EBPIG
6̽Ë÷ÔÓÖ¾6
MHJDQ
֪ʶ¹²ÏíJ×ÊÔ´¹²ÏíJ×ÊÁϹ²Ïí
¡¾·¢ÐÐʱ¼ä¡¿2000-12-3
¡¾ÆÚ¿¯ºÅÂë¡¿µÚ¶þÊ®ÈýÆÚ
¡¾ÍøÕ¾µØÖ·¡¿http://programhunter.myetang.com
¡¾°æȨÉùÃ÷¡¿¡â¨z¨{¨|¨}¨~¨€³ÌʽÁÔÈ˨€¨~¨}¨|¨{¨z¡á
´ËÔÓÖ¾ÓɳÌʽÁÔÈ˱༭¡¢ÖÆ×÷¼°·¢ÐУ»ÔÓÖ¾¿ÉÒÔ×ÔÓÉתÔØ¡¢·Ö·¢ºÍ´«²¥£»ÈκθöÈË»òÍÅÌå²»µÃÔÚδ¾­±¾ÈËÊÚȨµÄÇé¿öÏÂÐÞ¸ÄÔÓÖ¾µÄÍâ¹Û¼°ÄÚÈÝ£»ÔÓÖ¾µÄ½âÊÍȨ¹é³ÌʽÁÔÈËËùÓС£

¡¾±à¼­¼ÄÓï¡¿

    
   {~._.~} 
    ( Y )  
   ()~*~() 
   (_)-(_) 

¼ÇµÃÔÚ¹«Ë¾µÄ¾ÖÓòÍøÖеÄÇ©ÃûΪ"µ±°®À´ÁÙµÄʱºò£¬Äã×¼±¸ºÃÁËÂð£¿"²»ÖªµÀ´ó¼Ò¶ÔÕâ¾ä»°ÓÐʲô¿´·¨£¬¿ÉÄÜÊÇÕæµÄµ±°®À´ÁÙµÄʱºò£¬ÄãÕæµÄ×¼±¸ºÃÁËÂð£¿Ë­ÖªµÀ°®ÊÇÈçºÎÀ´ÁÙÄØ£¿¿ÉÊÇÎÒÏëÖ»ÒªÄã¿´µ½°®µÄÏ£Íû¾ÍÒ»¶¨ÒªÅ¬Á¦ÁË¡£ÒòΪÏÖÔÚÎÒÒѾ­¿´µ½ÁË°®µÄ»ðÑæÁË¡£ÎÒ×¼±¸½«ËüÔÚÎÒµÄÐÄÖÐȼÉÕÆðÀ´£¬ÒÔÖÁÓ°Ïìµ½Ëý¡£ÎÒÒѾ­×¼±¸ºÃÁË£¬Ó­½Ó°®µÄµ½À´ÁË¡£

Äã×¼±¸ºÃÁËÂð£¿

 
¡¾Ä¿ ÿÿ ¼¡¿
ÿÿÿÿ&ÆƽâÐĵÃ
J¡­¡­MidiPlus 2.00 PreFinal ³ÌʽÁÔÈË
K¡­¡­jetcar0.91Ä¿Ç°×îеİ汾 sCYB[CCG]
L¡­¡­ChinaZip v2.0µÄ×¢²áÂëËã·¨(³õѧÕß) dyiyd
ÿÿÿÿ%³õѧÌìµØ
ÿÿÿÿOÎÊÌâ´ðÒÉ
ÿÿÿÿ4ÍøÕ¾½éÉÜ
ÿÿÿÿ,ÔÓÖ¾ÐÅÏä
 
&¡¾ÆƽâÐĵá¿
                         MidiPlus 2.00 PreFinal
                          ³ÌʽÁÔÈË
 Èí¼þÃû³Æ£ºMidiPlus 2.00 PreFinal 
Îļþ´óС£º927 KB
Èí¼þÊÚȨ£º¹²ÏíÈí¼þ
ʹÓÃƽ̨£ºWin95/98/NT
·¢²¼¹«Ë¾£ºhttp://www.hivolos.com.cy/midiplus 
Èí¼þ¼ò½é£º¼òÒ×µÄMIDI²¥·Å¹¤¾ß£¬½çÃ滹Ëã¿ÉÒÔ£¬¿ÉÓÐÈýÖֵIJ¥·Åģʽ£¬¿ÉÒÔToolBar»òËõ
ì¶System TrayÀ´²¥·Å¡£MIDIPLUS²¢Ö§Ô®MID¡¢WAV¼°AVI¸ñʽ£¬Ò²Ö§Ô®PlayListµÄ¹¦ÄÜ¡£ÁíËü
½«MID¡¢WAV¼°AVI¸ñʽÉè³ÉÔ¤Éè µÄ²¥·Å³ÌÐò£¬Èç²»Éè³ÉÔ¤ÉèֵʱÒà¿ÉÇáÒ×µÄÒƳý¡£ 
×·×Ù£ºÒòΪÕâ¸ö³ÌÐòÎÒÔÚ2000-11-22°²×°Ê±£¬ÔËÐкó³ÌÐòÌáʾ¹ýÆÚ£¬ËùÒÔ¾ÍÏÈÆƽâÕâ¸ötime bomb¡£
  ÏÖÔÚÉèbpx getlocaltime
 ±»À¹ÏÂΪ£º
* Referenced by a CALL at Addresses:
|:004AC805   , :004AE5B8   
|:00409844 83C4E0                  add esp, FFFFFFE0
:00409847 8D442408                lea eax, dword ptr [esp+08]
:0040984B 50                      push eax

* Reference To: kernel32.GetLocalTime, Ord:0000h
                                  |
:0040984C E8E3CFFFFF              Call 00406834
:00409851 668B4C240E              mov cx, word ptr [esp+0E]
:00409856 668B54240A              mov dx, word ptr [esp+0A]
:0040985B 668B442408              mov ax, word ptr [esp+08]
:00409860 E81FFEFFFF              call 00409684
:00409865 DD5C2418                fstp qword ptr [esp+18]
:00409869 9B                      wait
:0040986A 668B442416              mov ax, word ptr [esp+16]
:0040986F 50                      push eax
:00409870 668B4C2418              mov cx, word ptr [esp+18]
:00409875 668B542416              mov dx, word ptr [esp+16]
:0040987A 668B442414              mov ax, word ptr [esp+14]
:0040987F E828FCFFFF              call 004094AC
:00409884 DC442418                fadd qword ptr [esp+18]
:00409888 DD1C24                  fstp qword ptr [esp]
:0040988B 9B                      wait
:0040988C DD0424                  fld qword ptr [esp]
:0040988F 83C420                  add esp, 00000020
:00409892 C3                      ret
  ÔÚÕâÀï±»À¹ÏÂÁË£¬°´F12Ìøµ½ÍâÃæµÄ³ÌÐòÖС£´ÓÉÏÃæµ÷Óô˺¯ÊýµÄµØ·½À´¿´£¬ÓÐÁ½¸öº¯Êý
µ÷ÓÃÁËÕâ¸öº¯Êý¡£·Ö±ðΪ
* Referenced by a CALL at Addresses:
|:004AC805   , :004AE5B8   
ÕâÀïµÄÕâÁ½¸öº¯Êý¶¼½«ÓÐÓÃ
call 004AC805 
:004AC805 E83AD0F5FF              call 00409844
:004AC80A DD5DF8                  fstp qword ptr [ebp-08]
:004AC80D 9B                      wait
:004AC80E FF75FC                  push [ebp-04]
:004AC811 FF75F8                  push [ebp-08]
:004AC814 8D4DF2                  lea ecx, dword ptr [ebp-0E]
:004AC817 8D55F4                  lea edx, dword ptr [ebp-0C]
:004AC81A 8D45F6                  lea eax, dword ptr [ebp-0A]
:004AC81D E8D6CEF5FF              call 004096F8
:004AC822 66817DF6CF07            cmp word ptr [ebp-0A], 07CF
:004AC828 7507                    jne 004AC831
:004AC82A 66837DF40B              cmp word ptr [ebp-0C], 000B
:004AC82F 730C                    jnb 004AC83D
:004AC831 66817DF6CF07            cmp word ptr [ebp-0A], 07CF
:004AC837 0F8691000000            jbe 004AC8CE

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AC82F(C)
|
:004AC83D E816F5F5FF              call 0040BD58
:004AC842 FF75EC                  push [ebp-14]
:004AC845 68F8C84A00              push 004AC8F8
:004AC84A 6824C94A00              push 004AC924
:004AC84F 8D45EC                  lea eax, dword ptr [ebp-14]
:004AC852 BA03000000              mov edx, 00000003
:004AC857 E8AC76F5FF              call 00403F08
:004AC85C FF75EC                  push [ebp-14]
:004AC85F 6830C94A00              push 004AC930
:004AC864 6824C94A00              push 004AC924
:004AC869 8D45EC                  lea eax, dword ptr [ebp-14]
:004AC86C BA03000000              mov edx, 00000003
:004AC871 E89276F5FF              call 00403F08
  ÔÙÀ´¿´Ò»¿´call 004AE5B8 
:004AE5B8 E887B2F5FF              call 00409844
:004AE5BD DD5DF8                  fstp qword ptr [ebp-08]
:004AE5C0 9B                      wait
:004AE5C1 FF75FC                  push [ebp-04]
:004AE5C4 FF75F8                  push [ebp-08]
:004AE5C7 8D4DF2                  lea ecx, dword ptr [ebp-0E]
:004AE5CA 8D55F4                  lea edx, dword ptr [ebp-0C]
:004AE5CD 8D45F6                  lea eax, dword ptr [ebp-0A]
:004AE5D0 E823B1F5FF              call 004096F8
:004AE5D5 66817DF6CF07            cmp word ptr [ebp-0A], 07CF
:004AE5DB 7507                    jne 004AE5E4
:004AE5DD 66837DF40B              cmp word ptr [ebp-0C], 000B
:004AE5E2 730C                    jnb 004AE5F0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AE5DB(C)
|
:004AE5E4 66817DF6CF07            cmp word ptr [ebp-0A], 07CF
:004AE5EA 0F8691000000            jbe 004AE681

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AE5E2(C)
|
:004AE5F0 E863D7F5FF              call 0040BD58
:004AE5F5 FF75EC                  push [ebp-14]
:004AE5F8 68B8E64A00              push 004AE6B8
:004AE5FD 68E4E64A00              push 004AE6E4
:004AE602 8D45EC                  lea eax, dword ptr [ebp-14]
:004AE605 BA03000000              mov edx, 00000003
:004AE60A E8F958F5FF              call 00403F08
:004AE60F FF75EC                  push [ebp-14]
:004AE612 68F0E64A00              push 004AE6F0
:004AE617 68E4E64A00              push 004AE6E4
:004AE61C 8D45EC                  lea eax, dword ptr [ebp-14]
:004AE61F BA03000000              mov edx, 00000003
:004AE624 E8DF58F5FF              call 00403F08
:004AE629 FF75EC                  push [ebp-14]
:004AE62C 681CE74A00              push 004AE71C
:004AE631 68E4E64A00              push 004AE6E4
:004AE636 8D45EC                  lea eax, dword ptr [ebp-14]
:004AE639 BA03000000              mov edx, 00000003
  ÉÏÃæÕâÁ½¸öº¯Êý¾ÍÒ»ÑùµÄº¯Êý£¬Ö»ÊǵØÖ·²»Í¬ÁË°É¡£ÄÇôÈçºÎÈ¥³ýÕâ¸ötime bombÄØ£¿
:004AE5E4 66817DF6CF07            cmp word ptr [ebp-0A], 07CF
:004AE5EA 0F8691000000            jbe 004AE681
  ÔÚÕâÀïÊÇÒ»¸ö¹Ø¼üµÄ±È½ÏµØ·½ÁË£¬ÒòΪÈç¹ûÔÚÕâÀï³ÌÐò²»ÌøÔ¾µÄ»°£¬½«Ìáʾ´ËÈí¼þÒѾ­¹ý
ÆڵĴ°¿Ú£¬ËùÒÔÔÚÕâÀïÖ»Óн«jbe¸ÄΪjmpÁË¡£
  ×îºóÊǽ«ÉÏÃæµÄÁ½¸öµØ·½¶¼¸ÄΪjmp£¬ÔÙÔËÐÐÕâ¸ö³ÌÐò¾Í¿ÉÒÔÕý³£ÔËÐÐÁË¡£
  ¾ßÌåÐÞ¸ÄÈçÏ£º

         *****************************
         *  ²éÕÒ£º0F 86 91 00 00 00  *
         *  Ìæ»»£º90 e9 -- -- -- --  *
         *****************************
- ±íʾ²»ÓÃÌæ»»µÄÏî¡£
***********************************              
*  jetcar0.91Ä¿Ç°×îеİ汾£º    * 
*********************************** 
Õâ¸ö¶«Î÷µÄ×¢²á¼ìÑ鲿·Öһֱû±ä£¬×¢²áÐÅÏ¢·ÅÔÚ×¢²á±íÖУ¬ 
ÿ´ÎÆô¶¯Ê±ÅжÏ×¢²áÂëÊÇ·ñÕýÈ·¡£ 
ÔÚtrwÖÐ 
:bpx RegQueryValueExA do "d *(esp+8)" 

µ±Äã¿´µ½³ÌÐòÔÚ¶Áname,ºÍpasswordʱ£¬¾ÍÒªÓÃF10ÂýÂý¸úÁË£¬ÒòΪ 
ÒѾ­ÀëÄ¿±ê²»Ô¶ÁË^_^¡£ 
:004132F4 MOV EAX,[ESP+0C]      //ÄãÊäÈëµÄ×¢²áÂë 
:004132F8 MOV ECX,[ESP+14]¡¡¡¡¡¡//ÕýÈ·µÄ×¢²áÂë 
:004132FC PUSH EAX 
.......(×¢²áÂë±È½Ï)..ÂÔ 


            
Õâ¸ö³ÌÐò²»ÄÜÓÃW32DasmÀ´·´»ã±à£¬¸ø³õÊÖÖÆÔìÁËһЩÂé·³£¬ 
ËùÒÔPOST´ËÎÄ¡£×îºóÏëÎÊÎÊ´ó¼ÒÖªµÀËüÓÃʲôÊÖ¶ÎÀ´·Àw32dasm£¿ 
¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 

¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡sCYB[CCG] 


 ChinaZip v2.0µÄ×¢²áÂëËã·¨(³õѧÕß)
                   dyiyd
ºÜÉÙдÆƽâÐĵ㬲»×ãÖ®´¦ÇëÖ¸Õý¡£
ΪʲôҪѡÔñChinaZipÄØ£¿ÒòΪChinaZipµÄËã·¨±È½Ï¼òµ¥£¬·Ç³£ÊʺϳõѧÕß¡£
ÄÜÈÃÿһ¸ö³õѧÕ߶¼ÄÜѧ»áÈçºÎ·ÖÎö×¢²áÂëµÄËã·¨£¬Ð´³ö×¢²á»ú¡££¨ÊÇË­ÔÚЦÎÒ...£©^o^
ÓÉÓÚ±¾ÎÄÊÇÕë¶Ô³õѧÕߣ¬ËùÒÔÏÂÃæµÄÆƽâ¹ý³ÌÎÒ¾¡Á¿Ð´µÄÏêϸһЩ¡£
Èí¼þ½éÉÜ£º 
ÖлªÑ¹Ëõ(ChinaZip) V2.0
ÖлªÑ¹ËõÊÇÒ»¸ö¹ú²úµÄѹËõ¡¢½âѹËõÈí¼þ£¬ÔÝʱֻ֧³Ö zip ѹËõ¸ñʽ£¬
Õýʽ°æ±¾½«Öð²½Ö§³ÖRAR,ARJ,CAB µÈ¸ü¶àµÄѹËõ¸ñʽ¡£Èí¼þµÄ½çÃæ¡¢²Ù×÷Ï°¹ß¡¢
³ÌÐò¿ì½Ý¼ü½«ÍêÈ«¼æÈÝ WinZip¡£
ÏÂÔصأº 
http://www.soft999.com/download2/ChinaZip.exe
Èí¼þ±£»¤£º 
1.Aspack1.07b
2.×¢²áÂë±£»¤
-----------------
ʹÓù¤¾ß£º 
1.UnAspack v1.0.9.1
2.Trw2000 v1.22
3.W32dsm v8.9»Æ½ð°æ
4.Crackcode2000
5.VB 5.0
-------------------------
ÏÖÔÚ¿ªÊ¼Æƽâඣ¡...............
1.Ê×ÏÈÔËÐÐChinaZip.exe 
2.ÔÚ°ïÖú²Ëµ¥ÏÂÕÒµ½×¢²á²¿·Ö
3.Óû§Ãû£ºdyiyd(Äã¿ÉÊäÈëÄãµÄÃû×Ö£© 
  ×¢²áÂ룺98989898
4.°´È·¶¨ºó³öÏÖ¡°ÄúµÄ×¢²áÂë²»ÕýÈ·!¡± (Õâ¿ÉÊÇÆƽâµÄÏßË÷Ŷ£¡) 
5.½«ChinaZip.exeÓÃUnAspack v1.0.9.1ÍÑ¿Ç(ÓÐÐËȤµÄÅóÓÑ¿ÉÊÖ¶¯ÍÑ¿Ç¡£ÎұȽÏÀÁ....^o^)
6.w32dsm v8.9»Æ½ð°æÔØÈëÒÑÍѿǵÄChinaZip.exe
7.ËÑË÷¡°ÄúµÄ×¢²áÂë²»ÕýÈ·¡±×Ö·û´®¡£ºÜ¿ì±ãÕÒµ½ÁË....
8.ÏÂÃ濪ʼ¾²Ì¬·ÖÎö...´Ó¡°ÄúµÄ×¢²áÂë²»ÕýÈ·!¡±ÏòÉÏ¿´
---------------------------------------
* Possible StringData Ref from Code Obj ->"?ÿÛ‹]" 
                                  |
:004D1DD3 68D51E4D00              push 004D1ED5
:004D1DD8 64FF30                  push dword ptr fs:[eax]
:004D1DDB 648920                  mov dword ptr fs:[eax], esp
:004D1DDE A1CC6D4E00              mov eax, dword ptr [004E6DCC]
:004D1DE3 8B00                    mov eax, dword ptr [eax]
:004D1DE5 8B10                    mov edx, dword ptr [eax]
:004D1DE7 FF92D8000000            call dword ptr [edx+000000D8]
:004D1DED 48                      dec eax
:004D1DEE 0F85B6000000            jne 004D1EAA
:004D1DF4 8D55FC                  lea edx, dword ptr [ebp-04]
:004D1DF7 A1CC6D4E00              mov eax, dword ptr [004E6DCC]
:004D1DFC 8B00                    mov eax, dword ptr [eax]
:004D1DFE 8B80E0020000            mov eax, dword ptr [eax+000002E0]
:004D1E04 E87F10F6FF              call 00432E88------------/*È¡³öÄãÊäÈëµÄÓû§Ãû*/
:004D1E09 8D4DF8                  lea ecx, dword ptr [ebp-08]
:004D1E0C 8B55FC                  mov edx, dword ptr [ebp-04]---/*[ebp-04]´æ·ÅÊÇ
ÄãµÄÓû§Ãû*/
:004D1E0F 8BC3                    mov eax, ebx
:004D1E11 E8D6FDFFFF              call 004D1BEC-----------/*×¢²áÂë¼ÆË㲿·Ö*/
:004D1E16 8D55F4                  lea edx, dword ptr [ebp-0C]
:004D1E19 A1CC6D4E00              mov eax, dword ptr [004E6DCC]
:004D1E1E 8B00                    mov eax, dword ptr [eax]
:004D1E20 8B80E4020000            mov eax, dword ptr [eax+000002E4]
:004D1E26 E85D10F6FF              call 00432E88-----------/*È¡³öÄãÊäÈëµÄ×¢²áÂë*/
:004D1E2B 8B45F4                  mov eax, dword ptr [ebp-0C]----/*[ebp-0C]´æ·Å
ÄãÊäÈëµÄ×¢²áÂë*/
:004D1E2E 8B55F8                  mov edx, dword ptr [ebp-08]----/*[ebp-08]´æ·Å
ÕæÕýµÄ×¢²áÂë*/
:004D1E31 E89A22F3FF              call 004040D0---/*Õâ¸öCallÒ»¶¨ÊÇ×¢²áÂë±È½Ï´¦*/
:004D1E36 7568                    jne 004D1EA0----/*ÎÒÃÇÀ´µ½ÕâÀï¡£¹þ¹þ£¡Óеã¶ùÒâ
˼ÁË°É£¿*/
                                      /*ÕâÀïÒªÌø¾ÍÌø¹ýÁËËùÓÐ×¢²á³É¹¦µÄÐÅÏ¢*/
:004D1E38 A1306F4E00              mov eax, dword ptr [004E6F30]
:004D1E3D 8B00                    mov eax, dword ptr [eax]
:004D1E3F 8B8008040000            mov eax, dword ptr [eax+00000408]
:004D1E45 B201                    mov dl, 01
:004D1E47 E89CB3FDFF              call 004AD1E8
:004D1E4C 8D55F0                  lea edx, dword ptr [ebp-10]
:004D1E4F A120704E00              mov eax, dword ptr [004E7020]
:004D1E54 8B00                    mov eax, dword ptr [eax]
:004D1E56 E8E1EEF7FF              call 00450D3C
:004D1E5B 8D45F0                  lea eax, dword ptr [ebp-10]
* Possible StringData Ref from Code Obj ->" - ×¢²áÓû§!" 
                                  |
:004D1E5E BAEC1E4D00              mov edx, 004D1EEC
:004D1E63 E86021F3FF              call 00403FC8
:004D1E68 8B55F0                  mov edx, dword ptr [ebp-10]
:004D1E6B A1306F4E00              mov eax, dword ptr [004E6F30]
:004D1E70 8B00                    mov eax, dword ptr [eax]
:004D1E72 E84110F6FF              call 00432EB8
:004D1E77 6A40                    push 00000040
* Possible StringData Ref from Code Obj ->"×¢²á³É¹¦£¡" 
                                  |
:004D1E79 B9FC1E4D00              mov ecx, 004D1EFC
* Possible StringData Ref from Code Obj ->"ллÄúµÄ±¦¹óÖ§³Ö." 
                                  |
:004D1E7E BA081F4D00              mov edx, 004D1F08
:004D1E83 A120704E00              mov eax, dword ptr [004E7020]
:004D1E88 8B00                    mov eax, dword ptr [eax]
:004D1E8A E8E1F4F7FF              call 00451370
:004D1E8F A174F05000              mov eax, dword ptr [0050F074]
:004D1E94 C7803402000001000000    mov dword ptr [ebx+00000234], 00000001
:004D1E9E EB0A                    jmp 004D1EAA
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1E36(C)-----------/*×¢ÒâÕâ¸öÆ«ÒƵØÖ·£¬ÏòÉÏÕÒµ½´ËÆ«ÒƵØÖ·*/
|
* Possible StringData Ref from Code Obj ->"ÄúµÄ×¢²áÂë²»ÕýÈ·!" 
                                  |
:004D1EA0 B8241F4D00              mov eax, 004D1F24
:004D1EA5 E84661F8FF              call 00457FF0
--------------------------------------------------------
9.µ½ÏÖÔÚΪֹÎÒÃÇÖ»ÒªÖªµÀÕâ¸öCall 
:004D1E31 E89A22F3FF              call 004040D0--/*Õâ¸öCallÒ»¶¨ÊÇ×¢²áÂë±È½Ï´¦*/
Èç¹ûÓÃTrm2000¸ú×ٵĻ°,°´F8½øÈë
:004040D0 53                      push ebx 
:004040D1 56                      push esi
:004040D2 57                      push edi
:004040D3 89C6                    mov esi, eax
:004040D5 89D7                    mov edi, edx
:004040D7 39D0                    cmp eax, edx-----/*ÕâÊÇ×¢²áÂëµÄ±È½ÏºËÐÄ
                                      eaxÊÇÄãÊäÈëµÄ×¢²áÂë
                                      edxÊÇÕæÕýµÄ×¢²áÂë
                                      (ÏÂÃæÎÒÃÇ¿ÉÓÃÕâ¸öµØ·½ÓÃ
                                      CRACKCODE2000×ö¸ö×¢²á»ú)*/
:004040D9 0F848F000000            je 0040416E
:004040DF 85F6                    test esi, esi
:004040E1 7468                    je 0040414B
:004040E3 85FF                    test edi, edi
:004040E5 746B                    je 00404152
:004040E7 8B46FC                  mov eax, dword ptr [esi-04]
:004040EA 8B57FC                  mov edx, dword ptr [edi-04]
:004040ED 29D0                    sub eax, edx
:004040EF 7702                    ja 004040F3
:004040F1 01C2                    add edx, eax

10.ÔËÐÐTrw2000,ÔÚÔËÐÐChinaZip.exeÖظ´2¡¢3²½
11.°´Ctrl-Nºô³öTrw2000
  ϶ϵãbpx 4d1e31
  °´È·¶¨ºó³ÌÐòÁ¢¿Ì±»Trw2000½Ó¹Ü
  ÏÂÃüÁîd edx  ¹þ¹þÄã¿´µ½Ê²Ã´?......×¢²áÂ룿^_^
ÖÁ´ËÎÒÃÇÒѾ­ÖªµÀÁË×¢²áÂ룬µ«ÊÇÕâ²¢²»ÊÇÎÒÃǵÄ×îÖÕÄ¿µÄ¡£ÎÒÃÇÊÇÏëÖªµÀËûÊÇÈçºÎ¼ÆËã³ö
À´µÄ£¿ÍùÏ¿´°É^_^
12.Öظ´10²½..... 
϶ϵãbpx 004D1E11 ÎÒÃÇÀ´µ½ÕâÀï
:004D1E09 8D4DF8                  lea ecx, dword ptr [ebp-08]
:004D1E0C 8B55FC                  mov edx, dword ptr [ebp-04]--------------/*[eb
p-04]´æ·ÅÊÇÄãµÄÓû§Ãû*/
:004D1E0F 8BC3                    mov eax, ebx
:004D1E11 E8D6FDFFFF              call 004D1BEC----------------------------/*×¢
²áÂë¼ÆË㲿·Ö*/
:004D1E16 8D55F4                  lea edx, dword ptr [ebp-0C]
:004D1E19 A1CC6D4E00              mov eax, dword ptr [004E6DCC]
:004D1E1E 8B00                    mov eax, dword ptr [eax]
°´F8½øÈëcall 004D1BECÀ´µ½ 
* Referenced by a CALL at Address:
|:004D1E11 
|
:004D1BEC 55                      push ebp
:004D1BED 8BEC                    mov ebp, esp
:004D1BEF 6A00                    push 00000000
:004D1BF1 6A00                    push 00000000
:004D1BF3 6A00                    push 00000000
:004D1BF5 6A00                    push 00000000
:004D1BF7 6A00                    push 00000000
:004D1BF9 6A00                    push 00000000
:004D1BFB 6A00                    push 00000000
:004D1BFD 53                      push ebx
:004D1BFE 56                      push esi
:004D1BFF 57                      push edi
:004D1C00 894DF8                  mov dword ptr [ebp-08], ecx
:004D1C03 8955FC                  mov dword ptr [ebp-04], edx
:004D1C06 8B45FC                  mov eax, dword ptr [ebp-04]
:004D1C09 E86625F3FF              call 00404174
:004D1C0E 33C0                    xor eax, eax
:004D1C10 55                      push ebp
* Possible StringData Ref from Code Obj ->"?ÿã^‹]‹U? 
                                  |
:004D1C11 68D41C4D00              push 004D1CD4
:004D1C16 64FF30                  push dword ptr fs:[eax]
:004D1C19 648920                  mov dword ptr fs:[eax], esp
:004D1C1C 33F6                    xor esi, esi
:004D1C1E 8D45F4                  lea eax, dword ptr [ebp-0C]
:004D1C21 8B55FC                  mov edx, dword ptr [ebp-04]
:004D1C24 E8AF21F3FF              call 00403DD8
:004D1C29 8B45F4                  mov eax, dword ptr [ebp-0C]
:004D1C2C E88F23F3FF              call 00403FC0-----------------------------/*È·
¶¨×¢²áÂëµÄ³¤¶È*/
:004D1C31 8BF8                    mov edi, eax------------------------------/*½«
×¢²áÂëµÄ³¤¶È(Eax)×÷Ϊѭ»·´ÎÊý
                                          ±£´æÔÚEdiµ±ÖÐ*/
:004D1C33 85FF                    test edi, edi
:004D1C35 7E57                    jle 004D1C8E------------------------------/*¼ì
²éÓû§ÃûÊÇ·ñΪ¿ÕÖµÈôÊÇÔòÌø*/
:004D1C37 BB01000000              mov ebx, 00000001-------------------------/*½«
Ebx¸³Öµ1(±íʾµÜ1´ÎÑ­»·£©
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1C8C(C)
|
:004D1C3C 8B45F4                  mov eax, dword ptr [ebp-0C]---------------/*½«
Óû§ÃûÈ¡³ö*/
:004D1C3F 8A4418FF                mov al, byte ptr [eax+ebx-01]-------------/*½«
µÚ1λµÄAscIIÂëÈ¡³ö£¬½á¹û±£´æÔÚalÖÐ*/
:004D1C43 E858FFFFFF              call 004D1BA0-----------------------------/*ÅÐ
¶Ï¸ÃAscIIÖеÄÊýÊÇ·ñΪËØÊý(ÎÒÃǽ«ÔÚÏÂÃæÏê½â)*/
:004D1C48 84C0                    test al, al-------------------------------/*Èô
ÊÇal=1 Èô²»ÊÇal=0*/
:004D1C4A 7425                    je 004D1C71-------------------------------/*al
=0Ìøת*/
:004D1C4C 8D45E8                  lea eax, dword ptr [ebp-18]     
:004D1C4F 8B55F4                  mov edx, dword ptr [ebp-0C]
:004D1C52 8A541AFF                mov dl, byte ptr [edx+ebx-01]
:004D1C56 E88D22F3FF              call 00403EE8-----------------------------/*
 :004D1C5B 8B45E8                  mov eax, dword ptr [ebp-18]
:004D1C5E 8D55EC                  lea edx, dword ptr [ebp-14]
:004D1C61 E8166DF3FF              call 0040897C-----------------------------/*Õâ
Èý¸öCall½«ËØÊýÌá³ö²¢ÇÒת»»³É´óд*/
:004D1C66 8B55EC                  mov edx, dword ptr [ebp-14]
:004D1C69 8D45F0                  lea eax, dword ptr [ebp-10]
:004D1C6C E85723F3FF              call 00403FC8-----------------------------/*
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004D1C4A(C)
|
:004D1C71 83FB01                  cmp ebx, 00000001-------------------------/*±ÈÊÇ·ñΪµÚ1´ÎÑ­»·*/
:004D1C74 740A                    je 004D1C80-------------------------------/*Èô
µÚ1´ÎÑ­»·ÔòÌøת*/
:004D1C76 8B45F4                  mov eax, dword ptr [ebp-0C]---------------/*½«
Óû§ÃûתÒƵ½EaxÖÐ*/
:004D1C79 0FB64418FE              movzx eax, byte ptr [eax+ebx-02]----------/*È¡
³ö1λAscIIÂë*/
:004D1C7E EB06                    jmp 004D1C86------------------------------/*ÎÞ
Ìõ¼þתÒƵ½004D1C86*/
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1C74(C)
|
:004D1C80 8B45F4                  mov eax, dword ptr [ebp-0C]---------------/*½«
Óû§ÃûתÒƵ½EaxÖÐ*/
:004D1C83 0FB600                  movzx eax, byte ptr [eax]-----------------/*½«
Óû§ÃûµÚ1λµÄAscIIÂëÒƵ½EaxÖÐ*/
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1C7E(U)
|
:004D1C86 8D748612                lea esi, dword ptr [esi+4*eax+12]---------/*[e
si+4*eax+12]ÊÇ×¢²áÂëµÄ¼ÆË㹫ʽ
                                              ¼ÆËã½á¹û±£´æÔÚEsiµ±ÖÐ*/
:004D1C8A 43                      inc ebx-----------------------------------/*µ±
Ç°Ñ­»·´ÎÊý+1*/
:004D1C8B 4F                      dec edi-----------------------------------/*×Ü
Ñ­»·´ÎÊý-1*/
:004D1C8C 75AE                    jne 004D1C3C------------------------------/*ed
i²»µÈÓÚ0תÒÆ*/
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1C35(C)
|
:004D1C8E 8D55E4                  lea edx, dword ptr [ebp-1C]
:004D1C91 8BC6                    mov eax, esi------------------------------/*½«
EsiÖеÄÔËËã½á¹ûÒÆÖÁEaxÖÐ*/
:004D1C93 E8A870F3FF              call 00408D40
:004D1C98 8B4DE4                  mov ecx, dword ptr [ebp-1C]
:004D1C9B 8D45F4                  lea eax, dword ptr [ebp-0C]
:004D1C9E 8B55F0                  mov edx, dword ptr [ebp-10]
:004D1CA1 E86623F3FF              call 0040400C-----------------------------/*½«
ÔËËã½á¹ûת»»³É×Ö·û´®
                                          ½«ÉÏÃæAscIIÂëΪËØÊýµÄ×Öĸ+×Ö·û´®
                                          Õâ¾ÍÊÇ×¢²áÂë*/----ÖÕÓÚËãÍêÁË^o^
:004D1CA6 8B45F8                  mov eax, dword ptr [ebp-08]
:004D1CA9 8B55F4                  mov edx, dword ptr [ebp-0C]
:004D1CAC E8E320F3FF              call 00403D94
:004D1CB1 33C0                    xor eax, eax
:004D1CB3 5A                      pop edx
:004D1CB4 59                      pop ecx
:004D1CB5 59                      pop ecx
:004D1CB6 648910                  mov dword ptr fs:[eax], edx
* Possible StringData Ref from Code Obj ->"_[åÃÀ‹jjSØÀh" 
                                  |
:004D1CB9 68DB1C4D00              push 004D1CDB
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1CD9(U)
|
:004D1CBE 8D45E4                  lea eax, dword ptr [ebp-1C]
:004D1CC1 BA05000000              mov edx, 00000005
:004D1CC6 E89920F3FF              call 00403D64
:004D1CCB 8D45FC                  lea eax, dword ptr [ebp-04]
:004D1CCE E86D20F3FF              call 00403D40
:004D1CD3 C3                      ret---------------------------------------/*ÍË
³ö×Ó³ÌÐò*/
ÖÁÓÚÅжÏÊÇ·ñΪËØÊýµÄËã·¨Ò²ºÜ¼òµ¥£º 
°´F8½øÈë call 004D1BA0
* Referenced by a CALL at Address:
|:004D1C43 
|
:004D1BA0 55                      push ebp
:004D1BA1 8BEC                    mov ebp, esp
:004D1BA3 51                      push ecx
:004D1BA4 53                      push ebx
:004D1BA5 56                      push esi
:004D1BA6 8845FF                  mov byte ptr [ebp-01], al
:004D1BA9 C645FD02                mov [ebp-03], 02
:004D1BAD C645FE01                mov [ebp-02], 01
:004D1BB1 8A4DFF                  mov cl, byte ptr [ebp-01]
:004D1BB4 49                      dec ecx
:004D1BB5 80E902                  sub cl, 02
:004D1BB8 722A                    jb 004D1BE4
:004D1BBA 41                      inc ecx
:004D1BBB B302                    mov bl, 02--------------------------------/*bl
=2*/
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1BE2(C)
|
:004D1BBD 33C0                    xor eax, eax
:004D1BBF 8A45FF                  mov al, byte ptr [ebp-01]-----------------/*½«
Óû§ÃûµÄ1λAscIIÂëÒÆÖÁal*/
:004D1BC2 33D2                    xor edx, edx
:004D1BC4 8AD3                    mov dl, bl--------------------------------/*½«
Bl-->dl*/
:004D1BC6 8BF2                    mov esi, edx------------------------------/*½«
edx-->esi*/
:004D1BC8 33D2                    xor edx, edx------------------------------/*ed
xÇåÁã(Òì»ò£©*/
:004D1BCA F7F6                    div esi-----------------------------------/*ea
x/esi½á¹û±£´æÔÚeaxÓàÊý±£´æÔÚedx*/
:004D1BCC 85D2                    test edx, edx-----------------------------/*¼ì
²éÊÇ·ñÓÐÓàÊý*/
:004D1BCE 7503                    jne 004D1BD3------------------------------/*Èô
ÓÐÔòÌø*/
:004D1BD0 FE45FD                  inc [ebp-03]
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1BCE(C)
|
:004D1BD3 807DFD02                cmp byte ptr [ebp-03], 02
:004D1BD7 7606                    jbe 004D1BDF
:004D1BD9 C645FE00                mov [ebp-02], 00
:004D1BDD EB05                    jmp 004D1BE4
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1BD7(C)
|
:004D1BDF 43                      inc ebx----------------------------------/*edx
+1*/
:004D1BE0 FEC9                    dec cl
:004D1BE2 75D9                    jne 004D1BBD--------------------------
--------------------------------------------------------------------------------
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1BCE(C)
|
:004D1BD3 807DFD02                cmp byte ptr [ebp-03], 02
:004D1BD7 7606                    jbe 004D1BDF
:004D1BD9 C645FE00                mov [ebp-02], 00
:004D1BDD EB05                    jmp 004D1BE4
* Referenced by a (U)nconditional or (C)onditional Jump at Address: 
|:004D1BD7(C)
|
:004D1BDF 43                      inc ebx----------------------------------/*edx
+1*/
:004D1BE0 FEC9                    dec cl
:004D1BE2 75D9                    jne 004D1BBD-----------------------------/²»µÈ
ÓÚ0Ìø*/
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses: 
|:004D1BB8(C), :004D1BDD(U)
|
:004D1BE4 8A45FE                  mov al, byte ptr [ebp-02]
:004D1BE7 5E                      pop esi
:004D1BE8 5B                      pop ebx
:004D1BE9 59                      pop ecx
:004D1BEA 5D                      pop ebp
:004D1BEB C3                      ret
´ó¼Ò»ù±¾ÉÏ¿´Ã÷°×ÁË°É£¿ 
½«Óû§ÃûµÄһλAscIIÂëÌá³ö/2 /3 /4 /5.........Èç¹ûÄܱ»Ëû±¾ÉíÕû³ý¼´ÎªËØÊý....
×ܽáÒ»ÏÂËã·¨£º 
È磺Óû§ÃûÊÇadyiyd(ΪʲôҪ¼ÓÒ»¸öaÄØ£¿)^o^Ò»»á¶ù¾ÍÖªµÀÁË¡£
×Ö·û´®£º  a      d    y    i    y    d 
AscII£º  61    64    79    69    79    64
Ê®½øÖÆ£º 97    100  121  105  121  100
×¢²áÂë=SN 
aΪËØÊý--->A(½«ËûÌá³ö)---(Ô­À´aµÄASCIIÂëÊǸöËØÊý)^_^
SN=A+((97*4+18)*2+(100*4+18)+(121*4+18)+(105*4+18)+(121*4+18))----(ΪʲôµÚһλ*
2×îºóһλûÓÐËãÄØ£¿´ó¼Ò¿´¿´Éϱ߾ÍÇå³þÁË)
SN=A2672
ÕûÀíһϣº 
̞: adyiyd
×¢²áÂë: A2672
ÎÒÃÇÒ»Æðдһ¸ö×¢²á»ú.... 
µÚÒ»ÖÖ·½·¨£º 
ÓÃCrackcode2000(¾ßÌåÓ÷¨Çë²Î¿¼¿´Ñ©½Ì³Ì)
CRACKCODE.INIÖмÓÈë
[Options]
CommandLine=ChinaZip.exe
Mode=2
First_Break_Address=4D1E31
First_Break_Address_Code=E8
First_Break_Address_Code_Lenth=5
Second_Break_Address=4040D7
Second_Break_Address_Code_Lenth=2
Save_Code_Address=EDX
µÚ¶þÖÖ·½·¨£º 
ÒòΪ±¾ÎÄÕë¶ÔµÄÊdzõѧÕߣ¬ËùÒÔÓÃVB±àÖÆ×¢²á»ú
Ô´´úÂëÈçÏÂ....
Private Sub Command1_Click()
    Dim Sum As Long  'µÚ¶þ²¿·Ö×ÜÊý 
    Dim StrString As String 'µÚÒ»²¿·Ö×Ö·û´®
    Dim Strfull As String  'ÊäÈëµÄÓû§Ãû
    Dim StrPassWord As String '´¦ÀíºóµÄÃÜÂë
    Dim StrSingle As Integer  'µ¥¶À´¦ÀíµÄ×Ö·ûµÄASCÂëÖµ
    Dim intLen As Integer  'Óû§Ãû³¤¶È
    Dim I As Integer, J As Integer
    Dim flgFrist As Boolean '±êʾÊÇ·ñΪµÚÒ»´ÎÑ­»·
    StrString = ""
    Sum = 0
    '³õʼ»¯ÎªµÚÒ»´ÎÑ­»·
    flgFrist = True
   
    intLen = Len(Text1(0).Text)
    If intLen <= 1 Then
        MsgBox "ÇëÊäÈëÓ¢ÎÄ×Ö·û", vbInformation, "Ìáʾ"
        With Text1(0)
            .SelStart = 0
            .SelLength = Len(.Text)
            .SetFocus
        End With
        Exit Sub
    End If
    '´¦ÀíµÚ¶þ²¿·ÖÊý×ÖÀÛ¼Ó
    For I = 1 To intLen - 1
        StrSingle = Asc(Mid(Text1(0).Text, I))
        'ÊäÈëÖÐÎÄÌáʾ
        If StrSingle < 0 Then
            MsgBox "ÇëÊäÈëÓ¢ÎÄ×Ö·û", vbInformation, "Ìáʾ"
           
            With Text1(0)
                .SelStart = 0
                .SelLength = Len(.Text)
                .SetFocus
            End With
            'Èç¹ûΪÖÐÎÄ,ÔòÍ˳öÑ­»·
            Exit Sub
        End If
        Sum = Sum + StrSingle * 4 + 18
    Next I
   
    StrSingle = Asc(Mid(Text1(0).Text, 1))
    Sum = Sum + StrSingle * 4 + 18
    'ÀۼӺʹ¦Àí½áÊø
    StrPassWord = Trim(Str(Sum))
   
    '´¦ÀíµÚÒ»²¿·Ö×Ö·ûÁ¬½Ó
    For I = 1 To intLen
        StrSingle = Asc(Mid(Text1(0).Text, I))
        J = 2
        Do While StrSingle Mod J <> 0
            If StrSingle = CLng(J) Then
                Exit Do
            End If
            J = J + 1
        Loop
        If StrSingle = CLng(J) Then 
            StrString = StrString & UCase(Chr(StrSingle))
        End If
    Next I
   
    Text1(1).Text = Trim(StrString) & Trim(StrPassWord)
    With Text1(1)
        .SelStart = 0
        .SelLength = Len(.Text)
        .SetFocus
    End With
End Sub
×¢£º±¾³ÌÐòûÓжÔÖÐÎÄ×Ö·û½øÐд¦Àí 
ÕâÖÖ·½·¨ËäÈ»±¿Ò»Ð©£¬µ«ÊǷdz£Çå³þ¡£»¹ÊÇ¿´²»¶®µÃÅóÓÑ¿´¿´ÎÒ¼ÒµÄ×¢ÊÓ°É! 
дÁËÕâô¶à£¬ÊÖÒѾ­ÂéÁË¡£»¹Ï£Íû´ó¼ÒÄܹ»ÂúÒâ

Ï£ÍûºÍ´ó¼Ò¶à¶à½»Á÷!¶àÌᱦ¹óÒâ¼û!^_^
×¢²á»úÎÒµÄÍøÒ³¿ÉÒÔÏÂÔص½
http://dyiyd.yeah.net
dyiyd@yeah.net
%¡¾³õѧÌìµØ¡¿
                 
O¡¾ÎÊÌâ´ðÒÉ¡¿
 
4¡¾ÍøÕ¾½éÉÜ¡¿
 
 
,¡¾ÔÓÖ¾ÐÅÏä¡¿
Ͷ¸åÐÅÏ䣺discoveredit@china.com
´ðÒÉÐÅÏ䣺discoveranswer@china.com
°ßÖñÐÅÏ䣺programhunter@china.com