

Simply add the registry value MoveImages to the key HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\MoveImages and set its value to 0x00000000. The best solution is to simply disable ASLR in your debugging VM.
#PE EXPLORER PROFESSIONAL PRO#
IDA Pro will load the PE file using its preferred base address so this will not match with the random base address ASLR has given you in your debugger. This can cause a lot of headaches if you are trying to match up addresses in IDA Pro with addresses in your debugger. The problem with debugging ASLR enabled malware is that the base address of the PE continuously changes each time you restart the debugger. This means that ASLR is now common in malware too! IMAGE_OPTIONAL_HEADER courtesy of the amazing CorkamiĪll modern versions of VisualStudio will enable this setting by default by setting the /DYNAMICBASE build flag.
#PE EXPLORER PROFESSIONAL WINDOWS#
This protection was first introduced to Windows OS with Vista in 2007, and though it is enabled in the OS, each PE file must opt-in to ASLR by setting the ASLR flag 0x40 in the DllCharacteristics entry in the PE IMAGE_OPTIONAL_HEADER.

Menu Disable ASLR for Easier Malware Debugging With 圆4dbg and IDA Pro 12 June 2019 on TutorialsĪddress space layout randomization (ASLR) is a security protection the randomly arranges the address space of a process, including the base address where the PE file is loaded.
