MS IE OBJECT tag exploit'



            

- 2


dbghelp.dll Debugging Tools IDA Pro, pdb.plw .

, , . <G> (goto) "75ACC4DA", . . (.  8), 75A9211Dh :

.text:75ACC4C0 sub_75ACC4C0 proc near ; CODE XREF: sub_75AB7EE6+1E2p

.text:75ACC4C0 ; sub_75AC4C20+2Ep ...

.text:75ACC4C0 push esi

.text:75ACC4C1 mov esi, ecx

.text:75ACC4C3 call sub_75A9211D

.text:75ACC4C8 mov si, [esi+6Ch]

.text:75ACC4CC test si, si

.text:75ACC4CF jz short loc_75ACC4E9

.text:75ACC4D1 movzx ecx, si

.text:75ACC4D4 imul ecx, 98h

.text:75ACC4DA mov eax, [eax+420h] ; ß

.text:75ACC4E0 pop esi

.text:75ACC4E1 lea eax, [ecx+eax-98h]

.text:75ACC4E8 retn

.text:75ACC4E9 ; -------------------------------------------------------------------

.text:75ACC4E9

.text:75ACC4E9 loc_75ACC4E9: ; CODE XREF: sub_75ACC4C0+Fj

.text:75ACC4E9 mov eax, offset unk_75C8D1A0

.text:75ACC4EE pop esi

.text:75ACC4EF retn

.text:75ACC4EF sub_75ACC4C0 endp

.text:75ACC4EF

 

(file à load file à PDB file) (.  9) :

; struct INSTANTCLASSINFO * __thiscall COleSite::GetInstantClassInfo(void)