Jump to content

Recommended Posts

Posted

I wasent pushing.

I downloaded the program i configured it to use cp  pots then set a delay betwen every cp pot.

And assign a key that i press to activate the program.

Thats it but i lost the program when i formated my pc a few months ago.

  • 2 weeks later...
Posted

I wasent pushing.

I downloaded the program i configured it to use cp  pots then set a delay betwen every cp pot.

And assign a key that i press to activate the program.

Thats it but i lost the program when i formated my pc a few months ago.

Can u tell us the name of this program?Or find it again?I am interesting on it

Thx

Posted

I wasent pushing.

I downloaded the program i configured it to use cp  pots then set a delay betwen every cp pot.

And assign a key that i press to activate the program.

Thats it but i lost the program when i formated my pc a few months ago.

 

I could really need help with the name of the program aswell, That's what I need.

 

Cheers

  • 3 weeks later...
Posted

I wasent pushing.

I downloaded the program i configured it to use cp  pots then set a delay betwen every cp pot.

And assign a key that i press to activate the program.

Thats it but i lost the program when i formated my pc a few months ago.

 

and can u tell us what program is?

Posted

I wasent pushing.

I downloaded the program i configured it to use cp  pots then set a delay betwen every cp pot.

And assign a key that i press to activate the program.

Thats it but i lost the program when i formated my pc a few months ago.

 

formated u'r pc...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.




  • Posts

    • The guy is a scam. I've paid him for launcher and logo, after 2 months he did not delivered anything and stopped responding on Skype. Do not trust this guy.
    • Get in touch via Discord, I created the autofarm you are looking for.   discord: admkelly
    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy               Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
  • Topics

×
×
  • Create New...