ksdpmx on 2020-10-29 03:59:
Load the program with dnSpy (C# flavor), place a breakpoint at `bool flag = ...`. Enter something in TextBox1, then copy `@string` from dnSpy to TextBox2. Bingo!
But I don't know how to decode `@string` with Python. I've already tried several charsets (like latin-1, utf-8, utf-16), but still haven't found the right charset..
Mick on 2020-11-07 16:44:
[Click to reveal]Nice,
the flag is always false so good or bad password have same rsult.
The skeleton of a keygen:"MD5(username)-(username.length*(0x989676)-8859"
ie:
zobi
TÕÃ;æ#?â\a[¯GK¤\u001Cý-26259D8-8859
Harshil on 2021-02-12 15:09:
[Click to reveal]Its a virus!!
ITS A BACKDOOR VIRUS!! DO NOT RUN
prev on 2021-06-02 02:48:
Harshil | You're joking right?
jeffli6789 on 2026-01-04 06:25:
This crackme had been reviewed when it was originally approved and is likely safe.
Crackmes often get flagged by antivirus software, EDR systems, or VirusTotal because they may use the same protection techniques found in malware (packers, anti-debugging, self-modifying code, etc.), or simply a false positive. This does NOT mean the crackme is actually malicious.
The only way to confirm whether something is truly malware is to reverse engineer it and find proof of malicious code and/or malicious behavior.
If you still believe this is actual malware, please report it to us via email: crackmesone@gmail.com.
**We encourage everyone to run crackmes in a VM (virtual machine) and exercise caution when executing unknown binaries.**
*Disclaimer: We do our best to review submissions, but mistakes can happen. The administrators and crackmes.one cannot be held liable for any damages or losses resulting from the use of files downloaded from this site. Always exercise caution and use a sandboxed environment.*