Summary:

NtAccessCheck(>) 1 NtSetContextThread(>) 1 NtQueryVolumeInformationFile(>) 4 NtQuerySystemInformation(>) 11
NtCreateKey(>) 1 NtTestAlert(>) 1 NtReadVirtualMemory(>) 4 NtProtectVirtualMemory(>) 13
NtCreateProcessEx(>) 1 NtCreateIoCompletion(>) 2 NtRequestWaitReplyPort(>) 4 NtSetInformationProcess(>) 13
NtCreateThread(>) 1 NtDuplicateObject(>) 2 NtCreateEvent(>) 5 NtCreateFile(>) 14
NtDeviceIoControlFile(>) 1 NtDuplicateToken(>) 2 NtFlushInstructionCache(>) 5 NtOpenFile(>) 15
NtGetContextThread(>) 1 NtEnumerateKey(>) 2 NtFreeVirtualMemory(>) 5 NtMapViewOfSection(>) 16
NtLoadDriver(>) 1 NtOpenDirectoryObject(>) 2 NtQueryVirtualMemory(>) 5 NtQueryAttributesFile(>) 18
NtOpenEvent(>) 1 NtOpenMutant(>) 2 NtFsControlFile(>) 6 NtQueryInformationProcess(>) 18
NtOpenKeyedEvent(>) 1 NtOpenSymbolicLinkObject(>) 2 NtOpenThreadToken(>) 6 NtOpenProcessTokenEx(>) 21
NtQueryDebugFilterState(>) 1 NtQueryDefaultUILanguage(>) 2 NtQueryInformationFile(>) 6 NtOpenThreadTokenEx(>) 21
NtQueryInformationJobObject(>) 1 NtQuerySymbolicLinkObject(>) 2 NtUnmapViewOfSection(>) 6 NtQueryDefaultLocale(>) 23
NtQueryInformationThread(>) 1 NtReleaseMutant(>) 2 NtOpenProcessToken(>) 7 NtQueryValueKey(>) 23
NtQueryInstallUILanguage(>) 1 NtSetInformationObject(>) 2 NtSetInformationThread(>) 7 NtQueryInformationToken(>) 26
NtQueryObject(>) 1 NtTerminateProcess(>) 2 NtWaitForSingleObject(>) 8 NtAllocateVirtualMemory(>) 35
NtQuerySystemTime(>) 1 NtAdjustPrivilegesToken(>) 3 NtCreateSection(>) 9 NtOpenKey(>) 71
NtReadFile(>) 1 NtContinue(>) 3 NtWriteFile(>) 9 NtClose(>) 99
NtRegisterThreadTerminatePort(>) 1 NtQuerySection(>) 3 NtWriteVirtualMemory(>) 9
NtResumeThread(>) 1 NtSetValueKey(>) 3 NtSetInformationFile(>) 10
NtSecureConnectPort(>) 1

Trace:

00001 468 NtOpenKey (0x80000000, {24, 0, 0x40, 0, 0, (0x80000000, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\packed.exe"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00002 468 NtOpenKeyedEvent (0x2000000, {24, 0, 0x0, 0, 0, (0x2000000, {24, 0, 0x0, 0, 0, "\KernelObjects\CritSecOutOfMemoryEvent"}, ... 4, ) }, ... 4, ) == 0x0 00003 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00004 468 NtAllocateVirtualMemory (-1, 0, 0, 1048576, 8192, 4, ... 1310720, 1048576, ) == 0x0 00005 468 NtAllocateVirtualMemory (-1, 1310720, 0, 4096, 4096, 4, ... 1310720, 4096, ) == 0x0 00006 468 NtAllocateVirtualMemory (-1, 1314816, 0, 8192, 4096, 4, ... 1314816, 8192, ) == 0x0 00007 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00008 468 NtAllocateVirtualMemory (-1, 0, 0, 65536, 8192, 4, ... 2359296, 65536, ) == 0x0 00009 468 NtAllocateVirtualMemory (-1, 2359296, 0, 24576, 4096, 4, ... 2359296, 24576, ) == 0x0 00010 468 NtOpenDirectoryObject (0x3, {24, 0, 0x40, 0, 0, (0x3, {24, 0, 0x40, 0, 0, "\KnownDlls"}, ... 8, ) }, ... 8, ) == 0x0 00011 468 NtOpenSymbolicLinkObject (0x1, {24, 8, 0x40, 0, 0, (0x1, {24, 8, 0x40, 0, 0, "KnownDllPath"}, ... 12, ) }, ... 12, ) == 0x0 00012 468 NtQuerySymbolicLinkObject (12, ... (12, ... "C:\WINDOWS\system32", 0x0, ) , 0x0, ) == 0x0 00013 468 NtClose (12, ... ) == 0x0 00014 468 NtOpenFile (0x100020, {24, 0, 0x42, 0, 0, (0x100020, {24, 0, 0x42, 0, 0, "\??\U:\startupscripts\"}, 3, 33, ... 12, {status=0x0, info=1}, ) }, 3, 33, ... 12, {status=0x0, info=1}, ) == 0x0 00015 468 NtQueryVolumeInformationFile (12, 1243848, 8, Device, ... {status=0x0, info=8}, ) == 0x0 00016 468 NtFsControlFile (12, 0, 0x0, 0x0, 0x90028, 0x0, 0, 0, ... ) == STATUS_INVALID_PARAMETER 00017 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\u:\work\packed.exe.Local"}, 1243832, ... ) }, 1243832, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00018 468 NtOpenSection (0xe, {24, 8, 0x40, 0, 0, (0xe, {24, 8, 0x40, 0, 0, "kernel32.dll"}, ... 16, ) }, ... 16, ) == 0x0 00019 468 NtMapViewOfSection (16, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 4, ... (0x77e60000), 0x0, 937984, ) == 0x0 00020 468 NtClose (16, ... ) == 0x0 00021 468 NtQuerySystemInformation (RangeStart, 4, ... {system info, class 50, size 4}, 0x0, ) == 0x0 00022 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00023 468 NtCreateSection (0xf001f, 0x0, {65536, 0}, 4, 67108864, 0, ... 16, ) == 0x0 00024 468 NtSecureConnectPort ( ("\Windows\ApiPort", {0, 2, 1, 1}, {24, 16, 0, 65536, 0, 0}, 1319736, {12, 0, 0}, 1242016, 44, ... 24, {24, 16, 0, 65536, 2424832, 18415616}, {0, 0, 0}, 200, 44, ) , {0, 2, 1, 1}, {24, 16, 0, 65536, 0, 0}, 1319736, {12, 0, 0}, 1242016, 44, ... 24, {24, 16, 0, 65536, 2424832, 18415616}, {0, 0, 0}, 200, 44, ) == 0x0 00025 468 NtClose (16, ... ) == 0x0 00026 468 NtQueryObject (24, Handle, 2, ... {Inherit=0,ProtectFromClose=0,}, -1, ) == 0x0 00027 468 NtSetInformationObject (24, Handle, {Inherit=0,ProtectFromClose=1,}, 256, ... ) == 0x0 00028 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00029 468 NtQueryVirtualMemory (-1, 0x250000, Basic, 28, ... {BaseAddress=0x250000,AllocationBase=0x250000,AllocationProtect=0x4,RegionSize=0x10000,State=0x2000,Protect=0x0,Type=0x40000,}, 0x0, ) == 0x0 00030 468 NtAllocateVirtualMemory (-1, 2424832, 0, 4096, 4096, 4, ... 2424832, 4096, ) == 0x0 00031 468 NtRequestWaitReplyPort (24, {28, 56, new_msg, 0, 0, 0, 0, 0} (24, {28, 56, new_msg, 0, 0, 0, 0, 0} "\210\6\31\1\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\234\6\31\1\4\0\0\0" ... {28, 56, reply, 0, 456, 468, 1507, 0} "\0\327\26\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\234\6\31\1\4\0\0\0" ) ... {28, 56, reply, 0, 456, 468, 1507, 0} (24, {28, 56, new_msg, 0, 0, 0, 0, 0} "\210\6\31\1\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\234\6\31\1\4\0\0\0" ... {28, 56, reply, 0, 456, 468, 1507, 0} "\0\327\26\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\234\6\31\1\4\0\0\0" ) ) == 0x0 00032 468 NtRegisterThreadTerminatePort (24, ... ) == 0x0 00033 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\System\CurrentControlSet\Control\Terminal Server"}, ... 16, ) }, ... 16, ) == 0x0 00034 468 NtQueryValueKey (16, (16, "TSAppCompat", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 548, ... TitleIdx=0, Type=4, Data= (16, "TSAppCompat", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00035 468 NtClose (16, ... ) == 0x0 00036 468 NtAllocateVirtualMemory (-1, 1232896, 0, 4096, 4096, 260, ... 1232896, 4096, ) == 0x0 00037 468 NtOpenMutant (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\NlsCacheMutant"}, ... 16, ) }, ... 16, ) == 0x0 00038 468 NtOpenSection (0x4, {24, 0, 0x40, 0, 0, (0x4, {24, 0, 0x40, 0, 0, "\NLS\NlsSectionUnicode"}, ... 28, ) }, ... 28, ) == 0x0 00039 468 NtMapViewOfSection (28, -1, (0x0), 0, 0, 0x0, 0, 2, 0, 2, ... (0x260000), 0x0, 90112, ) == 0x0 00040 468 NtClose (28, ... ) == 0x0 00041 468 NtQueryDefaultLocale (0, 2012046252, ... ) == 0x0 00042 468 NtOpenSection (0x4, {24, 0, 0x40, 0, 0, (0x4, {24, 0, 0x40, 0, 0, "\NLS\NlsSectionLocale"}, ... 28, ) }, ... 28, ) == 0x0 00043 468 NtMapViewOfSection (28, -1, (0x0), 0, 0, 0x0, 0, 2, 0, 2, ... (0x280000), 0x0, 212992, ) == 0x0 00044 468 NtClose (28, ... ) == 0x0 00045 468 NtOpenSection (0x5, {24, 0, 0x40, 0, 0, (0x5, {24, 0, 0x40, 0, 0, "\NLS\NlsSectionSortkey"}, ... 28, ) }, ... 28, ) == 0x0 00046 468 NtMapViewOfSection (28, -1, (0x0), 0, 0, 0x0, 0, 2, 0, 2, ... (0x2c0000), 0x0, 266240, ) == 0x0 00047 468 NtQuerySection (28, Basic, 16, ... {BaseAddress=0x0,Attributes=0x800000,Size={0x40004, 0x0},}, 0x0, ) == 0x0 00048 468 NtClose (28, ... ) == 0x0 00049 468 NtOpenSection (0x4, {24, 0, 0x40, 0, 0, (0x4, {24, 0, 0x40, 0, 0, "\NLS\NlsSectionSortTbls"}, ... 28, ) }, ... 28, ) == 0x0 00050 468 NtMapViewOfSection (28, -1, (0x0), 0, 0, 0x0, 0, 2, 0, 2, ... (0x310000), 0x0, 24576, ) == 0x0 00051 468 NtClose (28, ... ) == 0x0 00052 468 NtQueryVirtualMemory (-1, 0x7ffd2000, Basic, 28, ... {BaseAddress=0x7ffd2000,AllocationBase=0x7ffb0000,AllocationProtect=0x2,RegionSize=0x2000,State=0x1000,Protect=0x2,Type=0x40000,}, 0x0, ) == 0x0 00053 468 NtOpenSection (0x4, {24, 0, 0x40, 0, 0, (0x4, {24, 0, 0x40, 0, 0, "\NLS\NlsSectionSortkey00000409"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00054 468 NtOpenSection (0x4, {24, 0, 0x40, 0, 0, (0x4, {24, 0, 0x40, 0, 0, "\NLS\NlsSectionSortkey00000409"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00055 468 NtRequestWaitReplyPort (24, {28, 56, new_msg, 0, 2012558373, 2012047104, 2013025280, 0} (24, {28, 56, new_msg, 0, 2012558373, 2012047104, 2013025280, 0} "\210\6\31\1\0\0\0\0\0\0\0\0\0\0\0\0\2\0\0\0\234\6\31\18\6\0\0" ... {28, 56, reply, 0, 456, 468, 1514, 0} "\230G\27\0\0\0\0\0\0\0\0\0\0\0\0\0\2\0\0\0\234\6\31\18\6\0\0" ) ... {28, 56, reply, 0, 456, 468, 1514, 0} (24, {28, 56, new_msg, 0, 2012558373, 2012047104, 2013025280, 0} "\210\6\31\1\0\0\0\0\0\0\0\0\0\0\0\0\2\0\0\0\234\6\31\18\6\0\0" ... {28, 56, reply, 0, 456, 468, 1514, 0} "\230G\27\0\0\0\0\0\0\0\0\0\0\0\0\0\2\0\0\0\234\6\31\18\6\0\0" ) ) == 0x0 00056 468 NtProtectVirtualMemory (-1, (0x401000), 16, 4, ... (0x401000), 4096, 32, ) == 0x0 00057 468 NtProtectVirtualMemory (-1, (0x401000), 4096, 32, ... (0x401000), 4096, 4, ) == 0x0 00058 468 NtFlushInstructionCache (-1, 4198400, 16, ... ) == 0x0 00059 468 NtOpenProcessToken (-1, 0x8, ... 28, ) == 0x0 00060 468 NtQueryInformationToken (28, Statistics, 56, ... {token info, class 10, size 56}, 56, ) == 0x0 00061 468 NtClose (28, ... ) == 0x0 00062 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\System\CurrentControlSet\Control\Terminal Server"}, ... 28, ) }, ... 28, ) == 0x0 00063 468 NtQueryValueKey (28, (28, "TSAppCompat", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 548, ... TitleIdx=0, Type=4, Data= (28, "TSAppCompat", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00064 468 NtClose (28, ... ) == 0x0 00065 468 NtTestAlert (... ) == 0x0 00066 468 NtContinue (1244464, 1, ... 00067 468 NtSetInformationThread (-2, Win32StartAddress(LpcReceivedMessageId), {StartAddress(LpcReceivedMsgId)=0x401010,}, 4, ... ) == 0x0 00068 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\Session Manager"}, ... 28, ) }, ... 28, ) == 0x0 00069 468 NtQueryValueKey (28, (28, "SafeDllSearchMode", Partial, 16, ... ) , Partial, 16, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00070 468 NtClose (28, ... ) == 0x0 00071 468 NtAllocateVirtualMemory (-1, 1323008, 0, 4096, 4096, 4, ... 1323008, 4096, ) == 0x0 00072 468 NtQueryDefaultUILanguage (2013024600, ... 00073 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00074 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... -2147482208, ) == 0x0 00075 468 NtQueryInformationToken (-2147482208, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00076 468 NtClose (-2147482208, ... ) == 0x0 00077 468 NtOpenKey (0x2000000, {24, 0, 0x640, 0, 0, (0x2000000, {24, 0, 0x640, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003"}, ... -2147482208, ) }, ... -2147482208, ) == 0x0 00078 468 NtOpenKey (0x80000000, {24, 0, 0x240, 0, 0, (0x80000000, {24, 0, 0x240, 0, 0, "\Registry\Machine\System\CurrentControlSet\Control\Nls\MUILanguages"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00079 468 NtOpenKey (0x80000000, {24, -2147482208, 0x640, 0, 0, (0x80000000, {24, -2147482208, 0x640, 0, 0, "Control Panel\Desktop"}, ... -2147482204, ) }, ... -2147482204, ) == 0x0 00080 468 NtQueryValueKey (-2147482204, (-2147482204, "MultiUILanguageId", Partial, 256, ... ) , Partial, 256, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00081 468 NtClose (-2147482204, ... ) == 0x0 00082 468 NtClose (-2147482208, ... ) == 0x0 00072 468 NtQueryDefaultUILanguage ... ) == 0x0 00083 468 NtQueryInstallUILanguage (2013024602, ... ) == 0x0 00084 468 NtQueryDefaultLocale (1, 1244828, ... ) == 0x0 00085 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00086 468 NtAllocateVirtualMemory (-1, 0, 0, 262144, 8192, 4, ... 3276800, 262144, ) == 0x0 00087 468 NtAllocateVirtualMemory (-1, 3276800, 0, 4096, 4096, 4, ... 3276800, 4096, ) == 0x0 00088 468 NtAllocateVirtualMemory (-1, 3280896, 0, 20480, 4096, 4, ... 3280896, 20480, ) == 0x0 00089 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00090 468 NtAllocateVirtualMemory (-1, 0, 0, 262144, 8192, 4, ... 3538944, 262144, ) == 0x0 00091 468 NtAllocateVirtualMemory (-1, 3538944, 0, 4096, 4096, 4, ... 3538944, 4096, ) == 0x0 00092 468 NtAllocateVirtualMemory (-1, 3543040, 0, 61440, 4096, 4, ... 3543040, 61440, ) == 0x0 00093 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00094 468 NtAllocateVirtualMemory (-1, 0, 0, 262144, 8192, 4, ... 3801088, 262144, ) == 0x0 00095 468 NtAllocateVirtualMemory (-1, 3801088, 0, 4096, 4096, 4, ... 3801088, 4096, ) == 0x0 00096 468 NtAllocateVirtualMemory (-1, 0, 0, 12800032, 4096, 4, ... 4259840, 12804096, ) == 0x0 00097 468 NtAllocateVirtualMemory (-1, 336855040, 0, 36864, 12288, 64, ... 336855040, 36864, ) == 0x0 00098 468 NtOpenSection (0xe, {24, 8, 0x40, 0, 0, (0xe, {24, 8, 0x40, 0, 0, "ADVAPI32.dll"}, ... 28, ) }, ... 28, ) == 0x0 00099 468 NtMapViewOfSection (28, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 4, ... (0x77dd0000), 0x0, 569344, ) == 0x0 00100 468 NtClose (28, ... ) == 0x0 00101 468 NtOpenSection (0xe, {24, 8, 0x40, 0, 0, (0xe, {24, 8, 0x40, 0, 0, "RPCRT4.dll"}, ... 28, ) }, ... 28, ) == 0x0 00102 468 NtMapViewOfSection (28, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 4, ... (0x77cc0000), 0x0, 479232, ) == 0x0 00103 468 NtClose (28, ... ) == 0x0 00104 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\System\CurrentControlSet\Control\Terminal Server"}, ... 28, ) }, ... 28, ) == 0x0 00105 468 NtQueryValueKey (28, (28, "TSAppCompat", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 548, ... TitleIdx=0, Type=4, Data= (28, "TSAppCompat", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00106 468 NtQueryValueKey (28, (28, "TSUserEnabled", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 548, ... TitleIdx=0, Type=4, Data= (28, "TSUserEnabled", Partial, 548, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00107 468 NtClose (28, ... ) == 0x0 00108 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"}, ... 28, ) }, ... 28, ) == 0x0 00109 468 NtQueryValueKey (28, (28, "LeakTrack", Partial, 144, ... ) , Partial, 144, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00110 468 NtClose (28, ... ) == 0x0 00111 468 NtOpenKey (0x2000000, {24, 0, 0x40, 0, 0, (0x2000000, {24, 0, 0x40, 0, 0, "\REGISTRY\MACHINE"}, ... 28, ) }, ... 28, ) == 0x0 00112 468 NtSetInformationObject (28, Handle, {Inherit=0,ProtectFromClose=1,}, 2011365632, ... ) == 0x0 00113 468 NtOpenKey (0x20019, {24, 28, 0x40, 0, 0, (0x20019, {24, 28, 0x40, 0, 0, "Software\Microsoft\Windows NT\CurrentVersion\Diagnostics"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00114 468 NtFreeVirtualMemory (-1, (0x360000), 0, 32768, ... (0x360000), 262144, ) == 0x0 00115 468 NtFreeVirtualMemory (-1, (0x410000), 0, 32768, ... (0x410000), 12804096, ) == 0x0 00116 468 NtFreeVirtualMemory (-1, (0x3a0000), 0, 32768, ... (0x3a0000), 262144, ) == 0x0 00117 468 NtOpenThreadToken (-2, 0x28, 0, ... ) == STATUS_NO_TOKEN 00118 468 NtOpenProcessToken (-1, 0x2, ... 32, ) == 0x0 00119 468 NtDuplicateToken (32, 0x4, {24, 0, 0x0, 0, 1243604, 0x0}, 0, 2, ... 36, ) == 0x0 00120 468 NtSetInformationThread (-2, ImpersonationToken, {ImpToken=36,}, 4, ... ) == 0x0 00121 468 NtClose (36, ... ) == 0x0 00122 468 NtClose (32, ... ) == 0x0 00123 468 NtOpenThreadToken (-2, 0x28, 0, ... 32, ) == 0x0 00124 468 NtAdjustPrivilegesToken (32, 0, 1326604, 1024, 1325580, 1243648, ... ) == 0x0 00125 468 NtSetInformationProcess (-1, PriorityClass, {process info, class 18, size 2}, 1024, ... ) == 0x0 00126 468 NtClose (32, ... ) == 0x0 00127 468 NtSetInformationThread (-2, ImpersonationToken, {ImpToken=0,}, 4, ... ) == 0x0 00128 468 NtSetInformationThread (-2, BasePriority, {thread info, class 3, size 4}, 4, ... ) == 0x0 00129 468 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\U:\"}, 3, 16417, ... 32, {status=0x0, info=1}, ) }, 3, 16417, ... 32, {status=0x0, info=1}, ) == 0x0 00130 468 NtQueryInformationFile (32, 1242824, 528, Name, ... {status=0x0, info=42}, ) == 0x0 00131 468 NtQueryVolumeInformationFile (32, 1325704, 144, Attribute, ... {status=0x0, info=20}, ) == 0x0 00132 468 NtClose (32, ... ) == 0x0 00133 468 NtQueryDefaultLocale (1, 1243388, ... ) == 0x0 00134 468 NtQueryDefaultLocale (1, 1243388, ... ) == 0x0 00135 468 NtQueryDefaultLocale (0, 1243368, ... ) == 0x0 00136 468 NtAllocateVirtualMemory (-1, 1327104, 0, 8192, 4096, 4, ... 1327104, 8192, ) == 0x0 00137 468 NtOpenFile (0x100000, {24, 0, 0x40, 0, 0, (0x100000, {24, 0, 0x40, 0, 0, "\??\C:\polyunpack"}, 3, 33, ... 32, {status=0x0, info=1}, ) }, 3, 33, ... 32, {status=0x0, info=1}, ) == 0x0 00138 468 NtClose (32, ... ) == 0x0 00139 468 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\polyunpack"}, 3, 8388641, ... 32, {status=0x0, info=1}, ) }, 3, 8388641, ... 32, {status=0x0, info=1}, ) == 0x0 00140 468 NtQueryVolumeInformationFile (32, 1243488, 24, Size, ... {status=0x0, info=24}, ) == 0x0 00141 468 NtClose (32, ... ) == 0x0 00142 468 NtCreateFile (0x100080, {24, 0, 0x40, 0, 1243472, (0x100080, {24, 0, 0x40, 0, 1243472, "\??\C:\WINDOWS\System32\drivers\secdrv.sys"}, 0x0, 0, 7, 1, 96, 0, 0, ... 32, {status=0x0, info=1}, ) }, 0x0, 0, 7, 1, 96, 0, 0, ... 32, {status=0x0, info=1}, ) == 0x0 00143 468 NtQueryInformationFile (32, 1243488, 24, Standard, ... {status=0x0, info=24}, ) == 0x0 00144 468 NtFsControlFile (32, 0, 0x0, 0x0, 0x90073, (32, 0, 0x0, 0x0, 0x90073, "\0\0\0\0\0\0\0\0", 8, 128, ... {status=0x0, info=32}, "\1\0\0\0x\1\24\0\0\0\0\0\0\0\0\0\7\0\0\0\0\0\0\0\1j\1\0\0\0\0\0", ) , 8, 128, ... {status=0x0, info=32}, (32, 0, 0x0, 0x0, 0x90073, "\0\0\0\0\0\0\0\0", 8, 128, ... {status=0x0, info=32}, "\1\0\0\0x\1\24\0\0\0\0\0\0\0\0\0\7\0\0\0\0\0\0\0\1j\1\0\0\0\0\0", ) , ) == 0x0 00145 468 NtClose (32, ... ) == 0x0 00146 468 NtAllocateVirtualMemory (-1, 1335296, 0, 28672, 4096, 4, ... 1335296, 28672, ) == 0x0 00147 468 NtCreateFile (0xc0100080, {24, 0, 0x40, 0, 1243472, (0xc0100080, {24, 0, 0x40, 0, 1243472, "\??\C:"}, 0x0, 0, 3, 1, 96, 0, 0, ... 32, {status=0x0, info=1}, ) }, 0x0, 0, 3, 1, 96, 0, 0, ... 32, {status=0x0, info=1}, ) == 0x0 00148 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00149 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0X\2\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00150 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00151 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "\377\377PSW\350\14\375\377\377+\265\320\376\377\377\213\320\241X\27\1\0\377p\10\3\327\350\247\375\377\3773\311\205\300\211E\260v1\372\17 \300\211E\254%\377\377\376\377\17"\300\213\4\212\213\35X\27\1\0\213\33\215\2040\0\0\0\200\211\4\213\213E\254\17"\300\373A;M\260r\317j\0W\377\25(\27\1\03\300@[\213M\374_^\350\345\5\0\0\311\303\314\314\314\314\314\314\213\377U\213\354\203\354\20SV\21358\27\1\0W\215E\374P3\333SPj\13\377\326hDdk \377u\374j\1\377\254\27\1\0\213\370\213E\374S\301\340\2PWj\13\377\3263\3009\37\211]\360vt\215O\36\211]\370\211M\364\213U\364\17\267\22\3U\370\213M\10\215t: \212\36\212\323:\31u\32\204\322t\22\212^\1\212\323:Y\1u\14FFAA\204\322u\3423\311\353\5\33\311\203\331\3773\333;\313t\22\271\34\1\0\0\1M\370\1M\364@;\7r\263\353\34i\300\34\1\0\0\215D8\4\213H\10\211M\360\213M\14;\313t\5\213@\14\211\1SW\377\25(\27\1\0\213E\360_^[\311\302\10\0\314\\0D\0r\0i\0v\0e\0r\0\\0T\0c\0p\0i\0p\0\0\0\314\314\314\314\314\314\213\377U\213\354\203\354\20VWhF\21\1\0\215E\360P\377\25\14\27\1\0\215E\374P\241\10\27\1\03\366VV\3770\215E\360VVj@P\377\25\4\27\1\0\213\370;\376|1\213E\374\213H\4\353\34\372\17 \300\211E\370%\377\377\376\377\17"\300\211q\20\213E\370\17"\300\373\213I\14;\316u\340\213M\374\377\25\0\27\1\0\213\307_^\311\303\314tcpip.sys\0\314\314\314\314\314\314\213\377U\213\354\203\354\20", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) \300\213\4\212\213\35X\27\1\0\213\33\215\2040\0\0\0\200\211\4\213\213E\254\17 (32, 0, 0, 0, "\377\377PSW\350\14\375\377\377+\265\320\376\377\377\213\320\241X\27\1\0\377p\10\3\327\350\247\375\377\3773\311\205\300\211E\260v1\372\17 \300\211E\254%\377\377\376\377\17"\300\213\4\212\213\35X\27\1\0\213\33\215\2040\0\0\0\200\211\4\213\213E\254\17"\300\373A;M\260r\317j\0W\377\25(\27\1\03\300@[\213M\374_^\350\345\5\0\0\311\303\314\314\314\314\314\314\213\377U\213\354\203\354\20SV\21358\27\1\0W\215E\374P3\333SPj\13\377\326hDdk \377u\374j\1\377\254\27\1\0\213\370\213E\374S\301\340\2PWj\13\377\3263\3009\37\211]\360vt\215O\36\211]\370\211M\364\213U\364\17\267\22\3U\370\213M\10\215t: \212\36\212\323:\31u\32\204\322t\22\212^\1\212\323:Y\1u\14FFAA\204\322u\3423\311\353\5\33\311\203\331\3773\333;\313t\22\271\34\1\0\0\1M\370\1M\364@;\7r\263\353\34i\300\34\1\0\0\215D8\4\213H\10\211M\360\213M\14;\313t\5\213@\14\211\1SW\377\25(\27\1\0\213E\360_^[\311\302\10\0\314\\0D\0r\0i\0v\0e\0r\0\\0T\0c\0p\0i\0p\0\0\0\314\314\314\314\314\314\213\377U\213\354\203\354\20VWhF\21\1\0\215E\360P\377\25\14\27\1\0\215E\374P\241\10\27\1\03\366VV\3770\215E\360VVj@P\377\25\4\27\1\0\213\370;\376|1\213E\374\213H\4\353\34\372\17 \300\211E\370%\377\377\376\377\17"\300\211q\20\213E\370\17"\300\373\213I\14;\316u\340\213M\374\377\25\0\27\1\0\213\307_^\311\303\314tcpip.sys\0\314\314\314\314\314\314\213\377U\213\354\203\354\20", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) \300\211q\20\213E\370\17 (32, 0, 0, 0, "\377\377PSW\350\14\375\377\377+\265\320\376\377\377\213\320\241X\27\1\0\377p\10\3\327\350\247\375\377\3773\311\205\300\211E\260v1\372\17 \300\211E\254%\377\377\376\377\17"\300\213\4\212\213\35X\27\1\0\213\33\215\2040\0\0\0\200\211\4\213\213E\254\17"\300\373A;M\260r\317j\0W\377\25(\27\1\03\300@[\213M\374_^\350\345\5\0\0\311\303\314\314\314\314\314\314\213\377U\213\354\203\354\20SV\21358\27\1\0W\215E\374P3\333SPj\13\377\326hDdk \377u\374j\1\377\254\27\1\0\213\370\213E\374S\301\340\2PWj\13\377\3263\3009\37\211]\360vt\215O\36\211]\370\211M\364\213U\364\17\267\22\3U\370\213M\10\215t: \212\36\212\323:\31u\32\204\322t\22\212^\1\212\323:Y\1u\14FFAA\204\322u\3423\311\353\5\33\311\203\331\3773\333;\313t\22\271\34\1\0\0\1M\370\1M\364@;\7r\263\353\34i\300\34\1\0\0\215D8\4\213H\10\211M\360\213M\14;\313t\5\213@\14\211\1SW\377\25(\27\1\0\213E\360_^[\311\302\10\0\314\\0D\0r\0i\0v\0e\0r\0\\0T\0c\0p\0i\0p\0\0\0\314\314\314\314\314\314\213\377U\213\354\203\354\20VWhF\21\1\0\215E\360P\377\25\14\27\1\0\215E\374P\241\10\27\1\03\366VV\3770\215E\360VVj@P\377\25\4\27\1\0\213\370;\376|1\213E\374\213H\4\353\34\372\17 \300\211E\370%\377\377\376\377\17"\300\211q\20\213E\370\17"\300\373\213I\14;\316u\340\213M\374\377\25\0\27\1\0\213\307_^\311\303\314tcpip.sys\0\314\314\314\314\314\314\213\377U\213\354\203\354\20", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00152 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00153 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00154 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00155 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00156 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00157 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00158 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00159 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00160 468 NtSetInformationFile (32, 1243528, 8, Position, ... {status=0x0, info=0}, ) == 0x0 00161 468 NtWriteFile (32, 0, 0, 0, (32, 0, 0, 0, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 4096, 0x0, 0, ... {status=0x0, info=4096}, ) , 4096, 0x0, 0, ... {status=0x0, info=4096}, ) == 0x0 00162 468 NtClose (32, ... ) == 0x0 00163 468 NtCreateFile (0x100080, {24, 0, 0x40, 0, 1243472, (0x100080, {24, 0, 0x40, 0, 1243472, "\??\C:\WINDOWS\System32\drivers\secdrv.sys"}, 0x0, 128, 7, 1, 104, 0, 0, ... }, 0x0, 128, 7, 1, 104, 0, 0, ... 00164 468 NtContinue (-135087384, 0, ... 00165 468 NtContinue (-135087620, 0, ... 00163 468 NtCreateFile ... 32, {status=0x0, info=1}, ) == 0x0 00166 468 NtClose (32, ... ) == 0x0 00167 468 NtOpenDirectoryObject (0x2000f, {24, 0, 0x40, 0, 0, (0x2000f, {24, 0, 0x40, 0, 0, "\BaseNamedObjects"}, ... 32, ) }, ... 32, ) == 0x0 00168 468 NtOpenEvent (0x100000, {24, 32, 0x0, 0, 0, (0x100000, {24, 32, 0x0, 0, 0, "Global\SvcctrlStartEvent_A3752DX"}, ... 36, ) }, ... 36, ) == 0x0 00169 468 NtWaitForSingleObject (36, 0, {-1800000000, -1}, ... ) == 0x0 00170 468 NtClose (36, ... ) == 0x0 00171 468 NtQuerySystemInformation (Basic, 44, ... {Unknown=0,MaximumIncrement=156250,PhysicalPageSize=0x1000,NumberOfPhysicalPages=0xff7c,LowestPhysicalPage=0x1,HighestPhysicalPage=0xffff,AllocationGranularity=0x10000,LowestUserAddress=0x10000,HighestUserAddress=0x7ffeffff,ActiveProcessors=1,NumberProcessors=1,}, 0x0, ) == 0x0 00172 468 NtOpenKey (0x20019, {24, 28, 0x40, 0, 0, (0x20019, {24, 28, 0x40, 0, 0, "Software\Microsoft\Rpc\PagedBuffers"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00173 468 NtOpenKey (0x20019, {24, 28, 0x40, 0, 0, (0x20019, {24, 28, 0x40, 0, 0, "Software\Microsoft\Rpc"}, ... 36, ) }, ... 36, ) == 0x0 00174 468 NtQueryValueKey (36, (36, "MaxRpcSize", Partial, 144, ... ) , Partial, 144, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00175 468 NtClose (36, ... ) == 0x0 00176 468 NtOpenKey (0x20019, {24, 28, 0x40, 0, 0, (0x20019, {24, 28, 0x40, 0, 0, "Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\packed.exe\RpcThreadPoolThrottle"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00177 468 NtCreateEvent (0x1f0003, 0x0, 1, 0, ... 36, ) == 0x0 00178 468 NtCreateEvent (0x1f0003, 0x0, 1, 0, ... 40, ) == 0x0 00179 468 NtQuerySystemTime (... {1114653446, 29869974}, ) == 0x0 00180 468 NtCreateEvent (0x1f0003, 0x0, 0, 0, ... 44, ) == 0x0 00181 468 NtOpenKey (0x20019, {24, 28, 0x40, 0, 0, (0x20019, {24, 28, 0x40, 0, 0, "Software\Policies\Microsoft\Windows NT\Rpc"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00182 468 NtQuerySystemInformation (Performance, 312, ... {system info, class 2, size 312}, 0x0, ) == 0x0 00183 468 NtQueryInformationProcess (-1, QuotaLimits, 32, ... {process info, class 1, size 32}, 0x0, ) == 0x0 00184 468 NtQueryInformationProcess (-1, VmCounters, 44, ... {process info, class 3, size 44}, 0x0, ) == 0x0 00185 468 NtCreateEvent (0x1f0003, 0x0, 0, 0, ... 48, ) == 0x0 00186 468 NtDuplicateObject (-1, -2, -1, 0x0, 0, 2, ... 52, ) == 0x0 00187 468 NtAllocateVirtualMemory (-1, 1363968, 0, 4096, 4096, 4, ... 1363968, 4096, ) == 0x0 00188 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\System\CurrentControlSet\Control\ComputerName"}, ... 56, ) }, ... 56, ) == 0x0 00189 468 NtOpenKey (0x20019, {24, 56, 0x40, 0, 0, (0x20019, {24, 56, 0x40, 0, 0, "ActiveComputerName"}, ... 60, ) }, ... 60, ) == 0x0 00190 468 NtQueryValueKey (60, (60, "ComputerName", Full, 108, ... TitleIdx=0, Type=1, Name="ComputerName", Data="M\0Y\0W\0O\0R\0L\0D\0\0\0"}, 60, ) , Full, 108, ... TitleIdx=0, Type=1, Name= (60, "ComputerName", Full, 108, ... TitleIdx=0, Type=1, Name="ComputerName", Data="M\0Y\0W\0O\0R\0L\0D\0\0\0"}, 60, ) , Data= (60, "ComputerName", Full, 108, ... TitleIdx=0, Type=1, Name="ComputerName", Data="M\0Y\0W\0O\0R\0L\0D\0\0\0"}, 60, ) }, 60, ) == 0x0 00191 468 NtClose (60, ... ) == 0x0 00192 468 NtClose (56, ... ) == 0x0 00193 468 NtCreateIoCompletion (0x1f0003, 0x0, 0, ... 56, ) == 0x0 00194 468 NtCreateIoCompletion (0x1f0003, 0x0, -1, ... 60, ) == 0x0 00195 468 NtDuplicateObject (-1, 56, -1, 0x0, 0, 2, ... 64, ) == 0x0 00196 468 NtOpenThreadToken (-2, 0xc, 1, ... ) == STATUS_NO_TOKEN 00197 468 NtCreateEvent (0x1f0003, 0x0, 1, 0, ... 68, ) == 0x0 00198 468 NtOpenThreadToken (-2, 0xc, 1, ... ) == STATUS_NO_TOKEN 00199 468 NtSetInformationThread (-2, ImpersonationToken, {ImpToken=0,}, 4, ... ) == 0x0 00200 468 NtCreateFile (0xc0100080, {24, 0, 0x40, 0, 1242020, (0xc0100080, {24, 0, 0x40, 0, 1242020, "\??\PIPE\svcctl"}, 0x0, 0, 3, 1, 4194368, 0, 0, ... 72, {status=0x0, info=1}, ) }, 0x0, 0, 3, 1, 4194368, 0, 0, ... 72, {status=0x0, info=1}, ) == 0x0 00201 468 NtSetInformationFile (72, 1242076, 8, Pipe, ... {status=0x0, info=0}, ) == 0x0 00202 468 NtSetInformationFile (72, 1242068, 8, Completion, ... {status=0x0, info=0}, ) == 0x0 00203 468 NtSetInformationThread (-2, ImpersonationToken, {ImpToken=0,}, 4, ... ) == 0x0 00204 468 NtWriteFile (72, 49, 0, 0, (72, 49, 0, 0, "\5\0\13\3\20\0\0\0H\0\0\0\1\0\0\0\270\20\270\20\0\0\0\0\1\0\0\0\0\0\1\0\201\273z6D\230\3615\2552\230\3608\0\20\3\2\0\0\0\4]\210\212\353\34\311\21\237\350\10\0+\20H`\2\0\0\0", 72, {0, 0}, 0, ... {status=0x0, info=72}, ) , 72, {0, 0}, 0, ... {status=0x0, info=72}, ) == 0x0 00205 468 NtAllocateVirtualMemory (-1, 1368064, 0, 4096, 4096, 4, ... 1368064, 4096, ) == 0x0 00206 468 NtReadFile (72, 49, 0, 0, 1024, {0, 0}, 0, ... {status=0x103, info=0}, "", ) == 0x103 00207 468 NtWaitForSingleObject (49, 1, {-410065408, -3}, ... ) == 0x0 00208 468 NtFsControlFile (72, 49, 0x0, 0x0, 0x11c017, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\0$\0\0\0\1\0\0\0\14\0\0\0\0\0\33\0\0\0\0\0\0\0\0\0?\0\17\0", 36, 1024, ... {status=0x103, info=68}, "\5\0\14\3\20\0\0\0D\0\0\0\1\0\0\0\270\20\270\20\274 \0\0\15\0\PIPE\ntsvcs\0\0\1\0\0\0\0\0\0\0\4]\210\212\353\34\311\21\237\350\10\0+\20H`\2\0\0\0", ) , 36, 1024, ... {status=0x103, info=68}, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\0$\0\0\0\1\0\0\0\14\0\0\0\0\0\33\0\0\0\0\0\0\0\0\0?\0\17\0", 36, 1024, ... {status=0x103, info=68}, "\5\0\14\3\20\0\0\0D\0\0\0\1\0\0\0\270\20\270\20\274 \0\0\15\0\PIPE\ntsvcs\0\0\1\0\0\0\0\0\0\0\4]\210\212\353\34\311\21\237\350\10\0+\20H`\2\0\0\0", ) , ) == 0x103 00209 468 NtWaitForSingleObject (49, 0, 0x0, ... ) == 0x0 00210 468 NtFsControlFile (72, 49, 0x0, 0x0, 0x11c017, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\0L\0\0\0\2\0\0\04\0\0\0\0\0\20\0\0\0\0\0\222o\260{\2113\334\21\261\306\0\14)\371\246\305\7\0\0\0\0\0\0\0\7\0\0\0S\0e\0c\0d\0r\0v\0\0\0\0\0\377\1\17\0", 76, 1024, ... {status=0x103, info=48}, "\5\0\2\3\20\0\0\00\0\0\0\1\0\0\0\30\0\0\0\0\0\0\0\0\0\0\0\222o\260{\2113\334\21\261\306\0\14)\371\246\305\0\0\0\0", ) , 76, 1024, ... {status=0x103, info=48}, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\0L\0\0\0\2\0\0\04\0\0\0\0\0\20\0\0\0\0\0\222o\260{\2113\334\21\261\306\0\14)\371\246\305\7\0\0\0\0\0\0\0\7\0\0\0S\0e\0c\0d\0r\0v\0\0\0\0\0\377\1\17\0", 76, 1024, ... {status=0x103, info=48}, "\5\0\2\3\20\0\0\00\0\0\0\1\0\0\0\30\0\0\0\0\0\0\0\0\0\0\0\222o\260{\2113\334\21\261\306\0\14)\371\246\305\0\0\0\0", ) , ) == 0x103 00211 468 NtWaitForSingleObject (49, 0, 0x0, ... ) == 0x0 00212 468 NtFsControlFile (72, 49, 0x0, 0x0, 0x11c017, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\04\0\0\0\3\0\0\0\34\0\0\0\0\0\23\0\0\0\0\0\223o\260{\2113\334\21\261\306\0\14)\371\246\305\0\0\0\0\0\0\0\0", 52, 1024, ... {status=0x103, info=48}, "\5\0\2\3\20\0\0\00\0\0\0\2\0\0\0\30\0\0\0\0\0\0\0\0\0\0\0\223o\260{\2113\334\21\261\306\0\14)\371\246\305\0\0\0\0", ) , 52, 1024, ... {status=0x103, info=48}, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\04\0\0\0\3\0\0\0\34\0\0\0\0\0\23\0\0\0\0\0\223o\260{\2113\334\21\261\306\0\14)\371\246\305\0\0\0\0\0\0\0\0", 52, 1024, ... {status=0x103, info=48}, "\5\0\2\3\20\0\0\00\0\0\0\2\0\0\0\30\0\0\0\0\0\0\0\0\0\0\0\223o\260{\2113\334\21\261\306\0\14)\371\246\305\0\0\0\0", ) , ) == 0x103 00213 468 NtWaitForSingleObject (49, 0, 0x0, ... ) == 0x0 00214 468 NtFsControlFile (72, 49, 0x0, 0x0, 0x11c017, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\0,\0\0\0\4\0\0\0\24\0\0\0\0\0\0\0\0\0\0\0\223o\260{\2113\334\21\261\306\0\14)\371\246\305", 44, 1024, ... {status=0x103, info=28}, "\5\0\2\3\20\0\0\0\34\0\0\0\3\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0", ) , 44, 1024, ... {status=0x103, info=28}, (72, 49, 0x0, 0x0, 0x11c017, "\5\0\0\3\20\0\0\0,\0\0\0\4\0\0\0\24\0\0\0\0\0\0\0\0\0\0\0\223o\260{\2113\334\21\261\306\0\14)\371\246\305", 44, 1024, ... {status=0x103, info=28}, "\5\0\2\3\20\0\0\0\34\0\0\0\3\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0", ) , ) == 0x103 00215 468 NtWaitForSingleObject (49, 0, 0x0, ... ) == 0x0 00216 468 NtQueryDefaultLocale (1, 1243388, ... ) == 0x0 00217 468 NtQueryDefaultLocale (1, 1243388, ... ) == 0x0 00218 468 NtQueryDefaultLocale (0, 1243368, ... ) == 0x0 00219 468 NtAllocateVirtualMemory (-1, 1372160, 0, 8192, 4096, 4, ... 1372160, 8192, ) == 0x0 00220 468 NtCreateFile (0x40100080, {24, 0, 0x40, 0, 1243584, (0x40100080, {24, 0, 0x40, 0, 1243584, "\??\C:\WINDOWS\System32\drivers\runtime.sys"}, 0x0, 128, 0, 5, 96, 0, 0, ... }, 0x0, 128, 0, 5, 96, 0, 0, ... 00221 468 NtClose (-2147482208, ... ) == 0x0 00220 468 NtCreateFile ... 76, {status=0x0, info=2}, ) == 0x0 00222 468 NtWriteFile (76, 0, 0, 0, (76, 0, 0, 0, "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0P\2\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 5632, 0x0, 0, ... {status=0x0, info=5632}, ) , 5632, 0x0, 0, ... {status=0x0, info=5632}, ) == 0x0 00223 468 NtClose (76, ... ) == 0x0 00224 468 NtOpenKey (0x2000000, {24, 28, 0x40, 0, 0, (0x2000000, {24, 28, 0x40, 0, 0, "System\CurrentControlSet\Services"}, ... 76, ) }, ... 76, ) == 0x0 00225 468 NtCreateKey (0x2000000, {24, 76, 0x40, 0, 0, (0x2000000, {24, 76, 0x40, 0, 0, "runtime"}, 0, 0x0, 0, ... 80, 1, ) }, 0, 0x0, 0, ... 80, 1, ) == 0x0 00226 468 NtSetValueKey (80, (80, "ImagePath", 0, 1, "\\0?\0?\0\\0C\0:\0\\0W\0I\0N\0D\0O\0W\0S\0\\0S\0y\0s\0t\0e\0m\03\02\0\\0d\0r\0i\0v\0e\0r\0s\0\\0r\0u\0n\0t\0i\0m\0e\0.\0s\0y\0s\0\0\0", 88, ... ) , 0, 1, (80, "ImagePath", 0, 1, "\\0?\0?\0\\0C\0:\0\\0W\0I\0N\0D\0O\0W\0S\0\\0S\0y\0s\0t\0e\0m\03\02\0\\0d\0r\0i\0v\0e\0r\0s\0\\0r\0u\0n\0t\0i\0m\0e\0.\0s\0y\0s\0\0\0", 88, ... ) , 88, ... ) == 0x0 00227 468 NtSetValueKey (80, (80, "Type", 0, 4, "\1\0\0\0", 4, ... ) , 0, 4, (80, "Type", 0, 4, "\1\0\0\0", 4, ... ) , 4, ... ) == 0x0 00228 468 NtSetValueKey (80, (80, "Start", 0, 4, "\3\0\0\0", 4, ... ) , 0, 4, (80, "Start", 0, 4, "\3\0\0\0", 4, ... ) , 4, ... ) == 0x0 00229 468 NtClose (80, ... ) == 0x0 00230 468 NtClose (76, ... ) == 0x0 00231 468 NtOpenProcessToken (-1, 0x28, ... 76, ) == 0x0 00232 468 NtAdjustPrivilegesToken (76, 0, 1243092, 16, 1243076, 1243108, ... ) == 0x0 00233 468 NtClose (76, ... ) == 0x0 00234 468 NtLoadDriver ( ("\Registry\Machine\System\CurrentControlSet\Services\runtime", ... ) , ... ) == 0x0 00235 468 NtOpenProcessToken (-1, 0x28, ... 76, ) == 0x0 00236 468 NtAdjustPrivilegesToken (76, 0, 1243092, 16, 1243076, 1243108, ... ) == 0x0 00237 468 NtClose (76, ... ) == 0x0 00238 468 NtQueryDefaultLocale (1, 1243420, ... ) == 0x0 00239 468 NtQueryDefaultLocale (1, 1243420, ... ) == 0x0 00240 468 NtQueryDefaultLocale (0, 1243400, ... ) == 0x0 00241 468 NtQueryInformationJobObject (0, BasicUIRestrictions, 4, ... ) == STATUS_ACCESS_DENIED 00242 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program"}, 1239456, ... ) }, 1239456, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00243 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program.exe"}, 1239456, ... ) }, 1239456, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00244 468 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 1240156, (0x80100080, {24, 0, 0x40, 0, 1240156, "\??\C:\Program"}, 0x0, 128, 3, 1, 96, 0, 0, ... ) }, 0x0, 128, 3, 1, 96, 0, 0, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00245 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet"}, 1239456, ... ) }, 1239456, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00246 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet.exe"}, 1239456, ... ) }, 1239456, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00247 468 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 1240156, (0x80100080, {24, 0, 0x40, 0, 1240156, "\??\C:\Program Files\Internet"}, 0x0, 128, 3, 1, 96, 0, 0, ... ) }, 0x0, 128, 3, 1, 96, 0, 0, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00248 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1239456, ... ) }, 1239456, ... ) == 0x0 00249 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1240148, ... ) }, 1240148, ... ) == 0x0 00250 468 NtOpenFile (0x1000a1, {24, 0, 0x40, 0, 0, (0x1000a1, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 5, 96, ... 76, {status=0x0, info=1}, ) }, 5, 96, ... 76, {status=0x0, info=1}, ) == 0x0 00251 468 NtCreateSection (0xf001f, 0x0, 0x0, 16, 16777216, 76, ... 80, ) == 0x0 00252 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\Session Manager\AppCertDlls"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00253 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\Session Manager\AppCompatibility"}, ... 84, ) }, ... 84, ) == 0x0 00254 468 NtQueryValueKey (84, (84, "DisableAppCompat", Partial, 20, ... ) , Partial, 20, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00255 468 NtClose (84, ... ) == 0x0 00256 468 NtQueryVolumeInformationFile (76, 1239456, 8, Device, ... {status=0x0, info=8}, ) == 0x0 00257 468 NtOpenMutant (0x120001, {24, 32, 0x0, 0, 0, (0x120001, {24, 32, 0x0, 0, 0, "ShimCacheMutex"}, ... 84, ) }, ... 84, ) == 0x0 00258 468 NtWaitForSingleObject (84, 0, {-1000000, -1}, ... ) == 0x0 00259 468 NtOpenSection (0x2, {24, 32, 0x0, 0, 0, (0x2, {24, 32, 0x0, 0, 0, "ShimSharedMemory"}, ... 88, ) }, ... 88, ) == 0x0 00260 468 NtMapViewOfSection (88, -1, (0x0), 0, 0, {0, 0}, 0, 1, 0, 4, ... (0x360000), {0, 0}, 57344, ) == 0x0 00261 468 NtReleaseMutant (84, ... 0x0, ) == 0x0 00262 468 NtAllocateVirtualMemory (-1, 1228800, 0, 4096, 4096, 260, ... 1228800, 4096, ) == 0x0 00263 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 1237440, ... ) }, 1237440, ... ) == 0x0 00264 468 NtOpenFile (0x100020, {24, 0, 0x40, 0, 0, (0x100020, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 5, 96, ... 92, {status=0x0, info=1}, ) }, 5, 96, ... 92, {status=0x0, info=1}, ) == 0x0 00265 468 NtCreateSection (0xe, 0x0, 0x0, 16, 134217728, 92, ... 96, ) == 0x0 00266 468 NtClose (92, ... ) == 0x0 00267 468 NtMapViewOfSection (96, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 16, ... (0x370000), 0x0, 106496, ) == 0x0 00268 468 NtClose (96, ... ) == 0x0 00269 468 NtUnmapViewOfSection (-1, 0x370000, ... ) == 0x0 00270 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 1237756, ... ) }, 1237756, ... ) == 0x0 00271 468 NtOpenFile (0x100020, {24, 0, 0x40, 0, 0, (0x100020, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\system32\Apphelp.dll"}, 5, 96, ... 96, {status=0x0, info=1}, ) }, 5, 96, ... 96, {status=0x0, info=1}, ) == 0x0 00272 468 NtCreateSection (0xf, 0x0, 0x0, 16, 16777216, 96, ... 92, ) == 0x0 00273 468 NtQuerySection (92, Image, 48, ... {section info, class 1, size 48}, 0x0, ) == 0x0 00274 468 NtOpenProcessToken (-1, 0x8, ... 100, ) == 0x0 00275 468 NtQueryInformationToken (100, User, 136, ... {token info, class 1, size 36}, 36, ) == 0x0 00276 468 NtOpenKey (0x3, {24, 0, 0x40, 0, 0, (0x3, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\SafeBoot\Option"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00277 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 104, ) }, ... 104, ) == 0x0 00278 468 NtQueryValueKey (104, (104, "TransparentEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\1\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (104, "TransparentEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\1\0\0\0"}, 16, ) }, 16, ) == 0x0 00279 468 NtClose (104, ... ) == 0x0 00280 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00281 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 104, ) == 0x0 00282 468 NtQueryInformationToken (104, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00283 468 NtClose (104, ... ) == 0x0 00284 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00285 468 NtClose (100, ... ) == 0x0 00286 468 NtClose (96, ... ) == 0x0 00287 468 NtMapViewOfSection (92, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 4, ... (0x75f40000), 0x0, 118784, ) == 0x0 00288 468 NtClose (92, ... ) == 0x0 00289 468 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 0, (0x80100080, {24, 0, 0x40, 0, 0, "\SystemRoot\AppPatch\sysmain.sdb"}, 0x0, 128, 1, 1, 96, 0, 0, ... 92, {status=0x0, info=1}, ) }, 0x0, 128, 1, 1, 96, 0, 0, ... 92, {status=0x0, info=1}, ) == 0x0 00290 468 NtQueryInformationFile (92, 1238044, 24, Standard, ... {status=0x0, info=24}, ) == 0x0 00291 468 NtCreateSection (0x4, 0x0, 0x0, 2, 134217728, 92, ... 96, ) == 0x0 00292 468 NtMapViewOfSection (96, -1, (0x0), 0, 0, 0x0, 0, 2, 0, 2, ... (0x410000), 0x0, 1028096, ) == 0x0 00293 468 NtQueryInformationFile (92, 1238140, 24, Standard, ... {status=0x0, info=24}, ) == 0x0 00294 468 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 0, (0x80100080, {24, 0, 0x40, 0, 0, "\SystemRoot\AppPatch\systest.sdb"}, 0x0, 128, 1, 1, 96, 0, 0, ... ) }, 0x0, 128, 1, 1, 96, 0, 0, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00295 468 NtQuerySystemInformation (Processor, 12, ... {system info, class 1, size 12}, 0x0, ) == 0x0 00296 468 NtQueryInformationProcess (-1, Wow64, 4, ... {process info, class 26, size 4}, 0x0, ) == 0x0 00297 468 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\"}, 3, 16417, ... 100, {status=0x0, info=1}, ) }, 3, 16417, ... 100, {status=0x0, info=1}, ) == 0x0 00298 468 NtQueryDirectoryFile (100, 0, 0, 0, 1235704, 616, BothDirectory, 1, (100, 0, 0, 0, 1235704, 616, BothDirectory, 1, "IEXPLORE.EXE", 0, ... {status=0x0, info=118}, ) , 0, ... {status=0x0, info=118}, ) == 0x0 00299 468 NtClose (100, ... ) == 0x0 00300 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00301 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00302 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1235092, ... ) }, 1235092, ... ) == 0x0 00303 468 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\"}, 3, 16417, ... 100, {status=0x0, info=1}, ) }, 3, 16417, ... 100, {status=0x0, info=1}, ) == 0x0 00304 468 NtQueryDirectoryFile (100, 0, 0, 0, 1234452, 616, BothDirectory, 1, (100, 0, 0, 0, 1234452, 616, BothDirectory, 1, "IEXPLORE.EXE", 0, ... {status=0x0, info=118}, ) , 0, ... {status=0x0, info=118}, ) == 0x0 00305 468 NtClose (100, ... ) == 0x0 00306 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00307 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00308 468 NtQueryInformationProcess (-1, DeviceMap, 36, ... {process info, class 23, size 36}, 0x0, ) == 0x0 00309 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00310 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 100, ) == 0x0 00311 468 NtQueryInformationToken (100, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00312 468 NtClose (100, ... ) == 0x0 00313 468 NtOpenKey (0x80000100, {24, 0, 0x40, 0, 0, (0x80000100, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00314 468 NtOpenKey (0x80000100, {24, 0, 0x40, 0, 0, (0x80000100, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\IEXPLORE.EXE"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00315 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1236964, ... ) }, 1236964, ... ) == 0x0 00316 468 NtOpenSection (0xe, {24, 8, 0x40, 0, 0, (0xe, {24, 8, 0x40, 0, 0, "VERSION.dll"}, ... 100, ) }, ... 100, ) == 0x0 00317 468 NtMapViewOfSection (100, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 4, ... (0x77c00000), 0x0, 28672, ) == 0x0 00318 468 NtClose (100, ... ) == 0x0 00319 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00320 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00321 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1235880, ... ) }, 1235880, ... ) == 0x0 00322 468 NtOpenFile (0x100020, {24, 0, 0x40, 0, 0, (0x100020, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 5, 96, ... 100, {status=0x0, info=1}, ) }, 5, 96, ... 100, {status=0x0, info=1}, ) == 0x0 00323 468 NtCreateSection (0xe, 0x0, 0x0, 16, 134217728, 100, ... 104, ) == 0x0 00324 468 NtClose (100, ... ) == 0x0 00325 468 NtMapViewOfSection (104, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 16, ... (0x370000), 0x0, 94208, ) == 0x0 00326 468 NtClose (104, ... ) == 0x0 00327 468 NtUnmapViewOfSection (-1, 0x370000, ... ) == 0x0 00328 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1235520, ... ) }, 1235520, ... ) == 0x0 00329 468 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 1236220, (0x80100080, {24, 0, 0x40, 0, 1236220, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 0x0, 0, 5, 1, 96, 0, 0, ... 104, {status=0x0, info=1}, ) }, 0x0, 0, 5, 1, 96, 0, 0, ... 104, {status=0x0, info=1}, ) == 0x0 00330 468 NtCreateSection (0xf0005, 0x0, 0x0, 2, 134217728, 104, ... 100, ) == 0x0 00331 468 NtClose (104, ... ) == 0x0 00332 468 NtMapViewOfSection (100, -1, (0x0), 0, 0, {0, 0}, 0, 1, 0, 2, ... (0x370000), {0, 0}, 94208, ) == 0x0 00333 468 NtClose (100, ... ) == 0x0 00334 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00335 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00336 468 NtQueryDefaultLocale (1, 1236744, ... ) == 0x0 00337 468 NtQueryVirtualMemory (-1, 0x370000, Basic, 28, ... {BaseAddress=0x370000,AllocationBase=0x370000,AllocationProtect=0x2,RegionSize=0x17000,State=0x1000,Protect=0x2,Type=0x40000,}, 0x0, ) == 0x0 00338 468 NtQueryVirtualMemory (-1, 0x370000, Basic, 28, ... {BaseAddress=0x370000,AllocationBase=0x370000,AllocationProtect=0x2,RegionSize=0x17000,State=0x1000,Protect=0x2,Type=0x40000,}, 0x0, ) == 0x0 00339 468 NtUnmapViewOfSection (-1, 0x370000, ... ) == 0x0 00340 468 NtAllocateVirtualMemory (-1, 1380352, 0, 4096, 4096, 4, ... 1380352, 4096, ) == 0x0 00341 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00342 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00343 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1235872, ... ) }, 1235872, ... ) == 0x0 00344 468 NtOpenFile (0x100020, {24, 0, 0x40, 0, 0, (0x100020, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 5, 96, ... 100, {status=0x0, info=1}, ) }, 5, 96, ... 100, {status=0x0, info=1}, ) == 0x0 00345 468 NtCreateSection (0xe, 0x0, 0x0, 16, 134217728, 100, ... 104, ) == 0x0 00346 468 NtClose (100, ... ) == 0x0 00347 468 NtMapViewOfSection (104, -1, (0x0), 0, 0, 0x0, 0, 1, 0, 16, ... (0x370000), 0x0, 94208, ) == 0x0 00348 468 NtClose (104, ... ) == 0x0 00349 468 NtUnmapViewOfSection (-1, 0x370000, ... ) == 0x0 00350 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1235512, ... ) }, 1235512, ... ) == 0x0 00351 468 NtCreateFile (0x80100080, {24, 0, 0x40, 0, 1236212, (0x80100080, {24, 0, 0x40, 0, 1236212, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 0x0, 0, 5, 1, 96, 0, 0, ... 104, {status=0x0, info=1}, ) }, 0x0, 0, 5, 1, 96, 0, 0, ... 104, {status=0x0, info=1}, ) == 0x0 00352 468 NtCreateSection (0xf0005, 0x0, 0x0, 2, 134217728, 104, ... 100, ) == 0x0 00353 468 NtClose (104, ... ) == 0x0 00354 468 NtMapViewOfSection (100, -1, (0x0), 0, 0, {0, 0}, 0, 1, 0, 2, ... (0x370000), {0, 0}, 94208, ) == 0x0 00355 468 NtClose (100, ... ) == 0x0 00356 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00357 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00358 468 NtQueryDefaultLocale (1, 1236736, ... ) == 0x0 00359 468 NtQueryVirtualMemory (-1, 0x370000, Basic, 28, ... {BaseAddress=0x370000,AllocationBase=0x370000,AllocationProtect=0x2,RegionSize=0x17000,State=0x1000,Protect=0x2,Type=0x40000,}, 0x0, ) == 0x0 00360 468 NtUnmapViewOfSection (-1, 0x370000, ... ) == 0x0 00361 468 NtOpenKey (0x80000100, {24, 0, 0x40, 0, 0, (0x80000100, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00362 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00363 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 100, ) == 0x0 00364 468 NtQueryInformationToken (100, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00365 468 NtClose (100, ... ) == 0x0 00366 468 NtOpenKey (0x80000100, {24, 0, 0x40, 0, 0, (0x80000100, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00367 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00368 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00369 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1237372, ... ) }, 1237372, ... ) == 0x0 00370 468 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\"}, 3, 16417, ... 100, {status=0x0, info=1}, ) }, 3, 16417, ... 100, {status=0x0, info=1}, ) == 0x0 00371 468 NtQueryDirectoryFile (100, 0, 0, 0, 1236732, 616, BothDirectory, 1, (100, 0, 0, 0, 1236732, 616, BothDirectory, 1, "IEXPLORE.EXE", 0, ... {status=0x0, info=118}, ) , 0, ... {status=0x0, info=118}, ) == 0x0 00372 468 NtClose (100, ... ) == 0x0 00373 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00374 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00375 468 NtWaitForSingleObject (84, 0, {-1000000, -1}, ... ) == 0x0 00376 468 NtReleaseMutant (84, ... 0x0, ) == 0x0 00377 468 NtUnmapViewOfSection (-1, 0x410000, ... ) == 0x0 00378 468 NtClose (96, ... ) == 0x0 00379 468 NtClose (92, ... ) == 0x0 00380 468 NtQuerySection (80, Image, 48, ... {section info, class 1, size 48}, 0x0, ) == 0x0 00381 468 NtOpenKey (0x80000000, {24, 0, 0x40, 0, 0, (0x80000000, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEXPLORE.EXE"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00382 468 NtOpenThreadToken (-2, 0x2000000, 1, ... ) == STATUS_NO_TOKEN 00383 468 NtOpenProcessToken (-1, 0xa, ... 92, ) == 0x0 00384 468 NtQueryInformationToken (92, User, 136, ... {token info, class 1, size 36}, 36, ) == 0x0 00385 468 NtOpenKey (0x3, {24, 0, 0x40, 0, 0, (0x3, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\SafeBoot\Option"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00386 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 96, ) }, ... 96, ) == 0x0 00387 468 NtQueryValueKey (96, (96, "TransparentEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\1\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (96, "TransparentEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\1\0\0\0"}, 16, ) }, 16, ) == 0x0 00388 468 NtQueryValueKey (96, (96, "AuthenticodeEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (96, "AuthenticodeEnabled", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00389 468 NtClose (96, ... ) == 0x0 00390 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 96, ) }, ... 96, ) == 0x0 00391 468 NtQueryValueKey (96, (96, "ExecutableTypes", Partial, 0, ... ) , Partial, 0, ... ) == STATUS_BUFFER_TOO_SMALL 00392 468 NtQueryValueKey (96, (96, "ExecutableTypes", Partial, 260, ... TitleIdx=0, Type=7, Data="A\0D\0E\0\0\0A\0D\0P\0\0\0B\0A\0S\0\0\0B\0A\0T\0\0\0C\0H\0M\0\0\0C\0M\0D\0\0\0C\0O\0M\0\0\0C\0P\0L\0\0\0C\0R\0T\0\0\0E\0X\0E\0\0\0H\0L\0P\0\0\0H\0T\0A\0\0\0I\0N\0F\0\0\0I\0N\0S\0\0\0I\0S\0P\0\0\0L\0N\0K\0\0\0M\0D\0B\0\0\0M\0D\0E\0\0\0M\0S\0C\0\0\0M\0S\0I\0\0\0M\0S\0P\0\0\0M\0S\0T\0\0\0O\0C\0X\0\0\0P\0C\0D\0\0\0P\0I\0F\0\0\0R\0E\0G\0\0\0S\0C\0R\0\0\0S\0H\0S\0\0\0U\0R\0L\0\0\0V\0B\0\0\0W\0S\0C\0\0\0\0\0"}, 260, ) , Partial, 260, ... TitleIdx=0, Type=7, Data= (96, "ExecutableTypes", Partial, 260, ... TitleIdx=0, Type=7, Data="A\0D\0E\0\0\0A\0D\0P\0\0\0B\0A\0S\0\0\0B\0A\0T\0\0\0C\0H\0M\0\0\0C\0M\0D\0\0\0C\0O\0M\0\0\0C\0P\0L\0\0\0C\0R\0T\0\0\0E\0X\0E\0\0\0H\0L\0P\0\0\0H\0T\0A\0\0\0I\0N\0F\0\0\0I\0N\0S\0\0\0I\0S\0P\0\0\0L\0N\0K\0\0\0M\0D\0B\0\0\0M\0D\0E\0\0\0M\0S\0C\0\0\0M\0S\0I\0\0\0M\0S\0P\0\0\0M\0S\0T\0\0\0O\0C\0X\0\0\0P\0C\0D\0\0\0P\0I\0F\0\0\0R\0E\0G\0\0\0S\0C\0R\0\0\0S\0H\0S\0\0\0U\0R\0L\0\0\0V\0B\0\0\0W\0S\0C\0\0\0\0\0"}, 260, ) }, 260, ) == 0x0 00393 468 NtClose (96, ... ) == 0x0 00394 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\LevelObjects"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00395 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 96, ) }, ... 96, ) == 0x0 00396 468 NtQueryValueKey (96, (96, "Levels", Partial, 536, ... ) , Partial, 536, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00397 468 NtClose (96, ... ) == 0x0 00398 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00399 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00400 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00401 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00402 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00403 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00404 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00405 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00406 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00407 468 NtQueryDefaultLocale (1, 1238828, ... ) == 0x0 00408 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths"}, ... 96, ) }, ... 96, ) == 0x0 00409 468 NtEnumerateKey (96, 0, Basic, 280, ... {LastWrite={0x6f7a111e,0x1c73999}, TitleIdx=0, Name= (96, 0, Basic, 280, ... {LastWrite={0x6f7a111e,0x1c73999}, TitleIdx=0, Name="{dda3f824-d8cb-441b-834d-be2efd2c1a33}"}, 92, ) }, 92, ) == 0x0 00410 468 NtOpenKey (0x20019, {24, 96, 0x40, 0, 0, (0x20019, {24, 96, 0x40, 0, 0, "{dda3f824-d8cb-441b-834d-be2efd2c1a33}"}, ... 100, ) }, ... 100, ) == 0x0 00411 468 NtQueryValueKey (100, (100, "ItemData", Partial, 280, ... TitleIdx=0, Type=2, Data="%\0H\0K\0E\0Y\0_\0C\0U\0R\0R\0E\0N\0T\0_\0U\0S\0E\0R\0\\0S\0o\0f\0t\0w\0a\0r\0e\0\\0M\0i\0c\0r\0o\0s\0o\0f\0t\0\\0W\0i\0n\0d\0o\0w\0s\0\\0C\0u\0r\0r\0e\0n\0t\0V\0e\0r\0s\0i\0o\0n\0\\0E\0x\0p\0l\0o\0r\0e\0r\0\\0S\0h\0e\0l\0l\0 \0F\0o\0l\0d\0e\0r\0s\0\\0C\0a\0c\0h\0e\0%\0O\0L\0K\0*\0\0\0"}, 202, ) , Partial, 280, ... TitleIdx=0, Type=2, Data= (100, "ItemData", Partial, 280, ... TitleIdx=0, Type=2, Data="%\0H\0K\0E\0Y\0_\0C\0U\0R\0R\0E\0N\0T\0_\0U\0S\0E\0R\0\\0S\0o\0f\0t\0w\0a\0r\0e\0\\0M\0i\0c\0r\0o\0s\0o\0f\0t\0\\0W\0i\0n\0d\0o\0w\0s\0\\0C\0u\0r\0r\0e\0n\0t\0V\0e\0r\0s\0i\0o\0n\0\\0E\0x\0p\0l\0o\0r\0e\0r\0\\0S\0h\0e\0l\0l\0 \0F\0o\0l\0d\0e\0r\0s\0\\0C\0a\0c\0h\0e\0%\0O\0L\0K\0*\0\0\0"}, 202, ) }, 202, ) == 0x0 00412 468 NtQueryValueKey (100, (100, "SaferFlags", Partial, 280, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 280, ... TitleIdx=0, Type=4, Data= (100, "SaferFlags", Partial, 280, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00413 468 NtClose (100, ... ) == 0x0 00414 468 NtEnumerateKey (96, 1, Basic, 280, ... ) == STATUS_NO_MORE_ENTRIES 00415 468 NtClose (96, ... ) == 0x0 00416 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00417 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00418 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00419 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00420 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00421 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00422 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00423 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00424 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00425 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00426 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00427 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00428 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00429 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00430 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00431 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00432 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00433 468 NtClose (96, ... ) == 0x0 00434 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00435 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00436 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00437 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00438 468 NtClose (96, ... ) == 0x0 00439 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00440 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00441 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00442 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00443 468 NtClose (96, ... ) == 0x0 00444 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00445 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00446 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00447 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00448 468 NtClose (96, ... ) == 0x0 00449 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00450 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00451 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00452 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00453 468 NtClose (96, ... ) == 0x0 00454 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00455 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00456 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00457 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00458 468 NtClose (96, ... ) == 0x0 00459 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\4096\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00460 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00461 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00462 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00463 468 NtClose (96, ... ) == 0x0 00464 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00465 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00466 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00467 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00468 468 NtClose (96, ... ) == 0x0 00469 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00470 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00471 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00472 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00473 468 NtClose (96, ... ) == 0x0 00474 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\65536\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00475 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00476 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00477 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00478 468 NtClose (96, ... ) == 0x0 00479 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00480 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00481 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00482 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00483 468 NtClose (96, ... ) == 0x0 00484 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00485 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00486 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00487 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00488 468 NtClose (96, ... ) == 0x0 00489 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00490 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00491 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00492 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00493 468 NtClose (96, ... ) == 0x0 00494 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00495 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00496 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00497 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00498 468 NtClose (96, ... ) == 0x0 00499 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Hashes"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00500 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00501 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00502 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00503 468 NtClose (96, ... ) == 0x0 00504 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\UrlZones"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00505 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 96, ) }, ... 96, ) == 0x0 00506 468 NtQueryValueKey (96, (96, "DefaultLevel", Full, 524, ... TitleIdx=0, Type=4, Name="DefaultLevel", Data="\0\0\4\0"}, 48, ) , Full, 524, ... TitleIdx=0, Type=4, Name= (96, "DefaultLevel", Full, 524, ... TitleIdx=0, Type=4, Name="DefaultLevel", Data="\0\0\4\0"}, 48, ) , Data= (96, "DefaultLevel", Full, 524, ... TitleIdx=0, Type=4, Name="DefaultLevel", Data="\0\0\4\0"}, 48, ) }, 48, ) == 0x0 00507 468 NtClose (96, ... ) == 0x0 00508 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00509 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 96, ) == 0x0 00510 468 NtQueryInformationToken (96, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00511 468 NtClose (96, ... ) == 0x0 00512 468 NtOpenKey (0x20019, {24, 0, 0x40, 0, 0, (0x20019, {24, 0, 0x40, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00513 468 NtOpenThreadToken (-2, 0x8, 0, ... ) == STATUS_NO_TOKEN 00514 468 NtOpenProcessToken (-1, 0xa, ... 96, ) == 0x0 00515 468 NtDuplicateToken (96, 0xc, {24, 0, 0x0, 0, 1239348, 0x0}, 0, 2, ... 100, ) == 0x0 00516 468 NtClose (96, ... ) == 0x0 00517 468 NtAccessCheck (1382304, 100, 0x1, 1239476, 1239420, 56, 1239504, ... (0x1), ) == 0x0 00518 468 NtClose (100, ... ) == 0x0 00519 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 100, ) }, ... 100, ) == 0x0 00520 468 NtQueryValueKey (100, (100, "PolicyScope", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) , Partial, 80, ... TitleIdx=0, Type=4, Data= (100, "PolicyScope", Partial, 80, ... TitleIdx=0, Type=4, Data="\0\0\0\0"}, 16, ) }, 16, ) == 0x0 00521 468 NtClose (100, ... ) == 0x0 00522 468 NtOpenSymbolicLinkObject (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\??\C:"}, ... 100, ) }, ... 100, ) == 0x0 00523 468 NtQuerySymbolicLinkObject (100, ... (100, ... "\Device\HarddiskVolume1", 48, ) , 48, ) == 0x0 00524 468 NtClose (100, ... ) == 0x0 00525 468 NtQueryInformationFile (76, 1237808, 528, Name, ... {status=0x0, info=94}, ) == 0x0 00526 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00527 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00528 468 NtQueryAttributesFile ({24, 0, 0x40, 0, 0, ({24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE"}, 1236488, ... ) }, 1236488, ... ) == 0x0 00529 468 NtOpenFile (0x100001, {24, 0, 0x40, 0, 0, (0x100001, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\"}, 3, 16417, ... 100, {status=0x0, info=1}, ) }, 3, 16417, ... 100, {status=0x0, info=1}, ) == 0x0 00530 468 NtQueryDirectoryFile (100, 0, 0, 0, 1235848, 616, BothDirectory, 1, (100, 0, 0, 0, 1235848, 616, BothDirectory, 1, "IEXPLORE.EXE", 0, ... {status=0x0, info=118}, ) , 0, ... {status=0x0, info=118}, ) == 0x0 00531 468 NtClose (100, ... ) == 0x0 00532 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00533 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00534 468 NtOpenThreadTokenEx (-2, 0x20008, 1, 512, ... ) == STATUS_NO_TOKEN 00535 468 NtOpenProcessTokenEx (-1, 0x20008, 512, ... 100, ) == 0x0 00536 468 NtQueryInformationToken (100, User, 80, ... {token info, class 1, size 36}, 36, ) == 0x0 00537 468 NtClose (100, ... ) == 0x0 00538 468 NtOpenKey (0x20019, {24, 0, 0x640, 0, 0, (0x20019, {24, 0, 0x640, 0, 0, "\REGISTRY\USER\S-1-5-21-1078081533-484763869-839522115-1003"}, ... 100, ) }, ... 100, ) == 0x0 00539 468 NtOpenKey (0x20019, {24, 100, 0x40, 0, 0, (0x20019, {24, 100, 0x40, 0, 0, "Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders"}, ... 96, ) }, ... 96, ) == 0x0 00540 468 NtClose (100, ... ) == 0x0 00541 468 NtQueryValueKey (96, (96, "Cache", Partial, 144, ... ) , Partial, 144, ... ) == STATUS_BUFFER_OVERFLOW 00542 468 NtQueryValueKey (96, (96, "Cache", Partial, 162, ... TitleIdx=0, Type=1, Data="C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0S\0R\0I\0-\0u\0s\0e\0r\0\\0L\0o\0c\0a\0l\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0T\0e\0m\0p\0o\0r\0a\0r\0y\0 \0I\0n\0t\0e\0r\0n\0e\0t\0 \0F\0i\0l\0e\0s\0\0\0"}, 162, ) , Partial, 162, ... TitleIdx=0, Type=1, Data= (96, "Cache", Partial, 162, ... TitleIdx=0, Type=1, Data="C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0S\0R\0I\0-\0u\0s\0e\0r\0\\0L\0o\0c\0a\0l\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0T\0e\0m\0p\0o\0r\0a\0r\0y\0 \0I\0n\0t\0e\0r\0n\0e\0t\0 \0F\0i\0l\0e\0s\0\0\0"}, 162, ) }, 162, ) == 0x0 00543 468 NtClose (96, ... ) == 0x0 00544 468 NtAllocateVirtualMemory (-1, 0, 0, 4096, 8192, 4, ... 3604480, 4096, ) == 0x0 00545 468 NtAllocateVirtualMemory (-1, 3604480, 0, 4096, 4096, 4, ... 3604480, 4096, ) == 0x0 00546 468 NtOpenKey (0x1, {24, 0, 0x40, 0, 0, (0x1, {24, 0, 0x40, 0, 0, "\Registry\Machine\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers"}, ... 96, ) }, ... 96, ) == 0x0 00547 468 NtQueryValueKey (96, (96, "LogFileName", Partial, 536, ... ) , Partial, 536, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00548 468 NtClose (96, ... ) == 0x0 00549 468 NtOpenKey (0x3, {24, 0, 0x40, 0, 0, (0x3, {24, 0, 0x40, 0, 0, "\Registry\MACHINE\System\CurrentControlSet\Control\SafeBoot\Option"}, ... ) }, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00550 468 NtQueryInformationToken (92, User, 128, ... {token info, class 1, size 36}, 36, ) == 0x0 00551 468 NtQueryInformationToken (92, 15, 4, ... {token info, class 15, size 4}, 4, ) == 0x0 00552 468 NtClose (92, ... ) == 0x0 00553 468 NtCreateProcessEx (1242084, 2035711, 0, -1, 0, 80, 0, 0, 0, ... ) == 0x0 00554 468 NtQueryInformationProcess (92, Basic, 24, ... {ExitStatus=0x103,PebBaseAddress=0x7ffdf000,AffinityMask=0x1,BasePriority=8,Pid=856,ParentPid=456,}, 0x0, ) == 0x0 00555 468 NtReadVirtualMemory (92, 0x7ffdf008, 4, ... (92, 0x7ffdf008, 4, ... "\0\0@\0", 0x0, ) , 0x0, ) == 0x0 00556 468 NtOpenFile (0x1200a9, {24, 0, 0x40, 0, 0, (0x1200a9, {24, 0, 0x40, 0, 0, "\??\C:\Program Files\Internet Explorer\IEXPLORE.EXE.Manifest"}, 1, 96, ... ) }, 1, 96, ... ) == STATUS_OBJECT_NAME_NOT_FOUND 00557 468 NtAllocateVirtualMemory (-1, 1384448, 0, 8192, 4096, 4, ... 1384448, 8192, ) == 0x0 00558 468 NtReadVirtualMemory (92, 0x400000, 4096, ... (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) T\257\226 (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) T\257l\1\24\257\227 (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) U\257\322 (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) T\257\1\1\21\257\227 (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) T\257L\1I\257\227 (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) T\257l\1i\257\227 (92, 0x400000, 4096, ... "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0\322C:\374\226"T\257\226"T\257\226"T\257l\1\24\257\227"T\257\226"U\257\322"T\257l\1M\257\233"T\257\1\1\21\257\227"T\257L\1H\257\227"T\257L\1I\257\227"T\257l\1k\257\227"T\257l\1i\257\227"T\257Rich\226"T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) T\257\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0PE\0\0L\1\3\0L\203};\0\0\0\0\0\0\0\0\340\0\17\1\13\1\7\0\0\26\0\0\0J\1\0\0\0\0\0\346\36\0\0\0\20\0\0\00\0\0\0\0@\0\0\20\0\0\0\2\0\0\5\0\1\0\5\0\1\0\4\0\0\0\0\0\0\0\0\220\1\0\0\4\0\0VT\2\0\2\0\0\200\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\240%\0\0K\0\0\0\354\37\0\0x\0\0\0\0@\0\0HG\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \21\0\0\34\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0`\2\0\0l\0\0\0\0\20\0\0\30\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\0\353\25\0\0", 4096, ) == 0x0 00559 468 NtReadVirtualMemory (92, 0x404000, 256, ... (92, 0x404000, 256, ... "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\4\0\3\0\0\00\0\0\200\6\0\0\0\370\1\0\200\16\0\0\0\20\2\0\200\20\0\0\0\330\2\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\07\0\1\0\0\0\360\2\0\200\2\0\0\0\10\3\0\200\3\0\0\0 \3\0\200\4\0\0\08\3\0\200\5\0\0\0P\3\0\200\6\0\0\0h\3\0\200\7\0\0\0\200\3\0\200\10\0\0\0\230\3\0\200\11\0\0\0\260\3\0\200\12\0\0\0\310\3\0\200\13\0\0\0\340\3\0\200\14\0\0\0\370\3\0\200\15\0\0\0\20\4\0\200\16\0\0\0(\4\0\200\17\0\0\0@\4\0\200\20\0\0\0X\4\0\200\21\0\0\0p\4\0\200\22\0\0\0\210\4\0\200\23\0\0\0\240\4\0\200\24\0\0\0\270\4\0\200\25\0\0\0\320\4\0\200\26\0\0\0\350\4\0\200\27\0\0\0\0\5\0\200\30\0\0\0\30\5\0\200", 256, ) , 256, ) == 0x0 00560 468 NtQueryDebugFilterState (53, 2, ... ) == 0x0 00561 468 NtQueryInformationProcess (92, Basic, 24, ... {ExitStatus=0x103,PebBaseAddress=0x7ffdf000,AffinityMask=0x1,BasePriority=8,Pid=856,ParentPid=456,}, 0x0, ) == 0x0 00562 468 NtAllocateVirtualMemory (-1, 0, 0, 1788, 4096, 4, ... 3670016, 4096, ) == 0x0 00563 468 NtAllocateVirtualMemory (92, 0, 0, 1910, 4096, 4, ... 65536, 4096, ) == 0x0 00564 468 NtWriteVirtualMemory (92, 0x10000, (92, 0x10000, "=\0:\0:\0=\0:\0:\0\\0\0\0=\0C\0:\0=\0C\0:\0\\0p\0o\0l\0y\0u\0n\0p\0a\0c\0k\0\0\0=\0E\0x\0i\0t\0C\0o\0d\0e\0=\00\00\00\00\00\00\00\02\0\0\0=\0U\0:\0=\0U\0:\0\\0s\0t\0a\0r\0t\0u\0p\0s\0c\0r\0i\0p\0t\0s\0\0\0A\0L\0L\0U\0S\0E\0R\0S\0P\0R\0O\0F\0I\0L\0E\0=\0C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0A\0l\0l\0 \0U\0s\0e\0r\0s\0\0\0A\0P\0P\0D\0A\0T\0A\0=\0C\0:\0\\0D\0o\0c\0u\0m\0e\0n\0t\0s\0 \0a\0n\0d\0 \0S\0e\0t\0t\0i\0n\0g\0s\0\\0S\0R\0I\0-\0u\0s\0e\0r\0\\0A\0p\0p\0l\0i\0c\0a\0t\0i\0o\0n\0 \0D\0a\0t\0a\0\0\0C\0L\0I\0E\0N\0T\0N\0A\0M\0E\0=\0C\0o\0n\0s\0o\0l\0e\0\0\0C\0o\0m\0m\0o\0n\0P\0r\0o\0g\0r\0a\0m\0F\0i\0l\0e\0s\0=\0C\0:\0\\0P\0r\0o\0g\0r\0a\0m\0 \0F\0i\0l\0e\0s\0\\0C\0o\0m\0m\0o\0n\0 \0F\0i\0l\0e\0s\0\0\0C\0O\0M\0", 1910, ... 0x0, ) , 1910, ... 0x0, ) == 0x0 00565 468 NtAllocateVirtualMemory (92, 0, 0, 1788, 4096, 4, ... 131072, 4096, ) == 0x0 00566 468 NtWriteVirtualMemory (92, 0x20000, (92, 0x20000, "\0\20\0\0\374\6\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\3\0\0\0\0\0\0\0\13\0\0\0$\0\10\2\220\2\0\0\0\0\0\0\32\1\34\1\230\4\0\0^\0`\0\264\5\0\0b\0d\0\24\6\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0^\0`\0x\6\0\0\36\0 \0\330\6\0\0\0\0\2\0\370\6\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 1788, ... 0x0, ) , 1788, ... 0x0, ) == 0x0 00567 468 NtWriteVirtualMemory (92, 0x7ffdf010, (92, 0x7ffdf010, "\0\0\2\0", 4, ... 0x0, ) , 4, ... 0x0, ) == 0x0 00568 468 NtAllocateVirtualMemory (92, 0, 0, 148, 4096, 4, ... 196608, 4096, ) == 0x0 00569 468 NtWriteVirtualMemory (92, 0x30000, (92, 0x30000, "S\0h\0i\0m\0E\0n\0g\0.\0d\0l\0l\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\224\0\0\0\253\355\15\254\344\254\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 148, ... 0x0, ) , 148, ... 0x0, ) == 0x0 00570 468 NtWriteVirtualMemory (92, 0x7ffdf1e8, (92, 0x7ffdf1e8, "\0\0\3\0", 4, ... 0x0, ) , 4, ... 0x0, ) == 0x0 00571 468 NtFreeVirtualMemory (-1, (0x380000), 0, 32768, ... (0x380000), 4096, ) == 0x0 00572 468 NtAllocateVirtualMemory (92, 0, 0, 1048576, 8192, 4, ... 262144, 1048576, ) == 0x0 00573 468 NtAllocateVirtualMemory (92, 1302528, 0, 8192, 4096, 4, ... 1302528, 8192, ) == 0x0 00574 468 NtProtectVirtualMemory (92, (0x13e000), 4096, 260, ... (0x13e000), 4096, 4, ) == 0x0 00575 468 NtCreateThread (0x1f03ff, 0x0, 92, 1240348, 1241068, 1, ... 96, {856, 860}, ) == 0x0 00576 468 NtRequestWaitReplyPort (24, {168, 196, new_msg, 0, 1366108, 0, 1242220, 2009901952} (24, {168, 196, new_msg, 0, 1366108, 0, 1242220, 2009901952} "\0\0\0\0\0\0\1\0t\364\22\0\0\0\0\0_\0\0\0`\0\0\0X\3\0\0\\3\0\0\0\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0@\334\24\0\264\364\22\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\22\0p\326\24\0" ... {168, 196, reply, 0, 456, 468, 1545, 0} "\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\\0\0\0`\0\0\0X\3\0\0\\3\0\0\0\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0@\334\24\0\264\364\22\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\22\0p\326\24\0" ) ... {168, 196, reply, 0, 456, 468, 1545, 0} (24, {168, 196, new_msg, 0, 1366108, 0, 1242220, 2009901952} "\0\0\0\0\0\0\1\0t\364\22\0\0\0\0\0_\0\0\0`\0\0\0X\3\0\0\\3\0\0\0\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0@\334\24\0\264\364\22\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\22\0p\326\24\0" ... {168, 196, reply, 0, 456, 468, 1545, 0} "\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\\0\0\0`\0\0\0X\3\0\0\\3\0\0\0\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0@\334\24\0\264\364\22\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\360\375\177\0\0\0\0\0\0\22\0p\326\24\0" ) ) == 0x0 00577 468 NtClose (76, ... ) == 0x0 00578 468 NtClose (80, ... ) == 0x0 00579 468 NtGetContextThread (96, 1242968, ... ) == 0x0 00580 468 NtReadVirtualMemory (92, 0x7ffdf008, 4, ... (92, 0x7ffdf008, 4, ... "\0\0@\0", 4, ) , 4, ) == 0x0 00581 468 NtAllocateVirtualMemory (92, 320077824, 0, 688128, 12288, 4, ... 320077824, 688128, ) == 0x0 00582 468 NtProtectVirtualMemory (92, (0x13140000), 512, 64, ... (0x13140000), 4096, 4, ) == 0x0 00583 468 NtProtectVirtualMemory (92, (0x13140000), 4096, 4, ... (0x13140000), 4096, 64, ) == 0x0 00584 468 NtWriteVirtualMemory (92, 0x13140000, (92, 0x13140000, "MZ\220\0\3\0\0\0\4\0\0\0\377\377\0\0\270\0\0\0\0\0\0\0@\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\200\0\0\0\16\37\272\16\0\264\11\315!\270\1L\315!This program cannot be run in DOS mode.\15\15\12$\0\0\0\0\0\0\0PE\0\0L\1\2\0?V\227F\0\0\0\0\0\0\0\0\340\0\17\1\13\1\5\14\0\16\0\0\0^\12\0\0\0\0\0\20\20\0\0\0\20\0\0\0 \0\0\0\0\24\23\0\20\0\0\0\2\0\0\4\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\200\12\0\0\2\0\0\212a\0\0\2\0\0\0\0\0\20\0\0\20\0\0\0\0\20\0\0\20\0\0\0\0\0\0\20\0\0\0\0\0\0\0\0\0\0\0\320\33\0\0(\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\20\0\0\14\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0.text\0\0\04\14\0\0\0\20\0\0\0\16\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0 \0\0`.data\0\0\0z\\12\0\0 \0\0\0\6\0\0\0\20\0\0\0\0\0\0\0\0\0\0\0\0\0\0@\0\0\300\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 512, ... 512, ) , 512, ... 512, ) == 0x0 00585 468 NtFlushInstructionCache (92, 320077824, 512, ... ) == 0x0 00586 468 NtProtectVirtualMemory (92, (0x13141000), 3584, 64, ... (0x13141000), 4096, 4, ) == 0x0 00587 468 NtProtectVirtualMemory (92, (0x13141000), 4096, 4, ... (0x13141000), 4096, 64, ) == 0x0 00588 468 NtWriteVirtualMemory (92, 0x13141000, (92, 0x13141000, "\26\34\0\0\4\34\0\0\0\0\0\0\0\0\0\0\270&%\24\23-# \24\23Ph# \24\23\350}\13\0\0\241\14 \24\23\203\370\0u, 3584, ... 3584, ) , 3584, ... 3584, ) == 0x0 00589 468 NtFlushInstructionCache (92, 320081920, 3584, ... ) == 0x0 00590 468 NtProtectVirtualMemory (92, (0x13141000), 3124, 32, ... (0x13141000), 4096, 4, ) == 0x0 00591 468 NtProtectVirtualMemory (92, (0x13142000), 1536, 64, ... (0x13142000), 4096, 4, ) == 0x0 00592 468 NtProtectVirtualMemory (92, (0x13142000), 4096, 4, ... (0x13142000), 4096, 64, ) == 0x0 00593 468 NtWriteVirtualMemory (92, 0x13142000, (92, 0x13142000, "\0\0\0\07\0\0\0"\0\0\0\330\5\350w\375\245\347w4aSJG39n3oOI7d\0\2W}xs\5\27Y\1A~~\4d\2V}{\177\35\10_\7Avq7V\4Y}|q\35\10W\7A}}\6d\2W}xs\5\27\\6]a{\6W4Wedu\7\17@\1Z}g\5U\1aS"3GIT\34@j:\30\27L>v?\30\26L1\26\34\20lD[\21\22S\15\2g\31A@0jA\0,\10S\0F\4 9GX\15\4\35\}\1h\2\3\33\14\20qV\27\11\13(\177I\22\27hD&d"K\n>eBC70q,\3J0ZW\12Z\35O\31E\13S\232'\1ZU\13@o\23:N\27@\4>yuo9K@J#_U@W\3#Im\23e\2468>`@\35G\12"\0Y\2[\23>+3ZV\03hO"R\26Z\4?yu\35]\2_o\14%X\27Q)2$#_\np\35*(C\1r\10?/\63z\34V\16;,z\21@\4+\13GpK\13R\33*\31E\13W\4 9\63z\34V\16;,e\1Y\16'/\23[K\13R\13O\15R\10Q\256", 1536, ... 1536, ) \0\0\0\330\5\350w\375\245\347w4aSJG39n3oOI7d\0\2W}xs\5\27Y\1A~~\4d\2V}{\177\35\10_\7Avq7V\4Y}|q\35\10W\7A}}\6d\2W}xs\5\27\\6]a{\6W4Wedu\7\17@\1Z}g\5U\1aS (92, 0x13142000, "\0\0\0\07\0\0\0"\0\0\0\330\5\350w\375\245\347w4aSJG39n3oOI7d\0\2W}xs\5\27Y\1A~~\4d\2V}{\177\35\10_\7Avq7V\4Y}|q\35\10W\7A}}\6d\2W}xs\5\27\\6]a{\6W4Wedu\7\17@\1Z}g\5U\1aS"3GIT\34@j:\30\27L>v?\30\26L1\26\34\20lD[\21\22S\15\2g\31A@0jA\0,\10S\0F\4 9GX\15\4\35\}\1h\2\3\33\14\20qV\27\11\13(\177I\22\27hD&d"K\n>eBC70q,\3J0ZW\12Z\35O\31E\13S\232'\1ZU\13@o\23:N\27@\4>yuo9K@J#_U@W\3#Im\23e\2468>`@\35G\12"\0Y\2[\23>+3ZV\03hO"R\26Z\4?yu\35]\2_o\14%X\27Q)2$#_\np\35*(C\1r\10?/\63z\34V\16;,z\21@\4+\13GpK\13R\33*\31E\13W\4 9\63z\34V\16;,e\1Y\16'/\23[K\13R\13O\15R\10Q\256", 1536, ... 1536, ) K\n>eBC70q,\3J0ZW\12Z\35O\31E\13S\232'\1ZU\13@o\23:N\27@\4>yuo9K@J26:3ZV\0\35\1#:78X\5!$3\35[\7]oj:\22\274=\32$3VK\0V\33o\14O\24X\16!/5oP\13K\37#&E\1\32\4+/GA\\35G\16==78hO\17\32/JJ\7P\16#\15E\15B\4cJ\33o\272a\32!=^\11Qa=>#_U@W\3#Im\23e\2468>`@\35G\12 (92, 0x13142000, "\0\0\0\07\0\0\0"\0\0\0\330\5\350w\375\245\347w4aSJG39n3oOI7d\0\2W}xs\5\27Y\1A~~\4d\2V}{\177\35\10_\7Avq7V\4Y}|q\35\10W\7A}}\6d\2W}xs\5\27\\6]a{\6W4Wedu\7\17@\1Z}g\5U\1aS"3GIT\34@j:\30\27L>v?\30\26L1\26\34\20lD[\21\22S\15\2g\31A@0jA\0,\10S\0F\4 9GX\15\4\35\}\1h\2\3\33\14\20qV\27\11\13(\177I\22\27hD&d"K\n>eBC70q,\3J0ZW\12Z\35O\31E\13S\232'\1ZU\13@o\23:N\27@\4>yuo9K@J#_U@W\3#Im\23e\2468>`@\35G\12"\0Y\2[\23>+3ZV\03hO"R\26Z\4?yu\35]\2_o\14%X\27Q)2$#_\np\35*(C\1r\10?/\63z\34V\16;,z\21@\4+\13GpK\13R\33*\31E\13W\4 9\63z\34V\16;,e\1Y\16'/\23[K\13R\13O\15R\10Q\256", 1536, ... 1536, ) R\26Z\4?yu\35]\2_o\14%X\27Q)2$#_\np\35*(C\1r\10?/\63z\34V\16;,z\21@\4+\13GpK\13R\33*\31E\13W\4 9\63z\34V\16;,e\1Y\16'/\23[K\13R\13O\15R\10Q\256", 1536, ... 1536, ) == 0x0 00594 468 NtFlushInstructionCache (92, 320086016, 1536, ... ) == 0x0 00595 468 NtProtectVirtualMemory (92, (0x13142000), 679034, 4, ... (0x13142000), 679936, 4, ) == 0x0 00596 468 NtProtectVirtualMemory (92, (0x7ffdf008), 4, 64, ... (0x7ffdf000), 4096, 64, ) == 0x0 00597 468 NtProtectVirtualMemory (92, (0x7ffdf000), 4096, 64, ... (0x7ffdf000), 4096, 64, ) == 0x0 00598 468 NtWriteVirtualMemory (92, 0x7ffdf008, (92, 0x7ffdf008, "\0\0\24\23", 4, ... 4, ) , 4, ... 4, ) == 0x0 00599 468 NtFlushInstructionCache (92, 2147348488, 4, ... ) == 0x0 00600 468 NtSetContextThread (96, 1242968, ... ) == 0x0 00601 468 NtResumeThread (96, ... 1, ) == 0x0 00602 468 NtClose (92, ... ) == 0x0 00603 468 NtClose (96, ... ) == 0x0 00604 468 NtCreateFile (0xc0100080, {24, 0, 0x40, 0, 1243584, (0xc0100080, {24, 0, 0x40, 0, 1243584, "\??\Runtime"}, 0x0, 128, 0, 5, 96, 0, 0, ... 96, {status=0x0, info=0}, ) }, 0x0, 128, 0, 5, 96, 0, 0, ... 96, {status=0x0, info=0}, ) == 0x0 00605 468 NtDeviceIoControlFile (96, 0, 0x0, 0x0, 0x9c402400, (96, 0, 0x0, 0x0, 0x9c402400, "X\3\0\0", 4, 0, ... {status=0x0, info=0}, 0x0, ) , 4, 0, ... {status=0x0, info=0}, 0x0, ) == 0x0 00606 468 NtClose (96, ... ) == 0x0 00607 468 NtOpenFile (0x10080, {24, 0, 0x40, 0, 0, (0x10080, {24, 0, 0x40, 0, 0, "\??\C:\WINDOWS\System32\drivers\runtime.sys"}, 7, 2113600, ... 96, {status=0x0, info=1}, ) }, 7, 2113600, ... 96, {status=0x0, info=1}, ) == 0x0 00608 468 NtQueryInformationFile (96, 1243656, 8, AttributeFlag, ... ) == STATUS_INVALID_PARAMETER 00609 468 NtSetInformationFile (96, 1243707, 1, Disposition, ... {status=0x0, info=0}, ) == 0x0 00610 468 NtClose (96, ... ) == 0x0 00611 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00612 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00613 468 NtQueryAttributesFile ({24, 12, 0x40, 0, 0, ({24, 12, 0x40, 0, 0, ":\work\packed.ex"}, 1241748, ... ) }, 1241748, ... ) == STATUS_OBJECT_PATH_SYNTAX_BAD 00614 468 NtQueryInformationProcess (-1, DefaultHardErrorMode, 4, ... {process info, class 12, size 4}, 0x0, ) == 0x0 00615 468 NtSetInformationProcess (-1, DefaultHardErrorMode, {process info, class 12, size 4}, 4, ... ) == 0x0 00616 468 NtQueryInformationThread (-2, AmILastThread, 4, ... {thread info, class 12, size 4}, 0x0, ) == 0x0 00617 468 NtTerminateProcess (0, 0, ... ) == 0x0 00618 468 NtSetInformationThread (-2, ZeroTlsCell, {ZeroTlsCell=0x0,}, 4, ... ) == 0x0 00619 468 NtFreeVirtualMemory (-1, (0x370000), 4096, 32768, ... (0x370000), 4096, ) == 0x0 00620 468 NtRequestWaitReplyPort (24, {20, 48, new_msg, 0, 1245012, 2012551928, 2011561984, 1244922} (24, {20, 48, new_msg, 0, 1245012, 2012551928, 2011561984, 1244922} "\0\0\0\0\3\0\1\0\372\376\22\0\262\33\365w\0\0\0\0" ... {20, 48, reply, 0, 456, 468, 1546, 0} "\0\0\0\0\3\0\1\0\0\0\0\0\262\33\365w\0\0\0\0" ) ... {20, 48, reply, 0, 456, 468, 1546, 0} (24, {20, 48, new_msg, 0, 1245012, 2012551928, 2011561984, 1244922} "\0\0\0\0\3\0\1\0\372\376\22\0\262\33\365w\0\0\0\0" ... {20, 48, reply, 0, 456, 468, 1546, 0} "\0\0\0\0\3\0\1\0\0\0\0\0\262\33\365w\0\0\0\0" ) ) == 0x0 00621 468 NtTerminateProcess (-1, 0, ...