Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Conquer Online 2 > CO2 Exploits, Hacks & Tools
You last visited: Today at 15:20

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



UCO NonDC Speed Hack ~ 5071+

Discussion on UCO NonDC Speed Hack ~ 5071+ within the CO2 Exploits, Hacks & Tools forum part of the Conquer Online 2 category.

Closed Thread
 
Old 06/29/2008, 11:38   #811
 
elite*gold: 0
Join Date: Dec 2006
Posts: 3
Received Thanks: 0
my antivirus detected a trojan
GLiTCHiN is offline  
Old 06/29/2008, 12:55   #812
 
elite*gold: 20
Join Date: Aug 2005
Posts: 1,734
Received Thanks: 1,001
Quote:
Hmm, Thats rather odd although it may be the .NET Protector which just stops my file being decompiled so its harmless.
It's a .NET Protector that we use to protect our programs so they don't get leeched.
tanelipe is offline  
Old 06/29/2008, 13:37   #813

 
Kiyono's Avatar
 
elite*gold: 20
Join Date: Jun 2006
Posts: 3,296
Received Thanks: 925
Quote:
Originally Posted by tanelipe View Post
It's a .NET Protector that we use to protect our programs so they don't get leeched.
and we need to trust your word?
trojan.win32.delf.cxi
Kiyono is offline  
Old 06/29/2008, 15:07   #814
 
leavemealone's Avatar
 
elite*gold: 0
Join Date: May 2006
Posts: 2,168
Received Thanks: 8,593
Well noone has complained about anything bad happening so far, and hopefully you do trust us considering we have helped provide for this community for quite some time.
leavemealone is offline  
Old 06/29/2008, 15:09   #815
 
elite*gold: 0
Join Date: Jul 2007
Posts: 30
Received Thanks: 2
Quote:
Originally Posted by Djago160 View Post
and we need to trust your word?
trojan.win32.delf.cxi
I dunno.. He is a Mod, Think hes trustworthy?
Btw.. Aussie Ftw, k?
ProVPer is offline  
Old 06/29/2008, 15:41   #816
 
elite*gold: 0
Join Date: Oct 2007
Posts: 3
Received Thanks: 0
thanks alot mate
wotbled is offline  
Old 06/29/2008, 22:45   #817

 
Kiyono's Avatar
 
elite*gold: 20
Join Date: Jun 2006
Posts: 3,296
Received Thanks: 925
Quote:
Originally Posted by leavemealone View Post
Well noone has complained about anything bad happening so far, and hopefully you do trust us considering we have helped provide for this community for quite some time.
I trust you but my antiviruse doesn't and i don't want to turn it off everytime and i can't add it as a exeption cause it's a trojan
Kiyono is offline  
Old 06/30/2008, 00:21   #818
 
elite*gold: 0
Join Date: Dec 2006
Posts: 3
Received Thanks: 0
aight thx for the info ill just unload my antivirus when i use
GLiTCHiN is offline  
Old 06/30/2008, 00:54   #819
 
elite*gold: 0
Join Date: Mar 2008
Posts: 2
Received Thanks: 0
its have a trogan take care
tamer3000 is offline  
Old 06/30/2008, 12:00   #820
 
elite*gold: 0
Join Date: Jun 2006
Posts: 30
Received Thanks: 0
Did it show false positives in the virus scanner before you updated it? Mine shows the same thing troj/troj etc,.

If it didn't show before that means you didn't add the .net protector, that also means people could of downloaded it already and decompiled before, why add the .net protector now lol
(this is assuming that is the thing causing it, and it was not in the previous versions)
dbzman1995 is offline  
Old 06/30/2008, 13:00   #821
 
elite*gold: 0
Join Date: Apr 2007
Posts: 11
Received Thanks: 1
could u make one with out the Reuirement!!

Requirements:
- Microsoft .NET Framework 2.0

because i download it and it didnt work on my comp
the microsoft .net framework 2.0 said some thing was blocking it
i cheaked the firewall and all but still it doesnt work
it said my framework from 1.1 did not let it pass though my computer

soo if u can make one of these with the
Requirements i got:
- Microsoft .NET Framework 1.1

thx you if u do make one
xkenshin99x is offline  
Old 06/30/2008, 21:00   #822
 
braustube's Avatar
 
elite*gold: 572
Join Date: Oct 2006
Posts: 107
Received Thanks: 7
i always get trojan >.<
braustube is offline  
Old 06/30/2008, 22:21   #823
 
elite*gold: 0
Join Date: Jun 2007
Posts: 73
Received Thanks: 11
nice works and clean +k +a
wafai is offline  
Old 07/01/2008, 00:43   #824
 
elite*gold: 0
Join Date: Dec 2005
Posts: 15
Received Thanks: 0
The requested URL is infected with Trojan.Win32.Delf.cxi virus

Security Risk Description
Trojan-Spy.Pophot.FT Trojan-Spy.Pophot.FT is a threat that registers itself as a system service and collects certain essential information from the system.


Attention! The following threat category was identified:
Threat Category Description
A malicious backdoor trojan that runs in the background and allows remote access to the compromised system




File System Modifications

The following files were created in the system:
# Filename(s) File Size File MD5 Alias
1 %Profiles%\LocalService\Favorites\Desktop.ini 122 bytes 0xFC2BF37169C033A08C1FD7680193CCE2 (not available)
2 %System%\RpcS.dll 135,168 bytes 0x58A1B347EB4CB768D11DE4311ACC5E22 Backdoor.Win32.Delf.ash [Kaspersky Lab]
Backdoor.Trojan [Symantec]
BackDoor-CXI [McAfee]
TROJ_SHEUR.FIJ [Trend Micro]
3 %System%\RpcS.exe
[file and pathname of the sample #1] 440,832 bytes 0x86FCE8F87CB043FDAD626CAAC4E86620 (not available)


Notes:
%Profiles% is a variable that refers to the file system directory containing user profile folders. A typical path is C:\Documents and Settings.
%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
The following directories were created:
%Profiles%\LocalService\Favorites
%Profiles%\LocalService\Favorites\Links


Memory Modifications

There were new processes created in the system:
Process Name Process Filename Main Module Size
RpcS.exe %System%\rpcs.exe 770,048 bytes
[filename of the sample #1] [file and pathname of the sample #1] 770,048 bytes


The following module was loaded into the address space of other process(es):
Module Name Module Filename Address Space Details
RpcS.dll %System%\RpcS.dll Process name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0x1C20000 - 0x1C45000


Notes:
%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
There was a new service created in the system:
Service Name Display Name Status Service Filename
RpcS Remote Procedure Call System(RPCS) "Running" %System%\RpcS.exe




Registry Modifications

The following Registry Keys were created:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\ LEGACY_RPCS
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\ LEGACY_RPCS\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\ LEGACY_RPCS\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\R pcS
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\R pcS\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\R pcS\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\R oot\LEGACY_RPCS
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\R oot\LEGACY_RPCS\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\R oot\LEGACY_RPCS\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RpcS
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RpcS\Security
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RpcS\Enum
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cur rentVersion\Explorer\CabinetState
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cur rentVersion\Explorer\RunMRU
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cur rentVersion\Ext
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cur rentVersion\Ext\Stats
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\ LEGACY_RPCS\0000\Control]
*NewlyCreated* = 0x00000000
ActiveService = "RpcS"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\ LEGACY_RPCS\0000]
Service = "RpcS"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "Remote Procedure Call System(RPCS)"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\ LEGACY_RPCS]
NextInstance = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\R pcS\Enum]
0 = "Root\LEGACY_RPCS\0000"
Count = 0x00000001
NextInstance = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\R pcS\Security]
Security = 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\R pcS]
Type = 0x00000110
Start = 0x00000002
ErrorControl = 0x00000000
ImagePath = "%System%\RpcS.exe"
DisplayName = "Remote Procedure Call System(RPCS)"
ObjectName = "LocalSystem"
Description = "���������RPCï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ï ¿½Ý¿â¡£By:HACKLL QQ:8824965"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\R oot\LEGACY_RPCS\0000\Control]
*NewlyCreated* = 0x00000000
ActiveService = "RpcS"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\R oot\LEGACY_RPCS\0000]
Service = "RpcS"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "Remote Procedure Call System(RPCS)"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\R oot\LEGACY_RPCS]
NextInstance = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RpcS\Enum]
0 = "Root\LEGACY_RPCS\0000"
Count = 0x00000001
NextInstance = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RpcS\Security]
Security = 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\RpcS]
Type = 0x00000110
Start = 0x00000002
ErrorControl = 0x00000000
ImagePath = "%System%\RpcS.exe"
DisplayName = "Remote Procedure Call System(RPCS)"
ObjectName = "LocalSystem"
Description = "���������RPCï¿½ï¿½ï¿½ï¿½ï¿½ï¿½ï ¿½Ý¿â¡£By:HACKLL QQ:8824965"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar]
Locked = 0x00000001
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cur rentVersion\Explorer\CabinetState]
Settings = 0C 00 02 00 0A 01 F8 75 60 00 00 00
FullPath = 0x00000000
The following Registry Values were modified:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\Cache\Paths]
Directory = "%Profiles%\LocalService\Local Settings\Temporary Internet Files\Content.IE5"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\Cache\Paths\path1]
CachePath = "%Profiles%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\Cache\Paths\path2]
CachePath = "%Profiles%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\Cache\Paths\path3]
CachePath = "%Profiles%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\Cache\Paths\path4]
CachePath = "%Profiles%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Se rviceCurrent]
(Default) = 0x0000000B
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\ServiceCurrent]
(Default) = 0x0000000B
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cur rentVersion\Explorer\Shell Folders]
Cookies = "%Profiles%\LocalService\Cookies"
Favorites = "%Profiles%\LocalService\Favorites"
Cache = "%Profiles%\LocalService\Local Settings\Temporary Internet Files"
History = "%Profiles%\LocalService\Local Settings\History"



COOOL HACKTOOL
catzyc is offline  
Old 07/01/2008, 01:12   #825
 
elite*gold: 0
Join Date: Jun 2006
Posts: 30
Received Thanks: 0
Hey, I didn't extract it or anything, I scanned the .rar and when I saw virus I deleted it, after seeing your post and you getting me worried as hell I searched through registry for those values, the only one i saw was Explorer/MRU

Can it infect you if you don't extract and run it?
dbzman1995 is offline  
Closed Thread


Similar Threads Similar Threads
[Development]5071 C# Source
09/13/2010 - CO2 Private Server - 36 Replies
Well as some of you know, I have been working on Hybrid's Bugless/Basic source and with the help of Kinshi, I have upgraded it to +5018. The patch I am going for it 5065. Thought it was about time to post a development thread so all of you looking forward to the server can stay updated. I've successfully structured the 5065 character information packet (HUGE thanks to Nullable for teaching me about packets, if it wasn't for him, I wouldn't have been able to structure all the packets I...
ItemType patch 5071
09/27/2009 - CO2 Exploits, Hacks & Tools - 1 Replies
:bandit:Alright well this is my first itemtype dat and I think my first contribution, You scan if you like since i never did realese my stuff on here theres no reason you should trust me But if you do cool if you dont then scan :bandit:Find any errors let me know Yea I know that gems and tactics arn't shown but Im working on it Instructions: Save it in Conquer folder Open it up Copy itemtype and paste it into the ini file Press the thanks button :D
ISO: Someone to make Working Speedhack 5071+
09/22/2009 - CO2 Programming - 3 Replies
Came back to conquer a few days ago and nobody has a working speedhack? what happend? programmers move on to different games or people just stop making them. luckily I got my hands on the itemtype.dat file. Now just need the speedhack. So heres my request to help me get back in the game :P
Is this bot safe for new patch 5071?
11/10/2008 - Conquer Online 2 - 6 Replies
Is this "ELSE - multi-class bot" safe for version 5071? As in will it not botjail me or anything and does it work for version 5071. anyone that uses it or has can you let me know? Here's the link the the main post for it. It's a elitepvpers post: http://www.elitepvpers.com/forum/co2-bots-macros/1 03894-else-multi-class-controlclick-bot.html



All times are GMT +1. The time now is 15:21.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.