beautiful crackme, very original ;) Only I think it is a bit complex with those who are not familiar with windows API like VirtualProtec. My solution was: observe what part of code is made writable by VirtualProtect, dump that section to the first VirtualProtect and the second, observe what changed (really?! only 1 byte!? this is very sneaky of you!), patch the code so I could recall the modfied func. Fortunately I didn't spend much time deciphering all those calls in between! Thanks |
==> |