Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Log data
- Address Message
- OllyDbg v2.01
- File 'D:\Dev\Crack\Crackme\snd-reversingwithlena-tutorial03.tutorial\files\RegisterMe.exe'
- New process (ID 00001B90) created
- 00401000 Main thread (ID 000023F8) created
- 001C0000 Unload hidden module 001C0000
- 77D40000 Unload hidden module 77D40000
- 001C0000 Unload hidden module 001C0000
- 001C0000 Unload hidden module 001C0000
- 00400000 Module 'D:\Dev\Crack\Crackme\snd-reversingwithlena-tutorial03.tutorial\files\RegisterMe.exe'
- 70290000 Module 'C:\Windows\system32\apphelp.dll'
- 71880000 Module 'C:\Program Files\Bitdefender\Antivirus Free Edition\avc3\avc3_sig_317\avcuf32.dll'
- 751B0000 Module 'C:\Windows\SYSTEM32\GDI32.dll'
- 77200000 Module 'C:\Windows\SYSTEM32\KERNELBASE.dll'
- 778D0000 Module 'C:\Windows\SYSTEM32\USER32.dll'
- 77D40000 Module 'C:\Windows\SYSTEM32\KERNEL32.DLL'
- 77E30000 Module 'C:\Windows\SYSTEM32\ntdll.dll'
- Code size is extended to include all sections marked as CODE
- Code sections '.text' and 'RT' will be merged to a single memory block
- 5DDB0000 Module <Mod_5DDB> (anonymous)
- Not an 80x86 executable
- 5DE00000 Module <Mod_5DE0> (anonymous)
- Not an 80x86 executable
- 5DE80000 Module <Mod_5DE8> (anonymous)
- Not an 80x86 executable
- 74F60000 Module 'C:\Windows\SYSTEM32\msvcrt.dll'
- 77AC0000 Module 'C:\Windows\SYSTEM32\MSCTF.dll'
- 77D00000 Module 'C:\Windows\SYSTEM32\IMM32.DLL'
- Analysing Mod_5DE8
- 0 fuzzy procedures
- Analysing Mod_5DE0
- 0 fuzzy procedures
- Analysing Mod_5DDB
- 0 fuzzy procedures
- 72888A80 INT3 command at 72888A80 - Shift+Run/Step to pass exception to the program
- 00000272 Access violation when reading [00000272] - passed to application
- 00000272 Access violation when reading [00000272] - application was unable to process exception
- 00000272 Access violation when reading [00000272] - passed to application
- Access violation when reading [00000000] - passed to application
- Process terminated, exit code 0
- File 'D:\Dev\Crack\Crackme\snd-reversingwithlena-tutorial03.tutorial\files\RegisterMe.exe'
- New process (ID 000027FC) created
- 00401000 Main thread (ID 00002620) created
- 001C0000 Unload hidden module 001C0000
- 77D40000 Unload hidden module 77D40000
- 001C0000 Unload hidden module 001C0000
- 001C0000 Unload hidden module 001C0000
- 00400000 Module 'D:\Dev\Crack\Crackme\snd-reversingwithlena-tutorial03.tutorial\files\RegisterMe.exe'
- 70290000 Module 'C:\Windows\system32\apphelp.dll'
- 71880000 Module 'C:\Program Files\Bitdefender\Antivirus Free Edition\avc3\avc3_sig_317\avcuf32.dll'
- 751B0000 Module 'C:\Windows\SYSTEM32\GDI32.dll'
- 77200000 Module 'C:\Windows\SYSTEM32\KERNELBASE.dll'
- 778D0000 Module 'C:\Windows\SYSTEM32\USER32.dll'
- 77D40000 Module 'C:\Windows\SYSTEM32\KERNEL32.DLL'
- 77E30000 Module 'C:\Windows\SYSTEM32\ntdll.dll'
- Code size is extended to include all sections marked as CODE
- Code sections '.text' and 'RT' will be merged to a single memory block
- 5DDB0000 Module <Mod_5DDB> (anonymous)
- Not an 80x86 executable
- 5DE00000 Module <Mod_5DE0> (anonymous)
- Not an 80x86 executable
- 5DE80000 Module <Mod_5DE8> (anonymous)
- Not an 80x86 executable
- 74F60000 Module 'C:\Windows\SYSTEM32\msvcrt.dll'
- 77AC0000 Module 'C:\Windows\SYSTEM32\MSCTF.dll'
- 77D00000 Module 'C:\Windows\SYSTEM32\IMM32.DLL'
- Analysing Mod_5DE8
- 0 fuzzy procedures
- Analysing Mod_5DE0
- 0 fuzzy procedures
- Analysing Mod_5DDB
- 0 fuzzy procedures
- 72888A80 INT3 command at 72888A80 - Shift+Run/Step to pass exception to the program
- 00000272 Access violation when reading [00000272] - passed to application
- 00000272 Access violation when reading [00000272] - application was unable to process exception
- Process terminated, exit code 0
- File 'D:\Dev\Crack\Crackme\snd-reversingwithlena-tutorial03.tutorial\files\RegisterMe.exe'
- New process (ID 00002B20) created
- 00401000 Main thread (ID 00002940) created
- 001C0000 Unload hidden module 001C0000
- 77D40000 Unload hidden module 77D40000
- 001C0000 Unload hidden module 001C0000
- 00410000 Unload hidden module 00410000
- 00400000 Module 'D:\Dev\Crack\Crackme\snd-reversingwithlena-tutorial03.tutorial\files\RegisterMe.exe'
- 70290000 Module 'C:\Windows\system32\apphelp.dll'
- 71880000 Module 'C:\Program Files\Bitdefender\Antivirus Free Edition\avc3\avc3_sig_317\avcuf32.dll'
- 751B0000 Module 'C:\Windows\SYSTEM32\GDI32.dll'
- 77200000 Module 'C:\Windows\SYSTEM32\KERNELBASE.dll'
- 778D0000 Module 'C:\Windows\SYSTEM32\USER32.dll'
- 77D40000 Module 'C:\Windows\SYSTEM32\KERNEL32.DLL'
- 77E30000 Module 'C:\Windows\SYSTEM32\ntdll.dll'
- Code size is extended to include all sections marked as CODE
- Code sections '.text' and 'RT' will be merged to a single memory block
- 5DDB0000 Module <Mod_5DDB> (anonymous)
- Not an 80x86 executable
- 5DE00000 Module <Mod_5DE0> (anonymous)
- Not an 80x86 executable
- 5DE80000 Module <Mod_5DE8> (anonymous)
- Not an 80x86 executable
- 74F60000 Module 'C:\Windows\SYSTEM32\msvcrt.dll'
- 77AC0000 Module 'C:\Windows\SYSTEM32\MSCTF.dll'
- 77D00000 Module 'C:\Windows\SYSTEM32\IMM32.DLL'
- Analysing Mod_5DE8
- 0 fuzzy procedures
- Analysing Mod_5DE0
- 0 fuzzy procedures
- Analysing Mod_5DDB
- 0 fuzzy procedures
- 72888A80 INT3 command at 72888A80 - Shift+Run/Step to pass exception to the program
- 00401000 Unable to protocol function arguments
- 00401002 Breakpoint at RegisterMe.00401002
- 77E6DAA1 Access violation when reading [00000008] - passed to application
- 77E6DAA1 Access violation when reading [00000008] - application was unable to process exception
- 77E6DAA1 Access violation when reading [00000008] - passed to application
- Access violation when reading [00000000] - passed to application
- 77E645B0 New thread 2. (ID 00001348) created
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement