Thanks, that was a nice one. The hardest part for me was to deal with multibyte NOPs: old tools like ollydbg & ida5 do not understand it. I thought that was the bytecode executed in SEH handler when InvalidOpcode interrupt occurs :) |
==> |
I posted a solution with keygen, but seems it still being moderated :)
And there are examples of valid passwords:
2233333355557999
& |
==> |