I release unpacked files right after client updates (generally)
It will be discussed in another thread
Stolen bytes. You need to find them while unpackingCode:0090F94E > $ 6A 74 PUSH 74 0090F950 . 68 388A9C00 PUSH 2Game.009C8A38
I release unpacked files right after client updates (generally)
It will be discussed in another thread
Stolen bytes. You need to find them while unpackingCode:0090F94E > $ 6A 74 PUSH 74 0090F950 . 68 388A9C00 PUSH 2Game.009C8A38
Please, post your questions on forum, not by PM or mail
I spend my time, so please pay a little bit of your time to keep world in equilibrium
can i see where stolen bytes?
and replace that?
Last edited by rendika2; 2012-08-14 at 02:54 PM.
Please, post your questions on forum, not by PM or mail
I spend my time, so please pay a little bit of your time to keep world in equilibrium
but im try to find stolen code.
i cant find that
so much bytes
u can ss where ur find stolen code?
During tracing and deobfuscating ASProtect code. It's impossible to directly point you to the right place. Just analyze the code.
Let me make small explanation: ASProtect, due further exe protection, remove and copy to the internal routines several instruction from original OEP. Removed instruction are replaced by zero. At the end of unpacking protector executes these stolen instructions from his obfuscated routines and then continue running application right after zeros at the beginning of OEP.
How to get these bytes? You need manually trace code after last exception (if you follow the tutorial).
You should find junk code with a lots of jmp's
here we have our stolen code at 01E9D4D7 and 01E9D4D9Code:01E9D4D3 83CF 98 or edi, -0x68 01E9D4D6 5F pop edi 01E9D4D7 6A 74 push 0x74 01E9D4D9 68 388A9C00 push 0x9C8A38 01E9D4DE F3: prefix rep: 01E9D4DF EB 02 jmp short 01E9D4E3 01E9D4E1 CD20 66812DEC vxdjump 0xEC2D8166 01E9D4E7 D4 E9 aam 0xE9 01E9D4E9 0145 67 add dword ptr [ebp+0x67], eax 01E9D4EC 36:EB 01 jmp short 01E9D4F0 01E9D4EF F3: prefix rep: 01E9D4F0 53 push ebx 01E9D4F1 EB 08 jmp short 01E9D4FB 01E9D4F3 E3 13 jecxz short 01E9D508 01E9D4F5 3B94E3 133B94EB cmp edx, dword ptr [ebx-0x146BC4ED] 01E9D4FC 01C7 add edi, eax 01E9D4FE 68 F3D4E901 push 0x1E9D4F3 01E9D503 5B pop ebx 01E9D504 F2: prefix repne: 01E9D505 EB 01 jmp short 01E9D508 01E9D507 9A 50EB01F0 FF3>call far 34FF:F001EB50
Please, post your questions on forum, not by PM or mail
I spend my time, so please pay a little bit of your time to keep world in equilibrium
for trace like this?
Ctrl+T
REP STOS BYTE PTR ES:[EDI]
Ctrl+F11
view trace?
https://progamercity.net/aika-hack/2...unpacking.html
like this find trace?
Please, post your questions on forum, not by PM or mail
I spend my time, so please pay a little bit of your time to keep world in equilibrium
Code:0090F94E 00 DB 00 0090F94F 00 DB 00 0090F950 00 DB 00 0090F951 00 DB 00 0090F952 00 DB 00 0090F953 00 DB 00 0090F954 00 DB 00 0090F955 . E8 36040000 CALL Game.0090FD90 0090F95A . 33DB XOR EBX,EBX 0090F95C . 895D E0 MOV DWORD PTR SS:[EBP-20],EBX 0090F95F . 53 PUSH EBX 0090F960 . 8B3D CC029200 MOV EDI,DWORD PTR DS:[9202CC] 0090F966 . FFD7 CALL EDI 0090F968 . 66:8138 4D5A CMP WORD PTR DS:[EAX],5A4D 0090F96D . 75 1F JNZ SHORT Game.0090F98E
u mean like F7 F8??
btw why not shere unpack with vid?