why are you getting all wrong
DavidCrow wrote:
The BMP file you want to insert is that sensitive?
BMP was an example i will use something else , maybe you forget to do your glasses while reading my question
DavidCrow wrote:
Once you replace the PE headers with some other file, that modified file will no longer function. So what purpose does it serve?
i never said that i want to replace X| i want to replace nothing , i want to import a new section
DavidCrow wrote:
The cynic in me smells a Trojan horse (i.e., trying to hide the nefarious file from AV software by wrapping it with some other legitimate file).
:thumbsdown::thumbsdown: why i will do this for a malicious purpose , all of AVs can scan PE headers you should know this as a MVP :confused:, if i want to hide a file from user or AVs , i can easily import it to a NTFS portion as a ADS :laugh: but i am killing my hours against them :^) if i was looking for some malicious resources trust me i can find them on the net in few seconds :thumbsup: , even in codeproject site there are lots of articles like how to inject your code to another process maybe first you should check those articles firs which you approved and publised finally , i will explain it a bit more the compiled exe uses a %80 modified Lua interpreter do you know Lua and i am importing some modified Lua scripts in to compiled exe's resources and then i am getting these scripts through resource API functions then redirect the file buffer to luaL_loadbuffer() function of LUA C API interpreter parses this file and generates some reports so i am uploading this file to FTP and users download it priodically and run to get some report about a main program ,and it will edit some portions of main installition if necessary with user's permission (i hope now you do not get this like i am making a pacher) finally it will generate a report like below and present some options to user ------------------------------------------------- your installition needs an update x database is absolete , y file needs a update , the purpose that you having trouble to understand was the automation of some report procedures do you know an idiot who spends hours to do above to make a simple damn trojan , whereas it can be done within minutes