hacktooth on 2023-04-26 00:43:
https://youtu.be/-1SbvR2n8DI patching done :D
curious about the password...
PauliusV0 on 2023-04-29 05:09:
Why does it need to access your Windows Settings?
szekely1579 on 2023-05-02 16:32:
patch 004020AA: "jge 0x004020BE" to "jmp 0x004021F4"
timotei_ on 2023-05-02 19:49:
Does the password contain non-printable characters?
timotei_ on 2023-05-03 19:12:
[Click to reveal]For me it looks like "PasEc!23" is the password, while the "c" is an unicode character (4100).
hacktooth on 2023-05-10 21:18:
the crackme is not written in asm, but in vb6, visual basic use wide char string PasE maybe is the first part of the password and !23 is the last i think anyway the string is this PasE!23
but is not working becouse the string contain 9 characters insted of 8
serv0id on 2023-06-21 00:48:
self modifying code but its possible to patch the instructions.
hacktooth on 2024-10-17 12:00:
Hi, one day ago I tried again to get the passoword of this crackme, unsuccessfully, Im noob with VB6, so I try to dump and unpack the crackme and finally i got this:
SPOILER:
Private Sub Command1_Click() '401FE0
loc_00401FE0: [ebx+0CEC83ECh] = [ebx+0CEC83ECh] + ecx
loc_00402059: call var_8004 = global_00401000(00000017h, "PasEŠ!", Me, 0, 0, 0)
loc_00402078: var_24 = & var_8004
loc_004020C7: var_20 = Form1.Text1.Text
loc_004020D0: call var_800C = global_004010B0
loc_004020E3: If Len(var_20) 8 Then
loc_004020F0: If Form1.FRI = 0 Then GoTo loc_004022A4
loc_00402102: var_8014 = CheckObj(Me, global_00401BB8, 1784)
loc_0040210D: End If
loc_00402127: If 1 Mid(var_24, 1, 1))
loc_004021C5: If var_8018 = 0 Then
loc_004021DA: GoTo loc_0040211F
loc_004021DF: End If
loc_004021E9: End If
loc_004021EE: If var_1C Then
loc_00402238: var_84 = var_84 + "YEES!!"
hacktooth on 2024-10-22 12:51:
[Click to reveal]Confirmed. The password is PasE"\x16\x04"!23