Summary:
NtAdjustPrivilegesToken(>) | 1 | NtDeleteAtom(>) | 2 | NtGdiBitBlt(>) | 7 | NtQueryInformationProcess(>) | 15 |
NtCallbackReturn(>) | 1 | NtEnumerateKey(>) | 2 | NtGdiCreateDIBitmapInternal(>) | 7 | NtCreateSection(>) | 17 |
NtCreateMutant(>) | 1 | NtGdiCreateSolidBrush(>) | 2 | NtGdiGetDCObject(>) | 7 | NtGdiDeleteObjectApp(>) | 18 |
NtCreateProcessEx(>) | 1 | NtOpenDirectoryObject(>) | 2 | NtGdiGetDCforBitmap(>) | 7 | NtReadFile(>) | 19 |
NtCreateThread(>) | 1 | NtOpenEvent(>) | 2 | NtGdiGetStockObject(>) | 7 | NtContinue(>) | 20 |
NtDelayExecution(>) | 1 | NtOpenSymbolicLinkObject(>) | 2 | NtGdiRestoreDC(>) | 7 | NtQuerySystemInformation(>) | 20 |
NtDuplicateToken(>) | 1 | NtQueryInstallUILanguage(>) | 2 | NtGdiSaveDC(>) | 7 | NtUserCallOneParam(>) | 20 |
NtEnumerateValueKey(>) | 1 | NtQuerySymbolicLinkObject(>) | 2 | NtGdiSetDIBitsToDeviceInternal(>) | 7 | NtWaitForSingleObject(>) | 21 |
NtGdiCreatePaletteInternal(>) | 1 | NtReadVirtualMemory(>) | 2 | NtOpenProcessToken(>) | 7 | NtFlushInstructionCache(>) | 23 |
NtGdiInit(>) | 1 | NtTerminateProcess(>) | 2 | NtUserDestroyCursor(>) | 7 | NtWriteFile(>) | 23 |
NtGdiQueryFontAssocInfo(>) | 1 | NtUserWaitForInputIdle(>) | 2 | NtUserSetCursorIconData(>) | 7 | NtOpenProcessTokenEx(>) | 24 |
NtNotifyChangeKey(>) | 1 | NtAddAtom(>) | 3 | NtGdiCreateBitmap(>) | 8 | NtOpenThreadTokenEx(>) | 24 |
NtOpenKeyedEvent(>) | 1 | NtCreateSemaphore(>) | 3 | NtQuerySection(>) | 8 | NtOpenSection(>) | 25 |
NtOpenProcess(>) | 1 | NtDuplicateObject(>) | 3 | NtRequestWaitReplyPort(>) | 8 | NtOpenFile(>) | 30 |
NtQueryInformationJobObject(>) | 1 | NtFreeVirtualMemory(>) | 3 | NtSetInformationThread(>) | 8 | NtQueryAttributesFile(>) | 31 |
NtQueryObject(>) | 1 | NtGdiHfontCreate(>) | 3 | NtQueryDebugFilterState(>) | 9 | NtQueryInformationToken(>) | 31 |
NtQuerySystemTime(>) | 1 | NtOpenMutant(>) | 3 | NtSetInformationFile(>) | 9 | NtMapViewOfSection(>) | 37 |
NtRegisterThreadTerminatePort(>) | 1 | NtSetInformationObject(>) | 3 | NtCreateEvent(>) | 10 | NtReleaseMutant(>) | 40 |
NtResumeThread(>) | 1 | NtFsControlFile(>) | 4 | NtGdiCreateCompatibleDC(>) | 10 | NtAllocateVirtualMemory(>) | 41 |
NtSecureConnectPort(>) | 1 | NtOpenThreadToken(>) | 4 | NtGdiExtGetObjectW(>) | 10 | NtProtectVirtualMemory(>) | 45 |
NtTestAlert(>) | 1 | NtSetValueKey(>) | 4 | NtQueryDirectoryFile(>) | 10 | NtUserUnregisterClass(>) | 45 |
NtUserCallNoParam(>) | 1 | NtWriteVirtualMemory(>) | 4 | NtCreateFile(>) | 11 | NtQueryValueKey(>) | 51 |
NtUserEnumDisplayMonitors(>) | 1 | NtUserRegisterWindowMessage(>) | 5 | NtUserGetDC(>) | 11 | NtGdiSelectBitmap(>) | 57 |
NtUserGetKeyboardLayoutList(>) | 1 | NtCreateKey(>) | 6 | NtUnmapViewOfSection(>) | 12 | NtUserRegisterClassExWOW(>) | 63 |
NtUserGetThreadDesktop(>) | 1 | NtQueryDefaultUILanguage(>) | 6 | NtQueryDefaultLocale(>) | 13 | NtUserGetClassInfo(>) | 64 |
NtUserSetWindowsHookEx(>) | 1 | NtQueryVirtualMemory(>) | 6 | NtQueryInformationFile(>) | 13 | NtUserFindExistingCursorIcon(>) | 72 |
NtAccessCheck(>) | 2 | NtQueryVolumeInformationFile(>) | 6 | NtUserSystemParametersInfo(>) | 13 | NtOpenKey(>) | 112 |
NtCreateIoCompletion(>) | 2 | NtSetInformationProcess(>) | 6 | NtUserSelectPalette(>) | 14 | NtClose(>) | 165 |
\321\324\2026\225\17\322t\204\1\272z\207\222-\376\324Q\241l\2743\314\321$]n-a\320\251\260[\372\225\353\17"
\2\267\367J\227Fa\266Hve?y3u\321\302\204\315n\242\230~\22\5\205U3cF"l\357\370\365\120\336\211\364\331Wx5`Q\2164\0\216\3058\27\244\222\24\34\305\242\364\263\346\215\235\240wU5a\371t6\332W\357\330X.\315L\311\225\30\364\340\244Tt\5j\305$\235\3\376\277bv\323\302.\231\366-\362\3379\302\2622u\26dG\20~\303\322(>&\7J\234\377G$\24\213|\220\1\242>k\355\210\21}P\271\6e\354\272F\311y\12\234\244\342LW\221\360\261Yq\366[S\342q\34WFqn\371P$\6\26a\12\14~\205@sG\376),Wfr\1\130<\13Kc\274\204\22`\333@IQ\220\23J\2069\362W\377\266*\335\233\274WJ\311\372\3402|E\20\310l\366\14Vc>z\235\25P\351{\306\26\32\205I\362\257~\7\257_Ne\323`/'\355\306vD`3\261G\354\323\346\201\214\347\26\247MKRaeV]\362\210}5\11\14G\2101\274C\35\247D\12zg\302\355\371g\270<\275& KU\21$\321\271\233`\231", 61440, 0x0, 0, ... {status=0x0, info=61440}, ) ^F\366\20
266
\2\267\367J\227Fa\266Hve?y3u\321\302\204\315n\242\230~\22\5\205U3cF"l\357\370\365\120\336\211\364\331Wx5`Q\2164\0\216\3058\27\244\222\24\34\305\242\364\263\346\215\235\240wU5a\371t6\332W\357\330X.\315L\311\225\30\364\340\244Tt\5j\305$\235\3\376\277bv\323\302.\231\366-\362\3379\302\2622u\26dG\20~\303\322(>&\7J\234\377G$\24\213|\220\1\242>k\355\210\21}P\271\6e\354\272F\311y\12\234\244\342LW\221\360\261Yq\366[S\342q\34WFqn\371P$\6\26a\12\14~\205@sG\376),Wfr\1\130<\13Kc\274\204\22`\333@IQ\220\23J\2069\362W\377\266*\335\233\274WJ\311\372\3402|E\20\310l\366\14Vc>z\235\25P\351{\306\26\32\205I\362\257~\7\257_Ne\323`/'\355\306vD`3\261G\354\323\346\201\214\347\26\247MKRaeV]\362\210}5\11\14G\2101\274C\35\247D\12zg\302\355\371g\270<\275& KU\21$\321\271\233`\231", 61440, 0x0, 0, ... {status=0x0, info=61440}, ) , 61440, 0x0, 0, ... {status=0x0, info=61440}, ) == 0x0 01075 396 NtWriteFile (140, 0, 0, 0, (140, 0, 0, 0, "@a\211s\35\203\22[\255\11o\11Y\6\341\346vk\224\264O$g${D\26j\13\325'\12\331f\226\370\373\14\251s\6\4UkqPsSG\264R\10UJ\306\377\357]&'\26\23\14k]\273\14@iv\275F\30$\36j\243\306x\235\272yJDS\372\\331\356\307\266\371\223C\274\342k\356K\5\7\326\352^gl$~D\354f\301\320\276\334\270Y"\322\20`\24\240*\227\221>\373\272D\200\22[\345\362\211]HA[\261G\252:%'\376\27\261Y\273\342\251\346\353\264\37\311J\271\17\226\222\353u\350C\347Y\323A\33R4/ "a2w_\7%\264D1\3\354T\326m\24\3428[\24\313N\321\264}C#@9\356m^\11\206\13\310\363\276'JU\311\336\37\323\311<\267\323\223}=U\325\6N\225\342ut_H\234\27\376\17\207\303:.\20\322mSG\373\251(:\177I\346\317\375*\177=\311)y\20\252\326~v\240y\207\355;\27>\234\367\217j\305\252\275y\240w\272\212\215B\21\21/\252\264\2351\25\334\205\24f\375h\36Q*\2761#\256L=\3449\323"\321\303)\35aR\23\207\355\272V\274%~\356^IF'\202+\351\30M\333[mB\4$g\32\260\23\357k\345\3510\322J\374\276\233\253\276o\355u\350oq}P\303\301n\15\30\315\332\275c<\344\346\357\362\252\304V\352\30\241P\211\333\250~*`\326\247\6\210E&\177\13\202\210\207\351\35\3575\252m\246Yb\240\271C\370\16\27\251\203\254wD\5\354\344\206P\205\330\327\325S\216`\333\231\233\1\352\321\230\367H\345f\300\363\334\271u\215\37\21Q\335\273\222;K#\221\373Z\374}\335\352\222\177\310\343\213\33\300\273_]|tZ$C\371|/C\367\225#\274\35", 61440, 0x0, 0, ... {status=0x0, info=61440}, ) \322\20`\24\240*\227\221>\373\272D\200\22[\345\362\211]HA[\261G\252:%'\376\27\261Y\273\342\251\346\353\264\37\311J\271\17\226\222\353u\350C\347Y\323A\33R4/ (140, 0, 0, 0, "@a\211s\35\203\22[\255\11o\11Y\6\341\346vk\224\264O$g${D\26j\13\325'\12\331f\226\370\373\14\251s\6\4UkqPsSG\264R\10UJ\306\377\357]&'\26\23\14k]\273\14@iv\275F\30$\36j\243\306x\235\272yJDS\372\\331\356\307\266\371\223C\274\342k\356K\5\7\326\352^gl$~D\354f\301\320\276\334\270Y"\322\20`\24\240*\227\221>\373\272D\200\22[\345\362\211]HA[\261G\252:%'\376\27\261Y\273\342\251\346\353\264\37\311J\271\17\226\222\353u\350C\347Y\323A\33R4/ "a2w_\7%\264D1\3\354T\326m\24\3428[\24\313N\321\264}C#@9\356m^\11\206\13\310\363\276'JU\311\336\37\323\311<\267\323\223}=U\325\6N\225\342ut_H\234\27\376\17\207\303:.\20\322mSG\373\251(:\177I\346\317\375*\177=\311)y\20\252\326~v\240y\207\355;\27>\234\367\217j\305\252\275y\240w\272\212\215B\21\21/\252\264\2351\25\334\205\24f\375h\36Q*\2761#\256L=\3449\323"\321\303)\35aR\23\207\355\272V\274%~\356^IF'\202+\351\30M\333[mB\4$g\32\260\23\357k\345\3510\322J\374\276\233\253\276o\355u\350oq}P\303\301n\15\30\315\332\275c<\344\346\357\362\252\304V\352\30\241P\211\333\250~*`\326\247\6\210E&\177\13\202\210\207\351\35\3575\252m\246Yb\240\271C\370\16\27\251\203\254wD\5\354\344\206P\205\330\327\325S\216`\333\231\233\1\352\321\230\367H\345f\300\363\334\271u\215\37\21Q\335\273\222;K#\221\373Z\374}\335\352\222\177\310\343\213\33\300\273_]|tZ$C\371|/C\367\225#\274\35", 61440, 0x0, 0, ... {status=0x0, info=61440}, ) \321\303)\35aR\23\207\355\272V\274%~\356^IF'\202+\351\30M\333[mB\4$g\32\260\23\357k\345\3510\322J\374\276\233\253\276o\355u\350oq}P\303\301n\15\30\315\332\275c<\344\346\357\362\252\304V\352\30\241P\211\333\250~*`\326\247\6\210E&\177\13\202\210\207\351\35\3575\252m\246Yb\240\271C\370\16\27\251\203\254wD\5\354\344\206P\205\330\327\325S\216`\333\231\233\1\352\321\230\367H\345f\300\363\334\271u\215\37\21Q\335\273\222;K#\221\373Z\374}\335\352\222\177\310\343\213\33\300\273_]|tZ$C\371|/C\367\225#\274\35", 61440, 0x0, 0, ... {status=0x0, info=61440}, ) == 0x0 01076 396 NtWriteFile (140, 0, 0, 0, (140, 0, 0, 0, "Ve6\0\357,q+Ve6\0Ve7\0Ve6\0\26a6\0b90\0=d6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve1\0\257\326\0\316a6\200\254\326\0\226a6\200\255\326\0\276a6\200\252\326\0F`6\200\253\326\0n`6\200\250\326\06`6\200\251\326\0\336`6\200Ve6\0\357,q+Ve6\0Ve7\0Ve6\0\346a6\0\36680\0Be6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve7\0Ve6\0\216a6\0\34280\0Be6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve7\0Ve6\0V`6\0\23680\0Be6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve7\0Ve6\0~`6\0\21280\0Be6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve7\0Ve6\0\6`6\0\24680\0Be6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve7\0Ve6\0.`6\0R;0\0Be6\0Ve6\0Ve6\0Ve6\0\357,q+Ve6\0Ve7\0Ve6\0\366`6\0N;0\0Be6\0Ve6\0Ve6\0Per\0\0eu\0\32ew\0\32e=\0\2ep\0\3ex\0\25e{\0\31er\0\3ez\0\23e6\0Ve6\0Ve6\0Ve6\0\272C1\0\366C1\0Ve6\0Ve6\0Ve6\0\257C1\0\372C1\0Ve6\0Ve6\0Ve6\0PB1\0\342C1\0Ve6\0Ve6\0", 3032, 0x0, 0, ... {status=0x0, info=3032}, ) , 3032, 0x0, 0, ... {status=0x0, info=3032}, ) == 0x0 01077 396 NtUnmapViewOfSection (-1, 0x9f0000, ... ) == 0x0 01078 396 NtSetInformationFile (140, 1244376, 40, Basic, ... {status=0x0, info=0}, ) == 0x0 01079 396 NtClose (144, ... ) == 0x0 01080 396 NtClose (140, ... ) == 0x0 01081 396 NtCreateKey (0xf003f, {24, 28, 0x40, 0, 0, (0xf003f, {24, 28, 0x40, 0, 0, "SOFTWARE\Microsoft\Windows\CurrentVersion\Run"}, 0, 0x0, 0, ... 140, 2, ) }, 0, 0x0, 0, ... 140, 2, ) == 0x0 01082 396 NtSetValueKey (140, (140, "Cryptographic Service", 0, 1, "C\0:\0\\0W\0I\0N\0D\0O\0W\0S\0\\0S\0y\0s\0t\0e\0m\03\02\0\\0i\0d\0t\0k\0u\0f\0.\0e\0x\0e\0\0\0", 62, ... , 0, 1, (140, "Cryptographic Service", 0, 1, "C\0:\0\\0W\0I\0N\0D\0O\0W\0S\0\\0S\0y\0s\0t\0e\0m\03\02\0\\0i\0d\0t\0k\0u\0f\0.\0e\0x\0e\0\0\0", 62, ... , 62, ... 01083 396 NtSetInformationFile (-2147482808, -131037388, 8, EndOfFile, ... {status=0x0, info=0}, ) == 0x0 01084 396 NtSetInformationFile (-2147482808, -131037480, 8, EndOfFile, ... {status=0x0, info=0}, ) == 0x0 01082 396 NtSetValueKey ... ) == 0x0 01085 396 NtClose (140, ... ) == 0x0 01086 396 NtClose (100, ... ) == 0x0 01087 396 NtQueryInformationJobObject (0, BasicUIRestrictions, 4, ... ) == STATUS_ACCESS_DENIED 01088 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe"}, 1241008, ... ) }, 1241008, ... ) == 0x0 01089 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe"}, 1241700, ... ) }, 1241700, ... ) == 0x0 01090 396 NtOpenFile (0x1000a1, {24, 0, 0x40, 0, 0, (0x1000a1, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe"}, 5, 96, ... 100, {status=0x0, info=1}, ) }, 5, 96, ... 100, {status=0x0, info=1}, ) == 0x0 01091 396 NtCreateSection (0xf001f, 0x0, 0x0, 16, 16777216, 100, ... 140, ) == 0x0 01092 396 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\Session Manager\AppCertDlls"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01093 396 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\Session Manager\AppCompatibility"}, ... 144, ) }, ... 144, ) == 0x0 01094 396 NtQueryValueKey (144, (144, "DisableAppCompat", Partial, 20, ... ) , Partial, 20, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01095 396 NtClose (144, ... ) == 0x0 01096 396 NtQueryVolumeInformationFile (100, 1241008, 8, Device, ... {status=0x0, info=8}, ) == 0x0 01097 396 NtOpenMutant (0x120001, {24, 52, 0x0, 0, 0, (0x120001, {24, 52, 0x0, 0, 0, "ShimCacheMutex"}, ... 144, ) }, ... 144, ) == 0x0 01098 396 NtWaitForSingleObject (144, 0, {-1000000, -1}, ... ) == 0x0 01099 396 NtOpenSection (0x2, {24, 52, 0x0, 0, 0, (0x2, {24, 52, 0x0, 0, 0, "ShimSharedMemory"}, ... 148, ) }, ... 148, ) == 0x0 01100 396 NtMapViewOfSection (148, -1, (0x0), 0, 0, {0, 0}, 0, 1, 0, 4, ... (0x9f0000), {0, 0}, 57344, ) == 0x0 01101 396 NtReleaseMutant (144, ... 0x0, ) == 0x0 01102 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 1238992, ... ) }, 1238992, ... ) == 0x0 01103 396 NtOpenFile (0x100020, {24, 0, 0x40, 0, 0, (0x100020, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 5, 96, ... 152, {status=0x0, info=1}, ) }, 5, 96, ... 152, {status=0x0, info=1}, ) == 0x0 01104 396 NtCreateSection (0xe, 0x0, 0x0, 16, 134217728, 152, ... 156, ) == 0x0 01105 396 NtClose (152, ... ) == 0x0 01106 396 NtMapViewOfSection (156, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 16, ... (0xa00000), 0x0, 106496, ) == 0x0 01107 396 NtClose (156, ... ) == 0x0 01108 396 NtUnmapViewOfSection (-1, 0xa00000, ... ) == 0x0 01109 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 1239308, ... ) }, 1239308, ... ) == 0x0 01110 396 NtOpenFile (0x100020, {24, 0, 0x40, 0, 0, (0x100020, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 5, 96, ... 156, {status=0x0, info=1}, ) }, 5, 96, ... 156, {status=0x0, info=1}, ) == 0x0 01111 396 NtCreateSection (0xf, 0x0, 0x0, 16, 16777216, 156, ... 152, ) == 0x0 01112 396 NtQuerySection (152, Image, 48, ... {section info, class 1, size 48}, 0x0, ) == 0x0 01113 396 NtClose (156, ... ) == 0x0 01114 396 NtMapViewOfSection (152, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 4, ... (0x75f40000), 0x0, 118784, ) == 0x0 01115 396 NtClose (152, ... ) == 0x0 01116 396 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 0, (0x80100080, {24, 0, 0x40, 0, 0, "\SystemRoot\AppPatch\sysmain.sdb"}, 0x0, 128, 1, 1, 96, 0, 0, ... 152, {status=0x0, info=1}, ) }, 0x0, 128, 1, 1, 96, 0, 0, ... 152, {status=0x0, info=1}, ) == 0x0 01117 396 NtQueryInformationFile (152, 1239596, 24, Standard, ... {status=0x0, info=24}, ) == 0x0 01118 396 NtCreateSection (0x4, 0x0, 0x0, 2, 134217728, 152, ... 156, ) == 0x0 01119 396 NtMapViewOfSection (156, -1, (0x0), 0, 0, 0x0, 0, 2, 0, 2, ... (0xa00000), 0x0, 1028096, ) == 0x0 01120 396 NtQueryInformationFile (152, 1239692, 24, Standard, ... {status=0x0, info=24}, ) == 0x0 01121 396 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 0, (0x80100080, {24, 0, 0x40, 0, 0, "\SystemRoot\AppPatch\systest.sdb"}, 0x0, 128, 1, 1, 96, 0, 0, ... ) }, 0x0, 128, 1, 1, 96, 0, 0, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01122 396 NtQuerySystemInformation (Processor, 12, ... {system info, class 1, size 12}, 0x0, ) == 0x0 01123 396 NtQueryInformationProcess (-1, Wow64, 4, ... {process info, class 26, size 4}, 0x0, ) == 0x0 01124 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01125 396 NtQueryDirectoryFile (160, 0, 0, 0, 1237256, 616, BothDirectory, 1, (160, 0, 0, 0, 1237256, 616, BothDirectory, 1, "idtkuf.exe", 0, ... {status=0x0, info=114}, ) , 0, ... {status=0x0, info=114}, ) == 0x0 01126 396 NtClose (160, ... ) == 0x0 01127 396 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 01128 396 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 01129 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe"}, 1236644, ... ) }, 1236644, ... ) == 0x0 01130 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01131 396 NtQueryDirectoryFile (160, 0, 0, 0, 1236004, 616, BothDirectory, 1, (160, 0, 0, 0, 1236004, 616, BothDirectory, 1, "WINDOWS", 0, ... {status=0x0, info=108}, ) , 0, ... {status=0x0, info=108}, ) == 0x0 01132 396 NtClose (160, ... ) == 0x0 01133 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01134 396 NtQueryDirectoryFile (160, 0, 0, 0, 1236004, 616, BothDirectory, 1, (160, 0, 0, 0, 1236004, 616, BothDirectory, 1, "System32", 0, ... {status=0x0, info=110}, ) , 0, ... {status=0x0, info=110}, ) == 0x0 01135 396 NtClose (160, ... ) == 0x0 01136 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01137 396 NtQueryDirectoryFile (160, 0, 0, 0, 1236004, 616, BothDirectory, 1, (160, 0, 0, 0, 1236004, 616, BothDirectory, 1, "idtkuf.exe", 0, ... {status=0x0, info=114}, ) , 0, ... {status=0x0, info=114}, ) == 0x0 01138 396 NtClose (160, ... ) == 0x0 01139 396 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 01140 396 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 01141 396 NtQueryInformationProcess (-1, DeviceMap, 36, ... {process info, class 23, size 36}, 0x0, ) == 0x0 01142 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01143 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 160, ) == 0x0 01144 396 NtQueryInformationToken (160, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01145 396 NtClose (160, ... ) == 0x0 01146 396 NtOpenKey (0x80000100, {24, 0, 0x40, 0, 0, (0x80000100, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01147 396 NtOpenKey (0x80000100, {24, 0, 0x40, 0, 0, (0x80000100, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\idtkuf.exe"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01148 396 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 01149 396 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 01150 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe"}, 1238924, ... ) }, 1238924, ... ) == 0x0 01151 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01152 396 NtQueryDirectoryFile (160, 0, 0, 0, 1238284, 616, BothDirectory, 1, (160, 0, 0, 0, 1238284, 616, BothDirectory, 1, "WINDOWS", 0, ... {status=0x0, info=108}, ) , 0, ... {status=0x0, info=108}, ) == 0x0 01153 396 NtClose (160, ... ) == 0x0 01154 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01155 396 NtQueryDirectoryFile (160, 0, 0, 0, 1238284, 616, BothDirectory, 1, (160, 0, 0, 0, 1238284, 616, BothDirectory, 1, "System32", 0, ... {status=0x0, info=110}, ) , 0, ... {status=0x0, info=110}, ) == 0x0 01156 396 NtClose (160, ... ) == 0x0 01157 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01158 396 NtQueryDirectoryFile (160, 0, 0, 0, 1238284, 616, BothDirectory, 1, (160, 0, 0, 0, 1238284, 616, BothDirectory, 1, "idtkuf.exe", 0, ... {status=0x0, info=114}, ) , 0, ... {status=0x0, info=114}, ) == 0x0 01159 396 NtClose (160, ... ) == 0x0 01160 396 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 01161 396 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 01162 396 NtWaitForSingleObject (144, 0, {-1000000, -1}, ... ) == 0x0 01163 396 NtQueryVolumeInformationFile (100, 1239568, 8, Device, ... {status=0x0, info=8}, ) == 0x0 01164 396 NtQueryInformationFile (100, 1239548, 40, Basic, ... {status=0x0, info=40}, ) == 0x0 01165 396 NtQueryInformationFile (100, 1239588, 24, Standard, ... {status=0x0, info=24}, ) == 0x0 01166 396 NtReleaseMutant (144, ... 0x0, ) == 0x0 01167 396 NtUnmapViewOfSection (-1, 0xa00000, ... ) == 0x0 01168 396 NtClose (156, ... ) == 0x0 01169 396 NtClose (152, ... ) == 0x0 01170 396 NtQuerySection (140, Image, 48, ... {section info, class 1, size 48}, 0x0, ) == 0x0 01171 396 NtOpenKey (0x80000000, {24, 0, 0x40, 0, 0, (0x80000000, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\idtkuf.exe"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01172 396 NtOpenThreadToken (-2, 0x2000000, 1, ... ) == STATUS_NO_TOKEN 01173 396 NtOpenProcessToken (-1, 0xa, ... 152, ) == 0x0 01174 396 NtQueryInformationToken (152, User, 136, ... {token info, class 1, size 36}, 36, ) == 0x0 01175 396 NtOpenKey (0x3, {24, 0, 0x40, 0, 0, (0x3, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\SafeBoot\Option"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01176 396 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 156, ) }, ... 156, ) == 0x0 01177 396 NtQueryValueKey (156, (156, "TransparentEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\1\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (156, "TransparentEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\1\0\0\0"}, 16, ) }, 16, ) == 0x0 01178 396 NtQueryValueKey (156, (156, "AuthenticodeEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (156, "AuthenticodeEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 01179 396 NtClose (156, ... ) == 0x0 01180 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 156, ) }, ... 156, ) == 0x0 01181 396 NtQueryValueKey (156, (156, "ExecutableTypes", Partial, 0, ... ) , Partial, 0, ... ) == STATUS_BUFFER_TOO_SMALL 01182 396 NtQueryValueKey (156, (156, "ExecutableTypes", Partial, 260, ... TitleIdx=0, Type=7, Data="A\0D\0E\0\0\0A\0D\0P\0\0\0B\0A\0S\0\0\0B\0A\0T\0\0\0C\0H\0M\0\0\0C\0M\0D\0\0\0C\0O\0M\0\0\0C\0P\0L\0\0\0C\0R\0T\0\0\0E\0X\0E\0\0\0H\0L\0P\0\0\0H\0T\0A\0\0\0I\0N\0F\0\0\0I\0N\0S\0\0\0I\0S\0P\0\0\0L\0N\0K\0\0\0M\0D\0B\0\0\0M\0D\0E\0\0\0M\0S\0C\0\0\0M\0S\0I\0\0\0M\0S\0P\0\0\0M\0S\0T\0\0\0O\0C\0X\0\0\0P\0C\0D\0\0\0P\0I\0F\0\0\0R\0E\0G\0\0\0S\0C\0R\0\0\0S\0H\0S\0\0\0U\0R\0L\0\0\0V\0B\0\0\0W\0S\0C\0\0\0\0\0"}, 260, ) , Partial, 260, ... TitleIdx=0, Type=7, Data= (156, "ExecutableTypes", Partial, 260, ... TitleIdx=0, Type=7, Data="A\0D\0E\0\0\0A\0D\0P\0\0\0B\0A\0S\0\0\0B\0A\0T\0\0\0C\0H\0M\0\0\0C\0M\0D\0\0\0C\0O\0M\0\0\0C\0P\0L\0\0\0C\0R\0T\0\0\0E\0X\0E\0\0\0H\0L\0P\0\0\0H\0T\0A\0\0\0I\0N\0F\0\0\0I\0N\0S\0\0\0I\0S\0P\0\0\0L\0N\0K\0\0\0M\0D\0B\0\0\0M\0D\0E\0\0\0M\0S\0C\0\0\0M\0S\0I\0\0\0M\0S\0P\0\0\0M\0S\0T\0\0\0O\0C\0X\0\0\0P\0C\0D\0\0\0P\0I\0F\0\0\0R\0E\0G\0\0\0S\0C\0R\0\0\0S\0H\0S\0\0\0U\0R\0L\0\0\0V\0B\0\0\0W\0S\0C\0\0\0\0\0"}, 260, ) }, 260, ) == 0x0 01183 396 NtClose (156, ... ) == 0x0 01184 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\LevelObjects"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01185 396 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 156, ) }, ... 156, ) == 0x0 01186 396 NtQueryValueKey (156, (156, "Levels", Partial, 536, ... ) , Partial, 536, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01187 396 NtClose (156, ... ) == 0x0 01188 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01189 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01190 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01191 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01192 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01193 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01194 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01195 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01196 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01197 396 NtQueryDefaultLocale (1, 1240380, ... ) == 0x0 01198 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths"}, ... 156, ) }, ... 156, ) == 0x0 01199 396 NtEnumerateKey (156, 0, Basic, 280, ... {LastWrite={0x6f7a111e,0x1c73999}, TitleIdx=0, Name= (156, 0, Basic, 280, ... {LastWrite={0x6f7a111e,0x1c73999}, TitleIdx=0, Name="{dda3f824-d8cb-441b-834d-be2efd2c1a33}"}, 92, ) }, 92, ) == 0x0 01200 396 NtOpenKey (0x20019, {24, 156, 0x40, 0, 0, (0x20019, {24, 156, 0x40, 0, 0, "{dda3f824-d8cb-441b-834d-be2efd2c1a33}"}, ... 160, ) }, ... 160, ) == 0x0 01201 396 NtQueryValueKey (160, (160, "ItemData", Partial, 280, ... TitleIdx=0, Type=2, Data="%\0H\0K\0E\0Y\0_\0C\0U\0R\0R\0E\0N\0T\0_\0U\0S\0E\0R\0\\0S\0o\0f\0t\0w\0a\0r\0e\0\\0M\0i\0c\0r\0o\0s\0o\0f\0t\0\\0W\0i\0n\0d\0o\0w\0s\0\\0C\0u\0r\0r\0e\0n\0t\0V\0e\0r\0s\0i\0o\0n\0\\0E\0x\0p\0l\0o\0r\0e\0r\0\\0S\0h\0e\0l\0l\0 \0F\0o\0l\0d\0e\0r\0s\0\\0C\0a\0c\0h\0e\0%\0O\0L\0K\0*\0\0\0"}, 202, ) , Partial, 280, ... TitleIdx=0, Type=2, Data= (160, "ItemData", Partial, 280, ... TitleIdx=0, Type=2, Data="%\0H\0K\0E\0Y\0_\0C\0U\0R\0R\0E\0N\0T\0_\0U\0S\0E\0R\0\\0S\0o\0f\0t\0w\0a\0r\0e\0\\0M\0i\0c\0r\0o\0s\0o\0f\0t\0\\0W\0i\0n\0d\0o\0w\0s\0\\0C\0u\0r\0r\0e\0n\0t\0V\0e\0r\0s\0i\0o\0n\0\\0E\0x\0p\0l\0o\0r\0e\0r\0\\0S\0h\0e\0l\0l\0 \0F\0o\0l\0d\0e\0r\0s\0\\0C\0a\0c\0h\0e\0%\0O\0L\0K\0*\0\0\0"}, 202, ) }, 202, ) == 0x0 01202 396 NtQueryValueKey (160, (160, "SaferFlags", Partial, 280, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 280, ... TitleIdx=0, Type=4, Data= (160, "SaferFlags", Partial, 280, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 01203 396 NtClose (160, ... ) == 0x0 01204 396 NtEnumerateKey (156, 1, Basic, 280, ... ) == STATUS_NO_MORE_ENTRIES 01205 396 NtClose (156, ... ) == 0x0 01206 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01207 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01208 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01209 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01210 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01211 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01212 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01213 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01214 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01215 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01216 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01217 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01218 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01219 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01220 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01221 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01222 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01223 396 NtClose (156, ... ) == 0x0 01224 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01225 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01226 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01227 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01228 396 NtClose (156, ... ) == 0x0 01229 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01230 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01231 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01232 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01233 396 NtClose (156, ... ) == 0x0 01234 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01235 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01236 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01237 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01238 396 NtClose (156, ... ) == 0x0 01239 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01240 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01241 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01242 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01243 396 NtClose (156, ... ) == 0x0 01244 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01245 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01246 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01247 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01248 396 NtClose (156, ... ) == 0x0 01249 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01250 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01251 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01252 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01253 396 NtClose (156, ... ) == 0x0 01254 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01255 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01256 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01257 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01258 396 NtClose (156, ... ) == 0x0 01259 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01260 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01261 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01262 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01263 396 NtClose (156, ... ) == 0x0 01264 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01265 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01266 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01267 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01268 396 NtClose (156, ... ) == 0x0 01269 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01270 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01271 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01272 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01273 396 NtClose (156, ... ) == 0x0 01274 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01275 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01276 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01277 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01278 396 NtClose (156, ... ) == 0x0 01279 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01280 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01281 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01282 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01283 396 NtClose (156, ... ) == 0x0 01284 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01285 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01286 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01287 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01288 396 NtClose (156, ... ) == 0x0 01289 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01290 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01291 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01292 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01293 396 NtClose (156, ... ) == 0x0 01294 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01295 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 156, ) }, ... 156, ) == 0x0 01296 396 NtQueryValueKey (156, (156, "DefaultLevel", Full, 524, ... TitleIdx=0, Type=4, Name="DefaultLevel", Data="\0\0\4\0"}, 48, ) , Full, 524, ... TitleIdx=0, Type=4, Name= (156, "DefaultLevel", Full, 524, ... TitleIdx=0, Type=4, Name="DefaultLevel", Data="\0\0\4\0"}, 48, ) , Data= (156, "DefaultLevel", Full, 524, ... TitleIdx=0, Type=4, Name="DefaultLevel", Data="\0\0\4\0"}, 48, ) }, 48, ) == 0x0 01297 396 NtClose (156, ... ) == 0x0 01298 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01299 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 156, ) == 0x0 01300 396 NtQueryInformationToken (156, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01301 396 NtClose (156, ... ) == 0x0 01302 396 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01303 396 NtOpenThreadToken (-2, 0x8, 0, ... ) == STATUS_NO_TOKEN 01304 396 NtOpenProcessToken (-1, 0xa, ... 156, ) == 0x0 01305 396 NtDuplicateToken (156, 0xc, {24, 0, 0x0, 0, 1240900, 0x0}, 0, 2, ... 160, ) == 0x0 01306 396 NtClose (156, ... ) == 0x0 01307 396 NtAccessCheck (1378928, 160, 0x1, 1241028, 1240972, 56, 1241056, ... (0x1), ) == 0x0 01308 396 NtClose (160, ... ) == 0x0 01309 396 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 160, ) }, ... 160, ) == 0x0 01310 396 NtQueryValueKey (160, (160, "PolicyScope", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (160, "PolicyScope", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 01311 396 NtClose (160, ... ) == 0x0 01312 396 NtOpenSymbolicLinkObject (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\??\C:"}, ... 160, ) }, ... 160, ) == 0x0 01313 396 NtQuerySymbolicLinkObject (160, ... (160, ... "\Device\HarddiskVolume1", 48, ) , 48, ) == 0x0 01314 396 NtClose (160, ... ) == 0x0 01315 396 NtQueryInformationFile (100, 1239360, 528, Name, ... {status=0x0, info=60}, ) == 0x0 01316 396 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 01317 396 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 01318 396 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe"}, 1238040, ... ) }, 1238040, ... ) == 0x0 01319 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01320 396 NtQueryDirectoryFile (160, 0, 0, 0, 1237400, 616, BothDirectory, 1, (160, 0, 0, 0, 1237400, 616, BothDirectory, 1, "WINDOWS", 0, ... {status=0x0, info=108}, ) , 0, ... {status=0x0, info=108}, ) == 0x0 01321 396 NtClose (160, ... ) == 0x0 01322 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01323 396 NtQueryDirectoryFile (160, 0, 0, 0, 1237400, 616, BothDirectory, 1, (160, 0, 0, 0, 1237400, 616, BothDirectory, 1, "System32", 0, ... {status=0x0, info=110}, ) , 0, ... {status=0x0, info=110}, ) == 0x0 01324 396 NtClose (160, ... ) == 0x0 01325 396 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\"}, 3, 16417, ... 160, {status=0x0, info=1}, ) }, 3, 16417, ... 160, {status=0x0, info=1}, ) == 0x0 01326 396 NtQueryDirectoryFile (160, 0, 0, 0, 1237400, 616, BothDirectory, 1, (160, 0, 0, 0, 1237400, 616, BothDirectory, 1, "idtkuf.exe", 0, ... {status=0x0, info=114}, ) , 0, ... {status=0x0, info=114}, ) == 0x0 01327 396 NtClose (160, ... ) == 0x0 01328 396 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 01329 396 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 01330 396 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 01331 396 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 160, ) == 0x0 01332 396 NtQueryInformationToken (160, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 01333 396 NtClose (160, ... ) == 0x0 01334 396 NtOpenKey (0x20019, {24, 0, 0x640, 0, 0, (0x20019, {24, 0, 0x640, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003"}, ... 160, ) }, ... 160, ) == 0x0 01335 396 NtOpenKey (0x20019, {24, 160, 0x40, 0, 0, (0x20019, {24, 160, 0x40, 0, 0, "Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders"}, ... 156, ) }, ... 156, ) == 0x0 01336 396 NtClose (160, ... ) == 0x0 01337 396 NtQueryValueKey (156, (156, "Cache", Partial, 144, ... ) , Partial, 144, ... ) == STATUS_BUFFER_OVERFLOW 01338 396 NtQueryValueKey (156, (156, "Cache", Partial, 162, ... TitleIdx=0, Type=1, Data="C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0S\0R\0I\0-\0u\0s\0e\0r\0\\0L\0o\0c\0a\0l\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0T\0e\0m\0p\0o\0r\0a\0r\0y\0 \0I\0n\0t\0e\0r\0n\0e\0t\0 \0F\0i\0l\0e\0s\0\0\0"}, 162, ) , Partial, 162, ... TitleIdx=0, Type=1, Data= (156, "Cache", Partial, 162, ... TitleIdx=0, Type=1, Data="C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0S\0R\0I\0-\0u\0s\0e\0r\0\\0L\0o\0c\0a\0l\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0T\0e\0m\0p\0o\0r\0a\0r\0y\0 \0I\0n\0t\0e\0r\0n\0e\0t\0 \0F\0i\0l\0e\0s\0\0\0"}, 162, ) }, 162, ) == 0x0 01339 396 NtClose (156, ... ) == 0x0 01340 396 NtAllocateVirtualMemory (-1, 0, 0, 4096, 8192, 4, ... 10485760, 4096, ) == 0x0 01341 396 NtAllocateVirtualMemory (-1, 10485760, 0, 4096, 4096, 4, ... 10485760, 4096, ) == 0x0 01342 396 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 156, ) }, ... 156, ) == 0x0 01343 396 NtQueryValueKey (156, (156, "LogFileName", Partial, 536, ... ) , Partial, 536, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01344 396 NtClose (156, ... ) == 0x0 01345 396 NtOpenKey (0x3, {24, 0, 0x40, 0, 0, (0x3, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\SafeBoot\Option"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01346 396 NtQueryInformationToken (152, User, 128, ... {token info, class 1, size 36}, 36, ) == 0x0 01347 396 NtQueryInformationToken (152, 15, 4, ... {token info, class 15, size 4}, 4, ) == 0x0 01348 396 NtClose (152, ... ) == 0x0 01349 396 NtCreateProcessEx (1243636, 2035711, 0, -1, 0, 140, 0, 0, 0, ... ) == 0x0 01350 396 NtQueryInformationProcess (152, Basic, 24, ... {ExitStatus=0x103,PebBaseAddress=0x7ffdf000,AffinityMask=0x1,BasePriority=8,Pid=364,ParentPid=368,}, 0x0, ) == 0x0 01351 396 NtReadVirtualMemory (152, 0x7ffdf008, 4, ... (152, 0x7ffdf008, 4, ... "\0\0B1", 0x0, ) , 0x0, ) == 0x0 01352 396 NtOpenFile (0x1200a9, {24, 0, 0x40, 0, 0, (0x1200a9, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\idtkuf.exe.Manifest"}, 1, 96, ... ) }, 1, 96, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 01353 396 NtAllocateVirtualMemory (-1, 1380352, 0, 8192, 4096, 4, ... 1380352, 8192, ) == 0x0 01354 396 NtReadVirtualMemory (152, 0x31420000, 4096, ... (152, 0x31420000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0fn\0\0\330\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0I\3538\210\15\212V\333\15\212V\333\15\212V\333\216\226X\333\17\212V\333\345\225R\333\17\212V\333\15\212V\333\12\212V\333\15\212W\333[\212V\333o\225E\333\4\212V\333\345\225]\333\7\212V\333Rich\15\212V\333\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\4\0\310Y\330@\0\0\0\0\0\0\0\0\340\0\17\1\13\1\6\0\0 \0\0\0\20\0\0\0P\0\0\0\240\0\0\0`\0\0\0\200\0\0\0\0B1\0\20\0\0\0\2\0\0\4\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\260\0\0\0\20\0\0\0\0\0\0\2\0\0\0\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\0\0\0\0\0\0\0\0\0\200\0\0h\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0UPX0\0\0\0\0\0P\0\0\0\20\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, ) , 4096, ) == 0x0 01355 396 NtQueryDebugFilterState (53, 2, ... ) == 0x0 01356 396 NtQueryInformationProcess (152, Basic, 24, ... {ExitStatus=0x103,PebBaseAddress=0x7ffdf000,AffinityMask=0x1,BasePriority=8,Pid=364,ParentPid=368,}, 0x0, ) == 0x0 01357 396 NtAllocateVirtualMemory (-1, 0, 0, 1660, 4096, 4, ... 10551296, 4096, ) == 0x0 01358 396 NtAllocateVirtualMemory (152, 0, 0, 1910, 4096, 4, ... 65536, 4096, ) == 0x0 01359 396 NtWriteVirtualMemory (152, 0x10000, (152, 0x10000, "=\0:\0:\0=\0:\0:\0\\0\0\0=\0C\0:\0=\0C\0:\0\\0p\0o\0l\0y\0u\0n\0p\0a\0c\0k\0\0\0=\0E\0x\0i\0t\0C\0o\0d\0e\0=\00\00\00\00\00\00\00\02\0\0\0=\0U\0:\0=\0U\0:\0\\0s\0t\0a\0r\0t\0u\0p\0s\0c\0r\0i\0p\0t\0s\0\0\0A\0L\0L\0U\0S\0E\0R\0S\0P\0R\0O\0F\0I\0L\0E\0=\0C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0A\0l\0l\0 \0U\0s\0e\0r\0s\0\0\0A\0P\0P\0D\0A\0T\0A\0=\0C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0S\0R\0I\0-\0u\0s\0e\0r\0\\0A\0p\0p\0l\0i\0c\0a\0t\0i\0o\0n\0 \0D\0a\0t\0a\0\0\0C\0L\0I\0E\0N\0T\0N\0A\0M\0E\0=\0C\0o\0n\0s\0o\0l\0e\0\0\0C\0o\0m\0m\0o\0n\0P\0r\0o\0g\0r\0a\0m\0F\0i\0l\0e\0s\0=\0C\0:\0\\0P\0r\0o\0g\0r\0a\0m\0 \0F\0i\0l\0e\0s\0\\0C\0o\0m\0m\0o\0n\0 \0F\0i\0l\0e\0s\0\0\0C\0O\0M\0", 1910, ... 0x0, ) , 1910, ... 0x0, ) == 0x0 01360 396 NtAllocateVirtualMemory (152, 0, 0, 1660, 4096, 4, ... 131072, 4096, ) == 0x0 01361 396 NtWriteVirtualMemory (152, 0x20000, (152, 0x20000, "\0\20\0\0|\6\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\3\0\0\0\0\0\0\0\13\0\0\0$\0\10\2\220\2\0\0\0\0\0\0\374\0\376\0\230\4\0\0<\0>\0\230\5\0\0<\0>\0\330\5\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0<\0>\0\30\6\0\0\36\0 \0X\6\0\0\0\0\2\0x\6\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 1660, ... 0x0, ) , 1660, ... 0x0, ) == 0x0 01362 396 NtWriteVirtualMemory (152, 0x7ffdf010, (152, 0x7ffdf010, "\0\0\2\0", 4, ... 0x0, ) , 4, ... 0x0, ) == 0x0 01363 396 NtWriteVirtualMemory (152, 0x7ffdf1e8, (152, 0x7ffdf1e8, "\0\0\0\0", 4, ... 0x0, ) , 4, ... 0x0, ) == 0x0 01364 396 NtFreeVirtualMemory (-1, (0xa10000), 0, 32768, ... (0xa10000), 4096, ) == 0x0 01365 396 NtAllocateVirtualMemory (152, 0, 0, 1048576, 8192, 4, ... 196608, 1048576, ) == 0x0 01366 396 NtAllocateVirtualMemory (152, 1236992, 0, 8192, 4096, 4, ... 1236992, 8192, ) == 0x0 01367 396 NtProtectVirtualMemory (152, (0x12e000), 4096, 260, ... (0x12e000), 4096, 4, ) == 0x0 01368 396 NtCreateThread (0x1f03ff, 0x0, 152, 1241900, 1242620, 1, ... 156, {364, 564}, ) == 0x0 01369 396 NtRequestWaitReplyPort (24, {168, 196, new_msg, 0, 1312824, 1310720, 1368240, 1243720} (24, {168, 196, new_msg, 0, 1312824, 1310720, 1368240, 1243720} "\0\0\0\0\0\0\1\0\2$\370w U\367w\233\0\0\0\234\0\0\0l\1\0\04\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\24\0\0\0\0\0" ... {168, 196, reply, 0, 368, 396, 1511, 0} "\0\0\0\0\0\0\1\0\0\0\0\0 U\367w\230\0\0\0\234\0\0\0l\1\0\04\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\24\0\0\0\0\0" ) ... {168, 196, reply, 0, 368, 396, 1511, 0} (24, {168, 196, new_msg, 0, 1312824, 1310720, 1368240, 1243720} "\0\0\0\0\0\0\1\0\2$\370w U\367w\233\0\0\0\234\0\0\0l\1\0\04\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\24\0\0\0\0\0" ... {168, 196, reply, 0, 368, 396, 1511, 0} "\0\0\0\0\0\0\1\0\0\0\0\0 U\367w\230\0\0\0\234\0\0\0l\1\0\04\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\24\0\0\0\0\0" ) ) == 0x0 01370 396 NtResumeThread (156, ... 1, ) == 0x0 01371 396 NtClose (100, ... ) == 0x0 01372 396 NtClose (140, ... ) == 0x0 01373 396 NtQueryInformationProcess (152, Basic, 24, ... {ExitStatus=0x103,PebBaseAddress=0x7ffdf000,AffinityMask=0x1,BasePriority=8,Pid=364,ParentPid=368,}, 0x0, ) == 0x0 01374 396 NtUserWaitForInputIdle (364, 30000, 0, ... 01375 396 NtCreateEvent (0x1f0003, 0x0, 0, 0, ... 140, ) == 0x0 01376 396 NtClose (140, ... ) == 0x0 01374 396 NtUserWaitForInputIdle ... ) == 0x0 01377 396 NtClose (152, ... ) == 0x0 01378 396 NtClose (156, ... ) == 0x0 01379 396 NtDelayExecution (0, {-5000000, -1}, ... ) == 0x0 01380 396 NtTerminateProcess (0, 0, ... ) == 0x0 01381 396 NtQueryVirtualMemory (-1, 0x896d20, Basic, 28, ... {BaseAddress=0x896000,AllocationBase=0x860000,AllocationProtect=0x80,RegionSize=0x12000,State=0x1000,Protect=0x4,Type=0x1000000,}, 28, ) == 0x0 01382 396 NtQueryVirtualMemory (-1, 0x89762c, Basic, 28, ... {BaseAddress=0x897000,AllocationBase=0x860000,AllocationProtect=0x80,RegionSize=0x11000,State=0x1000,Protect=0x4,Type=0x1000000,}, 28, ) == 0x0 01383 396 NtQueryVirtualMemory (-1, 0x86cef4, Basic, 28, ... {BaseAddress=0x86c000,AllocationBase=0x860000,AllocationProtect=0x80,RegionSize=0x3c000,State=0x1000,Protect=0x4,Type=0x1000000,}, 28, ) == 0x0 01384 396 NtGdiDeleteObjectApp (302646283, ... ) == 0x1 01385 396 NtGdiDeleteObjectApp (285869068, ... ) == 0x1 01386 396 NtGdiDeleteObjectApp (369755135, ... ) == 0x1 01387 396 NtUserDestroyCursor (196765, 1, ... ) == 0x1 01388 396 NtUserDestroyCursor (131231, 1, ... ) == 0x1 01389 396 NtUserDestroyCursor (196769, 1, ... ) == 0x1 01390 396 NtUserDestroyCursor (196771, 1, ... ) == 0x1 01391 396 NtUserDestroyCursor (196773, 1, ... ) == 0x1 01392 396 NtUserDestroyCursor (131181, 1, ... ) == 0x1 01393 396 NtUserDestroyCursor (131179, 1, ... ) == 0x1 01394 396 NtUserFindExistingCursorIcon (1243472, 1243488, 1244056, ... ) == 0x10011 01395 396 NtDeleteAtom (49180, ... ) == 0x0 01396 396 NtDeleteAtom (49181, ... ) == 0x0 01397 396 NtGdiDeleteObjectApp (369623938, ... ) == 0x1 01398 396 NtClose (96, ... ) == 0x0 01399 396 NtSetInformationThread (-2, ZeroTlsCell, {ZeroTlsCell=0x8,}, 4, ... ) == 0x0 01400 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc03b 01401 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01402 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc03d 01403 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01404 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc03f 01405 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01406 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc041 01407 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01408 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc043 01409 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01410 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc045 01411 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01412 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc047 01413 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01414 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc049 01415 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01416 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc04b 01417 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01418 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc04d 01419 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01420 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc04f 01421 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01422 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc051 01423 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01424 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc053 01425 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01426 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc057 01427 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01428 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc059 01429 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01430 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc05b 01431 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01432 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc05d 01433 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01434 396 NtUserGetClassInfo (1999896576, 1244172, 1244124, 1244200, 0, ... ) == 0xc05f 01435 396 NtUserUnregisterClass (1244176, 1999896576, 1244164, ... ) == 0x1 01436 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc03b 01437 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01438 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc03d 01439 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01440 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc03f 01441 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01442 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc041 01443 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01444 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc043 01445 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01446 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc045 01447 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01448 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc047 01449 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01450 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc049 01451 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01452 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc04b 01453 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01454 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc04d 01455 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01456 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc04f 01457 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01458 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc051 01459 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01460 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc053 01461 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01462 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc057 01463 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01464 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc059 01465 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01466 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc05b 01467 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01468 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc05d 01469 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01470 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc05f 01471 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01472 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc017 01473 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01474 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc019 01475 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01476 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc018 01477 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01478 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc01a 01479 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01480 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc01c 01481 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01482 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc01e 01483 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01484 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc01b 01485 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01486 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc068 01487 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01488 396 NtUserGetClassInfo (1905590272, 1244172, 1244124, 1244200, 0, ... ) == 0xc06a 01489 396 NtUserUnregisterClass (1244176, 1905590272, 1244164, ... ) == 0x1 01490 396 NtUnmapViewOfSection (-1, 0x850000, ... ) == 0x0 01491 396 NtClose (76, ... ) == 0x0 01492 396 NtClose (64, ... ) == 0x0 01493 396 NtSetInformationThread (-2, ZeroTlsCell, {ZeroTlsCell=0x5,}, 4, ... ) == 0x0 01494 396 NtSetInformationThread (-2, ZeroTlsCell, {ZeroTlsCell=0x1,}, 4, ... ) == 0x0 01495 396 NtSetInformationThread (-2, ZeroTlsCell, {ZeroTlsCell=0x2,}, 4, ... ) == 0x0 01496 396 NtSetInformationThread (-2, ZeroTlsCell, {ZeroTlsCell=0x3,}, 4, ... ) == 0x0 01497 396 NtFreeVirtualMemory (-1, (0xa00000), 4096, 32768, ... (0xa00000), 4096, ) == 0x0 01498 396 NtRequestWaitReplyPort (24, {20, 48, new_msg, 0, 0, 0, 0, 0} (24, {20, 48, new_msg, 0, 0, 0, 0, 0} "\0\0\0\0\3\0\1\0@U\367w\0\0\0\0\0\0\0\0" ... {20, 48, reply, 0, 368, 396, 3419, 0} "\0\0\0\0\3\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0" ) ... {20, 48, reply, 0, 368, 396, 3419, 0} (24, {20, 48, new_msg, 0, 0, 0, 0, 0} "\0\0\0\0\3\0\1\0@U\367w\0\0\0\0\0\0\0\0" ... {20, 48, reply, 0, 368, 396, 3419, 0} "\0\0\0\0\3\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0" ) ) == 0x0 01499 396 NtTerminateProcess (-1, 0, ... 01500 396 NtClose (44, ... ) == 0x0