EPIG
̽Ë÷ÔÓÖ¾
MHJQ
֪ʶ¹²Ïí ×ÊÔ´¹²Ïí ×ÊÁϹ²Ïí
¡¾ÖÆ×÷³ÉÔ±¡¿³ÌʽÁÔÈË
¡¾·¢ÐÐʱ¼ä¡¿2000-8-26
¡¾ÆÚ¿¯ºÅÂë¡¿µÚ¾ÅÆÚ
¡¾ÍøÕ¾µØÖ·¡¿http://programhunter.go.163.com

¡¾±à¼­¼ÄÓï¡¿

    
    {~._.~} 
     ( Y )  
    ()~*~() 
    (_)-(_) 
ÿ´ó¼Ò²ÂÒ»²Â£¬½ñÌìÎÒÒªÏò´ó¼Ò½éÉÜʲôÄØ£¿½ñÌì¿ÉÊÇÏò´ó¼Ò½éÉܵĶ¼ÊÇËûÈ˵Ä×÷Æ·£¬ÕâÑùÓÐÀûÓÚÄãÃÇ¿ÉÒÔ´Ó²»Í¬µÄ·½Ãæѧϰ½âÃÜ֪ʶ¡£ÒòΪһ¸öÈËϲ»¶ÓÚʹÓÃÒ»¸ö»ò¼¸¸ö±È½Ï³£Óõķ½·¨£¬ËùÒÔ½ñÌìµÄÈýƪ×÷Æ·¶¼ÊÇÍøÓѵÄ×÷Æ·£¬¾ßÌå˵ÄѶÈÂ𣬶¼²»³¬¹ýÖм¶Ë®Æ½£¬½ñÌìµÄÔÓÖ¾·Ç³£ÊʺϳõѧÕß¡£
¡¾Ä¿ ÿÿ ¼¡¿
ÿÿÿÿ&ÆƽâÐĵÃ
1¡­¡­Green Tea 2.60×¢²áÂëËã·¨ wind
2¡­¡­Winamp 2.04 Peter
3¡­¡­teleport pro tmÖÐÎÄ°æ °æ±¾1.29 Build 431 Peter
  4¡­¡­Cracking WinUGCS v3.0  
ÿÿÿÿ%³õѧÌìµØ
ÿÿÿÿOÎÊÌâ´ðÒÉ
ÿÿÿÿ4ÍøÕ¾½éÉÜ
ÿÿÿÿ,ÔÓÖ¾ÐÅÏä
&¡¾ÆƽâÐĵá¿
Green Tea 2.60×¢²áÂëËã·¨
ÎÄÕÂ×÷Õߣºwind[CCG]
×÷ÕßÖ÷Ò³£ºhttp://biggow.8u8.com
×÷ÕßE-mail:biggow@eastday.com
»¶Ó­×ªÔØ£¬µ«Çë±£³ÖÔ­ÎÄÍêÕûÐÔ£¡
¿´Íê´ËÎÄ£¬Ï£Íû´ó¼Ò¿ÉÒÔд³ö×¢²á»ú£¬Ó¦¸Ã²»ÊǺÜÄÑ£¡

:0046A029 E8EE9BF9FF              call 00403C1C
:0046A02E 8BD0                    mov edx, eax
:0046A030 85D2                    test edx, edx
:0046A032 7E14                    jle 0046A048
:0046A034 B801000000              mov eax, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046A046(C)
|
:0046A039 8B4DF0                  mov ecx, dword ptr [ebp-10]
:0046A03C 0FB64C01FF              movzx ecx, byte ptr [ecx+eax-01]
:0046A041 0FAFD9                  imul ebx, ecx
:0046A044 40                      inc eax
:0046A045 4A                      dec edx
:0046A046 75F1                    jne 0046A039
------------------------->ÉÏÃæÕâ¶Î³ÌÐò£¬Êǽ«ÄãÊäÈëµÄ×¢²áÃû£¬°Ñ×¢²áÃûÿ¸ö×Ö·ûµÄAsciiÂëËã³ö
È»ºó£¬½«Ã¿¸ö×Ö·ûµÄAsciiÂëÏà³Ë£¬µÃµ½Ò»¸ö»ý£¨ÔÚÕâÀï¸øÕâ¸ö³Ë»ýÈ¡Ò»¸ö±äÁ¿ÃûS)

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046A032(C)
|
:0046A048 83C364                  add ebx, 00000064------->¾ÍÊǰѳ˻ýS¼ÓÉÏ64,
                                                          ¼ÙÉèA=S+64£¨ÕâÀﶼÊÇÊ®Áù½øÖÆÊý£©
:0046A04B 8BC3                    mov eax, ebx-------->°ÑËã³öµÄAÒÆÈë¼Ä´æÆ÷eaxÖУ¡
:0046A04D 99                      cdq-------->ÅжÏeaxÖеÄÖµÊÇ·ñ´óÓÚ80000000,Èç¹û´óÓÚ80000000ÄÇô
                                                 edx=ffffffff,·´Ö®£¬edx=00000000
:0046A04E 33C2                    xor eax, edx------>°ÑeaxºÍedx×öÒì»ò²Ù×÷£¬Ò²¾ÍÊÇ°ÑA±äÁ¿µÄÖµºÍ
                                                     ffffffff»ò00000000×÷Òì»ò²Ù×÷
                                                     Èç¹ûedx=00000000µÄ»°,Òì»òºóeaxµÄÖµ±£³Ö
                                                     ²»±ä!
:0046A050 2BC2                    sub eax, edx------->eax=eax-edx,Ò²¾ÍÊÇ°ÑÒì»ò³öÀ´µÄ
                                                      ֵȥ¼õFFFFFFFF»ò00000000
                                                      ¹ûedx=00000000µÄ»°,eaxµÄÖµ±£³Ö²»±ä 
:0046A052 8BF8                    mov edi, eax
:0046A054 8BC7                    mov eax, edi
:0046A056 8D951CFEFFFF            lea edx, dword ptr [ebp+FFFFFE1C]
:0046A05C E813D0F9FF              call 00407074
:0046A061 8B951CFEFFFF            mov edx, dword ptr [ebp+FFFFFE1C]
:0046A067 8B86F8010000            mov eax, dword ptr [esi+000001F8]

Ëã·¨×ܽ᣺Õâ¸öÈí¼þµÄ×¢²á²¿·Ö¾ÍÊÇ°ÑÄãÊäÈëµÄ×¢²áÃûµÄÿ¸ö×Ö·û¶¼×ª³ÉÏàÓ¦µÄAsciiÂ룡
È»ºó£¬°Ñÿ¸ö×Ö·ûµÄAsciiÂëÏà³Ë£¬µÃµ½Õâ¸ö³Ë»ýS,ÔÙ°ÑËü¼ÓÉÏ64£¬È»ºó°ÑÕâ¸öÖµ·Åµ½eaxÖУ¬È»ºó
ÓÃcdqÕâ¸öÖ¸ÁîÀ´ÅжÏeaxµÄÖµÊÇ·ñ´óÓÚ80000000,Èç¹û´óÓÚ£¬ÄÇôedx=ffffffff£¬·ñÔò£¬
edx=00000000
È»ºó£¬°ÑeaxÒ²¾ÍÊÇAºÍ00000000»òffffffff×öÒì»ò£¬°ÑÒì»ò³öÀ´µÄÖµ·Åµ½eaxÀïÈ¥£¡
ÔÙÓÃeaxµÄֵȥ¼õÈ¥ÁËedxÒ²¾ÍÊÇ00000000»òffffffff!

Ö´ÐÐcdqÕâ¸öÖ¸ÁîµÄʱºò£¬eaxСÓÚ80000000£¬ÄÇôedx=00000000,ÄÇôÕâ¸öAת»»³ÉÊ®½øÖÆ
Êýºó¾ÍÊÇ×¢²áÂ룡

ΪÁË˵Ã÷Çå³þ£¬¾Í¾Ù¸ö¼òµ¥µÄÀý×Ó: 
ÎÒÒªµÄ×¢²áÃû£ºwind
Ҫת»»µÄ×Ö·û£º   w  i  n   d
       Ascii£º  77 69  6E  64
chengji=77*69*6E*64;ÓüÆËãÆ÷¼ÆË㣬µÃµ½chengji=8313E88
zonghe=chengji+64;¼ÆËãºóµÃµ½zonghe=8313EEC
ÓÉÓÚ8313EECСÓÚ80000000£¬ËùÒÔ£¬edx=00000000
ÓÉÓÚºÍ00000000Òì»ò(ºóÃæµÄsub eax,edx,Ò»¸öÊý¼õ0µ±È»²»±äÀ²!)£¬ËùÒÔ,zonghe²»±ä£¬ÈÔÈ»µÈÓÚ8313EEC
½«8313EECת»»³ÉÊ®½øÖÆÊý¾ÍÊÇ×¢²áÂë
8313EECת³ÉÊ®½øÖÆΪ137445100

×îºóÕûÀí³ö
×¢²áÃû:wind   ×¢²áÂ룺137445100

Èç¹ûzongheÕâ¸ö±äÁ¿´óÓÚ80000000µÄ»°£¬edx=ffffffff,¾ÍÊÇ˵Òì»òºóµÄÖµ»á¸Ä±ä£¡
»¹ÓÐ×îºóÒª¼ÓÉÏ1(ÒòΪsub eax,edxÂë!)


xor(Òì»ò):Ò²¾ÍÊDZØÐëÁ½¸öÏà·´µÄÊý²Å»áµÃ1,Ö»ÓÐ0ºÍ1³öÏÖµÄʱºò£¬½á¹û²Å»áΪ1£¬Èç¹ûÊÇ0ºÍ0»òÕß1ºÍ1
Õâ¸ö½á¹ûÖ»ÄÜÊÇ0!


ºÜ¾ÃûÓÐ䶫Î÷ÁË£¬Ï£Íû´ó¼Ò¶ÔÎÒ´Ö²ÚµÄÎıʱíʾÁ½⣬ҲϣÍû´ó¼ÒÄܹ»Ã÷°×ÎÒµÄÒâ˼!
Èç¹ûÄã¶ÁÁËÕâƪÎÄÕÂÖ®ºó£¬Ð´³öÁË×¢²á»ú£¬±ðÍüÁË£¬ÌáÒ»ÏÂÎÒµÄÃû×Ö:wind[CCG]
ÒÔ¼°ÎÒµÄÍøÕ¾:biggow.8u8.com!Ðû´«Ò»ÏÂ!

                                                          wind
                                                   China Cracking Group
                                                       2000.7.16.
·µ»Ø
Winamp 2.04
Æô¶¯winamp.exe
1. °Ñ¿ª¹ØÓÚ¡±wiamp¡±,Ñ¡Shareware.
2. °´ Enter Registration Info
3. Name: Peter Reg#:78787878
4. Ctrl+N
5. bpx getdlgitemtexta
6. °´ x ·µ»Ø ÔÙÊäÈëÒ»¸öÊýѧ(ÎÒÓá±9¡±)
7. ÓÖ±»À¹×è,µ½Ò»¸ö¡±User32!Getdlgitemtexta
8. F10,22´Î
9. Äã»á¿´¼û 0167:0041EF81 PUSH EAX
10. ÎÒÓà d eax Ò»¿´ÓÐ PeterÎÒ×ÖÑÛ£¬ÎҾͶ¨±È½ÏµØ·½Ò»¶¨ÔÚ²»Ô¶µÄµØ·½¡£
11. ±¾ÈË»ã±à²»ºÃ£¬Ö»ÊÇÖªµÀPush eax¡£´ó¸ÅÊÇÊäÈë×Ö·ûµ½eaxÖС£ÒªÊäÈë×Ö·û²»
¾ÍÊÇÒªÓõÄÃû×Ö£¬dÁËһϹûÈ»ÊÇ¡£
12. ÔÙÍùÏ¿´:
0167:0041EF82  CALL  0042218 (Ò²ÐíÊDZȱȽϵĵط½)
0167:0041EF87  ADD   ESP,BYTE+04
0167:0041EF8A CMP EAX,ESI
0167:0041EF8C JNZ 0041EF97
13. ÏëһϸղÅÎÒÆƽâwinamp skin maker v1.2ʱ£¬²»ÓÃÊÇÓÃSun Bird·­ÒëÁËv1.05×ÊÁÏÖÐ
14. ²»ÊÇÓС±CMP EAX,ESI¡± ²»ÊÇÓÃd¶øÓã¿
15. ÊÔÒ»ÊÔ£º
16. ? EAX
17. DEC=67972642(»á²»»áÊÇ×¢²áÂ룿)
18. HEX=40d2e22
19. ? EDI
20. DEC=787878789(²»ÊÇÎÒ¸Õ²ÅÓõļÙÂ룿)
21. HEX=2ef61385
22. CMP EAX,ESI(²»¾ÍÊÇÁ½¸ö¼Ç´æÆ÷±È½Ï£¿Òª±È½Ï¾ÍÒ»¶¨ÒªÓÐ×¢²áÂëÂð£¿)
23. ºÃÊÔһϣ¬¹ûÈ»ÊÇ¡£Yeah!
24. ÎÒÔÙÊÔһϽøÈë0167:0041EF82  CALL  0042218 (Ò²ÐíÊDZȱȽϵĵط½)
25. ¿ÉÄܱ¾È˼¼Êõ²»ÐУ¬Ö»ÄÜ°××÷¹¤¡£
Õâ²ÅÊDZ¾ÈË×Ô¼ºÆƽâµÄµÚÒ»¸öÈí¼þ£¬¶àлÎÒµÄʦ¸µºÍSun Bird´ó¸ç°ïÖú£¡
ÎÒÊÇÓÃÊÖ´òµÄ£¬0167:0041EF82  CALL  0042218
                 ¡­¡­¡­.
                  0167:0041EF8C JNZ 0041EF97
ÓÃtrw2000 or soft-ice,Äܲ»ÄÜcopy³öÀ´ºÍץͼ£¿
          
·µ»Ø
teleport pro tmÖÐÎÄ°æ °æ±¾1.29 Build 431
Name: Peter
com:home
sn: 89898989
1. ÏÂ bpx getwindowtexta
2.  F12  4ÏÂ
3.  F10  24ÏÂ
À´µ½ÕâÀï:
0167:00421951 EB4E             JMP      SHORT 004219A1
0167:00421953 FFB7D5000000     PUSH     DWORD [EDI+D5]
0167:00421959 E829090000       CALL     00422287 (Õâ¾ÍÊDZȽϵĵط½)
0167:0042195E 3945EC           CMP      [EBP-14],EAX(ÕâÊǾÍÊÇ×¢²áÂë±È½Ï) 
0167:00421961 59               POP      ECX
0167:00421962 0F85E4000000     JNZ      NEAR 00421A4C
0167:00421968 8D4DF0           LEA      ECX,[EBP-10]
0167:0042196B E8CFE50100       CALL     0043FF3F
0167:00421970 68410C0000       PUSH     DWORD 0C41
0167:00421975 8D4DF0           LEA      ECX,[EBP-10]
0167:00421978 C745FC02000000   MOV      DWORD [EBP-04],02
0167:0042197F E84FEC0100       CALL     004405D3
0167:00421984 53               PUSH     EBX
0167:00421985 53               PUSH     EBX
0167:00421986 FF75F0           PUSH     DWORD [EBP-10]
0167:00421989 C745FC03000000   MOV      DWORD [EBP-04],03
0167:00421990 E81B5D0200       CALL     004476B0
0167:00421995 834DFCFF         OR       DWORD [EBP-04],BYTE -01
0167:00421999 8D4DF0           LEA      ECX,[EBP-10]
0167:0042199C E8E9E60100       CALL     0044008A
0167:004219A1 A144BD4700       MOV      EAX,[0047BD44]
0167:004219A6 8898AC020000     MOV      [EAX+02AC],BL
0167:004219AC A144BD4700       MOV      EAX,[0047BD44]
0167:004219B1 8898AD020000     MOV      [EAX+02AD],BL
0167:004219B7 A140BD4700       MOV      EAX,[0047BD40]
0167:004219BC 3BC3             CMP      EAX,EBX
0167:004219BE 7406             JZ       004219C6
0167:004219C0 88985A0F0000     MOV      [EAX+0F5A],BL
0167:004219C6 FF75EC           PUSH     DWORD [EBP-14]
0167:004219C9 8B0D44BD4700     MOV      ECX,[0047BD44]
0167:004219CF 6834584700       PUSH     DWORD 00475834
0167:004219D4 56               PUSH     ESI
0167:004219D5 E8485E0200       CALL     00447822
0167:004219DA FFB7D5000000     PUSH     DWORD [EDI+D5]
0167:004219E0 8B0D44BD4700     MOV      ECX,[0047BD44]
0167:004219E6 8D9FD5000000     LEA      EBX,[EDI+D5]
0167:004219EC 6838574700       PUSH     DWORD 00475738
0167:004219F1 56               PUSH     ESI
0167:004219F2 E8A05E0200       CALL     00447897
0167:004219F7 FFB7D9000000     PUSH     DWORD [EDI+D9]
0167:004219FD 8B0D44BD4700     MOV      ECX,[0047BD44]
0167:00421A03 6830574700       PUSH     DWORD 00475730
0167:00421A08 56               PUSH     ESI
0167:00421A09 E8895E0200       CALL     00447897
0167:00421A0E A144BD4700       MOV      EAX,[0047BD44]
0167:00421A13 53               PUSH     EBX
0167:00421A14 8D88CE020000     LEA      ECX,[EAX+02CE]
0167:00421A1A E864E70100       CALL     00440183
0167:00421A1F 8D87D9000000     LEA      EAX,[EDI+D9]
0167:00421A25 50               PUSH     EAX
0167:00421A26 A144BD4700       MOV      EAX,[0047BD44]
0167:00421A2B 8D88D2020000     LEA      ECX,[EAX+02D2]
0167:00421A31 E84DE70100       CALL     00440183
0167:00421A36 8BCF             MOV      ECX,EDI
0167:00421A38 E85BA90100       CALL     0043C398
0167:00421A3D 8B4DF4           MOV      ECX,[EBP-0C]
0167:00421A40 5F               POP      EDI
0167:00421A41 5E               POP      ESI
0167:00421A42 64890D00000000   MOV      [FS:00],ECX
0167:00421A49 5B               POP      EBX
0167:00421A4A C9               LEAVE   
0167:00421A4B C3               RET     
0167:00421A4C 8BBFD5000000     MOV      EDI,[EDI+D5]

0167:0042195E 3945EC           CMP      [EBP-14],EAX
µ±¹âÌõ×ßµ½ÕâÀï,¾ÍÓÐ
ss:[6FF480]=055BBFED
ÎÒ²»ÊǺܻá¼ÆË㣬²»¹ýÎÒÊÔµØÊ®½øÓëÊ®Áù½øÖÆת»»Ì«Âé·³¡£
ÓÃwindowsµÄ¼ÆË㣬Æƽâ½âʱ²»·½±ã¡£
trw2000,soft-ice×Ô´ø¼ÆËãÆ÷¶øÇұȽÏwindows¸ü׼ȷ¡£
¾ÍÒԸղŵÄ"055bbfed" Ö»ÒªÊäÈë ? 55bbfed
                  Ò»»á¶ù¾Í³öÏÔ(Ê®½øÖÆ)  Dec=89898989(Õâ¾ÍÊÇÎÒÓõļÙSn)
                              (Ê®Áù½øÖÆ)  Hex=055bbfed
²»ÓÃ˵ÕæµÄµ±ÔÚ"EAX"£¬? EAX £¨Í¬ÉÏÃæµÄ£©
CMP      [EBP-14],EAX ÓÐÈË¿ÉÄÜÎʲ»ÊÇ? [ebp-14]²Å¶ÔÂð£¿
ss:[6FF480]=055BBFEDÎÒºÃÏñÔÚ»ã±à¿´£¬ÕâÊÇÒ»µÈʽ¡££¨Èç¹ûÓÐÇëÖ¸³ö£¿£©
¾ÍÊÇ[ebp-14]=ss:[6ff480]=055bbfed
²»¾ÍÊÇͬʮ½øÓëÊ®Áù½øÖÆת»»²î²»¶à£¿
Õâ¸öÈí¼þ£¬ÎҺܿì¾ÍÆƽâÍê¹ýÊÇÎÒÆƽâ¹ý³ÌÖÐ×î¿ìµÄ·½·¨¡£
ÎÒ¿ªÊ¼²»ÊÇÏë×Ô¼ºÆƽ⣬ÒòΪºÜ¾ÍÓÐÈËÆƽâÁËÎÒÒ²ÓÐÕâ¸ö½Ì³Ì¡£
½Ì³ÌÖÐÊÇÓÃbpx hmemcpy,ÎÒÎÞÖÐÏëÊÔÒ»ÏÂbpx getwindowtexta¡£
½á¹ûÄÜÖжϣ¬²»¾Ã¾ÍCrack it! 
×îºó±¾°æ²»Í¬£¬½Ì³ÌµÄºËÐÄÈ«²¿ÁË¡£Ö»ºÃ×Ô¼ºÒ²Ð´Ò»Ï¹ý³Ì¡£
½Ì³ÌµÄ·½·¨Ò²Ðв»¹ý£¬±È½ÏÂé·³¡£
ÎÒÓÃÐí¶à·½·¨£¬Ò»¿ªÊ¼ÊÇÀûÓÃ×Ô¼ºÒ»µã»ã±à֪ʶ·ÖÎöÆƽâ³öÀ´¡£
¾ÍÊÇÈÃJNZ,JMP....µÈÌøÔ¾µ½µÄµØ·½ÔÙ·ÖÎö£¬×îºóÀ´
0167:0042195E 3945EC           CMP      [EBP-14],EAX
ÕâÊǾÍÊÇ×¢²áÂë±È½Ï£¨·ÖÎö³öÀ´£©
¿ÉÒÔ˵ÊÇÎұȽÏ×î¿ìµÄ·½·¨¡£
×÷Õß:Peter
·µ»Ø
			--- Cracking WinUGCS v3.0 ---

Info:
*****
Wow, here I'm again, with my second tut!!! Yahooooo! I will try to make
this tut as easy as I can get it. In this tut I'll show U how to use
SoftIce when cracking! It's a great tool!! I assume that U have
installed SoftIce and its ready to work! PS! When I write something
like this 'bpx getdlgitemtexta' I meen it without the 's!!
WinUGCS v3.0 should be in this zip file, but if it is NOT, get it here:
Www.Heat-On.Com

Tools Needed:
*************
Hacker's View 6.02 (Http://DiABLO.Freehosting.Net/Dl/Hview602.zip)
SoftIce v3.24      (Http://Www.Crosswinds.Net/Oslo/~DaDiABLO/Sice324.zip)

The Cracking Begins:
********************
First install WinUGCS, now lets examine it... when U start it, a dialog
box pops up, asking for a reg code, nothing more... K, lets start!!
Enter 656656 as the code and press Ctrl+D to enter SoftIce. Type in
'bpx getdlgitemtexta'. Now enter 'x' to return to WinUGCS.
Are U with me now? Good, press the OK button. SoftIce pops! Press F11.
Now U see this:
--------------- 
:00401C13 FF15C0634100            Call dword ptr [004163C0]
:00401C19 68F0144100              push 004114F0   <-- U ARE HERE NOW!!!
:00401C1E E80DC20000              call 0040DE30
:00401C23 83C404                  add esp, 00000004
:00401C26 803DF614410000          cmp byte ptr [004114F6], 00
:00401C2D 7405                    je 00401C34
:00401C2F BF01000000              mov edi, 00000001             
:00401C34 803DF114410053          cmp byte ptr [004114F1], 53
:00401C3B 740E                    je 00401C4B
:00401C3D 803DF114410035          cmp byte ptr [004114F1], 35
:00401C44 7405                    je 00401C4B
:00401C46 BF01000000              mov edi, 00000001
:00401C4B 803DF314410031          cmp byte ptr [004114F3], 31
:00401C52 7405                    je 00401C59
:00401C54 BF01000000              mov edi, 00000001
:00401C59 803DF014410043          cmp byte ptr [004114F0], 43
:00401C60 7405                    je 00401C67
:00401C62 BF01000000              mov edi, 00000001
:00401C67 803DF214410032          cmp byte ptr [004114F2], 32
:00401C6E 7405                    je 00401C75
:00401C70 BF01000000              mov edi, 00000001
:00401C75 803DF414410039          cmp byte ptr [004114F4], 39
:00401C7C 7405                    je 00401C83
:00401C7E BF01000000              mov edi, 00000001
:00401C83 6A00                    push 00000000
:00401C85 85FF                    test edi, edi
:00401C87 7419                    je 00401CA2
:00401C89 681CF34000              push 0040F31C
:00401C8E 6874F34000              push 0040F374
:00401C93 6A00                    push 00000000
:00401C95 FF15E8634100            Call dword ptr [004163E8]
:00401C9B 33C0                    xor eax, eax
:00401C9D 5F                      pop edi
:00401C9E 5E                      pop esi
:00401C9F C21000                  ret 0010
---------------
Alot of code there, take it easy.... don't panic... I'll take it
slowly! Now if U enter 'd 004114F0' U see the code we entered in the
data window. Why 004114F0? Because there we are now it says
'PUSH 004114F0'! Press F10 until U come to this line: (00401C2D)

:00401C26 803DF614410000          cmp byte ptr [004114F6], 00
:00401C2D 7405                    je 00401C34

This is the first jump. If the code U entered is longer than 6 letters,
then it DOESN'T JUMP, therefore it must be 6 or less. How did I found
out that? K, remember that your code was at 004114F0? And at the line

:00401C26 803DF614410000          cmp byte ptr [004114F6], 00

it checks if 004114F6 is 0. Get it? Your code starts at 004114F0.
so here I'll show U:
--------------------

004114F0 = 6
004114F1 = 5
004114F2 = 6
004114F3 = 6
004114F4 = 5
004114F5 = 6

--------------------
Now 004114F6 is 0. Now it will jump.If u had typed one letter more,
ex: 7,it would look like this:
------------------------------

004114F0 = 6
004114F1 = 5
004114F2 = 6
004114F3 = 6
004114F4 = 5
004114F5 = 6
004114F6 = 7

-------------------------------------------------------------
Then 004114F6 is 7!!! Now it will NOT jump. Now U get it don't U!
So just have 6 letters! K, lets continue! Press F10 until this
line: (00401C3B)
----------------

:00401C34 803DF114410053          cmp byte ptr [004114F1], 53
:00401C3B 740E                    je 00401C4B

It checks if 004114F1 is the hex value 53 and what that is, u can find
out by entering '? 53' in SoftIce. Its S. And as u can see some lines
ago, 004114F1 = 5. It checks if 5 is S!!! Now we're getting somewhere.
So, now press 'x' and type in: 6S6656 as code. Press Ctrl+D, press F10
until this line: (00401C52)
---------------------------

:00401C4B 803DF314410031          cmp byte ptr [004114F3], 31
:00401C52 7405                    je 00401C59

Almost the same here, checks if 004114F3 is hex value 31. 004114F3 is
now 6 and hex value 31 is 1! So, now press 'x' and type in: 6S6156 as
code. Press Ctrl+D, press F10 until this line: (00401C60)
---------------------------------------------------------
 
:00401C59 803DF014410043          cmp byte ptr [004114F0], 43
:00401C60 7405                    je 00401C67

Almost the same here, checks if 004114F0 is hex value 43. 004114F0 is
now 6 and hex value 43 is C! So, now press 'x' and type in: CS6156 as
code. Press Ctrl+D, press F10 until this line: (00401C6E)
---------------------------------------------------------

:00401C67 803DF214410032          cmp byte ptr [004114F2], 32
:00401C6E 7405                    je 00401C75

Almost the same here, checks if 004114F2 is hex value 32. 004114F2 is
now 6 and hex value 32 is 2! So, now press 'x' and type in: CS2156 as
code. Now we're almost done! Press Ctrl+D, press F10 until this
line: (00401C6E)
----------------

:00401C75 803DF414410039          cmp byte ptr [004114F4], 39
:00401C7C 7405                    je 00401C83

Almost the same here, checks if 004114F4 is hex value 39. 004114F4 is
now 5 and hex value 39 is 9! So, now press 'x' and type in: CS2196 as
code. It worked!!! Congratulations!!! U cracked WinUGCS v3.0!!!

But hey, it didn't check the last letter, 6? This letter can be
whatever U want! It can also be forgotten, just enter CS219 as code,
not enter the last 6.

Ending Info:
************
This was a fine easy protection! I hope U didn't get lost back there!
Just try, and try, till U get it right!
You can meet me on EFNet in #Cracking4Newbies as Da_DiABLO and if you
learned something from this tutorial, please tell me! And expect some
more tutorials soon...
Also visit my site: Http://DiABLO.Freehosting.Net/Index.htm
Cya!

Greeting:
*********
Go to everybody in ORiON & Cracking4Newbies!! And also every other
cracker that reads this tut!!!
·µ»Ø
%¡¾³õѧÌìµØ¡¿
                       ½âÃ̳ܽÌÆß
     ÉϽڿÎÓÉÓÚÎÒÔÚÐÞ¸Ä×Ô¼º¼ÒµÄ·¿×Ó£¬ËùÒÔûÓÐʱ¼ä¸ø´ó¼ÒÀ´ÉϿΣ¬Ï£Íû´ó¼Ò¶¼Á¹½â¡£½ñ
ÌìÎÒÒªÏò´ó¼Ò½éÉÜʲôÄØ£¿ÎÒÏë¾ÍÏȲ»½éÉܾßÌåµÄ×·×Ù¹ý³ÌÁË¡£ÒòΪÕâ¸öÒÔºóÔÙ˵£¬ÎÒÏë
¶ÔÓÚ³õѧÕßÀ´Ëµ£¬ÏÖÔڹؼüµÄÊÇÈçºÎÆƽâÈí¼þ£¬Õâ¸ö¾ÍÊǾ­ÑéµÄ»ýÀÛÁË¡£µ«ÊÇÎÒÏëͨ¹ýÎÒµÄ
¾­ÑéÀ´Ïò´ó¼Ò½éÉÜһϽâÃܵķ½·¨¡£ÕâÑùÏ£ÍûÄãÃÇÄܹ»¸ü¿ìµÄ½øÈë½ÇÉ«ÖУ¬Õâ¸öÒ²¿ÉÊÇÎÒÒ»
ÄêÀ´µÄÐÄѪ°¡¡£
    ÒòΪÈç¹ûÄãÒªÏëÆƽâÈí¼þ£¬ÄÇôÄãÒÀ¾ÝʲôÀ´¾Í½«È˼ÒÖÆ×÷µÄÈí¼þÆƽâ³öÀ´ÁË¡£µ±È»Õâ
Àï¸ø´ó¼Ò˵һÏ£¨Õæ¶Ô³õѧÕߵģ©£¬Äã¾ÍÒªÏë°ì·¨¿´µ½³ÌÐòµÄ×ßÏò£¬ÕâÑùÄã¾Í¿ÉÒÔÖªµÀ³ÌÐò
ÊÇÈçºÎ¼ÆËãºÍÔËÐеģ¬ÕâÑùÄã¾Í¿ÉÒÔÆƽâÈí¼þÁË¡£ÄÇôÎÒÃÇÈçºÎ×·×ÙÄØ£¿
   ½ñÌìÎÒ¾ÍÏò´ó¼Ò½éÉܼ¸ÖֱȽϳ£ÓõÄ×·×Ù·½·¨£¬ÏàÐÅ»á¶Ô´ó¼ÒÓÐÒ»¶¨µÄ°ïÖú¡£


1 ÓÐ×¢²áÂëÊäÈëÄܹ»±»Ö±½ÓÀ¹ÏÂÀ´
  ÕâÀïÊÇÖ¸ÓÐ×¢²áÂëÊäÈëµÄµØ·½£¬¶ø¿ÉÒÔʹÓÃÏàÓ¦µÄÀ¹½ØÄܹ»À¹Ïµġ£±ÈÈ磺ÊäÈënameºÍRN
ºó£¬¿ÉÒÔʹÓà bpx hmemcpy  bpx getdlgitemtextµÈ·½·¨À´À¹ÏÂÀ´£¬Èç¹ûÕâÑùµÄÀ¹ÏÂÀ´µÄ»°
£¬¹Ø¼üÊÇÕÒµ½³ö´íµÄµØ·½£¬ÕâÑù¾Í¿ÉÒÔ²éÕÒ¿ÉÒԱܿª³ö´íµÄµØ·½£¬Í¨³£Ò²¾Í¿ÉÒÔÆƽâËüÁË¡£


2 ÓÐ×¢²áÂëÊäÈë²»Äܹ»±»Ö±½ÓÀ¹ÏÂÀ´
  Èç¹û²»Äܹ»±»À¹ÏÂÀ´£¬ÄÇô¿´Ò»¿´³ÌÐòÓÐÎÞÌáʾ´°¿Ú£¬Èç¹ûÓÐÊÇ×îºÃµÄ£¬Äã¿ÉÒÔʹÓÃbpx 
lockmytask ͨ³£Õâ¾Í¿ÉÒÔÀ¹ÏÂÀ´ÁËÈç¹ûûÓÐÌáʾ´°¿ÚµÄ£¬ÄÇôÔÚµã»÷×¢²áÇ°ÏÂÕâ¸öÃüÁî bp
x sendmessage ͨ³£¿ÉÒÔ±»À¹ÏÂÀ´µÄ£¬»òÕßʹÓÿª´°º¯ÊýÈ磺bpx updatewindowÕâÑù³ÌÐòÔÚ
ÕÒµ½´°¿ÚµÄʱºò¾Í¿ÉÒÔ±»À¹ÏÂÀ´ÁË¡£


3 ÎÞ×¢²áÂëÊäÈëtime bombģʽ
  ÕâÖÖÇé¿öͨ³£Èí¼þʹÓõÄÊÇkeyÎļþ±£»¤µÄģʽ»òÕ߸ù±¾¾ÍÊÇÊÔÓð棬ËüÃǵÄÆƽâͨ³£ÊÇ
Æƽâµôtime bomb¾Í¿ÉÒÔÁË¡£¶ÔÓÚ¸ßÊÖÀ´Ëµ£¬¿ÉÒÔÆƽâ³ökeyÎļþÖеÄÄÚÈÝÕâÑù¾ÍÄܹ»µÃµ½Íê
ȫע²á°æÁË£¬µ«ÊǶÔÓÚ³õѧÕßÀ´Ëµ£¬ÕâÓеãÄѶȡ£ÄÇôÈçºÎÆƽâtime bombÄØ£¿¿ÉÒÔÏÂÕâÑù
µÄÃüÁî bpx getsystemtime »òbpx settime bpx killtimeµÈÓëʱ¼äÏà¹ØµÄʱ¼äº¯Êý¡£
  ÕâÖÖÇé¿ö±È½Ï¶à£¬»¹¿ÉÒÔʹÓùýÆÚ×¢²á·¨£¬°²×°ºóµ÷ºóÈÕÆÚ£¬½«Èí¼þ¹ýÆÚ£¬ÕâÑù¾Í¿ÉÒÔʹ
ÓÃTRW»òSIÀ´µ÷Èë³ÌÐò´Ó¿ªÊ¼×·×ÙËü¡£²éÕÒµ½³ö´íµØ·½£¬ÔÙÕÒÌøÔ¾ÕâÀïµÄµØ·½¾Í¿ÉÒÔÁË¡£


4 ÎÞ×¢²áÂëÊäÈëkeyģʽ
¶ÔÓÚÆƽâÕâÖÖÇé¿ö£¬Äã¿ÉÒÔ½èÖú¹¤¾ßÒ²¿ÉÒÔʹÓÃÖмÌÀ´Æƽ⣬Èç¹û½èÖú¹¤¾ßµÄ»°£¬Äã¿ÉÒÔʹ
ÓÃfimemonÕâ¸öÎļþ¼àÊÓÆ÷£¬Ëü¿ÉÒÔ¿´µ½³ÌÐò¶¼¶ÔʲôÎļþ½øÐжÁдÁË£¬Èç¹û²»Ê¹Óù¤¾ßÄã¿É
ÒÔÏÂbpx _lread bpx readfile bpx writefileµÈÃüÁÕâÑùÄã¾Í¿ÉÒÔ×·×Ùµ½ËüÃÇÁË¡£


5 ÎÞ×¢²áÂëÊäÈë²¢¼Ó¿ÇÁË¡£
  Õâ¸öÆƽâ¾Í±È½ÏÄÑÁË£¬ÒòΪÄãÎÞ·¨Í¨¹ýÐ޸ijÌÐòÀ´ÆƽâÈí¼þ£¬ÄÇôÆƽâËüÓÃʲô°ì·¨ÄØ£¿
ÕâÀï½éÉÜÁ½¸ö·½·¨£º
  £¨1£© ÔÚ°²×°Èí¼þʱµ÷ÓÃfilemonºÍregsapÈí¼þ£¬¼àÊÓ³ÌÐò½«Ê²Ã´¶«Î÷дµ½ÄãµÄÓ²ÅÌÉÏ£¬
ÕâÑù¾Í¿ÉÒÔÔÚ¹ýÆÚʱ£¬½«ËüÃÇͨͨɾ³ýµô£¬Èí¼þ¾ÍÈÏΪËüÊǸոհ²×°µÄ£¬ÓÖ¿ÉÒÔÔÙÔËÐÐÁË¡£
   £¨2£©Ê¹ÓÃÊÖ¶¯»ò×Ô¶¯ÍÑ¿Ç£¬Èç¹ûÊÇÊÖ¶¯ÍѿǾÍÒªÇóÄã¶Ô¿Ç±È½ÏÁ˽âÁË¡£Õâ¸ö¾ÍÒª´ó¼ÒÀ´
ѧϰÁË¡£ÈçºÎÍÑ¿Ç£¬Õâ¸öÒ²ÓÐÒ»¶¨µÄ·½·¨£¬ÒÔºóÔÙ½éÉÜ°É¡£
       ¿ÉÒÔʹÓÃprodumpÀ´ÍÑ¿Ç£¬ÔÚÍÑ¿Ç֮ǰʹÓÃÕì¿ÇÈí¼þÏȲéÒ»ÏÂÈí¼þʹÓÃʲôÀ´¼Ó¿ÇµÄ
Õâ¸öºÜÖØÒª£¬Í¨³£Äܹ»¾ö¶¨ÄãÊÇ·ñ¿ÉÒÔÍѿdzɹ¦µÄ¡£


ºÃÁË£¬½ñÌì¾Í½éÉܵ½ÕâÀïÁË¡£
·µ»Ø
O¡¾ÎÊÌâ´ðÒÉ¡¿
һλÍøÓÑÌá³ö£ºÈçºÎÆƽâ¹ÉƱÕÊ»§¹ÜÀíÈí¼þ
ÏÂÔصØÖ·£ºhttp://go.163.com/~whsoft/SkActReg.exe
·µ»Ø
4¡¾ÍøÕ¾½éÉÜ¡¿
°×²ËÀÖÔ°£ºhttp://202.102.230.155/secrecy/index.htm

ÔÚÆƽâ½çÈç¹û²»ÖªµÀ°×²ËÀÖÔ°ºÍ¿´Ñ©Ñ§ÔºµÄ»°£¬Äã¿ÉÊÇÌ«²»ÖªµÀÕâ¸ö½âÃܽçµÄºÃÖ§´¦È¥ÁË¡£½ñÌìÏò´ó¼Ò½éÉܵÄÊÇ´óÃû¶¦¶¦µÄ°×²ËÀÖÔ°£¬ËûµÄÄÚÈÝÊÇÔÚÌ«¶àÁË£¬ÎÒÏëÎÒ¶¼²»ÖªµÀÈçºÎÏó´ó¼Ò½éÉÜÁË£¬¹â´ÓËûµÄÁôÑÔ°å¾Í¿ÉÒÔÖªµÀËûµÄÍøÕ¾ÊÜ»¶Ó­µÄ³ÌÐòÁË¡£×ÜÖ®£¬Èç¹ûÄãÏë¸üºÃµÄѧϰ½âÃܵĻ°£¬´ó¼ÒÒ»¶¨ÒªÈ¥Õâ¸ö°×²ËÀÖÔ°£¬ÕâÑùÄã¿ÉÒÔ´ÓÖÐѧϰÐí¶à½âÃܵÄ֪ʶ£¬¾ßÌåÄãÄܹ»Ñ§µ½Ê²Ã´ÖªÊ¶¾ÍÒª¿´ÄãÁË¡£

·µ»Ø
,¡¾ÔÓÖ¾ÐÅÏä¡¿
Ͷ¸åÐÅÏ䣺discoveredit@china.com
´ðÒÉÐÅÏ䣺discoveranswer@china.com
°ßÖñÐÅÏ䣺programhunter@china.com
·µ»Ø