Jump to content
Sign in to follow this  
mamo434376

UnpackME //KoiVM [Mod]

Recommended Posts

Spoiler

key: "QX4444d4sad6777X78555555FFFFFFFFFFFFFFFFFFFFFFFF" (sorry, this forum doesn't have spoiler tag!)

how: Easy, i just debug it and got the key 😄

 

Share this post


Link to post
On 1/17/2020 at 8:47 PM, RezaHNA said:
  Reveal hidden contents

key: "QX4444d4sad6777X78555555FFFFFFFFFFFFFFFFFFFFFFFF" (sorry, this forum doesn't have spoiler tag!)

how: Easy, i just debug it and got the key 😄

 

nice unpacked file ?

You're just not stupid enough to find key, are you?  (don't be taken)
it says already open the package.

me too can find the key too 🙂

Edited by mamo434376
  • Downvote 2

Share this post


Link to post

all .net virtualizers (VMProtect, Koi etc...) using methodbase for 'call' opcode handler, so they all easily can be cracked but writing a devirtualizer need alot of time and effort, also nobody is stupid to waste time on a double virtualized target like this (VMProtect on top of Koi) except when the target worth it, which in this case doesn't.

I'm not wasting my time on some scriptkiddie who don't know how to respect others work, im done here.

BR.

Share this post


Link to post

The tone of the conversation was escalating quickly towards a known end, let's move on.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...