ARTeam ezine 4th

Page 127

ARTEAM EZINE ISSUE IV

Figure 85 – structure of each call of the obfuscation list

The others 3 Obfuscation’s calls use this routine to destroy and create Memory blocks allocating in to the heap: the offsets that point to it, are stored in the same locations you can see in Figure 87. It’s important to notice the presence of garbage call inside this scheme: before to copy the Heap source block in to the New one, a subroutine is invoked:

Reversing the Protection’s scheme of Alexey Pajitnov’s game Dwice by Gyver75

127


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.