downloadbrowsebbidhan's cRå©k Më after a long long time; try to solve

Download cRå©k_Më.zip, 16 kb (password: crackmes.de)
Browse contents of cRå©k_Më.zip

Crackme after a long time.

Difficulty: 4 - Needs special knowledge
Platform: Windows 2000/XP only
Language: (Visual) Basic

Published: 15. Jul, 2008
Downloads: 318

Rating

Waiting for at least 3 votes
(we have only 2).

Rate this crackme:

Send a message to bbidhan »

View profile of bbidhan »

Solutions

There are no solutions to this crackme yet. Have you solved it? Please write a tutorial and submit it here!

Submit your solution »

Discussion and comments

DigitalAcid
24. Jul 2008
I don't think that this one can be solved.
It is comparing with a value wich cannot be reached without patching.
costy
28. Jul 2008
I think what wrote DigitalAcid is true
DigitalAcid
28. Jul 2008
We heard you the first time :P.
Xspider
28. Jul 2008
:lol: that's flood :p
costy
28. Jul 2008
Sorry. I didn't want to post twice.
obnoxious
29. Jul 2008
.......and the spam filter keeps on caling me n tells me that it does not like me ;)
mjesun
24. Nov 2008
Of course, the __vbaVarTstEq of 0040F6AC is comparing an integer (word, type 02h) against a double (64bits, type 8005h).

After executing the function, the double number is aproximately 775, but it's not exact. There is a very small error that causes the ollydbg to show 775.00000000, but that's not true.

Thus, as DigitalAcid says, it has not solution.
mjesun
24. Nov 2008
Hm, I forgot to explain that the integer of the comparasion is the addition of all the ASCII char codes of the password.

You can check what I want to mean by compiling this code:

Dim a As Double
a = 774.99999999999
b = 770 + 5
If a = b Then MsgBox a

Obviously there will be no MsgBox, but at olly the returned value is 775.

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.