Okay guys now i'm amazed by the quality of this trainer. It's perfect from any perspective. Also the source is fully rewritten and amazing so let's break it down together : ANALysis start
First of all for the starters there's this
Then here it goes :
and then
wait why is he getting the pid twice? you'll see...
WOAH ISN'T IT ENOUGH?? no.
LOL IS THIS ENOUGH?? no.
Let's see the "base" function he's using
oh wait wotafak dis??
HE'S OPENING THE PROCESS AND GETTING THE BASE EVERY SINGLE TIME :OOOO
oh also not to mention that _memorymodulegetbaseaddress also calls openprocess
well is that all??? no.
there are also these.
Well isn't it much?? No way! let's calculate together :
-------------------------------------------------------
Let's assume that someone is using this trainer for 2 hours
and if he clicks every single function twice (to disable)
-133 base function
-65 memoryopen
-5 openprocess
-2 _memorymodulegetbaseaddress (besides the one in _pointer() )
base function :
Code:
Func base($procname, $address, $value, $type)
$pid = ProcessExists($procname)
$open = _memoryopen($pid)
$hs4lmemoryaddress = "0x" & StringRight(Hex(_memorymodulegetbaseaddress($pid, $procname) + $address), 8)
_memorywrite($hs4lmemoryaddress, $open, $value, $type)
EndFunc
memoryopen and _memorymodulegetbaseaddress both uses openprocess so 133*2 = 266 times for a single click, 266*2 = 532
532+7(openprocess and _memorymodulegetbaseaddress) = 539
remember this? AdlibRegister("_Pointer", 250) means it repeats per 250 ms
7 200 000 (2 hours) /250 = 28 800
28 800 + 539 = 29339 times.
FUCKING 29339 OPENPROCESS WERE CALLED.
rip all the coders around the world
On the contrary you just need to call it ONCE
nice job hamada :*