After some hex compraing works, I provide some usual information for more skilled people to finalize the NoCopy Protection hacks for 4.0U (and maybe you can do the some work for 4.0E).
According to SoftMii package for 3.2U, the offset for NoCopy Protection are:
0x8134AA38
0x8134AA48,0x8134AA4C
0x8134AA50,0x8134AA54
0x81350370
0x813BD0F0
0x815992E8
Using 00000043.app (3.2U), original 00000073.app (4.0U), StartPatched 00000073.app and current 4.0U hacks.ini, some usual information are provided as follows:
1. 00000043.app loaded at memory address 0x8132FAE0 if treated as binary and loaded directly
2. 00000073.app loaded at 0x8132FA88 if treated as binary and loaded directly
3. offset 0x8134AA38-0x8134AA54(3.2U) seem to be at 1AF58(43.app) or 1E700(73.app) or 0x8134E188(4.0U) -- note(1)
4. offset 0x81350370(3.2U) seems to be at 20890(43.app) or 24318(73.app) or 0x81353DA0(4.0U)
5. offset 0x813BD0F0(3.2U) seems to be at 8D610(43.app) and related to 951A8(73.app) note(2)
6. offset 0x815992E8(3.2U) seems to be at 269808(43.app) or292024(73.app) or 0x815C1AAC(4.0U)
note(1). The code in 0x8134AA48(3.2U) is not exactly the same with 0x8134E148(4.0U). Seems to be jump offset differences. Reverse/Disassemble required.
note(2). The code in 0x813BD0F0(3.2U) is different from 0x815C1AAC(4.0U), but the code around are the same. I think reverse/disassemble would solve it.
It would be great if anyone could do the further jobs. And also I would like to know which utility is better to disassemble the .app ?
--------------------------------------------------------------
The final workable offsets/values for NoCopy are there:
http://gbatemp.net/index.php?showtopic=146137
According to SoftMii package for 3.2U, the offset for NoCopy Protection are:
0x8134AA38
0x8134AA48,0x8134AA4C
0x8134AA50,0x8134AA54
0x81350370
0x813BD0F0
0x815992E8
Using 00000043.app (3.2U), original 00000073.app (4.0U), StartPatched 00000073.app and current 4.0U hacks.ini, some usual information are provided as follows:
1. 00000043.app loaded at memory address 0x8132FAE0 if treated as binary and loaded directly
2. 00000073.app loaded at 0x8132FA88 if treated as binary and loaded directly
3. offset 0x8134AA38-0x8134AA54(3.2U) seem to be at 1AF58(43.app) or 1E700(73.app) or 0x8134E188(4.0U) -- note(1)
4. offset 0x81350370(3.2U) seems to be at 20890(43.app) or 24318(73.app) or 0x81353DA0(4.0U)
5. offset 0x813BD0F0(3.2U) seems to be at 8D610(43.app) and related to 951A8(73.app) note(2)
6. offset 0x815992E8(3.2U) seems to be at 269808(43.app) or
note(1). The code in 0x8134AA48(3.2U) is not exactly the same with 0x8134E148(4.0U). Seems to be jump offset differences. Reverse/Disassemble required.
note(2). The code in 0x813BD0F0(3.2U) is different from 0x815C1AAC(4.0U), but the code around are the same. I think reverse/disassemble would solve it.
It would be great if anyone could do the further jobs. And also I would like to know which utility is better to disassemble the .app ?
--------------------------------------------------------------
The final workable offsets/values for NoCopy are there:
http://gbatemp.net/index.php?showtopic=146137