-
Notifications
You must be signed in to change notification settings - Fork 35
/
spe32.asm
1019 lines (763 loc) · 17.7 KB
/
spe32.asm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
;██████████████████████████████████████████████████████████████████████████████████████████████
;
; SIMPLE POLYMORPHIC ENGINE v1.0
;
; Features:
;
; - entire code is position independent (delta offset is used to access data)
; - XOR, ADD, SUB used for encryption
; - junk opcodes generation - add,adc,sub,sbb,rol,ror,rcr,rcl,shl,shr,not,neg,dec,inc
;
; API:
;
; push dwRandomSeed
; push iFlags
; push lpEncryptor
; push lEncryptor
; push lpDestination
; push lpSource
; push cSize
; call SPME32
;
; Parameters:
;
; dwRandomSeed - random seed
; iFlags - see below
; lpEncryptor - buffer to store encryptor body
; lEncryptor - size of buffer to store encryptor body
; lpDestination - pointer to buffer that will recieve poly decryptor body
; it must be large enough
; lpSource - pointer to buffer that will be encrypted, and after decryption
; poly decryptor jumps there (+delta offset)
; cSize - size of code or data to encrypt (in DWORDs units)
;
; Returned value:
;
; eax - size of poly decryptor
;
; Bartosz Wójcik | https://www.pelock.com
;
;██████████████████████████████████████████████████████████████████████████████████████████████
PRESERVE_REGS equ 00000000000000000000000000000001b
PRESERVE_FLAGS equ 00000000000000000000000000000010b
DEBUG_MODE equ 00000000000000000000000000000100b
GEN_JUNKS equ ON ; junk generator ON/OFF
JUNKS equ 2 ; junks per call to _gen_junks proc
REG_STATE equ 1 ; save and restore after decryption reg state
; x86 registers IDs
_EAX equ 0
_ECX equ 1
_EDX equ 2
_EBX equ 3
_ESP equ 4
_EBP equ 5
_ESI equ 6
_EDI equ 7
; helper macro to put int3 in the output code
@bpx macro
mov al,0CCh
stosb
endm
SPE32 proc near
pop eax ; return address
pop ecx ; code size (in DWORD units)
pop esi ; source
pop edi ; destination of poly decryptor
pop edx ; buffer size
pop ebx ; encryptor buffer
pop dword ptr[ebp+_spe32_flags] ; extra flags
pop dword ptr[ebp+_spe32_seed] ; random seed
push eax ; save return address
push edi ; save stdcall registers
push ebx
push esi
mov dword ptr[ebp+_spe32_encryptor],ebx
fill_nops:
mov byte ptr[ebx+edx-1],90h ;\
dec edx ; > fill encryptor buffer with NOPs
jne fill_nops ;/
choose_rnd_regs:
pushad
get_random_for_reg:
mov al,7
call brandom32
xchg eax,ecx
jecxz get_random_for_reg
lea edx, [ebp+used_registers] ; point to registers
mangle_regs:
push edx
mov eax,dword ptr[edx]
xchg al,ah
rol eax,8
xchg al,ah
mov dword ptr[edx],eax
inc edx
mov eax,dword ptr[edx]
rol eax,16
xchg al,ah
mov dword ptr[edx],eax
inc edx
mov eax,dword ptr[edx]
ror eax,16
xchg al,ah
mov dword ptr[edx],eax
pop edx
loop mangle_regs
popad
call _debug_mode
IFDEF REG_STATE
mov edx,dword ptr[ebp+_spe32_flags]
test edx,PRESERVE_REGS
je __check_flags
mov al,60h ; pushad
stosb
__check_flags:
test edx,PRESERVE_FLAGS
je __skip_save_all
mov al,9Ch ; pushfd
stosb
__skip_save_all:
ENDIF
call _gen_junks
mov al,0B8h ; mov preg,offset source
or al,byte ptr[ebp+preg] ;
stosb ;
mov byte ptr[ebx],al
inc ebx
mov dword ptr[ebx],esi
add ebx,4
mov eax,esi ; source offset
neg eax ; neg
stosd
mov ax,0D8F7h ; neg preg
or ah,byte ptr[ebp+preg]
stosw
call _gen_junks
mov al,03h ; add preg,ebp
stosb ; lame way ;)
mov al,byte ptr[ebp+preg]
shl al,3
or al,_EBP
or al,11000000b
stosb
call _gen_junks
mov al,0B8h ; mov creg,size_fo_code
or al,byte ptr[ebp+creg]
stosb
mov byte ptr[ebx],al
inc ebx
mov dword ptr[ebx],ecx
add ebx,4
mov eax,ecx ; ecx size
stosd
mov dword ptr[ebp+__loop_here],edi
; 8Bh 000b 00 000
; ^vreg ^preg
mov ax,008Bh ; mov vreg,[preg]
or ah,byte ptr[ebp+vreg]
shl ah,3
or ah,byte ptr[ebp+preg]
stosw
mov word ptr[ebx],ax
add ebx,2+100-3-5-1-1-10-3
push ebx
push ecx
_get_passes:
mov al,7
call brandom32
xchg eax,ecx
jecxz _get_passes
__gen_:
push ecx
call _gen_junks
;██████ MAKE XOR,ADD,SUB ███████████████████████████████████████████████████████████████████████
mov al,81h
stosb
mov byte ptr[ebx-2],al
mov al,(_crypt_opcodes_len)/2
call brandom32
mov ax,word ptr[ebp+eax*2+_crypt_opcodes]
or al,byte ptr[ebp+vreg]
mov byte ptr[ebx-1],al
shr eax,8
or al,byte ptr[ebp+vreg]
stosb
call random32
stosd
mov dword ptr[ebx],eax
sub ebx,6
call _gen_junks
pop ecx
loop __gen_
pop ecx
pop ebx
add ebx,4
mov al,89h ; mov [preg],vreg
stosb
mov byte ptr[ebx],al
inc ebx
mov al,byte ptr[ebp+vreg]
shl al,3
or al,byte ptr[ebp+preg]
stosb
mov byte ptr[ebx],al
inc ebx
;██████ DECREMENT COUNTER REGISTER █████████████████████████████████████████████████████████████
__make_inc:
mov al,4
call brandom32
dec eax
je __sub_1
dec eax
je __sub_2
mov al,48h ; dec creg
or al,byte ptr[ebp+creg]
stosb
mov byte ptr[ebx],al
inc ebx
jmp __make_inc_exit
__sub_1:
mov ax,0E883h ; sub creg,1
or ah,byte ptr[ebp+creg]
stosw
mov word ptr[ebx],ax
inc ebx
inc ebx
mov al,1
stosb
mov byte ptr[ebx],al
inc ebx
jmp __make_inc_exit
__sub_2:
mov ax,0C083h ; add creg,-1
or ah,byte ptr[ebp+creg]
stosw
mov word ptr[ebx],ax
inc ebx
inc ebx
mov al,-1
stosb
mov byte ptr[ebx],al
inc ebx
call _gen_junks
__make_inc_exit:
mov ax,0C083h ; add preg,4
or ah,byte ptr[ebp+preg]
mov word ptr[ebx],ax
inc ebx
inc ebx
mov byte ptr[ebx],4
inc ebx
mov al,4
call brandom32
dec eax
je __inc_preg_1
dec eax
je __inc_preg_2
mov ax,0C083h ; add preg,4
or ah,byte ptr[ebp+preg]
stosw
mov al,4
stosb
jmp __test_counter
__inc_preg_1:
call _gen_junks
mov ax,0E883h ; sub preg,-4
or ah,byte ptr[ebp+preg]
stosw
mov al,-4
stosb
jmp __test_counter
__inc_preg_2:
call _gen_junks
mov al,8Dh ; lea preg,[preg+4]
stosb
mov al,byte ptr[ebp+preg]
shl al,3
or al,byte ptr[ebp+preg]
or al,01000000b
stosb
mov al,4
stosb
__test_counter:
call _gen_junks
mov al,(_test_table_len/4)
call brandom32
mov eax,[ebp+eax*4+offset _test_table]
lea eax,[eax+ebp]
jmp eax
__test_0:
call _gen_junks
mov ax,0F883h ; cmp creg,0
or ah,byte ptr[ebp+creg]
stosw
sub eax,eax
stosb
jmp __test_counter_exit
__test_1:
call _gen_junks
mov al,85h
stosb
mov al,byte ptr[ebp+creg] ; test creg,creg
shl al,3
or al,byte ptr[ebp+creg]
or al,11000000b
stosb
jmp __test_counter_exit
__test_2:
call _gen_junks
mov al,8Bh
stosb
mov al,byte ptr[ebp+jrg1]
shl al,3
or al,byte ptr[ebp+creg] ; mov jrg1,creg
or al,11000000b ; mov reg,reg
stosb
mov ax,0F883h ; cmp jrg,0
or ah,byte ptr[ebp+jrg1]
stosw
sub eax,eax
stosb
jmp __test_counter_exit
__test_3:
mov al,50h
or al,byte ptr[ebp+creg] ; push creg
stosb
call _gen_junks
mov al,58h ; pop jrg2
or al,byte ptr[ebp+jrg2]
stosb
mov al,85h
stosb
mov al,byte ptr[ebp+jrg2] ; test jrg2,jrg2
shl al,3
or al,byte ptr[ebp+jrg2]
or al,11000000b
stosb
__test_counter_exit:
mov ax,0F883h ; cmp creg,0
or ah,byte ptr[ebp+creg]
mov word ptr[ebx],ax
inc ebx
inc ebx
mov byte ptr[ebx],0
inc ebx
mov ax,850Fh
stosw
mov word ptr[ebx],ax
inc ebx
inc ebx
mov eax,12345678
__loop_here equ dword ptr $-4
sub eax,edi
sub eax,4
stosd ; jne _decrypt_rest
mov eax,dword ptr[ebp+_spe32_encryptor]
add eax,6
sub eax,ebx
mov dword ptr[ebx],eax
add ebx,4
call _gen_junks
;██████ POP ALL REGISTERS ██████████████████████████████████████████████████████████████████████
__pop_regs:
mov edx,[ebp+_spe32_flags]
IFDEF REG_STATE
test edx,PRESERVE_REGS
je __check_rflags
mov al,61h
stosb
__check_rflags:
test edx,PRESERVE_FLAGS
je __skip_restore_all
mov al,9Dh ; pushad,pushfd
stosb
__skip_restore_all:
ENDIF
; @bpx
call _debug_mode ; set int 3
mov byte ptr[ebx],0C3h ; ret
mov al,0E9h ; jmp decrypted_code
stosb
pop eax ; eax pointer to code
sub eax,edi ; edi current position
sub eax,4 ; size of jmp - 1
stosd ; save it
mov ax,25FFh
stosw
stosd
call _gen_junks
;int 3
pop ebx
call ebx
pop eax
sub edi,eax
xchg edi,eax
ret
;█ S U B R O U T I N E S ███████████████████████████████████████████████████████████████████████
brandom32 proc near
push edx
and eax,000000FFh ; al - param
push eax
call random32
pop ecx
sub edx,edx
div ecx
xchg eax,edx ; calc modulo n
pop edx
ret
brandom32 endp
; WhizKid random num generator
random32 proc near
push edx
push ecx
mov eax,[ebp+offset _spe32_seed] ; Move bits 31-0 of old seed to EAX
; Move bits 38-32 of old seed to DL, set DH = 0
movzx edx, byte ptr [ebp+offset _spe32_seed+4]
; Shift bits 32-1 to bits 31-0
shrd eax, edx, 1
mov dword ptr[ebp+offset _spe32_seed], eax ; Save bits 31-0 of new seed
adc dh, 0 ; DH = bit shifted out of EAX
shr dl, 1 ; Shift bits 38-33 of old seed to bits 37-32
mov cl, dl ; Get bit 35 of old seed to the lsb of CL
shr cl, 2
and cl, 1 ; CL = bit 35 of old seed
xor dh, cl ; xor it with old bit 0
shl dh, 6
or dl, dh ; store it in bit 38 ...
mov byte ptr [ebp+offset _spe32_seed+4],dl ; ... of new seed
pop ecx
pop edx
ret
_spe32_seed dd 987374832 ; seed for random proc
db 11101b ; at least one of the 39 bits must be non-zero!
random32 endp
_debug_mode proc near
mov edx,dword ptr[ebp+_spe32_flags]
test edx,DEBUG_MODE
je _skip_debug_mark
@bpx
_skip_debug_mark:
ret
_debug_mode endp
;██████ JUNK GEN ███████████████████████████████████████████████████████████████████████████████
_gen_junks proc near
IFDEF GEN_JUNKS
push ecx ; save global size of code
IFDEF JUNKS
mov al,JUNKS
__gen_junk_passes:
call brandom32
xchg eax,ecx
jecxz __gen_junk_passes
_gen_junks_loop:
push ecx
ENDIF
mov al,(_junk_table_len/4)
call brandom32
mov eax,[ebp+eax*4+offset _junk_table]
lea eax,[eax+ebp]
jmp eax
__junk_1 label near
mov al,81h
stosb
mov al,3
call brandom32
mov al,byte ptr[ebp+eax*2+_crypt_opcodes]
push eax
mov al,2
call brandom32
xchg eax,ecx
pop eax
jecxz __junk_1_1
or al,byte ptr[ebp+jrg1]
jmp __junk_1_2
__junk_1_1:
or al,byte ptr[ebp+jrg2]
__junk_1_2:
stosb
jmp __junk_key
__junk_2 label near
__junk_3 label near
mov al,0E8h ; call $+7
stosb
mov al,2
call brandom32
test eax,eax
je __call_2
sub eax,eax
mov al,2
stosd
mov al,2
call brandom32
xchg eax,ecx
jecxz __junk_3_2
mov ax,9066h ; 32bit nop
stosw
jmp __exit_from_call
__call_2:
sub eax,eax
stosd
__junk_3_1:
mov al,0Bh ; range
call brandom32
add al,74h ; jxx $+3
mov ah,01h
stosw
call random32
and eax,8
add al,40h ; inc,dec jreg1
or al,byte ptr[ebp+jrg1]
stosb
jmp __exit_from_call
__junk_3_2:
mov ax,01EBh ; jmp $+3
stosw
mov al,0C3h ; ret
stosb
jmp __junk_gen_exit
__exit_from_call:
mov al,2
call brandom32
test eax,eax
je __exit_1_1 ; select stack adjust method(pop or add esp)
mov ax,0C483h ; add esp,4
stosw
mov al,04
stosb
jmp __junk_gen_exit
__exit_1_1:
mov al,2
call brandom32
xchg eax,ecx
mov al,58h
jecxz __exit_1_1_1
or al,byte ptr[ebp+jrg1] ; pop jrg1
jmp __exit_1_1_2
__exit_1_1_1:
or al,byte ptr[ebp+jrg2] ; pop jrg2
__exit_1_1_2:
stosb
jmp __junk_gen_exit
__junk_key:
call random32
stosd
jmp __junk_gen_exit
__junk_4 label near
mov al,0E8h ; call $+6
stosb
sub eax,eax
inc eax
stosd
call random32
stosb ; db trash
jmp __exit_from_call ; adjust stack
;█ MOV DRx,JRGx █████████████████████████████████████████████████████████████████████████████████
__junk_5 label near
;
; mov al,2
; call brandom32
; xchg eax,ecx
;
; mov al,0Fh
;
; jecxz __mov_drX_reg
;
; mov ah,23h ; mov drX,reg
; jmp __mov_reg_drX
;
;__mov_drX_reg:
; mov ah,21h ; mov reg,drX
;__mov_reg_drX:
; stosw
; mov al,7 ; select random drX
; call brandom32
;
; shl al,3
; or al,11000000b
;
; push eax
;
; mov al,2
; call brandom32
; xchg eax,ecx
;
; pop eax
;
; jecxz __mov_drX_jrg1
;
; or al,byte ptr[ebp+jrg2]
; jmp __mov_drX_jrg2
;__mov_drX_jrg1:
; or al,byte ptr[ebp+jrg1]
;__mov_drX_jrg2:
; stosb
;█ JMP $+3 █████████████████████████████████████████████████████████████████████████████████████
__junk_6 label near
mov ax,02EBh ; jmp $+4
stosw
mov al,2
call brandom32
xchg eax,ecx
jecxz __fake_vxdcall
call random32
jmp __skip_shit
__fake_vxdcall:
mov ax,20CDh ; VxDCall ???????
__skip_shit:
stosw ; dw RND
jmp __junk_gen_exit
;█ FAKE MOV ████████████████████████████████████████████████████████████████████████████████████
; mov jrg1,anyreg
; mov jrg2,anyreg
__junk_7 label near
mov al,8Bh
stosb
mov al,6
call brandom32
mov dl,byte ptr[ebp+eax+used_registers]
mov al,2
call brandom32
xchg eax,ecx
jecxz _use_jrg1
mov al,byte ptr[ebp+jrg2]
jmp _build_mov_jrg
_use_jrg1:
mov al,byte ptr[ebp+jrg1]
_build_mov_jrg:
shl al,3
or al,dl
or al,11000000b ; mov reg,reg
stosb
jmp __junk_gen_exit
;█ Jxx $+2 █████████████████████████████████████████████████████████████████████████████████████
__junk_8 label near
mov al,0Bh
call brandom32
add al,74h ; jxx $+2
stosw
jmp __junk_gen_exit
;█ ROx,RCx,SHx JRG1,BYTE ████████████████████████████████████████████████████████████████████████
__junk_9 label near
mov al,0C1h
stosb
mov al,_junk_opcodes_3_len
call brandom32
push eax
call random32
and eax,8
pop edx
add al,byte ptr[ebp+edx+_junk_opcodes_3]
or al,byte ptr[ebp+jrg1]
stosb
call random32
stosb
jmp __junk_gen_exit
;█ AND,OR,NEG,NOT JRG2, ANY ████████████████████████████████████████████████████████████████████
__junk_10 label near
mov al,_junk_opcodes_2_len
call brandom32
mov al,byte ptr[ebp+eax+_junk_opcodes_2]
stosb
mov al,7
call brandom32
xchg eax,edx
mov al,byte ptr[ebp+jrg2]
shl al,3
or al,dl
or al,11000000b
stosb
jmp __junk_gen_exit
;█ BT,BTR,BTS,BTC JRGX,ANY █████████████████████████████████████████████████████████████████████
__junk_11 label near
mov al,0Fh
stosb
mov al,4
call brandom32
mov al,byte ptr[ebp+eax+__bt_opcodes]
__junk_11_end:
stosb
mov al,7
call brandom32
shl al,3
or al,11000000b
xchg eax,edx
mov al,2
call brandom32
xchg eax,ecx
jecxz __junk_11_jrg1
or dl,byte ptr[ebp+jrg2]
jmp __junk_11_jrg2
__junk_11_jrg1:
or dl,byte ptr[ebp+jrg1]
__junk_11_jrg2:
xchg eax,edx
stosb
jmp __junk_gen_exit
__junk_gen_exit:
IFDEF JUNKS
pop ecx
dec ecx
jne _gen_junks_loop
ENDIF
pop ecx
ENDIF
ret
_gen_junks endp
IFDEF GEN_JUNKS
_junk_table dd offset __junk_1
dd offset __junk_2
dd offset __junk_3
dd offset __junk_3
dd offset __junk_4
dd offset __junk_5
dd offset __junk_6
dd offset __junk_7
dd offset __junk_8
dd offset __junk_9
dd offset __junk_10
dd offset __junk_11
_junk_table_len equ $-_junk_table
; 3bytes
; prefix 0C1h
_junk_opcodes_3 db 0C0h ; rol,ror reg,byte
db 0D0h ; rcl,rcr reg,byte
db 0E0h ; shl,shr reg,byte
_junk_opcodes_3_len equ $-_junk_opcodes_3
db 0F7h,0D0h ; not reg
db 0F7h,0D8h ; neg reg
__bt_opcodes db 0A3h ; bt jrgx,any
db 0ABh ; bts jrgx,any
db 0B3h ; btr jrgx,any
db 0BBh ; btc jrgx,any
; 2bytes
; MOD/R Cx
_junk_opcodes_2 db 03Bh ; cmp
db 02Bh ; sub
db 003h ; add
db 01Bh ; sbb
db 013h ; adc
db 023h ; and
db 00Bh ; or
_junk_opcodes_2_len equ $-_junk_opcodes_2
ENDIF
_test_table dd offset __test_0
dd offset __test_1
dd offset __test_2
dd offset __test_3
_test_table_len equ $-_test_table
_spe32_encryptor dd 0