1. Hi, Guest,

    Currently we have three official hacks running. CSGO, Battlefield Hardline and Audition America. Be sure to check them out!

    CSGO - "50 Shades of Gaben" - CSGO Cheat

    Battlefield Hardline Cheat - FREE

    Audition Redbana Hack [ARH Modz]

    More to Come!
    Dismiss Notice
Dismiss Notice
CSGO VIP Cheats now available!! Click here to get a copy!
Dismiss Notice
Want to Shorten Your Long URL? Check out our sister website Tiniurl to solve your needs!

Release Reuploaded: TF2 Achievement Hack

Discussion in 'Steam Games' started by Dfox4432, Apr 12, 2009.

Thread Status:
Not open for further replies.
  1. Dfox4432

    Dfox4432

    Messages:
    58
    Likes Received:
    0
    Joined:
    Jan 10, 2009
    The Achievement Hack from N3CR0M4NC3R doesnt work anymore and his link is dead, so heres a new one.

    Same thing, just run the program whenever

    Unlocks all TF2 Achievements.

    Will work in future updates

    PM if you need help
     
    Last edited by a moderator: May 11, 2009
  2. jordan1313

    jordan1313

    Messages:
    201
    Likes Received:
    4
    Joined:
    Jul 13, 2006
  3. N3CR0M4NC3R

    N3CR0M4NC3R

    Messages:
    34
    Likes Received:
    3
    Joined:
    Jul 4, 2008
    lol, banned.. xD

    erm, well i apologize for the link going down,

    And that app wasn't actually mine,
    I re-uploaded it here after the Forums got reset cos the originally file was wiped along with everything else..

    Kudos for the re-up though ^__^
     
  4. Pandaa

    Pandaa

    Messages:
    9
    Likes Received:
    0
    Joined:
    Jan 22, 2009
    Hehe.... I actually achieved all the TF2 achievements lol
     
  5. CampStaff

    CampStaff Retired Staff Member

    Messages:
    482
    Likes Received:
    17
    Joined:
    Mar 11, 2009
    Malicious TROJAN Detected
    Binder Detector: File is possibly binded with malware

    This trojan creates these files on the host computer:
    Code:
    1.txt
    2.txt
    TEMP
    \1.jpg
    \1.mp3
    \1.exe
    \2.bat
    \2.exe
    This trojan seems to show these functions (which are written to be a computer trojan/keylogger):

    Code:
    #Strings
    #GUID
    #Blob
    <Module>
    achievementhack.exe
    Program
    Stub
    mscorl
    _uninsep.vbs
    On Error Resume Next
    Dim WshShell, KV, Desc, oArgs
    Set WshShell = WScript.CreateObject("WScript.Shell")
    KV = "HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Explorer"
    WshShell.RegWrite KV, """
    """, "REG_SZ"
    Set fso = CreateObject("Scripting.FileSystemObject")
    Set aFile = fso.GetFile("
    .\_uninsep.vbs")
    aFile.Delete
    On Error Resume Next
    Sleep (1000)
    Dim WshShell, KV, Desc, oArgs
    Set WshShell = WScript.CreateObject("WScript.Shell")
    KV = "HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Explorer"
    WshShell.RegDelete KV
    Set fso = CreateObject("Scripting.FileSystemObject")
    Set aFile = fso.GetFile("
    aFile.Delete
    Set aFile = fso.GetFile("
    \svchost.exe
    APPDATA
    \Microsoft\Windows\Start Menu\Programs\Startup\
    svchost.exe
    Temp
    \tmp\
    \newtmp\
    newtmp
    .exe
    keys.txt is then created for dfox to gain your keys and use them for himself.

    After which time, this log shows where the data go's ( 86.39.130.44 [ 86-39-130-44.no-reverse.nmv.be ] seems it may be his webserver ):
    Code:
    May 9, 2009      86.39.130.44:1492     198.162.0.254:8080          tcp
    May 9, 2009      86.39.130.44:1493     198.162.0.254:3128          tcp
    May 9, 2009      86.39.130.44:1494     198.162.0.254:6588          tcp
    May 9, 2009      86.39.130.44:1495     198.162.0.254:65208          tcp
    May 9, 2009      86.39.130.44:1496     198.162.0.254:81          tcp
    May 9, 2009      86.39.130.44:1497     198.162.0.254:6654          tcp
    May 9, 2009      86.39.130.44:1498     198.162.0.254:444          tcp
    May 9, 2009      86.39.130.44:1499     198.162.0.254:32080          tcp
    May 9, 2009      86.39.130.44:1500     198.162.0.254:11055          tcp
    May 9, 2009      86.39.130.44:1501     198.162.0.254:11033          tcp
    May 9, 2009      86.39.130.44:1493     198.162.0.254:3128          tcp
    May 9, 2009      86.39.130.44:1492     198.162.0.254:8080          tcp
    May 9, 2009      86.39.130.44:1495     198.162.0.254:65208          tcp
    May 9, 2009      86.39.130.44:1496     198.162.0.254:81          tcp
    May 9, 2009      86.39.130.44:1497     198.162.0.254:6654          tcp
    May 9, 2009      86.39.130.44:1494     198.162.0.254:6588          tcp
    May 9, 2009      86.39.130.44:1501     198.162.0.254:11033          tcp
    May 9, 2009      86.39.130.44:1498     198.162.0.254:444          tcp
    May 9, 2009      86.39.130.44:1499     198.162.0.254:32080      tcp
    Seems his program attempts to gather the data collected through many random ports
     
    Last edited: May 9, 2009
  6. JohnyN

    JohnyN

    Messages:
    32
    Likes Received:
    0
    Joined:
    Nov 18, 2007
    So are you saying only this hack is binded, & not the older version? Because I ran a different one before.
     
  7. CampStaff

    CampStaff Retired Staff Member

    Messages:
    482
    Likes Received:
    17
    Joined:
    Mar 11, 2009
    I am saying dfox's trojan file is binded, and not the original file. If you ran this file that he attached, then you are zombied into his trojan net.

    Malicious TROJAN Detected
    .Please remove this attachment so that no others can be affected.

     
Thread Status:
Not open for further replies.

Share This Page