We will “walk” with the F8 key (without going into the procedure) - what if we are lucky) Now our task is to wander a little step by step through the code until we see something interesting (for example, the decrypted text of an XML file). The debugger interrupted on opening the file. Now you need to put a breakpoint on the opening of the trainer file: the CreateFileA function. In the window that appears, select the Exe cheat engine, and in the Arguments line, write the path to CET_TRAINER.CETRAINER. Opens the debugger and click File-> Open. We see that the extracted EXE-shnik receives the path to the encrypted trainer as a parameter (well, and obviously, it starts it right away, decrypting it before that).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |