Originally Posted by Kurapica
maybe you didn't understand me !
that fact that the tool was cracked, simply means that its protection was broken using tools like Reflector or others because the tool is protected by its own protection method.
Ok, that makes sense. Are you familiar with the method and how I can use the approach to view an application in reflector that has applied XHEO?
I have read about the method tables and the work that UFO and others have done, but have not found any steps on how to do this manually or via an unpacker or deobfuscation tool.
Thanks for all the help.