Archives For win32 api obfuscation

This is a re-post of a post from 2007 taken from my old blog ilsken.net

If you’re a software-programmer and/or reverse-engineer you should know that using Windows API-calls is a easy way to write code, and also in many cases a good point for reverse-engineers to trace to/from while removing potential protections ..

Let’s take a basic example, let’s use a standard WinAPI-call.. Continue Reading…

Incoming search terms:

  • https://yandex ru/clck/jsredir?from=yandex ru;search;web;;&text=&etext=1824 zebxHqGTMOwuBOs98VGykj55z_-qJlsp9h74cA44d-M 1430edc05df7046449c8e13eaa6cd7338a724965&uuid=&state=_BLhILn4SxNIvvL0W45KSic66uCIg23qh8iRG98qeIXmeppkgUc0YMIVJNtoWDTa6C
  • https://yandex ru/clck/jsredir?from=yandex ru;search;web;;&text=&etext=1831 hMJIIcPCnyegJHTZHIF0JEREngfVHkJu-a4sTvN_6E0 1488aecb2a83a3a94f013a7dedf68020cd742785&uuid=&state=_BLhILn4SxNIvvL0W45KSic66uCIg23qh8iRG98qeIXmeppkgUc0YGftRg9cP1erjB