VMProtector replaces opcodes and whole procedures with emulated opcodes and poly obfuscation. It uses Virtual Machine to emulate replaced opcodes. So if you want to crack it, you must reverse Virtual Machine instructions and write your own dissasembler. As you can see, very hard job.
This particular app used very bad implemented VMProtector protection. Only TWO OPCODES are stolen from OEP. So, to remove protection from this VB decompiler, you need just to restore first two opcodes. App is VB , and first two opcodes in every VB app are
PUSH SlowGold.00426E90 - that points to VB5!.#* in file
CALL <JMP.&MSVBVM60.#100> - that points to first jump above PUSH.
But this program is demo and you will not gain anything with this.
All last versions of programs GPcH Soft are protected by protector DotFix NiceProtect!
Including a protector! The protector weak is removed for some seconds!
Last version VBDecompilera as is protected by this protector!
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You can attach files in this forum You can download files in this forum