Saturday, March 22, 2008

Crack an evil software for a friend


extern "C" __declspec(dllexport) DWORD KeyRSAPrivatekeyDecrypt(
char* a,
DWORD b,
DWORD c,
BYTE* d,
BYTE* e)
{
BYTE data1[128]={
0x30,0x50,0x34,0x3B,0x2A,0x25,0x54,0x15,0x58,0x6C,0x27,0x45,0x32,0x5B,0x41,0x5E,
0x4C,0x37,0x55,0x3D,0x6C,0x3B,0x45,0x07,0x43,0x4A,0x66,0x4B,0x69,0x36,0x41,0x11,
0x01,0x5A,0x09,0x71,0x40,0x38,0x6A,0x0A,0x52,0x46,0x08,0x35,0x16,0x3F,0x23,0x40,
0x26,0x55,0x05,0x59,0x65,0x31,0x56,0x5B,0x35,0x51,0x6D,0x1A,0x12,0x23,0x70,0x39,
0x06,0x37,0x52,0x38,0x23,0x4D,0x5C,0x26,0x3D,0x71,0x16,0x45,0x06,0x56,0x47,0x54,
0x02,0x61,0x4A,0x11,0x39,0x0C,0x3C,0x25,0x45,0x42,0x21,0x24,0x04,0x5E,0x36,0x0F,
0x34,0x0F,0x60,0x13,0x57,0x27,0x23,0x38,0x37,0x21,0x1C,0x2F,0x0C,0x6D,0x00,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
};
BYTE data2[20]={
0x6E,0x00,0x00,0x00,0x88,0xF2,0x12,0x00,0x00,0x00,0x00,0x30,0x00,0x00,0x00,0x00,
0x68,0x10,0x1B,0x00
};
memcpy(d,data1,128);
memcpy(e,data2,20);
return 0;
}


No comments: