Split32 v1.1 - Tutorial by PaRKeR

"Well here we have a fundamental essay showing us all how to use another great NuMega tool (SmartCheck), a lot of capable reversers struggle with VB programs (usually losing their way inside the dll). Learn how to use SmartCheck and just maybe we'll prevent software authors from using this overbloated drawing tool in the future. A 'concept' essay by PaRKeR." - "Slightly edited by CrackZ".

First of all I'd like to say that Split32 is a VB5 program, and that's why I have chosen to have a look at it : I have heard so many things about Numega SmartCheck that I wanted to try it. VB5 progs are different in the way that the functions used are not implemented in the program itself but in a DLL called msvbvm50.dll and then, VB5 programs are just of a list of calls to functions in that dll.

When cracking VB5 programs you can use SoftICE, adding EXP=c:\windows\system\msvbvm50.dll to your winice.dat file, or by disassembling the file and taking a look at the code, or by using SmartCheck, THE perfect tool for VB5 programs.

This tutorial is divided into two parts : an easy part consists in getting a serial number for Split32, the second one, a little harder in making a key generator. For the second part you'll need SmartCheck 6.0 and a ascii/hex/dec convertor, and, of course Split32.

PART I - Getting a serial number

Okay, launch Split32 ... hmm. Classic : limited time trial and limited number of launches. Click on about. Bingo! Name/Key Scheme. Now let's have a look at SmartCheck. First you'll need to configure it. Run it. Chose in the menu Program/Settings. In Error Detection, all boxes should be checked. Clink on Advanced. Here only the four first boxes should be checked. Then click on Reporting. There all boxes should be checked except the the one for MouseMove. Click on OK, you are now ready to use SmartCheck.

Choose File/Open and open Split32.exe. Then chose Program/Start. The program is now lauched by SmartCheck. You will get some API failures, just click on Acknowledge each time. After a moment the window of the program will appear.

As you might have noticed, a window in SmartCheck has opened, showing all the events associated to the program. This will be the most usefull window in your whole life of VB cracking (hmm, perhaps not that true...). Now let's click on About in the Split32 window. You'll notice that your clicks are recorded in the Program Results window.

OK. Now enter a name (I used PaRKeR) and a key (I used 12345). Click on OK. Nothing happened and your back at Spli32 main window. Click on Quit. Don't forget to acknoledge the few failures you'll have in return.

Now you are alone facing that BIG window with all the results and events of the program. Let's boggle the concept a while. If a key is generated and a comparison happens, it must be when clicking on OK in the about window or that kind of thing, right? So let's have a look at what happens when you clicked on OK. Because you are very clever, you have noted the name of the event associated to your click. In my case, it is :

	+ Command1_Click
Let's click on the "+" sign : it changes into a "-" sign and all the events that happened are shown to you! Great! This should look like :

	- Command1_Click
	|  Text1.Text
	|  Text3.Text <-- "0" (String)
	|  Text1.Text
	|  Len returns LONG:6
	|  ...
	|  ...
	|  + Form4_Unload
	- Command1_Click
Even for a new cracker, it would appear clearly that this REALLY sounds like a key generation routine. Now let's place the highlighted bar on Text1.Text for exemple. In the right window, it will show :

	(No additional details)
Hmmm, moving the bar down 3 times we can see :
	- String string1 = 0043372C
	   |- = "PaRKeR"
Pretty clear : 6 is the length of the string PaRKeR. If you have a little knowledge of computer programming, all the other operations will be clear as crystal for you. Let's go down ... nothing very interesting, but WAIT!, look at this strange string :
	Text3.Text <-- "905591-S47"
Si ce n'est pas un numero de serie, je veux bien etre pendu ! (CrackZ - translated to "if this is not the serial number....."). Note this string down. Close SmartCheck. Run Split32. About. Name : PaRKeR, Key : 905591-S47. OK. Nothing appeared to happen. About. Registered to one user.

PART II - Making a key generator

This part will be a little harder because you'll need to feel the thing rather than looking for clear instructions. OK. Let's get back to the Program Results Window, when you clicked on the Command1_Click. Moving the bar downwards, we'll look at the comments in the right window. Hmmm, nothing interesting till the event called Mid :

	- string (variant)
	|  - String .bstrVal = 0043372C
	|      |- = "PaRKeR"
	|- Long length = 1 0x00000001
	- start (variant)
	    |- Integer .iVal = 1 0x0001
Then we have another event : Asc returns Integer:80. Of course! 80 is the decimal value for the character "P". Then a little after, we have Text3.Text <-- "81" (String). Why 81 and not 80??? Hmmm, 81 is 80+1. Some lines after, we have : Asc returns Integer:97. Once again as you should have guessed, 97 is the decimal value for "a". Then we have Text3.Text <-- "180" (String). DOH!! 97+81=178. Wait a sec... 180=178+2, so we have 180=(80+1)+(97+2). Sounds like this part of the algorithm will be sum(i+Name[i], i, 0, length-1).

This will be verified with the other lines after : 265=(80+1)+(97+2)+(82+3), and it goes again and again. Ok. 6 chars later, we have :

	Val returns double:538 (displayed as single-precision floating point)
	Text3.Text <-- "905591-S47" (String)
Damn, even Einstein won't know how to get from the first line to the other one... What can we do now. A little leprechaun on my shoulder says that SmartCheck is hiding some things from me. Well, let's chose View/Show All Events when the bar is over "905591-S47". A lot of new stuff appears in the window.

Let's highlight Val returns double:538 (...). Just under is a call to __vbaVarMul, look the stuff in the right window : that's 150756*6 (hmmm, 6 is the length of the name...), then __vbaVarAdd : that's 904536+517 (hmmm, 904536=6*150756), then __vbaVarAdd : that's 905053+538 (hmmm, our 538 and 905053=904536+517). Now, we have the first part of the key : "905591".

Then a __vbaVarCat, then __vbaVarAdd : that's 41+6 (remember, 6 is the length of the string). We have the third part of the key "47" and then another __vbaVarCat. That means that the prog gets "905591", "-S" and "47" to make the key.

We're done! But we have a few things to check : are 150756, 517 and 41 constants or variables? Is the formula sum(i+Name[i]) right? For the second part, you can check that now with the Show All Events option : indeed this is right. For the first part, the only way I found to check the theory above was with a different name : and it appears that those 3 numbers are indeed constants.

Now we are really done. Here is the final generation routine :
- first part : 150756*length+517+sum(i+Name[i], i, 0, length-1);
- second part : -S;
- third part : length+41.

Thanks a lot SmartCheck. Personal greetings goes to : tKC, CrackZ and Josh. Don't forget to unregister Split32 when you are done. For that, open regedit, remove the key HKEY_USERS/.Default/Software/Microsoft/Windows/CurrentVersion/rh or buy the license. Authors deserve your help.

PaRKeR - parker__@caramail.com

You have finished reading another tutorial courtesy of CrackZ's Reverse Engineering Page.
Find a quick way back to more documents with this link.

Return to Main Index
© 1998 Hosted by CrackZ. By PaRKeR. December 14th.