Question

showed up in my windbg session

wow64!Wow64EmulateAtlThunk+0x82ab:
00000000`736b5cbf 89442450        
         mov     dword ptr [rsp+50h],eax ss:00000000`0011ddc0=00000060

The second part of the MOV instruction eax ss:00000000`0011ddc0=00000060 is quite confusing , how to interpret that ?

Was it helpful?

Solution

dword ptr [rsp+50h]            , eax 
          ss:00000000`0011ddc0 = 00000060

ss: (Stack Segment) + rsp which is a 64bit register containing the current stack pointer + a fixed offset of 50h bytes which results in the address: 0x11ddc0, which currently contains: 0x60, is being assigned the value of eax register.

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top