PDA

View Full Version : Difficult unpacking .....plz help


schrodinger
11-08-2009, 11:11 AM
I tried to unpack this exe file million times but in vain so plz help me
I succeeded in only one thing :this exe file can open data files in the program and I managed to convert an encrypted data file to the original form (it was enveloped in mcf file and I managed to convert it to the swf file which opens normally with flash)

The exe file shows it is .net and protected by VM but I think there is some sort of envelope (probably hasp.net which checks for nethasp.ini file )

The exe file which needs to be unpacked (17 mb only)

http://rapidshare.com/files/291327963/mc2.rar

The encrypted file which I managed to decrypt (32 kb)
http://rapidshare.com/files/303797765/sd.rar


I really need your help guys as it is tough task and I really did a lot of work to decrypt file above

WRP
11-10-2009, 01:24 AM
This file protected by Thinstall Embedded V2.545 .
Read manual for unpacking this "protector"

schrodinger
11-12-2009, 09:26 AM
I know it is VM type and I don't have enough knowledge to do it actually so if someone is pro in that ...plz help me out unpacking it

Git
11-12-2009, 11:00 AM
There is a lot of VM expertise on Exetools.

Git

GNIREENIGNE
11-12-2009, 03:10 PM
Speaking of exetools; are invitation codes still required for registration? I tried registering an account about a month ago - to no avail.

-G

schrodinger
11-12-2009, 07:24 PM
they have a tool called thininstall package editor .........I tried it but with no success
http://forum.exetools.com/showthread.php?t=11695&highlight=thinstall


plz guys help me

kao
11-13-2009, 07:18 AM
Data files like the one you posted are not inside the exe. Most likely they are on a server where NetHASP key is installed. Only that machine can connect to manufacturers server and download updates as well.

So, could you please stop repeating useless requests to several reversing boards?

schrodinger
11-14-2009, 12:54 PM
it seems that u (kao ) have not tried to reverse it by any means
The information which u supplied is completely wrong as nethasp key is key on remote server and will be useful if u wanna emulate the dongle only
The total data are present in the original program and the size of the original program is very big
the exe file is collection of executables which are able to open the encrypted data and i supplied an example above of an encrypted file which is decrypt the file
The problem is that the collection of files are enveloped in VM
:mad:

kao
11-18-2009, 05:01 AM
Haven't I? :) Here are few strings from main application:

http://www.molecular-conceptor.com/mc_db/check_connect.php
http://www.molecular-conceptor.com/mc_db/check.php?id_internal={0}&id_login={1}&host={2}&ip={3}&type={4}&application_id={5}&version={6}&p={7}&c={8}
http://www.molecular-conceptor.com/v2_check_dd.php
http://download.drugdesign.com/mc2/thumbnails_w/
Run Live Update from the computer with the NetHASP key.

and attached is a list of files contained in mc2.exe. As you can see, inside there are no multimedia files like yours. Those few SWF files do essentially nothing.
File "mc_data\features.xml" seems to contain information about multimedia files, but they are located somewhere else..

Any more questions?

schrodinger
11-21-2009, 02:20 PM
[moderator note : please don't quote such large amounts of text. It is totally unnecessary as the original is right in front of you]

plz can u upload the decrypted file somewhere ....I really appreciate your help

kamsom2009
12-31-2009, 05:30 AM
..the ones that cracking groups write. I forgot, but there was a group out there that wrote a keygen that I (probably) still cannot unpack. It has been years since I have lost the file, but I think custom protectors are pretty hard because there are no general tutorials to show to step-by-step how to unpack the software. I have tried Themida and I agree that it is pretty hard to unpack. I tried Execryptor, but I got past the protection, but I could never dump it. I am currently trying Armadillo, but I run into problems sometimes. AsProtect is a joke because it only uses a IsDebuggerPresent check. SD Protector is probably the trickiest protector that I have run into; I have never successfully unpacked it, because I keep getting detected, but kagra published a tutorial on it on the BiW site, and it looks pretty hard to unpack, because the author throws in tricks after tricks.

Just my two cents.