{"id":763,"date":"2023-06-01T15:50:32","date_gmt":"2023-06-01T07:50:32","guid":{"rendered":"https:\/\/www.zhidianwl.com\/zhidian\/?p=763"},"modified":"2023-06-01T15:50:32","modified_gmt":"2023-06-01T07:50:32","slug":"exe%e5%b5%8c%e5%85%a5%e5%85%b6%e4%bb%96exe%e9%9c%80%e8%a6%81%e6%80%8e%e4%b9%88%e5%81%9a%ef%bc%9f","status":"publish","type":"post","link":"https:\/\/www.zhidianwl.com\/zhidian\/2023\/763\/","title":{"rendered":"exe\u5d4c\u5165\u5176\u4ed6exe\u9700\u8981\u600e\u4e48\u505a\uff1f"},"content":{"rendered":"
\u5c06\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u5d4c\u5165\u5230\u53e6\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u4e2d\uff0c\u53ef\u4ee5\u4f7f\u7a0b\u5e8f\u7684\u903b\u8f91\u66f4\u52a0\u590d\u6742\uff0c\u4e5f\u53ef\u4ee5\u589e\u52a0\u7a0b\u5e8f\u7684\u5b89\u5168\u6027\u3002\u5d4c\u5165\u7684\u8fc7\u7a0b\u662f\u5c06\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u7684\u4e8c\u8fdb\u5236\u6570\u636e\u6dfb\u52a0\u5230\u53e6\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u7684\u6570\u636e\u6bb5\u6216\u8d44\u6e90\u6bb5\u4e2d\u3002\u8fd9\u7bc7\u6587\u7ae0\u5c06\u4ecb\u7ecdexe\u5d4c\u5165\u5176\u4ed6exe\u7684\u539f\u7406\u548c\u8be6\u7ec6\u8fc7\u7a0b\u3002<\/p>\n
\u4e00\u3001\u539f\u7406<\/p>\n
\u5728Windows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\uff0c\u6bcf\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u90fd\u6709\u4e00\u4e2aPE\uff08Portable Executable\uff09\u5934\uff0c\u5b83\u5305\u542b\u4e86\u7a0b\u5e8f\u7684\u5404\u79cd\u4fe1\u606f\uff0c\u5982\u4ee3\u7801\u6bb5\u3001\u6570\u636e\u6bb5\u3001\u5bfc\u5165\u8868\u3001\u5bfc\u51fa\u8868\u7b49\u7b49\u3002PE\u5934\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u52a0\u8f7d\u53ef\u6267\u884c\u6587\u4ef6\u65f6\u5fc5\u987b\u8bfb\u53d6\u7684\u4fe1\u606f\u3002<\/p>\n
\u5c06\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u5d4c\u5165\u5230\u53e6\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u4e2d\uff0c\u5c31\u662f\u5c06\u88ab\u5d4c\u5165\u7684\u53ef\u6267\u884c\u6587\u4ef6\u7684\u4e8c\u8fdb\u5236\u6570\u636e\u6dfb\u52a0\u5230\u5d4c\u5165\u6587\u4ef6\u7684\u6570\u636e\u6bb5\u6216\u8d44\u6e90\u6bb5\u4e2d\uff0c\u7136\u540e\u4fee\u6539\u5d4c\u5165\u6587\u4ef6\u7684PE\u5934\uff0c\u4f7f\u5176\u80fd\u591f\u6b63\u786e\u52a0\u8f7d\u88ab\u5d4c\u5165\u7684\u53ef\u6267\u884c\u6587\u4ef6\u3002<\/p>\n
\u4e8c\u3001\u8be6\u7ec6\u8fc7\u7a0b<\/p>\n
1. \u9009\u62e9\u5408\u9002\u7684\u5de5\u5177<\/p>\n
\u5728\u5c06\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u5d4c\u5165\u5230\u53e6\u4e00\u4e2a\u53ef\u6267\u884c\u6587\u4ef6\u4e2d\u65f6\uff0c\u9700\u8981\u4f7f\u7528<\/p>\n
\u4e00\u4e9b\u5de5\u5177\u6765\u5b8c\u6210\u8fd9\u4e2a\u4efb\u52a1\u3002\u5e38\u7528\u7684\u5de5\u5177\u6709PETools\u3001Resource Hacker\u3001CFF Explorer\u7b49\u3002\u8fd9\u91cc\u4ee5Resource Hacker\u4e3a\u4f8b\uff0c\u4ecb\u7ecd\u5177\u4f53\u7684\u64cd\u4f5c\u6b65\u9aa4\u3002<\/p>\n 2. \u6253\u5f00\u5d4c\u5165\u6587\u4ef6<\/p>\n \u6253\u5f00Resource Hacker\uff0c\u70b9\u51fbFile->Open\uff0c\u9009\u62e9\u8981\u5d4c\u5165\u7684\u6587\u4ef6\u3002\u5728\u8fd9\u4e2a\u4f8b\u5b50\u4e2d\uff0c\u6211\u4eec\u8981\u5c06\u4e00\u4e2a\u540d\u4e3atest.exe\u7684\u53ef\u6267\u884c\u6587\u4ef6\u5d4c\u5165\u5230\u4e00\u4e2a\u540d\u4e3amain.exe\u7684\u53ef\u6267\u884c\u6587\u4ef6\u4e2d\u3002<\/p>\n 3. \u6253\u5f00\u76ee\u6807\u6587\u4ef6<\/p>\n \u70b9\u51fbFile->Open\uff0c\u9009\u62e9\u8981\u5d4c\u5165\u5230\u7684\u6587\u4ef6\u3002\u5728\u8fd9\u4e2a\u4f8b\u5b50\u4e2d\uff0c\u6211\u4eec\u8981\u5c06test.exe\u5d4c\u5165\u5230\u53ef\u4ee5\u628a\u4e00\u4e2a\u6587\u4ef6\u6253\u5305\u6210exe\u6587\u4ef6\u5417<\/a>main.exe\u4e2d\u3002<\/p>\n 4. \u6253\u5f00\u8d44\u6e90\u7f16\u8f91\u5668<\/p>\n \u5728Resource Hacker\u7684\u5de6\u4fa7\u9762\u677f\u4e2d\uff0c\u9009\u62e9Resource\uff0c\u7136\u540e\u70b9\u51fb\u53f3\u4fa7\u7684\u201c\u6253\u5f00\u8d44\u6e90\u7f16\u8f91\u5668\u201d\u6309\u94ae\u3002<\/p>\n 5. \u6dfb\u52a0\u8d44\u6e90<\/p>\n \u5728\u8d44\u6e90\u7f16\u8f91\u5668\u4e2d\uff0c\u9009\u62e9\u201cAction\u201d->\u201cAdd a new Resource\u201d\uff0c\u7136\u540e\u9009\u62e9\u201cBinary Resource\u201d\u3002<\/p>\n 6. \u547d\u540d\u8d44\u6e90<\/p>\n \u5728\u5f39\u51fa\u7684\u5bf9\u8bdd\u6846\u4e2d\uff0c\u8f93\u5165\u8d44\u6e90\u7684\u540d\u79f0\u548c\u7c7b\u578b\u3002\u5728\u8fd9\u4e2a\u4f8b\u5b50\u4e2d\uff0c\u6211\u4eec\u5c06\u8d44\u6e90\u547d\u540d\u4e3a\u201cTEST_EXE\u201d\uff0c\u7c7b\u578b\u4e3a\u201cEXECUTABLE\u201d\u3002<\/p>\n 7. \u9009\u62e9\u8d44\u6e90\u6587\u4ef6<\/p>\n \u9009\u62e9\u8981\u6dfb\u52a0\u7684\u8d44\u6e90\u6587\u4ef6\u3002\u5728\u8fd9\u4e2a\u4f8b\u5b50\u4e2d\uff0c\u6211\u4eec\u8981\u6dfb\u52a0\u7684\u8d44\u6e90\u6587\u4ef6\u662ftest.exe\u3002<\/p>\n 8. \u4fdd\u5b58\u6587\u4ef6<\/p>\n \u70b9\u51fb\u5de6\u4e0a\u89d2\u7684\u201cSave\u201d\u6309\u94ae\uff0c\u4fdd\u5b58\u6587\u4ef6\u3002\u5728\u8fd9\u4e2a\u4f8b\u5b50\u4e2d\uff0c\u6211\u4eec\u5c06\u6587\u4ef6\u4fdd\u5b58\u4e3amain.exe\u3002<\/p>\n 9. \u4fee\u6539PE\u5934<\/p>\n<\/figure>\n<\/p>\n