Quote from: Duplode on October 26, 2009, 11:25:24 PMQuote from: BonzaiJoe on October 26, 2009, 10:52:48 PMIf I understood correctly what Cas mentioned somewhere long ago, load.exe picks a number of code files (according for different video/sound rivers, etc.) and combines them into a single piece of code which is run as the game. Getting it off the way should make it easier to locate which parts of the executable(s) are responsible for which functions within the game - that is, doing reverse engineering on whatever is buried inside the code.
Forgive my ignorance, but what is the point of bypassing load.exe? What can be achieved with this utility?
yes, stunpack+the first code snippet basically re-implement portions of load.exe required decompress and combine the game-executable to disk rather than executing it in-memory. i understand this step wasnt documented here before.
the utilitys use is solely for reverse engineering purposes. it creates a version of the game that is actually possible to disassemble - as is shown in the linked game.asm.
hopefully something more interesting than undocumented command line parameters will come out of this, but time will show.