Advertisement
Guest User

Untitled

a guest
Jul 8th, 2017
530
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.00 KB | None | 0 0
  1. /*
  2. Name: RCDBase2
  3. Copyright: RCD
  4. Author: RCD
  5. Date: 18/12/10 14:27
  6. Description: Base dasar agar lebih mudah membuat Hack dengan RCDLogger3
  7. ChangLog : Perubahan pada beberapa string yang telah terdeteksi
  8. */
  9. #include "cbase2.h"
  10. #include "addys.h"
  11.  
  12. LPTSTR i3engine = "PointBlank.i3Exec"; // handle PointBlank.i3Exec
  13. DWORD adrBom, adrBom1, adrMini1, adrMini2, adrWSOn, adrWSOff, OldProtection; // deklarasi variabel
  14. BYTE RET[] = {0x00}; //deklarasi byte untuk RET
  15. BYTE PUSH_EBP[]= {0x01}; //deklarasi byte untuk PUSH_EBP
  16. BYTE RET1[] = {0xC3}; //deklarasi byte untuk RET
  17. BYTE PUSH_EBP1[]= {0x55};
  18.  
  19.  
  20. /* Karena memwrite sudah terdeteksi HACKSHIELD, maka saya berupaya membuatkan fungsi alternative selain memwrite dan undetected bernama MEMpatch
  21. */
  22.  
  23. //Check Apakah address tersebut di protect ?
  24.  
  25. void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
  26. VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &OldProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
  27. RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
  28. VirtualProtect((void *)Offset, Length, OldProtection, &OldProtection); // protect lagi address tsb biar gk kena satpam
  29.  
  30. }
  31. // Lakukan patch terhadap memory
  32.  
  33. void MEMpatch( BYTE *Offset, BYTE *ByteArray, DWORD Length){
  34.  
  35. UnProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);
  36.  
  37. }
  38.  
  39. DWORD WINAPI HackThread(LPVOID param) // thread telah dipatch. undetected 6 desember 2010
  40.  
  41. {
  42. while (1) { // jika thread telah aktif
  43. if (GetAsyncKeyState(VK_UP)&1) { // jika hotkey ditekan.
  44. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
  45. if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
  46. adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
  47. MEMpatch((BYTE*)adrWSOn + 02, RET1, sizeof(RET1)); // lakukan hack terhadap memory
  48. adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
  49. MEMpatch((BYTE*)adrWSOn + 02, RET1, sizeof(RET1)); // lakukan hack terhadap memory
  50. beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
  51.  
  52. }
  53. }
  54.  
  55. if (GetAsyncKeyState(VK_DOWN)&1) { // jika hotkey ditekan.
  56. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
  57. if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
  58. adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
  59. MEMpatch((BYTE*)adrWSOff + 02, PUSH_EBP, sizeof(PUSH_EBP1)); // lakukan hack terhadap memory
  60. adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
  61. MEMpatch((BYTE*)adrWSOff + 02, PUSH_EBP1, sizeof(PUSH_EBP1)); // lakukan hack terhadap memory
  62. beep(500,100);
  63. beep(1000,100); // Beritahukan jika Hack telah sukses di eksekusi
  64. beep(500,500);
  65.  
  66. }
  67. }
  68.  
  69. if (GetAsyncKeyState(VK_LEFT)&1) { // jika hotkey ditekan.
  70. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
  71. if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
  72. adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
  73. MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
  74. adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
  75. MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
  76.  
  77. beep(1500,500);
  78. MessageBox(0, "[SUKSES] Selamat Telah Lolos Dari HackShiled\n\n\nTUTOR\n\n[*]Tekan Off Bila Loading Hitam\n\nCreator : Wicahyo\nEmail : nyit_nyit_n3@rocketmail.com", "WARNING", MB_OK | MB_ICONWARNING);
  79. adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
  80. MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
  81. adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
  82. MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
  83. beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
  84. }
  85. }
  86.  
  87. if (GetAsyncKeyState(VK_RIGHT)&1) { // jika hotkey ditekan.
  88. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
  89. if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
  90. adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
  91. MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
  92. adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
  93. MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
  94.  
  95.  
  96. }
  97. adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
  98. MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
  99. adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
  100. MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
  101. beep(500,100);
  102. beep(1000,100); // Beritahukan jika Hack telah sukses di eksekusi
  103. beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
  104. }
  105. if (GetAsyncKeyState(VK_DELETE)&1) {
  106. beep(1500,500);
  107. MessageBox (0," [SUKSES] Jangan Lupa Pake Ini Lagi ^_- \n\n\nCreator : Wicahyo\nEmail : nyit_nyit_n3@rocketmail.com ","Bye-Bye", MB_OK | MB_ICONINFORMATION);
  108. beep(1500,500);
  109. ExitProcess(0); // Force Exit PB
  110. return 0;
  111. }
  112. if (GetAsyncKeyState(VK_NUMPAD1)&1) { // jika hotkey ditekan.
  113. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
  114. if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
  115. adrBom = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
  116. MEMpatch((BYTE*)adrBom + 02, RET, sizeof(RET)); // lakukan hack terhadap memory
  117. adrBom = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
  118. MEMpatch((BYTE*)adrBom + 02, RET, sizeof(RET)); // lakukan hack terhadap memory
  119. beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
  120.  
  121. }
  122. }
  123.  
  124. if (GetAsyncKeyState(VK_NUMPAD2)&1) { // jika hotkey ditekan.
  125. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
  126. if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
  127. adrBom1 = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
  128. MEMpatch((BYTE*)adrBom1 + 02, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
  129. adrBom1 = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
  130. MEMpatch((BYTE*)adrBom1 + 02, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
  131. beep(500,100);
  132. beep(1000,100); // Beritahukan jika Hack telah sukses di eksekusi
  133. beep(500,500);
  134.  
  135. }
  136. }
  137. if (GetAsyncKeyState(VK_NUMPAD1)&1) {
  138. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
  139. DWORD dwBase = 0;
  140. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
  141. MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
  142. MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
  143. MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
  144. MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
  145. Beep(1500,500);
  146. }
  147.  
  148.  
  149. if (GetAsyncKeyState(VK_NUMPAD2)&1) {
  150. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
  151. DWORD dwBase = 0;
  152. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
  153. MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
  154. MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
  155. MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
  156. MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
  157. Beep(1500,500);
  158. }
  159.  
  160.  
  161. if (GetAsyncKeyState(VK_NUMPAD3)&1) {
  162. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
  163. DWORD dwBase = 0;
  164. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
  165. MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
  166. MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
  167. MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
  168. MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
  169. Beep(1500,500);
  170. }
  171.  
  172.  
  173. if (GetAsyncKeyState(VK_NUMPAD4)&1) {
  174. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
  175. DWORD dwBase = 0;
  176. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
  177. MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
  178. MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
  179. MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
  180. MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
  181. Beep(1500,500);
  182. }
  183.  
  184.  
  185. if (GetAsyncKeyState(VK_F5)&1) {
  186. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(Anjink);
  187. DWORD dwBase = 0;
  188. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
  189. WriteAWP((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
  190. WriteAWP((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
  191. WriteAWP((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
  192. WriteAWP((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
  193. MessageBeep(0);
  194. }
  195. if (GetAsyncKeyState(VK_F6)&1) {
  196. DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(Anjink);
  197. DWORD dwBase = 0;
  198. ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
  199. WriteAWP((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
  200. WriteAWP((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
  201. WriteAWP((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
  202. WriteAWP((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
  203. MessageBeep(0);
  204. }
  205. }
  206.  
  207.  
  208. Sleep(5); // jeda untuk menghindari overheat / kelebihan beban
  209. }
  210. return (0); // kembalikan nilai ke 0 agar thread menjadi loop selama-nya
  211. }
  212. BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
  213. {
  214. DisableThreadLibraryCalls(hDll); // mencegah boros memori. SAVE Resource
  215. if (dwReason == DLL_PROCESS_ATTACH) { // jika dll ter-attach
  216. beep(500,100);
  217. beep(1000,100);
  218. beep(1500,500);
  219. beep(1500,500);
  220. MessageBox (0," [JUSTWS]Simple Hack Wallshoot + Altab \n\nHow To Use Simple Hack PointBlank:\n\n[*]UP = Wallshot ON \n[*]DOWN = Wallshot OFF\n\nHow To Use Simple Altab :\n[*]LEFT = Altab ON\n[*]RIGHT = Altab OFF\n\n How To Use Simple Force EXIT :\n[*]DELETE = EXIT FORCE\n\n\nFitur Di Atas Tidak Memakai System OFF Juga Tidak Masalah ^_-\n\n Tanks To :\n[RCD]\n[Ari Tiga Angka Enam]\n[RCDLoger3.0]\n\nCreator : Wicahyo\nEmail: nyit_nyit_n3@rocketmail.com\n\n\n©Wicahyo","Welcome", MB_OK | MB_ICONINFORMATION);
  221. beep(1000,500);
  222. MessageBox (0,"[NOT FOR Sell]\n\n*Jangan Di Download Sebelum Autor Relese\n*Dilarang Ganti Name dll Sesuai Autor\n\n\n©Wicahyo","Warrning", MB_OK | MB_ICONWARNING);
  223. beep(1000,500);// berikan salam pembuka jika dll telah ter-attach ke PROCESS
  224. MessageBox (0,"[Marry Cristmast - Happy New Year]\n\n\n*Seluruh Sejenak Keluarga Wicahyo Mengucapkan Selamat Natal Dan Tahun Baru ^_-","Marry Critsmast & Happy New Year", MB_OK | MB_TOPMOST);
  225. beep(1000,500);
  226. CreateThread(0, 0, (LPTHREAD_START_ROUTINE)HackThread, 0, 0, 0); // jalanin thread-nya
  227. // jalanin thread-nya
  228.  
  229. }
  230. TCHAR strDLLName [MAX_PATH];
  231. // ambil nama dll kita, simpan di variabel strDLLName
  232. GetModuleFileName(hDll, strDLLName , MAX_PATH);
  233. // bandingkan dll yg di inject sekarang dgn nama release dll kita, contoh, pasimbung.dll
  234. // ganti pasimbung.dll dgn nama dll anda
  235. if (strstr(strDLLName, "Wicahyo [Simple Altab + WS]Only.dll") <= 0) {
  236. // tampilkan pesan, kalo dll nya sdh bukan asli / sudah di rename
  237. MessageBox(0, "[Rules] Anda Sudah Ganti dll\nHukuman\n\n*Virus Banyak\n*Slalu Ucapkan Wicahyo Ganteng\n\nSelesai\n\n©Wicahyo", "WARNING", MB_OK + MB_ICONWARNING);
  238. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  239. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  240. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  241. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  242. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  243. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  244. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  245. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  246. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  247. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  248. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  249. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  250. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  251. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  252. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  253. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  254. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  255. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  256. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  257. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  258. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  259. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  260. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  261. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  262. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  263. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  264. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  265. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  266. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  267. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  268. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  269. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  270. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  271. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  272. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  273. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  274. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  275. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  276. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  277. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  278. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  279. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  280. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  281. MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
  282. // sadis, tutup PB nya wkwkwkwk
  283. ExitProcess(0);
  284. }
  285. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement