:: Tehnical info:
RL!dePacker has a build in option to detect OEP. However this option does not work with VB (always use FindOEP! function with VB applications and Force to manual OEP?) and some other packers. So if RL!dePacker can not unpack the file use FindOEP! function to detect correct OEP, but use it only as a second resort since it can be jammed!
¡ã Option Force OEP to manual address is used to force stopping on manual OEP address, use this option ONLY if packer can not be unpacked (the target runs instead of breaking at OEP or dumps at wrong OEP).
¡ã Option Correct OEP to manual address is used correct OEP in PE header of the unpacked file.
¡ã Option Hide unpacker from detection is used hide debugger from being detected by antiTricks. Option Use tracer to correct IAT is used to remove all known redirection types.
¡ã Option Fix Import elimination is used on applications that relocate import table in memory outside PE32 file. This option has been tested with AlexProtector 1.0 and RLPack TE 1.18. Please note that even dow this option is in testing it should give good results on all known redirection types (see ap0x unpacker SDK).
¡ã Option Paste PE.Header from disk is used correct paste original PE header to the unpacked file.
Generic unpacker can ONLY unpack packers that do not use IAT redirection, that don¡¯t steal APIs and which fill out IAT table in correct order. To unpack packers that use redirections or import elimination set the unpacker options to match your case. All ordinals that can be converted to API names are converted, others are inserted into IAT as ordinals! Designed for NT systems, Windows 2000 or later but it should work on Windows 9x if you have psapi.dll file!
If you get a virus/tojan warning and you have downloaded the program from the official website be assured that there is no virus present in the package and that your anti virus is making a false positive detection!
:: Can I report a bug or contact the autor?
Here is the contact information which you can use to contact me: