Web : http://kickme.to/mxbnet
Contact Me : dheeraj_xp@yahoo.com


Main | Index

Message Pad 1.02

Type : Some Program
Protection : Serial
Tech : Serial Fishing


Crack : Enter fake S/N and in SICE BPX GETWINDOWTEXTA
Click 'OK'

0x40953C LEA ECX,[ESP+18] >> ADDRESS OF REAL S/N

Registration Info :

Name = DHEERAJ
S/N = 4140-3256-984


/p>

Main | Index

Memory Zipper Plus v7.02d

Type : System utility
Protection : 32 Day Trial
Tech : Patching

Crack :

015F:0040785B 68D0F74600 PUSH 0046F7D0
015F:00407860 E8D07C0000 CALL 0040F535 ---> Main 32 chk
015F:00407865 663D0100 CMP AX,0001 ----> Make EAX = 0
015F:00407869 0F84BF030000 JZ 00407C2E
015F:0040786F 68D0F74600 PUSH 0046F7D0
015F:00407874 E8F6830000 CALL 0040FC6F ---> 32 Days Chk
015F:00407879 83F820 CMP EAX,20 -----> Make EAX = 0
015F:0040787C 0F8FAC030000 JG 00407C2E


Inside CALL 0040F535 ....

015F:0040F5B7 E846020200 CALL 0042F802
015F:0040F5BC 66B80100 MOV AX,0001 ---> Flag Set
015F:0040F5C0 EB3E JMP 0040F600

Patch : Offset = E9BC

015F:0040F5BC 66B80000 MOV AX,0000

Inside CALL 0040FC6F ....

015F:0040FCCF 5E POP ESI
015F:0040FCD0 8B8000060000 MOV EAX,[EAX+00000600] --> No: Days
015F:0040FCD6 64890D00000000 MOV FS:[00000000],ECX

Patch : Offset = F0D0

015F:0040FCD0 33C0 XOR EAX,EAX
015F:0040FCD2 90 NOP
015F:0040FCD3 90 NOP
015F:0040FCD4 90 NOP
015F:0040FCD5 90 NOP
015F:0040FCD6 64890D00000000 MOV FS:[00000000],ECX

CRC Check : They are doing CRC Check ... So to escape from it ...

015F:00410783 51 PUSH ECX
015F:00410784 E86C0A0000 CALL 004111F5
015F:00410789 48 DEC EAX --------> Make EAX = 0
015F:0041078A 7403 JZ 0041078F ---> BAD Boy
015F:0041078C 48 DEC EAX
015F:0041078D 750C JNZ 0041079B ---> Good Boy

Patch : Offset : FB89

015F:00410784 E86C0A0000 CALL 004111F5
015F:00410789 90 NOP
015F:0041078A 90 NOP
015F:0041078B 90 NOP
015F:0041078C 90 NOP
015F:0041078D EB0C JMP 0041079B


Opps this DREAMPOP.EXE is using CRC checking :(