Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > File Unpacking
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 06-11-2013, 04:45 AM
alaa_982 alaa_982 is offline
Member
 
Join Date: Jun 2009
Posts: 32
Default Debug Present

Encrypted program UPolyX 0.3 by delikon* trying program decrupt by RL! DePacker 1.5

Message that aspiration E0013 - debugger present with I put the tick on the option hide unpacker from detection

Is there a particular lesson in order to decrypt this protection

Note conducted Boukt the google script for this protection, but to no avail
Reply With Quote
  #2  
Old 06-11-2013, 06:34 AM
Git Git is offline
Super Moderator
 
Join Date: Oct 2007
Location: Torino
Posts: 1,797
Default

Test the packed program with a different tester. UPolyX 0.3 tends to be the default that PEiD comes up with when it doesn't know what packed it, or when it is a plain unpacked PE file. Sure it's packed?

Git
Reply With Quote
  #3  
Old 06-11-2013, 08:40 AM
BfoX BfoX is offline
Senior Member
 
Join Date: Aug 2007
Posts: 2,232
Send a message via ICQ to BfoX Send a message via MSN to BfoX Send a message via Yahoo to BfoX
Default

alaa_982 have sentinel SHK shell. he fire olly dbg.

ps: not need make many post on many forum
__________________
... Either you work well or you work much ....
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.