BUMP - just want to know if anybody has successfully used against any Themida 2.4 target.
Has anybody used this method against Themida 2.4?
I successfully unpacked an app protected by earlier Themida.
Now I am attempting unpacking of app protected by Themida 2.4
Some of the script popups are not appearing as expected (specifically, the very first popup during the first run - it does not appear... the application simply continues to run as normal), however, the script does produce a dump (unpacked) executable.
Upon running the unpacked version, however, it crashes with "... instruction at... referenced memory... The memory could not be read."
If anybody has successfully unpacked an app protected by Themida 2.4, did you use this method? Did the process go as outlined in the instructions? Did you do anything differently?