本帖最后由 gksj 于 2024-7-28 12:00 编辑
缺文件,没有上下文数据何谈解密呢?
这种控制流混淆我还是建议只解密字符串,想彻底去除控制流混淆估计是挺费劲.
只要不是为了抄代码没必要折腾控制流混淆.
[Asm] 纯文本查看 复制代码 Command line : "E:\52pojie\UsbMonitor.exe" -p un --strtyp delegate --strtok 0x0600007D
Starting de4dot
Process started
----------------
de4dot v3.1.41592.3405 Copyright (C) 2011-2015 [url=mailto:de4dot@gmail.com]de4dot@gmail.com[/url]
Latest version and source code: [url=https://github.com/0xd4d/de4dot]https://github.com/0xd4d/de4dot[/url]
Detected Unknown Obfuscator (E:\52pojie\UsbMonitor.exe)
Cleaning E:\52pojie\UsbMonitor.exe
Renaming all obfuscated symbols
Saving E:\52pojie\UsbMonitor-cleaned.exe
----------------
Process exited
[Asm] 纯文本查看 复制代码 E:\Easy_de4dot>de4dot-x64.exe "E:\52pojie\UsbMonitor-cleaned.exe" --only-cflow-deob
de4dot v3.1.41592.3405 Copyright (C) 2011-2015 [email]de4dot@gmail.com[/email]
Latest version and source code: [url]https://github.com/0xd4d/de4dot[/url]
Detected Dotfuscator (E:\52pojie\UsbMonitor-cleaned.exe)
Cleaning E:\52pojie\UsbMonitor-cleaned.exe
Saving E:\52pojie\UsbMonitor-cleaned-cleaned.exe
E:\Easy_de4dot> |