Since software protectors were born, many attackers have centered most of their efforts on attacking the software protectors themselves instead of the applications. Many tools have been developed that aid in the attacking of software protectors. These attacks often result in the attacker obtaining the original application that is decrypted and has the protection wrapper removed.
The main problem with software protectors is that they use protection techniques very well known by crackers, so they can be easily bypassed with traditional cracking tools.
Another important problem in software protectors is that they have restricted execution by the operating system, that is, they run with normal application privileges. Because of this attackers can use cracking tools that run at the same priority level as the operating system allowing them to fully supervise what a software protector is doing at a certain time and attack it in specific places.
Something new to decode virtualized code.
Usually these sections are important enough that the game developer wants to hide in the client so they are probably important for at least something; client authentication, etc.
Now you can decode these sections with an IDA Plug-in this guy made:
DeCV — a decompiler for Code Virtualizer by Oreans
https://github.com/pakt/decv