Книга: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Назад: Lab 18-3 Solutions
Дальше: Lab 18-5 Solutions

that setting a breakpoint on the stack to search for the corresponding popad instruction may be a good strategy for this packer. We step-over the pushad instruction, as shown in at .

.

. We then click the top of the stack at and select Breakpoint ▸ Hardware, on Access ▸ DWORD to set a breakpoint on the stack instruction.

We press F9 to start the program again. The program eventually hits our breakpoint, and we see the code shown in .