mattheig 10 Posted April 13 (edited) Language: C/C++ Platform: Windows x86 OS Version: Windows Packer / Protector: None Description: Simple obfuscation. Change "input a number" text. Gold: add +1 to sum factorial Screenshot: OBFTest.exe Edited April 13 by mattheig wrong exe (see edit history) Share this post Link to post
0 NOP 75 Posted April 13 Program cannot start because VMprotect dll is missing Quote Packer / Protector: None Are you sure this is using no packer or protector? 1 Share this post Link to post
0 mattheig 10 Posted April 13 (edited) @NOP reupload Edited April 13 by mattheig (see edit history) Share this post Link to post
0 ForlaxPy 11 Posted August 16 (edited) [*] Changed the text How I did it? Spoiler Simply by breaking the runtime in this address: 00CA675B then you would be able to see the text in the edx register, so I changed that text from memory dump as you can see here [*] Added +1 to sum factorial How I didt it? Spoiler Same story go to 00CA5070 and edit the eax reg For now that the addresses are well know you can easily calculate the string value and change edit these reg values by patching the exe so it always return what ever you want. Edited August 16 by ForlaxPy More details (see edit history) 1 Share this post Link to post
Language: C/C++
Platform: Windows x86
OS Version: Windows
Packer / Protector: None
Description:
Simple obfuscation. Change "input a number" text.
Gold: add +1 to sum factorial
Screenshot:
OBFTest.exe
Edited by mattheigwrong exe (see edit history)
Share this post
Link to post