yyzyyz
June 20th, 2008, 16:20
Greetings!
I’m trying to reverse engineer a program to remove a nag window… So I load it up in OllyDbg and after spending half a day, finally zero in on the JNZ instruction where the decision to show the nag window is made. I change the byte from ‘75’ to ‘74’ and hit F9. Presto! The program window shows up with no nags! I note down the surrounding bytes and load up the executable binary in hex editor, locate these bytes, change ‘75’ to ‘74’ and run the patched executable. However, all I see is a message that the the file may be corrupt! Can someone please explain this? The same patch works from within OllyDbg but not when applied to the executable file…
It appears that the program is checking the its executable file for potential modifications. Any ideas how to defeat this? Of course, I could repeat the procedure to locate where this switch is made, but I am looking for something easier than this…
Other details…
I’m positive that I patched the executable in the right location as there was only one instance found.
OllyDbg reports “Module ‘XXX’ has entry point outside the code (as specified in the PE header). Maybe this file is self-extracting or self-modifying”
Thanks!
I’m trying to reverse engineer a program to remove a nag window… So I load it up in OllyDbg and after spending half a day, finally zero in on the JNZ instruction where the decision to show the nag window is made. I change the byte from ‘75’ to ‘74’ and hit F9. Presto! The program window shows up with no nags! I note down the surrounding bytes and load up the executable binary in hex editor, locate these bytes, change ‘75’ to ‘74’ and run the patched executable. However, all I see is a message that the the file may be corrupt! Can someone please explain this? The same patch works from within OllyDbg but not when applied to the executable file…
It appears that the program is checking the its executable file for potential modifications. Any ideas how to defeat this? Of course, I could repeat the procedure to locate where this switch is made, but I am looking for something easier than this…
Other details…
I’m positive that I patched the executable in the right location as there was only one instance found.
OllyDbg reports “Module ‘XXX’ has entry point outside the code (as specified in the PE header). Maybe this file is self-extracting or self-modifying”
Thanks!