ropshell> use fd914adeab889de795a009244b91fc4a (download) name : SEHLokoD.exe (i386/PE) base address : 0x8001000 total gadgets: 284
ropshell> suggest call > 0x08002902 : call ebx > 0x080041d0 : call esi > 0x08002868 : call edi > 0x08002820 : call [eax + 0x68] > 0x080027cb : call [ebx + 0x56] jmp > 0x080017df : jmp [eax] > 0x0800426e : jmp [esi + 0x39] load mem > 0x08003066 : mov ecx, [ebp + 0xc]; ror eax, cl; pop ebp; ret > 0x08003063 : mov eax, [ebp + 8]; mov ecx, [ebp + 0xc]; ror eax, cl; pop ebp; ret > 0x08003ac1 : mov eax, [ecx + 4]; mov ecx, [ebp - 8]; mov [ecx], edx; mov [ecx + 4], eax; mov esp, ebp; pop ebp; ret load reg > 0x08003ebb : pop esi; ret > 0x08001713 : pop ebp; ret > 0x08001b8d : pop ebx; pop ebp; ret 4 > 0x08003eba : pop edi; pop esi; ret > 0x08002145 : pop ecx; pop edi; pop esi; pop ebx; mov esp, ebp; pop ebp; ret pop pop ret > 0x08001713 : pop ebp; ret > 0x08003eba : pop edi; pop esi; ret > 0x08001b8c : pop esi; pop ebx; pop ebp; ret 4 > 0x08001b8b : pop edi; pop esi; pop ebx; pop ebp; ret 4 sp lifting > 0x08001def : add esp, 0x14; ret > 0x08001def : add esp, 0x14; ret stack pivoting > 0x08001711 : mov esp, ebp; pop ebp; ret write mem > 0x08001d83 : add [eax], ecx; ret > 0x080034e4 : add [eax + 0x5de58b01], esi; ret