Skip to content

Instantly share code, notes, and snippets.

@Stoom
Last active January 7, 2021 02:28
Show Gist options
  • Save Stoom/367db33077fcac41174be4bbe3b77f85 to your computer and use it in GitHub Desktop.
Save Stoom/367db33077fcac41174be4bbe3b77f85 to your computer and use it in GitHub Desktop.
Mountain Duck v4.3.3 Activation Patch

Mountain Duck v4.3.3 Activation Patch

Just playing around with reverse engineering. This is bypass the trial check and give full access.

Download Mountain Duck

Applying the patch

This requires xdelta3 to apply the patch. Copy the xpatch file to your mountain duck directory, open and administrative powershell, and run the following commands.

mv '.\Mountain Duck.exe' '.\Mountain Duck.orig.exe'
xdelta3 -d -s '.\Mountain Duck.orig.exe' '.\MountainDuck.xpatch' '.\Mountain Duck.exe'

Behind the scenes

To accomplish this I used dnSpy. Looking at the main execution method I noticed that they register a trial service with their DI container. Then looking at where it would detect a registered copy at startup I noticed that it removed the trial service from the container. Removing the code that adds the trial service ends up removing all of the trial limitations. It will still show as not registered, but everything works and the program will not exit after 30 minutes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment