TTFPlus 3.3 32-bit demo
A "quiver" in Visual Basic 5

by Vizion
(18 September 1997)


Courtesy of Fravia's page of reverse engineering

Well, A visual basic 5 target (without strings) with a quiver protection, very well reversed by Vizion, even if, as usual with protectionists that are NOT careful enough, you could have directly searched insie the dead listing the strings: "MSVBVM50.rtcMsgBox" and "cmp ax, 000A"
 :::: TARGET
 TTFPlus 3.3 32-bit demo (url : www.wmsoftware.com)

 :::: TOOLS 
 W32Dasm 8.9, SoftIce for NT 3.01, UltraEdit-32 4.40b

 :::: PROTECTiON
 Quiver protection (see +ORC, lesson 4.1). Internal counter. 
 The demo counts the number of times you select a font you like to see.

 :::: REMARK(s)
 You will need to change winice.dat for this crack. Open winice.dat in your
 favorite text editor and add the next line,

 EXP=:\\msvbvm50.dll

 Save the file and restart your computer if SoftIce is loaded.

 :::: FiND THE COUNTER
 Like always, I start with loading the target in W32Dasm. The first thing I
 noticed was that there were no String References. Pretty annoying if you
 ask me. If you take a look at the list of .dll files that are used you'll
 see only one :

  MSVBVM50.DLL aka. Microsoft Visual Basic Virtual Machine 5.0 (I think)

 Ok, this is quite new, and I haven't seen any tutorials on a VB5 program.
 Due to the lack of String References and the usage of only one .dll file
 we need a "new" approach to crack this baby, I suggest you sit down and
 start thinking about the way to crack this target...

 Well I came up with the following idea.

 Start the target and select several times a font, after 10x clicking you'll
 get the nag screen telling you... well read it :). The problem is that you
 need to restart the target if you want to use it some more.

 Back in W32Dasm, take a look at the imported functions from the .dll,

 Addr:0F0D3109 hint(0000) Name: __vbaStrBool
 Addr:0F01A5AE hint(0000) Name: __vbaExitProc
 Addr:0F0239B1 hint(0000) Name: __vbaFileCloseAll
 Addr:0F023FA0 hint(0000) Name: __vbaOnError
 Addr:0F04F618 hint(0000) Name: __vbaObjSet
 Addr:0F0CF404 hint(0253) Name: rtcMsgBox                    

 (c) Vizion 1997. All rights reversed
You are deep inside fravia's page of reverse engineering, choose your way out:

homepage links red anonymity +ORC students' essays tools cocktails
academy database antismut search_forms mail_fravia
is reverse engineering legal?