bl4ack on 11:38 PM 12/10/2021: the key is: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
TrollZik on 8:38 AM 12/11/2021: The code seemed really obsfucated, but at the end the password was just declared in rdata
NoMercy on 4:57 PM 12/11/2021: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Erpreet on 10:00 PM 12/11/2021: it was easy though..........VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
nassimorg09 on 9:51 PM 12/15/2021: THAT WAS EASY THE SOLUTION IS VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
sophie1p on 1:08 AM 12/16/2021: key: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
was trying to figure out what the program was doing for a bit before I saw that the key was just sitting there lol.
pirik3 on 11:47 PM 12/16/2021: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
search for text?
KPia on 3:41 AM 12/17/2021: Strings:
LCMapStringEx
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefghijklmnopqrstuvwxyz
bad exception
Interesting but I don't have Windows Rn
iDONTKNOWHO on 8:23 PM 12/17/2021: What the key for extract ??
Sidd_Tim on 5:17 PM 12/19/2021: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Genzen on 5:52 AM 12/21/2021: I like the fact you hid an Easter egg in the password lol
SirLez on 7:34 PM 12/22/2021: Well done! Please sumbit a solution on the crackmes.one website under this post!
martifix1337 on 4:11 PM 12/23/2021: rdata:0042988C
VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
found in strings
0xZF on 5:55 AM 12/29/2021: nop- 00D42208,00D42209,00D4225E,00D4225F
Key - VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
kiyo0216 on 7:42 PM 01/01/2022: Used strings and found VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
MrForce on 12:05 AM 01/02/2022: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Cecilio on 1:42 AM 01/02/2022: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Just defined in the .rdata segment
OutTuna on 8:23 AM 01/07/2022: thx for good CrackMe software)
VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
auth1337 on 11:15 PM 01/09/2022: Password is : VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
:D
Shelldon on 9:42 AM 01/12/2022: Key is "VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh"
Texugo on 3:10 PM 01/20/2022: Key's in rdata:
VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Bipin on 5:18 PM 02/09/2022: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
sickfunk on 5:55 AM 02/16/2022: Password: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Ftor7 on 9:42 AM 03/20/2022: It was easy, password: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Rot4tion on 12:31 PM 04/03/2022: only string references... VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
sz_skill on 4:16 AM 04/28/2022: Looks really "advanced" but it's just hardcoded like any other. Replace je/jne call (i forgot) at 00402190 to jmp 0x402260
Kutch on 12:44 PM 04/28/2022: the key is VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
xnf4o on 7:48 AM 06/02/2022: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
0x02 on 5:31 PM 06/27/2022: Very simple. Run until you get until it requires your input and then go into that call and as you step over you will see the key pushed onto the stack.
Key: VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
Dola123312 on 6:19 PM 07/03/2022: encrypted string in program :VGhpcyBpcyB0aGUgY29ycmVjdCBwYXNza2V5LCB3ZWxsIGRvbmUh
base64ToString:This is the correct passkey, well done!