Hey there! I have been checking around and saw alot of getting banned (not posts in the forum), and I have saw some other tutorials to get unbanned from a "life-time" ban.
* Works for PC only / MAC wasn't checked*
I'm not responsible if you ruined you're pc, this worked for me fine.
DO NOT FORGET TO BACKUP STUFF YOU'VE CHANGED.
Following files/text's need to be Backedup
-> HWID
-> preferences.bin
-> Last_Session.bin
Requirements:
• Regedit.exe (windows included)
• Admin account of current PC
• APB Runned once
Windows 7/Vista:
1. Open WIN button (bottom left key)
2. Type in regedit.exe
3. Open it and allow it full admin control
4. Navigate to "HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptograph y"
5. MachineGuid -> replace it with other randomly numbers/letters
6. Close regedit.exe and go to "APB Reloaded/Binaries"
7. Backup and delete: "preferences.bin", "Last_Session.bin".
Windows XP:
1. Open WIN button (bottom left key)
2. Open Run
3. Type in regedit.exe
4. Open it and allow it full admin control
5. Navigate to "HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptograph y"
6. MachineGuid -> replace it with other randomly numbers/letters
7. Close regedit.exe and go to "APB Reloaded/Binaries"
8. Backup and delete: "preferences.bin", "Last_Session.bin".
BEFORE YOU ENTER THE GAME AGAIN, TRY THIS:
Even when you did all of that, it cannot work all the time. please make some changes to this things to make sure it will work 100%.
* This is only if you want to be 100% sure.
-> change computer name
-> change username
-> change MAC address*
-> change Volume Serial Number (C: )*
-> delete the folders in "APB Reloaded\APBGame\Config\Account"*
And now you can enter APB again! please note this wont get rid of you're account ban. this will only let you're computer play again ![Smile](images/emotions/emo5.png)
This is the dump that everyone used to get this information
Code:
10D75BE7 |. /EB 07 JMP SHORT 10D75BF0
10D75BE9 | |8DA424 0000 LEA ESP,[ESP]
10D75BF0 |> \B1 7F /MOV CL,7F
10D75BF2 |. 2AC8 |SUB CL,AL
10D75BF4 |. 3088 3CD111 |XOR BYTE PTR DS:[EAX+1211D13C],CL
10D75BFA |. 40 |INC EAX
10D75BFB |. 83F8 1F |CMP EAX,1F
10D75BFE |.^ 72 F0 \JB SHORT 10D75BF0
10D75C00 |. C605 5CD111 MOV BYTE PTR DS:[1211D15C],0
10D75C07 |> 8D5424 08 LEA EDX,[LOCAL.98]
10D75C0B |. 52 PUSH EDX ; /pResult => OFFSET LOCAL.98
10D75C0C |. 68 01010000 PUSH 101 ; |DesiredAccess = KEY_QUERY_VALUE|100
10D75C11 |. 6A 00 PUSH 0 ; |Reserved = 0
10D75C13 |. 68 3CD11112 PUSH OFFSET 1211D13C ; |SubKey = "Software\Microsoft\Cryptography"
10D75C18 |. 68 02000080 PUSH 80000002 ; |hKey = HKEY_LOCAL_MACHINE
10D75C1D |. FF15 20E0AD CALL DWORD PTR DS:[<&ADVAPI32.RegOpenKeyExA>] ; \ADVAPI32.RegOpenKeyExA
10D75C23 |. 85C0 TEST EAX,EAX
10D75C25 |. 75 78 JNE SHORT 10D75C9F
10D75C27 |. 56 PUSH ESI
...
...
10D75D2E |.^\72 F0 \JB SHORT 10D75D20
10D75D30 |. C605 80D111 MOV BYTE PTR DS:[1211D180],0
10D75D37 |> 68 E41FC311 PUSH OFFSET 11C31FE4 ; ASCII "w+b"
10D75D3C |. 8D4424 04 LEA EAX,[LOCAL.0]
10D75D40 |. 68 70D11112 PUSH OFFSET 1211D170 ; ASCII "preferences.bin"
10D75D45 |. 50 PUSH EAX
10D75D46 |. FF15 FCE7AD CALL DWORD PTR DS:[<&MSVCR90.fopen_s>]
10D75D4C |. 83C4 0C ADD ESP,0C
10D75D4F |. 85C0 TEST EAX,EAX
10D75D51 |. 74 04 JE SHORT 10D75D57
10D75D53 |. 32C0 XOR AL,AL
Explained:
Strings were crypted with xoring.
-> GetAdaptersInfo()
-> GetCurrentHwProfileW() -> "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr ol\IDConfigDB\Hardware Profiles\0001\HwProfileGuid"
I hope this would help you! I have wroten this tutorial, only the DUMP and the explaination were taken from a free-source site ![Smile](images/emotions/emo5.png)
Happy cheating :3