Pixelbot for auto lvling & hunting

10/16/2007 12:42 walidemad#46
fuck uuuuuu fuck uuuuuuu
10/17/2007 03:07 DorkyPenguin#47
Ya I want to pick up items and gems... anyone know other auto hunters?
10/17/2007 03:25 lostsolder05#48
thx alot
10/17/2007 03:53 redhades777#49
its pretty good, but the bot tends to move your character towards the top of the map too much
10/18/2007 13:47 Onix#50
It works for me but it isn`t using the pots :(. Can u tell me how to fix it or what should i do? Oh and.. u can`t keep ur guard out :(( lol. It has hp and it tends to attk it lol or can`t use superman due to KO is red. Deleting everything in armor.ini didn`t work but works withhout deleting it very well +k
10/19/2007 20:13 Bott3RR007#51
this is a nice bot...
but i have tried out to make 1 too and
made 1
its almost the same :)
try it out.
just unpack it and theres a readme how to use

link:
*Edit by a1blaster, link removed because of Backdoor Trojan
Member Banned*
10/20/2007 00:02 thekiller99#52
Don't download it it has a BACKDOOR!!!!
10/20/2007 03:25 a1blaster#53
Bott3RR007 was BANNED for posting (bot.exe) Backdoor.Win32.Optix.Pro.13!
Overview:
Quote:
Malware type: Backdoor

Aliases: Backdoor.Win32.Optix.Pro.13 (Kaspersky), BackDoor-ACH (McAfee), W32.HLLW.Gaobot (Symantec), BDS/Optix.Pro.13.30 (Avira), Troj/Optix-C (Sophos),

In the wild: Yes

Destructive: No

Language: English

Platform: Windows 95, 98, ME, NT, 2000, XP

Encrypted: No
Overall risk rating:
Low

--------------------------------------------------------------------------------

Reported infections:
Low
Damage potential:
High
Distribution potential:
Low


--------------------------------------------------------------------------------

Description:


This backdoor program sets up a server that listens to incoming TCP connections. Due to its highly configurable nature, the exact port that is uses may vary. Upon accepting a connection from a special client, it grants full control of the system to a remote malicious user.

It also attempts to connect to an IRC server and channel, acting like a bot and waiting for commands from a remote user.

It appends data in the HOSTS file, which prevents the user from accessing certain antivirus and security-related Web sites.

It runs on Windows 95, 98, ME, NT, 2000, and XP.
Technical Details:
Quote:
[Only registered and activated users can see links. Click Here To Register...]: 290,816 Bytes
[Only registered and activated users can see links. Click Here To Register...]: Dec 30, 2004
[Only registered and activated users can see links. Click Here To Register...]: Prevents user from accessing antivirus Web sites
[Only registered and activated users can see links. Click Here To Register...][Only registered and activated users can see links. Click Here To Register...]: Upon execution
[Only registered and activated users can see links. Click Here To Register...][Only registered and activated users can see links. Click Here To Register...]: Compromises system security
[Only registered and activated users can see links. Click Here To Register...][Only registered and activated users can see links. Click Here To Register...]: Upon execution
[Only registered and activated users can see links. Click Here To Register...]
Details:

Installation and Autostart Techniques
This backdoor program sets up a server that listens to incoming TCP connections. Due to its highly configurable nature, the exact port that is uses may vary. Upon accepting a connection from a special client, it grants full control of the system to a remote malicious user.
It also attempts to connect to an IRC server and channel, acting like a bot and waiting for commands from a remote user.
Upon execution, it drops the file WINLOGINS.EXE in the Windows system folder.
It creates the following registry entry to ensure its automatic execution at every system startup: HKEY_LOCAL_MACHINESoftwareMicrosoftWindows
CurrentVersionRunServices
winlogins.exe = "winlogins.exe"
HKEY_LOCAL_MACHINESoftwareMicrosoftWindows
CurrentVersionRun
winlogins.exe = "winlogins.exe"

Backdoor Capabilities
This backdoor program allows a remote malicious user to perform the following on the compromised system:
  • Upload files
  • Execute files
  • Execute IRC commands
  • Log user keystrokes
  • Interfere with the user's activities.
Modifying HOSTS File
This worm also modifies the HOSTS file, which contains hostname to IP address mappings. The said file is usually located in the following folders:
• %System%driversetchosts
• %Windows%hosts
(Note: %System% is the Windows system folder, which is usually C:WINNTSystem32 on Windows NT and 2000, and C:WindowsSystem32 on Windows XP. %Windows% is the default Windows folder, usually C:Windows or C:WINNT.)
It appends data in the said file, which prevents the user from accessing any of the following Web sites: These Web sites are usually related to security or antivirus companies. Other Details The backdoor program may also delete all files in the system whose names contain the string SOUND.
01/18/2008 14:35 franklin_cf#54
Antivir: Nothing found
ArcaVir: Worm.Sohanad.V
Avast: Nothing found
AVG: Nothing found
BitDefender: Nothing found
F-Prot: Nothing found
Norman: Nothing found
Rising: Nothing found
VirusBlokAda32: Nothing found
VirusBuster: Nothing found

[Only registered and activated users can see links. Click Here To Register...]
Scanned by [Only registered and activated users can see links. Click Here To Register...]
01/20/2008 22:14 takelook#55
i need scan plsssssss scannnnnnnn
01/20/2008 22:16 takelook#56
:(:(:(i need scan plsssssss scannnnnnnn
01/21/2008 23:37 tamer3009#57
plz i need working bot i can play with anyone plz can some one help me:(
05/26/2008 02:02 barns2011#58
can u tell me how you fouind the gold files i need to change mine to dds files please help me
05/30/2008 07:18 mark_juliata#59
helow....anybody can help me how to use this BOT???
06/01/2008 21:39 ur dad#60
it`s not good i wnna press alt tap:)