Hey there! I have been checking around and saw alot of getting banned (not posts in the forum), and I have saw some other tutorials to get unbanned from a "life-time" ban.
* Works for PC only / MAC wasn't checked*
I'm not responsible if you ruined you're pc, this worked for me fine.
DO NOT FORGET TO BACKUP STUFF YOU'VE CHANGED.
Following files/text's need to be Backedup
-> HWID
-> preferences.bin
-> Last_Session.bin
Requirements:
• Regedit.exe (windows included)
• Admin account of current PC
• APB Runned once
Windows 7/Vista:
1. Open WIN button (bottom left key)
2. Type in regedit.exe
3. Open it and allow it full admin control
4. Navigate to "HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptograph y"
5. MachineGuid -> replace it with other randomly numbers/letters
6. Close regedit.exe and go to "APB Reloaded/Binaries"
7. Backup and delete: "preferences.bin", "Last_Session.bin".
Windows XP:
1. Open WIN button (bottom left key)
2. Open Run
3. Type in regedit.exe
4. Open it and allow it full admin control
5. Navigate to "HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptograph y"
6. MachineGuid -> replace it with other randomly numbers/letters
7. Close regedit.exe and go to "APB Reloaded/Binaries"
8. Backup and delete: "preferences.bin", "Last_Session.bin".
BEFORE YOU ENTER THE GAME AGAIN, TRY THIS:
Even when you did all of that, it cannot work all the time. please make some changes to this things to make sure it will work 100%.
* This is only if you want to be 100% sure.
-> change computer name
-> change username
-> change MAC address*
-> change Volume Serial Number (C: )*
-> delete the folders in "APB Reloaded\APBGame\Config\Account"*
And now you can enter APB again! please note this wont get rid of you're account ban. this will only let you're computer play again
This is the dump that everyone used to get this information
Code:
10D75BE7 |. /EB 07 JMP SHORT 10D75BF0
10D75BE9 | |8DA424 0000 LEA ESP,[ESP]
10D75BF0 |> \B1 7F /MOV CL,7F
10D75BF2 |. 2AC8 |SUB CL,AL
10D75BF4 |. 3088 3CD111 |XOR BYTE PTR DS:[EAX+1211D13C],CL
10D75BFA |. 40 |INC EAX
10D75BFB |. 83F8 1F |CMP EAX,1F
10D75BFE |.^ 72 F0 \JB SHORT 10D75BF0
10D75C00 |. C605 5CD111 MOV BYTE PTR DS:[1211D15C],0
10D75C07 |> 8D5424 08 LEA EDX,[LOCAL.98]
10D75C0B |. 52 PUSH EDX ; /pResult => OFFSET LOCAL.98
10D75C0C |. 68 01010000 PUSH 101 ; |DesiredAccess = KEY_QUERY_VALUE|100
10D75C11 |. 6A 00 PUSH 0 ; |Reserved = 0
10D75C13 |. 68 3CD11112 PUSH OFFSET 1211D13C ; |SubKey = "Software\Microsoft\Cryptography"
10D75C18 |. 68 02000080 PUSH 80000002 ; |hKey = HKEY_LOCAL_MACHINE
10D75C1D |. FF15 20E0AD CALL DWORD PTR DS:[<&ADVAPI32.RegOpenKeyExA>] ; \ADVAPI32.RegOpenKeyExA
10D75C23 |. 85C0 TEST EAX,EAX
10D75C25 |. 75 78 JNE SHORT 10D75C9F
10D75C27 |. 56 PUSH ESI
...
...
10D75D2E |.^\72 F0 \JB SHORT 10D75D20
10D75D30 |. C605 80D111 MOV BYTE PTR DS:[1211D180],0
10D75D37 |> 68 E41FC311 PUSH OFFSET 11C31FE4 ; ASCII "w+b"
10D75D3C |. 8D4424 04 LEA EAX,[LOCAL.0]
10D75D40 |. 68 70D11112 PUSH OFFSET 1211D170 ; ASCII "preferences.bin"
10D75D45 |. 50 PUSH EAX
10D75D46 |. FF15 FCE7AD CALL DWORD PTR DS:[<&MSVCR90.fopen_s>]
10D75D4C |. 83C4 0C ADD ESP,0C
10D75D4F |. 85C0 TEST EAX,EAX
10D75D51 |. 74 04 JE SHORT 10D75D57
10D75D53 |. 32C0 XOR AL,AL
Explained:
Strings were crypted with xoring.
-> GetAdaptersInfo()
-> GetCurrentHwProfileW() -> "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr ol\IDConfigDB\Hardware Profiles\0001\HwProfileGuid"
I hope this would help you! I have wroten this tutorial, only the DUMP and the explaination were taken from a free-source site
Happy cheating :3