***********************************************************************
******								*******
******	      PEXTOR 2.0 - Net Walker! PE Object Extractor	*******
******		 Net Walker! - December - 1998 / Brazil		*******
******								*******
******		 U  C  F      1  9  9  4  -  1  9  9  8		*******
******								*******
***********************************************************************

Introduction:
-------------
	Pextor can be used to extract PE Objects from the address space
of a running file.  It can also dump the whole EXE Header and the Main Module.
In the last case, some fields of the PE header are updated so the file keeps runable.
This first distribution of Pextor (Version 2.0) includes full source-code 
(Win32Asm, TASM 5.0 compatible).  Pextor is being distributed only for learning
purposes, since you can find other, and more complete tools with the same purposes.
I did this tool (Version 1.0) about october/1997 with a unique objective in mind:
To recover realocated PE-Objects from PE exe files so I could use them in my
"ThreadWars" game (similar to CoreWars).  Such project has been halted due to lack
of time, but will be back in 1999, probably as "ProcessWars", but more similar to PC-Robots.
	This sources include an incomplete include file for using ToolHelp functions.
Since I used toolhelp32, this tool works only on Windows 95/98. 
Next version will be NT compatible.

Instructions:
-------------
	1) Choose the path of the source file.  You can type the complete path directely
or use the 'Browse' button;
	2) Click the 'Info' button.  The list of Objects and other areas of the chosen
PE file wil be shown.  If you had used the 'Browse' button in the previous item,
this step is not necessary.
	3) Execute the file by pressing the 'Execute' button.  Wait until the file 
finish loading;
	4) Fill in the name of the target file which will be filled with the extracted
area. 
	5) Choose the area you want to extract to the target file.  You have the 
following options:
		- Main Module:  The whole module in memory will be dumped to the file.
Automatic patching of the dumped PE-Header is applyied so the file keeps runable.
		- Exe Header:  The complete header (MZ Header + DOS Stub + PE-Header +
Object Table) will be dumped;
		- Object's Names:  The chosen PE Object from the running source file 
will be dumped to the target file.
	6) Click 'Extract' so the chosen area is dumped to the target file. Repeat 
Step 4-6 if you want to dump anotehr area.


Grettings:
----------

Stone, IceMan, Iczelion, G-Rom, Random, Virogen, Lorian, Fresh
and all of my friends from #win32asm and #ucf2000.


Net Walker!
December, 21st / 1998, Brazil.
   