破解资源 
首页 > 破解资源 > 浏览文章

分析一个.NET CM

(编辑:jimmy 日期: 2024/11/16 浏览:3 次 )

原文链接:https://www.52pojie.cn/thread-1608459-1-1.html
一、准备工作
目标软件是一个加了VMP并开启虚拟化及代码变异,脱壳过程略,直接看脱壳的结果
分析一个.NET CM

11.png


可以看到关键地方全部被虚拟化了,关于虚拟化处理起来我还没有很好的解决方案
二、去除反调试
timer1里有进程检测反调试,每2秒检测是否包含{“dnSpy”,“de4dot”,“64”,“32”,“ExtremeDumper”}字样,将timer1时钟设置为flase即可关闭检测
分析一个.NET CM

22.png


de4dot直接修改会清除vmp区段,这里我直接跳转到16禁止去c32修改的,将0xC98F6这里修改为0就可以啦
分析一个.NET CM

33.png


三、追码
解决反调试后我找了个软件来帮助解决虚拟化代码的问题,下面贴软件生成的log
[Asm] 纯文本查看 复制代码
2022-03-23 13:19:42.639 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.639 +08:00 [WRN] {2022-03-23 13:19:42.640 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.640 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.640 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.640 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.640 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.640 +08:00 [VRB]         Parameter (System.String) [0]: ("0")2022-03-23 13:19:42.640 +08:00 [VRB]         Parameter (System.String) [1]: ("D")2022-03-23 13:19:42.641 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.641 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.641 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.641 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.641 +08:00 [WRN] }2022-03-23 13:19:42.641 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.641 +08:00 [WRN] {2022-03-23 13:19:42.641 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.641 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.641 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.641 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.641 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.641 +08:00 [VRB]         Parameter (System.String) [0]: ("8")2022-03-23 13:19:42.641 +08:00 [VRB]         Parameter (System.String) [1]: ("C")2022-03-23 13:19:42.641 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.642 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.642 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.642 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.642 +08:00 [WRN] }2022-03-23 13:19:42.642 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.642 +08:00 [WRN] {2022-03-23 13:19:42.642 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.642 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.642 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.643 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.643 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.643 +08:00 [VRB]         Parameter (System.String) [0]: ("7")2022-03-23 13:19:42.643 +08:00 [VRB]         Parameter (System.String) [1]: ("N")2022-03-23 13:19:42.643 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.643 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.643 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.643 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.643 +08:00 [WRN] }2022-03-23 13:19:42.643 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.643 +08:00 [WRN] {2022-03-23 13:19:42.643 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.643 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.643 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.643 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.643 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.644 +08:00 [VRB]         Parameter (System.String) [0]: ("5")2022-03-23 13:19:42.644 +08:00 [VRB]         Parameter (System.String) [1]: ("Q")2022-03-23 13:19:42.644 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.644 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.644 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.644 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.644 +08:00 [WRN] }2022-03-23 13:19:42.644 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.644 +08:00 [WRN] {2022-03-23 13:19:42.644 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.644 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.644 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.644 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.644 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.644 +08:00 [VRB]         Parameter (System.String) [0]: ("6")2022-03-23 13:19:42.645 +08:00 [VRB]         Parameter (System.String) [1]: ("R")2022-03-23 13:19:42.645 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.645 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.645 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.645 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.645 +08:00 [WRN] }2022-03-23 13:19:42.645 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.645 +08:00 [WRN] {2022-03-23 13:19:42.645 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.645 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.645 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.645 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.645 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.645 +08:00 [VRB]         Parameter (System.String) [0]: ("L")2022-03-23 13:19:42.645 +08:00 [VRB]         Parameter (System.String) [1]: ("4")2022-03-23 13:19:42.646 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.646 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.646 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.646 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.646 +08:00 [WRN] }2022-03-23 13:19:42.646 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.646 +08:00 [WRN] {2022-03-23 13:19:42.646 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.646 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.646 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.646 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.646 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.646 +08:00 [VRB]         Parameter (System.String) [0]: ("A")2022-03-23 13:19:42.646 +08:00 [VRB]         Parameter (System.String) [1]: ("2")2022-03-23 13:19:42.646 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.647 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.647 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.647 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.647 +08:00 [WRN] }2022-03-23 13:19:42.647 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.647 +08:00 [WRN] {2022-03-23 13:19:42.647 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.647 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.647 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.647 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.647 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.647 +08:00 [VRB]         Parameter (System.String) [0]: ("B")2022-03-23 13:19:42.647 +08:00 [VRB]         Parameter (System.String) [1]: ("3")2022-03-23 13:19:42.647 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.647 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.648 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.648 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.648 +08:00 [WRN] }2022-03-23 13:19:42.648 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.648 +08:00 [WRN] {2022-03-23 13:19:42.648 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.648 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.648 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.648 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.648 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.648 +08:00 [VRB]         Parameter (System.String) [0]: ("E")2022-03-23 13:19:42.648 +08:00 [VRB]         Parameter (System.String) [1]: ("0")2022-03-23 13:19:42.648 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.648 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.649 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.649 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.649 +08:00 [WRN] }2022-03-23 13:19:42.649 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.649 +08:00 [WRN] {2022-03-23 13:19:42.649 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.649 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.649 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.649 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.649 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.649 +08:00 [VRB]         Parameter (System.String) [0]: ("F")2022-03-23 13:19:42.649 +08:00 [VRB]         Parameter (System.String) [1]: ("1")2022-03-23 13:19:42.649 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.649 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.649 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.650 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.650 +08:00 [WRN] }2022-03-23 13:19:42.650 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.650 +08:00 [WRN] {2022-03-23 13:19:42.650 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.650 +08:00 [VRB]         MethodName: Replace2022-03-23 13:19:42.650 +08:00 [VRB]         FullDescription: System.String System.String::Replace(System.String oldValue, System.String newValue)2022-03-23 13:19:42.650 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.650 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.650 +08:00 [VRB]         Parameter (System.String) [0]: ("M")2022-03-23 13:19:42.650 +08:00 [VRB]         Parameter (System.String) [1]: ("9")2022-03-23 13:19:42.651 +08:00 [VRB]         MDToken: 0x60005422022-03-23 13:19:42.651 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.651 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.651 +08:00 [VRB]         Returns: D93D3311D3NN2C9D213DC21DR1QD92342022-03-23 13:19:42.651 +08:00 [WRN] }2022-03-23 13:19:42.651 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.651 +08:00 [WRN] {2022-03-23 13:19:42.651 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.651 +08:00 [VRB]         MethodName: ToArray2022-03-23 13:19:42.651 +08:00 [VRB]         FullDescription: static System.Char[] System.Linq.Enumerable::ToArray(System.Collections.Generic.IEnumerable`1<System.Char> source)2022-03-23 13:19:42.651 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.651 +08:00 [VRB]         Parameter (System.String) [0]: ("D93D3311D3NN2C9D213DC21DR1QD9234")2022-03-23 13:19:42.651 +08:00 [VRB]         MDToken: 0x6000B6F2022-03-23 13:19:42.651 +08:00 [VRB]         Return Type: System.Char[]2022-03-23 13:19:42.652 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.652 +08:00 [VRB]         Returns: ["D","9","3","D","3","3","1","1","D","3","N","N","2","C","9","D","2","1","3","D","C","2","1","D","R","1","Q","D","9","2","3","4"]2022-03-23 13:19:42.652 +08:00 [WRN] }2022-03-23 13:19:42.652 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.652 +08:00 [WRN] {2022-03-23 13:19:42.652 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.652 +08:00 [VRB]         MethodName: get_Length2022-03-23 13:19:42.652 +08:00 [VRB]         FullDescription: System.Int32 System.String::get_Length()2022-03-23 13:19:42.652 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.652 +08:00 [VRB]         Obj: "D93D3311D3NN2C9D213DC21DR1QD9234"2022-03-23 13:19:42.653 +08:00 [VRB]         MDToken: 0x60004D22022-03-23 13:19:42.653 +08:00 [VRB]         Return Type: System.Int322022-03-23 13:19:42.653 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.653 +08:00 [VRB]         Returns: 322022-03-23 13:19:42.653 +08:00 [WRN] }2022-03-23 13:19:42.653 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.653 +08:00 [WRN] {2022-03-23 13:19:42.653 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.653 +08:00 [VRB]         MethodName: smethod_02022-03-23 13:19:42.653 +08:00 [VRB]         FullDescription: static System.Void 7B4E5853::smethod_0(System.Array array_0, System.Int32 int_0, System.Int32 int_1)2022-03-23 13:19:42.653 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.653 +08:00 [VRB]         Parameter (System.Char[]) [0]: (Char[] {D, 9, 3, D, 3, 3, 1, 1, D, 3, N, N, 2, C, 9, D, 2, 1, 3, D, C, 2, 1, D, R, 1, Q, D, 9, 2, 3, 4})2022-03-23 13:19:42.653 +08:00 [VRB]         Parameter (System.Int32) [1]: (0)2022-03-23 13:19:42.653 +08:00 [VRB]         Parameter (System.Int32) [2]: (32)2022-03-23 13:19:42.654 +08:00 [VRB]         MDToken: 0x60000942022-03-23 13:19:42.654 +08:00 [VRB]         Return Type: System.Void2022-03-23 13:19:42.654 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.654 +08:00 [VRB]         Returns: null2022-03-23 13:19:42.654 +08:00 [WRN] }2022-03-23 13:19:42.654 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.654 +08:00 [WRN] {2022-03-23 13:19:42.654 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.654 +08:00 [VRB]         MethodName: smethod_02022-03-23 13:19:42.654 +08:00 [VRB]         FullDescription: static System.Object 37891AB0::smethod_0()2022-03-23 13:19:42.654 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.654 +08:00 [VRB]         MDToken: 0x60000492022-03-23 13:19:42.654 +08:00 [VRB]         Return Type: System.Object2022-03-23 13:19:42.654 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.654 +08:00 [VRB]         Returns: 2022-03-23 13:19:42.655 +08:00 [WRN] }2022-03-23 13:19:42.657 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.657 +08:00 [WRN] {2022-03-23 13:19:42.657 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.657 +08:00 [VRB]         MethodName: smethod_02022-03-23 13:19:42.657 +08:00 [VRB]         FullDescription: static System.Text.StringBuilder 1C814297::smethod_0(System.Object object_0, System.Char[] char_0)2022-03-23 13:19:42.657 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.658 +08:00 [VRB]         Parameter (System.Text.StringBuilder) [0]: ()2022-03-23 13:19:42.658 +08:00 [VRB]         Parameter (System.Char[]) [1]: (Char[] {4, 3, 2, 9, D, Q, 1, R, D, 1, 2, C, D, 3, 1, 2, D, 9, C, 2, N, N, 3, D, 1, 1, 3, 3, D, 3, 9, D})2022-03-23 13:19:42.658 +08:00 [VRB]         MDToken: 0x60000402022-03-23 13:19:42.658 +08:00 [VRB]         Return Type: System.Text.StringBuilder2022-03-23 13:19:42.658 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.658 +08:00 [VRB]         Returns: 4329DQ1RD12CD312D9C2NN3D1133D39D2022-03-23 13:19:42.658 +08:00 [WRN] }2022-03-23 13:19:42.658 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.658 +08:00 [WRN] {2022-03-23 13:19:42.659 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.659 +08:00 [VRB]         MethodName: ToString2022-03-23 13:19:42.659 +08:00 [VRB]         FullDescription: virtual System.String System.Object::ToString()2022-03-23 13:19:42.659 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.659 +08:00 [VRB]         Obj: 4329DQ1RD12CD312D9C2NN3D1133D39D2022-03-23 13:19:42.659 +08:00 [VRB]         MDToken: 0x600022A2022-03-23 13:19:42.659 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.659 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.659 +08:00 [VRB]         Returns: 4329DQ1RD12CD312D9C2NN3D1133D39D2022-03-23 13:19:42.659 +08:00 [WRN] }2022-03-23 13:19:42.659 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.659 +08:00 [WRN] {2022-03-23 13:19:42.659 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.660 +08:00 [VRB]         MethodName: smethod_02022-03-23 13:19:42.660 +08:00 [VRB]         FullDescription: static System.String 680A5711::smethod_0(System.Object object_0)2022-03-23 13:19:42.660 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.660 +08:00 [VRB]         Parameter (System.Windows.Forms.TextBox) [0]: (System.Windows.Forms.TextBox, Text: 1245)2022-03-23 13:19:42.660 +08:00 [VRB]         MDToken: 0x60000222022-03-23 13:19:42.660 +08:00 [VRB]         Return Type: System.String2022-03-23 13:19:42.660 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.660 +08:00 [VRB]         Returns: 12452022-03-23 13:19:42.660 +08:00 [WRN] }2022-03-23 13:19:42.660 +08:00 [INF] VmProtectDumperUnsafeInvoke Prefix:2022-03-23 13:19:42.660 +08:00 [WRN] {2022-03-23 13:19:42.660 +08:00 [VRB]         VMP MethodName: System.Void Crackme.Form1::textBox2_TextChanged(System.Object sender, System.EventArgs e) (MDToken 0x100663302)2022-03-23 13:19:42.660 +08:00 [VRB]         MethodName: smethod_02022-03-23 13:19:42.660 +08:00 [VRB]         FullDescription: static System.Boolean 094923F6::smethod_0(System.String string_0, System.String string_1)2022-03-23 13:19:42.661 +08:00 [VRB]         MethodType: System.Reflection.RuntimeMethodInfo2022-03-23 13:19:42.661 +08:00 [VRB]         Parameter (System.String) [0]: ("1245")2022-03-23 13:19:42.661 +08:00 [VRB]         Parameter (System.String) [1]: ("4329DQ1RD12CD312D9C2NN3D1133D39D")2022-03-23 13:19:42.661 +08:00 [VRB]         MDToken: 0x600003A2022-03-23 13:19:42.661 +08:00 [VRB]         Return Type: System.Boolean2022-03-23 13:19:42.661 +08:00 [INF] VmProtectDumperUnsafeInvoke Result:2022-03-23 13:19:42.661 +08:00 [VRB]         Returns: false2022-03-23 13:19:42.661 +08:00 [WRN] }

我的机器码为4B29D5F6EFA8EB1AE98277BE1FB30B90,此时正确的key为D93D3311D3NN2C9D213DC21DR1QD9234
分析一个.NET CM

44.png


四、分析算法
借助于软件的log分析起来应该不难,直接贴注册机成品算法了
首先是机器码的算法
[C#] 纯文本查看 复制代码
                public string doIt()                {                                                string text = null;                        foreach (ManagementBaseObject managementBaseObject in new ManagementClass("Win32_NetworkAdapterConfiguration").GetInstances())                        {                                ManagementObject managementObject = (ManagementObject)managementBaseObject;                                if (Convert.ToBoolean(managementObject["IPEnabled"]))                                {                                        text = managementObject["MacAddress"].ToString();                                        text = text.Replace(':', '-');                                }                                managementObject.Dispose();                        }                        return text;                }                public string run(string str)                {                        return BitConverter.ToString(new MD5CryptoServiceProvider().ComputeHash(Encoding.UTF8.GetBytes(str))).Replace("-", "");                }                                private void Form1_Load(object sender, EventArgs e)        {                        textBox1.Text = run(doIt().Replace("-", ""));                }

下面是注册机的算法
[C#] 纯文本查看 复制代码
   private void button1_Click(object sender, EventArgs e)        {                        string text;                        text = textBox1.Text.Replace("0","D");                        text = text.Replace("8", "C");                        text = text.Replace("7", "N");                        text = text.Replace("5", "Q");                        text = text.Replace("6", "R");                        text = text.Replace("L", "4");                        text = text.Replace("A", "2");                        text = text.Replace("B", "3");                        text = text.Replace("E", "0");                        text = text.Replace("F", "1");                        text = text.Replace("M", "9");                        textBox2.Text = ReverseA(text);        }                public string ReverseA(string text)                {                        char[] cArray = text.ToCharArray();                        string reverse = String.Empty;                        for (int i = cArray.Length - 1; i > -1; i--)                        {                                reverse += cArray[i];                        }                        return reverse;                }

完活@Domado

上一篇:看电子书的软件极速PDF阅读器
下一篇:2021新手学破解,第一次被反调试“调戏”,与压缩包密码破解玩一宿
一句话新闻
微软与英特尔等合作伙伴联合定义“AI PC”:键盘需配有Copilot物理按键
几个月来,英特尔、微软、AMD和其它厂商都在共同推动“AI PC”的想法,朝着更多的AI功能迈进。在近日,英特尔在台北举行的开发者活动中,也宣布了关于AI PC加速计划、新的PC开发者计划和独立硬件供应商计划。
在此次发布会上,英特尔还发布了全新的全新的酷睿Ultra Meteor Lake NUC开发套件,以及联合微软等合作伙伴联合定义“AI PC”的定义标准。
友情链接:杰晶网络 DDR爱好者之家 南强小屋 黑松山资源网 白云城资源网 网站地图 SiteMap