djkaty / Il2CppInspector

Powerful automated tool for reverse engineering Unity IL2CPP binaries
http://www.djkaty.com
GNU Affero General Public License v3.0
2.6k stars 422 forks source link

I2CI chooses huge offset #195

Open Martmists-GH opened 2 years ago

Martmists-GH commented 2 years ago

Log:

Il2CppInspector Command-Line Edition
Version 2021.1
(c) 2017-2021 Katy Coe - www.djkaty.com - www.github.com/djkaty

Using plugin: Binary file XOR decryptor
Using plugin: IL2CPP API Discovery
Using plugin: Metadata strings XOR decryptor
Using plugin: Binary metadata field order deobfuscator
Detected metadata version 24.4
ELF binary SHT contains invalid ranges - reverting to PHT
Processed 552698 relocations
Plugin Binary file XOR decryptor: Detecting encryption
Container format: ELF64
Container endianness: Little
Architecture word size: 64-bit
Instruction set: ARM64
Global offset: 0xFFFFFFFFFFFFF878
Symbol table(s) found with 2052 entries
No matches in symbol table
Required structures acquired from code heuristics. Initialization function: 0x00000000002B67E0
CodeRegistration struct found at 0x0000000004AA3AC0 (file offset 0x04AA2E78)
MetadataRegistration struct found at 0x0000000004AA4180 (file offset 0x04AA3538)
IL2CPP binary version 24.5
Analyze IL2CPP data: 4.06 sec
Processing image 0 - ARM64 / 64-bit
Create .NET type model: 1.11 sec
Selected Unity version(s) 2019.4.0 - 2019.4.9 (types: 2019.3.7 - 2019.4.9, APIs: 2019.4.0 - 2019.4.99)
Warning: selected version 2019.4.0 (metadata version 24.3) does not match metadata version 24.5.
Create C++ application model: 4.45 sec
Generate C# code: 3.87 sec
Generate C++ code: 2.25 sec
Generate JSON metadata: 1.87 sec
Generate IDA Python script: 0.01 sec
Generate .NET assembly shim DLLs: 8.44 sec