wbe
July 16th, 2002, 21:42
Latest aspr tricks
Looking for an asprotected app to see what was new with it after some time. I found a fresh one from AHAsoft. Knowing they were a dedicated customer of aspr, I downloaded it immediately.
Well, as +SplAj posted a few days ago (GetSystemTime-randomizer thread), aspr has a "hopping POPAD" this time, LOL. This reminded me the frequency hopping trick used on military radios to restrain channel tapping. Then I checked what was new with the ReqQueryValueExA trick. This time, it writes the date used/# of times used values (binary) under HKCU\Software\Asprotect\Data. Deleting them does not fool aspr. If it can't see them there it checks hundreds of (may be a thousand) CLSID values. Lol, this is absolutely better than killing Regmon alone. The two inline patchers fail on this version of aspr either. Good work, Alexey's raising his standards.
Anyway, I thought this may draw some attention. And, yes, it works fine.
wbe
Looking for an asprotected app to see what was new with it after some time. I found a fresh one from AHAsoft. Knowing they were a dedicated customer of aspr, I downloaded it immediately.
Well, as +SplAj posted a few days ago (GetSystemTime-randomizer thread), aspr has a "hopping POPAD" this time, LOL. This reminded me the frequency hopping trick used on military radios to restrain channel tapping. Then I checked what was new with the ReqQueryValueExA trick. This time, it writes the date used/# of times used values (binary) under HKCU\Software\Asprotect\Data. Deleting them does not fool aspr. If it can't see them there it checks hundreds of (may be a thousand) CLSID values. Lol, this is absolutely better than killing Regmon alone. The two inline patchers fail on this version of aspr either. Good work, Alexey's raising his standards.
Anyway, I thought this may draw some attention. And, yes, it works fine.
wbe