I would like to request a link of this file in the first post, very useful for other users!rencecute wrote:Thank you very much.noobotter wrote:
Here. http://www.mediafire.com/?8ib64n85fgr6tvw
Unpacked Clients for pRO with ways of finding hex codes
Moderators: waferbaron, Moderators
Forum rules
This server is currently not maintained and tables folder (including connection info) is outdated. Read the wiki for instructions on how to update those information. Please contribute your updated info. Contact Cozzie to join the team as a regular server supporter.
This server is currently not maintained and tables folder (including connection info) is outdated. Read the wiki for instructions on how to update those information. Please contribute your updated info. Contact Cozzie to join the team as a regular server supporter.
-
- The Kore Devil
- Posts: 672
- Joined: 22 Feb 2013, 03:40
- Noob?: No
- Location: The Netherlands
Re: Unpacked Clients for pRO with ways of finding hex codes
-
- Noob
- Posts: 2
- Joined: 29 Jan 2013, 11:56
- Noob?: No
Re: Unpacked Clients for pRO with ways of finding hex codes
is there any stripper application that works on Win8?


-
- Noob
- Posts: 3
- Joined: 29 Jan 2013, 09:40
- Noob?: Yes
Re: Unpacked Clients for pRO with ways of finding hex codes
There's a new RAGEXE in valk. And I can't seem to find the CODES. Does anyone knows the NEW HEX CODES? THANK IN ADVANCE.
-
- Moderators
- Posts: 139
- Joined: 31 Jul 2008, 22:12
- Noob?: No
Re: Unpacked Clients for pRO with ways of finding hex codes
Kindly check this page http://forums.openkore.com/viewtopic.ph ... &start=160 to see if the method is working for you.bodaday21 wrote:There's a new RAGEXE in valk. And I can't seem to find the CODES. Does anyone knows the NEW HEX CODES? THANK IN ADVANCE.
A storm is coming.
-
- Super Moderators
- Posts: 158
- Joined: 04 Apr 2008, 11:12
Re: Unpacked Clients for pRO with ways of finding hex codes
I have updated the first post. Thanks for keeping the topic running noobotter, been busy with work so hardly have time to check on updates to pRO server.
-
- Human
- Posts: 28
- Joined: 03 Jun 2012, 11:50
- Noob?: Yes
Re: Unpacked Clients for pRO with ways of finding hex codes
Norton detects the file as suspicious.cloud.2.. Any idea why? or just false positiveRaider wrote:I would like to request a link of this file in the first post, very useful for other users!rencecute wrote:Thank you very much.noobotter wrote:
Here. http://www.mediafire.com/?8ib64n85fgr6tvw
-
- Noob
- Posts: 10
- Joined: 23 Jan 2013, 22:08
- Noob?: No
Re: Unpacked Clients for pRO with ways of finding hex codes
that isn't working and you can't find that codes on the new exe. I have also saw that the codes in kernel and gdi are varying. Because i was performing hexing procedures last night and today with a new exe, and i was surprise when the code are not the same. I dont know if this normal. I had disassemble the new exe last night and today, and the codes are not the same. What would be the solution for this?noobotter wrote:Kindly check this page http://forums.openkore.com/viewtopic.ph ... &start=160 to see if the method is working for you.bodaday21 wrote:There's a new RAGEXE in valk. And I can't seem to find the CODES. Does anyone knows the NEW HEX CODES? THANK IN ADVANCE.
-
- Moderators
- Posts: 139
- Joined: 31 Jul 2008, 22:12
- Noob?: No
Re: Unpacked Clients for pRO with ways of finding hex codes
Just false detection.vhonn wrote: Norton detects the file as suspicious.cloud.2.. Any idea why? or just false positive
The codes are different because the client used as an example on that procedure is old.rpacx wrote: that isn't working and you can't find that codes on the new exe. I have also saw that the codes in kernel and gdi are varying. Because i was performing hexing procedures last night and today with a new exe, and i was surprise when the code are not the same. I dont know if this normal. I had disassemble the new exe last night and today, and the codes are not the same. What would be the solution for this?
You should follow the same method used on that and apply on the exe that you have right now.
A storm is coming.
-
- Noob
- Posts: 10
- Joined: 23 Jan 2013, 22:08
- Noob?: No
Re: Unpacked Clients for pRO with ways of finding hex codes
rpacx wrote: that isn't working and you can't find that codes on the new exe. I have also saw that the codes in kernel and gdi are varying. Because i was performing hexing procedures last night and today with a new exe, and i was surprise when the code are not the same. I dont know if this normal. I had disassemble the new exe last night and today, and the codes are not the same. What would be the solution for this?
forgot to mention that i have used the same method, and unfortunately it was not working. i saw this on your post:noobotter wrote: The codes are different because the client used as an example on that procedure is old.
You should follow the same method used on that and apply on the exe that you have right now.
Search:
85 C0 74 07 C6 05 EF 6B 96 00 01 33 DB
Replace:
85 C0 EB 07 C6 05 5E F6 B9 00 01 33 DB
i thought that only the "74" will change with "EB" . What is the meaning of that code highlighted and why is that change?
-
- Moderators
- Posts: 139
- Joined: 31 Jul 2008, 22:12
- Noob?: No
Re: Unpacked Clients for pRO with ways of finding hex codes
That's not my original post. I just quoted heero's previous method about that.rpacx wrote: forgot to mention that i have used the same method, and unfortunately it was not working. i saw this on your post:
Search:
85 C0 74 07 C6 05 EF 6B 96 00 01 33 DB
Replace:
85 C0 EB 07 C6 05 5E F6 B9 00 01 33 DB
i thought that only the "74" will change with "EB" . What is the meaning of that code highlighted and why is that change?
The change from 74 to EB is a change to JMP in assembly language.
I don't know why there's a change on that bold letters though.
The codes I've posted are these:
Kindly try these codes first and see if it's still working.search:
85 c0 74 07 c6 05 e7 a2 98 00 01 33 db
replace:
85 c0 eb 07 c6 05 e7 a2 98 00 01 33 db
search:
85 c0 0f 85 d1 00 00 00 0f be 05 19 fe 89 00
replace:
85 c0 90 90 90 90 90 90 0f be 05 19 fe 89 00
search:
e8 42 27 dd ff 3b c6 74 75
replace:
90 90 90 90 90 90 90 90 90

A storm is coming.