HellSpider Posted December 20, 2014 Posted December 20, 2014 Hi. I made some UnpackMe styled executables protected by the latest demo version of CodeVirtualizer (2.0.8.0). Each executable contains one function virtualized by a different virtual machine setting. The different virtual machines used are: - FISH32 Black- TIGER32 Black- PUMA32 Black- SHARK32 Black The virtualized functions are very short, approximately 20 asm instructions. No other protections are used. The virtualized function will execute when F1 is pressed.codevirtualizer_2.0.8.0_demo_devirtualizeme.rar
Solution koolk Posted January 10, 2015 Solution Posted January 10, 2015 It was a great opportunity to test my tools. But it was better if you made the functions more unique (Since the difference between them were only few numbers, it was possible to copy the code from one to another and manually fix those numbers, which may be easier than decompiling them) I haven't just that method, I decompiled all of them, but just a note for next time decompiled.zip
HellSpider Posted January 10, 2015 Author Posted January 10, 2015 Everything seems to match. Good job! Uniqueness would of course be implemented in case this would be a real application or in case this would be a challenge. However, I created these files for the purpose of comparing the different new VM options for a code block as identical as possible. Thus, the only variation is in the immediate values. I figured that posting these files would be pointless as the last thread pretty much went unnoticed, but this was more than a pleasant surprise.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now