assembly - Unknown module in OllyDbg 2.01 "Assemble" command -


I am immersing a crack-me and I want to replace an empty space with WINAPI SetDlgItemText () Parameter takes it.
I've successfully added three "push" instructions, but when I call call & lt; Jmp. And user32.SetDlgItemTextA & gt; I try to collect; OllyDbg is called me in the red unknown module

The same instruction is used in some of the rows given above (by software, nothing assembled by me).
How can I resolve this error and make SetDlgItemText calls? Binary Copy - Binary Paste does not solve the problem (jump in a different section of code, possibly because I have a slight disturbance with opcodes)

Here's a Screenshots (): Enter image details here

EDIT1: Function JMP address 0x00401460 Found on So I put it in that place and instantly ollydbg call it call & lt; Jmp. And user32.SetDlgItemTextA & gt; Replaced with string. Why can not it do the opposite?

Imported functions are commonly used in calls Import the address table (IAT) This structure contains a continuous list of Address Points, which will be started by loading the Windows loader to load and load binary.

In the Import Directory, they import information about the imported module, for each module, the function names and functions sequentially imported. In loading process, this information is used to import modules and functions to import and IAT is started with the address in memory of imported functions, which will be loaded in memory already ( In the normal import process).

What do you need to do, when you already have a question that there is one more call on SetDlgItemTextA , the search in the binary should be something Call [address] (ex: calls [0x401634] ) or JMP [address] (ex: JMP [0x401434] ) Note that the address at the address at that address is called, does not call at that address, it is a Double sign (probably Olidi fixes the name of the function and changes this address with name) , In this The met you can read the address of the binary representation of instructions. Your call will be the same, probably the command will open the opode 0xFF (Indirect Call or JMP) .

Call or JMP is the address of the pointer in the imported function that the loader will set with the actual memory address of the imported function.


Comments

Popular posts from this blog

sqlite3 - UPDATE a table from the SELECT of another one -

c# - Showing a SelectedItem's Property -

javascript - Render HTML after each iteration in loop -