![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() Hello,
I have this file here: http://www.mediafire.com/?49kis3qg2g2u33w Informations are posted in post #4. Thanks, Amorphor Last edited by Amorphor : 07-25-2011 at 03:18 AM. |
#2
|
|||
|
|||
![]() ermmm this isn't even a exe file... its some config file etc. of some mech warrior game ;P
|
#3
|
|||
|
|||
![]() Yeaps. Must be he's uploaded the wrong file? :-)
Last edited by SunBeam : 07-25-2011 at 04:22 AM. |
#4
|
|||
|
|||
![]() Oh lol I had the wrong file.
http://www.mediafire.com/?49kis3qg2g2u33w That's the exe file, I was in a rush to leave my house at that time so I wasn't paying much attention =P Originally this was packed with UPX (2.0 I believe). I think I broke the UPX part (I don't see any UPX headers) but I may be wrong. Can anyone reverse engineer that exe though? I'm asking because the team that brought that program for flash kits is now disbanded so the users wanted a way to make their own bootstrap tools. Thanks, Amorphor |
#5
|
|||
|
|||
![]() It's clean. Pure C++.. You can use IDA 6.1 (it's been leaked already) to map out the file and try and re-write it..
|
#6
|
|||
|
|||
![]() Thank you SunBeam. That's looks perfect. So it seems I did break the UPX encryption after all ^^ (since its pure C++)
I'm new at reverse engineering, but I'm a fast learner when it comes to computers. Can anyone enlighten me on how I might go about reverse engineering with IDA 6.1? Thanks, Amorphor Last edited by Amorphor : 07-25-2011 at 02:35 PM. |