zadow28 a réussi à extraire (facilement) les clés contenues dans ce programme. Ainsi, il est probable que ces clés puissent être utilisées pour d'autres hacks ...
Private FixedKey30 As Byte() = New Byte() { 220, 8, &H2F, &H83, &H7F, 20, &H87, &HC2, 0, &H8B, &H7B, &HC9, &H20, &HC5, &H5B, &HD9 }
Private FixedKey31 As Byte() = New Byte() { &HE8, 8, &H85, &HF9, 110, &HD0, &HF3, &H67, &H52, &HCE, &H52, 190, &HC3, &HC7, &H4E, &HF3 }
Private Shared InitialSeed As Byte() = New Byte() { &H3E, &HC2, 12, &H17, 2, &H19, 1, &H97, &H8A, &H29, &H71, &H79, &H38, &H29, &HD3, 8, 4, &H29, 250, &H84, &HE3, &H3E, &H7F, &H73, 12, &H1D, &H41, 110, &HEA, &H25, &HCA, &HFB, &H3D, &HE0, &H2B, &HC0, 5, &HEA, &H49, 11, 3, &HE9, &H91, &H98, &HF8, &H3F, &H10, &H1F, &H1B, &HA3, &H4B, 80, &H58, &H94, 40, &HAD, 210, &HB3, &HEB, &H3F, &HF4, &HC3, &H1A, &H58 }
Private IV1 As Byte() = New Byte() { &H22, &H26, &H92, &H8D, &H44, 3, &H2F, &H43, &H6A, &HFD, &H26, &H7E, &H74, &H8B, &H23, &H93 }
Private IV2 As Byte() = New Byte() { &HE8, 11, &H3F, 12, &HD6, &H56, &H6D, &HD0 }
Private IV3 As Byte() = New Byte() { &H3B, &HD6, &H24, 2, 11, &HD3, &HF8, &H65, &HE8, 11, &H3F, 12, &HD6, &H56, &H6D, &HD0 }
Private Shared Key1 As Byte() = New Byte(&H10 - 1) {}
Private Shared Key2 As Byte() = New Byte(&H10 - 1) {}
Private Key3 As Byte() = New Byte() { &H12, &H6C, &H6B, &H59, &H45, &H37, 14, &HEE, &HCA, &H68, &H26, &H2D, 2, &HDD, &H12, 210 }
Private Key4 As Byte() = New Byte() { &HD9, &HA2, 10, &H79, &H66, &H6C, &H27, &HD1, &H10, 50, &HAC, &HCF, 13, &H7F, &HB5, 1 }
Private Key5 As Byte() = New Byte() { &H19, &H76, &H6F, &HBC, &H77, &HE4, &HE7, &H5C, &HF4, &H41, &HE4, &H8B, &H94, &H2C, &H5B, &HD9 }
Private Key6 As Byte() = New Byte() { 80, &HCB, &HA7, 240, &HC2, &HA7, &HC0, &HF6, &HF3, &H3A, &H21, &H43, &H26, &HAC, &H4E, &HF3 }
Private Shared Key7 As Byte() = New Byte(&H10 - 1) {}
Private Shared Key8 As Byte() = New Byte(&H10 - 1) {}