I'm trying to reverse a Windows executable that shows as having been packed with ENIGMA(5.X):
If I later check the class name for one of its UI elements, when the process is unpacked and running, it shows as a .NET class WindowsForms10.BUTTON.app.0.378734a:
But if I then attach to that process with dnSpy, I can pause that .NET executable somewhere in System.Windows.Forms.dll in Application - UnsafeNativeMethods.IMsoComponentManager.FPushMessageLoop() function but there seems to be no info on the .NET assemblies from the target process itself:
My goal was to see the .NET code after the Start button click in that app. Any idea how should I proceed?




