:00428163 E820B5FDFF call 00403688 //Count the real serial
:00428168 751E jne 00428188 //If dummy = real serial then "GOOD GUY" MSG!!!
:0042816A 6A00 push 00000000
* Possible StringData Ref from Code Obj ->"Gratulations"
|
:0042816C 6808824200 push 00428208
* Possible StringData Ref from Code Obj ->"Well Done! Try the next CrackMe."
Okey, well this part gave me much more... =) well...
Now type any Name and serial in the fields (edits) and do not press enter yet!
Now Press CTRL+D to get into softice and there u type this: "bpx hmemcpy"
Now press F5 to get back to windows...
Now Click the register button and boom yer into softice...
Now type: "bd *" press ENTER(to disable yer breakpoint) and then "g 015F:00428160" and press ENTER!!!
Now yer landed just before the call which counts a valid serial for u!!!
Step into that call with F8 and then press F10 untill this line: "cmp eax,edx" Now type: "d eax" and there u see yer dummy code and to see your real registration code type: "d edx" and *BOOM* in the code window there is it!!
Mine was. Name: FireWorx Code: 19-1-09
Sorry for the mess in the end but i hope you┤ll manage to understand the most parts of it!!!
Thx to all i know and especially to E_Bliss for have a nice page and to Phox for being a "good friend" :P
And to Wizzkid and many others...
Bye all / FireWorx - Dark Cracking Force 2000 [dCF2000]