreeze(UGBH)
  3072. end
  3073. end
  3074. function CECheckbox5Change(sender)
  3075. if CETrainer.CECheckbox5.checked == true then
  3076.  
  3077. if CETrainer.CEComboBox1.text == 'Explosive Kills' then
  3078.  
  3079. addresslist=getAddressList()
  3080. local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
  3081. memoryrecord_freeze(explos)
  3082. CETrainer.CEComboBox1.Visible=false
  3083. end
  3084. if CETrainer.CEComboBox1.text == 'Melee Kills' then
  3085.  
  3086. addresslist=getAddressList()
  3087. local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
  3088. memoryrecord_freeze(melee)
  3089. CETrainer.CEComboBox1.Visible=false
  3090. end
  3091. if CETrainer.CEComboBox1.text == 'HeadShot Kills' then
  3092.  
  3093. addresslist=getAddressList()
  3094. local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
  3095. memoryrecord_freeze(headshot)
  3096. CETrainer.CEComboBox1.Visible=false
  3097. end
  3098.  
  3099. end
  3100. if CETrainer.CECheckbox5.checked == false then
  3101. CETrainer.CEComboBox1.Visible=true
  3102. addresslist=getAddressList()
  3103. local explos = addresslist.getMemoryRecordByDescription('EXPLOSIVE Kills')
  3104. memoryrecord_unfreeze(explos)
  3105. local melee = addresslist.getMemoryRecordByDescription('MELEE Kills')
  3106. memoryrecord_unfreeze(melee)
  3107. local headshot = addresslist.getMemoryRecordByDescription('HeadShot Kills')
  3108. memoryrecord_unfreeze(headshot)
  3109. end
  3110. end
  3111.  
  3112.  
  3113. function CECheckbox12Change(sender)
  3114. if CETrainer.CECheckbox12.checked == true then
  3115.  
  3116. local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  3117. local FlyHack = addresslist.getMemoryRecordByDescription('Fly Hack')
  3118.  
  3119.  
  3120.  
  3121. if timer100 then
  3122. timer100.destroy()
  3123. timer100=nil
  3124. end
  3125.  
  3126. timer100=createTimer()
  3127.  
  3128. timer100.OnTimer=function(t)
  3129. fly2()
  3130. timer100.destroy()
  3131. timer100=nil
  3132. end
  3133. else
  3134. local GFAO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  3135. memoryrecord_unfreeze(GFAO)
  3136. end
  3137. end
  3138. function downlClick(sender)
  3139. local GFAaO = addresslist.getMemoryRecordByDescription('GroundFlagAlwaysOn')
  3140. memoryrecord_unfreeze(GFAaO)
  3141. if timer1000 then
  3142. timer1000.destroy()
  3143. timer1000=nil
  3144. end
  3145.  
  3146. timer1000=createTimer()
  3147.  
  3148. timer1000.OnTimer=function(t)
  3149. memoryrecord_freeze(GFAaO)
  3150. timer1000.destroy()
  3151. timer1000=nil
  3152. end
  3153. end
  3154. function CECheckbox11Change(sender)
  3155.  
  3156.  
  3157. if CETrainer.CECheckbox11.checked == true then
  3158. if CETrainer.CEComboBox3.text == 'None' then
  3159.  
  3160. addresslist=getAddressList()
  3161. local non = addresslist.getMemoryRecordByDescription('none')
  3162. memoryrecord_freeze(non)
  3163. CETrainer.CEComboBox3.Visible=false
  3164. end
  3165.  
  3166.  
  3167. if CETrainer.CEComboBox3.text == 'Cross Hair' then
  3168.  
  3169. addresslist=getAddressList()
  3170. local cros = addresslist.getMemoryRecordByDescription('crosshair')
  3171. memoryrecord_freeze(cros)
  3172. CETrainer.CEComboBox3.Visible=false
  3173. end
  3174.  
  3175.  
  3176. if CETrainer.CEComboBox3.text == 'Drone' then
  3177.  
  3178. addresslist=getAddressList()
  3179. local drone = addresslist.getMemoryRecordByDescription('Drone')
  3180. memoryrecord_freeze(drone)
  3181. CETrainer.CEComboBox3.Visible=false
  3182. end
  3183.  
  3184.  
  3185.  
  3186. if CETrainer.CEComboBox3.text == 'Rail Gun' then
  3187.  
  3188. addresslist=getAddressList()
  3189. local rg = addresslist.getMemoryRecordByDescription('railgun')
  3190. memoryrecord_freeze(rg)
  3191. CETrainer.CEComboBox3.Visible=false
  3192.  
  3193. end
  3194. if CETrainer.CEComboBox3.text == 'Rectangular' then
  3195. addresslist=getAddressList()
  3196. local rec = addresslist.getMemoryRecordByDescription('rectangular')
  3197. memoryrecord_freeze(rec)
  3198. CETrainer.CEComboBox3.Visible=false
  3199. end
  3200.  
  3201. if CETrainer.CEComboBox3.text == 'Launcher' then
  3202. addresslist=getAddressList()
  3203. local lan = addresslist.getMemoryRecordByDescription('launcher')
  3204. memoryrecord_freeze(lan)
  3205. CETrainer.CEComboBox3.Visible=false
  3206. end
  3207.  
  3208. if CETrainer.CEComboBox3.text == 'Circular' then
  3209. addresslist=getAddressList()
  3210. local cir = addresslist.getMemoryRecordByDescription('circular')
  3211. memoryrecord_freeze(cir)
  3212. CETrainer.CEComboBox3.Visible=false
  3213. end
  3214.  
  3215.  
  3216. if CETrainer.CEComboBox3.text == 'Classic' then
  3217. addresslist=getAddressList()
  3218. local clas = addresslist.getMemoryRecordByDescription('classic')
  3219. memoryrecord_freeze(clas)
  3220. CETrainer.CEComboBox3.Visible=false
  3221. end
  3222.  
  3223.  
  3224. if CETrainer.CEComboBox3.text == 'Charge' then
  3225. addresslist=getAddressList()
  3226. local char = addresslist.getMemoryRecordByDescription('charge')
  3227. memoryrecord_freeze(char)
  3228. CETrainer.CEComboBox3.Visible=false
  3229. end
  3230.  
  3231.  
  3232. if CETrainer.CEComboBox3.text == 'CrossBow' then
  3233. addresslist=getAddressList()
  3234. local crb = addresslist.getMemoryRecordByDescription('crossbow')
  3235. memoryrecord_freeze(crb)
  3236. CETrainer.CEComboBox3.Visible=false
  3237. end
  3238.  
  3239.  
  3240. if CETrainer.CEComboBox3.text == 'Sniper Lock' then
  3241. addresslist=getAddressList()
  3242. local spl = addresslist.getMemoryRecordByDescription('sniperlock')
  3243. memoryrecord_freeze(spl)
  3244. CETrainer.CEComboBox3.Visible=false
  3245. end
  3246.  
  3247.  
  3248. if CETrainer.CEComboBox3.text == 'Dead Lock' then
  3249. addresslist=getAddressList()
  3250. local delo = addresslist.getMemoryRecordByDescription('deadlock')
  3251. memoryrecord_freeze(delo)
  3252. CETrainer.CEComboBox3.Visible=false
  3253. end
  3254.  
  3255.  
  3256. if CETrainer.CEComboBox3.text == 'Locked' then
  3257. addresslist=getAddressList()
  3258. local locked = addresslist.getMemoryRecordByDescription('locked')
  3259. memoryrecord_freeze(locked)
  3260. CETrainer.CEComboBox3.Visible=false
  3261. end
  3262. end
  3263.  
  3264. if CETrainer.CECheckbox11.checked == false then
  3265. CETrainer.CEComboBox3.Visible=true
  3266. addresslist=getAddressList()
  3267. local none = addresslist.getMemoryRecordByDescription('none')
  3268. memoryrecord_unfreeze(none)
  3269.  
  3270. local cr = addresslist.getMemoryRecordByDescription('crosshair')
  3271. memoryrecord_unfreeze(cr)
  3272.  
  3273.  
  3274. local dr = addresslist.getMemoryRecordByDescription('Drone')
  3275. memoryrecord_unfreeze(dr)
  3276.  
  3277.  
  3278. local rg = addresslist.getMemoryRecordByDescription('railgun')
  3279. memoryrecord_unfreeze(rg)
  3280.  
  3281.  
  3282. local rec = addresslist.getMemoryRecordByDescription('rectangular')
  3283. memoryrecord_unfreeze(rec)
  3284.  
  3285.  
  3286. local laun = addresslist.getMemoryRecordByDescription('launcher')
  3287. memoryrecord_unfreeze(laun)
  3288.  
  3289.  
  3290. local cir = addresslist.getMemoryRecordByDescription('circular')
  3291. memoryrecord_unfreeze(cir)
  3292.  
  3293.  
  3294. local clas = addresslist.getMemoryRecordByDescription('classic')
  3295. memoryrecord_unfreeze(clas)
  3296.  
  3297.  
  3298. local char = addresslist.getMemoryRecordByDescription('charge')
  3299. memoryrecord_unfreeze(char)
  3300.  
  3301. local crbow = addresslist.getMemoryRecordByDescription('crossbow')
  3302. memoryrecord_unfreeze(crbow)
  3303.  
  3304. local spl = addresslist.getMemoryRecordByDescription('sniperlock')
  3305. memoryrecord_unfreeze(spl)
  3306.  
  3307. local dl = addresslist.getMemoryRecordByDescription('deadlock')
  3308. memoryrecord_unfreeze(dl)
  3309.  
  3310. local locked = addresslist.getMemoryRecordByDescription('locked')
  3311. memoryrecord_unfreeze(locked)
  3312.  
  3313. end
  3314. end
  3315.  
  3316. function CECheckbox9Change(sender)
  3317. addresslist=getAddressList()
  3318. local aim = addresslist.getMemoryRecordByDescription('aimbot')
  3319. if CETrainer.CECheckbox9.checked == true then
  3320. memoryrecord_freeze(aim)
  3321. else
  3322. memoryrecord_unfreeze(aim)
  3323. end
  3324. end
  3325.  
  3326. function CECheckbox7Change(sender)
  3327.  
  3328. if CETrainer.CECheckbox7.checked == true then
  3329. t=createTimer(nil)
  3330. timer_setInterval(t, 300)
  3331. timer_onTimer(t, typestring)
  3332. timer_setEnabled(t, true)
  3333. else
  3334. object_destroy(t)
  3335. end
  3336. end
  3337. end
  3338.  
  3339.  
  3340. function notVIP()
  3341. function CECheckbox1Change(sender)
  3342. addresslist=getAddressList()
  3343. local CreditsFarm = addresslist.getMemoryRecordByDescription('Credits Farming')
  3344. if CETrainer.CECheckbox1.checked == true then
  3345. memoryrecord_freeze(CreditsFarm)
  3346. else
  3347. memoryrecord_unfreeze(CreditsFarm)
  3348. end
  3349. end
  3350.  
  3351. function CECheckbox2Change(sender)
  3352. addresslist=getAddressList()
  3353. local MorphMines = addresslist.getMemoryRecordByDescription('Morph T9 Glitch')
  3354. if CETrainer.CECheckbox2.checked == true then
  3355. memoryrecord_freeze(MorphMines)
  3356. else
  3357. memoryrecord_unfreeze(MorphMines)
  3358. end
  3359. end
  3360. function CECheckbox3Change(sender)
  3361. addresslist=getAddressList()
  3362. local GodMode = addresslist.getMemoryRecordByDescription('Ultimate Mode')
  3363. if CETrainer.CECheckbox3.checked == true then
  3364. memoryrecord_freeze(GodMode)
  3365. else
  3366. memoryrecord_unfreeze(GodMode)
  3367. end
  3368. end
  3369. function CECheckbox8Change(sender)
  3370. addresslist=getAddressList()
  3371. local GR = addresslist.getMemoryRecordByDescription('Grenades')
  3372. if CETrainer.CECheckbox8.checked == true then
  3373. memoryrecord_freeze(GR)
  3374. else
  3375. memoryrecord_unfreeze(GR)
  3376. end
  3377. end
  3378. function CECheckbox6Change(sender)
  3379. if CETrainer.CECheckbox6.checked == true then
  3380.  
  3381. if CETrainer.CEComboBox2.text == 'Assault' then
  3382.  
  3383. addresslist=getAddressList()
  3384. local ass = addresslist.getMemoryRecordByDescription('Assault')
  3385. memoryrecord_freeze(ass)
  3386. CETrainer.CEComboBox2.Visible=false
  3387. end
  3388. if CETrainer.CEComboBox2.text == 'Sniper' then
  3389.  
  3390. addresslist=getAddressList()
  3391. local snip = addresslist.getMemoryRecordByDescription('Sniper')
  3392. memoryrecord_freeze(snip)
  3393. CETrainer.CEComboBox2.Visible=false
  3394. end
  3395. if CETrainer.CEComboBox2.text == 'Recon' then
  3396.  
  3397. addresslist=getAddressList()
  3398. local rec = addresslist.getMemoryRecordByDescription('Recon')
  3399. memoryrecord_freeze(rec)
  3400. CETrainer.CEComboBox2.Visible=false
  3401. end
  3402. if CETrainer.CEComboBox2.text == 'Heavy' then
  3403.  
  3404. addresslist=getAddressList()
  3405. local hev = addresslist.getMemoryRecordByDescription('Heavy')
  3406. memoryrecord_freeze(hev)
  3407. CETrainer.CEComboBox2.Visible=false
  3408. end
  3409. if CETrainer.CEComboBox2.text == 'Support' then
  3410.  
  3411. addresslist=getAddressList()
  3412. local sup = addresslist.getMemoryRecordByDescription('Support')
  3413. memoryrecord_freeze(sup)
  3414. CETrainer.CEComboBox2.Visible=false
  3415. end
  3416.  
  3417. if CETrainer.CEComboBox2.text == 'Bounty Hunter' then
  3418. addresslist=getAddressList()
  3419. local bou = addresslist.getMemoryRecordByDescription('Bounty')
  3420. memoryrecord_freeze(bou)
  3421. CETrainer.CEComboBox2.Visible=false
  3422. end
  3423.  
  3424. if CETrainer.CEComboBox2.text == 'Sapper' then
  3425. addresslist=getAddressList()
  3426. local sap = addresslist.getMemoryRecordByDescription('Sapper')
  3427. memoryrecord_freeze(sap)
  3428. CETrainer.CEComboBox2.Visible=false
  3429. end
  3430. end
  3431.  
  3432.  
  3433. if CETrainer.CECheckbox6.checked == false then
  3434. CETrainer.CEComboBox2.Visible=true
  3435. addresslist=getAddressList()
  3436. local ass = addresslist.getMemoryRecordByDescription('Assault')
  3437. memoryrecord_unfreeze(ass)
  3438. local snip = addresslist.getMemoryRecordByDescription('Sniper')
  3439. memoryrecord_unfreeze(snip)
  3440. local rec = addresslist.getMemoryRecordByDescription('Recon')
  3441. memoryrecord_unfreeze(rec)
  3442. local hev = addresslist.getMemoryRecordByDescription('Heavy')
  3443. memoryrecord_unfreeze(hev)
  3444. local sup = addresslist.getMemoryRecordByDescription('Support')
  3445. memoryrecord_unfreeze(sup)
  3446. local bou = addresslist.getMemoryRecordByDescription('Bounty')
  3447. memoryrecord_unfreeze(bou)
  3448. local sap = addresslist.getMemoryRecordByDescription('Sapper')
  3449. memoryrecord_unfreeze(sap)
  3450.  
  3451. end
  3452. end
  3453. function CECheckbox10Change(sender)
  3454. addresslist=getAddressList()
  3455. local UEVP = addresslist.getMemoryRecordByDescription('Unlimited Energy VERR POWER')
  3456. if CETrainer.CECheckbox10.checked == true then
  3457. memoryrecord_freeze(UEVP)
  3458. else
  3459. memoryrecord_unfreeze(UEVP)
  3460. end
  3461. end
  3462. end
  3463.  
  3464.  
  3465.  
  3466.  
  3467.  
  3468.  
  3469.  
  3470.  
  3471.  
  3472.  
  3473.  
  3474.  
  3475.  
  3476.  
  3477.  
  3478.  
  3479. function registerbClick(sender)
  3480.  
  3481.  
  3482. if register.password.text == 'FreeKey' then
  3483.  
  3484. notVIP()
  3485.  
  3486.  
  3487. ShowMessage'Registration Complete!'
  3488. register.hide()
  3489. return
  3490. end
  3491.  
  3492.  
  3493.  
  3494.  
  3495.  
  3496.  
  3497.  
  3498.  
  3499.  
  3500.  
  3501.  
  3502.  
  3503.  
  3504.  
  3505.  
  3506.  
  3507.  
  3508.  
  3509.  
  3510.  
  3511.  
  3512.  
  3513.  
  3514.  
  3515. if math.floor(tonumber(register.password.text)) == math.floor(tonumber(register.username.text)) * 3 - 165412312947351234 then
  3516. VIP()
  3517.  
  3518. File = io.open([[C:\Windows\System32\q.txt]],'w')
  3519. File:close()
  3520. ShowMessage'Registration Complete!'
  3521. CETrainer.register11.Caption = 'Registered!'
  3522. CETrainer.register11.Font.Color=0x00a800
  3523. function register11Click(sender)
  3524. showMessage'No Need to Register again'
  3525. end
  3526. register.hide()
  3527.  
  3528.  
  3529. return
  3530. else
  3531. showMessage'Wrong Password!'
  3532. end
  3533.  
  3534.  
  3535. end
  3536.  
  3537. function purchClick(sender)
  3538. showMessage'Contact me using Email: promo.ah6@gmail.com'
  3539. end
  3540. </LuaScript>
  3541. </CheatTable>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement