...and here's the 'prize' as well,under "Releases" page...few other stuff there possibly:
hxxp://gew.org.ru/
(Doh,forgot mentioning explicity...for those having trouble to translate,
joiner is called "JVA",password is "JVA" as well...)
=====================================
No need for a very detail tutorial or so,just a really quick explanation for other people...
It's a joined .exe: well,about 99% of such executables,
contain the rest of embedded .exes/data either as an overlay appended to the end of the file,
or,even more usually,in the .rsrc section...
The above joined.exe poses no exception to the rule...
if you fire up XN Resource Editor,or any other similar app of you choice,
you'll see that .exe has two resources..."136" and "137" namely.
It's easy to guess these are the embedded pass-protected archives,
and even the "Rar!" header is there in plain view...it's not even obfuscated or something.
Ie.if all someone wants is to get the .exes out of there,
he/she simply has to extract these two resources/.rar files...
and then use the approriate password,which is "cult" in this case.
How to find the pass in the first place without spending hours of bruteforcing?
Lmao,exactly as tjs said,"too easy to pull the cmdline params off the stack":
nothing more needed than couple of minutes tracing around with F7/F8 in Olly...