interesting poll.. I think it would be more efficient to limit the answer to "it works" / "it doesn't work" instead of asking anyone's opinion and feeling about it, no? ok... my bad
well, when I tried to use the crack by orbit & hazard, outpost firewall said that it was trying to connect to a particular ip. ip 82.197.131.52 (tcp:21) but only version 1.0 no message from my firewall with 1.1 & 1.2 since the first crack by hazar work fine for me, I think I won't bother with the new crack by orbit & hazar
I used the first loader (no fancy GUI, just a command prompt) and it worked fine. No internet connection at the moment of activation
I fully trust in Hazard, and like this first loader release, without that bulky UI, and doing the work well. Come on Hazard walk alone again and give a new improved version to us!
this is probably a click and get money site to collect some reward from this. And why can it only be a malicious exploit? and remember that both Hazar and Orbit released this. more conspiracy theories.
Its a webhost, so a php script (for example) could receive information from each 7lo*der. It should not connect to the internet at all. This does not look harmless to me. Anyways, you could intercept the 7lo*der traffic with a sniffer and find out. Orbit30 integrated Hazard's lo*der (200kB) in his package of (uncompressed 37 MB). The original Hazard lo*der did not connect to the net.
Where did you download the load from? 3rd party? you never know who is reuploading. Get it from the source!
You're just making assumptions. - The file we analyzed is from the source (MDL) - compare it with your v1.1 MD5 hash (unzip it first). Or check it for yourself in v1.2. Chilkat HTTP is still in there, I checked that, too. Now, could Orbit please explain the presence of the HTTP components in v1.1 and v1.2?
Me jas0nuk and vb_master completley dissasembled it and analyzed it, and it is mereley encyprtion and no connection to any server of any kind are made.