downloadbrowseDrPepUr's DrPepUr #4

Download, 6 kb (password:
Browse contents of

1. No Patching
2. No Self-Keygens (Refer to rule #1)
3. Write A Tutorial If You Feel Like It

Good Luck


Difficulty: 1 - Very easy, for newbies
Platform: Windows
Language: Assembler

Published: 16. Mar, 2008
Downloads: 760


Waiting for at least 3 votes
(we have only 2).

Rate this crackme:

Send a message to DrPepUr »

View profile of DrPepUr »


Solution by ORacLE_nJ, published 25. apr, 2010; download (77 kb), password: or browse.

ORacLE_nJ has not rated this crackme yet.

Submit your solution »

Discussion and comments

24. Mar 2008
I tried for a whole day,but I am failed to get the first 4 characters of the serial string. At 00401AF2: call 00401910. It seems like xor encryption. I had enumerate all the possible characters from '0' to 'z'(of course for every character),its strange that i failed too. There are a sequence of call for 00401910,the complexity upgrades! Any advice? Thanks.
24. Mar 2008
The first 4 bytes are used to make a CRC32 checksum, the easiest way to find them out is by coding a CRC32 brute forcer.
24. Mar 2008
I don't know how to write the reverse function and get the original 4 bytes,but i have got it by enumeration,its "DRP-". Your program is very good to practise. I have done all the work. the same issue is my keygen is only can work in debugger. I guess the magic exists at [0040320F],perhaps you use a newer anti-debug tech than last one(#3). I am missed myself this time.btw,i don't to how to code a CRC32 brute forcer.
24. Mar 2008
i enumerated all the printable characters no longer than only at '0' to 'z' range.So fortunately!
25. Mar 2008
the last issue is its anti-debug stratage,i have not resolved it by now. .......

You may leave your comment, thoughts and discuss this crackme with other reversers here.
Acting childish will not be tolerated.
HTML and such will be left as-is, so don't try.