//------------------------------------------------------------------------------------------------------- +-------------------------------------------------------------------------+ | This file has been generated by The Iron-Ox Tools | | CopyLeft (c) 2010-2017/VxJump, | | by nEINEI | | Automated Exploit Analysis Tools | +-------------------------------------------------------------------------+ **************************************** 2017/12/26 03:27:18.418 Current Target Process:C:\Program Files\Microsoft Office\Office12\WINWORD.EXE **************************************** OS Version :Windows Win7 Exploit Type:ROP Attacking attemp to bypass ASLR+DEP. Address While In the Vulnerability Happens:07847A52 Registers While In The Vulnerability Happens: EAX:00000000,EBX:00000000,ECX:00000000,EDX:00000000,ESI:00000000,EDI:00000000,EBP:00000000,ESP:00000000 Fake Stack Information While In The Vulnerability Happens:--->0x07847A52 heap[0]:0x707DCA94 heap[1]:0x001AC7C8 heap[2]:0x078CCA68 heap[3]:0x078CCA68 07847A52: 94 XCHG EAX, ESP ; 07847A53: CA 7D70 RETF 707D ; 07847A56: C8 C71A 00 ENTER 1AC7, 00 ; 07847A5A: 68 CA8C0768 PUSH 68078CCA ; 07847A5F: CA 8C07 RETF 078C ; 07847A62: 17 POP SS ; Pop top stack to SS 07847A63: B605 MOV DH, 05 ; 07847A65: 004000 ADD BYTE PTR DS:[EAX+00H],AL ; 07847A68: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A6A: 087C8407 OR BYTE PTR DS:[EAX*4+ESP+07H],BH ; 07847A6E: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A70: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A72: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A74: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A76: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A78: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A7A: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A7C: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A7E: 0000 ADD BYTE PTR DS:[EAX],AL ; 07847A80: 0000 ADD BYTE PTR DS:[EAX],AL ; //-------------------------------------------------------------------------------------------------------