NETReactorSlayer icon indicating copy to clipboard operation
NETReactorSlayer copied to clipboard

dead code left after tool work done

Open greenozon opened this issue 3 years ago • 2 comments

Describe the bug

  1. Tool did the job smoothly, no errors reported, but the output binary has lots of fake switch/cases etc are there any chance to clean that out as well? thanks
  2. app does not start - throwing this error: An unhandled exception occurred in x.exe (16728) Exception: System.TypeInitializationException Message: The type initializer for xxx threw an exception. HResult: 0x80131534

Target obfuscated file available

Screenshots image image image

OS Version: win7 x64

Additional context latest release used version 4.0.0.0

greenozon avatar Jul 02 '22 07:07 greenozon

issue 2 as described above it due to call of public MethodBase ResolveMethod(int metadataToken) throws this kind of exception...

Tried to use the "Preseve all MD Tokens" checkbox - similar exception

Also if turned ON all the features, app still throws same exception and quits...


  Started deobfuscation: 2022-07-02 10:37:08
  Assembly: x.exe
  Architecture: X64
  CLI Started, PID: 16900
  =====================================

  [✓] 13/13 Modules loaded...
  [✓] Methods decrypted.
  [✓] 22901 Equations resolved.
  [✓] Anti tamper removed.
  [✓] Anti debugger removed.
  [✓] 794 Methods inlined.
  [✓] 18740 Hidden calls restored.
  [✓] 1 Strings decrypted.
  [!] Couldn't find any encrypted resource.
  [!] Couldn't find any embedded assembly (Costura.Fody).
  [✓] 15 Tokens decrypted.
  [!] Couldn't find any encrypted boolean.
  [!] Couldn't find any strong name removal protection.
  [✓] 4 Calls to obfuscator types removed.
  [✓] Saved to: x_Slayed.exe

greenozon avatar Jul 02 '22 07:07 greenozon

Hi, looks like the problem is about control flow deobfuscation, Send the target file from telegram: https://t.me/SychicBoy

SychicBoy avatar Jul 05 '22 01:07 SychicBoy