代码拉取完成,页面将自动刷新
regasm /u C:\project\testcveCVE-2017-0713\testcveCVE-2017-021320170702\testcveCVE-2017-0213\testcve\CMarshaller\bin\x86\Debug\CMarshaller.dll
regasm C:\project\testcveCVE-2017-0713\testcveCVE-2017-021320170702\testcveCVE-2017-0213\testcve\CMarshaller\bin\x86\Debug\CMarshaller.dll
regsvr32 C:\Windows\System32\tapi3.dll
regsvr32 /u C:\Windows\System32\tapi3.dll
regsvr32 C:\Windows\SysWOW64\MSSITLB.dll
regsvr32 C:\git\MyWorkSpace\ShadowAltWorker\Debug\ShadowAltWorker.dll
C:\123\sys\testalt.dllCoMarshalInterface
org is in typelib=>{4584EA27-6431-483D-8653-F96796E1A051} interface=>{E80A6EC1-39FB-462A-A56C-411EE9FC1AEB} class=>{26D6311A-A724-4C8C-B83A-2E60ECD47480}
C:\project\testalt\Debug\testalt.dll
APPID=>{3E5F704C-C0ED-491C-9BB5-EA1EAD8B31B7}
oldtypelibVAlue C:\project\testalt\Debug\testalt.dll
regsvr32 C:\project\testalt\Debug\testalt.dll
cve=>C:\dl\cve\Windows\System32\tapi3.dll
tapi3TypeLib=>{21D6D480-A88B-11D0-83DD-00AA003CCABD} netx:=>{21D6D48E-A88B-11D0-83DD-00AA003CCABD}
C:\Windows\System32\tapi3.dll
script:C:\dl\cve\run.sct
HKEY_CLASSES_ROOT\TypeLib\{4584EA27-6431-483D-8653-F96796E1A051}\1.0\0\win32
E80A6EC1-39FB-462A-A56C-411EE9FC1AEB
regsvr32 C:\project\HiJacker\Debug\HiJacker.dll
C:\project\HiJacker\Debug\HiJacker.dll
C:\"Program Files"\"IDA 7.0"\tilib.exe -c D:\1\oleaut32.til
C:\"Program Files"\"IDA 7.0"\tilib.exe -c D:\1\ole32.til
C:\"Program Files"\"IDA 7.0"\pcf.exe D:\1\OleAut32.Lib D:\1\t.pat
C:\"Program Files"\"IDA 7.0"\sigmake.exe D:\1\t.pat D:\1\t.sig
C:\Program Files (x86)\Windows Kits\8.1\Debuggers\x86
gflags.exe /i iexplore.exe +hpa +ust
typelib is {4584EA27-6431-483D-8653-F96796E1A051}
mytestcom
CLSID_FileMoniker
C:\"Program Files (x86)"\"Windows Kits"\8.1\Debuggers\x64\symchk.exe D:\src\fromwin10\32\oleaut32.dll /s SRV*D:symbols*http://msdl.microsoft.com/download/symbols/
bm mshtml!CButton::*
C:\dl\22\1.html
row count 39
D:\3\InjectDll.exe 4512 D:\3\TestDll.dll
!heap -p -a edi
x combase!*
x ole32!*_SecretLock
dc ole32!*_SecretLock
dc ole32!CFreeMarshaler::_SecretBlock L100
dc ole32!CFreeMarshaler::_fSecretInit L100
d:\3\InjectDll.exe 6764 D:\3\TestDll.dll
x mshtml!CButton::*
x mshtml!CMarkup::*
riid = {IID_IROTData}
bp mshtml!CButton::CreateElement
bp mshtml!CMarkup::OnLoadStatusDone+0x4d0
bp mshtml!CMarkup::OnLoadStatusDone+0x4d0+0x40ba
bp mshtml!CElement::GetSourceIndex
s -a 0x00000000 L?7fffffff "spray"
s -d 0x00000000 L?7fffffff 0x7856
Padding += "\u5678\u7960";}
s -d 0x00000000 L?7fffffff 0x79605686
09c00fa4
0acadfa8
s -d 0x00000000 L?7fffffff 0x0c7e8012
0b5c5fa8
s -d 0x00000000 0x0b240fc4 0x79605686
s -d 0x00000000 0x0b3f1fa8 0x79605686
40ba
espzai
0b3e9fa8
shellcodezai
0ca
heapalloc
6e011300
exp
6e03e1cb
0acadfa8
0a8eea94 top
0acedfec btn
0acadfa8 ebp
6ea95570
#pragma pack(push, 4)
#pragma pack(pop)
lib /def:d:\1\qmgr.def /machine:x86 /out:d:\1\qmgr.lib
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。