I have a secret file here which only needs a real h@Cker to open it

I have a secret file here which only needs a real h@Cker to open it.

Do you have the ability?

ITS not a virus.

anonfile.com/u3E0V8ceb9/3444.exe

Other urls found in this thread:

msdn.microsoft.com/en-us/library/ms809762.aspx
twitter.com/SFWRedditVideos

>.exe
Fuck off

>2/67
Try harder.

What's the password?

and this ladies and gentlemen is modern day Sup Forums

the file is encrypted and you need a password to decrypt it

there is no way something (AV) to know whats inside but thats not a problem cuz they just need to say something and your average joe brain capacity will eat that up no matter what

I don't have time for this shit, what's the password?

How about a hint? C'mon, OP, ya got me curious now.

bixnooddotnet

a simple hex editor can do the trick

So far I can tell it's a windows executable 4D 5A(MZ), it has what seems like ssl certificates for symantec, dynamically linked library dependencies ;). This seems like its a Microsoft system executable. Investigating further. I wish I had more time (Procrastinating here).

>This seems like its a Microsoft system executable
>This seems

Literally HOW?

It's a BestCrypt self-extracting archive, I don't have the time or patience to crack this before this thread dies, YAWN I GUESS I'LL NEVER KNOW WHAT OP'S COOL FILE IS YAAAAAAAWN guess he'll just have to give us the answer

it took you minimum 30 min to right click>properties?

It's packed via the BCArchUP which is some sort of BestCrypt archive

OP modified the EXE somewhere
>claimed CRC 424106 while the actual is CRC 495543

which suggests is right and something was modified in a hex editor, but I can't find any english words in there or anything that would obviously seem to be a hint or passphrase

There's Russian in it somewhere.

>claimed CRC 424106
explain pls

This guy. Does any know the magic number(s) for their bins?

msdn.microsoft.com/en-us/library/ms809762.aspx
>DWORD CheckSum
>Supposedly a CRC checksum of the file. As in other Microsoft executable formats, this field is ignored and set to 0. The one exception to this rule is for trusted services and these EXEs must have a valid checksum.

basically the header of the EXE claims a certain checksum for the file, but the actual file itself doesn't match. what this means is that the OP probably modified something, either the decryption passphrase or a hint, into the file.

Can't someone just run this in a VM and put an end to the suspense?

There's an archive file in the exe. Extracting atm.

>password: 123456789
>it's a picture of Bart and Lisa Simpson fucking in a tent in their backyard
>mfw

AHAHAHHA

did you guess the password or did you haxor it

pls tell the truth

real h@Cker m8
sendin FBI 2 ur house now

shoot yourself