copylok doesnt jump into opcodes that do stuff required, i made a mistake .. just has 10, 20, 30, 40 byte chunks of junk code that sometimes looks like real code, and alters registers, but basically does nothing .. just like icydee said :-)
looks a lot trickier to remove than the safedisc junk code (which imhotep really makes a fuckin mess of (misses 50% of junk, removes 10% of good code & an internal exception if i select 3 sections to imhoptamize at the same time from a fully decrypted dll))
; copylok junk code unjunked by hand
00618261 cmp dword ptr [ebp-4BCh], 0
00618268 jnz near ptr byte_6182F1
0061826E mov edx, dword ptr ds:unk_6597D5 ; junk
00618274 jnz short loc_618277 ; junk
00618276 db 0B9h ; ¦ ; mov ecx, aaaabbbb
00618277 loc_618277: ; CODE XREF: icd1:00618274j
00618277 xor eax, eax ; aaaa
00618279 xor ecx, ecx ; bbbb
0061827B jz short loc_61827E ; junk
0061827D cdq ; junkie
0061827E loc_61827E: ; CODE XREF: icd1:0061827Bj
0061827E mov ebx, 425D0C23h ; junk

00618283 mov edx, ds:dword_65BB84 ; junk
00618289 clc ; etc.
0061828A dec ecx ; etc.
0061828B clc ; etc..
0061828C mov ecx, [ebp-114h]
00618292 mov edx, [ecx+0Ch]
00618295 add edx, [ebp-2E0h]
0061829B push edx
0061829C call sub_60B97A
same code 'deobfuscated' by hand
00618261 cmp dword ptr [ebp-4BCh], 0
00618268 jnz near ptr byte_6182F1
0061826E db 8Bh, 15h, 0D5h, 97h, 65h, 0, 75h, 1, 0B9h, 33h, 0C0h
0061826E db 33h, 0C9h, 74h, 1, 99h, 0BBh, 23h, 0Ch, 5Dh, 42h, 8Bh
0061826E db 15h, 84h, 0BBh, 65h, 0, 0F8h, 49h, 0F8h
0061828C mov ecx, [ebp-114h]
00618292 mov edx, [ecx+0Ch]
00618295 add edx, [ebp-2E0h]
0061829B push edx
0061829C call sub_60B97A
looks fuckin awful :-)
you can get an example copylok file from http://ftp.gamesweb.com/pub/patches/cossacks_dvdpatch.exe
you need to 'crack' the installer to get dmcr.exe out of it though (2 minutes job reversing jumps)
dunno about any vob exe's floating around the web, try buying a game