You must be logged in to post a comment
lschx1 on 7:16 PM 04/15/2025: this was my first crack, i enjoyed it but i just know not all will be this simple
ionchad on 8:47 PM 04/15/2025: lschx1, good luck in your journey!
prangan on 4:35 AM 04/16/2025: Provided password is wrong can you provide the correct password.
aliramazanlexy on 5:58 PM 04/16/2025: password: KIWZ
noticemesenpai78 on 10:56 AM 04/17/2025: i have no clue how the comparing logic is done but i can see a hardcoded value: KIWZ
d4emonix on 12:30 PM 04/17/2025: Ahh my first one! Yey!
kassawin1 on 2:06 PM 04/17/2025: nice one i found XOR obfuscation *((_BYTE *)Password + i) ^= 4 * i + i + 33; for both user password and hardcoded one then obfuscated strings are compared.
Foreshadoe on 8:29 PM 04/17/2025: i can not extract the app, what is the password to the archive files
ionchad on 12:16 AM 04/18/2025: wow d4emonix! im really happy this was your first crack me and posting the solution in your blog :D
41ul on 4:15 AM 04/19/2025: crack in 1min
soulOfCinder on 4:38 PM 04/20/2025: Hello can someone please tell me the zip file password?
Thanks in advance!
soulOfCinder on 4:42 PM 04/20/2025: Never mind I figured it out if anyone else has this problem view the faq section the password for the zip is crackmes.one.
Iniciante on 5:01 AM 04/21/2025: Cade o blog do mestre ?
Lucaasshq on 3:45 PM 04/30/2025: treter
172A_sqli on 3:42 PM 05/01/2025: loc_1400017B4:
mov [rbx+10h], r12
mov qword ptr [rbx+18h], 0Fh
mov byte ptr [rbx], 0
xor r9d, r9d ; uType
xor ecx, ecx ; hWnd
test r14b, r14b
jnz short loc_1400017F2 // changed
xzm on 5:23 AM 05/10/2025: im just do it
[
loc_1400017B4:
mov [rbx+10h], r12
mov qword ptr [rbx+18h], 0Fh
mov byte ptr [rbx], 0
xor r9d, r9d ; uType
xor ecx, ecx ; hWnd
test r14b, r14b
jmp short $+2
]
Elvis on 1:34 PM 05/19/2025: Please note that patching is now the goal. Find the password instead
Danko on 6:00 PM 05/29/2025: KIWZ
00007FF7D88316E1 in RDX