Web
: http://mxb.cjb.net
Contact Me : [email protected] or [email protected]
All Webs Menus 1.1
Type : Some web
application
Protection : Serial
Tech : Serial fishing
Crack : I am not at all interested in VB programs,may be because
it lacks structure.
Any way I tried one program,it seems the every thing is done my
the DLL msvbx.So first thing we will do here is to run W32DASM on
program file and search for imported function
_vbaStrCmp ===>>> CALL [0x401108]
So enter fake S/N and in SICE BPX HMEMCPY
And hit 'OK'
Put a break point at this CALL.
Now see the address stored in 0x401108 it is 0x6602484F which
is in msvb6dll.
Now put a break point on 0x6602484F
After three pop ups
0x6602484F PUSH [ESP+08] >> FAKE S/N IN THE FORMAT X.X.X.X.X....
0x66024853 PUSH [ESP+08] >> REAL S/N IN THE FPRMAT X.X.X.X.X....
0x66024857 PUSH 00
0x66024859 CALL 0X66024861 >> COMPARE BOTH
Registration Info :
LIC ID = GUDHE71A
PASSWORD = OQX-03N-E1A