PE Studio
Load it up in x32dbg
Starting at entry point
We suspect shellcode is present in this executable, so we start off by setting a breakpoint on VirtualAlloc in x32dbg with the command bp VirtualAlloc
, run the executable and then run to user code or shortcut Alt + F9.
At this point, we can Step Over (F8) until we reach a CALL that allocates the shellcode which is at 00408460
Currently at user code after the breakpoint set on VirtualAlloc
In EAX, you can Follow in Dump and see Opcodes FC E8
that reference shellcode
From here, you can right-click on 00408460 to Follow in Memory Map
Then, right-click again and Dump Memory to file where you’ll now have a copy of the shellcode