EPc (08-05-2012)
Ahh, so I have an old MPGH AVA Base1.dll file that worked up until the Aeria release of AVA, it contained skeleton chams, triggerbot, name change, superjump, norecoil, nospread, and crosshair.
So, if any of you coder pros know how to edit it, I can send you a copy and you can keep for all I care.
---------- Post added at 08:21 PM ---------- Previous post was at 08:20 PM ----------
Also, I can skype, raidcall, msn, and steam.
EPc (08-05-2012)
Send me it. I'll try. vitoavanzato@hotmail.it <--- this is me
i suppose you could extract each code line n rebuild it i think
things im working on
colour aimbot (possibly wireframe aimbot)finding a bypass for GameGuard (with constant updates)wallhackOPK
Darkstorm, as soon as I'm done playing on my desktop, being for some reason i can't send an email on laptop.
DarkSt0rmX (07-30-2012)
Lol what?
I know of no keylogger, but if so, can I send and you can scan, do you want me to scan it, what? I know for sure I haven't been hacked running it.
---------- Post added at 04:12 PM ---------- Previous post was at 04:01 PM ----------
MPGH AVA Base1.dll - Jotti's malware scan
https://www.virustotal.com/file/3743...is/1343678784/
There's your virus scans.
Maybe he gave up on watching the keylogs? Either way, I have auto-login, so maybe he couldn't log my keys?
---------- Post added at 04:35 PM ---------- Previous post was at 04:30 PM ----------
Ahh, I found it, here's what the virus scan shows with the WS.Reputation.1
[[KERNEL32.dll]]
Sleep, GetProcAddress, GetModuleHandleA, VirtualProtect, CreateThread, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, InterlockedCompareExchange, InterlockedExchange, DecodePointer, EncodePointer, IsProcessorFeaturePresent
[[MSVCR100.dll]]
strcpy_s, __3@YAXPAX@Z, mbstowcs_s, _vsnwprintf_s, strcat_s, wcscpy_s, fclose, __2@YAPAXI@Z, _unlock, fopen_s, _lock, _onexit, _malloc_crt, free, _encoded_null, _initterm_e, _amsg_exit, __CppXcptFilter, _crt_debugger_hook, _except_handler4_common, _terminate@@YAXXZ, __type_info_dtor_internal_method@type_info@@QAEXXZ , __clean_type_info_names_internal, __0exception@std@@QAE@ABV01@@Z, __0exception@std@@QAE@ABQBD@Z, __1exception@std@@UAE@XZ, _what@exception@std@@UBEPBDXZ, _stricmp, fread, _initterm, vsprintf_s, memset, __CxxFrameHandler3, _CxxThrowException, __dllonexit
[[USER32.dll]]
SetRect, GetAsyncKeyState, GetCursorPos, MessageBoxA
[[MSVCP100.dll]]
__Xlength_error@std@@YAXPBD@Z
________________________________________________
The keylogger would be GetAsyncKeyState, correct?
You can't just edit a .dll... You'd have to somehow get the code in it, and most of the time it's going to broken to shit.
Most virus scanners dont pick up keyloggers...
i have AVA_data_base 1 too and i never get baned.
just try try make this work again.
Someone work on this please