It's got a feature to upload your designs to the barbie website, and I think it internally calls all user uploads "Girl_One_Cheezy_Fashion"
__stdcall my beloved. best x86 calling convention ever.
how do we pass arguments? you stick them on the stack, right to left. return values are in EAX.
it's so fucking simple I love it
I was wrong on both counts! I netcatted it, and it turns out "Girl_One_Cheezy_Fashion" is indeed the filename, and the bfs~^abcdefg~^ is the "bfs_authenticate".
I hacked the EXE to upload to localhost. The game originally pointed at vvjpgxfr.barbie.com, which is a domain that doesn't exist anymore and there are no references to it online that I can find
I had to name the game-specific allocation and free functions, and this is a barbie game, so of course they're barbie_malloc and barbie_free.
Every time I see those it makes me smile. Barbie is a C++ programmer now! with barbie_malloc!
yeah the bastard thing is loading "files" named like "E13841F5C_00.PRM", and that string is located in memory at the suspiciously similar location of 0x13949D8C.
these are not files. these are memory!