Bot wil u GET U BANNED (swsro)

07/24/2009 12:46 DoubleDTheGreat#46
Quote:
Originally Posted by shikode1337 View Post
btw. i dont trust lolkop anymore..

His source from his loader selfcompiled 3/50
his loader 15/50 and pw protected so :s?Any1 can explain it ?!

And btw. u are talking a lot of bullshit.
That's what I kept saying but nobody pays attention, I wish one out of 1000 people that 'TRULY TRUST HIM' could explain this....
07/24/2009 12:52 Shadowz75#47
Quote:
Originally Posted by DoubleDTheGreat View Post
That's what I kept saying but nobody pays attention, I wish one out of 1000 people that 'TRULY TRUST HIM' could explain this....
fucking idiot. just decompile his loader with myAut2Exe and you will get exactly the sourcecode:
Code:
#NoTrayIcon
$PID = Run(@ScriptDir & "\sro_client.exe " & "0 /4 0 0")
$MID = MEMOPEN($PID)
MEMWRITE($MID, 6503536, "EB")
MEMWRITE($MID, 6503644, "EB")
MEMWRITE($MID, 6503761, "E8CA2BE6FFC7803801000001000000" & NOP(38))
MEMWRITE($MID, 6566007, "EB")
MEMWRITE($MID, 6566173, NOP(2))
MEMWRITE($MID, 6671308, "8B0D6869D3008B118B4214FFD05F83C410C3")
MEMWRITE($MID, 6001969, "EB")
MEMWRITE($MID, 6001931, "EB")
MEMWRITE($MID, 4948122, "EB")
MEMWRITE($MID, 5096484, "EB")
MEMWRITE($MID, 6171283, "EB")
MEMWRITE($MID, 6282891, "E9BF00000090")
MEMWRITE($MID, 8069277, "E9E800000090")
MEMWRITE($MID, 6589364, "EB")
MEMWRITE($MID, 6605508, "EB")
MEMWRITE($MID, 6625706, "EB")
MEMWRITE($MID, 6665309, "EB")
MEMWRITEFLOAT($MID, 10435136, 5000)
MEMWRITEFLOAT($MID, 10260592, 5000)
MEMCLOSE($MID)

Func MEMOPEN($PID)
	Local $MID = DllCall("kernel32.dll", "int", "OpenProcess", "int", 2035711, "int", 1, "int", $PID)
	Return $MID[0]
EndFunc


Func MEMWRITE($MID, $ADRESS, $HEX)
	Local $STRUCT = DllStructCreate("byte[" & BinaryLen("0x" & $HEX) & "]")
	For $I = DllStructGetSize($STRUCT) To 1 Step -1
		DllStructSetData($STRUCT, 1, BinaryMid("0x" & $HEX, $I, 1), $I)
	Next
	DllCall("kernel32.dll", "int", "WriteProcessMemory", "int", $MID, "int", $ADRESS, "ptr", DllStructGetPtr($STRUCT), "int", DllStructGetSize($STRUCT), "int", 0)
EndFunc


Func MEMCLOSE($MID)
	DllCall("kernel32.dll", "int", "CloseHandle", "int", $MID)
EndFunc


Func MEMWRITEFLOAT($MID, $ADRESS, $VALUE)
	Local $FLOAT = DllStructCreate("float")
	DllStructSetData($FLOAT, 1, $VALUE)
	DllCall("kernel32.dll", "int", "VirtualProtectEx", "int", $MID, "ptr", $ADRESS, "int", DllStructGetSize($FLOAT), "dword", 64, "dword*", 0)
	DllCall("kernel32.dll", "int", "WriteProcessMemory", "int", $MID, "int", $ADRESS, "ptr", DllStructGetPtr($FLOAT), "int", DllStructGetSize($FLOAT), "int", 0)
EndFunc


Func NOP($NR)
	Local $NOP
	For $I = 1 To $NR
		$NOP &= 90
	Next
	Return $NOP
EndFunc
07/24/2009 15:33 CSLite#48
Quote:
Originally Posted by Shadowz75 View Post
fucking idiot. just decompile his loader with myAut2Exe and you will get exactly the sourcecode:
Code:
#NoTrayIcon
$PID = Run(@ScriptDir & "\sro_client.exe " & "0 /4 0 0")
$MID = MEMOPEN($PID)
MEMWRITE($MID, 6503536, "EB")
MEMWRITE($MID, 6503644, "EB")
MEMWRITE($MID, 6503761, "E8CA2BE6FFC7803801000001000000" & NOP(38))
MEMWRITE($MID, 6566007, "EB")
MEMWRITE($MID, 6566173, NOP(2))
MEMWRITE($MID, 6671308, "8B0D6869D3008B118B4214FFD05F83C410C3")
MEMWRITE($MID, 6001969, "EB")
MEMWRITE($MID, 6001931, "EB")
MEMWRITE($MID, 4948122, "EB")
MEMWRITE($MID, 5096484, "EB")
MEMWRITE($MID, 6171283, "EB")
MEMWRITE($MID, 6282891, "E9BF00000090")
MEMWRITE($MID, 8069277, "E9E800000090")
MEMWRITE($MID, 6589364, "EB")
MEMWRITE($MID, 6605508, "EB")
MEMWRITE($MID, 6625706, "EB")
MEMWRITE($MID, 6665309, "EB")
MEMWRITEFLOAT($MID, 10435136, 5000)
MEMWRITEFLOAT($MID, 10260592, 5000)
MEMCLOSE($MID)

Func MEMOPEN($PID)
	Local $MID = DllCall("kernel32.dll", "int", "OpenProcess", "int", 2035711, "int", 1, "int", $PID)
	Return $MID[0]
EndFunc


Func MEMWRITE($MID, $ADRESS, $HEX)
	Local $STRUCT = DllStructCreate("byte[" & BinaryLen("0x" & $HEX) & "]")
	For $I = DllStructGetSize($STRUCT) To 1 Step -1
		DllStructSetData($STRUCT, 1, BinaryMid("0x" & $HEX, $I, 1), $I)
	Next
	DllCall("kernel32.dll", "int", "WriteProcessMemory", "int", $MID, "int", $ADRESS, "ptr", DllStructGetPtr($STRUCT), "int", DllStructGetSize($STRUCT), "int", 0)
EndFunc


Func MEMCLOSE($MID)
	DllCall("kernel32.dll", "int", "CloseHandle", "int", $MID)
EndFunc


Func MEMWRITEFLOAT($MID, $ADRESS, $VALUE)
	Local $FLOAT = DllStructCreate("float")
	DllStructSetData($FLOAT, 1, $VALUE)
	DllCall("kernel32.dll", "int", "VirtualProtectEx", "int", $MID, "ptr", $ADRESS, "int", DllStructGetSize($FLOAT), "dword", 64, "dword*", 0)
	DllCall("kernel32.dll", "int", "WriteProcessMemory", "int", $MID, "int", $ADRESS, "ptr", DllStructGetPtr($FLOAT), "int", DllStructGetSize($FLOAT), "int", 0)
EndFunc


Func NOP($NR)
	Local $NOP
	For $I = 1 To $NR
		$NOP &= 90
	Next
	Return $NOP
EndFunc

that looks dangerous
07/24/2009 15:45 OwN159#49
So if i can bot where i can get a media.pk2 ? lol i want media.pk2 normal like isro cuz i dont like to see my game with ???? . And also bot where i can get too ? cuz lolkop close the topic.
07/24/2009 15:51 shikode1337#50
If i decompiled the originaly sunsro loader from his page i get this source gode
07/24/2009 19:17 Shadowz75#51
Quote:
Originally Posted by CSLite View Post
that looks dangerous
it isnt, its exactly what a loader should do

@shikode1337
you should decompile it with the option "do not include headerfiles"
07/24/2009 20:05 WorldDj#52
Quote:
Originally Posted by eLO21 View Post
He say some shit about sro_client.exe... packet, outdate etc. ^^ Not about AutoIt+keypresser...
He try scare ppl to stop play on SunSro, reason reduction lags xD

Fail ^^
lolkop said it not me
anyway if u wanna bot go on..its ur choose i dont even care about tht anymore lol i dont think we will be banned.
07/25/2009 21:56 Windrius#53
Quote:
Originally Posted by WorldDj View Post
lolkop said it not me
anyway if u wanna bot go on..its ur choose i dont even care about tht anymore lol i dont think we will be banned.
That bot is just key pressing =] it won't get you banned
07/25/2009 22:52 yotams22#54
Quote:
DO NOT USE THIS BOT ANYMORE!
he had a prob with his auto select
he had a prob with the coded there ...