Reverse engineering of an obfuscated executable