psy_gr
September 9th, 2004, 07:02
Hello, this is my first post here. Rest assured i have read and comprehented the rules. Warning to the reader: i am a newcomer to the REverse Engineering world. On to my question. There is an Adobe application that i have, which evidently, is protected by Vbox 4.6.2, and thus sports the usuall nag screen.
The version i have is a special, trial one, ie, has some extra features aside being a demo. But i also have the "regular" version, that i have paid for and own. So, investigating the possibility to simply swap the executables, i was faced with a Vbox nag screen when i executed the legal (read: not packed) .exe in the installation directory of the trial version.
My question, and i hope it doesn't sound naive, is, does Vbox only wrap the main executable, or a given set of dll files as well? When one attempts to unpack it, can he count on the numerous how-to guides? Or is there some caveat?
The version i have is a special, trial one, ie, has some extra features aside being a demo. But i also have the "regular" version, that i have paid for and own. So, investigating the possibility to simply swap the executables, i was faced with a Vbox nag screen when i executed the legal (read: not packed) .exe in the installation directory of the trial version.
My question, and i hope it doesn't sound naive, is, does Vbox only wrap the main executable, or a given set of dll files as well? When one attempts to unpack it, can he count on the numerous how-to guides? Or is there some caveat?

. I hope that this is what you want
.
as he stated, there is no "target specific" code or crack information, even though various targets using the protection system are mentioned. However, it would be BEST if the use of target names were very limited. 