Jump to content

Search


w0uter
 Share

Recommended Posts

*edit nvm i got it

just compile it :lmao:

#region _Mem()

Func _MemOpen($i_Pid, $i_Access = 0x1F0FFF, $i_Inherit = 0)
    Local $av_Return[2] = [DllOpen('kernel32.dll') ]
    Local $ai_Handle = DllCall($av_Return[0], 'int', 'OpenProcess', 'int', $i_Access, 'int', $i_Inherit, 'int', $i_Pid)
    If @error Then
        DllClose($av_Return[0])
        SetError(1)
        Return 0
    EndIf
    $av_Return[1] = $ai_Handle[0]
    Return $av_Return
EndFunc ;==>_MemOpen

Func _MemRead($ah_Mem, $i_Address, $i_Size = 0)
    If $i_Size = 0 Then
        Local $v_Return = ''
        Local $v_Struct = DllStructCreate('byte[1]')
        Local $v_Ret
        
        While 1
            $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', 1, 'int', '')
            $v_Ret = DllStructGetData($v_Struct, 1)
            If $v_Ret = 0 Then ExitLoop
            $v_Return &= Chr($v_Ret)
            $i_Address += 1
        WEnd
        
    Else
        Local $v_Struct = DllStructCreate('byte[' & $i_Size & ']')
        Local $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', $i_Size, 'int', '')
        Local $v_Return[$v_Ret[4]]
        For $i = 0 To $v_Ret[4] - 1
            $v_Return[$i] = DllStructGetData($v_Struct, 1, $i + 1)
        Next
    EndIf
    Return $v_Return
EndFunc ;==>_MemRead

Func _MemWrite($ah_Mem, $i_Address, $v_Inject)
    Local $av_Call = DllCall($ah_Mem[0], 'int', 'WriteProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Inject), 'int', DllStructGetSize($v_Inject), 'int', '')
    Return $av_Call[0]
EndFunc ;==>_MemWrite

Func _MemClose($ah_Mem)
    Local $av_Ret = DllCall($ah_Mem[0], 'int', 'CloseHandle', 'int', $ah_Mem[1])
    DllClose($ah_Mem[0])
    Return $av_Ret[0]
EndFunc ;==>_MemClose

Func _MemCreate($1, $2 = 0, $3 = 0, $4 = 0, $5 = 0, $6 = 0, $7 = 0, $8 = 0, $9 = 0, $10 = 0, $11 = 0, $12 = 0, $13 = 0, $14 = 0, $15 = 0, _
        $16 = 0, $17 = 0, $18 = 0, $19 = 0, $20 = 0, $21 = 0, $22 = 0, $23 = 0, $24 = 0, $25 = 0, $26 = 0, $27 = 0, $28 = 0, $29 = 0, _
        $30 = 0, $31 = 0, $32 = 0, $33 = 0, $34 = 0, $35 = 0, $36 = 0, $37 = 0, $38 = 0, $39 = 0, $40 = 0, $41 = 0, $42 = 0, $43 = 0, _
        $44 = 0, $45 = 0, $46 = 0, $47 = 0, $48 = 0, $49 = 0, $50 = 0, $51 = 0, $52 = 0, $53 = 0, $54 = 0, $55 = 0, $56 = 0, $57 = 0, _
        $58 = 0, $59 = 0, $60 = 0, $61 = 0, $62 = 0, $63 = 0, $64 = 0, $65 = 0, $66 = 0, $67 = 0, $68 = 0, $69 = 0, $70 = 0, $71 = 0, _
        $72 = 0, $73 = 0, $74 = 0, $75 = 0, $76 = 0, $77 = 0, $78 = 0, $79 = 0, $80 = 0, $81 = 0, $82 = 0, $83 = 0, $84 = 0, $85 = 0, _
        $86 = 0, $87 = 0, $88 = 0, $89 = 0, $90 = 0, $91 = 0, $92 = 0, $93 = 0, $94 = 0, $95 = 0, $96 = 0, $97 = 0, $98 = 0, $99 = 0)
    If IsString($1) Then
        $1 = StringSplit($1, '')
        Local $v_Helper = DllStructCreate('byte[' & UBound($1) & ']')
        For $i = 1 To UBound($1) - 1
            DllStructSetData($v_Helper, 1, Asc($1[$i]), $i)
        Next
    Else
        Local $v_Helper = DllStructCreate('byte[' & @NumParams & ']')
        For $i = 1 To @NumParams
            DllStructSetData($v_Helper, 1, Eval($i), $i)
        Next
    EndIf
    Return $v_Helper
EndFunc ;==>_MemCreate

Func _MemRev($v_DWORD)
    If UBound($v_DWORD) = 4 Then Return '0x' & Hex($v_DWORD[3], 2) & Hex($v_DWORD[2], 2) & Hex($v_DWORD[1], 2) & Hex($v_DWORD[0], 2)
    Local $v_Ret[4] = ['0x' & StringMid(Hex($v_DWORD, 8), 7, 2), '0x' & StringMid(Hex($v_DWORD, 8), 5, 2), '0x' & StringMid(Hex($v_DWORD, 8), 3, 2), '0x' & StringMid(Hex($v_DWORD, 8), 1, 2) ]
    Return $v_Ret
EndFunc ;==>_MemRev

Func _MemAlloc($ah_Mem, $i_Size, $i_Address = 0, $i_AT = 4096, $i_Protect = 0x40)
    Switch @OSVersion
        Case "WIN_ME", "WIN_98", "WIN_95"
            $i_AT = BitOR($i_AT, 0x8000000); UNDOCUMENTED VA_SHARED
            $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAlloc', 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect)
        Case Else
            $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAllocEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect)
    EndSwitch
    Return $av_Alloc[0]
EndFunc ;==>_MemAlloc

Func _MemFree($ah_Mem, $i_Address)
    Switch @OSVersion
        Case "WIN_ME", "WIN_98", "WIN_95"
            $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFree', 'int', $i_Address, 'int', 0, 'int', 0x8000)
        Case Else
            $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFreeEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', 0, 'int', 0x8000)
    EndSwitch
    Return $av_Free[0]
EndFunc ;==>_MemFree

Func _MemText($ah_Mem, $s_Text)
    Local $i_Size = StringLen($s_Text) + 1
    Local $i_Addr = _MemAlloc($ah_Mem, $i_Size)
    _MemWrite($ah_Mem, $i_Addr, _MemCreate($s_Text))
    Return $i_Addr
EndFunc ;==>_MemText

#endregion

ProcessSetPriority(@AutoItPID, 5)

;open
$i_Open = _MemOpen(@AutoItPID)

;RVA
$i = 0x401000

;byte pattern match
Dim $as_Match[18] = ['EB', '0D', '57', '53', 'FF', '75', '08', '6A', '00', 'FF', '15', '8B', '4D', '0C']

;progress
GUISetFont(9, 400, 0, 'Courier')
GUICreate("RVA Progress", 115, 30, (@DesktopWidth - 115) / 2, (@DesktopHeight - 31) / 2, -2134900736)
GUICtrlCreateLabel("Scanning:", 8, 9, 50, 20)
$h_Scan = GUICtrlCreateLabel("00000000", 60, 10, 55, 20)
GUISetState()

While 1
    
;Set progress
    GUICtrlSetData($h_Scan, Hex($i, 8))
    
;read code
    $ai_Code = _MemRead($i_Open, $i, 18)
    
;match the first 10
    For $x = 0 To 10
        If Hex($ai_Code[$x], 2) <> $as_Match[$x] Then ExitLoop
    Next
    
;if all matched
    If $x = 11 Then
        
;match the last 3
        For $x = 15 To 17
            If Hex($ai_Code[$x], 2) <> $as_Match[$x - 4] Then ExitLoop
        Next
        
;all matched
        If $x = 18 Then
            
    ;patch point
            Dim $i_Patch_Start = $i + 2
            
    ;return after hijack
            Dim $i_Patch_End = _MemRev($i + 9)
            
    ;Kernel32.MessageBoxA Offset
            Dim $i_Patch_MBoxA[4] = [$ai_Code[11], $ai_Code[12], $ai_Code[13], $ai_Code[14]]
            ExitLoop
        EndIf
        
    EndIf
    
;inc RVA
    $i += 1
    
WEnd

;delete gui
GUIDelete()

#cs
    0  00417806   /EB 0D                     JMP SHORT Mem_Hard.00417815
    2  00417808   |57                       PUSH EDI
    3  00417809   |53                       PUSH EBX
    4  0041780A   |FF75 08                 PUSH DWORD PTR SS:[EBP+8]
    7  0041780D   |6A 00                     PUSH 0
    9  0041780F   |FF15 BCEB4600             CALL NEAR DWORD PTR DS:[46EBBC]                    ; USER32.MessageBoxA
    15 00417815   \8B4D 0C                 MOV ECX,DWORD PTR SS:[EBP+C]
#ce

;create string in memory & reverse the pointers for storing.
$i_Title = _MemText($i_Open, 'Hacked')
$i_Title_r = _MemRev($i_Title)

$i_Text = _MemText($i_Open, 'I Got Hijacked.')
$i_Text_r = _MemRev($i_Text)

; alloc
$i_Alloc = _MemAlloc($i_Open, 26)

; write the code
_MemWrite($i_Open, $i_Alloc, _MemCreate(0x6A, 0, _
        0x68, $i_Title_r[0], $i_Title_r[1], $i_Title_r[2], $i_Title_r[3], _
        0x68, $i_Text_r[0], $i_Text_r[1], $i_Text_r[2], $i_Text_r[3], _
        0x6A, 0, _
        0xFF, 0x15, $i_Patch_MBoxA[0], $i_Patch_MBoxA[1], $i_Patch_MBoxA[2], $i_Patch_MBoxA[3], _
        0x68, $i_Patch_End[0], $i_Patch_End[1], $i_Patch_End[2], $i_Patch_End[3], _
        0xC3))

;reverse the pointer
$ai_Rev = _MemRev($i_Alloc)

;redirect the code to our code.
_MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x68, $ai_Rev[0], $ai_Rev[1], $ai_Rev[2], $ai_Rev[3], 0xC3))

;spawn a msgbox
MsgBox(0, 'title', 'text')

;restore original
_MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x57, 0x53, 255, 0x75, 8, 0x6A))
_MemFree($i_Open, $i_Title)
_MemFree($i_Open, $i_Text)
_MemFree($i_Open, $i_Alloc)
_MemClose($i_Open)

;spawn a msgbox
MsgBox(0, 'title', 'text')
Edited by w0uter

My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll

Link to comment
Share on other sites

*edit nvm i got it

just compile it :lmao:

#region _Mem()

Func _MemOpen($i_Pid, $i_Access = 0x1F0FFF, $i_Inherit = 0)
    Local $av_Return[2] = [DllOpen('kernel32.dll') ]
    Local $ai_Handle = DllCall($av_Return[0], 'int', 'OpenProcess', 'int', $i_Access, 'int', $i_Inherit, 'int', $i_Pid)
    If @error Then
        DllClose($av_Return[0])
        SetError(1)
        Return 0
    EndIf
    $av_Return[1] = $ai_Handle[0]
    Return $av_Return
EndFunc;==>_MemOpen

Func _MemRead($ah_Mem, $i_Address, $i_Size = 0)
    If $i_Size = 0 Then
        Local $v_Return = ''
        Local $v_Struct = DllStructCreate('byte[1]')
        Local $v_Ret
        
        While 1
            $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', 1, 'int', '')
            $v_Ret = DllStructGetData($v_Struct, 1)
            If $v_Ret = 0 Then ExitLoop
            $v_Return &= Chr($v_Ret)
            $i_Address += 1
        WEnd
        
    Else
        Local $v_Struct = DllStructCreate('byte[' & $i_Size & ']')
        Local $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', $i_Size, 'int', '')
        Local $v_Return[$v_Ret[4]]
        For $i = 0 To $v_Ret[4] - 1
            $v_Return[$i] = DllStructGetData($v_Struct, 1, $i + 1)
        Next
    EndIf
    Return $v_Return
EndFunc;==>_MemRead

Func _MemWrite($ah_Mem, $i_Address, $v_Inject)
    Local $av_Call = DllCall($ah_Mem[0], 'int', 'WriteProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Inject), 'int', DllStructGetSize($v_Inject), 'int', '')
    Return $av_Call[0]
EndFunc;==>_MemWrite

Func _MemClose($ah_Mem)
    Local $av_Ret = DllCall($ah_Mem[0], 'int', 'CloseHandle', 'int', $ah_Mem[1])
    DllClose($ah_Mem[0])
    Return $av_Ret[0]
EndFunc;==>_MemClose

Func _MemCreate($1, $2 = 0, $3 = 0, $4 = 0, $5 = 0, $6 = 0, $7 = 0, $8 = 0, $9 = 0, $10 = 0, $11 = 0, $12 = 0, $13 = 0, $14 = 0, $15 = 0, _
        $16 = 0, $17 = 0, $18 = 0, $19 = 0, $20 = 0, $21 = 0, $22 = 0, $23 = 0, $24 = 0, $25 = 0, $26 = 0, $27 = 0, $28 = 0, $29 = 0, _
        $30 = 0, $31 = 0, $32 = 0, $33 = 0, $34 = 0, $35 = 0, $36 = 0, $37 = 0, $38 = 0, $39 = 0, $40 = 0, $41 = 0, $42 = 0, $43 = 0, _
        $44 = 0, $45 = 0, $46 = 0, $47 = 0, $48 = 0, $49 = 0, $50 = 0, $51 = 0, $52 = 0, $53 = 0, $54 = 0, $55 = 0, $56 = 0, $57 = 0, _
        $58 = 0, $59 = 0, $60 = 0, $61 = 0, $62 = 0, $63 = 0, $64 = 0, $65 = 0, $66 = 0, $67 = 0, $68 = 0, $69 = 0, $70 = 0, $71 = 0, _
        $72 = 0, $73 = 0, $74 = 0, $75 = 0, $76 = 0, $77 = 0, $78 = 0, $79 = 0, $80 = 0, $81 = 0, $82 = 0, $83 = 0, $84 = 0, $85 = 0, _
        $86 = 0, $87 = 0, $88 = 0, $89 = 0, $90 = 0, $91 = 0, $92 = 0, $93 = 0, $94 = 0, $95 = 0, $96 = 0, $97 = 0, $98 = 0, $99 = 0)
    If IsString($1) Then
        $1 = StringSplit($1, '')
        Local $v_Helper = DllStructCreate('byte[' & UBound($1) & ']')
        For $i = 1 To UBound($1) - 1
            DllStructSetData($v_Helper, 1, Asc($1[$i]), $i)
        Next
    Else
        Local $v_Helper = DllStructCreate('byte[' & @NumParams & ']')
        For $i = 1 To @NumParams
            DllStructSetData($v_Helper, 1, Eval($i), $i)
        Next
    EndIf
    Return $v_Helper
EndFunc;==>_MemCreate

Func _MemRev($v_DWORD)
    If UBound($v_DWORD) = 4 Then Return '0x' & Hex($v_DWORD[3], 2) & Hex($v_DWORD[2], 2) & Hex($v_DWORD[1], 2) & Hex($v_DWORD[0], 2)
    Local $v_Ret[4] = ['0x' & StringMid(Hex($v_DWORD, 8), 7, 2), '0x' & StringMid(Hex($v_DWORD, 8), 5, 2), '0x' & StringMid(Hex($v_DWORD, 8), 3, 2), '0x' & StringMid(Hex($v_DWORD, 8), 1, 2) ]
    Return $v_Ret
EndFunc;==>_MemRev

Func _MemAlloc($ah_Mem, $i_Size, $i_Address = 0, $i_AT = 4096, $i_Protect = 0x40)
    Switch @OSVersion
        Case "WIN_ME", "WIN_98", "WIN_95"
            $i_AT = BitOR($i_AT, 0x8000000); UNDOCUMENTED VA_SHARED
            $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAlloc', 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect)
        Case Else
            $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAllocEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect)
    EndSwitch
    Return $av_Alloc[0]
EndFunc;==>_MemAlloc

Func _MemFree($ah_Mem, $i_Address)
    Switch @OSVersion
        Case "WIN_ME", "WIN_98", "WIN_95"
            $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFree', 'int', $i_Address, 'int', 0, 'int', 0x8000)
        Case Else
            $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFreeEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', 0, 'int', 0x8000)
    EndSwitch
    Return $av_Free[0]
EndFunc;==>_MemFree

Func _MemText($ah_Mem, $s_Text)
    Local $i_Size = StringLen($s_Text) + 1
    Local $i_Addr = _MemAlloc($ah_Mem, $i_Size)
    _MemWrite($ah_Mem, $i_Addr, _MemCreate($s_Text))
    Return $i_Addr
EndFunc;==>_MemText

#endregion

ProcessSetPriority(@AutoItPID, 5)

;open
$i_Open = _MemOpen(@AutoItPID)

;RVA
$i = 0x401000

;byte pattern match
Dim $as_Match[18] = ['EB', '0D', '57', '53', 'FF', '75', '08', '6A', '00', 'FF', '15', '8B', '4D', '0C']

;progress
GUISetFont(9, 400, 0, 'Courier')
GUICreate("RVA Progress", 115, 30, (@DesktopWidth - 115) / 2, (@DesktopHeight - 31) / 2, -2134900736)
GUICtrlCreateLabel("Scanning:", 8, 9, 50, 20)
$h_Scan = GUICtrlCreateLabel("00000000", 60, 10, 55, 20)
GUISetState()

While 1
    
;Set progress
    GUICtrlSetData($h_Scan, Hex($i, 8))
    
;read code
    $ai_Code = _MemRead($i_Open, $i, 18)
    
;match the first 10
    For $x = 0 To 10
        If Hex($ai_Code[$x], 2) <> $as_Match[$x] Then ExitLoop
    Next
    
;if all matched
    If $x = 11 Then
        
;match the last 3
        For $x = 15 To 17
            If Hex($ai_Code[$x], 2) <> $as_Match[$x - 4] Then ExitLoop
        Next
        
;all matched
        If $x = 18 Then
            
;patch point
            Dim $i_Patch_Start = $i + 2
            
;return after hijack
            Dim $i_Patch_End = _MemRev($i + 9)
            
;Kernel32.MessageBoxA Offset
            Dim $i_Patch_MBoxA[4] = [$ai_Code[11], $ai_Code[12], $ai_Code[13], $ai_Code[14]]
            ExitLoop
        EndIf
        
    EndIf
    
;inc RVA
    $i += 1
    
WEnd

;delete gui
GUIDelete()

#cs
    0  00417806   /EB 0D                     JMP SHORT Mem_Hard.00417815
    2  00417808   |57                       PUSH EDI
    3  00417809   |53                       PUSH EBX
    4  0041780A   |FF75 08                 PUSH DWORD PTR SS:[EBP+8]
    7  0041780D   |6A 00                     PUSH 0
    9  0041780F   |FF15 BCEB4600             CALL NEAR DWORD PTR DS:[46EBBC]                ; USER32.MessageBoxA
    15 00417815   \8B4D 0C                 MOV ECX,DWORD PTR SS:[EBP+C]
#ce

;create string in memory & reverse the pointers for storing.
$i_Title = _MemText($i_Open, 'Hacked')
$i_Title_r = _MemRev($i_Title)

$i_Text = _MemText($i_Open, 'I Got Hijacked.')
$i_Text_r = _MemRev($i_Text)

; alloc
$i_Alloc = _MemAlloc($i_Open, 26)

; write the code
_MemWrite($i_Open, $i_Alloc, _MemCreate(0x6A, 0, _
        0x68, $i_Title_r[0], $i_Title_r[1], $i_Title_r[2], $i_Title_r[3], _
        0x68, $i_Text_r[0], $i_Text_r[1], $i_Text_r[2], $i_Text_r[3], _
        0x6A, 0, _
        0xFF, 0x15, $i_Patch_MBoxA[0], $i_Patch_MBoxA[1], $i_Patch_MBoxA[2], $i_Patch_MBoxA[3], _
        0x68, $i_Patch_End[0], $i_Patch_End[1], $i_Patch_End[2], $i_Patch_End[3], _
        0xC3))

;reverse the pointer
$ai_Rev = _MemRev($i_Alloc)

;redirect the code to our code.
_MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x68, $ai_Rev[0], $ai_Rev[1], $ai_Rev[2], $ai_Rev[3], 0xC3))

;spawn a msgbox
MsgBox(0, 'title', 'text')

;restore original
_MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x57, 0x53, 255, 0x75, 8, 0x6A))
_MemFree($i_Open, $i_Title)
_MemFree($i_Open, $i_Text)
_MemFree($i_Open, $i_Alloc)
_MemClose($i_Open)

;spawn a msgbox
MsgBox(0, 'title', 'text')
sorry... what does it do?
Link to comment
Share on other sites

  • Moderators

sorry... what does it do?

Errr... all I saw was it showing memory addresses, and then it says:::: I got hijacked! LMAO!!

Common sense plays a role in the basics of understanding AutoIt... If you're lacking in that, do us all a favor, and step away from the computer.

Link to comment
Share on other sites

Errr... all I saw was it showing memory addresses, and then it says:::: I got hijacked! LMAO!!

yeah, that's one of the lines that popped out at me in the code. I'm sure w0uter wouldn't be putting up bad stuff, but my luck today's the day Sim learned how to code and wrote a script to bruteforce W's password... :lmao:
Link to comment
Share on other sites

with I i ment the Messagebox

in the code there is 2x

;spawn a msgbox
MsgBox(0, 'title', 'text')

but the 1st messagebox is redirected to my own code.

its just an example of an search & replace memory patcher :lmao:

and Sim or another of his 100 aliasses cant code o:)

btw if i wanted to do harm i would have used an decription algoritm in asm and not plaintext ;)

Edited by w0uter

My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll

Link to comment
Share on other sites

I remember this.... :lmao: jerk that tries to make viruses. The ;) uses the logic that Microsoft should fix their code, and because microsoft's code has a bug in it, he makes it his DUTY IN LIFE to exploit it, and make everyone suffer. WHAT A o:) !!!!!!!

I'm directing this directly @ Sim, or what ever his/her name is: Do you get a feeling of being important by acting like this? You think: "Look how smart I am. I can take down a big giant of a company, and crash lots of PCs. I can steal people's stuff too. " All you end up doing is causing alot of people pain and lots of extra work cleaning up your mess. People like you should be shot, and left for dead.

:)

(sorry, :king: like that just ge me all :lol: )

Link to comment
Share on other sites

just ignore him and he will go away ...

posts like this only gets him happy.

but back to my code :lmao:

any thoughts on it ?

Edited by w0uter

My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll

Link to comment
Share on other sites

with I i ment the Messagebox

in the code there is 2x

;spawn a msgbox
MsgBox(0, 'title', 'text')

but the 1st messagebox is redirected to my own code.

its just an example of an search & replace memory patcher :lmao:

and Sim or another of his 100 aliasses cant code o:)

btw if i wanted to do harm i would have used an decription algoritm in asm and not plaintext ;)

right. i figured it was something along the same lines as the 'hacking autoit' post in scripts and scraps, but wanted to ask what it was before trying it just incase...
Link to comment
Share on other sites

you mean you couldnt see what it did by looking at the code :lmao:

i hadn't had my energy drinks this morning, and i was VERY 'blah'. That's why i wasn't posting, i couldn't make sense of other people's code at all. Smoke can vouch for me, he sent me something to check out, and i told him how much trouble i was having following it, even though it was all functions that i use all the time... Until i get my rockstar/monster fix, i'm just about retarded. After a few energy drinks, i get goofy, but EVERYTHING makes more sense...
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...