eNT Posted July 29, 2006 Posted July 29, 2006 Hi, sry if some1 already posted this. This is a link for c4 full l2off files (not c1 modded). http://trancedimension.net/PP-IRC-C4Retail.html As i know, these are the same files, what were leaked from chinese retail, and the same files, what l2 paradise bought for 10k$. Kaspersky found trojans in 3 .exe files. I dont know if this was a real trojan or a fake alert, but the geodata folder's size is 200mb. Sry if this is a fake, or if some1 posted this before. GL and HF megaupload: http://www.megaupload.com/?d=IUAF1DFR various mirrors: http://thruth.free.fr/getc4.htm
Maxtor Posted July 31, 2006 Posted July 31, 2006 Very nice share. By the way, be careful with those "exe" .
TofA Posted July 31, 2006 Posted July 31, 2006 Very nice, what can we do with those .exe's, can we run it without them?
DoNkY Posted August 1, 2006 Posted August 1, 2006 yea,in some servers,which aren't full c4 you can run without them,but in servers,which are full c4,no you can't
eNT Posted August 1, 2006 Author Posted August 1, 2006 If i am right, u can run server without them, this isn't a real problem. The real problem is npc server. These files have problems with it. It can be online only a few mins and after what it crashes. Some ppl said me, what L2 paradise have modified some of the ai data, so the npc server can now be online for about few hours and after what it still crashes.
DoNkY Posted August 1, 2006 Posted August 1, 2006 You mean the server was full c4 and you didn't used all full c4 files?
TofA Posted August 1, 2006 Posted August 1, 2006 Have anybody tried this ? method to find the KEY, could be used to find AUTHD too: required software:SOFTICE, SPY_CAPTURE Theory: because keying in the wrong key would return to the message window thus using WM_GETTEXT and WM_COMMAND to debug it, we could analyze the asm and hex code to derive the key. Use: 1.Open L2AuthD_60215, use SPY_CAPTURE to find the main window, click on OK BUTTON as well as TEXTLABLE line break subsequently as: handle:001401DC;handle:003E03A4;handle:0023045A. 2.Open SOFTICE, include L2AuthD_60215's entry point 3.key in the debug command: a.debug button:BMSG 003E03A4 WM_COMMAND b.debug text:BMSG 0023045A WM_GETTEXT c.debug sequenece code:BMSG 001401DC WM_GETTEXT 4.press F5 to run sequence 5.record the hex after "[]" (16 byte) 6.take this hex and convert it into (base10 i think) 7.KEY in this key SUCCESS~~~~~ hope everybody could find the real key after some tries... Cached : audhaudhuahdasdhuadhuahduashd
eNT Posted August 1, 2006 Author Posted August 1, 2006 You mean the server was full c4 and you didn't used all full c4 files? I am not the developer. I dont own any server. I just found the link and shared it. I think, what these files are just third party programs, except the l2comm.exe , but there is another version of this file: L2comm_cr.exe . I think u can use the L2comm_cr.exe instead of l2comm.exe. Sry if i am wrong, as i said, i am not the server owner and i understand only a bit of server files usage.
eNT Posted August 1, 2006 Author Posted August 1, 2006 BTW the old link is broken. I have edited my first post and added the new link.
kenshin52 Posted August 6, 2006 Posted August 6, 2006 ppl this share is retail pts server files with bugged ai also the protocol of the exe doesnt match rly so u have to modify it but anyways good share and good luck with them But these files arent full retail c4 serverfiles topic name is wrong :D PS: 2 exe has backdoorprogramms(delete them)
Rot0raS Posted August 6, 2006 Posted August 6, 2006 Full C4? Nice JOb my friend but... I am afraid of viruses!
vis Posted August 14, 2006 Posted August 14, 2006 screw those backdoors, I'm planning a format anyways :d I just wanted to ask, if I can run this with warmasters guide ?
lindo Posted October 7, 2006 Posted October 7, 2006 Can anybody Fix them up and post them? Take the trojans and etc...
Kengurius Posted October 9, 2006 Posted October 9, 2006 what wyrus it founds ? Execrypt (modification) if yes or something simillar is just Crypted exe, its not a wyrus
Recommended Posts