Custom Upx-based packer, AutoHotKey, XCBC, Tea
Hmx0101 CrackMe#3
NE, 16 bits, Nag, Serial = CleanAlgo(Name). Todo:keygen
reverse engineering experiments and documentations
simply funny.
RVA, Upx+Epp, 2 Anti-Olly, serial=CleanAlgo(name)
same packing, serial=CleanAlgo(name)
packer = custom (junk + xor loop) + UPX, original test,
the check should have been much more complex. very original but disappointing in the end
original too. not difficult but entertaining.
original again. Anti-debug & unpacking, 3 serials, complex algo
hardcoded buggy password
Serial=CleanAlgo(CurrentPID, GetComputerName)
I didn't like the mix of patching and keygenning, though.
line1 = Name, line2 = Serial, Serial=BloatedAlgo(Name)
limited junk, hardcoded password, simple decryption
clean. minimalist anti-debug. serial=GoodAlgo(Name)
original anti-debugs & checks. serial=GoodAlgo(Name). Interesting!
if (GetComputerName == HardcodedName)
{HardcodedSerial = CleanAlgo(HardcodedName)}
serial = CleanAlgo(name, GetComputerName)
.Net, serial = CleanAlgo(name)
.Net, registry, serial = CleanAlgo(name)
Delphi, Base64, TRegWare... a big mess for a simple serial
Delphi, MD5, serial = CleanAlgo(GetComputerName, name)
Serial == CleanAlgo(ComputerName, Name)
Nag (JMP Table)
Button (__vbasetobj)
Serial (__vbastrcmp)
logic, asm
basic serial, time
upx, vb, binder
simple packer
nothing special
delphi, javascript
.gadget, javascript