Web : http://kickme.to/mxbnet
Contact Me : dheeraj_xp@yahoo.com


PolyView 3.20.1

Type : Image Viewer
Protection : Serial
Tech : Serial fishing


Crack : Enter fake values and in SICE
BPX GETWINDOWTEXTA

0x44EE09 CALL 0x43A150
Inside this CALL >>>

0x43A1F4 CMP EAX,EBX

EAX = HEX OF REAL S/N
EBX = HEX OF FAKE S/N

Registration Info :

Name = DHEERAJ
S/N = 02595301103
S/N = 199536293


E NEXT CHAR WITH '01'

SO OUR S/N IS OF THE FORM = KG0511Axxxxxxx

0x41EF30 CMP EAX,01

SO OUR S/N IS OF THE FORM = KG0511A001xxxx

0x41F078 CALL 0x45065A >> COMPARE REST OF S/N WITH 'ICNE'

Registration Info :

S/N = KG0511A001ICNE

Note : This Program stores a secret key in
HKLM\SOFTWARE\MICROSOFT\WINDOWS\SYSTEM


numbers will be different.


br> that ECX and EAX [which are pushed before CALL]must be old values before CALL is
executed.

Self Generating Algorithm :

Enter CODE 1 = 520192 = 0x7F00 ;CODE 2 = 00000000
Assemble following code at :

0x56241C CMP EAX,7F000
0x562421 JZ STOP --- PUT A BPX ON STOP --- SO THAT WE WILL GET CODE 2
0x562423 MOV ECX,9FEAF8 --- RESTORE ECX
0x562428 MOV EAX,9FEB10 --- RESTORE EAX
0x56242D MOV EAX,DWORD PTR [EAX]
0x56242F INC EAX - INCREASE CODE 2
0x562430 MOV DWORD PTR [9FEB10],EAX --- STORE CODE 2
0x562436 MOV EAX,9FEB10 --- RESTORE EAX
0x56243A JMP 56240E --- GO UP ----

Registration Info :

CODE 1 = 520192 ; CODE 2 = 24603


015F:10046F9F 51 PUSH ECX