ARM 不寻常的IAT修复问题 。
抓取的程序代码:
00401000 > /EB 10 jmp short dumped.00401012
00401002 |66:623A bound di,dword ptr ds:[edx]
00401005 |43 inc ebx
00401006 |2B2B sub ebp,dword ptr ds:[ebx]
00401008 |48 dec eax
00401009 |4F dec edi
0040100A |4F dec edi
0040100B |4B dec ebx
0040100C |90 nop
0040100D -|E9 CCC14100 jmp 0081D1DE
00401012 \A1 BFC14100 mov eax,dword ptr ds:[41C1BF]
00401017 C1E0 02 shl eax,2
0040101A A3 C3C14100 mov dword ptr ds:[41C1C3],eax
0040101F 52 push edx
00401020 6A 00 push 0
00401022 E8 6FA80100 call dumped.0041B896 --------这里出问题了 。
00401027 8BD0 mov edx,eax
00401029 E8 02E70000 call dumped.0040F730
0040102E 5A pop edx ; KERNEL32.77E71AF6
原程序代码:
00401000 > $ /EB 10 jmp short sss.00401012
00401002 |66 db 66 ; CHAR 'f'
00401003 |62 db 62 ; CHAR 'b'
00401004 |3A db 3A ; CHAR ':'
00401005 |43 db 43 ; CHAR 'C'
00401006 |2B db 2B ; CHAR '+'
00401007 |2B db 2B ; CHAR '+'
00401008 |48 db 48 ; CHAR 'H'
00401009 |4F db 4F ; CHAR 'O'
0040100A |4F db 4F ; CHAR 'O'
0040100B |4B db 4B ; CHAR 'K'
0040100C |90 nop
0040100D |E9 db E9
0040100E . |CCB14100 dd offset sss.___CPPdebugHo>
00401012 > \A1 BFB14100 mov eax,dword ptr ds:[41B1BF]
00401017 . C1E0 02 shl eax,2
0040101A . A3 C3B14100 mov dword ptr ds:[41B1C3],eax
0040101F . 52 push edx
00401020 . 6A 00 push 0 ; /pModule = NULL
00401022 . E8 8F950100 call <jmp.&KERNEL32.GetModuleHan>; \GetModuleHandleA
00401027 . 8BD0 mov edx,eax
00401029 . E8 06D50000 call sss.0040E534
0040102E . 5A pop edx
请问这样的IAT怎么修复 ?谢谢
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!