Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Featured Replies

Posted

VMProtect HWID CrackMe

I have put all important information in HWID-License.txt.

I hope you all come up with some fascinating solutions.

If you want leave the solution and also if you want to show off you can do that as well! :)

File Information

Submitter freddy

Submitted 02/06/2025

Category CrackMe

View File

VMProtect HWID CrackMe

Solved by iced

Go to solution

Hey @boot and @New Year - New Mind,

It looks like you actively follow these challenges. When it comes to HWID-based crackmes, what exactly are you looking for? Do you aim to generate a valid HWID-key combination, or would patching the validation routine to accept any key be a viable approach as well?

  • 2 weeks later...
10 hours ago, 14yoKID said:

Im pretty sure i have patched most of the things successfully.

Results :

 

 

@14yoKID How  to find the conditional jump after the VMProtectSetSerialNumber function?

screenshot-64.png

Regards.

sean.

Edited by New Year - New Mind

@New Year - New Mind Hey New Year! You will have to trace it through VM,i used CE and basically logged all of the things from start to end,im pretty sure i saved CE log on pc,if not ill see to do it again and send it to you so you can observe the things i did.

6 minutes ago, 14yoKID said:

@New Year - New Mind Hey New Year! You will have to trace it through VM,i used CE and basically logged all of the things from start to end,im pretty sure i saved CE log on pc,if not ill see to do it again and send it to you so you can observe the things i did.

@14yoKID hey, man. can you send me the log?

Regards.

sean.

  • 4 months later...
  • Solution

Hey guys! I’m iced, a passionate student from Bosnia who’s really into reverse engineering. I decided to join Tuts4You to expand my knowledge and trade insights with people who are way better than me.Im also a friend of @0xret2win and he suggested me to join site and try to tackle couple of nice crackmes posted here. Also i dont think the guy who made this applied full protection settings.

Anyways upon investigating this target i found two interesting calls:

( Not entierly sure if i should do step-by-step since if you follow "MessageBoxA" in ret and stack you will eventually get to same place i got )

"vmp-licensing-test.vmp.exe"+A19CAE - E8 B9CB60FF           - call "vmp-licensing-test.vmp.exe"+2686C
  This is upon hitting "VMProtectGetCurrentHWID".
  RAX => 29

 
"vmp-licensing-test.vmp.exe"+A19C9C - E8 2550ABFF           - call "vmp-licensing-test.vmp.exe"+4CECC6
  This is upon hitting on "VMProtectSetSerialNumber".
  RAX => 20

Using x64dbg :

00007FF665759CAE | E8 B9CB60FF              | call vmp-licensing-test.vmp.7FF664D6686C                            | 
-> VMProtectGetCurrentHWID
00007FF665759C9C | E8 2550ABFF              | call vmp-licensing-test.vmp.7FF66520ECC6                            |
-> VMProtectSetSerialNumber

 

spacer.png

 

 

Create an account or sign in to comment

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.