|Author:||Lord Crass (guest: search)|
|Date:||Mon, Jun 13th, 2011 @ 19:41 ( . )|
After going through all of the (encrypted) p-code, it seems that only 8 instructions are used, and they're all straightforward.
Once I've cleaned it all up, I'll post an updated, commented disassembly for this protection that covers the virtual machine, p-code, and drive code protection, as well has how to remove all this extra protection while leaving everything else intact (intro title, fast loader, etc)
--* Star Rank Boxing V2
6/13/2011 @ 20:18--Pete Rittwage
--- 0 Users Online --- 0 Recent Unique Posters