Here are the goods:. h+ v' e- }" q! b7 \- S5 T# W. F! k
. v o3 d6 G1 aLuckySoftUnpack Binaries: http://www.mediafire.com/file/dukkflks6 ... ackBin.zip
* B$ c8 k% I9 A# ^# }* W4 d& @LuckySoftUnpack Source: http://www.mediafire.com/file/7j7fsf7f7 ... ackSrc.zip7 G4 K4 o( p1 y/ r, ^: ?
$ K9 y: {; i4 S! ]' YIf you have already deobfuscated all of the .bin files (see below), use LuckySoftUnpack.exe. Otherwise, drag the .bin file from the package into the bin folder of the game (..\MysteryOfMortlakeMansion\bin). Then open a command prompt, cd to the bin directory, and type "startup.bin luckysoftunpack" and your command line arguments.
, n" L6 q8 ?6 Z( R, l3 Y% Q1 t% R7 y" ?
To use:
* R% D/ ]) a f4 `5 e- Prepare your key. Find the decryption key, copy it into your favorite text editor, and save it as a Unicode text file.2 Q1 Q+ n+ Q% }4 ]6 Q0 X
- cd to the game directory& b/ \: E! @7 V5 \/ z u
- Type "LuckySoftUnpack.exe /in Data.pack /keyfile keyfilepath /extract", where keyfilepath is the path to your key file, to extract all files into the directory Data_decrypted.pack in the working directory.
; y$ F y0 g3 e: o0 \- t; K: w) V- Type "LuckySoftUnpack.exe /in Data.pack /keyfile keyfilepath" to only decrypt the file to a LzmaPack, named Data_decrypted.pack in the working directory.
9 J s7 j2 U. E8 x7 R" ?6 j, b, Z- You can use the switch "/key" to specify the key on the command prompt (type it out).; X- x+ _. q/ ~2 b0 V3 r
- You can use the switch "/noencryption" if the file is not encrypted.
1 K" m* w) y+ r9 k) J0 J- You can use the switch "/out" to specify the output directory/file.& d6 E( |' }$ E* J7 h9 y( L% a
- Leave the arguments blank to see usage.& H3 z4 e& ^4 x' f( a" a: g2 g
- If you are using the obfuscated version, type "Startup.bin LuckySoftUnpack" and your arguments instead, and adjust your paths accordingly.% ~8 u* N0 w9 }( p
6 H9 z f% w: A; P) S
LuckySoft Obfuscation tools: http://www.mediafire.com/file/6pu7291qg ... LSObfs.zip
% j0 O6 }3 I* s' q" ~
# o2 _, f9 V9 pDeobfuscates all of the .bin files. cd to the bin directory, and run LuckySoftAutoDeobf.exe. Then you will have deobfuscated .dlls in the folder. All of the obfuscated files are moved to the directory "obfuscated". LuckySoftAutoDeobfAlt.exe is for 1h0iv6hs00twjvh8wr.bin. You don't need to use it, because the deobfuscated file is the same as ResourceEditorLib.dll. Remember to rename GameLauncher.dll and GameLauncherOnLinux.dll into .exes. Rename with capitalization if you'd like.
! B$ L) H2 t+ C, {3 A( o' V2 k
$ N7 X1 {) x. qLuckySoftObfuscator.exe is a GUI app that will obfuscate or deobfuscate a string (filename) for you. Helpful in figuring out which obfuscated file is which deobfuscated file.
& ^1 `5 `; C$ W4 E
5 B* ]( T( O0 F, D1 b( T8 EMake your own obfuscated file: Run Startup.bin with the "--obf" switch and your unobfuscated filename. Then it will obfuscate your file properly. Since it does an XOR operation, this method was used in deobfuscating the obfuscated .bins once the filenames were deobfuscated. More on this later.
1 l6 @2 w& _8 d6 _( ~
2 m' O2 ]5 E7 }( v' F' |Update log:' q: r. _0 g3 ]: e
04/13/2011 (1.0.2.0)+ N0 t! S* C9 G# f7 c% L
- Added detection for having both key and "/noencryption" specified
$ l5 n ~! h: Z F8 {' l- Removed commented out key from source Q, U/ x5 s- r
- Synchronized sources in both VS2008 and VS2005 directories) z/ k6 O8 M! y9 o* M! s
04/13/2011 (1.0.1.0). A; n- o+ I& l: H+ U V4 u
- Initial release I9 z) u* y6 N2 I1 u+ d
|