ropshell> use 6ca1ff4c257aa667e9569063f70482d0 (download)
name         : VulnApp2.exe (i386/PE)
base address : 0x14801000
total gadgets: 992
ropshell> suggest "load mem"
> 0x1480a354 : mov eax, [edx + 4]; ret
> 0x14809c1e : mov eax, [ebp + 8]; mov esp, ebp; pop ebp; ret
> 0x14803f0f : movzx eax, [edx]; movzx ecx, [ecx]; sub eax, ecx; pop esi; pop ebp; ret
> 0x1480182d : mov ecx, [eax + 4]; or [eax], 2; mov [eax + 4], ecx; ret
> 0x14802252 : mov eax, [edi]; mov [ecx], eax; mov [ecx + 4], 0; pop edi; pop ebp; ret
> 0x14804d6b : mov eax, [esi]; mov eax, [eax]; mov eax, [eax + 0x48];  inc [eax]; pop esi; ret
> 0x14803fbb : mov ecx, [ebp + 8]; movzx eax, [eax + ecx*2]; and eax, [ebp + 0xc]; pop ebp; ret