You must be logged in to post a comment
_Vas on 5:51 PM 08/18/2025: Open it in IDA, notice that it compares the input to the hex value 1E790h. Convert that to decimal get (124816)enter this number, and you will get the message “You got it ;)”.
engraver1918 on 7:10 PM 08/18/2025: Open Ida, you can see the password
zkdev on 10:07 PM 08/18/2025: Open it with IDA. When you check the cmp instruction in main function, you will see a hex value (1E790h). Convert it to decimal and enter that.
mealysex on 10:37 PM 08/24/2025: Где найти пароль от архива?
feverstudy8 on 9:25 AM 09/06/2025:
The instructions mov [esp+4], eax and mov dword ptr [esp], offset aD are used to pass arguments to scanf, differing from the usual push-based parameter passing.
Conper on 4:03 PM 09/06/2025: cmp eax,1E790
That means our input is being compared with the value 1E790, which is in hexadecimal. If we convert it to an integer, we’ll get the password.
dogeploit on 9:26 PM 09/09/2025: cwacked
iwannabecoder on 7:14 PM 09/14/2025: I found the password. Its 124944 but when i paste it on the bat, nothing happens and closes. and im new like my first reverse engineering cracke was this and i dont even know i tried adding pause and thing
h0td04ek on 6:48 PM 09/23/2025: bro this is over easy pass "124816"
PL45M4 on 3:42 AM 10/06/2025: Glad I wasn't the only one who thought the way arguments were being passed was strange.
@iwannabecoder, open a command prompt and navigate to the directory you're storing the crackme in. Then execute the program using the command prompt.
cd /Downloads
crackme.exe
When your password is incorrect, you will not see any output.
Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/rodrigoteixeiras-very-easy-disassembly.html
FailButWin on 10:53 AM 10/22/2025: Open it in any disassembler and look at the main function :)
RetroHub on 7:44 AM 10/26/2025: my first crack ans 124816