
Code Virtualizer [3.1.6.0] (15-Aug-2023) |
|
[+] |
Added Hardware-enforced Stack Protection support (Advanced Option "OPTION_ADVANCED_HARDWARE_STACK_PROTECTION_COMPATIBLE=YES") |
[+] |
Improved protection in all virtual machine architectures |
[+] |
Added multi-core support when mutating VM handlers (like in FISH BLACK VM) |
[+] |
Added detection of missing MAP functions to virtualize to stop the protection process |
[+] |
Added Advanced Option "OPTION_ADVANCED_VM_ENGINE_PRESERVE_FLAGS_ON_EXIT=NO" |
[+] |
ELF: Improved support with specific ELF files |
[+] |
ARM64: Added FISH LONDON VM for ARM64 |
[+] |
ARM64: Added TIGER LONDON VM for ARM64 |
[+] |
ARM64: Added TIGER EXTREME VM for ARM64 |
[+] |
ARM64: Added FISH EXTREME VM for ARM64 |
[+] |
ARM64:Improved performance mutating ARM64 opcodes |
[+] |
ARM64: Added support for Embarcadero Delphi ARM64 |
[+] |
ARM64: Added support to jump in the middle of the virtualized code from code outside of macro markers |
[+] |
ARM64: Improved virtualization of MOVK opcode |
[+] |
ARM64: Improved virtualization accuracy for the TBZ and TBNZ opcodes when testing the 31st bit position |
[+] |
ARM64: Improved support when handling not recognized instructions |
[+] |
ARM64: Enhanced performance parsing the file to protect |
[+] |
ARM64: Mach-O: Added support to link with the SDK via function names instead of inline assembly |
[+] |
ARM64: ELF: Added support to link with the SDK via function names instead of inline assembly |
[+] |
ARM64: Updated Delphi include files |
[+] |
ARM64: Added multi-core support to search for protection macros |
[!] |
Fixed minor GUI issue when no selected any file to protect |
[!] |
ELF: Fixed issue where unselected protection macros were still processed |
[!] |
ELF: Fixed compatibility issue finding protection macros in Golang binaries |
[!] |
ARM64: Minor bugs fixed when parsing Mach-O and ELF files |
[!] |
ARM64: Fixed virtualization of Load Unscaled instructions |
[!] |
ARM64: Fixed virtualization of LDURSW instruction |
[!] |
ARM64: Fixed virtualization of MADD with same destination and source registers |
[!] |
ARM64: Fixed virtualization of arithmetic operation with 64-bit immediate operand |
[!] |
ARM64: Fixed wrong opcode mutation when generating FISH BLACK VM for ARM64 |
[!] |
ARM64: Fixed random exception when disassembling invalid opcodes |
[!] |
Minor bugs fixed |
Code Virtualizer [3.1.5.0] (24-Jul-2023) |
|
[+] |
Added ARM64 native protection. Available for free at www.oreans.com/Release/VirtualizerArm64Install.exe |
[+] |
Added support for virtualization protection macro markers in .NET Native AOT binaries |
[+] |
ELF: Added insertion of protection code in new sections |
[+] |
Mach-O: Added insertion of protection code in new sections |
[+] |
Improved parsing of MAP files |
[+] |
Added MAP parsing for Mach-O files |
[+] |
Added Advanced Option "OPTION_ADVANCED_NO_EXECUTABLE_WRITABLE_SECTION" |
[+] |
Added option "FindMacrosSkipJmpIat" |
[+] |
Added option "FindStringsLeaSupport" |
[+] |
Added command line argument "/str_encrypt_locale" |
[+] |
Added command line argument "/str_encrypt_in_data_section_only" |
[+] |
Added command line argument "/find_macros_with_indirect_jumps" |
[+] |
Added command line argument "/find_macros_skip_call_imm" |
[+] |
Added command line argument "/find_macros_skip_jmp_iat" |
[+] |
Added command line argument "/find_macros_skip_jmp_iat" |
[!] |
x64: Fixed virtualization of "LEA REG32, [REG32 + REG32 * scale]" in TIGER VM |
[!] |
x64: Fixed virtualization of "LEA REG16, [REG16 + REG16 * scale]" in TIGER VM |
[!] |
Fixed very specific bug when protecting multiple applications without closing the User Interface |
[!] |
Fixed exception when the application to protect is locked by another process while protecting |
Code Virtualizer [3.1.4.0] (10-Nov-2022) |
|
[+] |
Improved parallel protection |
[+] |
Added LION VM for Visual Basic 6 applications |
[+] |
Increased maximum of manual insertion of macros (via RVA address) up to 5000 |
[+] |
Added option to avoid specific code sequences when searching for protection markers |
[+] |
Optimized memory allocation for with multi-core protection |
[+] |
Added option "FindMacrosWithIndirectJumps" to find for indirect calls/jumps to protection macros |
[!] |
Fixed compatibility issue virtualizing specific memory access instructions |
[!] |
Linux: Fixed compatibility issue with ELF64 files |
[!] |
Minor bugs fixed |
Code Virtualizer [3.1.3.0] (26-Apr-2022) |
|
[+] |
Improved detection of protection macros with specific compiler optimizations |
[+] |
Improved exception handling inside virtualized code |
[+] |
Improved processing of relocations in specific DLLs |
[!] |
Fixed compatibility issue running Virtualizer.exe under Linux/Wine |
[!] |
Fixed exception processing MAP functions to virtualize from command line protection |
[!] |
Fixed construction of Exception directory with re-virtualized VMs |
[!] |
x64: Fixed deadlock when exception happened in virtualized code |
[!] |
Fixed exception on specific Windows 11 computers when protecting via the User Interface |
[!] |
Minor bugs fixed |
Code Virtualizer [3.1.2.0] (15-Aug-2021) |
|
[+] |
Added new Virtual Machine: "LION VM" |
[+] |
Improved GCC Map file parser |
[+] |
Memory optimizations when parsing big binaries to protect |
[!] |
Fixed out of memory exception processing applications with huge Exception Directory |
SEE ALL VERSIONS