Just playing around with reverse engineering. This is bypass the trial check and give full access.
This requires xdelta3 to apply the patch. Copy
the xpatch
file to your mountain duck directory, open and administrative powershell, and run
the following commands.
mv '.\Mountain Duck.exe' '.\Mountain Duck.orig.exe'
xdelta3 -d -s '.\Mountain Duck.orig.exe' '.\MountainDuck.xpatch' '.\Mountain Duck.exe'
To accomplish this I used dnSpy. Looking at the main execution method I noticed that they register a trial service with their DI container. Then looking at where it would detect a registered copy at startup I noticed that it removed the trial service from the container. Removing the code that adds the trial service ends up removing all of the trial limitations. It will still show as not registered, but everything works and the program will not exit after 30 minutes.