Rating: 4.0

```
root@xored:/tmp# file data.txt.tar.xz
data.txt.tar.xz: XZ compressed data
root@xored:/tmp# tar xf data.txt.tar.xz
root@xored:/tmp# file data.txt
data.txt: ASCII text, with very long lines, with no line terminators
root@xored:/tmp# cat data.txt | xxd -r -p > misc315
root@xored:/tmp# file misc315
misc315: lzip compressed data, version: 1
root@xored:/tmp# lunzip misc315
root@xored:/tmp# file misc315.out
misc315.out: POSIX tar archive
root@xored:/tmp# tar xvf misc315.out
What.exe
root@xored:/tmp# file What.exe
What.exe: PE32 executable (GUI) Intel 80386, for MS Windows
```

**The file is a Windows Executable file; Protected with VMProtect. After Extracting file resources we found a gif file. We can obtain flag.png by appending gif frames in extracted order.**

```
root@xored:/tmp# convert +append *.gif flag.png
```
flag: bc52fead1ecb908ea9ae98b105809b71

Original writeup (https://github.com/irGeeks/ctf/tree/master/2016-SharifCTF7/Misc/what_is_hidden).