Asura has crossed the lines - he really thinks we are a bunch of stupid kids.
The first answer must be cracking the DT.dll and incorporating its content into 4.12
it must be a priority
From a dirty look inside the files, this dll interacts with the AI, the FM and the trackIR system:
com_maddox_il2_ai_air_AirGroup_groupLove
com_maddox_il2_ai_air_Pilot_doFighterDefense
com_maddox_il2_ai_air_Pilot_doStormovikDefense
com_maddox_il2_ai_air_Pilot_doTransportDefense
com_maddox_il2_fm_FMMath_nInit
com_maddox_il2_fm_FMMath_nInitSeed
com_maddox_il2_fm_FlightModel_nCreateSubSkills
com_maddox_il2_fm_FlightModel_nDanCoeff
com_maddox_il2_fm_FlightModel_nFullPants
com_maddox_il2_fm_FlightModel_nLandAvoidance
com_maddox_il2_fm_FlightModel_nSD
com_maddox_il2_fm_FlightModel_nShakeMe
com_maddox_il2_fm_FlightModel_nShootingPoint
com_maddox_il2_fm_FlightModel_nSmackMe
com_maddox_il2_fm_Wind_SetWind
com_maddox_opengl_util_ScrShot_getScreenShot
com_maddox_rts_TrackIRWin_nCreateDT
com_maddox_rts_TrackIRWin_nDTVersion
com_maddox_rts_TrackIRWin_nDestroyDT
com_maddox_rts_TrackIRWin_nGetAnglesDT
The DLL itself seems to be obfuscated in some way as both VB decompilers and NET decompilers do not recognize it, although by renaming it 7z instead of dll, one can see that the structure is a classic Windows Portable Executable.
I'm sorry that this is the limit of my computing knowledge, but we have quite a number of professionals here, and I'm sure that they can find a way to decompile it or bypass it.
The second step is of course to identify the still unidentified 25% content of the files.sfs archive