StrategyQuant X Build 134 by Tonyweb for Sale

You can either crack it yourself or you can buy from me.

How to crack it:

Three jars are decrypted from native code and main loader class takes control.

The java loader starts decrypting the crypted jar in relative path:

./internal/libs/SQLib.jar

and one of the interesting steps for us is the checkLicense one

CheckLicense

private void checkLicense() {
        try {
            SQApp.Log.debug("Verifying license.");
            Brokers.init();
            SQApp.Log.debug("Verifying license. Step 2");
            final SQLicenser instance = SQLicenser.getInstance();
            instance.setLicenceFilePath(MainApp.getDataPath() + "licenceFile.lic");
            SQApp.Log.debug("Verifying license. Step 3");
            try {
                if (instance.licenseFileExists()) {
                    SQApp.Log.debug("Verifying license. Step 4");
                    instance.verifyLicenseFromFile();
                }
            }
            catch (Exception ex) {
                LicenseDialog.getInstance().setLicense(instance.getLastCheckedLicenseCode());
                LicenseDialog.getInstance().setError(ex.getMessage());
                SQApp.Log.error("License verification failed. Exc. ", (Throwable)ex);
            }
            LicenseDb.init(SQStructure.INTERNAL_DIR_PATH);
            if (this.isRunInConsole()) {
                SQApp.Log.debug("Verifying license. Step 5 CLI");
                if (!SQLicenser.getInstance().verified()) {
                    SQApp.Log.debug("Verifying license. Step 6 CLI");
                    final String license = LicenseDb.getLicense();
                    if (license != null && !license.isEmpty()) {
                        SQApp.Log.debug("Verifying license. Step 7 CLI");
                        instance.verifyLicenseOnline(license);
                    }
                }
            }
            else {
                SQApp.Log.debug("Verifying license. Step 5");
                while (BrowserGUI.getInstance() == null) {
                    SQApp.Log.info("Waiting for internal browser initialization");
                    Thread.sleep(500L);
                }
                SQApp.Log.info("License dialog initing");
                BrowserGUI.getInstance().showLicenseLoadingScreen();
                final String license2 = LicenseDb.getLicense();
                if (license2 != null && !license2.isEmpty()) {
                    LicenseDialog.getInstance().setLicense(license2);
                }
                SQApp.Log.debug("Verifying license. Step 6");
                if (!SQLicenser.getInstance().verified()) {
                    SQApp.Log.debug("Verifying license. Step 7");
                    BrowserGUI.getInstance().loadLicenseDialogForm();
                    SQApp.Log.debug("Verifying license. Step 8");
                    if (instance.isItTrial() || instance.isItPartnerTrial() || instance.isItFullMbg()) {
                        LicenseDb.setLicense(instance.getLicenseCode());
                    }
                    else {
                        LicenseDb.setLicense("");
                    }
                }
            }
            if (!SQLicenser.getInstance().verified()) {
                SQApp.Log.info("Missing license.");
                MainApp.exitJVM();
            }
            SQApp.Log.debug("License was successfully verified.");
        }
        catch (Exception ex2) {
            SQApp.Log.error("Failed to check license. Exc. ", (Throwable)ex2);
            MainApp.exitJVM();
        }
    }

You can start tracing from here to follow what’s happening:

String references are not easy to deal with because of the way Go arranges them (i.e. concatenated in blocks).

private SQLicenseXml _verifyLicenseOnServer(final String s, final String s2, final String s3, final boolean b) throws SQLicenseException {
        try {
            final SQLicenseXml sqLicenseXml = new SQLicenseXml();
            sqLicenseXml.type = 5;
            String str = URLEncoder.encode("productid", "UTF-8") + "=" + URLEncoder.encode(this.product, "UTF-8") + "&" + URLEncoder.encode("mac", "UTF-8") + "=" + URLEncoder.encode(s, "UTF-8") + "&" + URLEncoder.encode("dsn", "UTF-8") + "=" + URLEncoder.encode(s2, "UTF-8") + "&" + URLEncoder.encode("license", "UTF-8") + "=" + URLEncoder.encode(s3, "UTF-8") + "&" + URLEncoder.encode("resellerid", "UTF-8") + "=" + URLEncoder.encode(this.reseller, "UTF-8") + "&" + URLEncoder.encode("uniqid", "UTF-8") + "=" + URLEncoder.encode(this.uniqID, "UTF-8") + "&" + URLEncoder.encode("hardwareid", "UTF-8") + "=" + URLEncoder.encode(this.hardwareid, "UTF-8") + "&" + URLEncoder.encode("newhardwareid", "UTF-8") + "=" + URLEncoder.encode(this.newhardwareid, "UTF-8") + "&" + URLEncoder.encode("dateid", "UTF-8") + "=" + URLEncoder.encode(this.dateid + "", "UTF-8") + "&" + URLEncoder.encode("os", "UTF-8") + "=" + URLEncoder.encode(HardwareInfo.getOSKey() + "", "UTF-8");
            if (b) {
                str = str + "&" + URLEncoder.encode("offline", "UTF-8") + "=" + URLEncoder.encode("1", "UTF-8");
            }
            if (this.builds.containsKey(this.product)) {
                str = str + "&" + URLEncoder.encode("build", "UTF-8") + "=" + this.builds.get(this.product);
            }
            final String string = str + "&" + URLEncoder.encode("ival", "UTF-8") + "=" + URLEncoder.encode("1", "UTF-8");
            boolean b2 = false;
            final ExecutorService fixedThreadPool = Executors.newFixedThreadPool(3);
            final ArrayList<Future<String>> list = new ArrayList<Future<String>>();
            list.add(fixedThreadPool.<String>submit((Callable<String>)new SQHttpClient("https://api.strategyquant.com/licensechecksqx", string)));
            list.add(fixedThreadPool.<String>submit((Callable<String>)new SQHttpClient("https://api2.strategyquant.com/licensechecksqx", string)));
            String xml = null;
            String s4 = null;
            final Iterator<Object> iterator = list.iterator();
            while (iterator.hasNext()) {
                final String s5 = (String)((Future<String>)iterator.next()).get();
                if (s5 != null) {
                    b2 = true;
                    final String[] split = s5.split("\n");
                    if (split.length != 2) {
                        continue;
                    }
                    xml = new String(Base64.decodeBase64(split[0]), "UTF-8");
                    s4 = split[1];
                    if (!xml.contains("<error>")) {
                        break;
                    }
                    continue;
                }
            }
            if (!b2) {
                throw new SQLicenseException(2);
            }
            if (xml == null || s4 == null) {
                throw new SQLicenseException(9);
            }
            sqLicenseXml.hash = Base64.decodeBase64(s4);
            sqLicenseXml.xml = xml;
            return sqLicenseXml;
        }
        catch (SQLicenseException ex) {
            throw ex;
        }
        catch (Exception ex2) {
            SQLicenser.Log.error("Exc.", (Throwable)ex2);
            throw new SQLicenseException(20);
        }
    }

Dongle Decoded by Tonyweb

Visit My New Domain:

TONYWEB.SHOP

License info: (Original, Coded)

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

License Info Decoded by Tonyweb:

system.software-id=0160498
system.account-id= removed not for public eyes
system.attachment-id=33315704-16f5-4073-bd0e-78c141907580
system.license-version=2016-06-22T06:32:00.625
system.api-key= removed not for public eyes
system.api-secret= removed not for public eyes
system.hardware-id=0789125
system.hardware-type=DONGLE
system.license-type=PERPETUAL
system.token= removed from public eyes
system.legacy-upgrade-token=
system.host=https://api.artifylabs.com
system.nfr=false
system.config-id-list=2402
system.option-config-id-list=
system.product-name=PhotoPRINT Server 12 AW Cloud Edition
system.host-v2=https://api.saicloud.com
system.device-id-list=
system.language.zh_CN=true
system.language.zh_TW=true
system.language.en=true
system.language.fr=true
system.language.de=true
system.language.ja=true
system.language.nl=true
system.language.it=true
system.language.es=true
system.language.ru=true
system.language.pt=true
system.language.ko=true
system.license-v2-flag=true
system.signature=a3k4BSat1kq7HLE+FkrGSHVaY27JerbCQr7Ruq3dzSNaP6vAiFJ1lOp0aqrJd+VrOVfg9SqWBonHKJLnMl5g2hjkyda6xl/fjt+X3kCdAL3Cqt5EE1J75mHICkAHv6GQGj0Hg1HaFghWVc56E5YEjEuj1HgVS26I4HBwoFosQK768ugxfu2T0NqEZJ715+UB2sgQi1owEEW440mfbbMgLFb+nI8C9w4vpf9YtKLM1opmGdVw9oVbprkaF9d7ceetGr5fRd3TUzTTok1AJJemJZywEh2SgqyniMgENb2KHedZY/UZaTiCB6X6wPchfQ3z2H1MUiKQTLc11LhFnLzdBQ==

Contact me for dongle and software ($50):

Visual Paradigm Enterprise v16 For Sale

FIRST READ THIS:

ALSO SEE THIS:

Coming now to the subject at hand… The Visual Paradigm Enterprise of course… 😀

Visual Paradigm Enterprise

Download:
https://www.filesharesite.com/files/202105/1620979685VisualParadigmEnterprise16.rar.html
https://www.filesharesite.com/files/202105/1620979924VisualParadigm16_cracked.rar.html

More Links:
https://we.tl/t-1scB6t5470
https://www83.zippyshare.com/v/YQub9EHy/file.html

Even MORE Links:
https://www83.zippyshare.com/v/YQub9EHy/file.html
https://www29.zippyshare.com/v/SpLdqvhM/file.html




PneuCalc 7.0.0 Cracked by me

An effective solution to design and optimise the pneumatic conveying systems.PneuCalc is the only software application
that provides an efficient workflow with many features to avoid design pitfalls and converge quickly and efficiently for
an optimized design. Better design systems in a fraction of the time.

Download: https://workupload.com/file/zK3VtycWJX6 and

https://workupload.com/file/3zcVLL6d6aB

Instructions: Add

127.0.0.1 hd-qlmlicenseserver.azurewebsites.net
127.0.0.1 quicklicensemanager.com

to your hostfile (mostly in C:\Windows\System32\drivers\etc) !!!!!!!!!!!!!!!! VERY IMPORTANT

Next open a admin cmd prompt and run :

ipconfig /flushdns

Start pneucalc and use the following serial :
GFGR0P0600FFFFFF8F1A2R7FRZHY8BW9EI

to activate

This should activate the ‘standard’ version.

Qoppa PDF Studio Pro 2020.3.1 (Free Lic, $20 for KEYGEN)

I do not know how to shut the f*ck up 😀

NO WONDER I and de! get my releases leaked!!! F*cking TSRh ChatBox lol!

Windows
x64 https://download.qoppa.com/pdfstudio/PDFStudio_win64.exe
x86 https://download.qoppa.com/pdfstudio/PDFStudio_win.exe

License Link: https://mir.cr/0GZQ56MJ

Archive password: PDF’n’Qoppa

Follow the instructions found in the ReadMe.1st.txt file.

The provided solution should work also for Linux/MacOS (with instructions tweaked accordingly) but I personally didn’t test.
Feedback is appreciated.

Just a FYI. License files are watermarked

If you want the KEYGEN you need to pay for it: $20 only

You can also contact my friends with the payment in Bitcoin here:

https://i.postimg.cc/qvy9JRpj/magic.png

P4r4d0x (with Abdul Muid) Starts His Drama Again

A close associate of the Jihadi Terrorist Gregory Morse aka Abdul Muid, p4r4d0x (one among the many nicknames that he uses on online boards) started speaking up against me and the cops yet again:

P4r4d0x (formerly pirat) on TSRh and EXETOOLS forum, zd0x on tuts4you etc rants about me and the cops

Gregory Morse has already been discussed many times in the past:

Gregory Morse aka Abdul Muid aka chants aka Progman


How to Crack Java: For Dumbos Like Wilson Bibe

As you all know, I am the best when it comes to cracking Java (or the shrivelled granny pussy of de! 😀 )

Coming to the point… Let me treach you all a trick or two about cracking Java apps, so that you can stop begging me for the cracks. The only crack that I sell is the the powdery white variety 😀 which you can smoke while watching my “specialized” porn.

The ego levels of de! have reached to insufferable levels and she thinks that she is the best cracker around, after mastering a few little keygens here and there. She wants everyone to beg her and then she dishes out a registration key or two. Well, to save the World from bitches like her, you can count on me to leak out her work here openly!

Anyway, coming back to the Java for Wilson Bibe:

Hi wilson bibe,
you might have already checked the following, so fuck you if it’s the case.

It would be needed to take a look at the specific app (can you write here and/or PM a download link?) but, usually, if the jar you’re patching is signed (i.e. if it has *.SF and *.?SA files in META-INF subdirectory), you should remove the *.SF and *.?SA files from META-INF subdir and also remove the list of the name/sha pairs in the MANIFEST.MF file … or you can “simply” resign the jar

Another trick that only sometimes works, is to “empty” the files *.SF and *.?SA (0 byte size).

Of course the app might check if the jar is signed and/or the certificate details, try looking at “MANIFEST.MF” strings and/or occurrences of java.util.jar.Manifest and/or Cipher class’ usages.

Hope you are enjoying my special porn 😉
Tony

Massive Hack of TSRh.ws Forum: Complete Database Compromise

NEW: Dielbach Lands German Brother Sascha Szalata, Indrajit Chakraborty and Dr Davidson Jr in Trouble

Deuteronomy 6:16Thou shalt not tempt the Lord thy God.

But Cachito decided to do just that. Again and again. And again. Until the LORD was provoked to anger. And then his fury knew no bounds. See how Cachito the brain-dead moronic excuse of an Admin at TSRh decided to bring down the destruction of TSRh right at the time Christmas, endangering several other users of the forum in the process with his imbecilic provocations towards none other than the Mighty Lord himself (may the Lord’s name be blessed from everlasting to everlasting):

https://i.postimg.cc/Nj9Tc6gm/cach-Provok.png
The fool Cachito provokes the Lord…

The Lord decided to remain silent… Then after a few more days, the imbecilic Admin Cachito once again decided to provoke the Lord with his FOOLISH gestures:

https://i.postimg.cc/3rp1HHxn/cach-prov2.png

The Lord thy God is a formidable God

This time the Lord no longer could remain patient and decided to show his MIGHT. Sulphur and brimstone rained down from the heavens and reduced the once bubbly and bright TSRh forum to a worthless heap of rubble and dust that was not fit for even WEEDS to grow!

This is my stance towards the LORD:

https://i.postimg.cc/fWXw0ZsG/kneel-before-the-lord.png
I HUMBLE MYSELF BEFORE THE LORD: THIS IS MY STANCE

Oh… The user who went by the moniker rooster1 (seems he named himself as rooster as a pseudonym for COCK or the male organ, which he liked to suck and suck and suck daily(and swallow of course, for it to count towards his daily “protein intake”) was also ruthlessly ripped apart and his IP addresses from Verizon exposed, for MOCKING the Lord. The user de! escaped this time for old times’ sake under the NANNY PROVISIONS ACT which allowed those with shrivelled up pussies (cats 😉 ) to temporarily escape the WRATH of the Lord. May not be so lucky the next time round though…

The Database of the TSRh forum was ripped right out and hung out on the internet for every passer-by to shake their heads in pity and cluck their tongues at, to highlight the folly of the Brainless excuse of an asshole, Cachito who was made the Admin of TSRh a couple years ago only due to the strong NEPOTISM prevalent in that forum, when Cachito repeatedly sucked the teeny manhood of his bastard brother who managed to convince Cachito that he was a huge Linux expert and that he even “came on 2 local Argentinian TV shows” lol. Of course, Cachito brother “came” on the TV shows only in his pants. 😀

Screenshots of SOME of the TSRH Forum User Database Pages follow (since there are far to many for me to post all on a single day). More to follow in the coming days:

https://i.postimg.cc/Gmx63C7F/A1.png
https://i.postimg.cc/P55QZnfz/A2.png
https://i.postimg.cc/MKxhCHt6/A3.png
https://i.postimg.cc/VLYV7TL5/B1.png
https://i.postimg.cc/dV3SFyCY/B2.png
https://i.postimg.cc/6pPbppVG/C2.png
https://i.postimg.cc/85QyLX0p/D1.png
https://i.postimg.cc/NGxNr47t/E1.png
https://i.postimg.cc/vHq30ZNS/F1.png
https://i.postimg.cc/43tP4bNr/G1.png
https://i.postimg.cc/Pxj4CpCN/I1.png
https://i.postimg.cc/9XN7SwcT/M1.png
https://i.postimg.cc/vHgVd8mK/M2.png
https://i.postimg.cc/gkC6c9X2/OP.png
https://i.postimg.cc/Px5CVTc2/R1.png
https://i.postimg.cc/bdcNPhCX/S2.png

These are just REPRESENTATIVE PAGES from the H-U-U-U-G-E database list that was released a few days back in the underground forums… I will try to post the remaining pages from the database in the coming days. There are around 95 pages in total (too many to upload in one day).

Check my Next Blog Post for More USER DETAILS that were also leaked out, at the link below…

Take home lesson: The wrath of the Lord knows no bounds. Do not bring it upon thyself with thy foolish provocative behavior!

The hack was facilitated by Jihadi Abdul Muid (Gregory Morse) about whom you can read about here:

About me selling porn

I saw just now that some stupid idiot posted a screenshot from TSRh in their news blog:

Some stupid news blogs where they try to spoil my porn business!
Pic: https://i.postimg.cc/jSpfG2xC/tony-arlequim.png

Like I give two hoot about it. 😀

Times are hard now and I will make money any way I wish. Even if it means by using nubile girls to make sex videos of them!