//------------------------------------------------------------------------------------------------------- +-------------------------------------------------------------------------+ | This file has been generated by The Iron-Ox Tools | | CopyLeft (c) 2010-2017/VxJump, | | by nEINEI | | Automated Exploit Analysis Tools | +-------------------------------------------------------------------------+ **************************************** 2017/12/26 05:57:20.480 Current Target Process:C:\Program Files\Microsoft Office\Office12\WINWORD.EXE **************************************** OS Version :Windows Win7 Exploit Type:ROP Attacking attempt to bypass ASLR+DEP. Address While In the Vulnerability Happens:074498BA Registers While In The Vulnerability Happens: EAX:00000000,EBX:00000000,ECX:00000000,EDX:00000000,ESI:00000000,EDI:00000000,EBP:00000000,ESP:00000000 Fake Stack Information While In The Vulnerability Happens:--->0x074498BA heap[0]:0x7055CA94 heap[1]:0x002CCC8C heap[2]:0x074CCA68 heap[3]:0x074CCA68 074498BA: 94 XCHG EAX, ESP ; 074498BB: CA 5570 RETF 7055 ; 074498BE: 8CCC MOV SP, CS ; 074498C0: 2C00 SUB AL, 00 ; 074498C2: 68 CA4C0768 PUSH 68074CCA ; 074498C7: CA 4C07 RETF 074C ; 074498CA: 17 POP SS ; Pop top stack to SS 074498CB: B605 MOV DH, 05 ; 074498CD: 004000 ADD BYTE PTR DS:[EAX+00H],AL ; 074498D0: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498D2: 709A JO 0744986E ; 074498D4: 44 INC ESP ; 074498D5: 07 POP ES ; Pop top stack to ES 074498D6: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498D8: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498DA: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498DC: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498DE: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498E0: 0000 ADD BYTE PTR DS:[EAX],AL ; 074498E2: 0000 ADD BYTE PTR DS:[EAX],AL ; //------------------------------------------------------------------------------------------------------- +-------------------------------------------------------------------------+