So mr medic here is a little bit touchy.
I hit a nerve.
Mr medic has blocked me - success.I invited him on a nice competition (livestream when you all can participate in) whenever we will both unpack a "themidad'd application" - he refused.
I am guess that he is afraid to show his true character. (He ignores my questions and it's my time to ignore his).
I got him where I wanted & got him to release his hack and rage in the way& got him mad & made myself laugh quite for long time.
Anyways it was nice being here in this great community.
I am go now.
Cya woman much love.
-Worm.
If you are up for a challange & to be embarrassed just send a message.
I might visit in the future.
LOL.
Well I present you this nice license extender as Mr Medic left the scene.
It works on : RETAIL / PW / NATIVE / NAPOLEONIC. 1.158
This loader will work perfectly on : Win xp.
In order to run it in Win 7 64 bit / Win 7 32 bit -> Right click on The auto blocker -> properties-> and in comparability press : Windows XP SP2.
How to use:
1) Start Wrapper (Make sure all files are in the same folder)
2) After a few seconds open the Auto Blocker.
Downloads:
Download straight from TKC server :
http://tkc-community.net/forum/index.php?action=downloads;sa=view;down=320Admins the DLL file is not packed or anything so you can analyse it easily. (Only like 50 lines in asm).
Zip Password : Worm
How to get free lifetime license:lol worm you cant even rebuild a dumped dll , tip iat ya fool.
Lole'd ^^.
Ladies and gentleman I present you my fine master piece.
Fully unpacked DLL - "Mr Medic GERMANDESTROYER"
Now any of you can just steal his signatures,patch his work and use it for free. (Anti cheaters go ahead.)
Another link is uploaded to TKC.
Here is a tip: stop talking too much.
http://speedy.sh/aY9wb/xDLLUnpacked.dll (Admins it's enough to open it in a debugger and check out the strings, or you can load it via loaddll.exe - to verify that it's actually his work)
For newbies:
How to make a life time license:
100067F1 . E8 F5E3FFFF CALL x_DP.10004BEB
100067F6 . 83C4 18 ADD ESP,18
100067F9 > 381D 17200910 CMP BYTE PTR DS:[10092017],BL
100067FF . 0F84 6C030000 JE x_DP.10006B71
10006805 . 8B35 64C10010 MOV ESI,DWORD PTR DS:[<&MSVCR90.printf>] ; msvcr90.printf
1000680B . 68 74C80010 PUSH x_DP.1000C874 ; /format = "> Initialisation.
"
10006810 . FFD6 CALL ESI ; \printf
10006812 . C70424 88C8001>MOV DWORD PTR SS:[ESP],x_DP.1000C888 ; ASCII "
"
10006819 . FFD6 CALL ESI
1000681B . C70424 B8C8001>MOV DWORD PTR SS:[ESP],x_DP.1000C8B8 ; ASCII "###############################
"
10006822 . FFD6 CALL ESI
10006824 . C70424 DCC8001>MOV DWORD PTR SS:[ESP],x_DP.1000C8DC ; ASCII "# #
"
1000682B . FFD6 CALL ESI
1000682D . C70424 00C9001>MOV DWORD PTR SS:[ESP],x_DP.1000C900 ; ASCII "# #
"
10006834 . FFD6 CALL ESI
10006836 . C70424 24C9001>MOV DWORD PTR SS:[ESP],x_DP.1000C924 ; ASCII "# CHEAT LOADED #
"
1000683D . FFD6 CALL ESI
1000683F . C70424 48C9001>MOV DWORD PTR SS:[ESP],x_DP.1000C948 ; ASCII "# made by tkc #
"
10006846 . FFD6 CALL ESI
10006848 . C70424 64C9001>MOV DWORD PTR SS:[ESP],x_DP.1000C964 ; ASCII "# #
"
1000684F . FFD6 CALL ESI
10006851 . C70424 88C9001>MOV DWORD PTR SS:[ESP],x_DP.1000C988 ; ASCII "# #
"
10006858 . FFD6 CALL ESI
1000685A . C70424 ACC9001>MOV DWORD PTR SS:[ESP],x_DP.1000C9AC ; ASCII "# #
"
10006861 . FFD6 CALL ESI
10006863 . C70424 D0C9001>MOV DWORD PTR SS:[ESP],x_DP.1000C9D0 ; ASCII "###############################
"
1000686A . FFD6 CALL ESI
1000686C . 59 POP ECX
100086EC |. 56 PUSH ESI
100086ED |. 57 PUSH EDI
100086EE |. 0F85 0C010000 JNZ x_DP.10008800
100086F4 |. 53 PUSH EBX
100086F5 |. 68 2CCC0010 PUSH x_DP.1000CC2C ; /Title = "ANOTHER HACK By MRMEDIC................."
100086FA |. FF15 3CC00010 CALL DWORD PTR DS:[<&kernel32.SetConsole>; \SetConsoleTitleA
10008700 |. 8B35 88C10010 MOV ESI,DWORD PTR DS:[<&MSVCR90.__iob_fu>; msvcr90.__p__iob
10008706 |. FFD6 CALL ESI ; <&MSVCR90.__iob_func>
10008708 |. 8B3D 84C10010 MOV EDI,DWORD PTR DS:[<&MSVCR90.freopen>>; msvcr90.freopen
1000870E |. 50 PUSH EAX ; /stream
1000870F |. 68 58CC0010 PUSH x_DP.1000CC58 ; |mode = "r"
10008714 |. 68 5CCC0010 PUSH x_DP.1000CC5C ; |path = "CONIN$"
10008719 |. FFD7 CALL EDI ; \freopen
l33t system:
10008821 |. FF15 34C00010 CALL DWORD PTR DS:[<&kernel32.FreeConsol>; [FreeConsole
10008827 |. 68 E8CC0010 PUSH x_DP.1000CCE8 ; ASCII "----------Detached----------"
1000882C |. BF B8110910 MOV EDI,x_DP.100911B8
10008831 |. 57 PUSH EDI
10008832 |. E8 5B060000 CALL x_DP.10008E92
10008837 |. 59 POP ECX
10008838 |. 59 POP ECX
10008839 |. 8BCF MOV ECX,EDI
1000883B |. FF15 ACC00010 CALL DWORD PTR DS:[<&MSVCP90.?close@?$ba>; msvcp90.?close@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
10008841 |> 33C0 XOR EAX,EAX
10008843 |. 5F POP EDI
10008844 |. 40 IN