EBPIG
6̽Ë÷ÔÓÖ¾6
MHJDQ
֪ʶ¹²ÏíJ×ÊÔ´¹²ÏíJ×ÊÁϹ²Ïí
¡¾·¢ÐÐʱ¼ä¡¿2000-11-18
¡¾ÆÚ¿¯ºÅÂë¡¿µÚ¶þʮһÆÚ
¡¾ÍøÕ¾µØÖ·¡¿http://programhunter.myetang.com
¡¾°æȨÉùÃ÷¡¿¡â¨x¨y¨z¨{¨|¨}¨~¨€³ÌʽÁÔÈ˨€¨~¨}¨|¨{¨z¨y¨x¡á
´ËÔÓÖ¾ÓɳÌʽÁÔÈ˱༭¡¢ÖÆ×÷¼°·¢ÐУ»ÔÓÖ¾¿ÉÒÔ×ÔÓÉתÔØ¡¢·Ö·¢ºÍ´«²¥£»ÈκθöÈË»òÍÅÌå²»µÃÔÚδ¾­±¾ÈËÊÚȨµÄÇé¿öÏÂÐÞ¸ÄÔÓÖ¾µÄÍâ¹Û¼°ÄÚÈÝ£»ÔÓÖ¾µÄ½âÊÍȨ¹é³ÌʽÁÔÈËËùÓС£

¡¾±à¼­¼ÄÓï¡¿

    
   {~._.~} 
    ( Y )  
   ()~*~() 
   (_)-(_) 
ÿ½ñÌì±¾Ó¦µ±Ïò´ó¼Ò·¢ÐÐÎÒ·­ÒëµÄ¹ØÓÚPEµÄÎÄÕ£¬¿ÉÊÇÎÒÏëÓ¦µ±×ÐϸµÄÑо¿Ò»ÏÂÆäËûÈ˹ØÓÚimport table·½ÃæÎÄÕ£¬±Ï¾¹ÓÐÐí¶àµ¥´ÊµÄÒâ˼²»ÊǺܺ÷­Ò룬²¢ÇÒ·­ÒëºóûÓÐÒ»¸öͳһµÄ±ê×¼£¬ËùÒÔ×¼±¸ÔÚÏÂÖÜÏò´ó¼Ò½éÉÜ£¬Ï£Íû´ó¼ÒÄܹ»Ô­Á¹£¬²¢ÇÒÕâ¶Îʱ¼ä±¾ÈËÒ²±È½Ï棬ËùÒÔ¶ÔÓÚÆƽⷽÃæµÄ¹¤×÷»¨µÄÒ²ÉÙ£¬ÔÙÒ»´ÎÏ£Íû´ó¼ÒÁ¹½â¡£
 
¡¾Ä¿ ÿÿ ¼¡¿
ÿÿÿÿ&ÆƽâÐĵÃ
J¡­¡­PixWizard ver 1.24 ³ÌʽÁÔÈË
K¡­¡­duelist crackme 1 Æƽ⠶¡¶¡Ïº ddxia/[CCG]
L¡­¡­duelist crackme 4 Æƽ⠶¡¶¡Ïº ddxia/[CCG]
ÿÿÿÿ,ÔÓÖ¾ÐÅÏä
 
&¡¾ÆƽâÐĵá¿
                       PixWizard ver 1.24
                             ³ÌʽÁÔÈË
¼ò½é£ºÖ§³ÖÏ൱¶àͼÐÎÎļþ¸ñʽ¼°ÈÝÒ×ʹÓõÄÐãͼÈí¼þ£¬³ýÁËÐãͼÍ⣬»¹¿É×öÓ°Ïñ´¦
Àí£¬×ª»»£¬ÆÁĻߢȡµÈ£¬Ö§³ÖOS/2µÄBMP£¬WindowsµÄBMP£¬EMF£¬GIF£¬IFF£¬
JPEG£¬MAC£¬MSP£¬PCD£¬PCX£¬PIC£¬PICT£¬PNG£¬PPM£¬Targa£¬TIFF£¬WMF£¬WPGµÈ
¸ñʽµÄÐãͼºÍͼÐÎÎļþת»»¡£ 
×·×Ù£ºÕâ¸öÈí¼þÊÇtime bombÀàÐ͵ÄÈí¼þ£¬ËùÒÔ½«ËüµÄʱ¼äÏÞÖÆɾ³ý¾Í¿ÉÒÔÁË¡£
  ʹÓÃW32À´·´»ã±àÕâ¸öÈí¼þºó²éÕÒ×Ö·û´®£¬ÈçÏ£º
|:004074C3(C)
|

* Possible StringData Ref from Data Obj ->"days"
                                  |
:004074CC 68F8E54700              push 0047E5F8

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004074CA(U)
|
:004074D1 8D4C2414                lea ecx, dword ptr [esp+14]

* Reference To: MFC42.Ordinal:03AD, Ord:03ADh
                                  |
:004074D5 E8E0390200              Call 0042AEBA

* Possible StringData Ref from Data Obj ->" left in your evaluation period."
                                  |
:004074DA 68D4E54700              push 0047E5D4
:004074DF 8D4C2414                lea ecx, dword ptr [esp+14]

* Reference To: MFC42.Ordinal:03AD, Ord:03ADh
                                  |
:004074E3 E8D2390200              Call 0042AEBA
:004074E8 EB0E                    jmp 004074F8

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00407484(C), :00407489(C)
|

* Possible StringData Ref from Data Obj ->"Your evaluation period has expired."
                                  |
:004074EA 68B0E54700              push 0047E5B0
:004074EF 8D4C2414                lea ecx, dword ptr [esp+14]

* Reference To: MFC42.Ordinal:035C, Ord:035Ch
                                  |
:004074F3 E8DA390200              Call 0042AED2
   ÔÚÕâÉÏÃæ¿ÉÒÔ¿´µ½³ÌÐòÔÚÊÔÓÃÆÚÄں͹ýÆÚµÄ×Ö·û´®£¬ËùÒÔÏòÉϲéÕҴӺδ¦ÌøÔ¾µ½ÕâÀïÀ´µÄ¡£
* Reference To: MFC42.Ordinal:0B02, Ord:0B02h
                                  |
:00407474 E8353A0200              Call 0042AEAE
:00407479 8B86FC000000            mov eax, dword ptr [esi+000000FC]
:0040747F 83C40C                  add esp, 0000000C
:00407482 3BC5                    cmp eax, ebp
:00407484 7E64                    jle 004074EA
:00407486 83F81E                  cmp eax, 0000001E
:00407489 7F5F                    jg 004074EA
  ´ÓÕâÀïÌøÔ¾ÏòÉÏÃæµÄµØ·½£¬ÏÖÔÚÖªµÀÁË£¬Ö»Òª½«ÕâÀïÐÞ¸ÄһϾͿÉÒÔÆƽâÕâ¸öÈí¼þµÄʱ¼äÕ¨µ¯ÁË¡£
  ÏÖÔÚ´ó¼ÒͬһÑùÈÏΪÕâÑù×öÆƽâ¾ÍËãÍê³ÉÁË£¬¿ÉÊÇÈç¹ûÄã°´ÕÕÉÏÃæÈ¥×öµÄ»°£¬»áµÃµ½Ê²Ã´
µÄ½á¹ûÄØ£¿ÎÒÐÞ¸ÄÍêºóÔÙÔËÐгÌÐò£¬³ÌÐò¾ÍÎÞÂÛÈçºÎÒ²²»ÔÙ³öÏÖ´°¿ÚÁË¡£
  ÎÒÏë³ÌÐòºÜÓпÉÄÜÊÇÓÐCRCÑéÖ¤¹ý³Ì£¬ÎÒÃÇÔÙ×·×Ù£¬¿´Ò»¿´³ÌÐòµ½µ×ÊÇÔÚÄÄÀïʹÓÃÁËCRCÑé
Ö¤¹ý³Ì¡£
:0041F32C E8E5C50000              Call 0042B916
:0041F331 8D9424B4010000          lea edx, dword ptr [esp+000001B4]
:0041F338 6804010000              push 00000104
:0041F33D 52                      push edx
:0041F33E 8D8C24BC010000          lea ecx, dword ptr [esp+000001BC]
:0041F345 E8360A0000              call 0041FD80
:0041F34A 3B442418                cmp eax, dword ptr [esp+18]
:0041F34E 743A                    je 0041F38A
:0041F350 8D8C249C000000          lea ecx, dword ptr [esp+0000009C]
:0041F357 C684246408000004        mov byte ptr [esp+00000864], 04
:0041F35F E8AB540200              call 0044480F
:0041F364 8D8C248C000000          lea ecx, dword ptr [esp+0000008C]
:0041F36B 889C2464080000          mov byte ptr [esp+00000864], bl

* Reference To: MFC42.Ordinal:0299, Ord:0299h
                                  |
:0041F372 E899C50000              Call 0042B910
:0041F377 8D4C2410                lea ecx, dword ptr [esp+10]
:0041F37B C684246408000001        mov byte ptr [esp+00000864], 01

* Reference To: MFC42.Ordinal:0320, Ord:0320h
                                  |
:0041F383 E81ABB0000              Call 0042AEA2
:0041F388 EB40                    jmp 0041F3CA

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0041F34E(C)
|

* Possible StringData Ref from Data Obj ->"Shareware Version"
                                  |
:0041F38A 68308B4A00              push 004A8B30
:0041F38F 8D8C24B8010000          lea ecx, dword ptr [esp+000001B8]
:0041F396 E825EFFFFF              call 0041E2C0
:0041F39B 8BF0                    mov esi, eax
:0041F39D 889C2464080000          mov byte ptr [esp+00000864], bl
:0041F3A4 85F6                    test esi, esi
:0041F3A6 8D8C248C000000          lea ecx, dword ptr [esp+0000008C]
:0041F3AD 7423                    je 0041F3D2
:0041F3AF E87C090000              call 0041FD30
:0041F3B4 8D4C2410                lea ecx, dword ptr [esp+10]
:0041F3B8 C684246408000001        mov byte ptr [esp+00000864], 01

* Reference To: MFC42.Ordinal:0320, Ord:0320h
                                  |
:0041F3C0 E8DDBA0000              Call 0042AEA2
:0041F3C5 83FE01                  cmp esi, 00000001
:0041F3C8 741E                    je 0041F3E8
¾­¹ý×·×Ù£¬·¢ÏÖÔÚÉÏÃæµÄ±È½ÏµØ·½ÊǹؼüµÄÌøÔ¾£¬ÕâÀïÈç¹û¸Äµôºó£¬¾Í¿ÉÒÔÔËÐÐÁË¡£
 ÏÖÔÚ½«Ê±¼äµ÷ºóÒ»Ä꣬ÔÙÔËÐгÌÐò£¬´ó¼ÒÏëÒ»ÏëÈçºÎ£¬³ÌÐò³öÏÖ³ÌÐò´°¿Ú£¬Ò²³öÏÖÁËÌáʾ
´°¿Ú£¬µ«ÊǾÍÊǵ±Äãµã»÷contuneºó£¬³ÌÐò×Ô¶¯Í˳ö£¬ËùÒÔ˵Õâ¸ö³ÌÐò»¹ÓÐÑéÖ¤µØ·½£¬Ã»ÓÐ
°ì·¨£¬ÔÙ×·×Ù¡£ÔڱȽÏʱ¼äµÄµØ·½ÏòÏÂ×·×Ù£¬ÒòΪ³ÌÐòÔÚÄÄÀï¿ÉÒÔ±»À¹ÏÂÀ´£¬ËùÒÔ¾ÍÏòÏÂ×·×Ù£º
:00407547 50                      push eax
:00407548 8D4C2458                lea ecx, dword ptr [esp+58]
:0040754C FF5264                  call [edx+64]
:0040754F 8B86FC000000            mov eax, dword ptr [esi+000000FC]
:00407555 3BC5                    cmp eax, ebp
:00407557 7E0F                    jle 00407568
:00407559 83F81E                  cmp eax, 0000001E
:0040755C 7F0A                    jg 00407568
:0040755E C7860C01000001000000    mov dword ptr [esi+0000010C], 00000001
   À´µ½ÕâÀ´ó¼Ò·¢ÏÖ°É£¬³ÌÐòÔÚÕâÀïÓÖÊÇÒ»¸öÑé֤ʱ¼äµÄµØ·½£¬²»Óöà˵£¬¸ÄµôËü£¬Õâ
»Ø³ÌÐòÔÙÔËÐУ¬¿ÉÒÔÁË£¬ÔÚÌáʾ´°¿ÚÖÐÌáʾÄãÒѾ­ÊÇ-345ÌìÁË¡£
  ÏÖÔÚ¿ÉÒÔ˵Õâ¸öÈí¼þÊÇÆƽâ³É¹¦ÁË¡£


duelist crackme 1 ÆÆ½â      (Ï£ÍûתÔصÄʱºò±£³ÖÍêÕû£© 

×÷Õß    ¶¡¶¡Ïº  ddxia/[CCG] 
Ä¿±ê     duelist crackme 1 
Ä¿±êURL    http:\\go.163.com\~ddxia\crackme\DueList\Due-cm1.zip 
¹¤¾ß          SoftIce4.01 for NT 
ÀÖȤ            ¿ÉÒÔÖ±½ÓÐ޸ijÌÐò´úÂë,µÃµ½ÐòÁкÅ(ÀÁÈË·½·¨)^_^ 

    Ê×ÏÈ¿´¿´ËüµÄreadme.txt(½¨ÒéÔÚCrack CrackmeÇ°£¬¶ÁÒ»¶Á£¬»áÓÐЩ°ïÖúµÄ)£¬ÊÇ Duel
istдµÄµÚÒ»¸ö´¿ASMµÄCrackme¡£ 
    ÔËÐУ¬»á·¢ÏÖËüÐèÒªÒ»¸öÐòÁкţ¬±ðæÏÂÖжϣ¬¿´¿´ÊÇÄÇÒ»ÖÖ³ö´íÐÅÏ¢£¬Ëæ±ãÌîÏÂ123
£¬È»ºó°´check°´Å¥£¬»áµ¯³öÒ»¸ö³ö´í¶Ô»°¿ò£¡È»ºó°´OK·µ»ØÖ÷³ÌÐò¡£ 
    ¶ÔÖ¢ÏÂÒ©À²£¡:) 
    Ctrl+D ¼¤»îSICE 
    BPX MESSAGEBOXA 
    Ctrl+D ·µ»Ø³ÌÐò¡£ 
    ÔÙ°´check°´Å¥£¬¾Í»áÀ¹½ØÏÂÀ´£¬¸ú×Å°´F11Ìø³öMESSAGEBOXAµÄϵͳ´úÂë(ÓеãÏóTRWµÄP
moudle)£¬¹â´ø»áÍ£ÔÚ001B:00401193 
001B:0040117D  6800200000          PUSH      00002000 
001B:00401182  6801204000            PUSH      00402001 
001B:00401187  6863204000            PUSH      00402063 
001B:0040118C  6A00                        PUSH      00 
001B:0040118E  E85C010000          CALL      USER32!MessageBoxA 
001B:00401193  E95CFFFFFF          JMP      004010F4 
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^---->¹â±ê»áÍ£ÔÚ´Ë´¦ 
    ÓÐÁ˽á¹û£¬ÓÚÊÇÎÒÃǺÜÏëÈ¥ÖªµÀÔ­ÒòÊÇΪʲô£¿¶ÔÂð£¿ËùÒÔÎÒÃÇÒª»Ø¹ËÒ»ÏÂÀúÊ·£¬£¨ÊÇ
°¡£¡ÔÚ´úÂëµÄÀúÊ·ÖУ¬ÓÀÔ¶¶¼²»»á¹ýÆÚ£¬¿ÉÒÔ×·Ñ°£¬¿ÉÒÔÖØÐÂÀ´¹ý£¬Ò²¿ÉÒÔÖØÍ·À´¹ý£¬µ«ÔÚ
ÏÖʵÖУ¬ÀúÊ·ÓÀÔ¶ÊÇÀúÊ·£¬ÏÖÔÚµÄÎÒÃÇÖ»ÄÜÊÇ»ØÒä¡¢ÁôÁµ£¬Èç¹ûÏëÔÚÄãµÄÀúÊ·³¤ºÓÀïÁôϾ«
²Ê˲¼ä£¬Çë°ÑÎպýñÌì°É£¡£¡£© 

    ¼òµ¥×¢²á·½Ê½£ºµÃµ½´úÂë------¡·½øÐб仯-----¡·È»ºó½øÐбȽÏ----¡·¶Ô·ñ£¿ 
                    ÎÒÃÇ¿ÉÒÔ¿´µ½ÈçϵĴúÂ룺 
001B:004010FB  6A24                          PUSH      24 
001B:004010FD  68F7204000              PUSH      004020F7 
                      ^^^^^^^^^^^^^^^^^^^^^^^^----->GetDlgItemTextAÊÇ´æ·ÅÄãÊäÈë
×¢²áÂëµÄµØ·½             
001B:00401102  6A01                            PUSH      01 
001B:00401104  FF7508                        PUSH      DWORD PTR [EBP+08] 
001B:00401107  E855020000              CALL      USER32!GetDlgItemTextA 
                      ^^^^^^^^^^^^^^^^^^^^^^^^----->µÃµ½×¢²áÂë     
001B:0040110C  33C0                          XOR      EAX,EAX 
001B:0040110E  80B8F720400000      CMP      BYTE PTR [EAX+004020F7],00 
                      ^^^^^^^^^^^^^^^^^^^^^^^^----->±È½ÏÊÇ·ñÊäÈ룿 
001B:00401115  7418                              JZ        0040112F 
001B:00401117  80B0F720400043      XOR      BYTE PTR [EAX+004020F7],43 
001B:0040111E  80B0F72040001E      XOR      BYTE PTR [EAX+004020F7],1E 
001B:00401125  80B0F720400055      XOR      BYTE PTR [EAX+004020F7],55 
                      ^^^^^^^^^^^^^^^^^^^^^^^^----->½øÐÐ×¢²áÂë±ä»¯ 
001B:0040112C  40                          INC      EAX 
001B:0040112D  E2DF                    LOOP      0040110E 
001B:0040112F  83F800                  CMP      EAX,00 
001B:00401132  7518                      JNZ      0040114C 
                ^^^^^^^^^^^^^^^^^^^^^^^^----->ת»¯ÍêûÓУ¿£¿ 
001B:00401134  6800200000          PUSH      00002000 
001B:00401139  6801204000          PUSH      00402001 
001B:0040113E  689D204000          PUSH      0040209D 
001B:00401143  6A00                        PUSH      00 
001B:00401145  E8A5010000          CALL      USER32!MessageBoxA 
001B:0040114A  EBA8                    JMP      004010F4 

001B:0040114C  6A24                      PUSH      24 
001B:0040114E  68D3204000          PUSH      004020D3 
001B:00401153  68F7204000          PUSH      004020F7 
001B:00401158  E864000000          CALL      004011C1 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->½øÐбȽϵÄ×Ó³ÌÐò 
001B:0040115D  83F800                  CMP      EAX,00 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->ÊÇ·ñÕýÈ·£¿£¿ 
001B:00401160  741B                      JZ        0040117D                (JUMP ) 
001B:00401162  6800200000          PUSH      00002000 
001B:00401167  6801204000          PUSH      00402001 
001B:0040116C  6817204000        PUSH      00402017 
001B:00401171  6A00                      PUSH      00 
001B:00401173  E877010000          CALL      USER32!MessageBoxA 

    ÎÒÃÇ¿ÉÒÔ×¢Òâµ½Á½¸öµØÖ· 
    Ò»¸öÊÇ    004020D3  -----´æ·Å׎ø¹ý±ä»¯µÄ×¢²áÂë 
    ÁíÒ»¸öÊÇ004020F7  -----ÓÃÊäÈëµÄ×¢²áÂë 
:d 4020d3 4020f5 
0023:004020D3 7B 61 65 78 64 6D 26 6B-7A 69 6B 63 65 6D 26 3C  {aexdm&kzikcem&< 
0023:004020E3 26 66 6D 7F 6A 61 6D 7B-26 6A 71 26 6C 7D 6D 64  &fmjam{&jq&l}md 
0023:004020F3 61 7B 7C 00 31 32 33 00-00 00 00 00 00 00 00 00  a{|.123......... 
     
    ³ÌÐò½øÐб仯µÄ´úÂë½ö½öÊÇXOR£¬Ò»Öַdz£¼òµ¥¼ÓÃÜ·½·¨£¬ÓÐBUGºÇºÇ£¬ÓÚÊÇÓÃSICEÐ޸ĴúÂëΪÈçÏ£º 
001B:0040110E  80B8D320400000      CMP      BYTE PTR [EAX+004020D3],00 
001B:00401115  7418                              JZ        0040112F 
001B:00401117  80B0D320400043      XOR      BYTE PTR [EAX+004020D3],43 
001B:0040111E  80B0D32040001E      XOR      BYTE PTR [EAX+004020D3],1E 
001B:00401125  80B0D320400055      XOR      BYTE PTR [EAX+004020D3],55 
                    ½ö½öÊÇ°ÑÕâËľäÖеÄ004020F7»»Îª004020D3£¬¼´ÐÞ¸ÄF7ΪD3£¬È»ºóÈóÌÐòÔÙÔËÐÐÒ»
±é£¬ºÇºÇ~~³ÌÐò»á×Ô¶¯ÏÔʾÕýÈ·×¢²áÂ룡¸Ï½ô³­ÏÂÀ´£¡ 
0023:004020D3 73 69 6D 70 6C 65 2E 63-72 61 63 6B 6D 65 2E 34  simple.crackme.4 
0023:004020E3 2E 6E 65 77 62 69 65 73-2E 62 79 2E 64 75 65 6C  .newbies.by.duel 
0023:004020F3 69 73 74 00 31 32 33 00-00 00 00 00 00 00 00 00  ist.123......... 
                    Í˳ö³ÌÐò£¬ÖØÐÂÔËÐУ¬ÊäÈësimple.crackme.4.newbies.by.dueist£¬OK ÊÕ¹¤ :D 
                
×ܽ᣺ÔÚCrackÖУ¬¿ÉÒÔ·¢»Ó×Ô¼ºµÄÖ÷¹ÛÄܶ¯ÐÔ(»©£¡ÉÏÇàÉÙÄêÐÞÑø¿Î°¡£¡ÎÒµ¹.........) 
·¢»ÓÏëÏóÁ¦£¬²»ÐèÒª¾ÓÙ£ÓÚÄÄÒ»ÖÖ·½·¨£¬¾¡¹ÜÈ¥·¢»Ó¡£CrackµÄ¾«»ªÖ®´¦ÔÚÓÚ²»¶ÏµÄ̽Ë÷ºÍ´´Ð£¡ 
             
                        ʱ¼ä£º2000.10.16 19:45 
                        ÌáÒ飺¸Ã»Ø¼Ò£¬°®»¤Ò»ÏÂ×Ô¼ºµÄθÁË :) 

duelist crackme 4 ÆÆ½â      (Ï£ÍûתÔصÄʱºò±£³ÖÍêÕû) 

×÷Õß    ¶¡¶¡Ïº  ddxia/[CCG] 
E_mail        ddxia@263.net (Èç¹ûCrackme½ÌѧÎÄÕÂÖÐÓÐ´í£¬ÇëÀ´ÐÅ:)) 
Web            http://go18.163.com/~ddxia 
Ä¿±ê     duelist crackme 4 
Ä¿±êURL    http://go18.163.com/~ddxia/crackme/DueList/Due-cm4.zip 
¹¤¾ß          SoftIce4.01 for NT    winapi.hlp  

    ¾Ýreadme.txt˵£¬ÓÃÃØÃܱíµÄÐÎʽÀ´½øÐмÓÃÜ£¬½âÆðÀ´ÓÐЩÀ§ÄÑ¡£Í¬Ê±Òª×öÒ»¸öKEYGEN
    Õâ´Î²»ÓÃBPX MESSAGEBOXA »»Ò»Ï¿Úζ£¡:) 
    ÒòΪÕâ´ÎCrackmeÊÇÒªÊäÈëUSER/CODE£¬Ò»¶¨Òª¾­¹ý±ä»¯²Å½øÐбȽϣ¬ËùÒÔÔÚCrackmeµÃµ½ 
¼ÙµÄUSER/CODEʱ£¬°ÑËü¶ÏÏÂÀ´¡£ 
    bpx getwindowtexta  ------°¡Å¶£¡£¡Ã»ÓÐÓã¡ 
    bpx getdlgitem      ------ÓëDLG²Ù×÷Óж¼¶ÏÏÂÀ´¡£ 
    ½á¹û°´ÏÂcheckºó£¬¾Í¸ø¶ÏÏÂÀ´ÁË£¬F11 È»ºóÔÙ°´F12 ·µ»ØCrackmeµÄ´úÂë¿Õ¼ä 
    ÓÃSICE½ØÏÂÈçÏ´úÂ룬COME ON BABY£¡£¡·ÖÎö´úÂëŶ£¡£¡·Ç³£µÄÓÐȤµÄ»îŶ£¡:) 

:u 401127 L13d 
001B:00401127  6A00                PUSH      00 
001B:00401129  6A00                PUSH      00 
001B:0040112B  6A0E                PUSH      0E 
001B:0040112D  6A03                PUSH      03 
001B:0040112F  FF7508              PUSH      DWORD PTR [EBP+08] 
001B:00401132  E841020000          CALL      USER32!SendDlgItemMessageA 

    SendDlgItemMessageÕâ¸öAPIµ÷ÓÃÁËËĴΣ¬À´ÎÒÃÇ¿´Ò»¿´Ëüµ½µ×ÓÐʲôÓã¿ 

LONG SendDlgItemMessage( 

    HWND hDlg,        // ¶Ô»°¿òµÄ¾ä±ú 
    int nIDDlgItem,    // ¿Ø¼þµÄIDºÅ 
    UINT Msg,        // ´«Ë͵ÄÏûÏ¢ 
    WPARAM wParam,    // µÚÒ»¸öÏûÏ¢²ÎÊý 
    LPARAM lParam     // µÚ¶þ¸öÏûÏ¢²ÎÊý 
  ); 
    ´Ó³ÌÐòÖÐÎÒÃÇ¿ÉÒÔÖªµÀµ±UINT Msg=E ʱ ÊÇÈ¡ÊäÈë×Ö·ûµÄ¸öÊý 
                µ±UINT Msg=D ʱ ÊÇÈ¡ÊäÈë×Ö·ûµÄÄÚÈÝ 
001B:00401137  A3AF214000          MOV      [004021AF],EAX 
                  ^^^^^^^^^^^^^^^^^^^^^^^^---->È¡ÊäÈëUSERµÄ¸öÊý 
001B:0040113C  83F800              CMP      EAX,00 
001B:0040113F  0F84D5000000        JZ        0040121A 
001B:00401145  83F808              CMP      EAX,08 
001B:00401148  0F8FCC000000        JG        0040121A 
                  ^^^^^^^^^^^^^^^^^^^^^^^----->¼ì²éÊäÈë¸öÊýÊÇ·ñ 
                                ´óÓÚ0СÓÚ8 
001B:0040114E  8BF0                MOV      ESI,EAX 
                  ^^^^^^^^^^^^^^^^^^^^^^^----->×¢ÒâÕâ¸ö 
001B:00401150  6A00                PUSH      00 
001B:00401152  6A00                PUSH      00 
001B:00401154  6A0E                PUSH      0E 
001B:00401156  6A04                PUSH      04 
001B:00401158  FF7508              PUSH      DWORD PTR [EBP+08] 
001B:0040115B  E818020000          CALL      USER32!SendDlgItemMessageA 
001B:00401160  83F800              CMP      EAX,00 
001B:00401163  0F84B1000000        JZ        0040121A 
001B:00401169  3BF0                CMP      ESI,EAX 
001B:0040116B  0F85A9000000        JNZ      0040121A 
                  ^^^^^^^^^^^^^^^^^^^^^^^------>±È½Ïuser/code 
                                 ÊäÈëµÄ¸öÊýÊÇ·ñÏàµÈ 
                                 ÏàµÈ¾Í¼ÌÐø     
001B:00401171  6860214000          PUSH      00402160 
001B:00401176  6A08                PUSH      08 
001B:00401178  6A0D                PUSH      0D 
001B:0040117A  6A03                PUSH      03 
001B:0040117C  FF7508              PUSH      DWORD PTR [EBP+08] 
001B:0040117F  E8F4010000          CALL      USER32!SendDlgItemMessageA 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->È¡µÄUSER ·ÅÈë402160     
001B:00401184  6879214000          PUSH      00402179 
001B:00401189  6A10                PUSH      10 
001B:0040118B  6A0D                PUSH      0D 
001B:0040118D  6A04                PUSH      04 
001B:0040118F  FF7508              PUSH      DWORD PTR [EBP+08] 
001B:00401192  E8E1010000          CALL      USER32!SendDlgItemMessageA 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->È¡µÄCODE ·ÅÈë402160 
001B:00401197  B9FFFFFFFF          MOV      ECX,FFFFFFFF 
001B:0040119C  41                  INC      ECX 
001B:0040119D  0FBE8160214000      MOVSX    EAX,BYTE PTR [ECX+00402160] 
001B:004011A4  83F800              CMP      EAX,00 
001B:004011A7  7432                JZ        004011DB 
001B:004011A9  BEFFFFFFFF          MOV      ESI,FFFFFFFF 
001B:004011AE  83F841              CMP      EAX,41 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->41=¡®A¡¯                  
001B:004011B1  7C67                JL        0040121A 
001B:004011B3  83F87A              CMP      EAX,7A 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->7A=¡®z¡¯ 
001B:004011B6  7762                JA        0040121A 
001B:004011B8  83F85A              CMP      EAX,5A 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->41=¡®Z¡¯ 
001B:004011BB  7C03                JL        004011C0 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->Õ⼸¾ä´úÂëÊÇÅÐ¶Ï 
                                USERÊÇ·ñÊäÈëÁË×Ö·û                     
001B:004011BD  83E820              SUB      EAX,20 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->È«²¿×ª»¯Îª´óд 
001B:004011C0  46                  INC      ESI 
001B:004011C1  0FBE9617204000      MOVSX    EDX,BYTE PTR [ESI+00402017] 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->ÔÚ402017±íÏà¶ÔÓ¦µÄ 
                                λÖà 
001B:004011C8  3BC2                CMP      EAX,EDX 
001B:004011CA  75F4                JNZ      004011C0 
                  ^^^^^^^^^^^^^^^^^^^^^^^^----->±íÖÐÕÒµ½ºóÔÚÈ¥ÁíÒ» 
                                40203C±íȥѰÕÒ¶ÔÓ¦ 
                                掙歜 
001B:004011CC  0FBE863C204000      MOVSX    EAX,BYTE PTR [ESI+0040203C] 
001B:004011D3  898194214000        MOV      [ECX+00402194],EAX 
001B:004011D9  EBC1                JMP      0040119C 
:d 402017 
0023:00402017 41 31 4C 53 4B 32 44 4A-46 34 48 47 50 33 51 57  A1LSK2DJF4HGP3QW 
0023:00402027 4F 35 45 49 52 36 55 54-59 5A 38 4D 58 4E 37 43  O5EIR6UTYZ8MXN7C 
0023:00402037 42 56 39 00                       BV9. 

:d 40203c 
0023:0040203C 53 55 37 43 53 4A 4B 46-30 39 4E 43 53 44 4F 39  SU7CSJKF09NCSDO9 
0023:0040204C 53 44 46 30 39 53 44 52-4C 56 4B 37 38 30 39 53  SDF09SDRLVK7809S 
0023:0040205C 34 4E 46 00                       4NF. 


001B:004011DB  FF35AF214000        PUSH      DWORD PTR [004021AF] 
001B:004011E1  6894214000          PUSH      00402194 
001B:004011E6  6879214000          PUSH      00402179 
001B:004011EB  E854000000          CALL      00401244 
                  ^^^^^^^^^^^^^^^^^^^^^^----->±È½Ï×Ó³ÌÐò 
                                  ת»»ºóµÄÖµÓëCODEÏà±È½Ï 

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 
±È½Ï³ÌÐò´úÂ룺£¨ËäÈ»¼òµ¥£¬µ«ÊÇÓЩ¶´Å¶£¡:) ºÇºÇ~~~ £© 
        µ±USERΪһ¸ö×ÖĸµÄʱºò£¬CODE¿ÉÒÔΪÈÎÒâ×Ö·û :) 
        ¿ÉÒÔÊÔһϠuser:a /code:= ÊÇ¿ÉÒԵģ¡£¡ 
        ÏëÒ»Ï룬¹Ø¼ü¾ÍÔÚÕâ¸öJCXZ      00401260µÄÅÐ¶Ï 
        ²»ÖªµÀÊÇ×÷Õß¹ÊÒâµÄ£¬»¹ÊÇBUG£¬×Ô¼ºÈ¥Ïë°É ºÇºÇ~~~~~~ 
:u 401244 L20 
001B:00401244  C8000000            ENTER    0000,00 
001B:00401248  B801000000          MOV      EAX,00000001 
001B:0040124D  8B7D08              MOV      EDI,[EBP+08] 
001B:00401250  8B750C              MOV      ESI,[EBP+0C] 
001B:00401253  8B4D10              MOV      ECX,[EBP+10] 
001B:00401256  F3A6                REPZ CMPSB 
001B:00401258  67E305              JCXZ      00401260 
001B:0040125B  B800000000          MOV      EAX,00000000 
001B:00401260  C9                  LEAVE 
001B:00401261  C20C00              RET      000C 
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 


001B:004011F0  83F801              CMP      EAX,01 
001B:004011F3  0F84DEFEFFFF        JZ        004010D7 
001B:004011F9  EB1F                JMP      0040121A 
001B:004011FB  837D1001            CMP      DWORD PTR [EBP+10],01 
001B:004011FF  0F8422FFFFFF        JZ        00401127 
001B:00401205  837D1002            CMP      DWORD PTR [EBP+10],02 
001B:00401209  752F                JNZ      0040123A 
001B:0040120B  E8B4000000          CALL      KERNEL32!ExitProcess 
001B:00401210  B801000000          MOV      EAX,00000001 
001B:00401215  E9FFFEFFFF          JMP      00401119 
001B:0040121A  6800200000          PUSH      00002000 
001B:0040121F  6801204000          PUSH      00402001 
001B:00401224  68AE204000          PUSH      004020AE 
001B:00401229  6A00                PUSH      00 
001B:0040122B  E836010000          CALL      USER32!MessageBoxA 
001B:00401230  B800000000          MOV      EAX,00000000 
001B:00401235  E9DFFEFFFF          JMP      00401119 
001B:0040123A  B800000000          MOV      EAX,00000000 
001B:0040123F  E9D5FEFFFF          JMP      00401119 

                    ʱ¼ä£º2000.10.19 20:99 

--------------------------------------------------------------------------------

,¡¾ÔÓÖ¾ÐÅÏä¡¿
Ͷ¸åÐÅÏ䣺discoveredit@china.com
´ðÒÉÐÅÏ䣺discoveranswer@china.com
°ßÖñÐÅÏ䣺programhunter@china.com