How to find the real serial 

Aesop Gif Creator Version 1.00.215

a Cracking tutorial By Nemesis] TNT

DISCLAIMER

This reading material is not intended to violate Copyrights
and/or it is law, but educational purposes only. I hold no
responsibility ( by all means and in any shape whatsoever )
of the mis-used of this material.

About The Program

"Aesop" is a powerful tool that allows you to create incredible advertising GIF images (banners, buttons, lines, lables, backgrounds, headings for web-sites and etc.) that contains sophisticated studio-quality, special effects, 3D fonts and image manipulation features. Greatly looking effects (for example moving the text across the image) can be realized into a multi-frame GIF in a few minutes. Palette optimization and data compression give you a possibility to obtain small size GIFs. Simplicity and convenient interface make this program useful for experienced programmers as well as for beginners in graphic design.

WHERE TO DOWNLOAD

Homepage :http://www.yukdr.com/software.htm
Size : 1.05mb

Tool: numega Softice 4.5 [can be download at http://www.eccentrix.com/computer/protools/

HOW TO GET VALID SERIAL NUMBER for your name By Using [Softice]

lets get started run  Aesop Gif Creator now enter your fake serial click register button message box say Invaild Key ! ok now do this ctrl D bring softice , now we should put breakpoint like this bpx hmemcpy and enter press F5 to get out off softice, type your fake serial in the edit click register now you are back in softice, now lets search for real serial ;-) ok press  F12 12 times until we land at this address below, now press F10 to go down to the call 0048D4E5




:0048D4C2 8B95FCFEFFFF         mov edx, dword ptr [ebp+FFFFFEFC]
<--we land here
:0048D4C8 8D8500FFFFFF          lea eax, dword ptr [ebp+FFFFFF00]
:0048D4CE B9FF000000               mov ecx, 000000FF
:0048D4D3 E8746AF7FF              call 00403F4C
:0048D4D8 8D9500FFFFFF          lea edx, dword ptr [ebp+FFFFFF00]
:0048D4DE A154864900               mov eax, dword ptr [00498654]
:0048D4E3 8B00                            mov eax, dword ptr [eax]
:0048D4E5 E87A7C0000              call       00495164
<-- trace this call with F8
:0048D4EA A154864900               mov eax, dword ptr [00498654]
:0048D4EF 8B00                            mov eax, dword ptr [eax]
:0048D4F1 80B872FB0700FB       cmp byte ptr [eax+0007FB72], FB
:0048D4F8 0F8592000000             jne 0048D590
--------------------------------------------------------
:00495164 55 push ebp
<--- we land here

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004950EC(C), :0049510D(C)
|
:00495165 8BEC                            mov ebp, esp
:00495167 81C4F4FEFFFF           add esp, FFFFFEF4
:0049516D 53                                 push ebx
:0049516E 56                                 push esi
:0049516F 57                                 push edi
:00495170 33C9                             xor ecx, ecx
:00495172 898DFCFEFFFF          mov dword ptr [ebp+FFFFFEFC], ecx
:00495178 898DF8FEFFFF          mov dword ptr [ebp+FFFFFEF8], ecx

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00495126(C)
|
:0049517E 898DF4FEFFFF         mov dword ptr [ebp+FFFFFEF4], ecx
:00495184 8BF2 mov esi, edx
:00495186 8DBD00FFFFFF         lea edi, dword ptr [ebp+FFFFFF00]
:0049518C 33C9                            xor ecx, ecx
:0049518E 8A0E                           mov cl, byte ptr [esi]
:00495190 41                                 inc ecx
:00495191 F3                                repz
:00495192 A4                                movsb
:00495193 8BD8                           mov ebx, eax

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00495121(C)
|
:00495195 33C0                            xor eax, eax
:00495197 55                                push ebp
:00495198 6837524900                push 00495237
:0049519D 64FF30                      push dword ptr fs:[eax]
:004951A0 648920                       mov dword ptr fs:[eax], esp
:004951A3 C68372FB070000      mov byte ptr [ebx+0007FB72], 00
:004951AA 8D85FCFEFFFF       lea eax, dword ptr [ebp+FFFFFEFC]
:004951B0 8D9500FFFFFF         lea edx, dword ptr [ebp+FFFFFF00]
:004951B6 E859EDF6FF            call 00403F14
:004951BB 8B85FCFEFFFF        mov eax, dword ptr [ebp+FFFFFEFC]
:004951C1 50                                push eax
:004951C2 8D85F4FEFFFF         lea eax, dword ptr [ebp+FFFFFEF4]
:004951C8 50                                push eax
:004951C9 B906000000                mov ecx, 00000006
:004951CE BA04000000              mov edx, 00000004

* Possible StringData Ref from Code Obj ->"mtx
mttrpjtl" <---- ?
|
:004951D3 B850524900                mov eax, 00495250
:004951D8 E89BEFF6FF             call 00404178
:004951DD 8B85F4FEFFFF         mov eax, dword ptr [ebp+FFFFFEF4]
:004951E3 8D95F8FEFFFF         lea edx, dword ptr [ebp+FFFFFEF8]
:004951E9 E8323DF7FF             call 00408F20
:004951EE 8B95F8FEFFFF        mov edx, dword ptr [ebp+FFFFFEF8]
:004951F4 58                                 pop eax
:004951F5 E886EEF6FF             call 00404080 <--- type d edx for the real code
:004951FA 7516                            jne 00495212
:004951FC 33D2                           xor edx, edx

now remember the serial you have fond enter it and is registered !

easy or ??? the program is registered  ;-) hope you find it useful ?


END NOTES


Special Thanks go to All [TNT MEMBERS] Keep it Real guys.

 

Nemesis]