Asian Dragon Posted April 25, 2013 Posted April 25, 2013 (edited) Packer: Safengine Shielden V2.0.1.0 link download: http://www.mediafire.com/?968bamqbah8tyyw Edited April 25, 2013 by xuan khanh
simple Posted April 26, 2013 Posted April 26, 2013 If you have a lot of time you can load the app in Olly, put a mem breakpnt on shell32.dll on 4f2050 and you can step to system beep/MessageBox to patch the anti routine. Probably more checks too. Could be a deceptive trick, but I think your algorythm (and the vb6 IAT), strings, etc are all easily viewed. loc_004078DF: call 004012B0h ; Len(arg_1)loc_004078E4: mov var_DC, eaxloc_004078EA: mov var_E4, ediloc_004078F0: lea edx, var_E4loc_004078F6: lea ecx, var_78loc_004078F9: call 004012B6h ; __vbaVarMoveloc_004078FE: push 00000001hloc_00407900: pop eaxloc_00407901: mov var_DC, eaxloc_00407907: push 00000002hloc_00407909: pop ediloc_0040790A: mov var_E4, ediloc_00407910: mov var_EC, eaxloc_00407916: mov var_F4, ediloc_0040791C: lea eax, var_E4loc_00407922: push eaxloc_00407923: lea eax, var_54loc_00407926: push eaxloc_00407927: lea eax, var_F4loc_0040792D: push eaxloc_0040792E: lea eax, var_13Cloc_00407934: push eaxloc_00407935: lea eax, var_12Cloc_0040793B: push eaxloc_0040793C: lea eax, var_2Cloc_0040793F: push eaxloc_00407940: call 004012AAh ; Forloc_00407945: cmp eax, esiloc_00407947: jz 004079FChloc_0040794D: mov eax, arg_Cloc_00407950: mov var_DC, eaxloc_00407956: mov var_E4, 00004008hloc_00407960: lea eax, var_2Cloc_00407963: push eaxloc_00407964: call 0040128Ch ; __vbaI4Varloc_00407969: push eaxloc_0040796A: lea eax, var_E4loc_00407970: push eaxloc_00407971: lea eax, var_A4loc_00407977: push eaxloc_00407978: call 00401292h ; Right(arg_1, arg_2)loc_0040797D: lea eax, var_A4loc_00407983: push eaxloc_00407984: lea eax, var_90loc_0040798A: push eaxloc_0040798B: call 00401298h ; __vbaStrVarValloc_00407990: push eaxloc_00407991: call 0040129Eh ; Asc(arg_1)loc_00407996: mov var_EC, axloc_0040799D: mov var_F4, ediloc_004079A3: lea eax, var_8Cloc_004079A9: push eaxloc_004079AA: lea eax, var_F4loc_004079B0: push eaxloc_004079B1: lea eax, var_B4loc_004079B7: push eaxloc_004079B8: call 004012A4h ; __vbaVarAddloc_004079BD: mov edx, eaxloc_004079BF: lea ecx, var_8Cloc_004079C5: call 004012B6h ; __vbaVarMoveloc_004079CA: lea ecx, var_90loc_004079D0: call 004012F2h ; __vbaFreeStrloc_004079D5: lea ecx, var_A4loc_004079DB: call 00401286h ; __vbaFreeVarloc_004079E0: lea eax, var_13Cloc_004079E6: push eaxloc_004079E7: lea eax, var_12Cloc_004079ED: push eaxloc_004079EE: lea eax, var_2Cloc_004079F1: push eaxloc_004079F2: call 00401280h ; Nextloc_004079F7: jmp 00407945hloc_004079FC: push 00000001hloc_004079FE: call 0040127Ah ; On Error ...loc_00407A03: mov var_DC, 0000B884hloc_00407A0D: mov var_E4, 00000003hloc_00407A17: fld real8 ptr [00401198h] ;loc_00407A1D: fstp real8 ptr var_ECloc_00407A23: mov var_F4, 00000005hloc_00407A2D: mov var_FC, 00000006hloc_00407A37: mov var_104, ediloc_00407A3D: lea eax, var_8Cloc_00407A43: push eaxloc_00407A44: lea eax, var_E4loc_00407A4A: push eaxloc_00407A4B: lea eax, var_A4loc_00407A51: push eaxloc_00407A52: call 0040126Eh ; __vbaVarMulloc_00407A57: push eaxloc_00407A58: lea eax, var_54loc_00407A5B: push eaxloc_00407A5C: lea eax, var_F4loc_00407A62: push eaxloc_00407A63: lea eax, var_B4loc_00407A69: push eaxloc_00407A6A: call 0040126Eh ; __vbaVarMulloc_00407A6F: push eaxloc_00407A70: lea eax, var_104loc_00407A76: push eaxloc_00407A77: lea eax, var_C4loc_00407A7D: push eaxloc_00407A7E: call 00401268h ; __vbaVarDivloc_00407A83: push eaxloc_00407A84: lea eax, var_D4loc_00407A8A: push eaxloc_00407A8B: call 00401274h ; __vbaVarIdivloc_00407A90: push eaxloc_00407A91: call 00401304h ; __vbaStrVarMoveloc_00407A96: mov edx, eaxloc_00407A98: lea ecx, var_44loc_00407A9B: call 0040130Ah ; __vbaStrMoveloc_00407AA0: push var_7Cloc_00407AA3: push var_44loc_00407AA6: call 00401262h ; __vbaStrCmploc_00407AAB: test eax, eaxloc_00407AAD: jnz 407A2Dhloc_00407AAF: mov ecx, 80020004hloc_00407AB4: mov var_CC, ecxloc_00407ABA: push 0000000Ahloc_00407ABC: pop eaxloc_00407ABD: mov var_D4, eaxloc_00407AC3: mov var_BC, ecxloc_00407AC9: mov var_C4, eaxloc_00407ACF: mov var_EC, 00402AB8h ; "Kool!!"loc_00407AD9: mov var_F4, ebxloc_00407ADF: lea edx, var_F4loc_00407AE5: lea ecx, var_B4loc_00407AEB: call 00401256h ; __vbaVarDuploc_00407AF0: mov var_DC, 00402A7Ch ; "Yeah! It's done!! Success!"loc_00407AFA: mov var_E4, ebxloc_00407B00: lea edx, var_E4loc_00407B06: lea ecx, var_A4loc_00407B0C: call 00401256h ; __vbaVarDuploc_00407B11: lea eax, var_D4loc_00407B17: push eaxloc_00407B18: lea eax, var_C4loc_00407B1E: push eaxloc_00407B1F: lea eax, var_B4loc_00407B25: push eaxloc_00407B26: push 00000040hloc_00407B28: jmp 00407C09hloc_00407B2D: push var_7Cloc_00407B30: push var_44loc_00407B33: call 00401262h ; __vbaStrCmploc_00407B38: test eax, eaxloc_00407B3A: jz 00407C3Bhloc_00407B40: mov ecx, 80020004hloc_00407B45: mov var_CC, ecxloc_00407B4B: push 0000000Ahloc_00407B4D: pop eaxloc_00407B4E: mov var_D4, eaxloc_00407B54: mov var_BC, ecxloc_00407B5A: mov var_C4, eaxloc_00407B60: mov var_EC, 00402AF0h ; "No..."loc_00407B6A: mov var_F4, ebxloc_00407B70: lea edx, var_F4loc_00407B76: lea ecx, var_B4loc_00407B7C: call 00401256h ; __vbaVarDuploc_00407B81: mov var_DC, 00402ACCh ; "Hmmm, no away!!"
Raham Posted April 26, 2013 Posted April 26, 2013 (edited) Hi Ok Here is Unpacked File.... Kind RegardsUnpacked_SE.rar Edited April 26, 2013 by Raham
Asian Dragon Posted April 26, 2013 Author Posted April 26, 2013 (edited) Thank you Raham and simpleThe level of this crackme seems harder than you eh? Edited April 26, 2013 by xuan khanh
converse Posted April 26, 2013 Posted April 26, 2013 (edited) name - converse serial - 10262021 Edited April 26, 2013 by converse
LCF-AT Posted April 26, 2013 Posted April 26, 2013 Hi, whats this? Your target is not protected. Just enter this command and save as new file then set EP to 1334 and save.No Unpack needed. 00401334 PUSH 40198CLCF-AT6408350greetz 1
Raham Posted April 26, 2013 Posted April 26, 2013 Yes LCF You Are Right... Its Not Protected by right option... Pack Code Section = DisabledImport Protection = Disabled Just a bit Anti Debug & Resource Protection .... But Actually Resource Anti Dump for this particular target is Useless. Kind Regards 1
Teddy Rogers Posted April 27, 2013 Posted April 27, 2013 The [unpackme] tag has been added to your topic title. Please remember to follow and adhere to the topic title format - thankyou! [This is an automated reply]
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now