in reply to perl2exe hacking

use some tool like Win32dasm or IDA to get to the deadlisting(you should be able to see lots of scripts, maybe even useful comments that IDA makes) and if it's not encrypted maybe you can find some .DATA section in it that has the source or maybe you can proceed to actually figguring out what it does.