downloadbrowseDaXXoR 101's KeygenMe #3

Download Keygenme_Daxxor.zip, 9 kb (password: crackmes.de)
Browse contents of Keygenme_Daxxor.zip

Keygen it & disable the nag. Not quite as easy as it sounds.

Difficulty: 1 - Very easy, for newbies
Platform: Windows
Language: Assembler

Published: 11. Apr, 2005
Downloads: 8250

Rating

Votes: 7
Crackme is boring.

Rate this crackme:

Send a message to DaXXoR 101 »

View profile of DaXXoR 101 »

Solutions

Solution by l0calh0st, published 31. mar, 2006; download (17 kb), password: crackmes.de or browse.

l0calh0st has not rated this crackme yet.

Solution by Vohligh, published 16. apr, 2005; download (2 kb), password: crackmes.de or browse.

Vohligh has not rated this crackme yet.

Solution by K-Res, published 16. apr, 2005; download (47 kb), password: crackmes.de or browse.

K-Res has not rated this crackme yet.

The submission of solutions is closed.

Discussion and comments

code_inside
30. Apr 2005
A little comment on the solutions.
Instead of NOP'ing those whole procedures you can just patch the first instruction "6A10 - push 10" to a "EB11 - jmp 0040104F" at offset 00402083 :)
_RoS_128
21. Jun 2008
That was cool -- I learned a lot. Thanks DaXXoR!
ayeyen
17. Sep 2008
That memory trick was super clever.
lanzaa
10. Aug 2009
Easy, cool little memory trick.
shan75
07. Jan 2010
MOV DWORD PTR DS:[403C64],JMP.&user32.GetWindowTextA>

SUB DWORD PTR DS:[403C64],9

PUSH 1FF

CMP EBX,1

JNZ SHORT crackme.00401241

PUSH crackme.00403054

PUSH DWORD PTR DS:[40304C]

JMP SHORT crackme.0040124C

PUSH crackme.00403654

PUSH DWORD PTR DS:[403050]

CMP EBX,1

JE SHORT crackme.00401258

confusing about this piece of code
please help me..
SimpleData
03. Feb 2010
That WriteProcessMemory trick was nice.
mem0rex
08. Oct 2010
http://www.virustotal.com/file-scan/report.html?id=efc41119337f4a366c506d566a47d593396ed562ee487994e95f566347a2723f-1284647894
AkaBkn
19. Oct 2010
yhea: this was my first try in reverse engineering. cool! learned a lot and managed to write a keygen. but the submission is closed... :(
AkaBkn
19. Oct 2010
ahh. forgot that -> AkaBkn:@N-CLKY]-QZU
jxzhxch
09. Dec 2010
Easy,trick was nice.
wibf
16. Mar 2011
nudge screen was tricky nice job man
yo-mismo
23. Mar 2011
simple but nice crackme
newcracker88
27. Sep 2012
please help me this is my first crackme
w1ck3dg0ph3r
17. Oct 2012
A little addition to the comment on the solutions =)
Its not enough to patch EB11 @ 00402083, cause it would not pass the checksum test later. So my solution is:
00402083 <- EB 11 ; Let the memory trick patch for us
00401636 <- 40 ; Fix checksum after patching
kalkunipraed
09. Apr 2013
This was the first keygenMe-CrackMe I have ever solve - it was fun and I learned a lot. Thanks!
lykaner
17. Sep 2013
I've a question on patching the nag:

My 1st solution were the following patches (similar to l0calh0st IIRC):

0040103C EB 11 JMP SHORTcrackme.0040104F
004014DC 6A 00 PUSH 0
0040163A EB 07 JMP SHORT crackme.00401643

But if I overwrite 00401037 until 0040104E with NOPs instead of the first to patches and correct 0040163A as I've written, the program crashes if I click on "Check".

Could somebody explain what I've overseen, please?
lykaner
18. Sep 2013
Never mind, I've found my failure:

In the procedure stating at 00401477 you can see that the process id is copied to 00403C80. The procedure starting at 004015B3 checks if the program was patched. At 004015C2 it calls the address located at 00403C80. But if 00401477 is never called 00403C80 consists of zeros. Therefore you have to overwrite the call of 004015B3 at 00401449 with NOPs.
cracker_bug
14. Jun 2014
good crackme ! Made a python script to keygen it : http://pastebin.com/CCjxW3VK
aldeid
06. Dec 2015
My detailed solution here: https://www.aldeid.com/wiki/Solution-DaXXoR-101-KeygenMe-3
Twelfthnight
16. Feb, 17:47
I finally solved this crackme as a college student! This is my first attempt on reverse-engineering, feelsgoodman.

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.