特征码加密代码(Character code encryption code).docVIP

  • 17
  • 0
  • 约4.94千字
  • 约 7页
  • 2017-10-07 发布于河南
  • 举报

特征码加密代码(Character code encryption code).doc

特征码加密代码(Character code encryption code)

特征码加密代码(Character code encryption code) Today computer lessons have nothing to do, he wrote this thing out, mainly to play, as long as you put out the signature according to the location, I said the following to write the file, use the following code, you can put dynamic encryption feature code, I used here is XOR XOR encryption, you can you can write a reversible algorithm to encrypt, free to play ~ this code is so long, because the characters you locate out of the code does not need conversion does not need in accordance with the principles and written to a file, the program itself is complete. 60 PUSHAD; protect the scene E8 call relocation 1001800658, pop, eax; relocation2Dsub eax, obtain the base difference, re positioning with a code. 1001800C 50 push eax; the base relocation by differential pressure into the stack 1001800D B8mov eax, the base is transferred to a eax image displayed on the site, lordpe 10018012030424, add, eax, DWORD, PTR, [esp]; relocation 1001801550 push eax put the file into the stack base pressure;8BEC mov EBP ESP, set up the stack base; 83C0, 3C, add, eax, 3C; get the PE header address 1001801B, 8B00, MOV, eax, DWORD, PTR, [eax]; get the PE header address 1001801D 030424, add, eax, DWORD, PTR, [esp]; relocation 66:0340 14, add, ax, word, PTR, [eax+14], PE address, plus PE length 83C0 18, add, eax, 18; get the header address of the section table 8B48, 0C, MOV, ECX, DWORD, PTR, [eax+C]; get the section virtual address 1001802A 8B50 14, MOV, EDX, DWORD, PTR, [eax+14]; get the section physical address 1001802D 2BCA sub ECX, EDX K obtained; 1001802F 51 push ECX; the K is pressed into the stack 83C0, 28, add, eax, 28; next section 10018033833800 CMP DWORD PTR [eax], 0; K is obtained after^ 75 EF JNZ short complete loopBBmov ebx,

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档