Hi guys, I've got a lot of help and learnt a lot from these forums, so this is just me giving back to the community..
I found a workaround to a problem that many people on this topic have encountered, which is understanding Skylords first post in this topic (No offense)..
SkylorD wrote:
#This script will do the conversion for you. Just put inside of PEEK's output folder after clicked in "Start Analyzer".
Save as filename.pl '-' Inside Output folder of PEEK. Now run it!
It will create a new file called recvpackets.txt! :/
1) Copy target exe to Peek folder. Run Peek, hook your exe and click "Start Analyzer".
2) This will generate a file called recvpackets_xxx.ini in your output folder. (The xxx will vary depending on the date of your exe) (eg. Mine was recvpackets_20160712.ini). You can close Peek after the .ini file is generated.
3) Copy the perl script given by SkyLord into a text file. Save and rename it to recvpackets_xxx.pl (xxx should be the number from your generated .ini file) (eg. Mine was recvpackets_20120716.pl). Place this .pl file in the output folder along with your generated .ini file.
4) Copy Start.exe from your Openkore folder and place it in the output folder.
5) Open a command prompt inside your output folder (Hold Shift+Right click and select from the menu) and run this command without the quotation marks "
start.exe<space>!<space>recvpackets_xxx.pl<space>recvpackets_xxx.ini". Again, replace xxx by your respective numbers (eg. Mine was
start.exe ! recvpackets_20120716.pl recvpackets_20120716.ini)
6) This will generate your required recvpackets.txt file in the output folder.
This method should be easy to understand if you have correctly used Packet Extractor v3 before. I'm not a professional or experienced developer so I had to find this method by trial and error. I just realized that SkyLords script was written in perl and remembered that Openkore's "start.exe" is an acceptable perl interpreter.