I have a secret file here which only needs a real h@Cker to open it.
Do you have the ability?
ITS not a virus.
I have a secret file here which only needs a real h@Cker to open it.
Do you have the ability?
ITS not a virus.
Other urls found in this thread:
msdn.microsoft.com
twitter.com
>.exe
Fuck off
>2/67
Try harder.
What's the password?
and this ladies and gentlemen is modern day Sup Forums
the file is encrypted and you need a password to decrypt it
there is no way something (AV) to know whats inside but thats not a problem cuz they just need to say something and your average joe brain capacity will eat that up no matter what
I don't have time for this shit, what's the password?
How about a hint? C'mon, OP, ya got me curious now.
bixnooddotnet
a simple hex editor can do the trick
So far I can tell it's a windows executable 4D 5A(MZ), it has what seems like ssl certificates for symantec, dynamically linked library dependencies ;). This seems like its a Microsoft system executable. Investigating further. I wish I had more time (Procrastinating here).
>This seems like its a Microsoft system executable
>This seems
Literally HOW?
It's a BestCrypt self-extracting archive, I don't have the time or patience to crack this before this thread dies, YAWN I GUESS I'LL NEVER KNOW WHAT OP'S COOL FILE IS YAAAAAAAWN guess he'll just have to give us the answer
it took you minimum 30 min to right click>properties?
It's packed via the BCArchUP which is some sort of BestCrypt archive
OP modified the EXE somewhere
>claimed CRC 424106 while the actual is CRC 495543
which suggests is right and something was modified in a hex editor, but I can't find any english words in there or anything that would obviously seem to be a hint or passphrase
There's Russian in it somewhere.
>claimed CRC 424106
explain pls
This guy. Does any know the magic number(s) for their bins?
msdn.microsoft.com
>DWORD CheckSum
>Supposedly a CRC checksum of the file. As in other Microsoft executable formats, this field is ignored and set to 0. The one exception to this rule is for trusted services and these EXEs must have a valid checksum.
basically the header of the EXE claims a certain checksum for the file, but the actual file itself doesn't match. what this means is that the OP probably modified something, either the decryption passphrase or a hint, into the file.
Can't someone just run this in a VM and put an end to the suspense?
There's an archive file in the exe. Extracting atm.
>password: 123456789
>it's a picture of Bart and Lisa Simpson fucking in a tent in their backyard
>mfw
AHAHAHHA
did you guess the password or did you haxor it
pls tell the truth
real h@Cker m8
sendin FBI 2 ur house now
shoot yourself