User Tag List

Closed Thread
Results 1 to 7 of 7
  1. #1
    Banned
    Reputation

    Join Date
    Jan 2009
    Last Online
    04-21-2009 @ 01:51 AM
    Posts
    58
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Reuploaded: TF2 Achievement Hack

    The Achievement Hack from N3CR0M4NC3R doesnt work anymore and his link is dead, so heres a new one.

    Same thing, just run the program whenever

    Unlocks all TF2 Achievements.



    Will work in future updates

    PM if you need help
    Last edited by Einhanderkiller; 05-11-2009 at 06:50 AM.

  2. #2
    Registered User
    Reputation

    Join Date
    Jul 2006
    Last Online
    04-22-2014 @ 04:21 PM
    Location
    at the bottom of the light
    Posts
    209
    Thanks
    1
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Re: Reuploaded: TF2 Achievement Hack

    virus scan ?

  3. #3
    Registered User
    Reputation

    Join Date
    Jul 2008
    Last Online
    11-18-2009 @ 08:49 PM
    Location
    Leeds, West Yorkshire, UK
    Posts
    34
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Re: Reuploaded: TF2 Achievement Hack

    lol, banned.. xD

    erm, well i apologize for the link going down,

    And that app wasn't actually mine,
    I re-uploaded it here after the Forums got reset cos the originally file was wiped along with everything else..

    Kudos for the re-up though ^__^

  4. #4
    Lurker
    Reputation

    Join Date
    Jan 2009
    Last Online
    05-07-2009 @ 03:30 PM
    Posts
    9
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Re: Reuploaded: TF2 Achievement Hack

    Hehe.... I actually achieved all the TF2 achievements lol

  5. #5
    Retired Staff Member
    Reputation Reputation
    CampStaff's Avatar
    Join Date
    Mar 2009
    Last Online
    07-07-2013 @ 09:59 AM
    Posts
    482
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Re: Reuploaded: TF2 Achievement Hack

    Malicious TROJAN Detected
    [Only registered and activated users can see links. ]

    Report generated: 9.5.2009 at 6.22.21 (GMT 1)
    Filename: UnlockTF2Achievements.exe
    File size: 188 KB
    MD5 Hash: 5C5D58AFBFAE0216C5AE91A783338492
    SHA1 Hash: D60110F50156E9EB31CF5EB2945DF3F78C0576AB
    Packer detected: Microsoft Visual C# / Basic .NET
    Self-Extract Archive: Nothing found
    Binder Detector: File is possible binded with malware
    Detection rate: 2 on 24

    Detections

    a-squared - Virus.Win32.Prorat!IK
    Avira AntiVir - Nothing found!
    Avast - Nothing found!
    AVG - Worm/Agobot.HEY
    BitDefender - Nothing found!
    ClamAV - Nothing found!
    Comodo - Nothing found!
    Dr.Web - Nothing found!
    Ewido - Nothing found!
    F-PROT 6 - Nothing found!
    G DATA - Nothing found!
    IkarusT3 - Nothing found!
    Kaspersky - Nothing found!
    McAfee - Nothing found!
    MHR (Malware Hash Registry) - Nothing found!
    NOD32 v3 - Nothing found!
    Norman - Nothing found!
    Panda - Nothing found!
    Quick Heal - Nothing found!
    Solo Antivirus - Nothing found!
    Sophos - Nothing found!
    TrendMicro - Nothing found!
    VBA32 - Nothing found!
    Virus Buster - Nothing found!
    Binder Detector: File is possibly binded with malware

    This trojan creates these files on the host computer:
    Code:
    1.txt
    2.txt
    TEMP
    \1.jpg
    \1.mp3
    \1.exe
    \2.bat
    \2.exe
    This trojan [Only registered and activated users can see links. ] (which are written to be a computer trojan/keylogger):

    Code:
    #Strings
    #GUID
    #Blob
    <Module>
    achievementhack.exe
    Program
    Stub
    mscorl
    _uninsep.vbs
    On Error Resume Next
    Dim WshShell, KV, Desc, oArgs
    Set WshShell = WScript.CreateObject("WScript.Shell")
    KV = "HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Explorer"
    WshShell.RegWrite KV, """
    """, "REG_SZ"
    Set fso = CreateObject("Scripting.FileSystemObject")
    Set aFile = fso.GetFile("
    .\_uninsep.vbs")
    aFile.Delete
    On Error Resume Next
    Sleep (1000)
    Dim WshShell, KV, Desc, oArgs
    Set WshShell = WScript.CreateObject("WScript.Shell")
    KV = "HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Explorer"
    WshShell.RegDelete KV
    Set fso = CreateObject("Scripting.FileSystemObject")
    Set aFile = fso.GetFile("
    aFile.Delete
    Set aFile = fso.GetFile("
    \svchost.exe
    APPDATA
    \Microsoft\Windows\Start Menu\Programs\Startup\
    svchost.exe
    Temp
    \tmp\
    \newtmp\
    newtmp
    .exe
    keys.txt is then created for dfox to gain your keys and use them for himself.

    After which time, this log shows where the data go's ( 86.39.130.44 [ [Only registered and activated users can see links. ] ] seems it may be his webserver ):
    Code:
    May 9, 2009      86.39.130.44:1492     198.162.0.254:8080          tcp
    May 9, 2009      86.39.130.44:1493     198.162.0.254:3128          tcp
    May 9, 2009      86.39.130.44:1494     198.162.0.254:6588          tcp
    May 9, 2009      86.39.130.44:1495     198.162.0.254:65208          tcp
    May 9, 2009      86.39.130.44:1496     198.162.0.254:81          tcp
    May 9, 2009      86.39.130.44:1497     198.162.0.254:6654          tcp
    May 9, 2009      86.39.130.44:1498     198.162.0.254:444          tcp
    May 9, 2009      86.39.130.44:1499     198.162.0.254:32080          tcp
    May 9, 2009      86.39.130.44:1500     198.162.0.254:11055          tcp
    May 9, 2009      86.39.130.44:1501     198.162.0.254:11033          tcp
    May 9, 2009      86.39.130.44:1493     198.162.0.254:3128          tcp
    May 9, 2009      86.39.130.44:1492     198.162.0.254:8080          tcp
    May 9, 2009      86.39.130.44:1495     198.162.0.254:65208          tcp
    May 9, 2009      86.39.130.44:1496     198.162.0.254:81          tcp
    May 9, 2009      86.39.130.44:1497     198.162.0.254:6654          tcp
    May 9, 2009      86.39.130.44:1494     198.162.0.254:6588          tcp
    May 9, 2009      86.39.130.44:1501     198.162.0.254:11033          tcp
    May 9, 2009      86.39.130.44:1498     198.162.0.254:444          tcp
    May 9, 2009      86.39.130.44:1499     198.162.0.254:32080      tcp
    Seems his program attempts to gather the data collected through many random ports
    Last edited by CampStaff; 05-08-2009 at 09:55 PM.

  6. #6
    Registered User
    Reputation

    Join Date
    Nov 2007
    Last Online
    03-22-2014 @ 09:20 PM
    Posts
    32
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Re: Reuploaded: TF2 Achievement Hack

    Quote Originally Posted by CampStaff View Post
    Malicious TROJAN Detected
    Binder Detector: File is possibly binded with malware
    So are you saying only this hack is binded, & not the older version? Because I ran a different one before.

  7. #7
    Retired Staff Member
    Reputation Reputation
    CampStaff's Avatar
    Join Date
    Mar 2009
    Last Online
    07-07-2013 @ 09:59 AM
    Posts
    482
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Re: Reuploaded: TF2 Achievement Hack

    I am saying dfox's trojan file is binded, and not the original file. If you ran this file that he attached, then you are zombied into his trojan net.

    Malicious TROJAN Detected
    .Please remove this attachment so that no others can be affected.


Closed Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts