Difficulty : 8
Language : C++
Platform : Windows 32-bit and 64-bit
OS Version : All
Packer / Protector : VMProtect 3.0.9
The objective is to interpret virtualized functions in the attached binaries.
No additional options have been used - no memory protection, no import protection and no compression.
The virtualized function(s) will execute when the following key(s) is/are pressed:
VMP32 (V1) : P
VMP32 (V2) : 1 and 2
VMP64 (V1) : P
VMP64 (V2) : 1 and 2
The virtualized functions are not very large.
Detailed information of the interpreting procedure/internals or a complete solution paper is preferable.
I will post similar challenges for other protectors if someone supplies me with a recent version (CodeVirtualizer,
Themida, Enigma ...).