![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#11
|
|||
|
|||
![]() There's a hint at the start :
//////////////////////////////////////////////////// ///[ sexy installshield decompiler for is6/is7 ]/// //////////////[ (c) sn00pee 2002 ]/////////////// Git |
#12
|
|||
|
|||
![]() Quote:
Anyway, let's say that i've managed to do the decompilation. What next? I mean, how can i use the patched file in setup proccess? The exe file i gave for reference does extract files in /temp dir and used them realtime. The .cab file which produced is encrypted and i couldn't extraced or even view it so far. The only hope to bypass the serial number proccess is by tweaking the .inx file produced but i don't know how to use it after and do the installation with no serial nags. TIA |
#13
|
|||
|
|||
![]()
__________________
... Either you work well or you work much .... |
#14
|
|||
|
|||
![]() As Bfox says, he used SID also, and it worked fine. Can you go back one step and tell us what youactually want to achieve?
Git |
#15
|
|||
|
|||
![]() Certainly. I would like to rebuild the setup file with the patch in serial verification proccess and install it with no serial check. The .inx file can be patched but i dont know how to rebuild the unprotected setup.exe file again.
|
#16
|
|||
|
|||
![]() You need to get hold of the installer program that created the .inx, which is Installshield. If you have unpacked to have the orighinal files, you can patch as necessary then recreate the installation package/exe.
Can you link to the setup file/package please? Git Last edited by Git : 04-22-2015 at 04:52 AM. Reason: addition |
#17
|
|||
|
|||
![]() Quote:
EDIT: OK i thought that it wouldn't be easy, am i right? ![]() Last edited by ektwr : 04-29-2015 at 03:02 PM. |
#18
|
|||
|
|||
![]() Does anyone made any progress with it? I'm stacked really bad.
|