Quote:
Originally Posted by tanelipe
[Removing the popup(s)]
1. Backup your Conquer.exe like usually.
2. Open Conquer.exe in OllyDBG (File -> Open -> Browser for its location)
3. Right click -> Search for -> All referenced text strings -> "co.91.com" > Double click it > You should see lines like this
Code:
00477A9F > 68 F4E05500 PUSH Conquer.0055E0F4 ; ASCII "http://co.91.com/signout/"
00477AA4 . E9 DB000000 JMP Conquer.00477B84
00477AA9 > FFD7 CALL EDI
00477AAB . 8B10 MOV EDX,DWORD PTR DS:[EAX]
4. Click this line
Code:
00477AA4 . E9 DB000000 JMP Conquer.00477B84
5. Push enter (It follows the jmp)
6. Now you should see lines like this
Code:
00477B84 53 PUSH EBX ; |Operation
00477B85 FF76 20 PUSH DWORD PTR DS:[ESI+20] ; |hWnd
00477B88 FF15 78565200 CALL DWORD PTR DS:[<&SHELL32.ShellExecut>; ShellExecuteA
|
For some reason when I look I end up with something different to that.
[Only registered and activated users can see links. Click Here To Register...]
Also when searching for next I get something else not like your xD
Also, awesome guide. Really helpfull :p