79795481

Date: 2025-10-21 05:23:38
Score: 1.5
Natty:
Report link
(17f0.a4c): Break instruction exception - code 80000003 (first chance)
ntdll!LdrpDoDebuggerBreak+0x30:
00007ffa`0a3006b0 cc              int     3

That's just the WinDbg's break instruction exception (a.k.a int3 opcode 0xcc)

According to this article the executable part is in .text, According to this article the executable part is in .text and .rodata, is it possible to grab the bytes in .text and convert them to a shellcode then injecting it into a process

It greatly depends on the executable! As long as the data isn't being executed as code and vice versa, it's gonna be fine.

Reasons:
  • Blacklisted phrase (1): this article
  • Blacklisted phrase (1): is it possible to
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: winapiadmin