反编译出一段程序,但是看不懂这个是如何加密的,请高人指点.
谢谢. 
object BitBtn1: TBitBtn
      Left = 56
      Top = 424
      Width = 289
      Height = 33
      Caption = '    开   始   '
      Font.Charset = GB2312_CHARSET
      Font.Color = clWindowText
      Font.Height = -15
      Font.Name = '宋体'
      Font.Style = [fsBold]
      ParentFont = False
      TabOrder = 0
      OnClick = BitBtn1Click
      Glyph.Data = {
        B6010000424DB601000000000000760000002800000011000000100000000100
        080000000000400100003E0B00003E0B00001000000010000000000000000000
        800000800000008080008000000080008000808000007F7F7F00BFBFBF000000
        FF0000FF000000FFFF00FF000000FF00FF00FFFF0000FFFFFF00030303030303
        0000000000000000000003000000030303030303000F0F0F0F0F0F0F0F000300
        000000000300000000000F0F000F00000F00070000000E00000B0F0B0F0B000F
        0F0F0F0F0F00070000000E000B0F0B0F0000000F0F0F0F000F00070000000E00
        0F0B0F0B0F0B0F000F00000F0F00070000000E000B0F0B0F00000000000B000F
        0F00070000000E000F0B0F0B0F0B0F0B0F000F0F0F00070000000E000B0F0000
        00000000000F0F0F0F00070000000000000B0F0B00000B000F0F00000F000700
        0000030303000000000B000F0F0F0F0F0F00030000000303030303000B000F0F
        0F0F000000000300000003030303000B000F0F00000F000F0F00030000000303
        03000B00000F0F0F0F0F000F000303000000030300090003000F0F0F0F0F0000
        0303030000000303030003030000000000000003030303000000}
    end

解决方案 »

  1.   

    啊?
    请教ksaiy兄,最后一段代码是什么意思?
      

  2.   

    B6010000424DB601000000000000760000002800000011000000100000000100
            080000000000400100003E0B00003E0B00001000000010000000000000000000
            800000800000008080008000000080008000808000007F7F7F00BFBFBF000000
            FF0000FF000000FFFF00FF000000FF00FF00FFFF0000FFFFFF00030303030303
            0000000000000000000003000000030303030303000F0F0F0F0F0F0F0F000300
            000000000300000000000F0F000F00000F00070000000E00000B0F0B0F0B000F
            0F0F0F0F0F00070000000E000B0F0B0F0000000F0F0F0F000F00070000000E00
            0F0B0F0B0F0B0F000F00000F0F00070000000E000B0F0B0F00000000000B000F
            0F00070000000E000F0B0F0B0F0B0F0B0F000F0F0F00070000000E000B0F0000
            00000000000F0F0F0F00070000000000000B0F0B00000B000F0F00000F000700
            0000030303000000000B000F0F0F0F0F0F00030000000303030303000B000F0F
            0F0F000000000300000003030303000B000F0F00000F000F0F00030000000303
            03000B00000F0F0F0F0F000F000303000000030300090003000F0F0F0F0F0000
            0303030000000303030003030000000000000003030303000000
    这是一个图片吧
      

  3.   

    你可以把这个东西,BMP图片!
      

  4.   

    我只有一个可执行文件.
    反编译出来的东西太长,而且全是汇编语言.
    不知道有没有人懂.
    先贴一部分,各位看看,谢谢。
    begin
    {
    00401000   EB10                   jmp     00401012
    00401002   66623A                 bound   di, [edx]
    00401005   43                     inc     ebx
    00401006   2B2B                   sub     ebp, dword ptr [ebx]
    00401008   48                     dec     eax
    00401009   4F                     dec     edi
    0040100A   4F                     dec     edi
    0040100B   4B                     dec     ebx
    0040100C   90                     nop
    0040100D   E92C434600             jmp     0086533E
    00401012   A11F434600             mov     eax, dword ptr [$0046431F]
    00401017   C1E002                 shl     eax, $02
    0040101A   A323434600             mov     dword ptr [$00464323], eax
    0040101F   52                     push    edx
    00401020   6A00                   push    $00* Reference to: GetModuleHandleA()
    |
    00401022   E8B9190600             call    004629E0
    00401027   8BD0                   mov     edx, eax|
    00401029   E88E2B0500             call    00453BBC
    0040102E   5A                     pop     edx|
    0040102F   E8EC2A0500             call    00453B20|
    00401034   E8C32B0500             call    00453BFC
    00401039   6A00                   push    $00|
    0040103B   E8AC3F0500             call    00454FEC
    00401040   59                     pop     ecx
    00401041   68C8424600             push    $004642C8
    00401046   6A00                   push    $00* Reference to: GetModuleHandleA()
    |
    00401048   E893190600             call    004629E0
    0040104D   A327434600             mov     dword ptr [$00464327], eax
    00401052   6A00                   push    $00
    00401054   E98BCE0500             jmp     0045DEE4
    00401059   E9DA3F0500             jmp     00455038
    0040105E   33C0                   xor     eax, eax
    00401060   A011434600             mov     al, byte ptr [$00464311]
    00401065   C3                     ret}
    end.