-
Notifications
You must be signed in to change notification settings - Fork 279
Open
Description
Hello,
I'm trying to dump the packed executable, and among other things, I encounter OEP set to 0x00000000 and IAT messed up. I currently do the following,
- Close all apps
pd -db genquick- Run my target
pd -pid <pid>
The dumper dumps the best possible, sure; but is there a way to restore the OEP (so I can run the executable) and IAT (run anywhere else aside from the VM)? Thanks heaps <3
One suggestion I came up with inspired by https://reverseengineering.stackexchange.com/a/11272
Since the dump stores the IAT that was present at a runtime, I can either find the imports string representation in the dump (if present, which is always True in my case) or listen to the program's API calls. Either way, I do not get how can I translate the API call names to their static addresses. Any help will be appreciated
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels