ForbiddenCode
December 7th, 2004, 12:49
I'm quite fluent with win32 coding but relatively new to reverse engineering, so please bear with me.
I'm interested in studying the workings of a particular EXE which I have. I'm not particularly bothered about being able to alter it - however it would be nice for me to be able to step through it, analyze it's behaviour, possibly extract some resources, etc. I basically want to gather enough information to allow me to write a similar program myself.
In the past I've used IDA for this kinda thing, and I love it. The problem is with this particular file I get complete garbage - the short snippets IDA identifies as code don't make much sense, and the parts it identifies as data seem to be encoded as they contain no readable or meaningful strings.
After checking the file with PEID v0.92, it's identified as packed with "Armadillo 3.78 -> Silicon Realms Toolworks". Is this information reliable? Several posts on here seem to indicate there are often discrepancies between what different PE analyzers find and reality.
Assuming the file IS packed with Admadillo 3.78, what are my options? I've read in numerous posts that it's one of the most difficult packers to get around, and there are no tutorials for the newer versions (post v3.6x). Defeating the protection myself is beyond my skills. Should I give up now, or is there someone who can give some good advice or help me in any way?
I'm interested in studying the workings of a particular EXE which I have. I'm not particularly bothered about being able to alter it - however it would be nice for me to be able to step through it, analyze it's behaviour, possibly extract some resources, etc. I basically want to gather enough information to allow me to write a similar program myself.
In the past I've used IDA for this kinda thing, and I love it. The problem is with this particular file I get complete garbage - the short snippets IDA identifies as code don't make much sense, and the parts it identifies as data seem to be encoded as they contain no readable or meaningful strings.
After checking the file with PEID v0.92, it's identified as packed with "Armadillo 3.78 -> Silicon Realms Toolworks". Is this information reliable? Several posts on here seem to indicate there are often discrepancies between what different PE analyzers find and reality.
Assuming the file IS packed with Admadillo 3.78, what are my options? I've read in numerous posts that it's one of the most difficult packers to get around, and there are no tutorials for the newer versions (post v3.6x). Defeating the protection myself is beyond my skills. Should I give up now, or is there someone who can give some good advice or help me in any way?