Download Acronis DiskEditor DIY crack by CW2K

Added to site2004-04-05
Rating85/100
Votes4


acronisdiskeditordiycrackcw2k.zip (23748 bytes)

namesizecompressed
Hexedit/ 0 0
Hexedit/16Edit.exe 2048 925
Hexedit/16Edit.tXt 916 539
Hexedit/16Edit.DLL 36864 17239
Acronis DiskEditor_DIY_crk.bat 1423 708
Acronis DiskEditor_DIY_crk.txt 12219 3118
info.txt 698 405

Hexedit/16Edit.tXt

                -=[ 16Edit - HexEdit Module ]=-


version:          FX
coder:            yoda
project start:    10th December 2k1
coding language:  C++
E-mail:           [email protected]
WWW:              y0da.cjb.net


Features:
---------
- free and open source
- easy to implement in your own projects by a small but effective
  documented set of APIs
- handles files/memory buffers as input
- mouse wheel support ;-)
- advanced search functions
- change bytes; copy/paste/cut memory blocks
- ...

Usage:
------
See APIs.tXt.

THX:
----
Chris Hobbs  - for his back-buffering example on Icz's side
KS           - for some beta testing
schieber     - for letting me do tests on ur WinXP machine
Dave P.      - you know why
Baader       - for all the compression algorithm resources
SkY          - for many improvement ideas


Please report any bugs, suggestions, comments.

yoda


Acronis DiskEditor_DIY_crk.txt

Acronis DiskEditor Crack NFO
============================

1. Getting Lates Full version from the NET
------------------------------------------
Demo Versions:
http://www.acronis.com/files/diskeditor6.0_d_de.exe
http://www.acronis.com/files/diskeditor6.0_d_en.exe


Full Versions:
http://www.acronis.com/files/diskeditor6.0_s_de.exe
http://www.acronis.com/files/DE60_u_de.exe

http://www.acronis.com/files/diskeditor6.0_s_en.exe
http://www.acronis.com/files/DE60_u_en.exe


2. Install & Unpack
-------------------
Don't open files directly in winrar
Rename them to zip and then rightclick and select Extract

Winrar.exe diskeditor6.0_s_de.exe

Required Files:
	DiskEditor.exe
	snapapi.dll

	SNAPMAN.VXD	;for Win9x only
	(de.hlp		;not really needed  but nice facts about FAT)
	debld.exe	; for DOS version of DiskEditor.exe


Winrar.exe debld.exe
	de.exe		;Very handy if you can't start windows - it's a hood idea to copy this on your bootdisk
	mouse.com	;run this first if you need a mouse in the DOS-version of de.exe

3. Make DiskEditor.exe able to save changes
-------------------------------------------

* First possibility always start Acronis de_DIY_crk.bat instead of DiskEditor.exe
  You may edit Acronis de_DIY_crk.bat and add 'g' at the end of the script if you don't want to press g to start.


* Second possibility make it permanent - you will not need Acronis de_DIY_crk.bat anymore...

  Run Acronis de_DIY_crk.bat to get the offset to patch 'de.exe'

  Unpack de.exe with upx
  upx.exe -d DiskEditor.exe		[upx.exe <- http://upx.sourceforge.net]
  Note: DiskEditor.exe should be little pit bigger after that. 

  Open DiskEditor.exe in a Hexeditor and goto the offset 
  (Example: in 16Edit.exe press Strg+G and enter 036e5e [DiskEditor Version 6.0.0.361])
  Overwrite the original bytes (32 C0) with the patched one(B0 01) and save the changes


  Congratulation you have done it !
  


  You may repack DiskEditor.exe with
  upx.exe DiskEditor.exe
  to make it a little bit smaller.


4. Details dumped from IDA
--------------------------

You should not need them anymore.
Well if they changes something or something doesn't work this might came in handy...


4380F0 ; ªªªªªªªªªªªªªªª S U B R O U T I N E ªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªªª
4380F0 
4380F0 
4380F0 Checkreg        proc near               ; CODE XREF: sub_401210+9 p
4380F0 
4380F0 var_1C6         = byte ptr -1C6h
4380F0 bIsSerial_provided_By_arg4    = byte ptr -1C5h
4380F0 reg2_enabletrial= dword ptr -1C4h
4380F0 reg1_insttime   = dword ptr -1C0h
4380F0 Language        = dword ptr -1BCh
4380F0 reg4_Must_1_or_b= dword ptr -1B8h
4380F0 Time            = dword ptr -1B4h
4380F0 Input           = byte ptr -1B0h
4380F0 var_1AC         = dword ptr -1ACh
4380F0 Key             = dword ptr -190h
4380F0 HKLM            = dword ptr -170h
4380F0 Settings        = dword ptr -150h
4380F0 Regpath         = byte ptr -130h
4380F0 var_110         = dword ptr -110h
4380F0 input_copied    = byte ptr -10Ch
4380F0 var_C           = dword ptr -0Ch
4380F0 var_4           = dword ptr -4
4380F0 arg_0_ptr       = dword ptr  4
4380F0 arg4_Serial     = dword ptr  8
4380F0 Code            = dword ptr  0Ch
4380F0 
4380F0 Ebx_Code        = ebx
4380F0 edi_Serial      = edi
4380F0 ebp_Language    = ebp
4380F0 
4380F0                 mov     eax, large fs:0
4380F6                 push    0FFFFFFFFh
4380F8                 push    offset unknown_libname_263
4380FD                 push    eax
4380FE                 mov     large fs:0, esp
438105                 sub     esp, 1BCh
43810B                 push    Ebx_Code
43810C                 mov     Ebx_Code, [esp+1CCh+Code]
438113                 test    Ebx_Code, Ebx_Code
438115                 push    ebp
438116                 jnz     short loc_43811D
438118                 mov     Ebx_Code, offset byte_506834
43811D 
43811D loc_43811D:                             ; CODE XREF: Checkreg+26 j
43811D                 push    esi
43811E                 push    edi_Serial
43811F                 mov     edi_Serial, [esp+1D8h+arg4_Serial]
438126                 test    edi_Serial, edi_Serial
438128                 setz    al
43812B                 test    al, al
43812D                 mov     [esp+1D8h+bIsSerial_provided_By_arg4], al
438131                 jz      Serial_provided_By_arg4

--- Reg and Convert Serial from Registry ---

[HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\DiskEditor\Settings]
"key"="  2  5 22 24 24120109 18 30102  1120 13103 16  4103120 30  2 30 17103120 97 98 25103 23"

438137                 push    ecx
438138                 lea     ecx, [esp+1DCh+Regpath]
43813F                 call    CreateVar
438144                 push    offset unk_514854
438149                 lea     ecx, [esp+1DCh+HKLM]
43814D                 mov     [esp+1DCh+var_4], 0
438158                 mov     dword ptr [esp+0CCh], 80000002h
438163                 call    setvar_ECX_
438168                 mov     esi, offset off_506620
43816D                 mov     [esp+1D8h+HKLM], esi
438171                 push    offset aKey     ; "key"
438176                 lea     ecx, [esp+1DCh+Key]
43817A                 mov     byte ptr [esp+1DCh+var_4], 1
438182                 call    setvar_ECX_
438187                 mov     [esp+1D8h+Key], esi
43818B                 push    offset aSettings ; "Settings"
438190                 lea     ecx, [esp+1DCh+Settings]
438197                 mov     byte ptr [esp+1DCh+var_4], 2
43819F                 call    setvar_ECX_
4381A4                 mov     [esp+1D8h+Settings], esi
4381AB                 lea     eax, [esp+1D8h+HKLM]
4381AF                 push    eax
4381B0                 lea     ecx, [esp+1DCh+Key]
4381B4                 push    ecx
4381B5                 lea     edx, [esp+1E0h+Settings]
4381BC                 push    edx
4381BD                 lea     eax, [esp+1E4h+Input]
4381C1                 push    eax
4381C2                 lea     ecx, [esp+1E8h+Regpath]
4381C9                 mov     byte ptr [esp+1E8h+var_4], 3
4381D1                 call    get_key_from_regist
4381D6                 lea     ecx, [esp+1D8h+Settings]
4381DD                 mov     byte ptr [esp+1D8h+var_4], 7
4381E5                 call    Free_var
4381EA                 lea     ecx, [esp+1D8h+Key]
4381EE                 mov     byte ptr [esp+1D8h+var_4], 6
4381F6                 call    Free_var
4381FB                 lea     ecx, [esp+1D8h+HKLM]
4381FF                 mov     byte ptr [esp+1D8h+var_4], 5
438207                 call    Free_var
43820C                 mov     edx, [esp+1D8h+var_1AC]
438210                 push    offset unk_55821C
438215                 push    100h
43821A                 lea     ecx, [esp+1E0h+input_copied]
438221                 push    ecx
438222                 push    edx
438223                 push    0
438225                 lea     ecx, [esp+1ECh+Input]
438229                 call    Memcopy
43822E                 push    100h
438233                 call    MemAlloc
438238                 mov     edi_Serial, eax
43823A                 mov     eax, [esp+1DCh+var_1AC]
43823E                 push    100h
438243                 push    edi_Serial
438244                 push    eax
438245                 lea     ecx, [esp+1E8h+input_copied]
43824C                 push    ecx
43824D                 call    convert_Reg_to_realserial
438252                 add     esp, 14h
438255                 lea     ecx, [esp+1D8h+Input]
438259                 mov     byte ptr [esp+1D8h+var_4], 0
438261                 call    Free_var
438266                 lea     ecx, [esp+1D8h+Regpath]
43826D                 mov     [esp+1D8h+var_4], 0FFFFFFFFh
438278                 call    Free_var
43827D 
	--- Check Serial ---

43827D Serial_provided_By_arg4:                            ; CODE XREF: Checkreg+41 j
43827D                 mov     edx, _1_demo
438283                 push    edx
438284                 call    j__atol
438289                 mov     ebp_Language, eax

43828B                 lea     eax, [esp+1DCh+reg1_insttime]
43828F                 push    eax
438290                 lea     ecx, [esp+1E0h+reg2_enabletrial]
438294                 push    ecx
438295                 lea     edx, [esp+1E4h+Language]
438299                 push    edx
43829A                 lea     eax, [esp+1E8h+reg4_Must_1_or_b]
43829E                 push    eax
43829F                 push    edi_Serial
4382A0                 push    offset dword_506844
4382A5                 push    Ebx_Code
4382A6                 call    CheckAndInterpretSerial

4382AB                 mov     esi, [esp+1F8h+reg2_enabletrial]
4382AF                 shr     esi, 0Ch
4382B2                 mov     bl, al
4382B4                 add     esp, 20h
4382B7                 and     esi, 0Fh
4382BA                 test    bl, bl
4382BC                 jz      short notrial
4382BE                 test    esi, esi
4382C0                 jz      short notrial
4382C2                 lea     ecx, [esp+1D8h+Time]
4382C6                 push    ecx             ; time_t *
4382C7                 call    _time
4382CC                 imul    esi, 2592000
4382D2                 mov     edx, [esp+1DCh+Time]
4382D6                 sub     edx, [esp+1DCh+reg1_insttime]
4382DA                 add     esp, 4
4382DD                 cmp     edx, esi
4382DF                 jbe     short notrial
4382E1                 xor     bl, bl		;fail!
4382E3 
4382E3 notrial:                                ; CODE XREF: Checkreg+1CC j
4382E3                                         ; Checkreg+1D0 j ...
4382E3                 mov     al, [esp+1D8h+bIsSerial_provided_By_arg4]
4382E7                 test    al, al
4382E9                 jz      short loc_4382F4
4382EB                 push    edi_Serial
4382EC                 call    sub_4ABA55
4382F1                 add     esp, 4
4382F4 
4382F4 loc_4382F4:                             ; CODE XREF: Checkreg+1F9 j
4382F4                 mov     eax, [esp+1D8h+arg_0_ptr]
4382FB                 test    eax, eax
4382FD                 mov     ecx, [esp+1D8h+reg4_Must_1_or_b]
438301                 pop     edi_Serial
438302                 pop     esi
438303                 jz      short loc_43831F
438305                 mov     edx, [esp+1D0h+Language]
438309                 mov     [eax+8], edx
43830C                 mov     edx, [esp+1D0h+reg2_enabletrial]
438310                 mov     [eax+0Ch], edx
438313                 mov     edx, [esp+1D0h+reg1_insttime]
438317                 mov     [eax], bl
438319                 mov     [eax+4], ecx
43831C                 mov     [eax+10h], edx
43831F 
43831F loc_43831F:                             ; CODE XREF: Checkreg+213 j
43831F                 test    bl, bl
438321                 jz      short Fail
438323                 push    ecx
438324                 call    test_1_or_b
438329                 add     esp, 4
43832C                 test    al, al
43832E                 jz      short Fail
438330                 cmp     [esp+1D0h+Language], ebp_Language
438334                 jnz     short Fail
438336                 mov     al, 1
438338                 jmp     short loc_43833C
43833A ; ---------------------------------------------------------------------------
43833A 
43833A Fail:                                   ; CODE XREF: Checkreg+231 j
43833A                                         ; Checkreg+23E j ...

		** The Patch ***
43833A      32 c0       xor     al, al		;Return Failure
PATCH TO -> b0 01       mov     al, 1


43833C loc_43833C:                             ; CODE XREF: Checkreg+248 j
43833C                 mov     ecx, [esp+1D0h+var_C]
438343                 pop     ebp_Language
438344                 pop     Ebx_Code
438345                 mov     large fs:0, ecx
43834C                 add     esp, 1C8h
438352                 retn    0Ch
438352 Checkreg        endp
438352 



info.txt

Acronis DiskEditor DIY Crack *all versions*
===========================================

This is a new kind of crack. I call it a Debug Loader.
It uses the NT System Debugger (ntsd.exe) with is 
included in every Windows XP system.
It's very flexible and will work for 
all existing and also coming versions of Acronis DiskEditor. 
This does not depend on offsets, like normal cracks do, 
which will work only for a specific version of a program.
It's very small and you can see how it work e.g. fix little
problems by yourself because its a script(*.bat).

All changes are done in memory. A DIY description + tools
are included to make the changes permanent to the exe.






# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z