| Keygen Crackme |
Hi! I’m pretty new to reverse engineering, so I tried to solve this in the simplest way possible.
First, I opened the program in x64dbg and searched for strings. I found the text "Enter Your Verification Code" and followed its reference to the place in code where the input happens.
Then I looked a bit below and noticed a typical pattern: there was a comparison (cmp) followed by a jump (jne). From what I’ve learned, this usually means a check is happening.
I set a breakpoint right before that comparison and ran the program. When it asked for a code, I just entered something random. The debugger stopped at my breakpoint, and then I checked the registers.
I saw that one register (ECX) pointed to some memory. I followed it in dump and found a readable string — that turned out to be the correct verification code.
After that I just copied the string and entered it into the program, and it worked.
Later I noticed the program uses MachineGuid from the registry and does some transformations, but I didn’t fully reverse that part. Instead, I focused on the comparison and grabbed the result directly from memory.
This approach felt much easier for me as a beginner. |
2026-03-29 17:59 |
| piskaj |
https://github.com/mashituladi-star/crackmes.one-zujka22-CRACKME-last-PACH-download |
2026-01-03 13:41 |
| VM Crackme Challenge: 1. Moderate VM |
This is what the author's program might have looked like -- https://github.com/mashituladi-star/-exxtruder-crackmes.one-VM-Crackme-Challenge-1.-Moderate-VM- (but not complete because I was too lazy to continue) |
2025-12-11 16:29 |
| VM Crackme Challenge: 0. Very easy VM |
sdk -- https://github.com/mashituladi-star/sdk-on-crackmes.one-exxtruder-VM-Crackme-Challenge-0.-Very-easy-VM |
2025-12-06 08:08 |
| simple crackme |
pass: d7pghz8m ??? |
2025-11-29 08:16 |
| KeyGenMeV3 |
decision: https://github.com/mashituladi-star/crackmes.one-Coder_90-keygen-by-dimkasi- |
2025-11-22 12:31 |