SlideShare a Scribd company logo
Frame 0x02
Presenter: Dmitry Vostokov
Sponsors
Debugging.TV
Troubleshooting
Symbols
© 2011 DumpAnalysis.org + TraceAnalysis.org
0:000> .sympath+ C:DebuggingTVDebuggingTV02x64ReleaseVersion1
0:000> .reload
..............
0:000> kL
Child-SP RetAddr Call Site
00000000`001cfb38 00000000`76e7e6fa user32!ZwUserGetMessage+0xa
00000000`001cfb40 00000001`3fa610d0 user32!GetMessageW+0x34
00000000`001cfb70 00000001`3fa61494 DebuggingTV02!wWinMain+0xd0
00000000`001cfbd0 00000000`76d5cdcd DebuggingTV02!__tmainCRTStartup+0x154
00000000`001cfc80 00000000`76f7c6e1 kernel32!BaseThreadInitThunk+0xd
00000000`001cfcb0 00000000`00000000 ntdll!RtlUserThreadStart+0x1d
0:000> ub 00000001`3fa610d0
DebuggingTV02!wWinMain+0xac [c:debuggingtvdebuggingtv02debuggingtv02debuggingtv02.cpp @ 50]:
00000001`3fa610ac call qword ptr [DebuggingTV02!_imp_TranslateMessage (00000001`3fa66228)]
00000001`3fa610b2 lea rcx,[rsp+20h]
00000001`3fa610b7 call qword ptr [DebuggingTV02!_imp_DispatchMessageW (00000001`3fa66220)]
00000001`3fa610bd lea rcx,[rsp+20h]
00000001`3fa610c2 xor r9d,r9d
00000001`3fa610c5 xor r8d,r8d
00000001`3fa610c8 xor edx,edx
00000001`3fa610ca call qword ptr [DebuggingTV02!_imp_GetMessageW (00000001`3fa66238)]
App Version 1
© 2011 DumpAnalysis.org + TraceAnalysis.org
0:000> .sympath+ C:DebuggingTVDebuggingTV02x64ReleaseVersion1
0:000> .reload
0:000> kL
Child-SP RetAddr Call Site
00000000`001dfa88 00000000`76e7e6fa user32!ZwUserGetMessage+0xa
*** ERROR: Module load completed but symbols could not be loaded for DebuggingTV02.exe
00000000`001dfa90 00000001`3f3f10d0 user32!GetMessageW+0x34
00000000`001dfac0 00000001`3f3f1494 DebuggingTV02+0x10d0
00000000`001dfb20 00000000`76d5cdcd DebuggingTV02+0x1494
00000000`001dfbd0 00000000`76f7c6e1 kernel32!BaseThreadInitThunk+0xd
00000000`001dfc00 00000000`00000000 ntdll!RtlUserThreadStart+0x1d
0:000> .reload /f /i DebuggingTV02.exe
0:000> kL
Child-SP RetAddr Call Site
00000000`001dfa88 00000000`76e7e6fa user32!ZwUserGetMessage+0xa
00000000`001dfa90 00000001`3f3f10d0 user32!GetMessageW+0x34
00000000`001dfac0 00000001`3f3f1494 DebuggingTV02!wWinMain+0xd0
00000000`001dfb20 00000000`76d5cdcd DebuggingTV02!__tmainCRTStartup+0x154
00000000`001dfbd0 00000000`76f7c6e1 kernel32!BaseThreadInitThunk+0xd
00000000`001dfc00 00000000`00000000 ntdll!RtlUserThreadStart+0x1d
App Version 2
© 2011 DumpAnalysis.org + TraceAnalysis.org
0:000> .asm no_code_bytes
Assembly options: no_code_bytes
0:000> ub 00000001`3f3f10d0
DebuggingTV02!wWinMain+0xac [c:debuggingtvdebuggingtv02debuggingtv02debuggingtv02.cpp @ 50]:
00000001`3f3f10ac call qword ptr [DebuggingTV02!_imp_TranslateMessage (00000001`3f3f6228)]
00000001`3f3f10b2 lea rcx,[rsp+20h]
00000001`3f3f10b7 call qword ptr [DebuggingTV02!_imp_DispatchMessageW (00000001`3f3f6220)]
00000001`3f3f10bd lea rcx,[rsp+20h]
00000001`3f3f10c2 xor r9d,r9d
00000001`3f3f10c5 xor r8d,r8d
00000001`3f3f10c8 xor edx,edx
00000001`3f3f10ca call qword ptr [DebuggingTV02!_imp_GetMessageW (00000001`3f3f6238)]
0:000> ub 00000001`3f3f1494
DebuggingTV02!__tmainCRTStartup+0x133 [f:ddvctoolscrt_bldself_64_amd64crtsrccrt0.c @ 275]:
00000001`3f3f1473 test byte ptr [rsp+6Ch],1
00000001`3f3f1478 movzx edx,word ptr [rsp+70h]
00000001`3f3f147d mov r9d,0Ah
00000001`3f3f1483 cmovne r9d,edx
00000001`3f3f1487 mov r8,rax
00000001`3f3f148a xor edx,edx
00000001`3f3f148c mov rcx,rdi
00000001`3f3f148f call DebuggingTV02!wWinMain (00000001`3f3f1000)
...continue
© 2011 DumpAnalysis.org + TraceAnalysis.org
0:000> .sympath+ C:DebuggingTVDebuggingTV02ReleaseVersion1
0:000> .reload
0:000> .reload /f /i DebuggingTV02.exe
0:000> kL
ChildEBP RetAddr
001bf968 7675199a ntdll!KiFastSystemCallRet
001bf96c 767519cd user32!NtUserGetMessage+0xc
001bf988 003f1045 user32!GetMessageW+0x33
001bf9a8 003f10f2 DebuggingTV02!wWinMain+0x45
001bf9ac 031f0197 DebuggingTV02!MyRegisterClass+0x2
WARNING: Frame IP not in any known module. Following frames may be wrong.
001bf9d8 003f141d 0x31f0197
001bfa3c 003f2914 DebuggingTV02!__tmainCRTStartup+0x139
001bfa68 76573833 DebuggingTV02!__security_init_cookie+0x85
001bfa74 77c1a9bd kernel32!BaseThreadInitThunk+0xe
001bfab4 00000000 ntdll!_RtlUserThreadStart+0x23
0:000> ub 031f0197
^ Unable to find valid previous instruction for 'ub 031f0197‘
App Version 4
© 2011 DumpAnalysis.org + TraceAnalysis.org
0:000> .sympath+ C:DebuggingTVDebuggingTV02ReleaseVersion4
0:000> .reload
0:000> kL
ChildEBP RetAddr
001bf968 7675199a ntdll!KiFastSystemCallRet
001bf96c 767519cd user32!NtUserGetMessage+0xc
001bf988 003f1045 user32!GetMessageW+0x33
001bf9a8 003f10f2 DebuggingTV02!MessageLoop+0x45
001bf9d8 003f141d DebuggingTV02!wWinMain+0xa2
001bfa68 76573833 DebuggingTV02!__tmainCRTStartup+0x11a
001bfa74 77c1a9bd kernel32!BaseThreadInitThunk+0xe
001bfab4 00000000 ntdll!_RtlUserThreadStart+0x23
...continue
© 2011 DumpAnalysis.org + TraceAnalysis.org
Debugging.TV

More Related Content

PDF
Linux kernel debugging(PDF format)
PDF
Decipher Multi-Factor Authentication - A Developers Introduction
PDF
Vhdl practical exam guide
PPTX
Nopcon '16 Android Kernel Vulnerabilities
PDF
Reverse engineering of binary programs for custom virtual machines
PDF
lab4_three_bit_counter_v2 print
PDF
Crash_Report_Mechanism_In_Tizen
PPT
Linux kernel debugging(PDF format)
Decipher Multi-Factor Authentication - A Developers Introduction
Vhdl practical exam guide
Nopcon '16 Android Kernel Vulnerabilities
Reverse engineering of binary programs for custom virtual machines
lab4_three_bit_counter_v2 print
Crash_Report_Mechanism_In_Tizen

What's hot (20)

PDF
YCAM Workshop Part 2
PPT
E-Commerce Security - Application attacks - Server Attacks
PDF
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
PPT
W8_2: Inside the UoS Educational Processor
DOCX
Lampiran 1.programdocx
TXT
Saii log
PDF
TC74LCX244FW PSpice Model (Free SPICE Model)
PPTX
Android virtual machine internals
PDF
TC74LCX244FT PSpice Model (Free SPICE Model)
PDF
TC74LCX244F PSpice Model (Free SPICE Model)
PDF
TC74VHC244FW PSpice Model (Free SPICE Model)
PDF
IPPP Iwate 2018 : Troubleshooting Windows
PDF
TC74VHC244FT PSpice Model (Free SPICE Model)
PDF
TC74VHC244F PSpice Model (Free SPICE Model)
PDF
Debugging TV Frame 0x01
PPT
为什么 rust-lang 吸引我?
PDF
Código ASM para LCD Microcontrolador PIC
PDF
Save all the modules
PDF
Key recovery attacks against commercial white-box cryptography implementation...
PDF
プログラム実行の話と
OSとメモリの挙動の話
YCAM Workshop Part 2
E-Commerce Security - Application attacks - Server Attacks
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
W8_2: Inside the UoS Educational Processor
Lampiran 1.programdocx
Saii log
TC74LCX244FW PSpice Model (Free SPICE Model)
Android virtual machine internals
TC74LCX244FT PSpice Model (Free SPICE Model)
TC74LCX244F PSpice Model (Free SPICE Model)
TC74VHC244FW PSpice Model (Free SPICE Model)
IPPP Iwate 2018 : Troubleshooting Windows
TC74VHC244FT PSpice Model (Free SPICE Model)
TC74VHC244F PSpice Model (Free SPICE Model)
Debugging TV Frame 0x01
为什么 rust-lang 吸引我?
Código ASM para LCD Microcontrolador PIC
Save all the modules
Key recovery attacks against commercial white-box cryptography implementation...
プログラム実行の話と
OSとメモリの挙動の話
Ad

Similar to Debugging TV Frame 0x02 (20)

PDF
Debugging TV Frame 0x05
PDF
Symbolic Debugging with DWARF
PDF
Windbg랑 친해지기
ODP
Linux kernel debugging(ODP format)
PDF
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
PDF
Debugging TV Frame 0x08
PPTX
Windows Debugging with WinDbg
PPT
Windows debugging sisimon
PDF
Reverse eningeering
PDF
[ODI] chapter2 what is "undo record chaining"?
PDF
Debugging TV Frame 0x12
PDF
DEP/ASLR bypass without ROP/JIT
PDF
Kernel Recipes 2013 - Deciphering Oopsies
PPTX
Protecting C++
PPTX
Защищая С++. Павел Филонов ➠ CoreHard Autumn 2019
ODP
Debugging linux
PPTX
Windows kernel debugging workshop in florida
PDF
crack satellite
PDF
Debugging TV Frame 0x0C
PPTX
How the stack works(1)
Debugging TV Frame 0x05
Symbolic Debugging with DWARF
Windbg랑 친해지기
Linux kernel debugging(ODP format)
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
Debugging TV Frame 0x08
Windows Debugging with WinDbg
Windows debugging sisimon
Reverse eningeering
[ODI] chapter2 what is "undo record chaining"?
Debugging TV Frame 0x12
DEP/ASLR bypass without ROP/JIT
Kernel Recipes 2013 - Deciphering Oopsies
Protecting C++
Защищая С++. Павел Филонов ➠ CoreHard Autumn 2019
Debugging linux
Windows kernel debugging workshop in florida
crack satellite
Debugging TV Frame 0x0C
How the stack works(1)
Ad

More from Dmitry Vostokov (20)

PDF
Accelerated Windows Debugging 3 training public slides
PDF
Accelerated .NET Memory Dump Analysis training public slides
PDF
Debugging TV Frame 0x1C
PDF
Debugging TV Frame 0x1A
PDF
Debugging TV Frame 0x34
PDF
Debugging TV Frame 0x33
PDF
Debugging TV Frame 0x31
PDF
Debugging TV Frame 0x25
PDF
Debugging TV Frame 0x24
PDF
Debugging TV Frame 0x21
PDF
Debugging TV Frame 0x20
PDF
Debugging TV Frame 0x19
PDF
Debugging TV Frame 0x18
PDF
Debugging TV Frame 0x17
PDF
Debugging TV Frame 0x16
PDF
Debugging TV Frame 0x15
PDF
Debugging TV Frame 0x14
PDF
Debugging TV Frame 0x13
PDF
Debugging TV Frame 0x11
PDF
Debugging TV Frame 0x10
Accelerated Windows Debugging 3 training public slides
Accelerated .NET Memory Dump Analysis training public slides
Debugging TV Frame 0x1C
Debugging TV Frame 0x1A
Debugging TV Frame 0x34
Debugging TV Frame 0x33
Debugging TV Frame 0x31
Debugging TV Frame 0x25
Debugging TV Frame 0x24
Debugging TV Frame 0x21
Debugging TV Frame 0x20
Debugging TV Frame 0x19
Debugging TV Frame 0x18
Debugging TV Frame 0x17
Debugging TV Frame 0x16
Debugging TV Frame 0x15
Debugging TV Frame 0x14
Debugging TV Frame 0x13
Debugging TV Frame 0x11
Debugging TV Frame 0x10

Recently uploaded (20)

PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Transform Your Business with a Software ERP System
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Understanding Forklifts - TECH EHS Solution
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
history of c programming in notes for students .pptx
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Wondershare Filmora 15 Crack With Activation Key [2025
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Operating system designcfffgfgggggggvggggggggg
Which alternative to Crystal Reports is best for small or large businesses.pdf
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Softaken Excel to vCard Converter Software.pdf
Transform Your Business with a Software ERP System
Reimagine Home Health with the Power of Agentic AI​
Understanding Forklifts - TECH EHS Solution
How to Choose the Right IT Partner for Your Business in Malaysia
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms II-SECS-1021-03
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
history of c programming in notes for students .pptx
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Adobe Illustrator 28.6 Crack My Vision of Vector Design

Debugging TV Frame 0x02

  • 1. Frame 0x02 Presenter: Dmitry Vostokov Sponsors Debugging.TV
  • 3. 0:000> .sympath+ C:DebuggingTVDebuggingTV02x64ReleaseVersion1 0:000> .reload .............. 0:000> kL Child-SP RetAddr Call Site 00000000`001cfb38 00000000`76e7e6fa user32!ZwUserGetMessage+0xa 00000000`001cfb40 00000001`3fa610d0 user32!GetMessageW+0x34 00000000`001cfb70 00000001`3fa61494 DebuggingTV02!wWinMain+0xd0 00000000`001cfbd0 00000000`76d5cdcd DebuggingTV02!__tmainCRTStartup+0x154 00000000`001cfc80 00000000`76f7c6e1 kernel32!BaseThreadInitThunk+0xd 00000000`001cfcb0 00000000`00000000 ntdll!RtlUserThreadStart+0x1d 0:000> ub 00000001`3fa610d0 DebuggingTV02!wWinMain+0xac [c:debuggingtvdebuggingtv02debuggingtv02debuggingtv02.cpp @ 50]: 00000001`3fa610ac call qword ptr [DebuggingTV02!_imp_TranslateMessage (00000001`3fa66228)] 00000001`3fa610b2 lea rcx,[rsp+20h] 00000001`3fa610b7 call qword ptr [DebuggingTV02!_imp_DispatchMessageW (00000001`3fa66220)] 00000001`3fa610bd lea rcx,[rsp+20h] 00000001`3fa610c2 xor r9d,r9d 00000001`3fa610c5 xor r8d,r8d 00000001`3fa610c8 xor edx,edx 00000001`3fa610ca call qword ptr [DebuggingTV02!_imp_GetMessageW (00000001`3fa66238)] App Version 1 © 2011 DumpAnalysis.org + TraceAnalysis.org
  • 4. 0:000> .sympath+ C:DebuggingTVDebuggingTV02x64ReleaseVersion1 0:000> .reload 0:000> kL Child-SP RetAddr Call Site 00000000`001dfa88 00000000`76e7e6fa user32!ZwUserGetMessage+0xa *** ERROR: Module load completed but symbols could not be loaded for DebuggingTV02.exe 00000000`001dfa90 00000001`3f3f10d0 user32!GetMessageW+0x34 00000000`001dfac0 00000001`3f3f1494 DebuggingTV02+0x10d0 00000000`001dfb20 00000000`76d5cdcd DebuggingTV02+0x1494 00000000`001dfbd0 00000000`76f7c6e1 kernel32!BaseThreadInitThunk+0xd 00000000`001dfc00 00000000`00000000 ntdll!RtlUserThreadStart+0x1d 0:000> .reload /f /i DebuggingTV02.exe 0:000> kL Child-SP RetAddr Call Site 00000000`001dfa88 00000000`76e7e6fa user32!ZwUserGetMessage+0xa 00000000`001dfa90 00000001`3f3f10d0 user32!GetMessageW+0x34 00000000`001dfac0 00000001`3f3f1494 DebuggingTV02!wWinMain+0xd0 00000000`001dfb20 00000000`76d5cdcd DebuggingTV02!__tmainCRTStartup+0x154 00000000`001dfbd0 00000000`76f7c6e1 kernel32!BaseThreadInitThunk+0xd 00000000`001dfc00 00000000`00000000 ntdll!RtlUserThreadStart+0x1d App Version 2 © 2011 DumpAnalysis.org + TraceAnalysis.org
  • 5. 0:000> .asm no_code_bytes Assembly options: no_code_bytes 0:000> ub 00000001`3f3f10d0 DebuggingTV02!wWinMain+0xac [c:debuggingtvdebuggingtv02debuggingtv02debuggingtv02.cpp @ 50]: 00000001`3f3f10ac call qword ptr [DebuggingTV02!_imp_TranslateMessage (00000001`3f3f6228)] 00000001`3f3f10b2 lea rcx,[rsp+20h] 00000001`3f3f10b7 call qword ptr [DebuggingTV02!_imp_DispatchMessageW (00000001`3f3f6220)] 00000001`3f3f10bd lea rcx,[rsp+20h] 00000001`3f3f10c2 xor r9d,r9d 00000001`3f3f10c5 xor r8d,r8d 00000001`3f3f10c8 xor edx,edx 00000001`3f3f10ca call qword ptr [DebuggingTV02!_imp_GetMessageW (00000001`3f3f6238)] 0:000> ub 00000001`3f3f1494 DebuggingTV02!__tmainCRTStartup+0x133 [f:ddvctoolscrt_bldself_64_amd64crtsrccrt0.c @ 275]: 00000001`3f3f1473 test byte ptr [rsp+6Ch],1 00000001`3f3f1478 movzx edx,word ptr [rsp+70h] 00000001`3f3f147d mov r9d,0Ah 00000001`3f3f1483 cmovne r9d,edx 00000001`3f3f1487 mov r8,rax 00000001`3f3f148a xor edx,edx 00000001`3f3f148c mov rcx,rdi 00000001`3f3f148f call DebuggingTV02!wWinMain (00000001`3f3f1000) ...continue © 2011 DumpAnalysis.org + TraceAnalysis.org
  • 6. 0:000> .sympath+ C:DebuggingTVDebuggingTV02ReleaseVersion1 0:000> .reload 0:000> .reload /f /i DebuggingTV02.exe 0:000> kL ChildEBP RetAddr 001bf968 7675199a ntdll!KiFastSystemCallRet 001bf96c 767519cd user32!NtUserGetMessage+0xc 001bf988 003f1045 user32!GetMessageW+0x33 001bf9a8 003f10f2 DebuggingTV02!wWinMain+0x45 001bf9ac 031f0197 DebuggingTV02!MyRegisterClass+0x2 WARNING: Frame IP not in any known module. Following frames may be wrong. 001bf9d8 003f141d 0x31f0197 001bfa3c 003f2914 DebuggingTV02!__tmainCRTStartup+0x139 001bfa68 76573833 DebuggingTV02!__security_init_cookie+0x85 001bfa74 77c1a9bd kernel32!BaseThreadInitThunk+0xe 001bfab4 00000000 ntdll!_RtlUserThreadStart+0x23 0:000> ub 031f0197 ^ Unable to find valid previous instruction for 'ub 031f0197‘ App Version 4 © 2011 DumpAnalysis.org + TraceAnalysis.org
  • 7. 0:000> .sympath+ C:DebuggingTVDebuggingTV02ReleaseVersion4 0:000> .reload 0:000> kL ChildEBP RetAddr 001bf968 7675199a ntdll!KiFastSystemCallRet 001bf96c 767519cd user32!NtUserGetMessage+0xc 001bf988 003f1045 user32!GetMessageW+0x33 001bf9a8 003f10f2 DebuggingTV02!MessageLoop+0x45 001bf9d8 003f141d DebuggingTV02!wWinMain+0xa2 001bfa68 76573833 DebuggingTV02!__tmainCRTStartup+0x11a 001bfa74 77c1a9bd kernel32!BaseThreadInitThunk+0xe 001bfab4 00000000 ntdll!_RtlUserThreadStart+0x23 ...continue © 2011 DumpAnalysis.org + TraceAnalysis.org