Web
: http://mxb.cjb.net
Contact Me : [email protected] or [email protected]
Mass
Downloader 1.2.95 - SR2
Type : Download
Manager
Protection : ASPROTECT
Tech : Serial fishing ...
Crack : ASprotect is really a mess.In this release it does not allow
us to set a breakpoint and
also it has anti - debugging tricks.If it detects SICE ...then we will have
to reboot computer as
seting a break point will lead to 0E protection fault and all those mess ...
keyboard will be disabbled ....etc
How can we defeate this sucker ???
We will do a simple trick.ASprotect doesn't allow us to set break point on API
CALL - what we will
do is set break point in side API .....but we must first find proper API ...
So at command prompt of SICE - type this :
U GETMODULEFILENAMEA
BPX BFF77715 X ========>>> THIS IS INSIDE KERNEL!GETMODULEFILENAMEA
- A JUMP INSTRUCTION
Now run Massdownloader .... when we pop in to code section of ASprotect ...
trace back
0x562795 MOV EDX,[EBP-0C]
0x562798 MOV EDX,[EDX+05]
0x56279B CALL 561D88 =========>> DON'T EXECUTE THESE
0x5627A0 CALL 5532B0 =========>> TWO CALL'S - JUMP OVER
............................... =========>> ADDRESS WILL BE DIFFERENT
xxxxxxxxx JMP xxxxxxxx =========>> IN YOU COMPUTER AS IT USES
............................... =========>> DYNAMIC LOADING....
================= ******BE CARE FULL
=====SMC STUFF=== ******
=================
0x5627CA MOV AX,0004 | 66 B8 04 00 ===>> WHEN YOU REACH HERE RAISE EXCEPTION
i.e
CHANGE 66 B8 ==>> 00 00 - THIS WILL RAISE AN EXCEPTION ...AND PROGRAM
WILL NOT
DETECT SICE.
Now finding S/N for this program is realy simple.Enter any fake S/N and in SICE
BPX HMEMCPY ....trace ...
0x490CF8 CALL 4A72DC ==> MAIN CHECK
0x490CFD TEST AL,AL
0x490CFF JZ 490D6C
INSIDE CALL 4A72DC ...
0x4A75AE MOV EDX,[EBP-10] ==>> REAL S/N
0x4A75B1 MOV EAX,[EBP-08] ==>> FAKE S/N
0x4A75B4 CALL 403ECC
0x4A75B9 SETZ BL ===> FLAG SET
Registration Info :
Name = DHEERAJ
S/N = 556858-416753758-PP
LIC = SITE LIC