Dr. Richard Ford firstname.lastname@example.org. Polymorphic Viruses. What are we going to talk about?. Szor 7 Another way viruses try to evade scanners. Virus Scanners. Look for “known” viruses Basically, used to look for hex strings in files Virus writers tried to make this more difficult… .
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
LEA si, Start MOV sp, 0682Decrypt: XOR [si], si XOR [si], sp INC si DEC sp JNZ DecryptStart:
MOV EDI, 00403045hADD EDI, EBPMOV ECX, 0A6BhMOV AL, [key]
Decrypt:XOR [EDI], ALINC EDILOOP DecryptJMP Start
DB key 86