SuperCali
August 30th, 2001, 20:44
Hello,
I had a realy strange problem with the Muzicman program I am cracking. After figuring out how to bypass the splashh screen by nopping it out I decided to do it a little neater by using c3 (RET) so the function just returned. Well two of the calls went ok , but the third one was strange. After going to the address in IDA and checking the offset I was about to patch it in HexWorkshop when I noticed that instead of the bytes I wanted to patch being on offset 36xxx (xxx being the same on both) as shown in IDA they were on 35xxx in hexworkshop!? How or why does this occur!? Is it common?
// SuperCali
I had a realy strange problem with the Muzicman program I am cracking. After figuring out how to bypass the splashh screen by nopping it out I decided to do it a little neater by using c3 (RET) so the function just returned. Well two of the calls went ok , but the third one was strange. After going to the address in IDA and checking the offset I was about to patch it in HexWorkshop when I noticed that instead of the bytes I wanted to patch being on offset 36xxx (xxx being the same on both) as shown in IDA they were on 35xxx in hexworkshop!? How or why does this occur!? Is it common?
// SuperCali