Jump to content
Tuts 4 You

Recommended Posts

Posted (edited)

Difficulty : 8/10
Language : .NET C#
Platform : Windows x64
OS Version : All
Packer / Protector : DNGuard + Themida

Description :

Get the password.

Screenshot :

bfede79951adc791bb4d41c714b65caa.png.8081d428739887c1177c8f0aebafc309.png

Crackme.zip

Edited by 0x32
Posted

Difficulty: 8/100
Password:

BlueGodMonkeys!*
01.png.229ba22d796f81c6112ac5f7c941e972.png

 

Run the target. In my case, for bypassing the VM detection I had to change this registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Use ProcessHacker to search for all strings(default settings):

02.png.8f8419f2dbe9591707d8a06781941485.png

  • Like 1
Posted
On 5/11/2017 at 11:21 AM, Gyrus said:

Difficulty: 8/100
Password:

BlueGodMonkeys!*
01.png.229ba22d796f81c6112ac5f7c941e972.png

 

Run the target. In my case, for bypassing the VM detection I had to change this registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Use ProcessHacker to search for all strings(default settings):

02.png.8f8419f2dbe9591707d8a06781941485.png

Great job! I just posted V2.0, can you try crack it again?

Posted
On 2017-5-11 at 11:21 PM, Gyrus said:

Difficulty: 8/100
Password:

BlueGodMonkeys!*
01.png.229ba22d796f81c6112ac5f7c941e972.png

 

Run the target. In my case, for bypassing the VM detection I had to change this registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Use ProcessHacker to search for all strings(default settings):

02.png.8f8419f2dbe9591707d8a06781941485.png

 

how to use ProcessHacker to search ?

Posted

@collins

00.PNG.43c08345506883ee54c39f162be203b4.PNG

@0x32

I'll check it.

  • Like 1

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...