Web : http://mxb.cjb.net
Contact Me : [email protected] or [email protected]


Main | Index

Mass Downloader 1.2.95 - SR2

Type : Download Manager
Protection : ASPROTECT
Tech : Serial fishing ...


Crack : ASprotect is really a mess.In this release it does not allow us to set a breakpoint and
also it has anti - debugging tricks.If it detects SICE ...then we will have to reboot computer as
seting a break point will lead to 0E protection fault and all those mess ... keyboard will be disabbled ....etc

How can we defeate this sucker ???

We will do a simple trick.ASprotect doesn't allow us to set break point on API CALL - what we will
do is set break point in side API .....but we must first find proper API ...

So at command prompt of SICE - type this :

U GETMODULEFILENAMEA
BPX BFF77715 X ========>>> THIS IS INSIDE KERNEL!GETMODULEFILENAMEA - A JUMP INSTRUCTION

Now run Massdownloader .... when we pop in to code section of ASprotect ... trace back

0x562795 MOV EDX,[EBP-0C]
0x562798 MOV EDX,[EDX+05]
0x56279B CALL 561D88 =========>> DON'T EXECUTE THESE
0x5627A0 CALL 5532B0 =========>> TWO CALL'S - JUMP OVER
............................... =========>> ADDRESS WILL BE DIFFERENT
xxxxxxxxx JMP xxxxxxxx =========>> IN YOU COMPUTER AS IT USES
............................... =========>> DYNAMIC LOADING....
================= ******BE CARE FULL
=====SMC STUFF=== ******
=================
0x5627CA MOV AX,0004 | 66 B8 04 00 ===>> WHEN YOU REACH HERE RAISE EXCEPTION i.e

CHANGE 66 B8 ==>> 00 00 - THIS WILL RAISE AN EXCEPTION ...AND PROGRAM WILL NOT
DETECT SICE.

Now finding S/N for this program is realy simple.Enter any fake S/N and in SICE
BPX HMEMCPY ....trace ...

0x490CF8 CALL 4A72DC ==> MAIN CHECK
0x490CFD TEST AL,AL
0x490CFF JZ 490D6C

INSIDE CALL 4A72DC ...

0x4A75AE MOV EDX,[EBP-10] ==>> REAL S/N
0x4A75B1 MOV EAX,[EBP-08] ==>> FAKE S/N
0x4A75B4 CALL 403ECC
0x4A75B9 SETZ BL ===> FLAG SET

Registration Info :

Name = DHEERAJ
S/N = 556858-416753758-PP
LIC = SITE LIC