like you want to see it - if you use 2019 it's 14690 if you use 2018 it's 15470 (which was released later than 2019.14690)...
@skyteddy, do you have a link to that special version YUMI-UEFI? does it also work with older versions of true image boot isos?
Thanks Nova-s ! I've been using the 2013 version for a while. I like how you were very transparent about what was modified and in which way. I see that since the 2018 version, True Image needs more files patched than libcrypto10.dll. Would you mind listing which files or registry keys your latest crack modifies in version 2019, if possible ?
you can easily extract my program with 7zip/winrar and explore the script and version folders. find regfile there and the names of the 3 newly patched files. libcrypto10.dll patch isn't needed anymore
Ok, thanks ! So if I understand correctly, if we ignore the hosts tweak, what this patch is doing for the latest version of True Image is: - Modify ti_managers.dll, TrueImageHomeService.exe and TrueImageTools.exe according to DIFF files - Remove registry key [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\{E7F904D5-83DE-43F6-8EF5-9443DF243CFA}] - Add the following registry keys: [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Acronis\TrueImage] "standard"=" 16 15 12109 19 30 12 7120 99 96 0 18 30 96103 29120 24 99 20 0102 20 20 3120 2 15 0 13 24 0 4 29120 30 13 16 27109108103 31120 30 16 2 30 29 7 3 22120 6 2102 97 29 4 19 18120102 22 19 19 25108 4 96" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Acronis\TrueImageHome\Settings] "ActivatoionBlob"="{ \"Error\" : 0, \"Status\" : \"\", \"Value\" : \"1234\", \"Version\" : 1}" "AutocheckUpdates"=dword:00000000 "CEP"=dword:00000000 Correct ? I am curious about the "standard" bit, I wonder in which way it will fool True Image. But my main question is, how can I read the content of the DIFF files ? I couldn't find how to do it with xdelta. Basically I just wish to read the opcodes that are changed and how they are changed, as shown in your first post. (Well, I won't try and look into Acronis files though, just the DIFFs)
that's correct for 64bit systems the name "standard" was choosed by acronis and has to be spelled like that, it contains the serial i also don't know any way to really "read" an xdelta .diff file, i suggest to apply the patch once and then compare the files yourself, only a few bytes are changed. for every build it's the same patch (until now), but different file versions need also different .diff files...
Okay, thank you for the follow up I've always wanted to learn how to do things like that myself. I tried playing with IDA Pro a long time ago but gave up: On the one hand the tool was powerful but complex, and on the other hand locating which bytes to change and how was out of my range, even more so when the target program tried to make it purposefully harder. Never got to talk with crack makers for guidance either, the cracks are usually found way downstream from them. Anyway, thanks again, I understand the crack now, though I could not remake it myself. (Blocking point being figuring out what to change but also simply building the DIFFs)
Please explain, how you copy the iso to the usb. What should be patched? Better you take a look at the readme in the zipfile ;-) Or if you have Acronis installed, use the MediaCreationTool!
Copying the iso to a USB stick allows the program to be run in portable mode without having to install. The iso version was given here but I do not know if the iso version is activated or not.
No! This means, you have only the ISO-file on the USB-Stick, but how you boot the USB-Stick and how you boot the Acronis-ISO-File? The iso-file have not to be activated!
How? And how will you boot the Acronis-ISO-File? It's not easy to help you, because you don't answer the questions. EDIT: Which program is it?