Results 1 to 3 of 3
  1. #1
    WASDtomove123's Avatar
    Join Date
    May 2019
    Gender
    male
    Posts
    15
    Reputation
    10
    Thanks
    0

    Unpacking a VM protected exe using LCF-AT's script.

    Hello, kind of a newbie here lol.

    So I have this executable I'm looking to "crack", see, it doesn't function unless it gets authentication from its server, and I'm trying to get it to skip that, doing something you guys call 'reverse engineering'. My problem is that it is VMprotected. and all guides to unpack VMprotect are rare, and mostly App-specific.
    So I'm looking if someone can help me with that, since that would be great, I'm not looking for someone to do the work for me or anything. Just if someone has a little bit of free time and is willing to help me out with a thing or two :p
    My experience with debugging is fairly recent, but I have managed to get some software such as 'PowerIso' and some other low-no security apps

    Again the only problem I have is with unpacking, that I have spent hours with but with no success.

    That's all I have to say, hope someone replies ;p

  2. #2
    MikeRohsoft's Avatar
    Join Date
    May 2013
    Gender
    male
    Location
    Los Santos
    Posts
    783
    Reputation
    508
    Thanks
    23,572
    My Mood
    Paranoid
    The reasson u don't find a universal "How to do it" is because for ussual it is not possible.
    The Software Producer get paid for exactly the Feature that it is protected, after Virtualizing with it.
    They need to "crack" the specific VMWare Versions find out how it interprets the assembly output after it, then u can technically decode every Program which were virtualized by it

  3. #3
    WASDtomove123's Avatar
    Join Date
    May 2019
    Gender
    male
    Posts
    15
    Reputation
    10
    Thanks
    0
    Quote Originally Posted by MikeRohsoft View Post
    The reasson u don't find a universal "How to do it" is because for ussual it is not possible.
    The Software Producer get paid for exactly the Feature that it is protected, after Virtualizing with it.
    They need to "crack" the specific VMWare Versions find out how it interprets the assembly output after it, then u can technically decode every Program which were virtualized by it
    People have found ways to crack VMP 3.xx and VMP 1.x and 2.x
    I'm going to use LCF-AT's script to try to unpack the .exe assuming it is 1.x or 2.x, except for the fact that info on how to use it is sparse and vague.
    Everyone in the cracking community probably knows one way or another to bypass every single version of VMP available, except I do not know how to reach out to someone of such expertise.
    TBH if someone would take a look at the debugged executable, since it is just a loop of 'TEST' and 'JMP' any other useful info is VMProtected.

Similar Threads

  1. [Release] unpacked cshell.dll & crossfire.exe [EU]
    By giniyat101 in forum CrossFire Europe Hack Source Code
    Replies: 25
    Last Post: 08-19-2012, 04:10 PM
  2. [Patched] Unpacked cshell.dll & crossfire.exe (4/7/2012)
    By giniyat101 in forum CrossFire Hack Coding / Programming / Source Code
    Replies: 28
    Last Post: 08-01-2012, 09:34 PM
  3. [Help] Help on how to make a shortcut key on desktop for your launcher.exe- USING AUTOIT
    By acedia in forum CrossFire Hack Coding / Programming / Source Code
    Replies: 8
    Last Post: 07-29-2012, 06:28 AM
  4. [Help] Cheating program Recoil.exe Use in Chinese AVA
    By LDX123 in forum Alliance of Valiant Arms (AVA) Coding / Source Code
    Replies: 3
    Last Post: 11-08-2011, 02:06 PM
  5. Can We inject Pointblank.exe using 2 PC
    By azistrust in forum Point Blank Hacks
    Replies: 7
    Last Post: 09-29-2011, 07:08 AM