Кто-нибудь знает утилитку, которая может сдампить PE-файл в такой формат "0x4D,0x5A,0x90,0x00,0x03,0x00,0x00,0x00"?
C2H5OH Сохраняете в файл регион памяти, который занимает модуль и конвертируете в инклуд, например этой тулзой http://www.wasm.ru/forum/viewtopic.php?id=32145 Вот только смысла в этом нет, изза релокации например.
написал недавно: http://up.cih.ms/comer/dumper.exe по команде dumper <exename> генерит хедер с функой экстракта: Код (Text): #define _htnSZ 14336 char htn_bytes[_htnSZ]={0x4d,0x5a,0x50,0x00,0x02,0x00,0x00,0x00,0x04,0x00,0x0f,0x00,0xff,0xff,0x00,0x00,0xb8,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0xba,0x10,0x00,0x0e,0x1f,0xb4,0x09,0xcd,0x21,0xb8,0x01,0x4c,0xcd,0x21,0x90,0x90,0x54,0x68,0x69, 0x74,0x20,0x62,0x65,0x20,0x72,0x75,0x6e,0x20,0x75,0x6e,0x64,0x65,0x72,0x20,0x57,0x69,0x6e,0x33, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x50,0x45,0x00,0x00,0x4c,0x01,0x08,0x00,0x19,0x5e,0x42,0x2a,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x18,0x00,0x00,0x74,0x29,0x00,0x00,0x34,0x29,0x00,0x00,0x00,0x10,0x00,0x00,0x00,0x30,0x00, 0x04,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x04,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xa0,0x00, 0x00,0x00,0x10,0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x10,0x00,0x00,0x10,0x00,0x00,0x00,0x00,0x00, 0x00,0x50,0x00,0x00,0x8a,0x04,0x00,0x00,0x00,0x90,0x00,0x00,0x00,0x0a,0x00,0x00,0x00,0x00,0x00, 0x00,0x80,0x00,0x00,0x58,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x70,0x00,0x00,0x18,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x93,0x1b,0x00,0x00,0x00,0x10,0x00,0x00,0x00,0x1c,0x00,0x00,0x00,0x04,0x00,0x00,0x00,0x00,0x00, 0x44,0x41,0x54,0x41,0x00,0x00,0x00,0x00,0xac,0x00,0x00,0x00,0x00,0x30,0x00,0x00,0x00,0x02,0x00, 0x00,0x00,0x00,0x00,0x40,0x00,0x00,0xc0,0x42,0x53,0x53,0x00,0x00,0x00,0x00,0x00,0xf9,0x06,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xc0,0x2e,0x69,0x64, 0x00,0x06,0x00,0x00,0x00,0x22,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x04,0x00,0x00,0x00,0x00,0x60,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x2e,0x72,0x64,0x61,0x74,0x61,0x00,0x00,0x18,0x00,0x00,0x00,0x00,0x70,0x00,0x00,0x00,0x02,0x00, 0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x50,0x2e,0x72,0x65,0x6c,0x6f,0x63,0x00,0x00,0x58,0x02,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x50,0x2e,0x72,0x73, ... 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }; bool Extract_htn(){ return FileWW("htn.exe",htn_bytes,_htnSZ); } (где FileWW() ~ CreateFileA|WriteFile|CloseHandle)