PL45M4 on 7:06 PM 10/27/2025: Thank you for the challenge. If you want to make it more challenging, obfuscate your function/variable names or strip symbols completely. Other than that, I appreciate you taking the time to write this, especially in assembly! Kudos.
Here is my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-fentcats-assembler-crackme.html
You must be logged in to submit a writeup
Solution by SenorGPT on 2:27 AM 12/21/2025: x86 assembler crackme. Traced the password path from `ReadConsoleA` into the validation routine and identified an 8-byte memcmp-style loop against a static byte table. The correct password is the exact 8-byte sequence `@CBEDGFI`