--------------------------------------------------------- How to find a serial in ExIcon v1.9b --------------------------------------------------------- Cracker: stealthFIGHTER Target: ExIcon v1.9b Tools: W32dasm Hiew Brain Where: http://www.basta.com Sorry for my english, its not my mother language. ----------- Step 1: ----------- Run ExIcon, go to about - registration - enter any s/n. Boom - error message <- write it down. Open ExIcon.exe in W32Dasm - click SDR window and find the message and dbl click on it. You are here: * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0040ABBF(C) <---------------------- here we go! | :0040ABE3 6AFF push FFFFFFFF :0040ABE5 6A30 push 00000030 * Possible Reference to String Resource ID=25224: "The password you have entered is incorrect." | :0040ABE7 6888620000 push 00006288 <------- we are here :0040ABEC E8908B0100 call 00423781 Press SHIFT+F12 and enter 0040ABBF. We land here: * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0040AB29(C) <---------------------- here we go! | :0040AB7F 51 push ecx :0040AB80 E80B2F0000 call 0040DA90 :0040AB85 83C404 add esp, 00000004 :0040AB88 8BF8 mov edi, eax :0040AB8A E8EBC30100 call 00426F7A :0040AB8F 8B4010 mov eax, dword ptr [eax+10] :0040AB92 6A00 push 00000000 :0040AB94 50 push eax :0040AB95 E8D6100000 call 0040BC70 :0040AB9A 8BCF mov ecx, edi :0040AB9C 83C408 add esp, 00000008 :0040AB9F 2BC8 sub ecx, eax :0040ABA1 81F94D060000 cmp ecx, 0000064D :0040ABA7 7418 je 0040ABC1 :0040ABA9 81F943060000 cmp ecx, 00000643 :0040ABAF 7410 je 0040ABC1 :0040ABB1 81F95F060000 cmp ecx, 0000065F :0040ABB7 7408 je 0040ABC1 :0040ABB9 81F9F0050000 cmp ecx, 000005F0 :0040ABBF 7522 jne 0040ABE3 <----- we are here Press SHIFT+F12 and enter 0040AB29. We land here: * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0040AAD2(U) | :0040AAD6 50 push eax :0040AAD7 8B8424D8000000 mov eax, dword ptr [esp+000000D8] :0040AADE 50 push eax :0040AADF 8D4C2414 lea ecx, dword ptr [esp+14] :0040AAE3 E888CCFFFF call 00407770 :0040AAE8 8D4C240C lea ecx, dword ptr [esp+0C] :0040AAEC C78424CC00000000000000 mov dword ptr [esp+000000CC], 00000000 :0040AAF7 E8CA210100 call 0041CCC6 :0040AAFC 83F801 cmp eax, 00000001 :0040AAFF 0F85EC000000 jne 0040ABF1 :0040AB05 8B8424BC000000 mov eax, dword ptr [esp+000000BC] :0040AB0C 8B48F8 mov ecx, dword ptr [eax-08] :0040AB0F 85C9 test ecx, ecx :0040AB11 0F84DA000000 je 0040ABF1 :0040AB17 50 push eax :0040AB18 E833100000 call 0040BB50 <----------- a call :0040AB1D 8B8C24C0000000 mov ecx, dword ptr [esp+000000C0] :0040AB24 83C404 add esp, 00000004 :0040AB27 85C0 test eax, eax <---------- test :0040AB29 7454 je 0040AB7F <---------- bad boy Double click on call 0040BB50 and execute it (press Call on the to panel) We land here: * Referenced by a CALL at Addresses: |:00409DC5 , :0040AB18 | :0040BB50 53 push ebx <----- nice! :0040BB51 56 push esi <----- nice! :0040BB52 8B74240C mov esi, dword ptr [esp+0C] :0040BB56 57 push edi :0040BB57 85F6 test esi, esi :0040BB59 0F84F2000000 je 0040BC51 :0040BB5F 8BFE mov edi, esi :0040BB61 83C9FF or ecx, FFFFFFFF :0040BB64 33C0 xor eax, eax :0040BB66 F2 repnz :0040BB67 AE scasb :0040BB68 F7D1 not ecx :0040BB6A 49 dec ecx :0040BB6B 83F910 cmp ecx, 00000010 :0040BB6E 0F85DD000000 jne 0040BC51 :0040BB74 B90F000000 mov ecx, 0000000F Double click on the 0040BB50 push ebx and write down the offset (AF50). Run Hiew, select decode, press F5 and enter the offset. Press F3, then F2 and enter: mov eax, 1 [ENTER] ret [ENTER] Press F9 and quit. Run again. Wov, we are a registered user. --------------------------------------- If i make a mistake, please e-mail me to: stealthfighter@another.com --------------------------------------- movsx eax, byte ptr [ebx]