2012-09-04

Unpack the maplestory.exe of KMS

I followed this manual. You can see it on here, too.

KMS 1.2.171 is targeted.

The maplestory.exe is packed with ASProtect. PEiD or ExeinfoPE can detect it. Especially, ExeinfoPE shows unpacking information. It is written that 'try Stripper v2.13 beta 9 by syd or Ollydbg.exe with plugin Aspr2.XX_unpacker_v1.0E by VolX OR DecomAS by PE_Kill 2011.04'.

I use the following softwares.
OllyDbg 1.10 - link1, link2
IsDebuggerPresent plugin - link1, link2
ODBGScript 1.82 - link1, link2
Aspr2.XX_unpacker_v1.0E script - link1, link2
ImpREC, i.e. Import REConstructor, 1.7e - link1, link2

Leaked KMST, i.e. Korean MapleStory for Test, client

With KMST client 1.2.330 update, debugging data is leaked.
It can be downloaded from here.


References
http://www.southperry.net/showthread.php?t=29589
http://goo.gl/g3W1L

KMS, i.e. Korean MapleStory, channel port number

channel 1 - 8585
channel over-20 - 8586
channel 2 - 8587
...


Reference
http://goo.gl/0Kvnu