Web
: http://mxb.cjb.net
Contact Me : [email protected] or [email protected]
Photo Line 32 - 7.13
Type : Image Editor
Protection : Serial
Tech : Self generation
Crack : Here we will use the same technique we used to crack its older
version.
Enter any fake S/N ... and in SICE - BPX GETWINDOWTEXTA
0x5A9535 MOV ECX,ESI
0x5A9537 CALL 5A91D0
0x5A953C TEST AX,AX
0x5A953F JNZ 5A961E
INSIDE ===>>>
0x5A92F2 CALL 5623F0
0x5A92F7 ADD ESP,04
0x5A92FA TEST AX,AX
0x5A92FD JZ 5A934F
INSIDE ===>>>
0x56240E PUSH ECX ==>> "IGN"
0x56240F PUSH EAX ==>> CODE 2
0x562410 CALL 5BE020 ==>> ENCRYPT CODES ...
0x562415 MOV EAX,[ESP+0C]
0x562419 ADD ESP,08
0x56241C TEST EAX,FFF
0x562421 JZ 56242A
...........................
0x56242A AND EAX,FFFFF000
0x56242F CMP EAX,0007F000 ===>> TO PASS ALL THIS CHECK EAX MUST BE = 7F000
It is seen that we can generate a range of values using CALL 5BE020 - only problem
is
that ECX and EAX [which are pushed before CALL]must be old values before CALL
is
executed.
Self Generating Algorithm :
Enter CODE 1 = 520192 = 0x7F00 ;CODE 2 = 00000000
Assemble following code at :
0x56241C CMP EAX,7F000
0x562421 JZ STOP --- PUT A BPX ON STOP --- SO THAT WE WILL GET CODE 2
0x562423 MOV ECX,9FEAF8 --- RESTORE ECX
0x562428 MOV EAX,9FEB10 --- RESTORE EAX
0x56242D MOV EAX,DWORD PTR [EAX]
0x56242F INC EAX - INCREASE CODE 2
0x562430 MOV DWORD PTR [9FEB10],EAX --- STORE CODE 2
0x562436 MOV EAX,9FEB10 --- RESTORE EAX
0x56243A JMP 56240E --- GO UP ----
Registration Info :
CODE 1 = 520192 ; CODE 2 = 24603