[DiscordArchive] Any1 tried to disassemble and reverse eng. articum 735 launcher?
[DiscordArchive] Any1 tried to disassemble and reverse eng. articum 735 launcher?
Archived author: -SeMGa! • Posted: 2018-03-27T11:02:40.734000+00:00
Original source
Any1 tried to disassemble and reverse eng. articum 735 launcher?
Archived author: schlumpf • Posted: 2018-03-27T11:03:07.953000+00:00
Original source
It is obfuscated enough to not make it worth the effort.
Archived author: Skarn • Posted: 2018-03-27T11:03:31.630000+00:00
Original source
It is not generating filedataids, in case you are wondering
Archived author: -SeMGa! • Posted: 2018-03-27T11:04:32.515000+00:00
Original source
Yea I know. Its the only thing to load files at the moment or I am wrong?
Archived author: schlumpf • Posted: 2018-03-27T11:09:48.458000+00:00
Original source
Enabling local file loading is somewhat easy. Replicating that arctium thing shouldn’t take too long. Get deobfuscated exe from Memory, find address to patch just the same as before, take some generic injector thing, inject after deobfuscation, patch, done.
Archived author: Skarn • Posted: 2018-03-27T11:10:13.293000+00:00
Original source
But that does not solve the casc issue
Archived author: Skarn • Posted: 2018-03-27T11:10:17.185000+00:00
Original source
so useless
Archived author: -SeMGa! • Posted: 2018-03-27T11:11:00.340000+00:00
Original source
For me the current issue is file loading and x86 clients