Aide admin server Unreal Tournament 99 Index du Forum
 Aide admin server Unreal Tournament 99 Index du ForumFAQRechercherS’enregistrerConnexion

BAN {W~M}La_Swiija ( Ne faisait plus parti de la team avant son BAN)

 
Poster un nouveau sujet   Répondre au sujet     Aide admin server Unreal Tournament 99 Index du Forum -> Servers -> Anti-Cheats
Sujet précédent :: Sujet suivant  
Auteur Message
*{Ы»$}*Shado49
Administrateur

Hors ligne

Inscrit le: 25 Sep 2007
Messages: 175
Date de naissance: 01/03/1983

MessagePosté le: Lun 8 Juin - 16:17 (2009)    Sujet du message: BAN {W~M}La_Swiija ( Ne faisait plus parti de la team avant son BAN) Répondre en citant

Voila  la Swiija Banned à vie pour  cheat..... 

ä été attraper sur un autre server.

[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: =92=LeRdi
[UTDCv21] Player IP........: 91.181.51.93
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-A1E223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 29-05-2009 / 18:49:33
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: =92=LeRdi
[UTDCv21] Player IP........: 91.181.51.93
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3A1/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 29-05-2009 / 18:49:34
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: =92=LeRdi
[UTDCv21] Player IP........: 91.181.51.93
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3A1/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 29-05-2009 / 18:49:13
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 20:35:27
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01268-FF5011DC/13144,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 20:35:28
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01268-FF5011DC/13144,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 20:35:31
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 20:35:41
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 20:35:41
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 19:00:21
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 19:00:22
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 19:00:35
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 19:00:35
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 18:43:40
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:43:45
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01268-FF5011DC/13144,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:43:49
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 18:43:54
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:43:54
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 18:36:51
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:36:51
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 18:37:05
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:37:05
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 18:22:46
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:22:47
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 18:23:00
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:23:00
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 18:06:14
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:06:15
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 18:06:28
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:06:28
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have corrupt memory
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Corruption hash..:
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,
[UTDCv21] Date/Time........: 27-05-2009 / 18:05:01
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:05:02
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01268-FF5011DC/13144,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:04:52
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Initial check
[UTDCv21] Altered addresses: 101030AD-BFE223E9?
[UTDCv21] Hook Match.......: h***** hook v1.0-v1.9
[UTDCv21] Date/Time........: 27-05-2009 / 18:04:49
[UTDCv21] +---------------------------------------------------+
[UTDCv21] +---------------------------------------------------+
[UTDCv21] Client have hooked functions
[UTDCv21] Player name......: >>>BOULOX<<<
[UTDCv21] Player IP........: 81.244.76.165
[UTDCv21] Client UT version: v.4.36
[UTDCv21] Client OS........: Microsoft Windows XPx32 5.1 (Build: 2600)
[UTDCv21] SoftDrv.dll MD5..: DA8D1C3FCD740E85185F11321AB5D3FF
[UTDCv21] Core.dll MD5.....: CCF104341C7452B06295D421167DBA95 (v4.36)
[UTDCv21] Engine.dll MD5...: 30E34C2A9E0EAB908C5DA6F322F4E2D7 (v4.36)
[UTDCv21] Render.dll MD5...: 6F18D6BB2B3DC12D0D2E5AD5CC66586B (v4.36)
[UTDCv21] Galaxy.dll MD5...: CB246E9A387CC002E6EA13264AC0DC08 (v4.36)
[UTDCv21] UTDCx.dll MD5....: E9DE0EE5B80D2CEAD8AC9436D3D5B014
[UTDCv21] MAC hash.........: 90BAD9AEF4D9A94394971837F61B4B95
[UTDCv21] Mem NTDLL image..: True
[UTDCv21] Server Received..: Client check
[UTDCv21] Altered addresses: 101030AC-E223E900/B72EE900,101030B0-B9E9F3BF/B9E90003,10B01268-FF5011DC/13144,10B01420-10B01267/CCCCCCCC,10B01424-FF5011DC/CCCCCCCC,
[UTDCv21] Hook Match.......: NoName v1.2
[UTDCv21] Date/Time........: 27-05-2009 / 18:04:49
[UTDCv21] +---------------------------------------------------+

LastPlayed[572]=81.244.76.165,DEB9904B2B4109274CCFA2268C525D7C,2009-05-27 20:36:12,>>>BOULOX<<<
LastPlayed[836]=91.177.67.96,DEB9904B2B4109274CCFA2268C525D7C,2009-05-25 21:44:17,Shukaku

Same as: IP: 91.180.112.213 Player: {W~M}La_Swiija


IP address: 81.244.76.165
Host name: 165.76-244-81.adsl-dyn.isp.belgacom.be

81.244.76.165 is from Belgium(BE) in region Western Europe
_________________




Revenir en haut
Publicité






MessagePosté le: Lun 8 Juin - 16:17 (2009)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet     Aide admin server Unreal Tournament 99 Index du Forum -> Servers -> Anti-Cheats Toutes les heures sont au format GMT + 2 Heures
Page 1 sur 1

 
Sauter vers:  

Portail | Index | Creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par : phpBB-fr.com