![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() Hi guys!!!
Ive got this executable here that has some quite complicated obfuscation done to it. It is in fact two separate assemblies merged into one executable using Xenocode Virtual Appliance. The interesting thing is that there is a launcher also obfuscated into this assembly that is used to "launch" the merged and obfuscated assemblies within it. I couldnt figure out how they did this but it seems like they have done a fine job. -Xenocode is the best deobfuscator? http://filebeam.com/1bc9520947d968824f1daacc5ba128eb Have a look, 3 different experts have looked at this and couldnt figure out how to unpack the two assemblies contained within this SINGLE executable. It is mind boggling. Im asking the community to help me in my quest to reverse this app! Please provide some helpful input if you have anything to say! Thanks!!! =] Last edited by TehAvatar : 07-08-2010 at 06:59 PM. |