this may be a dumb question
i do file->open executable -> checkmark Debug Child Process Also -> and open
a executable
i confirm if it will debug the child or not with
0:000> .childdbg
Processes created by the current process will be debugged
do g thrice to land in child that was spawned by the debugee
*** WARNING: Unable to verify checksum for image00400000
*** ERROR: Module load completed but symbols could not be loaded for
image00400000
image00400000+0x1000:
00401000 cc int 3
00401000 cc int 3
00401001 006800 add byte ptr [eax],ch
00401004 304000 xor byte ptr [eax],al
00401007 6819304000 push offset image00400000+0x3019 (00403019)
now am i forced to change the int 3 back to the original opcode that was
there manually ??
before starting to trace ??
1:001> r eip
eip=00401000
1:001> t
eax=00000000 ebx=7ffdf000 ecx=0012ffb0 edx=7c90eb94 esi=00000034
edi=7c91b686
eip=00401001 esp=0012ffc4 ebp=0012fff0 iopl=0 nv up ei pl zr na pe
nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246
image00400000+0x1001:
00401001 006800 add byte ptr [eax],ch
ds:0023:00000000=??
gh gn etc dont seem to avoid the access violation because it is trying to
execute bogus line at 401001