crackme.exe
notes.txt
tools
IDA Pro - crackme.exe Press F5
File Edit Jump Search View Debugger Options Help
Functions
sub_401000
sub_401120
sub_4011E0
sub_401300
sub_401360
Strings
"Access denied."
"Access granted."
"terry"
"nigger"
"1337"
"discord"
"reverse_me_if_u_can"
"not_the_real_key"
IDA View-A
Pseudocode-A
Hex View
00000000 6D 72 6B 76 63 68 2D 31 33 33 37 2D 78 6F 72 0A 00000010 61 6C 65 78 6D 61 72 6B 6F 76 69 63 68 00 00 00 00000020 72 65 76 65 72 73 65 5F 6D 65 5F 69 66 5F 75 5F 00000030 63 61 6E 00 6E 6F 74 5F 74 68 65 5F 72 65 61 6C 00000040 5F 6B 65 79 00 6D 72 6B 76 63 68 5F 63 72 61 63
Notes
Output window
[IDA] Loaded crackme.exe [IDA] Autoanalysis complete. [IDA] Press F5 to decompile current function. [IDA] Entry point at 0x401000
EA: 00401000 Module: crackme.exe Mode: Assembly
Runner
Unlocked Profile
Profile Picture
terry
@templeoperatingsystem
part time reverse engineer
12:34 30/03/2026