⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 stnpee.asm

📁 PE程序加密壳源程序
💻 ASM
字号:
Comment % Stone's PE-ExeEncrypter v1.13
	  This program is dedicated to the person that thought me the concept
	  of happiness and the those few who makes the meaningness of life
	  seem unimportant to me!


	  Contacting: I can be emailed at: stone@one.se
	  
	  Credits:
	  This could not have been made without the efforts of:
	  Random/UCF, you are the PeKing..
	  Acp/UCF, Who is my mentor in Windows assembly coding
	  Patriarch/PWA, My landlord and friend! Thanks for it all!
	  Rose, My betatester (blame him for any bugs :) nahhh)
	  Marquis De Soiree/UCF, for the support and betatesting
	  DjHD/UCF, thanks for telling it didn't run under NT :)
	  Stefan Esser, you greet me - I greet  you :)
	  United Cracking Force & Xtremist INC, my "sponsors" and benefactors

	  Numbers.inc is written by Patriarch/PWA, modified by Acp/UCF to fit
	  the windows console and finally custumized by me.

	  Console.inc is written by Acp/UCF

	  All bugs and errors are of my doing (those that doesn't belong to
	  microsoft for inventing this weird format) the above people only
	  contributed in making this better

	  Usage: stnplee.exe <PEFILE>

	%


subvalue EQU 1			; 0 = encryption off, anything else=on (debug variable)
version EQU "v1.13"		; First release candidate with DLL support

.386P				; 386 Priveledged mode... 
Locals
jumps

.Model Flat ,StdCall


;Define the needed external functions and constants here.
Extrn           ExitProcess	: PROC  
Extrn           CreateFileA	: PROC                
Extrn		SetFilePointer	: PROC
Extrn		MessageBeep	: PROC
Extrn		CloseHandle	: PROC
Extrn		ReadFile	: PROC
Extrn		WriteFile	: PROC
Extrn		GetCommandLineA : PROC
Extrn		GetLastError	: PROC

.Data                                        
Title1          db "Stone's  PeExeEncrypter",0		; Tittle of Program
FileAttr	dd 0			; Standard File Attributes = none
FileHandle	dd 0 			; Store the FileHandle Here
BytesRead	dd 0 			; We read this many bytes
ObjTblOff	dd 0			; Object table located here (displacement from PEheader)
PeHeaderOff 	dd 0			; File offset of PEHEADER
CurrentRVA	dd 0 			; Current RVA while encrypting
ITRVA		dd 0			; RVA of IT
ITENDRVA	dd 0			; END of IT
ObjectDone	db 0			; Are we finished with this object?
;哪哪哪哪哪哪哪哪哪哪Decryption routine Object Table 哪哪哪哪哪哪哪哪哪哪哪哪

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -