+-------------------------------------------------------------------------+ | This file has been generated by The Iron-Ox Tools | | CopyLeft (c) 2010-2015/VxJump, | | by nEINEI | | Automated Exploit Analysis Tools | +-------------------------------------------------------------------------+ **************************************** 2015/03/13 15:56:08.869 Current Target Process:C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE **************************************** Exploit Type:Stack Overflow:3 Address While In The Vulnerability Happens:7FFA4512 Registers While In The Vulnerability Happens: EAX:00000000,EBX:04150810,ECX:7C93003D,EDX:00140608,ESI:001B545C,EDI:00000000,EBP:00000000,ESP:00121058 Current Stack Pointer:--->0x00121058 Stack Information:Probably Execution Code stack[0]:0x1005C48B stack[1]:0xC7000001 stack[2]:0x4D032400 stack[3]:0x005AE908 7FFA4512: FFE4 JMP ESP ; 7FFA4514: 00E5 ADD CH, AH ; 7FFA4516: 01E5 ADD EBP, ESP ; 7FFA4518: 02E5 ADD AH, CH ; 7FFA451A: 03E5 ADD ESP, EBP ; 7FFA451C: 04E5 ADD AL, E5 ; 7FFA451E: 3F AAS ; 7FFA451F: 0005E506E507 ADD BYTE PTR DS:[07E506E5],AL ; 7FFA4525: E508 IN EAX, 08 ; I/O Instruction 7FFA4527: E509 IN EAX, 09 ; I/O Instruction 7FFA4529: E50A IN EAX, 0A ; I/O Instruction 7FFA452B: E50B IN EAX, 0B ; I/O Instruction 7FFA452D: E50C IN EAX, 0C ; I/O Instruction 7FFA452F: E50D IN EAX, 0D ; I/O Instruction 7FFA4531: E50E IN EAX, 0E ; I/O Instruction 7FFA4533: E50F IN EAX, 0F ; I/O Instruction 7FFA4535: E510 IN EAX, 10 ; I/O Instruction 7FFA4537: E511 IN EAX, 11 ; I/O Instruction 7FFA4539: E512 IN EAX, 12 ; I/O Instruction 7FFA453B: E513 IN EAX, 13 ; I/O Instruction //-------------------------------------------------------------------------------------------------------