ASM virtual currency
. version 2
. Assembly window assembly 1
. Subroutine__ Launch window_ Local variable B, byte set
. Local variable t, integer type
b = take blank byte set (1048576 × 100) + to byte set ("100m")
t = take start time ()
output debug text ("check result): + take hexadecimal text (ASM_ CRC16 (B [1], take byte set length (b)))
output debug text ("time consuming: + to text (take start time () - t))
b = {}
. Subroutine ASM_ CRC16, short integer type, public
. Arg, byte type, reference
. Arg1, integer type
placement code ({129236,4,2,0,0,83,86,87,51219141149252253255255,51255106,8137125252138203,94235,,1131224,1,51199133192116,7129117252,1160,0,0208233,78117223102139,69, 252,67,102,137,2,66,66,129,251,0,1,0,0,124,193,131,101,252,0,51,192,57,69,12,95,94,91,118,43,139,77,8,139,85,252,129,226,255,0,0,0,15,182,12,8,51,202,51,210,138,85,253,102,139,140,77,252,253,255,255,102,51,202,64,59,69,12,137,77,252,114,213,102,139,69,252,201,194,8, 0})
return (0)
easy language assembly CRC16 check source code existed before, hope to help you
< file FSID = "662721361887163" link = / share / link? Shareid = 3039958507 & UK = 555628319 "name =" e "health =" 0 "/ > E-assembly CRC16 verification source codeafter being invaded by the blackmail software, almost all kinds of files such as photos, pictures, documents, audio and video in the user's host system will be encrypted, and the suffix of the encrypted files will be changed to. Wncry, and a blackmail dialog box will pop up on the desktop, asking the victim to pay hundreds of dollars worth of bitcoin to the attacker's bitcoin wallet, And the amount of ransom will increase over time<
types of attacks:
common office files (extensions. PPT,. Doc,. Docx,. Xlsx,. SXi)
are not commonly used, but office file formats (. Sxw,. ODT,. HWP)
compressed documents and media files (. Zip,. Rar,. Tar,. MP4,. MKV)
e-mail and e-mail databases (. EML,. MSG,. OST,. PST . DEB)
database files (. SQL,. Accdb,. MDB,. DBF,. ODB,. MyD)
source code and project files used by developers (. PHP,. Java,. CPP,. PAS,. ASM)
keys and certificates (. Key,. PFX,. PEM,. P12,. CSR,. GPG,. AES)
files used by art designers, artists and photographers (. VSD,. ODG,. Raw,. Nef,. SVG . PSD)
virtual machine files (. VMX,. Vmdk,. VDI)