At 3:40 in, really fascinating talk just a shame it'ssoo short. From what I can gather, most of the talk is a walk through of how they used the embedded scripting language to extract out the entire VMProtect unprotected. Seems they have a tool as well, anyone know if any of this was released publicly?