Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > File Unpacking
FAQ Members List Calendar Search Today's Posts Mark Forums Read

 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
  #1  
Old 11-14-2022, 06:27 AM
crockysam crockysam is offline
Member
 
Join Date: Aug 2010
Posts: 14
Default PROTEQ unpacker

I have an exe that seems to be packed using Safenet COMPACT 500.

With x64dbg I can see it call C50032.dll which is the library for the Safenet COMPACT 500 dongle. I tried setting break points but they 'disappear' after restarting. I also see instruction codes that are not part of any module so I'm guessing those are instructions from memory.

I tried 'decompiling' the exe using retdec and it spits out "PROTEQ00" as the "Entry point section name" so I'm definitely leaning towards the exe being packed by something.

Does anyone know how to 'unpack' this so I can continue patching the exe?
Reply With Quote
 


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.