Entry point (address) of the main file (* exe) / module of a third-party application, how to find out? Is it possible without inject?
For better understanding:
Entry point (address) of the main file (* exe) / module of a third-party application, how to find out? Is it possible without inject?
For better understanding:
Executable Format PortableExecutables (PE)
From the very beginning of the executable there is an MZ header in which you can find the offset of the beginning of the PE header. In the PE header there is a field 'Entry point RVA', this is the address of the entry point.
UPD. more precisely, RVA is a relative virtual address. To get the address of the entry point, add the value of the 'Image Base' field to the 'Entry point RVA' value.
UPD.2 is shorter, as I understand it, in the question the "entry point" means the ImageBase field, which for the executable is usually (maybe even always) 0x400000. How the file can load itself at some "random" address is not yet clear.
UPD.3 and the last WinXP did not know how to load the file at an arbitrary base address, Win7 - can (most likely Vista and Win8 too), provided there is a relocation table in the executable. So you need to run the program and somehow find out the base address of the download. Inject or not inject can not say, because I am not familiar with this area.
As I understood on the issue, you need this:
ExtractFilePath (Application.ExeName);
Extracting the full path (address) exe "Schnick.
Source: https://ru.stackoverflow.com/questions/75372/
All Articles
db 0F
suggests that the built-in disassembler does not support some instructions) - insolor