Type Values Comment ---- ------- -------- 'O' 0,1,2 Operand: Enumerates the operand specified and retrieves its value 'R' <Register string> Register: Displays the contents of the specified register, accepts dword, word, byte representations 'M' <Memory address> Memory: Dereferences and displays the contents of the memory address as a dword
.text:010073A4 008 call __SEH_prolog ; int .text:010073A4 .text:010073A9 084 xor ebx, ebx ; **LA R:ebx .text:010073AB 084 push ebx ; lpModuleName **LA O:0 .text:010073AC 088 mov edi, ds:GetModuleHandleA(x) .text:010073B2 088 call edi ; GetModuleHandleA(x) .text:010073B4 084 cmp word ptr [eax], 5A4Dh ; **LA O:0, R:eax .text:010073B9 084 jnz short loc_10073DA ; **LA M:77e7000 .text:010073B9 .text:010073BB 084 mov ecx, [eax+3Ch] ; **LA R:ecx,R:ebx,R:esi,O:1,M:77e7012e .text:010073BE 084 add ecx, eax .text:010073C0 084 cmp dword ptr [ecx], 4550h ; **LA O:0 .text:010073C6 084 jnz short loc_10073DA .text:010073C6 .text:010073C8 084 movzx eax, word ptr [ecx+18h] ; **LA O:1 .text:010073CC 084 cmp eax, 10Bh ; **LA R:eax, R:ax, R:dh .text:010073D1 084 jz short loc_10073F2
10073a9,r,4,EBX 10073ab,r,4,1 10073b4,p,4,1 10073b4,r,4,EAX 10073b9,p,4,77e70000 10073bb,r,4,ECX 10073bb,r,4,EBX 10073bb,r,4,ESI 10073bb,o,4,2 10073bb,p,4,77e7012e 10073c0,p,4,1 10073c8,o,4,2 10073cc,r,4,EAX 10073cc,r,2,AX 10073cc,r,1,DH
Address,Type,Size,Type Data Address: The address of the tag, and where we will break during execution Type: Slightly different than the comment tags and are as follows 'r' Register 'p' Pointer (Memory location) 'o' Offset Size: Size of the requested data...currently limited to 1,2, and 4 bytes Type Data: The needed information about what is requested
live_analysis.py <process name> <live analysis config file> C:\Code\Python\live_analysis>live_analysis.py c:\windows\notepad.exe la.conf
C:\Code\Python\live_analysis>live_analysis.py c:\windows\notepad.exe la.conf [*] Trying to attach to existing notepad.exe [*] Trying to load c:\windows\notepad.exe [*] Setting bp @ 0x010073a9 [*] Setting bp @ 0x010073ab [*] Setting bp @ 0x010073b4 [*] Setting bp @ 0x010073b9 [*] Setting bp @ 0x010073bb [*] Setting bp @ 0x010073c0 [*] Setting bp @ 0x010073c8 [*] Setting bp @ 0x010073cc [*] Setting bp @ 0x0100752d [*] Setting bp @ 0x0100752f [*] Setting bp @ 0x01007531 [*] Setting bp @ 0x01007534 [*] Setting bp @ 0x01007535 [*] Setting bp @ 0x0100753b [*] Setting bp @ 0x0100753c [*] Setting bp @ 0x0100753e [*] Setting bp @ 0x01007541 [*] Setting bp @ 0x01007544
[*] 0x010073a9 EBX [Reg ] is 0x7ffd8000 [4] [*] 0x010073ab 1 [Reg ] is 0x0 [4] [*] 0x010073b4 EAX [Reg ] is 0x1000000 [4] [*] 0x010073b4 1 [Pointer] is 0x905a4d [4] [*] 0x010073b9 77e70000 [Pointer] is 0x905a4d [4] [*] 0x010073bb ECX [Reg ] is 0x7ffb0 [4] [*] 0x010073bb EBX [Reg ] is 0x0 [4] [*] 0x010073bb ESI [Reg ] is 0x1e06380f [4] [*] 0x010073bb 2 [Offset ] is 0xe0 [4] [*] 0x010073bb 77e7012e [Pointer] is 0x40001 [4] [*] 0x010073c0 1 [Pointer] is 0x4550 [4] [*] 0x010073c8 2 [Offset ] is 0xa07010b [4] [*] 0x010073cc EAX [Reg ] is 0x10b [4] [*] 0x010073cc AX [Reg ] is 0x10b [2] [*] 0x010073cc DH [Reg ] is 0xeb [1]
There are 31,328 total registered users.
[+] expand