

#Exe decompressor code#
Separating code from data can be extremely difficult, especially when the initial code includes countermeasures intended to hinder disassembly. The fundamental challenge in disassembling compiled files is to correctly interpret the examined data. During the disassembly process the Processing Info window displays the following information: At this time, however, it will only display specifically identified internal items for files compiled with Borland/CodeGear compilers. The disassembler will decompile files built with other compilers too. Only various Borland compilers are currently identified. of the target file can be achieved with a very high degree of accuracy. Moreover, given this information, identifying most of the objects, procedures, variables, types etc. Forehand knowledge of how a compiler puts files together improves the guesswork involved in determining the data allocation patterns within the target file. Once you pressed Start Now, the disassembly process begins by identifying the compiler used to build the target file. The number of displayed opcodes can be set to a default value. The checked Auto Rescan option and Auto Rescan count value are fine at default values, but for complicated binaries, they may require more passes. I've been using the PE Explorer for a while, and am very impressed with the latest version's functions - especially the Disassembler. To facilitate additional hand coding, however, the disassembler utilizes a qualitative algorithm designed to reconstruct the assembly language source code of target binary win32 PE files (EXE, DLL, OCX) with the highest degree of accuracy possible.
#Exe decompressor manual#
The PE Explorer disassembler assumes that some manual editing of the reproduced code will be needed.

#Exe decompressor software#
If your daily work involves reverse engineering of software and exploiting code, source code reviews, testing and evaluation of vulnerabilities, PE Explorer will save you hours of time and it's easy to use! We just made a good disassembler at a reasonable price. We tried to achieve most of the power of IDA Pro, while requiring less skill or knowledge, by automating more of the disassembly process. The list can then be traversed by double-clicking on each listed address. Subroutines that might have references can be listed in a pop-up window by selecting the starting address of the procedure and pressing R ( Search | References). Going back to a previous address requires pressing Esc, and to visit a particular address, you have press Ctrl + G and type the address in the hexadecimal format. For instructions with a second operand destination address, press Ctrl + Enter. Branching addresses can be navigated by selecting the relevant line and pressing Enter. A nice feature in this view is the provision for an immediate adjustment of the space between each assembly line ( Ins and Del) and the number of opcodes per line ( Shift + Ins and Shift + Del). The main disassembly view is towards the top-left.

The Unprocessed data tab displays some blocks of data that do not have a reference to a procedure. The lower left tabs View 1, View 2, View 3, and View 4 ( F6, F7, F8, and F9) provide persistent disassemble views that are independent of the main view and are swappable.Ĭode can be manually marked in the assembly listing by pressing 'C.' Dwords and offsets can be marked by pressing D and O, respectively. The Strings tab provides a list of detected strings you can further manipulate strings detection by using the toolbar, using menu items ( Edit | Mark as String/Pascal String/Long Pascal String/Unicode), or pressing S, A, L, or U to activate each of them. Labels can be renamed by pressing N ( Edit | Rename Label). Name List to the right provides a list of labeled addresses (including conditional and unconditional branching destinations, function prologues, named data, and string references) by the disassembler, with the entry point clearly indicated.
