Търся регнати MMTools for Delphi 3,6
Ситуацията е следната от доста време из нета търся , регистрирани MMTools компоненти на SwiftSoft , но за съжаление неуспешно.
Ако някои ги има регистрирани и с работещо IDE , моля да помогне.
Компонентите са свързани основно с MP3,MPEG декомпресии , визуализации , и други глезотии от този порядък .За пример мога да посоча , че BPM studio е направен изцяло с компоненти на SwiftSoft .Оригиналния адрес откъдето можете да си изтеглите работеща версия на компонентите е : http://swiftsoft.de/
От тук компонентите са FullFunctional , но не можете да ги използвате в компилиран вид на машини без MMTools Delphi IDE Registration .
Компонентите се разпространяват както за Delphi 3,4,5,6 така и за C++Builder .На мене са ми необходими във вида за Delphi .
Преди доста време успях да изровя един (1) крак ,но той не работеше по никакъв показател .
Благодаря , предварително .
_____________________________________________________________________
...In the land of eternal darkness light must come from within...
Търся регнати MMTools for Delphi 3,6
RE: няма ли ги направо някой готови в регистриран вид ?
<font color="red">mod ru-boy: Моля ползвай функцията EDIT, не е нужно да пишеш пост след пост.</font id="red">
ok.copy.never again. --> но имам всичко два поста за цяла година и това ако е спам ...
Търся регнати MMTools for Delphi 3,6
Ето тука има някакви (за да ги дръпнеш ти трябва емуле : www.emule-project.com )
ed2k://|file|[APP.-.ENG].MMTools.BCB3456.Incl.Unlocker.v2.0.rar|15846266|46FF99B219C147B8CD0FE2BFAE118D1E|/
ed2k://|file|(Component-Delphi).-.MMTools.D4567.Incl.Unlocker.v2.0.rar|8926044|2CD573F277960E7220B5DCB9A7266A9B|/
Не съм ги тествал, проверявай за вируси!
Търся регнати MMTools for Delphi 3,6
10x . Благодарско <font color="blue">DeathKnigt</font id="blue">. Започнах да ги тегля . Ако Unlockera захапе имаш голяма почерпка от мен .
____________________________________________________________
Few hours later ...
... и така работата се върти около [1-2] версиите на MMTools , а актуалната такава е минимум [4] . Unlockera е в работещ вид само за определни *.exe компилации на версия [2] . Във 'Мулето' успях да открия и изтегля напълно кракнати и работещи (проверено) компоненти с версия [1] !!! , което в никакъв случай не е маловажно . Дълго , дълго време не съм и попадал на регистрирани компоненти на SwiftSoft™ така , че работеща (па макар и [1]) версия си е голяма находка за мен (всъщност не само ) .
Почерпкта за <font color="blue">DeathKnigt</font id="blue"> е напълно актуална ... <font color="red">10x again </font id="red">...
____________________________________________________________
Искам и да добавя един цитат от друг Е-zine ако все пак някои прояви интерес ... Мисля , че имената [DaFixer и Xavier] нямат нужда от представяне (който има уши да чуе)...
<blockquote id="quote"><font size="1" id="quote"><b id="quote">quote:</b id="quote"></font id="quote"><table border="0" id="quote"><tr id="quote"><td class="quote" id="quote"><font size="1" id="quote"> <font color="green"> Cracking MMTools By DaFixer
........... . . . . . . . . . . . . . .
Tova e pismoto mi do "xavier" s objasnenija kak da se kraknat programite
polzvashti MMTools (komponenti za Delphi). Ne sum znael che pichovete po
sveta ot meseci se borili da crack-nat tova :)
MMTools programite iskat MMKey32.dll za da vurvjat bez pusnato Delphi. E
az si napisah moj sobsven MMKey32.dll exportvasht kakvoto trjabva. S WinAPI
sniffer vidjah imenata na procedurite, no tjah gi ima i hardcode-nati.
Programata za kojato stava vupros tuk njama da namerite, no tova njama
znachenie, ponezhe e opisan univeralen algoritum za crackvane na vsichki
programi polzvashti MMTools.
V posledstvie se okaza che za Delphi5 i Delphi3 njakoi patterns sa
razlichni. Problema go reshihme kato tursihm stringovete 'shrink0', sled
tova obrushtame Phys adresa v RVA. i nakraja si generirame pattern-a
dinamichno. Toj e mov edx, RVA_ADRESA. Sled t ova na 11 ili 12 byte-a na zad
se patchva 74h s EBh.
Eto i samoto pismo:
Hi xavier this is my reaserch:
1) Enable your error displays with patching physical offset: 5560
from FF2570B24500 to 909090909090. The mm initialization code
sets error mode to zero !!! So if something happened you don't
know what is it! This operation is just to help us crack this
babe :)
1.1) I also changed string resurces in exe. As I told you yesterday
some strings can be found on two different offsets. So I change
Their names to: IDE1not found, IDE2Notfound, Initialization1error
and Initialization2error. Now I will know where the code flows.
(My Delphi is installed on the NT and I don't want to install
SoftIce over NT. My Win95 and FAT is full with games and there is
no space for Delphi there :)) )
2) Remove IDE check patching physcal offset: 48AF5 from 74 to EB.
(This operation is necessary for the crack. This offset can be
easily found in general from nearby staying string )
The HALT procedure is located at RVA 403808. It is called from
* Referenced by a CALL at Addresses:
|:00449011 , :00449137 , :0044919A , :004494F7 , :0044971B
|:00449D65 , :00449E25 , :00449EC7 , :0044CC22 , :0044CD44
|:0044CDB7 , :0044CFD7 , :0044EB37 , :0044ED03 , :0044EE4C
|:0044EEBF , :0044FA6E , :0044FE88 , :0044FFBE , :00450031
|:00451C53 , :00451D24 , :00451E4E , :00451EC1 , :00458128
|
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040392E(U)
|
:00403808 53 push ebx
I think only the unconditional jump reference from 0040392E must
exists and that all calls are from the protection shema.
3) Build stupid mmkey32.dll
(This is necessary for the crack)
!!!!!!! Strange but only with this patches your program starts some
!!!!!!! times. Like the case with the org mmkey32.dll ver 5.0. But
!!!!!!! may be with org version the app have stared more often ...
!!!!!!! And the other strange thing is that your app have started
!!!!!!! after "Initialization failed" message .... :))) I think I'm
!!!!!!! near ....
4) After I check *ALL* the addresses that calls exit procedure,
I think this procedure is Halt(0), I've found the next
groups of calls:
A) Call when Delphi is not active, or somthing other Delphi related
- from 00449011
here should be patched the proc that checks for Delphi at 00448F5C.
:00449001 E856FFFFFF call 00448F5C :00449006 84C0 test al, al
:00449008 7407 je 00449011
because it can be located easyly ...
locate 81C4F8FEFFFF6805010000 and change first 3 bytes
to B0FFC3 (mov al,FF ; ret)
B) After compare of some address to 00009C40 if not greater then exit
- from 00449137
- from 0044CD44
- from 0044EE4C
- from 0044FFBE
- from 00451E4E
:00449124 33C0 xor eax, eax
:00449126 A3D09B4500 mov dword ptr [00459BD0], eax
:0044912B 813DD09B4500409C0000 cmp dword ptr [00459BD0], 00009C40
:00449135 7D05 jge 0044913C
(but how this will be greater.
ofcourse if s.o. else write meth.
at 00459BD0)
:00449137 E8CCA6FBFF call 00403808
these can be located by: 409C00007D05
and patched to : 409C0000EB05
C) At the end of Library loading. I think these are shrinker related
- from 0044919A
- from 0044CDB7
- from 0044EEBF
- from 00450031
- from 00451EC1
**0044919A -> (If loaded library proc addresses are not
like the hardcoded)
:0044918E 813DCC9B450031347D0A cmp dword ptr [00459BCC], 0A7D3431
:00449198 7405 je 0044919F
:0044919A E869A6FBFF call 00403808
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00449180(C), :0044918C(C), :00449198(C)
|
:0044919F 803DB4A8450000 cmp byte ptr [0045A8B4], 00
:004491A6 751D jne 004491C5
* Possible StringData Ref from Code Obj ->"shrink0"
|
:004491A8 BA30924400 mov edx, 00449230
these should be patched. May be they are the only one that
should be patched :)) I'm not sure yet ... I think these checks
are for proc addresses of imported procs. and they are hardcoded.
So these can be located by: 813831347D0A7405
and should be patched to : 813831347D0AEB05
Note: I also think that here should be found the algorithm of
decompressing shrinked procs. But I don't care. I'll crack
the exe.
D) After unsuccessfull calls to mmxxx32.dll proc
- from 0044CC22
- from 0044CFD7
- from 0044EB37
- from 0044ED03
- from 0044FA6E
- from 0044FE88
- from 00451C53
- from 00451D24
:0044CBFF FFD0 call eax
(this might be a call to any
mmkey32.dll proc)
:0044CC01 8B15909C4500 mov edx, dword ptr [00459C90]
:0044CC07 8902 mov dword ptr [edx], eax
:0044CC09 A1909C4500 mov eax, dword ptr [00459C90]
:0044CC0E 833800 cmp dword ptr [eax], 00000000
:0044CC11 740F je 0044CC22
these can be located by: 8902A1909C4500833800740F
and patched to : 8902A1909C45008338009090
E) Exit, called after "Bad Boy" message dialog, or after an error
- from 004494F7 - Unable to load library
- from 0044971B - IDE not found 1
- from 00449D65 - IDE not found 2
- from 00449E25 - Evaluation Expired
these should not be patched
F) The only normal one - at the end of application
- from 00458128
this should not be patched :))))))))
G) Other ...
- from 00449EC7, there are some winmm.dll calls
I don't know. I'll not patch this at this moment
So ... after all this patches and with my silly MMKey32.DLL your
program manage to start 20 times from 20 attempts !!!!!
I think mmtools protection is a history now .... :)))
So now is 00:49 local time and I'll start to work over smart patcher
that will detect and correct MMTools proggies.
DaFixer
(C) 2000 Phreedom Magazine
</font id="green"> </td id="quote"></tr id="quote"></table id="quote"></blockquote id="quote"><font size="2" id="quote"></font id="quote">
____________________________________________________________