Author: | Lord Crass (guest: search) | |
Date: | Mon, Jun 13th, 2011 @ 19:41 ( . ) |
After going through all of the (encrypted) p-code, it seems that only 8 instructions are used, and they're all straightforward. Once I've cleaned it all up, I'll post an updated, commented disassembly for this protection that covers the virtual machine, p-code, and drive code protection, as well has how to remove all this extra protection while leaving everything else intact (intro title, fast loader, etc) |
--- 0 Users Online --- 0 Recent Unique Posters |