I spent days looking around the internet to see if everything was all right, make a reverse engineer, but really nothing. I do not have the .FLA specification. I spent the last couple of days. If he was alone and you used it, you would receive a letter of termination and abandonment of Adobe, followed by the Canadian equivalent of DMCA.
According to Wikipedia, the format is a binary format based on the Microsoft binary file format specification described here on Wikipedia. Composite file format . But itβs strange because, in my opinion, European antiretre calculations are forcing Microsoft to publish its specifications, you can download the MS Compound File Format here by typing Microsoft in Google format. The first entry is a download link.
Once you have learned it, you need to assemble the tool. Perhaps there is a decompiler available for this format from MS. If not, you can see maybe 3-6 months of work to put together a basic specification.
In the early 90s, I drew attention to the development of the Novell IPX protocol and the NCP stack, which was the case of sending messages to the server and receiving a response. So it's pretty mechanical and tiring, after a few months we had a really good idea of ββwhat was needed, and we created an IPX protocol call card and answered. Same thing with NCP. In the end, we contacted Novell, who sent us to stop and abstain and ultimately wanted to sue us. But in the end they disappeared due to the fact that we used the Wikipedia Clean Rooms Clean Room methods explained . We pretty much separated it from the server product in Binary using a package analyzer and rebuilt it using C ++. But it was reverse engineering the protocol. Much easier than you think.
So the first thing you need is a disassembler. I can not give you any advice on what to use, but there are many of them. After you get the format and split the file, you need to try to define the file headers, footers, constants, such as special character sequences so that you can start creating a map. For example, on page 6 of the Windows Compound binary file format, he says that _absig has the DOCF 11E0 A1B1 1AE1 signature format. If you can find such information in a file, you run the map.
But before you go this length, see if they have a decompiler. I think most of the decompilers you find on Google may be lightweight. Go to such hacker groups. CrackZ . This IDA product is a disassembler. This can help. Introduction to reverse engineering . Reverse engineering community
Hope this helps. If so, do it. Months will pass. Stubbornly!