"What is this written ?"

Source: Internet
Author: User

Recently, a small tool called peid can be used to view some information about the PE file. The developer is concerned about the information, that is, the tool used to generate the PE file. If you are interested, go to the Internet to get down a peid and see what tools your common software uses. Here is a list of my situations:

Ultraedit v10.x Microsoft Visual C ++ 6.0
Examdiff pro v3.5 Microsoft Visual C ++ 6.0 [debug]
ACDSee v8.x Microsoft Visual C ++ 7.0 method2 [overlay]
Google pinyin V1.1 Microsoft Visual C ++ 7.0 [debug] [overlay]
Windows Messenger v4.7 Microsoft Visual C ++ 7.0 method2 [debug]
Dependency Walker V1.0 Microsoft Visual C ++ 4.x
Snagit v4.2.2 Microsoft Visual C ++ 5.0
EMule v0.48a Microsoft Visual C ++ 7.0 [debug]
Flashget v1.8 Microsoft Visual C ++ 6.0
Office 2003 Microsoft Visual C ++ 7.0 method2 [debug] [overlay]
WinRAR v3.61 Borland C ++ 1999
Synctoy V2.0 Beta Microsoft Visual C #/basic. Net [overlay]
Photoshop v7.x Microsoft Visual C ++ 6.0
Notepad/WordPad/paint brush/Clearance (WINXP SP2) Microsoft Visual C ++ 7.0 method2 [debug]
Super Rabbit magic settings v8.x Microsoft Visual Basic 5.0/6.0
Kingsoft word overlord 2006 Microsoft Visual C ++ 6.0
Windows optimization master v7.x Borland Delphi 6.0-7.0 [overlay]
VB6 IDE (vb6.exe) Microsoft Visual C ++ 5.0
Vc6 IDE (msdev. EXE) Microsoft Visual C ++ 6.0 [debug]
From the table, we can see that most of the programs I use are developed by VC, many of which are developed by vc6. The dependency Walker V1.0 applet is really exaggerated. vc4.x, ancestor-level, it seems that VC is indeed the king of the Windows platform, Photoshop, ACDSee and other famous software are developed with VC. It is worth mentioning that the windows optimization master and the Super Rabbit magic settings are actually using Delphi and VB respectively, which is somewhat surprising. As a system tool, VC should be the best choice, but this also shows that Delphi and VB are also very strong. Remember mr. Bean: "These guns are deadly in the right hands ." Of course, the premise is in the right hands, and then deadly. Some programs do not leave any trace of the generator, so they cannot be identified by peid, such as IE7, Windows Live Messenger (MSN), and Windows Media Player v10.x. Some programs are shelled and cannot see the original situation. They must be shelled. Some programs are easy to take off and some are difficult to take off. I will not talk about them here, search online for Shell shelling content. This article reminds me of the role of throwing a brick and mortar. Select a proper tool based on different development projects.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.