Battlefield 4 External ESP

05/10/2014 23:35 makerandhater#1
hey guys,
since there was no active battlefield 4 esp out there, and I got quite a few requests, I decided to release mine again

[F1/INS] to toggle menu,
[UP]/[DOWN] arrow to navigate
[LEFT]/[RIGHT] arrow to en/disable

Works on x64 Bit only. Use windows areo as the overlay needs the transparency.
Set BF4 on widowed mode before starting the hack.
Also, modify the MD5 with a MD5 changer/crypter/whatever so it's harder to detect
Use at your own risk!

Please note the hack drawing hides itself when BF4 isn't active, so after starting the hack, click on the BF4 window to see the menu
Turning off the antivirus can also help if the hack says it can't find the process.


Start the hack about 10 seconds after you started the game so the Punkbuster module is loaded, together with the signatures.


Features:
-Box ESP
-Line ESP
-Healthbars
-Name/Distance
-Radar
-Enemy visible warning
-Visible ESP check
-Crosshair
-Hardcode mode Stats (Your Health, Ammo)
-No Spread
-No Recoil
-No Breath
-Skeleton ESP
-Fullscreen Mode
-Vehicle ESP (experimental)
-Item Unlocker
-Self-Scanner for Punkbuster Signatures


[Only registered and activated users can see links. Click Here To Register...]


What's new?

-Added spectator warning, big thank you to @Nur for helping me to test it
-Fixed ESP boxes staying small with sniper zoom



Detection status: Detected


To keep it undetected, you can also use that tool: (PE Header changer + MD5 changer)
[Only registered and activated users can see links. Click Here To Register...]
(the file can corrupt some times, just do it again then)




Download:
05/23/2014 13:41 boostingfive#2
thanks for sharing i will check it out
05/24/2014 08:31 lordsill#3
This is not the real VirusTotal link.
This is the real one:
[Only registered and activated users can see links. Click Here To Register...]

His File Information from VirusTotal:
File size 39.3 KB ( 40244 bytes )
File type HTML
Magic literal
HTML document text

But HTML is not for .exe :/ he only renamed a html file to .exe and uploaded it (see also File size)

Also there are some informations looks like malware.

Original name setup.exe
Internal name setup.exe
File version 1.1.9.73

A hack original named setup.exe ?

Edit:
Other names for the same File:
Code:
6fe5bd0cd610a015c77d632ed34835507a0dd1fc3eb0db35640016fcc2f10061
wakfuhack__7934_il2941243.exe
avantdownloaderchrome__7934_il3047755.exe
test2.exe
ClashofClansHACK2014UnlimitedGEMSNEWUPDATE__7934_il2757037.exe
Battlefield4ESP__7934_il3148788.exe
craexamquestionsdump__7934_il2966697.exe
RedCrucible2Hack__7934_il3079831.exe
LolRpAndIpGenerator__7934_il3023258.exe
PokemonXandYROMDownload__7934_il3228501.exe
TankiOnlineCrystalHack__7934_il2698049.exe
setup.exe
AplicatieAntenaPlay__7934_il2766702.exe
LolRpAndIpGenerator__7934_il3023237.exe
05/24/2014 18:16 Sanman.#4
Quote:
Originally Posted by LordSill View Post
This is not the real VirusTotal link.
This is the real one:
[Only registered and activated users can see links. Click Here To Register...]

His File Information from VirusTotal:
File size 39.3 KB ( 40244 bytes )
File type HTML
Magic literal
HTML document text

But HTML is not for .exe :/ he only renamed a html file to .exe and uploaded it (see also File size)

Also there are some informations looks like malware.

Original name setup.exe
Internal name setup.exe
File version 1.1.9.73

A hack original named setup.exe ?

Edit:
Other names for the same File:
Code:
6fe5bd0cd610a015c77d632ed34835507a0dd1fc3eb0db35640016fcc2f10061
wakfuhack__7934_il2941243.exe
avantdownloaderchrome__7934_il3047755.exe
test2.exe
ClashofClansHACK2014UnlimitedGEMSNEWUPDATE__7934_il2757037.exe
Battlefield4ESP__7934_il3148788.exe
craexamquestionsdump__7934_il2966697.exe
RedCrucible2Hack__7934_il3079831.exe
LolRpAndIpGenerator__7934_il3023258.exe
PokemonXandYROMDownload__7934_il3228501.exe
TankiOnlineCrystalHack__7934_il2698049.exe
setup.exe
AplicatieAntenaPlay__7934_il2766702.exe
LolRpAndIpGenerator__7934_il3023237.exe
just checked it on request, its true.

#deleted and closed.