Position: Home page » Virtual » ASM virtual currency

ASM virtual currency

Publish: 2021-03-30 23:31:19
1.

. version 2


. Assembly window assembly 1


. Subroutine__ Launch window_ Local variable B, byte set

. Local variable t, integer type


b = take blank byte set (1048576 × 100) + to byte set ("100m")

t = take start time ()

output debug text ("check result): + take hexadecimal text (ASM_ CRC16 (B [1], take byte set length (b)))

output debug text ("time consuming: + to text (take start time () - t))

b = {}


. Subroutine ASM_ CRC16, short integer type, public

. Arg, byte type, reference

. Arg1, integer type


placement code ({129236,4,2,0,0,83,86,87,51219141149252253255255,51255106,8137125252138203,94235,,1131224,1,51199133192116,7129117252,1160,0,0208233,78117223102139,69, 252,67,102,137,2,66,66,129,251,0,1,0,0,124,193,131,101,252,0,51,192,57,69,12,95,94,91,118,43,139,77,8,139,85,252,129,226,255,0,0,0,15,182,12,8,51,202,51,210,138,85,253,102,139,140,77,252,253,255,255,102,51,202,64,59,69,12,137,77,252,114,213,102,139,69,252,201,194,8, 0})


return (0)


easy language assembly CRC16 check source code existed before, hope to help you

< file FSID = "662721361887163" link = / share / link? Shareid = 3039958507 & UK = 555628319 "name =" e "health =" 0 "/ > E-assembly CRC16 verification source code
2. Wannacry uses the vulnerability of 445 port of Windows operating system to spread, and has the characteristics of self replication and active propagation
after being invaded by the blackmail software, almost all kinds of files such as photos, pictures, documents, audio and video in the user's host system will be encrypted, and the suffix of the encrypted files will be changed to. Wncry, and a blackmail dialog box will pop up on the desktop, asking the victim to pay hundreds of dollars worth of bitcoin to the attacker's bitcoin wallet, And the amount of ransom will increase over time<
types of attacks:
common office files (extensions. PPT,. Doc,. Docx,. Xlsx,. SXi)
are not commonly used, but office file formats (. Sxw,. ODT,. HWP)
compressed documents and media files (. Zip,. Rar,. Tar,. MP4,. MKV)
e-mail and e-mail databases (. EML,. MSG,. OST,. PST . DEB)
database files (. SQL,. Accdb,. MDB,. DBF,. ODB,. MyD)
source code and project files used by developers (. PHP,. Java,. CPP,. PAS,. ASM)
keys and certificates (. Key,. PFX,. PEM,. P12,. CSR,. GPG,. AES)
files used by art designers, artists and photographers (. VSD,. ODG,. Raw,. Nef,. SVG . PSD)
virtual machine files (. VMX,. Vmdk,. VDI)
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750