hacktooth on 12:43 AM 04/26/2023: https://youtu.be/-1SbvR2n8DI patching done :D
curious about the password...
PauliusV0 on 5:09 AM 04/29/2023: Why does it need to access your Windows Settings?
szekely1579 on 4:32 PM 05/02/2023: patch 004020AA: "jge 0x004020BE" to "jmp 0x004021F4"
timotei_ on 7:49 PM 05/02/2023: Does the password contain non-printable characters?
timotei_ on 7:12 PM 05/03/2023: For me it looks like "PasEc!23" is the password, while the "c" is an unicode character (4100).
hacktooth on 9:18 PM 05/10/2023: the crackme is not written in asm, but in vb6, visual basic use wide char string PasE maybe is the first part of the password and !23 is the last i think anyway the string is this PasE!23
but is not working becouse the string contain 9 characters insted of 8
hacktooth on 9:20 PM 05/10/2023: PasE[0x10,0x4]!23
serv0id on 12:48 AM 06/21/2023: self modifying code but its possible to patch the instructions.
hacktooth on 12:00 PM 10/17/2024: Hi, one day ago I tried again to get the passoword of this crackme, unsuccessfully, Im noob with VB6, so I try to dump and unpack the crackme and finally i got this:
SPOILER:
Private Sub Command1_Click() '401FE0
loc_00401FE0: [ebx+0CEC83ECh] = [ebx+0CEC83ECh] + ecx
loc_00402059: call var_8004 = global_00401000(00000017h, "PasEŠ!", Me, 0, 0, 0)
loc_00402078: var_24 = & var_8004
loc_004020C7: var_20 = Form1.Text1.Text
loc_004020D0: call var_800C = global_004010B0
loc_004020E3: If Len(var_20) 8 Then
loc_004020F0: If Form1.FRI = 0 Then GoTo loc_004022A4
loc_00402102: var_8014 = CheckObj(Me, global_00401BB8, 1784)
loc_0040210D: End If
loc_00402127: If 1 Mid(var_24, 1, 1))
loc_004021C5: If var_8018 = 0 Then
loc_004021DA: GoTo loc_0040211F
loc_004021DF: End If
loc_004021E9: End If
loc_004021EE: If var_1C Then
loc_00402238: var_84 = var_84 + "YEES!!"
hacktooth on 12:51 PM 10/22/2024: Confirmed. The password is PasE"\x16\x04"!23
You must me logged to submit a solution
Solution by hacktooth: text file + code injector in c++ + source code