I have attached debugger to process/application (exe), but when i go to string references, it shows ntdll.dll references, instead of program.
how to get the references from program itself?
is it protected?
I have an error message pop up on the screen every few seconds on a program.
I would like to trace it back as to which function is calling the message box and why.
I found the referenced string but how do I trace it back to who called the function?
This functionality is available in Cheat Engine where the debugger won't be attached until you set a breakpoint or explicitly ask for the debugger to be attached. I've looked everywhere and couldn't find anything similar for x64dbg. It's very useful…
when you click String references in x64dbg, it only lists strings from current module/file. Is that possible to search strings in multiple (selected) files/modules?
I know how to do it with OllyDbg but with x64dbg\x32dbg I don't know how to do it.
I have a packed binary file and at some point it unpacks itself and I found the point where it does it.
I want to copy it to a binary file at this point (after…
Having some trouble with cracking a program, as the software does not prompt me to enter a serial key for activation. Instead, a serial key 924D-E42E-427D is already displayed within the program. So one should call the owner of the program to…
Is there a way to export modifications made in x64dbg as a separate executable file, which can be used to patch a desired executable file without detection?
The resulting file should function as a loader, automatically patching the desired…
I hope everyone is well. I'm new here and I'm hope someone can help me with the problem I'm facing.
I've been trying to reverse engineer a program but everytime I change an instruction, not matter how small it is, I always get the same result which…
What i'm trying to achieve is to use a conditional breakpoint, that never actually breaks but logs in x64dbg's console the value of r9 only when it changes, to prevent console cluttering.
But i do not understand how to set the expression for the log…
Will every .exe file start from 00401000 or am I wrong assuming such a thing.
Edit: total beginner here.
when the program is first loaded onto x64dbg it immediately goes into a DLL, so I could not see the address 00401000, but indeed it is present…
I am a newbie to reverse engineering. I am trying to reverse engineer an app that uses some form of internet explorer frame kind of thing because I could see use of mshtml.dll and jscript9.dll and with the help of some dynamic analysis with ProcMon…
In the x64dbg manual is many scripting commands and other things, but nowhere in it is mentioned, how to launch a script.
So, my question is: How to launch a script in x64dbg?
I was just wondering if there was a way to force an interpretation of a block of code in x64dbg.
The section im analyzing fluctuates between this:
and this:
i created some compiled binaries using different languages and tried to understand them using x64dbg, the compiled binaries produced by the c language/gcc compiler were pretty easy to understand, then i compiled a simple hello world program in…