ZenHAX

Free Game Research Forum | Official QuickBMS support | twitter @zenhax | SSL HTTPS://zenhax.com
It is currently Thu Oct 18, 2018 2:25 am

All times are UTC




Post new topic  Reply to topic  [ 3 posts ] 
Author Message
PostPosted: Sun Dec 24, 2017 12:46 am 

Joined: Sun Dec 24, 2017 12:40 am
Posts: 12
Hi everyone,

I have been trying to decrypt the config file for Ghost Recon Phantoms(the yeti.ini.enc)
But have so far been unable to decrypt it since I dont know the used algorithm or key. Since the latest version uses VMProtect I have not been able to reverse the game and look at the decryption procedure. Also the game seems to store interesting information in trace*.ucd files in the logs directory which seem to partially encrypted. I was wondering if anyone ever managed to decrypt one of these files? (Added yeti.ini.enc and 1 ucd file as attachment in zip)


Attachments:
PDC-Live.zip [179.46 KiB]
Downloaded 41 times
Top
   
PostPosted: Mon Dec 25, 2017 4:58 am 
Site Admin
User avatar

Joined: Wed Jul 30, 2014 9:32 pm
Posts: 9051
Honestly I don't remember if I checked that yeti.ini.enc file when I tried the game years ago to test my archives extraction script, there is nothing about that in my collection of scripts so I guess I didn't.


Top
   
PostPosted: Wed Jan 03, 2018 3:56 pm 

Joined: Sun Dec 24, 2017 12:40 am
Posts: 12
Oh sadly, I've tried for the past 3 weeks to crack it. But I cant even find the function where it decrypts the file. There is something I'm not seeing....


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic  [ 3 posts ] 

All times are UTC


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Powered by phpBB® Forum Software © phpBB Limited