在rsaenh.dll中,调用的是CPDecrypt,但是网上相关的资料非常少,说事CSP,具体怎么实现这个算法呢?求教各位大大了
下面是找到到的最关键的算法部分!
68019A53 41 INC ECX
68019A54 33C0 XOR EAX,EAX
68019A56 81E1 FF000000 AND ECX,0xFF
68019A5C 8A040E MOV AL,BYTE PTR DS:[ESI+ECX]
68019A5F 03D0 ADD EDX,EAX
68019A61 81E2 FF000000 AND EDX,0xFF
68019A67 8A1C16 MOV BL,BYTE PTR DS:[ESI+EDX]
68019A6A 881C0E MOV BYTE PTR DS:[ESI+ECX],BL
68019A6D 41 INC ECX
68019A6E 880416 MOV BYTE PTR DS:[ESI+EDX],AL
68019A71 02C3 ADD AL,BL
68019A73 8A0406 MOV AL,BYTE PTR DS:[ESI+EAX]
68019A76 33F8 XOR EDI,EAX
68019A78 81E1 FF000000 AND ECX,0xFF
68019A7E 33C0 XOR EAX,EAX
68019A80 8A040E MOV AL,BYTE PTR DS:[ESI+ECX]
68019A83 03D0 ADD EDX,EAX
68019A85 81E2 FF000000 AND EDX,0xFF
68019A8B 8A1C16 MOV BL,BYTE PTR DS:[ESI+EDX]
68019A8E 881C0E MOV BYTE PTR DS:[ESI+ECX],BL
68019A91 41 INC ECX
68019A92 880416 MOV BYTE PTR DS:[ESI+EDX],AL
68019A95 02C3 ADD AL,BL
68019A97 8A0406 MOV AL,BYTE PTR DS:[ESI+EAX]
68019A9A C1E0 08 SHL EAX,0x8
68019A9D 33F8 XOR EDI,EAX
68019A9F 81E1 FF000000 AND ECX,0xFF
68019AA5 33C0 XOR EAX,EAX
68019AA7 8A040E MOV AL,BYTE PTR DS:[ESI+ECX]
68019AAA 03D0 ADD EDX,EAX
68019AAC 81E2 FF000000 AND EDX,0xFF
68019AB2 8A1C16 MOV BL,BYTE PTR DS:[ESI+EDX]
68019AB5 881C0E MOV BYTE PTR DS:[ESI+ECX],BL
68019AB8 41 INC ECX
68019AB9 880416 MOV BYTE PTR DS:[ESI+EDX],AL
68019ABC 02C3 ADD AL,BL
68019ABE 8A0406 MOV AL,BYTE PTR DS:[ESI+EAX]
68019AC1 C1E0 10 SHL EAX,0x10
68019AC4 33F8 XOR EDI,EAX
68019AC6 81E1 FF000000 AND ECX,0xFF
68019ACC 33C0 XOR EAX,EAX
68019ACE 8A040E MOV AL,BYTE PTR DS:[ESI+ECX]
68019AD1 03D0 ADD EDX,EAX
68019AD3 81E2 FF000000 AND EDX,0xFF
68019AD9 8A1C16 MOV BL,BYTE PTR DS:[ESI+EDX]
68019ADC 881C0E MOV BYTE PTR DS:[ESI+ECX],BL
68019ADF 880416 MOV BYTE PTR DS:[ESI+EDX],AL
68019AE2 02C3 ADD AL,BL
68019AE4 8A0406 MOV AL,BYTE PTR DS:[ESI+EAX]
68019AE7 C1E0 18 SHL EAX,0x18
68019AEA 8D1CAD 00000000 LEA EBX,DWORD PTR DS:[EBP*4]
68019AF1 33F8 XOR EDI,EAX
68019AF3 8B4424 1C MOV EAX,DWORD PTR SS:[ESP+0x1C]
68019AF7 2BC3 SUB EAX,EBX
68019AF9 8938 MOV DWORD PTR DS:[EAX],EDI
68019AFB 4D DEC EBP
68019AFC ^ 0F85 4EFFFFFF JNZ rsaenh.68019A50
68019B02 8B6C24 18 MOV EBP,DWORD PTR SS:[ESP+0x18]
68019B06 83E5 03 AND EBP,0x3
68019B09 85ED TEST EBP,EBP
68019B0B 74 2E JE SHORT rsaenh.68019B3B
68019B0D 8D78 04 LEA EDI,DWORD PTR DS:[EAX+0x4]
68019B10 41 INC ECX
68019B11 BB FF000000 MOV EBX,0xFF
68019B16 23CB AND ECX,EBX
68019B18 33C0 XOR EAX,EAX
68019B1A 8A040E MOV AL,BYTE PTR DS:[ESI+ECX]
68019B1D 03D0 ADD EDX,EAX
68019B1F 23D3 AND EDX,EBX
68019B21 33DB XOR EBX,EBX
68019B23 8A1C16 MOV BL,BYTE PTR DS:[ESI+EDX]
68019B26 881C0E MOV BYTE PTR DS:[ESI+ECX],BL
68019B29 880416 MOV BYTE PTR DS:[ESI+EDX],AL
68019B2C 02C3 ADD AL,BL
68019B2E 8A1F MOV BL,BYTE PTR DS:[EDI]
68019B30 8A0406 MOV AL,BYTE PTR DS:[ESI+EAX]
68019B33 32D8 XOR BL,AL
68019B35 881F MOV BYTE PTR DS:[EDI],BL
68019B37 47 INC EDI
68019B38 4D DEC EBP
68019B39 ^ 75 D5 JNZ SHORT rsaenh.68019B10
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课