Results 1 to 1 of 1
  1. #1
    hamburger
    hamburger is offline
    New member
    Join Date
    2012 Jul
    Posts
    21
    Thanks
    1
    Thanked 3 Times in 2 Posts
    Rep Power
    0

    [NomadMemory.au3]

    Hello its not my Libary but i edited it a bit so it got some updated and usfull new functions. Enjoy Credits are in the File!



    Code:
    #include-once
    #include<winapi.au3>
    #include<Memory.au3>
    #region _Memory
    ;==================================================================================
    ; AutoIt Version:	3.1.127 (beta)
    ; Language:			English
    ; Platform:			All Windows
    ; Author:			Nomad
    ; Requirements:		These functions will only work with beta.
    ;==================================================================================
    ; Credits:	wOuter - These functions are based on his original _Mem() functions.
    ;			But they are easier to comprehend and more reliable.  These
    ;			functions are in no way a direct copy of his functions.  His
    ;			functions only provided a foundation from which these evolved.
    ;==================================================================================
    ;
    ; Functions:
    ;
    ;==================================================================================
    ; Function:			_MemoryOpen($iv_Pid[, $iv_DesiredAccess[, $iv_InheritHandle]])
    ; Description:		Opens a process and enables all possible access rights to the
    ;					process.  The Process ID of the process is used to specify which
    ;					process to open.  You must call this function before calling
    ;					_MemoryClose(), _MemoryRead(), or _MemoryWrite().
    ; Parameter(s):		$iv_Pid - The Process ID of the program you want to open.
    ;					$iv_DesiredAccess - (optional) Set to 0x1F0FFF by default, which
    ;										enables all possible access rights to the
    ;										process specified by the Process ID.
    ;					$iv_InheritHandle - (optional) If this value is TRUE, all processes
    ;										created by this process will inherit the access
    ;										handle.  Set to 1 (TRUE) by default.  Set to 0
    ;										if you want it FALSE.
    ; Requirement(s):	None.
    ; Return Value(s): 	On Success - Returns an array containing the Dll handle and an
    ;								 open handle to the specified process.
    ;					On Failure - Returns 0
    ;					@Error - 0 = No error.
    ;							 1 = Invalid $iv_Pid.
    ;							 2 = Failed to open Kernel32.dll.
    ;							 3 = Failed to open the specified process.
    ; Author(s):		Nomad
    ; Note(s):
    ;==================================================================================
    Func _MemoryOpen($iv_Pid, $iv_DesiredAccess = 0x1F0FFF, $iv_InheritHandle = 1)
    
    	If Not ProcessExists($iv_Pid) Then
    		SetError(1)
            Return 0
    	EndIf
    
    	Local $ah_Handle[2] = [DllOpen('kernel32.dll')]
    
    	If @Error Then
            SetError(2)
            Return 0
        EndIf
    
    	Local $av_OpenProcess = DllCall($ah_Handle[0], 'int', 'OpenProcess', 'int', $iv_DesiredAccess, 'int', $iv_InheritHandle, 'int', $iv_Pid)
    
    	If @Error Then
            DllClose($ah_Handle[0])
            SetError(3)
            Return 0
        EndIf
    
    	$ah_Handle[1] = $av_OpenProcess[0]
    
    	Return $ah_Handle
    
    EndFunc
    
    ;==================================================================================
    ; Function:			_MemoryRead($iv_Address, $ah_Handle[, $sv_Type])
    ; Description:		Reads the value located in the memory address specified.
    ; Parameter(s):		$iv_Address - The memory address you want to read from. It must
    ;								  be in hex format (0x00000000).
    ;					$ah_Handle - An array containing the Dll handle and the handle
    ;								 of the open process as returned by _MemoryOpen().
    ;					$sv_Type - (optional) The "Type" of value you intend to read.
    ;								This is set to 'dword'(32bit(4byte) signed integer)
    ;								by default.  See the help file for DllStructCreate
    ;								for all types.  An example: If you want to read a
    ;								word that is 15 characters in length, you would use
    ;								'char[16]' since a 'char' is 8 bits (1 byte) in size.
    ; Return Value(s):	On Success - Returns the value located at the specified address.
    ;					On Failure - Returns 0
    ;					@Error - 0 = No error.
    ;							 1 = Invalid $ah_Handle.
    ;							 2 = $sv_Type was not a string.
    ;							 3 = $sv_Type is an unknown data type.
    ;							 4 = Failed to allocate the memory needed for the DllStructure.
    ;							 5 = Error allocating memory for $sv_Type.
    ;							 6 = Failed to read from the specified process.
    ; Author(s):		Nomad
    ; Note(s):			Values returned are in Decimal format, unless specified as a
    ;					'char' type, then they are returned in ASCII format.  Also note
    ;					that size ('char[size]') for all 'char' types should be 1
    ;					greater than the actual size.
    ;==================================================================================
    Func _MemoryRead($iv_Address, $ah_Handle, $sv_Type = 'dword')
    
    	If Not IsArray($ah_Handle) Then
    		SetError(1)
            Return 0
    	EndIf
    
    	Local $v_Buffer = DllStructCreate($sv_Type)
    
    	If @Error Then
    		SetError(@Error + 1)
    		Return 0
    	EndIf
    
    	DllCall($ah_Handle[0], 'int', 'ReadProcessMemory', 'int', $ah_Handle[1], 'int', $iv_Address, 'ptr', DllStructGetPtr($v_Buffer), 'int', DllStructGetSize($v_Buffer), 'int', '')
    
    	If Not @Error Then
    		Local $v_Value = DllStructGetData($v_Buffer, 1)
    		Return $v_Value
    	Else
    		SetError(6)
            Return 0
    	EndIf
    
    EndFunc
    
    ;==================================================================================
    ; Function:			_MemoryWrite($iv_Address, $ah_Handle, $v_Data[, $sv_Type])
    ; Description:		Writes data to the specified memory address.
    ; Parameter(s):		$iv_Address - The memory address which you want to write to.
    ;								  It must be in hex format (0x00000000).
    ;					$ah_Handle - An array containing the Dll handle and the handle
    ;								 of the open process as returned by _MemoryOpen().
    ;					$v_Data - The data to be written.
    ;					$sv_Type - (optional) The "Type" of value you intend to write.
    ;								This is set to 'dword'(32bit(4byte) signed integer)
    ;								by default.  See the help file for DllStructCreate
    ;								for all types.  An example: If you want to write a
    ;								word that is 15 characters in length, you would use
    ;								'char[16]' since a 'char' is 8 bits (1 byte) in size.
    ; Return Value(s):	On Success - Returns 1
    ;					On Failure - Returns 0
    ;					@Error - 0 = No error.
    ;							 1 = Invalid $ah_Handle.
    ;							 2 = $sv_Type was not a string.
    ;							 3 = $sv_Type is an unknown data type.
    ;							 4 = Failed to allocate the memory needed for the DllStructure.
    ;							 5 = Error allocating memory for $sv_Type.
    ;							 6 = $v_Data is not in the proper format to be used with the
    ;								 "Type" selected for $sv_Type, or it is out of range.
    ;							 7 = Failed to write to the specified process.
    ; Author(s):		Nomad
    ; Note(s):			Values sent must be in Decimal format, unless specified as a
    ;					'char' type, then they must be in ASCII format.  Also note
    ;					that size ('char[size]') for all 'char' types should be 1
    ;					greater than the actual size.
    ;==================================================================================
    Func _MemoryWrite($iv_Address, $ah_Handle, $v_Data, $sv_Type = 'dword')
    
    	If Not IsArray($ah_Handle) Then
    		SetError(1)
            Return 0
    	EndIf
    
    	Local $v_Buffer = DllStructCreate($sv_Type)
    
    	If @Error Then
    		SetError(@Error + 1)
    		Return 0
    	Else
    		DllStructSetData($v_Buffer, 1, $v_Data)
    		If @Error Then
    			SetError(6)
    			Return 0
    		EndIf
    	EndIf
    
    	DllCall($ah_Handle[0], 'int', 'WriteProcessMemory', 'int', $ah_Handle[1], 'int', $iv_Address, 'ptr', DllStructGetPtr($v_Buffer), 'int', DllStructGetSize($v_Buffer), 'int', '')
    
    	If Not @Error Then
    		Return 1
    	Else
    		SetError(7)
            Return 0
    	EndIf
    
    EndFunc
    
    ;==================================================================================
    ; Function:			_MemoryClose($ah_Handle)
    ; Description:		Closes the process handle opened by using _MemoryOpen().
    ; Parameter(s):		$ah_Handle - An array containing the Dll handle and the handle
    ;								 of the open process as returned by _MemoryOpen().
    ; Return Value(s):	On Success - Returns 1
    ;					On Failure - Returns 0
    ;					@Error - 0 = No error.
    ;							 1 = Invalid $ah_Handle.
    ;							 2 = Unable to close the process handle.
    ; Author(s):		Nomad
    ; Note(s):
    ;==================================================================================
    Func _MemoryClose($ah_Handle)
    
    	If Not IsArray($ah_Handle) Then
    		SetError(1)
            Return 0
    	EndIf
    
    	DllCall($ah_Handle[0], 'int', 'CloseHandle', 'int', $ah_Handle[1])
    	If Not @Error Then
    		DllClose($ah_Handle[0])
    		Return 1
    	Else
    		DllClose($ah_Handle[0])
    		SetError(2)
            Return 0
    	EndIf
    
    EndFunc
    
    ;==================================================================================
    ; Function:			SetPrivilege( $privilege, $bEnable )
    ; Description:		Enables (or disables) the $privilege on the current process
    ;                   (Probably) requires administrator privileges to run
    ;
    ; Author(s):		Larry (from autoitscript.com's Forum)
    ; Notes(s):
    ; http://www.autoitscript.com/forum/index.php?s=&showtopic=31248&view=findpost&p=223999
    ;==================================================================================
    
    Func SetPrivilege( $privilege, $bEnable )
        $MY_TOKEN_ADJUST_PRIVILEGES = 0x0020
        $MY_TOKEN_QUERY = 0x0008
        $MY_SE_PRIVILEGE_ENABLED = 0x0002
        Local $hToken, $SP_auxret, $SP_ret, $hCurrProcess, $nTokens, $nTokenIndex, $priv
        $nTokens = 1
        $LUID = DLLStructCreate("dword;int")
        If IsArray($privilege) Then    $nTokens = UBound($privilege)
        $TOKEN_PRIVILEGES = DLLStructCreate("dword;dword[" & (3 * $nTokens) & "]")
        $NEWTOKEN_PRIVILEGES = DLLStructCreate("dword;dword[" & (3 * $nTokens) & "]")
        $hCurrProcess = DLLCall("kernel32.dll","hwnd","GetCurrentProcess")
        $SP_auxret = DLLCall("advapi32.dll","int","OpenProcessToken","hwnd",$hCurrProcess[0],   _
                "int",BitOR($MY_TOKEN_ADJUST_PRIVILEGES,$MY_TOKEN_QUERY),"int*",0)
        If $SP_auxret[0] Then
            $hToken = $SP_auxret[3]
            DLLStructSetData($TOKEN_PRIVILEGES,1,1)
            $nTokenIndex = 1
            While $nTokenIndex <= $nTokens
                If IsArray($privilege) Then
                    $priv = $privilege[$nTokenIndex-1]
                Else
                    $priv = $privilege
                EndIf
                $ret = DLLCall("advapi32.dll","int","LookupPrivilegeValue","str","","str",$priv,   _
                        "ptr",DLLStructGetPtr($LUID))
                If $ret[0] Then
                    If $bEnable Then
                        DLLStructSetData($TOKEN_PRIVILEGES,2,$MY_SE_PRIVILEGE_ENABLED,(3 * $nTokenIndex))
                    Else
                        DLLStructSetData($TOKEN_PRIVILEGES,2,0,(3 * $nTokenIndex))
                    EndIf
                    DLLStructSetData($TOKEN_PRIVILEGES,2,DllStructGetData($LUID,1),(3 * ($nTokenIndex-1)) + 1)
                    DLLStructSetData($TOKEN_PRIVILEGES,2,DllStructGetData($LUID,2),(3 * ($nTokenIndex-1)) + 2)
                    DLLStructSetData($LUID,1,0)
                    DLLStructSetData($LUID,2,0)
                EndIf
                $nTokenIndex += 1
            WEnd
            $ret = DLLCall("advapi32.dll","int","AdjustTokenPrivileges","hwnd",$hToken,"int",0,   _
                    "ptr",DllStructGetPtr($TOKEN_PRIVILEGES),"int",DllStructGetSize($NEWTOKEN_PRIVILEGES),   _
                    "ptr",DllStructGetPtr($NEWTOKEN_PRIVILEGES),"int*",0)
            $f = DLLCall("kernel32.dll","int","GetLastError")
        EndIf
        $NEWTOKEN_PRIVILEGES=0
        $TOKEN_PRIVILEGES=0
        $LUID=0
        If $SP_auxret[0] = 0 Then Return 0
        $SP_auxret = DLLCall("kernel32.dll","int","CloseHandle","hwnd",$hToken)
        If Not $ret[0] And Not $SP_auxret[0] Then Return 0
        return $ret[0]
    EndFunc   ;==>SetPrivilege
    
    ;===================================================================================================
    ; Function........:  _MemoryGetBaseAddress($ah_Handle, $iHD)
    ;
    ; Description.....:  Reads the 'Allocation Base' from the open process.
    ;
    ; Parameter(s)....:  $ah_Handle - An array containing the Dll handle and the handle of the open
    ;                                 process as returned by _MemoryOpen().
    ;                    $iHD - Return type:
    ;                       |0 = Hex (Default)
    ;                       |1 = Dec
    ;
    ; Requirement(s)..:  A valid process ID.
    ;
    ; Return Value(s).:  On Success - Returns the 'allocation Base' address and sets @Error to 0.
    ;                    On Failure - Returns 0 and sets @Error to:
    ;                       |1 = Invalid $ah_Handle.
    ;                       |2 = Failed to find correct allocation address.
    ;                       |3 = Failed to read from the specified process.
    ;
    ; Author(s).......:  Nomad. Szhlopp.
    ; URL.............:  http://www.autoitscript.com/forum/index.php?showtopic=78834
    ; Note(s).........:  Go to Www.CheatEngine.org for the latest version of CheatEngine.
    ;===================================================================================================
    Func _MemoryGetBaseAddress($ah_Handle, $iHexDec = 0)
    
        Local $iv_Address = 0x00100000
        Local $v_Buffer = DllStructCreate('dword;dword;dword;dword;dword;dword;dword')
        Local $vData
        Local $vType
    
        If Not IsArray($ah_Handle) Then
            SetError(1)
            Return 0
        EndIf
    
    
        DllCall($ah_Handle[0], 'int', 'VirtualQueryEx', 'int', $ah_Handle[1], 'int', $iv_Address, 'ptr', DllStructGetPtr($v_Buffer), 'int', DllStructGetSize($v_Buffer))
    
        If Not @Error Then
    
            $vData = Hex(DllStructGetData($v_Buffer, 2))
            $vType = Hex(DllStructGetData($v_Buffer, 3))
    
            While $vType <> "00000080"
                DllCall($ah_Handle[0], 'int', 'VirtualQueryEx', 'int', $ah_Handle[1], 'int', $iv_Address, 'ptr', DllStructGetPtr($v_Buffer), 'int', DllStructGetSize($v_Buffer))
                $vData = Hex(DllStructGetData($v_Buffer, 2))
                $vType = Hex(DllStructGetData($v_Buffer, 3))
                If Hex($iv_Address) = "01000000" Then ExitLoop
                $iv_Address += 65536
    
            WEnd
    
            If $vType = "00000080" Then
                SetError(0)
                If $iHexDec = 1 Then
                    Return Dec($vData)
                Else
                    Return $vData
                EndIf
    
            Else
                SetError(2)
                Return 0
            EndIf
    
        Else
            SetError(3)
            Return 0
        EndIf
    
    EndFunc   ;==>_MemoryGetBaseAddress
    
    Func _ProcessGetModuleBase($ivPID, $svModuleName)
        $ivPID = ProcessExists($ivPID)
        If Not $ivPID Then Return(SetError(1, 0, 0)); Process does not exist
    
        Local $TH32CS_SNAPMODULE = 0x00000008
        Local $sMODULEENTRY32Struct = "dword Size;" & _
                                "dword 32ModuleID;" & _
                                "dword 32ProcessID;" & _
                                "dword GlblcntUsage;" & _
                                "dword ProccntUsage;" & _
                                "ptr modBaseAddr;" & _
                                "dword modBaseSize;" & _
                                "hwnd hModule;" & _
                                "char Module[255];" & _
                                "char ExePath[260]"
    
        Local $hvSnapShot = DllCall("Kernel32.dll", "hwnd", "CreateToolhelp32Snapshot", "dword", $TH32CS_SNAPMODULE, "dword", $ivPID)
        If Not $hvSnapShot[0] Then Return(SetError(2, 0, 0)); Could not create snapshot?
    
        Local $stMODULEENTRY32 = DllStructCreate($sMODULEENTRY32Struct)
        DllStructSetData($stMODULEENTRY32, "Size", DllStructGetSize($stMODULEENTRY32))
    
        Local $ivState = DllCall("Kernel32.dll", "int", "Module32First", "hwnd", $hvSnapShot[0], "long_ptr", DllStructGetPtr($stMODULEENTRY32))
        If Not $ivState[0] Then Return(SetError(3, _WinAPI_CloseHandle($hvSnapShot[0]), 0)); Could not enumerate first module in list?
        Local $ivRet = 0
        Local $svModule
    
        Do
            $ivRet = DllStructGetData($stMODULEENTRY32, "modBaseAddr")
            $svModule = DllStructGetData($stMODULEENTRY32, "Module")
            If $svModule = $svModuleName Then ExitLoop
            $ivState = DllCall("Kernel32.dll", "int", "Module32Next", "hwnd", $hvSnapShot[0], "long_ptr", DllStructGetPtr($stMODULEENTRY32))
            Sleep(1)
        Until Not $ivState[0]
    
        _WinAPI_CloseHandle($hvSnapShot[0])
    
        Return $ivRet
    EndFunc
    
    Func _MemoryModuleGetBaseAddress($iPID, $sModule)
        If Not ProcessExists($iPID) Then Return SetError(1, 0, 0)
    
        If Not IsString($sModule) Then Return SetError(2, 0, 0)
    
        Local   $PSAPI = DllOpen("psapi.dll")
    
        ;Get Process Handle
        Local   $hProcess
        Local   $PERMISSION = BitOR(0x0002, 0x0400, 0x0008, 0x0010, 0x0020) ; CREATE_THREAD, QUERY_INFORMATION, VM_OPERATION, VM_READ, VM_WRITE
    
        If $iPID > 0 Then
            Local $hProcess = DllCall("kernel32.dll", "ptr", "OpenProcess", "dword", $PERMISSION, "int", 0, "dword", $iPID)
            If $hProcess[0] Then
                $hProcess = $hProcess[0]
            EndIf
        EndIf
    
        ;EnumProcessModules
        Local   $Modules = DllStructCreate("ptr[1024]")
        Local   $aCall = DllCall($PSAPI, "int", "EnumProcessModules", "ptr", $hProcess, "ptr", DllStructGetPtr($Modules), "dword", DllStructGetSize($Modules), "dword*", 0)
        If $aCall[4] > 0 Then
            Local   $iModnum = $aCall[4] / 4
            Local   $aTemp
            For $i = 1 To $iModnum
                $aTemp =  DllCall($PSAPI, "dword", "GetModuleBaseNameW", "ptr", $hProcess, "ptr", Ptr(DllStructGetData($Modules, 1, $i)), "wstr", "", "dword", 260)
                If $aTemp[3] = $sModule Then
                    DllClose($PSAPI)
                    Return Ptr(DllStructGetData($Modules, 1, $i))
                EndIf
            Next
        EndIf
    
        DllClose($PSAPI)
        Return SetError(-1, 0, 0)
    
    EndFunc
    
    Func _MemoryScanEx($ah_Handle, $pattern, $mask , $after = False, $iv_addrStart = 0x00400000, $iv_addrEnd = 0x00FFFFFF, $step = 51200)
        If Not IsArray($ah_Handle) Then
            SetError(1)
            Return -1
        EndIf
        $pattern = StringRegExpReplace($pattern, "[^0123456789ABCDEFabcdef.]", "")
        If StringLen($pattern) = 0 Then
            SetError(2)
            Return -2
        EndIf
        If Stringlen($pattern)/2 <> Stringlen($mask) Then
            SetError(4)
            Return -4
        EndIf
        Local $formatedpattern=""
        Local $BufferPattern
        Local $BufferMask
        for $i = 0 to stringlen($mask)-1
            $BufferPattern = StringLeft($pattern,2)
            $pattern = StringRight($pattern,StringLen($pattern)-2)
            $BufferMask = StringLeft($mask,1)
            $mask = StringRight($mask,StringLen($mask)-1)
            if $BufferMask = "?" then $BufferPattern = ".."
            $formatedpattern = $formatedpattern&$BufferPattern
        Next
        $pattern = $formatedpattern
        For $addr = $iv_addrStart To $iv_addrEnd Step $step - (StringLen($pattern) / 2)
            StringRegExp(_MemoryRead($addr, $ah_Handle, "byte[" & $step & "]"), $pattern, 1, 2)
            If Not @error Then
                If $after Then
                    Return StringFormat("0x%.8X", $addr + ((@extended - 2) / 2))
                Else
                    Return StringFormat("0x%.8X", $addr + ((@extended - StringLen($pattern) - 2) / 2))
                EndIf
            EndIf
        Next
        Return -3
    EndFunc   ;==>_MemoryScan
    
    Func _injectCall($hProcess,$addressToCall,$ArrayOfArguments)
       Local $push_dword = 0x68
       Local $call = 0xE8
       Local $return=0xC2
       Local $Push_ebp = 0x55
       Local $MovEbpEsp = 0xEC8B
       Local $MovEspEbp = 0xE58B;MOV ESP,EBP
       Local $Pop_ebp = 0x5D
       $AllocAdresse = _MemVirtualAllocEx ($hProcess[1],0,14+UBound($ArrayOfArguments)*5,$MEM_COMMIT ,$PAGE_EXECUTE_READWRITE)
       _MemoryWrite($AllocAdresse,$hProcess,$Push_ebp,"byte") ;PUSH EBP
       _MemoryWrite($AllocAdresse+1,$hProcess,$MovEbpEsp,"word") ;MOV EBP,ESP
       For $i = 0 To UBound($ArrayOfArguments)-1
          _MemoryWrite($AllocAdresse+$i*5+3,$hProcess,$push_dword,"byte")
          _MemoryWrite($AllocAdresse+$i*5+4,$hProcess,$ArrayOfArguments[UBound($ArrayOfArguments)-1-$i],"dword")
       Next
       _MemoryWrite($AllocAdresse+UBound($ArrayOfArguments)*5+3,$hProcess,$call,"byte")
       $offsetToCall=$addressToCall-(Dec(Hex($AllocAdresse))+UBound($ArrayOfArguments)*5+8)
       _MemoryWrite($AllocAdresse+UBound($ArrayOfArguments)*5+4,$hProcess,$offsetToCall,"dword")
       _MemoryWrite($AllocAdresse+UBound($ArrayOfArguments)*5+8,$hProcess,$MovEspEbp,"word");MOV ESP,EBP
       _MemoryWrite($AllocAdresse+UBound($ArrayOfArguments)*5+10,$hProcess,$Pop_ebp,"byte");POP EBP
    
       _MemoryWrite($AllocAdresse+UBound($ArrayOfArguments)*5+11,$hProcess,$return,"byte") ;RETN
       _MemoryWrite($AllocAdresse+UBound($ArrayOfArguments)*5+12,$hProcess,4,"word")
       return $AllocAdresse
    EndFunc
    
    Func CreateRemoteThread($hProcess, $lpThreadAttributes, $dwStackSize, $lpStartAddress, $lpParameter, $dwCreationFlags, $lpThreadId)
       Return DllCall("Kernel32.dll", "HANDLE", "CreateRemoteThread", "HANDLE", $hProcess, "int", $lpThreadAttributes, "int", $dwStackSize, "DWORD", $lpStartAddress, "ptr", $lpParameter, "DWORD", $dwCreationFlags, "DWORD*", $lpThreadId)
    EndFunc
    
    #endregion

Visitors found this page by searching for:

NomadMemory.au3

autoit nomadmemory

nomadmemory.au3 download

NomadMemory pattern

nomadmemory

reading memory autoit wow

autoit wow writing nomadmemory

nomadmemory.au3 latest

nomadmemory _memoryscannomadmemory.au3 code memorypatternsearchnomadmemory.au3 searchupdated nomadmemory.au3_memoryscan autoitautoit script nomadmemory.au3autoit nomadmemory memoryreadmemory.au3autoit _memoryscanexautoit memoryautoitscript reading memoryautoit memory read writenomadmemory memory writenomadmemory downloadnomadmemory stepdownload nomadmemory.au3 fileautoit memory search

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •