simple_appcall_win

summary: execute code into the application being debugged (on Windows)

description:

Using the ida_idd.Appcall utility to execute code in the process being debugged.

This example will run the test program and stop wherever the cursor currently is, and then perform an appcall to execute the ref4 and ref8 functions.

To use this example:

  • run ida on test program simple_appcall_win64.exe, or ida on test program simple_appcall_win32.exe, and wait for auto-analysis to finish

  • select the ‘windows debugger’ (either local, or remote)

  • run this script

Note: the real body of code is in simple_appcall_common.py.

level: advanced

Attributes

ref4_ea

appcall_hooks

Module Contents

simple_appcall_win.ref4_ea = 5368713216
simple_appcall_win.appcall_hooks