Forgotmylogin's 1.24b maphack

This is a discussion on Forgotmylogin's 1.24b maphack within the Warcraft 3 Hacks, bots and tools board part of the Warcraft 3 forum category; open garena then wc3 then double click this...

Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 33
  1. #11
    gobackss is offline Wannabe Member
    Array
    Join Date
    Sep 2009
    Posts
    11
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    9
    Reputation
    1
    open garena then wc3 then double click this


  2. #12
    CerberPl is offline Newbie
    Array
    Join Date
    Jan 2009
    Posts
    5
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    9
    Reputation
    2
    Thanks for opensource ! Could you add comments which offset do what ?
    Thanks

  3. The Following User Says Thank You to CerberPl For This Useful Post:


  4. #13
    WaitForUfo's Avatar
    WaitForUfo is offline KING OF ROC
    Array
    Join Date
    Jun 2007
    Posts
    729
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    11
    Reputation
    131
    Quote Originally Posted by Wolfszorn View Post
    So he is spreading trojans over d3scene?

    anyways, how to compile this code ?
    Last edited by WaitForUfo; 09-15-2009 at 12:48 PM.

  5. #14
    Serverman's Avatar
    Serverman is offline Paranoia!

    Array
    Join Date
    Jan 2008
    Posts
    3,449
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    17
    Reputation
    1301
    if you dont trust him, compile the code yourself
    My car is not leaking oil?
    Its marking its territory!

  6. #15
    dwu89 is offline Newbie
    Array
    Join Date
    Jan 2009
    Posts
    1
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    0
    Reputation
    0
    It doesn't work. It just say "This doesn't work" and my Mcfee comes with a pop up detecting trojan horse. Lame-.-

  7. #16
    ozot's Avatar
    ozot is offline Addict
    Array
    Join Date
    Mar 2009
    Location
    Latvie
    Posts
    50
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    9
    Reputation
    2
    make for windows vista plz

  8. #17
    ShadoW_DragoN is offline Wannabe Member
    Array
    Join Date
    Mar 2009
    Posts
    17
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    0
    Reputation
    0
    Oh YA!
    This is a good job!
    Very thank [email protected]@

  9. #18
    Wolfszorn's Avatar
    Wolfszorn is offline Advanced Hacker
    Array
    Join Date
    Sep 2007
    Posts
    318
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    12
    Reputation
    212
    Quote Originally Posted by WaitForUfo View Post
    So he is spreading trojans over d3scene?

    anyways, how to compile this code ?
    I just posted it, i never said its a trojan. Better read next time before posting.

    How to compile? Maybe with a compiler? Google Yourself

  10. #19
    Ojciec Dyrektor's Avatar
    Ojciec Dyrektor is offline Guru
    Array
    Join Date
    Feb 2007
    Location
    P(r)oland
    Posts
    80
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    11
    Reputation
    18
    [################################################## ###########################]
    Analysis Report for forgotmylogin1.24b.exe
    MD5: d3fcdfb61b09c4aad8c347a6276480b8
    [################################################## ###########################]

    Summary:
    - Performs File Modification and Destruction:
    The executable modifiesand destructs files which are not temporary.

    - Performs Registry Activities:
    The executable reads and modifies registry values. It also creates and
    monitors registry keys.


    [================================================== ===========================]
    Table of Contents
    [================================================== ===========================]

    - General information
    - forgotmylogin1.24b.exe
    a) Registry Activities
    b) File Activities
    c) Other Activities



    [################################################## ###########################]
    1. General Information
    [################################################## ###########################]
    [================================================== ===========================]
    Information about Anubis' invocation
    [================================================== ===========================]
    Time needed: 40 s
    Report created: 09/15/09, 060:09 UTC
    Termination reason: All tracked processes have exited
    Program version: 1.72.0


    [################################################## ###########################]
    2. forgotmylogin1.24b.exe
    [################################################## ###########################]
    [================================================== ===========================]
    General information about this executable
    [================================================== ===========================]
    Analysis Reason: Primary Analysis Subject
    Filename: forgotmylogin1.24b.exe
    MD5: d3fcdfb61b09c4aad8c347a6276480b8
    SHA-1: f7210cd183f17fdf14e99f75a00db9719ca675aa
    File Size: 1284337 Bytes
    Command Line: "C:\forgotmylogin1.24b.exe"
    Process-status
    at analysis end: dead
    Exit Code: 0

    [================================================== ===========================]
    Load-time Dlls
    [================================================== ===========================]
    Module Name: [ C:\WINDOWS\system32\ntdll.dll ],
    Base Address: [0x7C900000 ], Size: [0x000AF000 ]
    Module Name: [ C:\WINDOWS\system32\kernel32.dll ],
    Base Address: [0x7C800000 ], Size: [0x000F6000 ]
    Module Name: [ C:\WINDOWS\system32\ADVAPI32.DLL ],
    Base Address: [0x77DD0000 ], Size: [0x0009B000 ]
    Module Name: [ C:\WINDOWS\system32\RPCRT4.dll ],
    Base Address: [0x77E70000 ], Size: [0x00092000 ]
    Module Name: [ C:\WINDOWS\system32\Secur32.dll ],
    Base Address: [0x77FE0000 ], Size: [0x00011000 ]
    Module Name: [ C:\WINDOWS\system32\msvcrt.dll ],
    Base Address: [0x77C10000 ], Size: [0x00058000 ]
    Module Name: [ C:\WINDOWS\system32\USER32.dll ],
    Base Address: [0x7E410000 ], Size: [0x00091000 ]
    Module Name: [ C:\WINDOWS\system32\GDI32.dll ],
    Base Address: [0x77F10000 ], Size: [0x00049000 ]

    [================================================== ===========================]
    Run-time Dlls
    [================================================== ===========================]
    Module Name: [ C:\WINDOWS\system32\MSCTF.dll ],
    Base Address: [0x74720000 ], Size: [0x0004C000 ]

    [================================================== ===========================]
    Ikarus Virus Scanner
    [================================================== ===========================]
    Trojan.Win32.Agent (Sig-Id: 457078)

    [================================================== ===========================]
    Popups
    [================================================== ===========================]
    Window Name:
    Displayed Times: 1
    Window Text:
    OK
    It didn't work for some reason. disable uac, run as admin, l2p etc etc



    [================================================== ===========================]
    2.a) forgotmylogin1.24b.exe - Registry Activities
    [================================================== ===========================]
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Registry Values Read:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Key: [ HKLM\SOFTWARE\Microsoft\CTF\SystemShared\ ],
    Value Name: [ CUAS ], Value: [ 0 ], 1 time
    Key: [ HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows ],
    Value Name: [ AppInit_DLLs ], Value: [ ], 1 time
    Key: [ HKLM\Software\Policies\Microsoft\Windows\Safer\Cod eIdentifiers ],
    Value Name: [ TransparentEnabled ], Value: [ 1 ], 1 time
    Key: [ HKLM\System\CurrentControlSet\Control\ComputerName \ActiveComputerName ],
    Value Name: [ ComputerName ], Value: [ PC ], 1 time
    Key: [ HKLM\System\CurrentControlSet\Control\Terminal Server ],
    Value Name: [ TSAppCompat ], Value: [ 0 ], 3 times
    Key: [ HKLM\System\CurrentControlSet\Control\Terminal Server ],
    Value Name: [ TSUserEnabled ], Value: [ 0 ], 1 time
    Key: [ HKU\S-1-5-21-842925246-1425521274-308236825-500\Keyboard Layout\Toggle ],
    Value Name: [ Language Hotkey ], Value: [ 1 ], 4 times
    Key: [ HKU\S-1-5-21-842925246-1425521274-308236825-500\Keyboard Layout\Toggle ],
    Value Name: [ Layout Hotkey ], Value: [ 2 ], 4 times



    [================================================== ===========================]
    2.b) forgotmylogin1.24b.exe - File Activities
    [================================================== ===========================]
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Files Read:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    File Name: [ C:\forgotmylogin1.24b.exe ]
    File Name: [ PIPE\lsarpc ]

    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Files Modified:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    File Name: [ PIPE\lsarpc ]

    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    File System Control Communication:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    File: [ C:\ ], Control Code: [ 0x00090028 ], 1 time
    File: [ PIPE\lsarpc ], Control Code: [ 0x0011C017 ], 3 times

    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Memory Mapped Files:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    File Name: [ C:\WINDOWS\system32\MSCTF.dll ]
    File Name: [ C:\WINDOWS\system32\imm32.dll ]

    [================================================== ===========================]
    2.c) forgotmylogin1.24b.exe - Other Activities
    [================================================== ===========================]
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Mutexes Created:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Mutex: [ CTF.Asm.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ]
    Mutex: [ CTF.Compart.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ]
    Mutex: [ CTF.LBES.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ]
    Mutex: [ CTF.Layouts.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ]
    Mutex: [ CTF.TMD.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ]
    Mutex: [ CTF.TimListCache.FMPDefaultS-1-5-21-842925246-1425521274-308236825-500MUTEX.DefaultS-1-5-21-842925246-1425521274-308236825-500 ]
    Mutex: [ MSCTF.Shared.MUTEX.IM ]

    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Keyboard Keys Monitored:
    [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=]
    Virtual Key Code: [ VK_MENU (18) ], 4 times
    Virtual Key Code: [ VK_CONTROL (17) ], 4 times
    Virtual Key Code: [ VK_SHIFT (16) ], 4 times
    Virtual Key Code: [ VK_LWIN (91) ], 4 times
    Virtual Key Code: [ VK_RWIN (92) ], 4 times





    [################################################## ###########################]
    International Secure Systems Lab
    International Secure System Lab

    Vienna University of Technology Eurecom France UC Santa Barbara
    TUWIEN Home EURECOM - Communication Systems - EURECOM Ecole d'Ingénieurs et Centre de Recherche Department of Computer Science

    Contact: [email protected]



    DONT DL IT !!!

  11. #20
    BongToke's Avatar
    BongToke is offline Member
    Array
    Join Date
    Aug 2009
    Posts
    32
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Rep Power
    9
    Reputation
    48
    Forgot my login why don't you mention that you stole my original offsets from cracked version of AchyMap which you tried to post yesterday. I offered to help you understand warden and you never replied, yet you claim it took you a week of work to steal my offsets and put them in a script? I can do that in 10 minutes.

    Absolutely 100% Pathetic
    Last edited by BongToke; 09-15-2009 at 04:53 PM.

  12. The Following User Says Thank You to BongToke For This Useful Post:


Page 2 of 4 FirstFirst 1234 LastLast

Similar Threads

  1. Shadowfrench maphack
    By hendricius in forum Warcraft 3 Hacks, bots and tools
    Replies: 29
    Last Post: 11-12-2008, 12:20 AM
  2. Warcraft 3 maphack
    By hendricius in forum Warcraft 3 Hacks, bots and tools
    Replies: 88
    Last Post: 08-22-2008, 06:44 PM
  3. MousePad's Maphack 7.2 [CRACKED]
    By xHack in forum Diablo 2 Hacks
    Replies: 3
    Last Post: 08-01-2008, 08:13 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •