(17f0.a4c): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ffa`0a3006b0 cc int 3
That's just the WinDbg's break instruction exception (a.k.a int3 opcode 0xcc)
According to this article the executable part is in
.text, According to this article the executable part is in.textand.rodata, is it possible to grab the bytes in.textand convert them to a shellcode then injecting it into a process
It greatly depends on the executable! As long as the data isn't being executed as code and vice versa, it's gonna be fine.