XzzX's XzzX#CrackMe2
Download XzzX-CrackMe2.zip, 3 kb (password: crackmes.de) Browse contents of XzzX-CrackMe2.zip *******************************************
Difficulty: 4 - Needs special knowledge | RatingWaiting for at least 3 votes View profile of XzzX » |
Solutions
Solution by red477, published 07. jun, 2007; download (11 kb), password: crackmes.de or browse.
red477 has not rated this crackme yet.
Discussion and comments
red477 06. Jun 2007 | Nice crackme;) I found a name/serial combination...will try to write a keygen soon.. |
---|---|
XzzX Author 06. Jun 2007 | I don't like you. You're too fast. ;-) Send me your keygen as soon as you have one. Have you already patched the ad? |
Dis@sm 11. Jun 2007 | We have so different FPUs?? For name="Disasm90" It must be 0xd4581896 in [0x004046c5] before decryption stage 3 before command FISTP [0x004046c5] i have 0xd4581896 in decimal in the top of my FPU but after it.. [0x004046c5]=0x80000000 any other FISTP command works correcttly |
red477 11. Jun 2007 | 0xd4581896 is a negative number, it is -732424042 in decimal, but not 3562543254. try it;) ////////////////////////////////////////////// From Intel's Instruction Set Reference: The FIST instruction converts the value in the ST(0) register to a __signed__ integer and stores the result in the destination operand. |
XzzX Author 11. Jun 2007 | I struggled at exactly the same problem when I tested my crackme and tried to find a key for myself. ;-) But I thought that this is a nice trap so I didn't remove it. :-D |
You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.