ropshell> use aad8314b8930c06eb75b2c93a6f2cbd3 (download) name : AntReg.dll (i386/PE) base address : 0x10001000 total gadgets: 583
ropshell> suggest call > 0x100018c1 : call eax > 0x10001393 : call ebx > 0x1000129f : call esi > 0x100013da : call edi > 0x1000235d : call ebp jmp > 0x10002dcf : jmp [eax] > 0x10003fe3 : jmp [esi - 0x75] load mem > 0x100047a8 : mov ecx, [eax]; mov eax, [eax + 4]; push eax; ret > 0x10001922 : mov eax, [ebp + 0xc]; pop edi; pop esi; pop ebx; pop ebp; ret 0xc > 0x100038dd : mov ecx, [ebp + 8]; mov [ebx + 8], ecx; mov [ebx + 4], eax; mov [ebx + 0xc], ebp; pop ecx; pop ebx; ret 4 load reg > 0x10002644 : pop eax; ret > 0x1000203a : pop ebx; ret > 0x100017a6 : pop ecx; ret > 0x10001c9e : pop esi; ret > 0x10001c60 : pop edi; ret pop pop ret > 0x10002644 : pop eax; ret > 0x10001ced : pop eax; pop esi; ret > 0x10002470 : pop ebx; pop ecx; pop ecx; ret > 0x1000246f : pop ebp; pop ebx; pop ecx; pop ecx; ret > 0x1000246e : pop esi; pop ebp; pop ebx; pop ecx; pop ecx; ret sp lifting > 0x10001bab : add esp, 0x10; ret > 0x10001bab : add esp, 0x10; ret stack pivoting > 0x1000381c : mov esp, ebp; pop ebp; ret > 0x100047a6 : mov esp, ecx; mov ecx, [eax]; mov eax, [eax + 4]; push eax; ret > 0x100010cf : leave ; ret