Anonymous
September 25th, 2003, 11:08
Hello,
Is it possible to view the previous adress of the disassembled program? I mean sometimes a function is called by many different calls, or sometimes it is not clear in the analysed text who calls the function, but I want to see what the caller was (or where was jumped from), without using the execute till return function (because this doesn't work for jmp commands)
For example I have this code-snippet:
00BA927B EB 00 JMP SHORT 00BA927D
00BA927D 83C4 08 ADD ESP,8
00BA9280 E9 2A030000 JMP 00BA95AF
00BA9285 B8 F0C9BF00 MOV EAX,0BFC9F0 <--------------Currently here
00BA928A 50 PUSH EAX
00BA928B E8 306589FF CALL Install_.0043F7C0
And I've set a breakpoint on all these addresses, but it breaks only on the currently here statement, and I can figure out what the previous instruction was...
Tnx for ya help!
Is it possible to view the previous adress of the disassembled program? I mean sometimes a function is called by many different calls, or sometimes it is not clear in the analysed text who calls the function, but I want to see what the caller was (or where was jumped from), without using the execute till return function (because this doesn't work for jmp commands)
For example I have this code-snippet:
00BA927B EB 00 JMP SHORT 00BA927D
00BA927D 83C4 08 ADD ESP,8
00BA9280 E9 2A030000 JMP 00BA95AF
00BA9285 B8 F0C9BF00 MOV EAX,0BFC9F0 <--------------Currently here
00BA928A 50 PUSH EAX
00BA928B E8 306589FF CALL Install_.0043F7C0
And I've set a breakpoint on all these addresses, but it breaks only on the currently here statement, and I can figure out what the previous instruction was...
Tnx for ya help!